From: cvs2svn Import User Date: Fri, 4 Apr 2003 03:16:28 +0000 (+0000) Subject: This commit was manufactured by cvs2svn to create branch 'SAMBA_3_0'.(This used to... X-Git-Tag: samba-4.0.0alpha6~801^2~14351 X-Git-Url: http://git.samba.org/samba.git/?a=commitdiff_plain;h=80146c3d1d2feadc231cb8cd7dd31e5194b820eb;hp=94e5719dac45baffc5f5dad6e045ac99999c76e9;p=ira%2Fwip.git This commit was manufactured by cvs2svn to create branch 'SAMBA_3_0'.(This used to be commit cbc42567bed0959cb38d71543becd1ff124cac24) --- diff --git a/WHATSNEW.txt b/WHATSNEW.txt index 4446832fd47..4067d1edc93 100644 --- a/WHATSNEW.txt +++ b/WHATSNEW.txt @@ -1,28 +1,28 @@ - WHATS NEW IN Samba 3.0 alpha21 - 26th November 2002 - =============================== + WHATS NEW IN Samba 3.0 alpha23 + 30th March 2003 + ============================== This is a pre-release of Samba 3.0. This is NOT a stable release. Use at your own risk. The purpose of this alpha release is to get wider testing of the major -new pieces of code in the current Samba 3.0 development tree. We have -officially ceased development on the 2.2.x release of Samba and are -concentrating on Samba 3.0. To reduce the time before the final Samba 3.0 -release we need as many people as possible to start testing these alpha -releases, and hopefully giving us some high quality feedback on what needs +new pieces of code in the current Samba 3.0 development tree. We have +officially ceased development on the 2.2.x release of Samba and are +concentrating on Samba 3.0. To reduce the time before the final Samba 3.0 +release we need as many people as possible to start testing these alpha +releases, and hopefully giving us some high quality feedback on what needs fixing. Note that Samba 3.0 is not feature complete yet. There is a more -coding we have planned, but unless we get what we have done already more -widely tested we will have a hard time doing a stable release in a +coding we have planned, but unless we get what we have done already more +widely tested we will have a hard time doing a stable release in a reasonable time frame. Major new features: ------------------- - Active Directory support. This release is able to join a ADS realm - as a member server and authenticate users using LDAP/kerberos. + as a member server and authenticate users using LDAP/kerberos. - Unicode support. Samba will now negotiate UNICODE on the wire and internally there is now a much better infrastructure for multi-byte @@ -30,7 +30,7 @@ Major new features: - New authentication system. The internal authentication system has been almost completely rewritten. Most of the changes are internal, - but the new auth system is also very configurable. + but the new auth system is also very configurable. - new filename mangling system. The filename mangling system has been completely rewritten. An internal database now stores mangling maps @@ -45,8 +45,17 @@ Major new features: - Samba now negotiates NT-style status32 codes on the wire. This improves error handling a lot. -- better w2k printing support. The support for printing from win2000 - clients has improved greatly. +- better w2k printing support including publishing printer + attributes in active directory + +- new loadable RPC modules + +- new dual-daemon winbindd support for better performance + +- support for migrating from a Windows NT 4.0 domain + +- support for establishing trust relationships with Windows NT 4.0 + domain controllers Plus lots of other changes! @@ -55,324 +64,186 @@ Reporting bugs & Development Discussion --------------------------------------- Please discuss this release on the samba-technical mailing list or by -joining the #samba-technical IRC channel on irc.openprojects.net +joining the #samba-technical IRC channel on irc.freenode.net. If you do report problems then please try to send high quality feedback. If you don't provide vital information to help us track down the problem then you will probably be ignored. -Removed Parameters ------------------- - - * postscript - * printer driver - * printer driver location - * printer driver file - -Added Parameters ---------------- - - * ldap trust ids - * acl compatibility - * mangle prefix - - -Modified Parameters +Changes in alpha23: ------------------- - * restrict anonymous - * password server - - -Changes in alpha21: - - See cvs log for SAMBA_3_0 for complete details. There are many - smaller numerous changes that would clutter the release notes. - -1) Numerous documentation updates including new Samba FAQ -2) Fixed logic error in checking wins server lists -3) Added more Solaris sendfile checks -4) Added --with-ldapsam for compatibility with 2.2.x Samba/LDAP setups -5) Add new client side support the Win2k LSARPC UUID in rpcbinds - Detect a native mode Win2k DC when in "security = domain" -6) Include Domain Local Groups in listing when a member of a native - mode Win2k domain -7) Fix ACL inheritance problem -8) Register <0x1c> name on unicast subnet -9) Removed stat() call in lp_add_home() -10) Change default of max_xmit to match W2K. Ensure NT negprot uses it -11) Merge the new ACL mapping code from Andreas Gruenbacher -12) Removed make_printerdef tool from build -13) Fix fd leak on printer queue tdb's -14) Better error/status loggin in both the pam_winbind client and - winbindd_pam -15) Fix fd leak with kernel change notify -16) Fix slowdown because of enumerating all print queues on every smbd startup -17) Fix --set-auth-user command to delete entries from the secrets file - when an empty username/password is passed on the command line -18) Added --get-auth-user to wbinfo for displaying account information - used to enumerate users and groups -19) Numerous updates for 'net rpc vampire' to migrate from an NT 4.0 Domain -20) Merge of scalable printing code from APP_HEAD -21) Numerous changes the passdb layer -22) More work on printer publishing in Active Directory -23) Enable "make modules" to build VFS libraries -24) Enable print notify messages on printer attributes from smbcontrol -25) Enable auto lookup of domain controllers when adding '*' to - "password server" parameter. Allows to have preferred list - of DC's, but not authoritative (e.g. password server = DC1 DC2 *) - - - - =============================== + LDAP Group Mapping + ------------------ + + pdbedit -i -e sets all SAM_ACCOUNT elements to CHANGED to + satisfy the new pdb_ldap.c handling. pdbedit -g transfers group + mappings. I made this separate from the user database, as current + installations have to live with a split backend. So, if you are + running 3_0 alphas with LDAP as a backend and upgrade to 3.0alpha23, + you must call + + root# pdbedit -i tdbsam -e ldapsam -g + + to transfer your group mapping database to LDAP. + + All groups must be represented as posixGroup objects in + the directory and you must adapt your LDAP schema to support the + sambaGroupMapping before running this command. Refer to + examples/LDAP/samba.schema for details on the objectclass. + + + Parameters + ---------- + + Modified Parameters (see smb.conf(5) for details): + + * passdb backend + + Added Parameters + + * ldap del only sam attr + * ldap delete dn + + + ChangeLog + --------- + + See cvs log for SAMBA_3_0 for complete details. There are many + smaller numerous changes that would clutter the release notes. + +0) Include security fix from Samba 2.2.8 +1) Fix interop bug in tconX on port 445 with Windows 2000 +2) Interpret missing SMB_ACL_USER_OBJ, SMB_ACL_GROUP_OBJ, or + SMB_ACL_OTHER as "preserve current value" instead of attempting + to build one ourself. +3) Rearrange set_nt_acl() such that chown is only done before + setting ACLs if there is either no change of owning user, or + change of owning user is towards the current user. Otherwise + chown is done after setting ACLs. +4) Continuing work on NTLMSSP-based SMB signing +5) When opening an existing TDB, don't require the hash_size + specified to the open call to be the same as that of the + existing tdb. The specified hash_size is only used if the + tdb needs to be (re)created. +6) Add support for "WinXP" and "Win2K3" client architectures. +7) Fixed the unmarshalling of the queryaliasmem SAMR call +8) Windows 2000 can take much longer than the specified time to + respond to a lock - so to make the torture tests valid I give + it a grace time of 10 seconds instead of 2 +9) Continued work on string handling paranoia +10) Merge new statcache.c from HEAD +11) Add new 'net ads dn' option +12) Sync up SessionSetup code to HEAD, including Luke Howard's + session key and auth verifier patches +13) Work on cleaning up winbindd's mutex locking +14) Add support for LDAP based Windows group mapping +15) Improve LDAP update routines +16) Fix memory leaks found by Valgrind +17) Add a 'privileged' mode to Winbindd +18) Work around platforms that have broken getgrnam() implementations +19) Merge real time signal fixes for kernel oplock code from HEAD +20) Fix CIDR hosts allow/deny notation +21) Fixup tcon&X server responses and error codes +22) Set domain for users in passdb created by "net rpc vampire" +23) More scalable printing updates + + + =============================== Changes in older alpha releases follow: --------------------------------------------------------------------- -Changes in alpha20: - -1) Rework the 'guest account gets RID 501' code again... -2) Change to use NT-based session key negotiated for Win2k SPNEGO -3) Support printer data registry keys other than the default - PrinterDriverData -4) Moved internal printerdata to REGISTRY_VALUE object -5) Corrected bug in dependentfiles list of DRIVER_INFO_3 -6) fixed logic bug in blocking locks code -7) Updated registry api code to work with new printer data key - support -8) Added vfstest tool -9) round lock timeouts in lockingX upwards to multiples of 1 second -10) Fixed bugs in Printer Change Notify code -11) added a 'net ads lookup' command that does a CLDAP NetLogon - query to a win2000 server -12) Added script to find undocumented smb.conf parameters -13) Added missing parameters to smb.conf(5) -14) receive & parse main CLDAP reply from win2k server -15) removed "admin log" & "alternate permissions" parameters from smb.conf -16) added a generic print_guid utility, and get the byte order handing -17) fixed memory corruption in cli_full_connection() -18) remove unused 'max packet' and 'packet size' options -19) add support for the "value,OID" format described in MSDN for Printer - Data values -20) moves NT_TOKEN generation into our authentication code -21) Update documentation build system -22) Several fixes for IRIX compiler -23) Correctly handle "max data count" value in smb transacts -24) Fix for permissions error when adding/modifying using a Print - server handle -25) Fix pam_smbpass to always check the return value of pdb_getsampwnam() -26) Use the 'init' flag to determine if the UID is set, rather than testing - the uid for -1 -27) Cope with non-unix accounts ) we just won't get the groups for those users -28) Add 'net rpc getsid' to fetch the PDC's SID into the local secrets.tdb. - Print domain SID on 'net rpc info' -29) don't use lp_passwd_file() to retrieve NIS domain name, but use location - instead -30) Various POSIX compatibility fixes -31) Show only non-default values in testparm -32) Fix longstanding bug in Win2k clients by clearing the shortname - buffer before returning ascii short name. -33) Add example backtrace script -34) Added NETLOGON NetServerAuthenticate3 include and parser file -35) fix for difference in strsep and strtok semantics in nmbd -36) Ensure we don't change to a user that we can't get an NT_TOKEN for -37) Put back in BDC support in set_server_role() -38) added a 'net rpc samdump' command for dumping the whole sam via - samsync operations (as a BDC) -39) don't use spnego in the client unless enabled in smb.conf -40) Added some new delta types discovered by Ronnie from ethereal -41) Cope with negative cache dns entries better -42) do not expose special files, only files, directories and links -43) attempts to simplify Samba's external lib dependencies -44) support non-root-mode systems without getgrouplist() -45) Some fixes for SMB signing -46) Pass the object name down to the enum_printers client rpc -47) add the netatalk VFS module -48) Ensure we have at least smb_size bytes before processing a packet -49) Allow us to "lock" printer tdb entries in memory to stop them being - re-used as cache -50) fix 2 byte alignment/offset bug that prevented Win2k/XP clients - from receiving all the printer data in EnumPrinterDataEx() -51) Add option to compile new sam system can be enabled with the - configure option --with-sam -52) Added SGML/DocBook version of developer oriented docs to build process -53) Return correct FILE_SUPERSEDED response -54) Added example sam module (skeleton) -55) Add plugin support for the sam system (based on passdb code) -56) show builtin groups in samdump -57) Adding samtest utility used to test sam backends -58) fix connecting to a BDC when the PDC is down but in WINS and no bcast - can be used to find a BDC -58) convert the LDAP/SASL code to use GSS-SPNEGO if possible -59) added cli_net_auth_3 client code -60) merge of phant0m key fix from APP_HEAD -61) allow rpcclient's samlogon command to use cli_net_3() -62) Added attribute specific OPEN tests -63) Fix bug with stat mode open being done on read-only open with - truncate -64) Add lots of const casts to function parameters -65) Implemented some more client side spoolss functions -66) usrmgr expects UNICODE as ProductType -67) Change JOB_INFO_CTR to return a pointer to an array rather than array of - pointers in client code -68) Various NTLMSSP fixes -69) fixed crash bug in cli_connection code -70) DeletePrinterDriver[Ex]() fixes from APP_HEAD -71) remove some inet_aton() calls for portability -72) Set default ACB attributes on 'unixsam' accounts -73) Add bcast_msg_flags to connection struct -74) aggregate change notify events in the smbd sender and when transmitting -75) Added better error code on out of space in printer spool directory -76) Removed total jobs check ) not applicable any more -77) fixed bug in share enumeration RPC code -78) extend the ADS_STATUS system to include NTSTATUS -79) commit trusted domain patch n+3 -80) remove block VFS module -81) restrict readline headers to readline.c -82) merge of various recycle bin VFS patches -83) Winbind client-side cleanups -84) change parametric option name to vfs_recycle_bin it is more - sane and do not pollute standard options namespace too much -85) added --enable-python configure option for building the samba-python - unit tests -86) correct trans2 bugs in client for enumerating files/directories -87) Re-add OS/2 EA error codes -88) Added patch for required attributes in directory listings to reply code -89) Fix browse synchronization bug by noticing that W2K DMB's return empty - NetServerEnum2 on port 445, but not on port 139 -90) Fix semantics of AbortPrinter() spoolss call in server code -91) Ensure we've failed a lock with a lock denied message before automatically - pushing it onto the blocking queue -92) Added experimental sendfile code -93) Initialize user_rid value in WINBIND_USERINFO structure returned by - the rpc version of query_user() -94) added gencache implementation -95) Merge the cli_shutdown change from 2_2 -96) Fixes for DeletePrinterDriverEx() -97) Fixed alignment error in spoolss code -98) Changed Major/Minor version info reported to Server Manager to 4.9 -99) Applied new display mode FLAGS for SWAT -100) Update to add DEVELOPER option to more parameters -101) Added --with-ads option, defaults to yes -102) Added --with-ldap option to configure -103) Add clock skew handling to our kerberos code -104) correct race condition in password change code for out machine account - when a member of a domain -105) First implementation for 'net rpc vampire' -106) store current handle's Device Mode with print job -107) Move functionality to check whether entries for lp_workgroup() and - "BUILTIN" exist and add them if necessary from check_correct_backend_entries - into sam_context_check_default_backends -108) allow --with-krb5 to override the location of the kerberos libs on - redhat -109) unlink spool file after submitting print job when using CUPS api -110) Add framework for samtest commands -111) Add the ability to view/set the current local domain SIDs to net command -112) When creating a group you have to take care of the fact that the - underlying unix might not like the group name -113) Don't uppercase the username and domain in a session setup -114) Merge of "profile acls" code from SAMBA_2_2 -115) Check for existing of security descriptor in PRINTER_INFO_2 structure - in rpc client code -116) Move to common user token debugging, and ensure we always print both the - NT_TOKEN and the unix credentials -117) If adding a user to ldap, make sure we have the 'account' structural class, - or else we can't add to OpenLDAP 2.1 -118) Kill of Get_Pwnam_Modify and smb_getpwnam() -119) add a 'ldap passwd sync' option to smb.conf -120) Whenever we deal with adding machine/trusted domain accounts, always reset - the flag to what we expect -121) Fix the circular dependency that was preventing 'domain master = auto' (the - default) from working -122) move all the passdb internal interface to NTSTATUS -123) to expand % values (ie we go \\%L\%U -> \\server\user, we don't want to - store \\server\user back) and to correctly notice 'not set' compared to 'null - string' etc. -124) get some more of our access control bits right on the SAMR pipe -125) Add -r parameter to smbgroupedit. With -r you can manually choose - a rid - -Changes in alpha19 -1) Virtual registry framework with printing hooks (jerry) -2) Heavy registry updates (jerry) -3) Use 850 as the default DOS character set in smb.conf (tpot) -4) printer fixes ) removed encoding of queueid in job number (jra) -5) A lot of small fixes (jra) -6) Don't crash on setfileinfo on printer fsp(jra) -7) fixed line buffer mode in XFILE(jra) -8) update samba.schema from 2.2 (jerry,idra) -9) Fix problem with oplock breaks and win2k ) - noticed by Lev Iserovich (jra) -10) Update smbgroupedit to document -d ) thanks to metze (abartlet) -11) Support weird behaviour used by win9x pass-through auth (abartlet,tpot) -12) Support for duplicating stderr in log files (abartlet) -13) Move startup time initialisation to server.c (abartlet) -14) *A lot* of fixes and cleanups (abartlet) -15) Fix up compiler warnings (abartlet) -16) Few small fixes (tpot) -17) Renamed new_cli_netlogon_* -> cli_netlogon_* (tpot) -18) Fixed segfault in net time when host is unavailable (tridge) -19) Ensure to be root when opening printer backend tdb (jra) -20) Merges from APPLIANCE_HEAD (tpot,jerry) -21) configure updates (tridge) -22) getgrouplist() updates (tridge) -23) Support for pdbedit to query account policy values (abartlet) -24) Allow one to create trusting domain account using smbpasswd (mimir,abartlet) -25) 'Net rpc trustdom list' (mimir, abartlet) -26) Fix fallback to anonymous connection (mimir, abartlet) -27) Fix for pdb_ldap and OpenLDAP 2.1 -28) Added support in swat to determine whether winbind is running (idra) -29) Add 'hide unwritable' option (idra) -30) Correct pickup of [homes] share after subsequent session setups (abartlet) -31) Update rebind code in pdb_ldap (abartlet) -32) Add some info levels to RPC srvsvc code ) - thanks to Nigel Williams" (abartlet) -33) Small doc fixes (tridge) -34) good security patch from Timothy.Sell@unisys.com (tridge) -35) fix minor nits in nmbd from adtam@cup.hp.com (tridge) -36) make sure async dns nmbd child dies (tridge) -37) interim fix for nmbd not registering DOMAIN#1b (tridge) -38) fix for smbtar filename matching (tridge) -39) Better quote handling in smb.conf (abartlet) -40) Support browsers setting multiple languages in swat (idra) -41) Changed str_list_make to be able to use a different separator string (idra) -42) Samsync support to insert account info into the pdb (tpot) -43) Don't hide unwritable dirs when 'hide unwritable' is enabled ) - suggested by Alexander Oswald (idra) -44) Fix for handling sparse files in smbd (tridge) -45) Merges from 2_2 (jerry) -46) Minor printer fixes (jerry) -47) Add some checks to SID lookup code (abartlet) -48) Cascaded VFS (Alexander Bokovoy, idra) -49) Some netbios-less connections support in ADS mode (tridge) -50) ADS tweaks (tridge) -51) Fix plaintext passwords with win2k (tridge) -52) 'net ads info' reports IP of LDAP server (tridge) -53) Add some more RPC functions (jmcd) -54) Add 'smb ports = ' option (tridge) -55) Various small fixes (tridge) -56) Passdb security checks (abartlet) -57) Large winbind updates (abartlet) -58) Moved rpc client routines from libsmb to rpc_client (tpot) -59) Few nmbd fixes (jmcd) -60) Fix swat to handle new debug level code (idra) -61) Fix name length bug in namequeries (tridge) -62) Don't have client binaries depend on libs they don't use ) - patch from Steve Langasek (abartlet) -63) Printing change notification (merged from HEAD_APPLIANCE) (jerry) -64) fix delete printer driver (from HEAD_APPLIANCE) (jerry) -65) Added pdb_xml and pdb_mysql (jelmer) -66) Update pdb_test (jelmer) -67) Fix security issues with %m (abartlet) -68) Support for service joins from win2k AND use SPNEGO (jmcd) -69) pdbedit -i and -e fix, add -b (idra) -70) textdocs converted to sgml (jelmer, jerry) -71) Merge netbios namecache code from APPLIANCE_HEAD (tpot) -72) Fix segs in new NTLMSSP code (abartlet) -73) Always make guest rid 501 (abartlet) - +Changes in alpha22: +------------------- + Added Parameters + + * client NTLMv2 auth + * client lanman auth + * client signing + * client use spnego + * max reported print jobs + * msdfs proxy + +1) remove the global_myname string and replace with wrapper function + global_myname() +2) create vfs/ and pdb/ subdirectories for library installs +3) Fixup of ordered cleanup of get_dc_list() +4) Added more autoconf tests for Stratus VOS +5) Fixed nasty bug where file writes with start offsets in the + range 0x80000000 -> 0xFFFFFFFF would fail as they were being cast + from IVAL (uint32) to SMB_OFF_T (off_t or off64_t, both *signed* + types). The sign extension would cause the offset to be treated + as negative. +6) Add support to automatically retrieve the dns host name and domain + name of an AD server +7) Add support for PRINTER_INFO_7 and publishing printer attributes + in active directory +8) Fix for 64 bit issues with oplocks and allocation size +9) Remove assert(count ==1) for multi-homed PDCs when resolving + DOMAIN<0x1b> +10) Ensure that change_trust_account_password() always talks to + the PDC +11) Add some docs on CUPS printing +12) Fix rpcclient querygroup command +13) The _abs time functions should not be converting from/to GMT +14) Fix broken incremental tar in smbclient +15) Adding supporting code for better testing using Valgrind +16) Fix for old DOS client when veto files is set to /.*/ +17) Add win32 utility to query driver capabilities to publish + (examples/printing/prtpub.c) +18) Fix memory leak when constructing an driver_level_6 structure and + no dependent files +19) Add some friendly versions of NT_STATUS codes +20) Protect nmbd against malformed reply packets +21) Removal of unpopular winbind client environment variable +22) Add msdfs proxy functionality; a CIFS share can directly be a + stand-in for another share, and when clients connect to the first + share, they will be redirected to the proxied share +23) Make Samba compile cleanly with -Wwrite-strings +24) Add new timegm() that actually works on solaris +25) Add support for running smbd, nmbd, & winbindd under the daemontools + package +26) Move user password changes into the NTSTATUS era, and add support + for the 'min password age' and 'min passwd len' concepts +27) Add new gencache based namecache code +28) Add profiles utility support to Samba 3.0.x +29) Fix open problem with changing attributes on an existing file +30) Efficiency fixes for internal messaging system +31) Make sure to update print queue cache during timeout_processing() + to send notify events +32) Make -i flag work like it did in 2.2 +33) Merge some rpcclient and net functionality from HEAD +34) Add support for compiling with Heimdal kerberos libraries +35) Connect to the actual netbios name in smb.conf and not LOCALHOST +36) Add support for CUPS-PRINTER_CLASS +37) Add ntlm_auth tool and update NTLMSSP support +38) require Autoconf 2.53 and remove configure from CVS +39) Check for too many processes *before* the fork +40) Fix delete on close semantics to match W2K. +41) merge desired_access for open_printer_ex from HEAD, allowing + cupsaddsmb to work again! +42) Add support for dynamic RPC modules +43) wrap all cm_get_XX calls and their subsequent requests in a retry loop + in case we've temporarily lost connection to the DC. Makes winbindd + more reliable +44) Optimize user_ok() and user_in_group() when verifying group membership +45) Add NTLMv2 client code (that works) and some SMB signing fixes +46) Add caching of PRINTER_INFO_2 structures to open printer handles +47) Add 1/3 second delay in OpenPrinter() reply to trigger a LAN/WAN + optimization in Windows 2000 clients +48) Add "WinXP" to the possible values of the %a variable +49) Fix to allow blocking lock notification to be done rapidly (no wait for + smb -> smb lock release). Adds new PENDING_LOCK type to lockdb (does + not interfere with existing locks) +50) Limit the unix domain sockets used by winbindd (also solves FD_SETSIZE + problem in winbindd to boot !). Adds a "last_access" field to winbindd + connections, and will close the oldest idle connection once the number + of open connections goes over WINBINDD_MAX_SIMULTANEOUS_CLIENTS (defined + in local.h as 200 currently) +51) Limit the number of print jobs returned in EnumJobs() diff --git a/docs/Samba-Developers-Guide.pdf b/docs/Samba-Developers-Guide.pdf index ffd8bd128d6..897074783c5 100644 --- a/docs/Samba-Developers-Guide.pdf +++ b/docs/Samba-Developers-Guide.pdf @@ -1,59 +1,59 @@ %PDF-1.3 %âãÏÓ -1 0 obj<>endobj +1 0 obj<>endobj 2 0 obj<>endobj 3 0 obj<>endobj 4 0 obj<>endobj -5 0 obj<>endobj -6 0 obj<>endobj -7 0 obj<>endobj -8 0 obj<>endobj -9 0 obj<>endobj -10 0 obj<>endobj -11 0 obj<>endobj +5 0 obj<>endobj +6 0 obj<>endobj +7 0 obj<>endobj +8 0 obj<>endobj +9 0 obj<>endobj +10 0 obj<>endobj +11 0 obj<>endobj 12 0 obj<>endobj -13 0 obj<>endobj -14 0 obj<>endobj -15 0 obj<>endobj -16 0 obj<>endobj -17 0 obj<>endobj -18 0 obj<>endobj -19 0 obj<>endobj -20 0 obj<>endobj -21 0 obj<>endobj -22 0 obj<>endobj -23 0 obj<>endobj -24 0 obj<>endobj -25 0 obj<>endobj -26 0 obj<>endobj -27 0 obj<>endobj -28 0 obj<>endobj -29 0 obj<>endobj -30 0 obj<>endobj -31 0 obj<>endobj -32 0 obj<>endobj -33 0 obj<>endobj -34 0 obj<>endobj -35 0 obj<>endobj -36 0 obj<>endobj -37 0 obj<>endobj -38 0 obj<>endobj -39 0 obj<>endobj -40 0 obj<>endobj -41 0 obj<>endobj -42 0 obj<>endobj -43 0 obj<>endobj -44 0 obj<>endobj -45 0 obj<>endobj -46 0 obj<>endobj -47 0 obj<>endobj -48 0 obj<>endobj -49 0 obj<>endobj -50 0 obj<>endobj -51 0 obj<>endobj -52 0 obj<>endobj -53 0 obj<>endobj -54 0 obj<>endobj +13 0 obj<>endobj +14 0 obj<>endobj +15 0 obj<>endobj +16 0 obj<>endobj +17 0 obj<>endobj +18 0 obj<>endobj +19 0 obj<>endobj +20 0 obj<>endobj +21 0 obj<>endobj +22 0 obj<>endobj +23 0 obj<>endobj +24 0 obj<>endobj +25 0 obj<>endobj +26 0 obj<>endobj +27 0 obj<>endobj +28 0 obj<>endobj +29 0 obj<>endobj +30 0 obj<>endobj +31 0 obj<>endobj +32 0 obj<>endobj +33 0 obj<>endobj +34 0 obj<>endobj +35 0 obj<>endobj +36 0 obj<>endobj +37 0 obj<>endobj +38 0 obj<>endobj +39 0 obj<>endobj +40 0 obj<>endobj +41 0 obj<>endobj +42 0 obj<>endobj +43 0 obj<>endobj +44 0 obj<>endobj +45 0 obj<>endobj +46 0 obj<>endobj +47 0 obj<>endobj +48 0 obj<>endobj +49 0 obj<>endobj +50 0 obj<>endobj +51 0 obj<>endobj +52 0 obj<>endobj +53 0 obj<>endobj +54 0 obj<>endobj 55 0 obj[13 0 R 14 0 R 15 0 R @@ -96,50 +96,50 @@ 52 0 R 53 0 R 54 0 R]endobj -56 0 obj<>endobj -57 0 obj<>endobj -58 0 obj<>endobj -59 0 obj<>endobj -60 0 obj<>endobj -61 0 obj<>endobj -62 0 obj<>endobj -63 0 obj<>endobj -64 0 obj<>endobj -65 0 obj<>endobj -66 0 obj<>endobj -67 0 obj<>endobj -68 0 obj<>endobj -69 0 obj<>endobj -70 0 obj<>endobj -71 0 obj<>endobj -72 0 obj<>endobj -73 0 obj<>endobj -74 0 obj<>endobj -75 0 obj<>endobj -76 0 obj<>endobj -77 0 obj<>endobj -78 0 obj<>endobj -79 0 obj<>endobj -80 0 obj<>endobj -81 0 obj<>endobj -82 0 obj<>endobj -83 0 obj<>endobj -84 0 obj<>endobj -85 0 obj<>endobj -86 0 obj<>endobj -87 0 obj<>endobj -88 0 obj<>endobj -89 0 obj<>endobj -90 0 obj<>endobj -91 0 obj<>endobj -92 0 obj<>endobj -93 0 obj<>endobj -94 0 obj<>endobj -95 0 obj<>endobj -96 0 obj<>endobj -97 0 obj<>endobj -98 0 obj<>endobj -99 0 obj<>endobj +56 0 obj<>endobj +57 0 obj<>endobj +58 0 obj<>endobj +59 0 obj<>endobj +60 0 obj<>endobj +61 0 obj<>endobj +62 0 obj<>endobj +63 0 obj<>endobj +64 0 obj<>endobj +65 0 obj<>endobj +66 0 obj<>endobj +67 0 obj<>endobj +68 0 obj<>endobj +69 0 obj<>endobj +70 0 obj<>endobj +71 0 obj<>endobj +72 0 obj<>endobj +73 0 obj<>endobj +74 0 obj<>endobj +75 0 obj<>endobj +76 0 obj<>endobj +77 0 obj<>endobj +78 0 obj<>endobj +79 0 obj<>endobj +80 0 obj<>endobj +81 0 obj<>endobj +82 0 obj<>endobj +83 0 obj<>endobj +84 0 obj<>endobj +85 0 obj<>endobj +86 0 obj<>endobj +87 0 obj<>endobj +88 0 obj<>endobj +89 0 obj<>endobj +90 0 obj<>endobj +91 0 obj<>endobj +92 0 obj<>endobj +93 0 obj<>endobj +94 0 obj<>endobj +95 0 obj<>endobj +96 0 obj<>endobj +97 0 obj<>endobj +98 0 obj<>endobj +99 0 obj<>endobj 100 0 obj[56 0 R 57 0 R 58 0 R @@ -184,50 +184,50 @@ 97 0 R 98 0 R 99 0 R]endobj -101 0 obj<>endobj -102 0 obj<>endobj -103 0 obj<>endobj -104 0 obj<>endobj -105 0 obj<>endobj -106 0 obj<>endobj -107 0 obj<>endobj -108 0 obj<>endobj -109 0 obj<>endobj -110 0 obj<>endobj -111 0 obj<>endobj -112 0 obj<>endobj -113 0 obj<>endobj -114 0 obj<>endobj -115 0 obj<>endobj -116 0 obj<>endobj -117 0 obj<>endobj -118 0 obj<>endobj -119 0 obj<>endobj -120 0 obj<>endobj -121 0 obj<>endobj -122 0 obj<>endobj -123 0 obj<>endobj -124 0 obj<>endobj -125 0 obj<>endobj -126 0 obj<>endobj -127 0 obj<>endobj -128 0 obj<>endobj -129 0 obj<>endobj -130 0 obj<>endobj -131 0 obj<>endobj -132 0 obj<>endobj -133 0 obj<>endobj -134 0 obj<>endobj -135 0 obj<>endobj -136 0 obj<>endobj -137 0 obj<>endobj -138 0 obj<>endobj -139 0 obj<>endobj -140 0 obj<>endobj -141 0 obj<>endobj -142 0 obj<>endobj -143 0 obj<>endobj -144 0 obj<>endobj +101 0 obj<>endobj +102 0 obj<>endobj +103 0 obj<>endobj +104 0 obj<>endobj +105 0 obj<>endobj +106 0 obj<>endobj +107 0 obj<>endobj +108 0 obj<>endobj +109 0 obj<>endobj +110 0 obj<>endobj +111 0 obj<>endobj +112 0 obj<>endobj +113 0 obj<>endobj +114 0 obj<>endobj +115 0 obj<>endobj +116 0 obj<>endobj +117 0 obj<>endobj +118 0 obj<>endobj +119 0 obj<>endobj +120 0 obj<>endobj +121 0 obj<>endobj +122 0 obj<>endobj +123 0 obj<>endobj +124 0 obj<>endobj +125 0 obj<>endobj +126 0 obj<>endobj +127 0 obj<>endobj +128 0 obj<>endobj +129 0 obj<>endobj +130 0 obj<>endobj +131 0 obj<>endobj +132 0 obj<>endobj +133 0 obj<>endobj +134 0 obj<>endobj +135 0 obj<>endobj +136 0 obj<>endobj +137 0 obj<>endobj +138 0 obj<>endobj +139 0 obj<>endobj +140 0 obj<>endobj +141 0 obj<>endobj +142 0 obj<>endobj +143 0 obj<>endobj +144 0 obj<>endobj 145 0 obj[101 0 R 102 0 R 103 0 R @@ -272,80 +272,67 @@ 142 0 R 143 0 R 144 0 R]endobj -146 0 obj<>endobj -147 0 obj<>endobj -148 0 obj<>endobj -149 0 obj<>endobj -150 0 obj<>endobj -151 0 obj<>endobj -152 0 obj<>endobj -153 0 obj<>endobj -154 0 obj<>endobj -155 0 obj<>endobj -156 0 obj<>endobj -157 0 obj<>endobj -158 0 obj<>endobj -159 0 obj<>endobj -160 0 obj<>endobj -161 0 obj[146 0 R -147 0 R -148 0 R -149 0 R -150 0 R -151 0 R +146 0 obj<>endobj +147 0 obj<>endobj +148 0 obj[146 0 R +147 0 R]endobj +149 0 obj<>endobj +150 0 obj<>endobj +151 0 obj<>endobj +152 0 obj<>endobj +153 0 obj<>endobj +154 0 obj<>endobj +155 0 obj<>endobj +156 0 obj<>endobj +157 0 obj<>endobj +158 0 obj<>endobj +159 0 obj<>endobj +160 0 obj<>endobj +161 0 obj<>endobj +162 0 obj<>endobj +163 0 obj<>endobj +164 0 obj<>endobj +165 0 obj<>endobj +166 0 obj<>endobj +167 0 obj<>endobj +168 0 obj<>endobj +169 0 obj<>endobj +170 0 obj<>endobj +171 0 obj<>endobj +172 0 obj<>endobj +173 0 obj<>endobj +174 0 obj<>endobj +175 0 obj<>endobj +176 0 obj<>endobj +177 0 obj<>endobj +178 0 obj<>endobj +179 0 obj<>endobj +180 0 obj<>endobj +181 0 obj<>endobj +182 0 obj<>endobj +183 0 obj<>endobj +184 0 obj<>endobj +185 0 obj<>endobj +186 0 obj<>endobj +187 0 obj<>endobj +188 0 obj<>endobj +189 0 obj<>endobj +190 0 obj<>endobj +191 0 obj[150 0 R 152 0 R -153 0 R 154 0 R 155 0 R 156 0 R 157 0 R 158 0 R 159 0 R -160 0 R]endobj -162 0 obj<>endobj -163 0 obj<>endobj -164 0 obj<>endobj -165 0 obj<>endobj -166 0 obj<>endobj -167 0 obj<>endobj -168 0 obj<>endobj -169 0 obj<>endobj -170 0 obj<>endobj -171 0 obj<>endobj -172 0 obj<>endobj -173 0 obj<>endobj -174 0 obj<>endobj -175 0 obj<>endobj -176 0 obj<>endobj -177 0 obj<>endobj -178 0 obj<>endobj -179 0 obj<>endobj -180 0 obj<>endobj -181 0 obj<>endobj -182 0 obj<>endobj -183 0 obj<>endobj -184 0 obj<>endobj -185 0 obj<>endobj -186 0 obj<>endobj -187 0 obj<>endobj -188 0 obj<>endobj -189 0 obj<>endobj -190 0 obj<>endobj -191 0 obj<>endobj -192 0 obj<>endobj -193 0 obj<>endobj -194 0 obj<>endobj -195 0 obj<>endobj -196 0 obj<>endobj -197 0 obj<>endobj -198 0 obj<>endobj -199 0 obj<>endobj -200 0 obj<>endobj -201 0 obj<>endobj -202 0 obj<>endobj -203 0 obj<>endobj -204 0 obj[163 0 R +160 0 R +161 0 R +162 0 R +163 0 R +164 0 R 165 0 R +166 0 R 167 0 R 168 0 R 169 0 R @@ -369,9 +356,59 @@ 187 0 R 188 0 R 189 0 R -190 0 R -191 0 R -192 0 R +190 0 R]endobj +192 0 obj<>endobj +193 0 obj<>endobj +194 0 obj<>endobj +195 0 obj<>endobj +196 0 obj<>endobj +197 0 obj<>endobj +198 0 obj<>endobj +199 0 obj<>endobj +200 0 obj<>endobj +201 0 obj<>endobj +202 0 obj<>endobj +203 0 obj<>endobj +204 0 obj<>endobj +205 0 obj<>endobj +206 0 obj<>endobj +207 0 obj<>endobj +208 0 obj<>endobj +209 0 obj<>endobj +210 0 obj<>endobj +211 0 obj<>endobj +212 0 obj<>endobj +213 0 obj<>endobj +214 0 obj<>endobj +215 0 obj<>endobj +216 0 obj<>endobj +217 0 obj<>endobj +218 0 obj<>endobj +219 0 obj<>endobj +220 0 obj<>endobj +221 0 obj<>endobj +222 0 obj<>endobj +223 0 obj<>endobj +224 0 obj<>endobj +225 0 obj<>endobj +226 0 obj<>endobj +227 0 obj<>endobj +228 0 obj<>endobj +229 0 obj<>endobj +230 0 obj<>endobj +231 0 obj<>endobj +232 0 obj<>endobj +233 0 obj<>endobj +234 0 obj<>endobj +235 0 obj<>endobj +236 0 obj<>endobj +237 0 obj<>endobj +238 0 obj<>endobj +239 0 obj<>endobj +240 0 obj<>endobj +241 0 obj<>endobj +242 0 obj<>endobj +243 0 obj[192 0 R 193 0 R 194 0 R 195 0 R @@ -382,59 +419,9 @@ 200 0 R 201 0 R 202 0 R -203 0 R]endobj -205 0 obj<>endobj -206 0 obj<>endobj -207 0 obj<>endobj -208 0 obj<>endobj -209 0 obj<>endobj -210 0 obj<>endobj -211 0 obj<>endobj -212 0 obj<>endobj -213 0 obj<>endobj -214 0 obj<>endobj -215 0 obj<>endobj -216 0 obj<>endobj -217 0 obj<>endobj -218 0 obj<>endobj -219 0 obj<>endobj -220 0 obj<>endobj -221 0 obj<>endobj -222 0 obj<>endobj -223 0 obj<>endobj -224 0 obj<>endobj -225 0 obj<>endobj -226 0 obj<>endobj -227 0 obj<>endobj -228 0 obj<>endobj -229 0 obj<>endobj -230 0 obj<>endobj -231 0 obj<>endobj -232 0 obj<>endobj -233 0 obj<>endobj -234 0 obj<>endobj -235 0 obj<>endobj -236 0 obj<>endobj -237 0 obj<>endobj -238 0 obj<>endobj -239 0 obj<>endobj -240 0 obj<>endobj -241 0 obj<>endobj -242 0 obj<>endobj -243 0 obj<>endobj -244 0 obj<>endobj -245 0 obj<>endobj -246 0 obj<>endobj -247 0 obj<>endobj -248 0 obj<>endobj -249 0 obj<>endobj -250 0 obj<>endobj -251 0 obj<>endobj -252 0 obj<>endobj -253 0 obj<>endobj -254 0 obj<>endobj -255 0 obj<>endobj -256 0 obj[205 0 R +203 0 R +204 0 R +205 0 R 206 0 R 207 0 R 208 0 R @@ -471,9 +458,47 @@ 239 0 R 240 0 R 241 0 R -242 0 R -243 0 R -244 0 R +242 0 R]endobj +244 0 obj<>endobj +245 0 obj<>endobj +246 0 obj<>endobj +247 0 obj<>endobj +248 0 obj<>endobj +249 0 obj<>endobj +250 0 obj<>endobj +251 0 obj<>endobj +252 0 obj<>endobj +253 0 obj<>endobj +254 0 obj<>endobj +255 0 obj<>endobj +256 0 obj<>endobj +257 0 obj<>endobj +258 0 obj<>endobj +259 0 obj<>endobj +260 0 obj<>endobj +261 0 obj<>endobj +262 0 obj<>endobj +263 0 obj<>endobj +264 0 obj<>endobj +265 0 obj<>endobj +266 0 obj<>endobj +267 0 obj<>endobj +268 0 obj<>endobj +269 0 obj<>endobj +270 0 obj<>endobj +271 0 obj<>endobj +272 0 obj<>endobj +273 0 obj<>endobj +274 0 obj<>endobj +275 0 obj<>endobj +276 0 obj<>endobj +277 0 obj<>endobj +278 0 obj<>endobj +279 0 obj<>endobj +280 0 obj<>endobj +281 0 obj<>endobj +282 0 obj<>endobj +283 0 obj[244 0 R 245 0 R 246 0 R 247 0 R @@ -484,59 +509,9 @@ 252 0 R 253 0 R 254 0 R -255 0 R]endobj -257 0 obj<>endobj -258 0 obj<>endobj -259 0 obj<>endobj -260 0 obj<>endobj -261 0 obj<>endobj -262 0 obj<>endobj -263 0 obj<>endobj -264 0 obj<>endobj -265 0 obj<>endobj -266 0 obj<>endobj -267 0 obj<>endobj -268 0 obj<>endobj -269 0 obj<>endobj -270 0 obj<>endobj -271 0 obj<>endobj -272 0 obj<>endobj -273 0 obj<>endobj -274 0 obj<>endobj -275 0 obj<>endobj -276 0 obj<>endobj -277 0 obj<>endobj -278 0 obj<>endobj -279 0 obj<>endobj -280 0 obj<>endobj -281 0 obj<>endobj -282 0 obj<>endobj -283 0 obj<>endobj -284 0 obj<>endobj -285 0 obj<>endobj -286 0 obj<>endobj -287 0 obj<>endobj -288 0 obj<>endobj -289 0 obj<>endobj -290 0 obj<>endobj -291 0 obj<>endobj -292 0 obj<>endobj -293 0 obj<>endobj -294 0 obj<>endobj -295 0 obj<>endobj -296 0 obj<>endobj -297 0 obj<>endobj -298 0 obj<>endobj -299 0 obj<>endobj -300 0 obj<>endobj -301 0 obj<>endobj -302 0 obj<>endobj -303 0 obj<>endobj -304 0 obj<>endobj -305 0 obj<>endobj -306 0 obj<>endobj -307 0 obj<>endobj -308 0 obj[257 0 R +255 0 R +256 0 R +257 0 R 258 0 R 259 0 R 260 0 R @@ -561,283 +536,263 @@ 279 0 R 280 0 R 281 0 R -282 0 R -283 0 R -284 0 R -285 0 R -286 0 R -287 0 R -288 0 R -289 0 R -290 0 R -291 0 R +282 0 R]endobj +284 0 obj<>endobj +285 0 obj<>endobj +286 0 obj<>endobj +287 0 obj<>endobj +288 0 obj[285 0 R +287 0 R]endobj +289 0 obj<>endobj +290 0 obj<>endobj +291 0 obj<>endobj +292 0 obj<>endobj +293 0 obj<>endobj +294 0 obj<>endobj +295 0 obj<>endobj +296 0 obj<>endobj +297 0 obj<>endobj +298 0 obj<>endobj +299 0 obj<>endobj +300 0 obj<>endobj +301 0 obj[290 0 R 292 0 R -293 0 R 294 0 R -295 0 R 296 0 R -297 0 R 298 0 R -299 0 R -300 0 R -301 0 R -302 0 R -303 0 R -304 0 R -305 0 R -306 0 R -307 0 R]endobj -309 0 obj<>endobj -310 0 obj[309 0 R]endobj -311 0 obj<>endobj -312 0 obj<>endobj -313 0 obj<>endobj -314 0 obj<>endobj -315 0 obj[312 0 R -314 0 R]endobj -316 0 obj<>endobj -317 0 obj<>endobj -318 0 obj<>endobj -319 0 obj<>endobj -320 0 obj<>endobj -321 0 obj<>endobj -322 0 obj<>endobj -323 0 obj<>endobj -324 0 obj<>endobj -325 0 obj<>endobj -326 0 obj<>endobj -327 0 obj<>endobj -328 0 obj[317 0 R -319 0 R -321 0 R -323 0 R -325 0 R -327 0 R]endobj -329 0 obj<>endobj -330 0 obj<>endobj -331 0 obj<>endobj -332 0 obj<>endobj -333 0 obj<>endobj -334 0 obj<>endobj -335 0 obj<>endobj -336 0 obj<>endobj -337 0 obj<>endobj -338 0 obj<>endobj -339 0 obj<>endobj -340 0 obj<>endobj -341 0 obj<>endobj -342 0 obj<>endobj -343 0 obj<>endobj -344 0 obj<>endobj -345 0 obj<>endobj -346 0 obj<>endobj -347 0 obj<>endobj -348 0 obj<>endobj -349 0 obj<>endobj -350 0 obj<>endobj -351 0 obj<>endobj -352 0 obj<>endobj -353 0 obj<>endobj -354 0 obj<>endobj -355 0 obj<>endobj -356 0 obj<>endobj -357 0 obj<>endobj -358 0 obj<>endobj -359 0 obj<>endobj -360 0 obj<>endobj -361 0 obj<>endobj -362 0 obj<>endobj -363 0 obj<>endobj -364 0 obj<>endobj -365 0 obj<>endobj -366 0 obj<>endobj -367 0 obj<>endobj -368 0 obj<>endobj -369 0 obj<>endobj -370 0 obj<>endobj -371 0 obj<>endobj -372 0 obj<>endobj -373 0 obj<>endobj -374 0 obj<>endobj -375 0 obj<>endobj -376 0 obj<>endobj -377 0 obj<>endobj -378 0 obj<>endobj -379 0 obj<>endobj -380 0 obj<>endobj -381 0 obj<>endobj -382 0 obj<>endobj -383 0 obj<>endobj -384 0 obj<>endobj -385 0 obj<>endobj -386 0 obj<>endobj -387 0 obj<>endobj -388 0 obj<>endobj -389 0 obj<>endobj -390 0 obj<>endobj -391 0 obj<>endobj -392 0 obj<>endobj -393 0 obj<>endobj -394 0 obj<>endobj -395 0 obj<>endobj -396 0 obj<>endobj -397 0 obj<>endobj -398 0 obj<>endobj -399 0 obj<>endobj -400 0 obj<>endobj -401 0 obj<>endobj -402 0 obj<>endobj -403 0 obj<>endobj -404 0 obj<>endobj -405 0 obj<>endobj -406 0 obj<>endobj -407 0 obj<>endobj -408 0 obj<>endobj -409 0 obj<>endobj -410 0 obj<>endobj -411 0 obj<>endobj -412 0 obj<>endobj -413 0 obj<>endobj -414 0 obj<>endobj -415 0 obj<>endobj -416 0 obj<>endobj -417 0 obj<>endobj -418 0 obj<>endobj -419 0 obj<>endobj -420 0 obj<>endobj -421 0 obj<>endobj -422 0 obj<>endobj -423 0 obj<>endobj -424 0 obj<>endobj -425 0 obj<>endobj -426 0 obj<>endobj -427 0 obj<>endobj -428 0 obj<>endobj -429 0 obj<>endobj -430 0 obj<>endobj -431 0 obj<>endobj -432 0 obj<>endobj -433 0 obj<>endobj -434 0 obj<>endobj -435 0 obj<>endobj -436 0 obj<>endobj -437 0 obj<>endobj -438 0 obj<>endobj -439 0 obj<>endobj -440 0 obj<>endobj -441 0 obj<>endobj -442 0 obj<>endobj -443 0 obj<>endobj -444 0 obj<>endobj -445 0 obj<>endobj -446 0 obj<>endobj -447 0 obj<>endobj -448 0 obj<>endobj -449 0 obj<>endobj -450 0 obj<>endobj -451 0 obj<>endobj -452 0 obj<>endobj -453 0 obj<>endobj -454 0 obj<>endobj -455 0 obj<>endobj -456 0 obj<>endobj -457 0 obj<>endobj -458 0 obj<>endobj -459 0 obj<>endobj -460 0 obj<>endobj -461 0 obj<>endobj -462 0 obj<>endobj -463 0 obj<>endobj -464 0 obj<>endobj -465 0 obj<>endobj -466 0 obj<>endobj -467 0 obj<>endobj -468 0 obj<>endobj -469 0 obj<>endobj -470 0 obj<>endobj -471 0 obj<>endobj -472 0 obj<>endobj -473 0 obj<>endobj -474 0 obj<>endobj -475 0 obj<>endobj -476 0 obj<>endobj -477 0 obj<>endobj -478 0 obj<>endobj -479 0 obj<>endobj -480 0 obj<>endobj -481 0 obj<>endobj -482 0 obj<>endobj -483 0 obj<>endobj -484 0 obj<>endobj -485 0 obj<>endobj -486 0 obj<>endobj -487 0 obj<>endobj -488 0 obj<>endobj -489 0 obj<>endobj -490 0 obj<>endobj -491 0 obj<>endobj -492 0 obj<>endobj -493 0 obj<>endobj -494 0 obj<>endobj -495 0 obj<>endobj -496 0 obj<>endobj -497 0 obj<>endobj -498 0 obj<>endobj -499 0 obj<>endobj -500 0 obj<>endobj -501 0 obj<>endobj -502 0 obj<>endobj -503 0 obj<>endobj -504 0 obj<>endobj -505 0 obj<>endobj -506 0 obj<>endobj -507 0 obj<>endobj -508 0 obj<>endobj -509 0 obj<>endobj -510 0 obj<>endobj -511 0 obj<>endobj -512 0 obj<>endobj -513 0 obj<>endobj -514 0 obj<>endobj -515 0 obj<>endobj -516 0 obj<>endobj -517 0 obj<>endobj -518 0 obj<>endobj -519 0 obj<>endobj -520 0 obj<>endobj -521 0 obj<>endobj -522 0 obj<>endobj -523 0 obj<>endobj -524 0 obj<>endobj -525 0 obj<>endobj -526 0 obj<>endobj -527 0 obj<>endobj -528 0 obj<>endobj -529 0 obj<>endobj -530 0 obj<>endobj -531 0 obj<>endobj -532 0 obj<>endobj -533 0 obj<>endobj -534 0 obj<>endobj -535 0 obj<>endobj -536 0 obj<>endobj -537 0 obj<>endobj -538 0 obj<>endobj -539 0 obj<>endobj -540 0 obj<>endobj -541 0 obj<>endobj -542 0 obj<>endobj -543 0 obj<>endobj -544 0 obj<>endobj -545 0 obj<>endobj -546 0 obj<>endobj -547 0 obj<>endobj -548 0 obj<>endobj -549 0 obj<>endobj -550 0 obj<>endobj -551 0 obj<>endobj -552 0 obj<>endobj -553 0 obj<>endobj +303 0 obj<>endobj +304 0 obj<>endobj +305 0 obj<>endobj +306 0 obj<>endobj +307 0 obj<>endobj +308 0 obj<>endobj +309 0 obj<>endobj +310 0 obj<>endobj +311 0 obj<>endobj +312 0 obj<>endobj +313 0 obj<>endobj +314 0 obj<>endobj +315 0 obj<>endobj +316 0 obj<>endobj +317 0 obj<>endobj +318 0 obj<>endobj +319 0 obj<>endobj +320 0 obj<>endobj +321 0 obj<>endobj +322 0 obj<>endobj +323 0 obj<>endobj +324 0 obj<>endobj +325 0 obj<>endobj +326 0 obj<>endobj +327 0 obj<>endobj +328 0 obj<>endobj +329 0 obj<>endobj +330 0 obj<>endobj +331 0 obj<>endobj +332 0 obj<>endobj +333 0 obj<>endobj +334 0 obj<>endobj +335 0 obj<>endobj +336 0 obj<>endobj +337 0 obj<>endobj +338 0 obj<>endobj +339 0 obj<>endobj +340 0 obj<>endobj +341 0 obj<>endobj +342 0 obj<>endobj +343 0 obj<>endobj +344 0 obj<>endobj +345 0 obj<>endobj +346 0 obj<>endobj +347 0 obj<>endobj +348 0 obj<>endobj +349 0 obj<>endobj +350 0 obj<>endobj +351 0 obj<>endobj +352 0 obj<>endobj +353 0 obj<>endobj +354 0 obj<>endobj +355 0 obj<>endobj +356 0 obj<>endobj +357 0 obj<>endobj +358 0 obj<>endobj +359 0 obj<>endobj +360 0 obj<>endobj +361 0 obj<>endobj +362 0 obj<>endobj +363 0 obj<>endobj +364 0 obj<>endobj +365 0 obj<>endobj +366 0 obj<>endobj +367 0 obj<>endobj +368 0 obj<>endobj +369 0 obj<>endobj +370 0 obj<>endobj +371 0 obj<>endobj +372 0 obj<>endobj +373 0 obj<>endobj +374 0 obj<>endobj +375 0 obj<>endobj +376 0 obj<>endobj +377 0 obj<>endobj +378 0 obj<>endobj +379 0 obj<>endobj +380 0 obj<>endobj +381 0 obj<>endobj +382 0 obj<>endobj +383 0 obj<>endobj +384 0 obj<>endobj +385 0 obj<>endobj +386 0 obj<>endobj +387 0 obj<>endobj +388 0 obj<>endobj +389 0 obj<>endobj +390 0 obj<>endobj +391 0 obj<>endobj +392 0 obj<>endobj +393 0 obj<>endobj +394 0 obj<>endobj +395 0 obj<>endobj +396 0 obj<>endobj +397 0 obj<>endobj +398 0 obj<>endobj +399 0 obj<>endobj +400 0 obj<>endobj +401 0 obj<>endobj +402 0 obj<>endobj +403 0 obj<>endobj +404 0 obj<>endobj +405 0 obj<>endobj +406 0 obj<>endobj +407 0 obj<>endobj +408 0 obj<>endobj +409 0 obj<>endobj +410 0 obj<>endobj +411 0 obj<>endobj +412 0 obj<>endobj +413 0 obj<>endobj +414 0 obj<>endobj +415 0 obj<>endobj +416 0 obj<>endobj +417 0 obj<>endobj +418 0 obj<>endobj +419 0 obj<>endobj +420 0 obj<>endobj +421 0 obj<>endobj +422 0 obj<>endobj +423 0 obj<>endobj +424 0 obj<>endobj +425 0 obj<>endobj +426 0 obj<>endobj +427 0 obj<>endobj +428 0 obj<>endobj +429 0 obj<>endobj +430 0 obj<>endobj +431 0 obj<>endobj +432 0 obj<>endobj +433 0 obj<>endobj +434 0 obj<>endobj +435 0 obj<>endobj +436 0 obj<>endobj +437 0 obj<>endobj +438 0 obj<>endobj +439 0 obj<>endobj +440 0 obj<>endobj +441 0 obj<>endobj +442 0 obj<>endobj +443 0 obj<>endobj +444 0 obj<>endobj +445 0 obj<>endobj +446 0 obj<>endobj +447 0 obj<>endobj +448 0 obj<>endobj +449 0 obj<>endobj +450 0 obj<>endobj +451 0 obj<>endobj +452 0 obj<>endobj +453 0 obj<>endobj +454 0 obj<>endobj +455 0 obj<>endobj +456 0 obj<>endobj +457 0 obj<>endobj +458 0 obj<>endobj +459 0 obj<>endobj +460 0 obj<>endobj +461 0 obj<>endobj +462 0 obj<>endobj +463 0 obj<>endobj +464 0 obj<>endobj +465 0 obj<>endobj +466 0 obj<>endobj +467 0 obj<>endobj +468 0 obj<>endobj +469 0 obj<>endobj +470 0 obj<>endobj +471 0 obj<>endobj +472 0 obj<>endobj +473 0 obj<>endobj +474 0 obj<>endobj +475 0 obj<>endobj +476 0 obj<>endobj +477 0 obj<>endobj +478 0 obj<>endobj +479 0 obj<>endobj +480 0 obj<>endobj +481 0 obj<>endobj +482 0 obj<>endobj +483 0 obj<>endobj +484 0 obj<>endobj +485 0 obj<>endobj +486 0 obj<>endobj +487 0 obj<>endobj +488 0 obj<>endobj +489 0 obj<>endobj +490 0 obj<>endobj +491 0 obj<>endobj +492 0 obj<>endobj +493 0 obj<>endobj +494 0 obj<>endobj +495 0 obj<>endobj +496 0 obj<>endobj +497 0 obj<>endobj +498 0 obj<>endobj +499 0 obj<>endobj +500 0 obj<>endobj +501 0 obj<>endobj +502 0 obj<>endobj +503 0 obj<>endobj +504 0 obj<>endobj +505 0 obj<>endobj +506 0 obj<>endobj +507 0 obj<>endobj +508 0 obj<>endobj +509 0 obj<>endobj +510 0 obj<>endobj +511 0 obj<>endobj +512 0 obj<>endobj +513 0 obj<>endobj -554 0 obj<>/XObject<<>>>>>>endobj -555 0 obj<>stream +514 0 obj<>/XObject<<>>>>>>endobj +515 0 obj<>stream x+ä2T0BCs#c3…ä\.§.}7K#…4CCK=ccS=3…= D²F°£¯“£‚KjYjN~AjQ±‚{ifJªfH—kW SÙ?endstream endobj -556 0 obj<>/XObject<<>>>>/Annots 55 0 R>>endobj -557 0 obj<>stream -xÕ[moGþî_±S Úììû~ôK’ Ð$=K×O -ÙZÛ:XRN–zÍ¿ïCrfÈ]%HÃyÝHõèYΐəUþsæ’ ÿ¹¤É“¢Nn7gYšá›ø×õ;ú&©Ëo’¢K“ù™›¤+ÓÒpn—WigÈ¢¦A‹*m1hS¥ÎÔ@f9 ò“D²2Y‡™6I™Å PU[=]"Àëà&©2L§œ°¡ÃÊUœƒºJZ ¶j ”a ‹‘²o’<ÏÒÂÈZ V–5+’ƒy-[4ƒ‘ÙïUMÊÀ9Ë€œd ùÝa¥•ÁªNë(È@=çrG.Œ¤Å¶®0‚²2lI&}谞kK’‹œ4oÉÈHRŒT®1À@Ás²ò‘3p“´UšûAHÎ@ÌW6db#°êTj„çbVD’Ë.S§ -ˆ‚#'‰’ClÃβƒmrŒ¯²2iCÑê]^2ÐI=ç2Š;%-&§“ƒ••aën Ã2Ða=燉¤Å4,­eY¶r¼˜¡%Ös-m!å Ä ŽÔR’¤Ì)¢8£9hL¸.@˜A™Bäù"i9’!Î@̗•ä¹HZ ¶¬á{à šc1£¬8©G—‹:Às ¥Ô2r’By'’“B!‘å)‹®Õ¥§ "«DI Ù -1(ç4%-‹Uk¨L‰]FE†—¹` SzN¦ŒœdG‰õRA‹Á¢®Ô†•)±nq× tJÏÉ‘3¦¤4©‚Ӕ\£¬LYµºß :¥çxñ”3ƒæ9 ª‚%œV”HӒ[ðŠ($Aöy$+,h4„3?É@=GK‡)")‚N:d ‚ž£ÔS%E$i˜¼£`óûNÉñ¾ ï;å Dbn°ÆÊH«QÂ|%y¾ºfe:Ÿçd‚Èè A9D^žÄ|EFóE’×7¯¤á(@ˆ6£%OðƒÄHFPH))ƒBý§9Ôs˜Êˆ ©Â*g YÁ.ƒÊ„¹)õ9Ðs-m|å äFª2ڝ1!| uP -ÄÜIÀñ$€&4 ÃO²6,ˆ2#8g ‚žsXR¨IŽ`‡Ø¡tÃSˆ‚£Ü"'ӓqFù2ò*ȐT¥åI¬¥Ôˌ TÐsÔ\`ÆHŠªø’ò¿2PAÏ9´\%¢‡žÔ )È"È@=燢€žTA$ uôœloJ+Ö9éTe ‚žs URI¶çÊ èìr:JÔ¬‹"¸TAT³•ºÈ &F ÑnŠÏTKeãÇøsòŒ« è)ª¤6±ŽBž‘%‹ a+“/Xˆ?G!Ï8äôôQ,„(:‚?G!ϸ–ÎD‘ºXœ½~ œ%‹;ÄÒr•ÔM™,V|ŽÃ×·¯˛Ç>ÙÝ%—»í¡ßž~XüRZ#’šy±YNb¯æç.Îé ä„&§#"¾L®úßûÇÝç~ÏÂPµnõî¸^õ$cŸw­¤Sÿqb$6…Ù¶0”*òÈDçjoâ¢_n،:mÛò…˜ÜèÍÑ5Ëòd†$ÊKv~ótØ/o¼jmÚT/Lù`Äèÿ9é;+XáhËåÃòó¡ß³)hÇ΀.¥¯°˜!ïÖÛõa½ÛÒ׸ h3yty2í\áŸþØ.Þšó£UZåÿþçýî°»Ý=26„Âr»¢¯Ðú”mÆXn8ÊQöQKý—×ýÓîñÔ@ikë0Ƈݪç͂֩(ÿ‡mQ“*¯ßÆHÎQO±Ä1š]ê}S£>Šw>¾YD{ëlÒ ‰6ؑË«ןί.Ïç rî*Šè]»¢EZL·_ŇÜ7´¥Ûòñâ# Â!k›°P&0ó¥G¾m”g‡„œfd -¹p¾µIý†M:_nn–4nð\‚ó|û°>ô·‡ãž7ºÉ3V;ÚcÎeºÁ°0ãÅ|¿=ìw«ãmÜù/+å²93œZÍöÂQolŇããa}xØ÷ËÕz{Ï{L«GⓠCGRør˜èŠâð6ãs‡§XG=«MƒÈ²cûÖ4ôÆ]ÈÍO›Ið8úTþÜFŒç£p8´©üË6m_žM…ÔìĦjlÓöf#ˁÓC,ãWýÓú~ËÙ—/Ãc·M‚Ù.Û@£ÑønnôÑrãâAzfœŸb5xŠù%Mñæâ_ïÈtR{.yúòtè¹_EA‰ôÝá2ÒÉô%®„B‹3Ôx•?öÿ%‰¼H+zµOÇÃç£ô­Öäù—íaù¯=ºg¸­yFã†S‰©3¹É5&ž$T¿¨¸ój«Pî®hù~}õ뼄& }XÞîwÁÆvÊâøt1s½±]¯$TÚSûί®‚‰¨:Mm´ýQQM‘jœ2èžk`ÛWë7lû闟‚mԂ–¡ZÛ²Êïëaàü¿Q4nX -±ÃþÊæ{{ÜrçÜ çÅ I²® m1«›AOMVIRÁû‘Ð1&«›ûCÿÇ!¬ÞfL¹“Ì‚ÛI##Vû`]¼¼#Ò`½Ó2™¯ò͖5ân·ß,¿­ú›ãýovM¦©Ý¢¹­Ò¸x¤æê{‡ŸB¡¾Ü…æwã]¼˜ïïû'êÿyûàþuòӛ+yÛ ó¾ùž>G;µµ·‡5túývù(9׳/!0ÝøJ¯4Lx†4áô"Vº “{%¤º* 'ðà˜óèO?He7õ\Œ7ÈÎã”þµfcë{,t•M¨Áwƒ43a=E6™½‘]§I%¤³j\a9òpÐÄK·5Ÿ -ðÆZ{ä›/‡~·_õûôö^uՔ éøeÖ š²ð´€]þrŽþâæx÷ãçݓt‰ ý, ÷ÔCŸ= -º{ -Rþ´pýü÷Q^šY[°æ×ÿøûòQ܏P“Ô_ïx‡özÍðn”÷þ@÷¿ã¥ÎXåߟ*/½Þ„Qc&WO4+±Ï¡˜¯¿êúùxÇÒÉi2íCàÐ+îQä4'ê“óOÔÇ;ù õ¾?I—í‰úó¹ ³i'9»Ï£hQkn?(pºSÕq¯ª·üî`Šè‰ê—CÝ]ÆÊÓ«. û]ãFµç÷ÌÊ;ŒŸ!ŽÝŽ¶€öñ@õaÈÕ'IôQùQÀ8)¯VóëA°ûæ?`˜j¯Õ³v\¡ùc·_ÂÝ+?ažŒÊ£—»^ -ìÐõßkÐÐOVŸ}‚îÐp¬º”סêÏ«êÓmÕ×oñ³&ù!~ ‡Ë²º¡Ÿñ‡ßb˜Ÿ—$ñç$E†!€;ÃY“uôäšìÍâìŸgDªðäendstream -endobj -558 0 obj<>/XObject<<>>>>/Annots 100 0 R>>endobj -559 0 obj<>stream -xÍ[Ûr9}÷WôÛf¤éfßg.®r'RjŸeY™h#©½ºd&¿I [Îxv«"y¦*ÑÑH€ÝùÏE–¤ø?Kj—äU2__¤ãßÄ?>üJß$UÑâÏu’·ã̃U2¹0p”i3p4åØ9×I–§ãƐyEæ%¾Ä n\z@¸NêzÜÎ@ šµãڐƒÅ8…e [»ÞÀeA -97® Pݐ² H!Å IL[̨ ç²,#}"i1 ې‘å*Û -KêH@\ ÀA¹2QÎ@ ê²i1Ø¢Äò©(Å@YµìvºšÑ@Êq ¹:ƒÂʈù² -  ¤Å´9fVV ¬Ø!%]Ï5 M9iZZ€H²³Ê"Wg ˆÎ -\ÿBWþ%‘“®EŸ5,T°²2)6¹’c©d “zÎOI‹ã¤ÊʤA¶¬Çy¢g¯—Õ´QVT—´ßE%ª’ç²4£‰¤ÅP©Ê°‰ k0ض€ó”¦äæÒ hRq°ç9 ÊÑÖ,ÚT·¦€¨là2ìžðK"-†:%ŦŠR¸UÁ^áø@‚úpWŽÃ=ȵ%”RÎ@̗Ö=Òb°©¢ƒ-XW֎-1l]À›*Ë [À<ò&¯¤’4TjI%þ%ÛIY¸Èkõˆô\–ÈûJʌŽüfd ‚žC–-’"rBGûPI”³d”ê9 Â"’,˜·”¼ €(¸–ÂU9‘C´Åu˨œçjªˆÊ+ FcH‰/FyÎ@õçvå ¤¥q4h”AËF×;g ƒz®Îñå $M)ؕ”AQ¨rqœä tPϵTŸ•3ƒ5 iWå¨Ë±‘@cò® -o#å \'ØêXn„ä ¤•¡ QÒb°X†0?‰Z ¶¡r¨²¤«ƒ5Ĭœ€¨kàX9å \'U]•3ó¥’JZ ¶HÊ²;b+ºC©ÃÞ œìbCR~t•´ -œÌ ˜8÷¿äQY°ÌÙYòK*è¹,ËI0’¢*–,Ƹc ªz®a#g ¼L¥Yå ¤µ©hm¢ ×+ç¤M¨¦ž£$‹%¤Bý؝9*蹬 8PRSS´ô\†¹‘äµÉ)­ì7qmÇÉH9ÉS´U•´,”k-k0؆BÈÈLteÙÎ y‚\É++ Ú¸,£`VÒbrX”•a+S³3:¬ç$´”A$•è0Ê0E¢‚žC¼@È‰Z¢ØdQ“挜ç²Ô!–•´vÀ›X¼(j1ØÜѤÊ mfOÖ`°8º”FVFƒ[0êÎS£°çh×Âۑ´˜&¥.ðƒEvË,k0ŵ±*+*ai,0е÷œ_³HZŒI]C -+k0)L‡6eyRî}üñç8¥gd†Hˆá…2QN!ÍFQ9…àj£"NJ BÄÀãÏQÏÈ̑2&s0M9…4ÕDåÂ9եȱ"($1’ùsTÄ32s¤ Äd¼âÊ)$%ùxOÃӐAˆ)Áá6?ˆñ€hW)†xþLS) -FJôR’K”ãÔ8´Dy9ž ÖQçáùsœÌ32z¤ „"<ºr -Á!¢²Òð4äëéÅO¿ *¥Éô/cŠ[‹ºH¦|—‚¯ç¯¦³ûÕ"é>%WÝf¿ØìwÿœþRØøIhõ!6r$öêêóìq¿ØÒoPê2äáURŽé+ˆœÌÖ÷3þQ9Æ¡Ý{ ¶›ÙÊO,SàÇaÔ5Gƒ¡½“Ñ*ʌwsyK£¹rœ—á»·³ÍìwQ…V·(ŽæF}lÿöòîš5l0B+ߍOú_ÖÐü#ʅõÀ،Íő„Ø{7ÛÎÖ ¬/Ú·ÀœTåádބº„_zÞrG|XìÛ G€õÂ×Ùê°`O¢¯K›søÁ•µâº2è™äÃYðª{½Ëq[‡(Ÿ†›æ~;àâ%-C îiS±±Í^µ3Ÿò³KI»¥¡+m8îþbSWìÖ¸©§ŸƒIiSû@Ý­ïÇónó‰fÀ‰Ê¹°6Ÿ–²tiû_ŸÒèá\.“EˆI‡N¯Æçh‰ÅZõùÍâÏå|¶"9Œ:÷i#¹D -û¶[òÖÄhh8åi±8Â}… e2ë8½ü6Û<¬–›ßÙkh7b–ìؑh¸Û,÷þ×çå~±{œÍÙùhšöÄñì-£ë֡ǎÏÿbÚÍr#‹õh/•Áåæ0Û/;Î_èN‹ÆW‘ëÑ`'ÎC曶Bü-Ý1’Kƒ#ß–Û/´x²ÑøTõcM -£;G¡†^¢_ü°‡›nòm³ŸýÉ{Î+Æx{C¸ý%Ì8Þd—÷ÝaφÀ ¡°?Raߍçü=Ž'ÞJý5t9©Ñ+ ‡Þs…¡¯…\»Ø¿¾~7¡ÁPJå’7e4ÒØpSˆN>¬ÇÇ͒M]U…”ÓmW¼B8ø:ÿm_õŒ\!+«E†keS-êãjævÛ=æ1oœÕµƒõ{F8ŠôŒ8Ú}wÔ ¯œ&Ж¿$Æcoâ$n=ŸàÁLËîU·~\áì²çÅýaN¬'·D&{z}RøsM†÷b@Dæ<Y¬µ»xՄ'>áJ!Ù}Ûík -z\}—™¿iHpœ“Û'Š„ÓïOçï€êöy󽿃ù·S2O4ÔÏoºõLZ¬žû?Ü]ýC’º§³½sù ̛ԊKÄa`¿èNJìaW Œ8>LºÃvîëÁ ¸‘½˜ó=ȯ½Ø3&yáø,}µ]<,åB˜ ½œR퍨M‚Äò0Žn;\\pÆÛM!½'¸úð;©Êéd²ß¢q?l}ߋ‡båyŸÞ@ÜËÄ„ <Ž1µñǤïÖ¯¿\\÷L8Ž²ŸQˆ[¾oaoIhž··Íå¾¢¡Æ¨§þñEÌ v¸?¯ò~£{kÀÑaéíå‚Ë$Z Üïð¤û*ÏUðNkÃU/ -ðf‡ënú5 -NåÂÅÒ-Œr\·¥önùȗkx)¦ÁF=ɒᚩšjqH<Þ:O›Njk£{æ”çíÁ“WÛ¶“9ÇÛè·ÅìÁ?˜{Q¹ºÈ)`Fxèf6Z5ÎÖöFs:[r/‹77Ï{-öDV+j6oÜôòZë#3ü~ÂK_ñiÐë¥ÔX«C¢ñp$¶¬Oþêrþ…~G›¨:É%tßxo7½Ü7Œ@9×[ÞNo&—¤-ŽõxÃ_æýÿi£ÍN“6 -ߕ—ƒT)g~k¡·|O[ï2ºwp×­–s¹ÀZ„àýµ= -¶á)@oûÉÁÿ9ÛÞ[¶‚^ÎϿ®7Ÿ:¶g¨xõÑ·¸É{zoîÏz±ˆ‡!œ!Ÿ±æ¦ë¾ø®/gê “ë7É5?6Ô¾c’‡o°pw%ýÈsNúŽYÔ@ò6âÇj'é­…¥5oƒòûHøþ¿×Œ·#&—o__&o_«î†É¯‡¥¼ ’ã|(R£:méť咜óóôâýŁó)endstream -endobj -560 0 obj<>/XObject<<>>>>/Annots 145 0 R>>endobj -561 0 obj<>stream -xÍ[ÛrÇ}×W웝Â{¿ä%E‘²Ì -EËlçÁU©Jˆ,‚Véïsú2=½ )±ƒ’\%áà`fú6==½ëÿ>˒ÿeI“'EÌ×ÏÒIŠoì¯7/雤.;ü½NŠn’)X%Óg®“*q®“ºq®“,m'¹›Ôc°e:é[Ô$NQMZˆSå“J‰ã f­É¿$Òc°EFÓFÖa°Íxb×Iž6£™=›w“ÒÍ\•$pžOjÜ´[Éä MóIáHÁÂЕçauÛ6£‰eє$ ‹2ˆ‹*§‹é1¦­3rMd&¶#‘ŒåE«®Æ]T€-8Y$’cÚ¢˜4‰c ›X‡ÁvDŠcE¤¶ààekW ¢HÊ©FzŒióчz ¶Ná¸ÈÊ¢0…¨,Ê .ªœ.b¤Ç¶hdEˆ0¶ÎaçÊXÞUUs˜ñF@‹:H&jðGR|VeCE@”V¹ Ž¿$Òc’¶¤iù·Ì: ¶d¯+&*R* â¢ÊeiE¶5ÒcL ­[NJ²†Ý-Z3 i\']Kªç Mʲé1ئ »GÖa°ƊžiáBAÔS98¥D¥ç &Í+ZÒHÁb Ïò’e—Æ|#À– ¯9iIJT‘ôlÙ`—9Öa°ÈîµcÙ)eC -jÆ`N \–ñ¢üK"=Æ´8lŠ$õlE™Ê±›HqfQeÊSŠ¢8Öcäó¦Äޏ¬Ø·&£ëî.Dû*GGLšDRB.:H9-” â@åTo#e`A> d*—á职ËóF –g@y;”ÊÁgœƒØ*©oœƒ°kN§h$EÒ,‹¹¤d%UŽœÛé1¹‹öAdyÚ›ÔL.À¦ œLIiZòsd©°)šŒÍʕŒšÕAX®B [Gìâ. =]°w3”8†è¡õ“ù«R=ˆZqσ²?›ÓãW¯Ø¶m؋çûaCߢŸØ¶¥øóiôñ«ݐX÷u«çÄt»ºú -”«Äq9î´#ljjYL£¿áÏ«ã³óéù³ß~»xAÅ̕ƒÞrû\Õ"5Ñ=¡ïfŸnۏjh\4+\ |0¡pªÛV§'ô;ÎåšG¦Á§'Vý¡]šGïåN¸}rÛ ¿XãläSðÓë”­vV×yejVŅ×ôÍ/Ó_Øþh/UºÙ“?y£Ôó–§Ô¼j%"q°Ž÷Q=¹’š¦Q—AÓéû~+¥îÿVŽ¼ØÜ®9&ë šFO©Ð^H¨~è Œ6z+wbò^íî=Ç^Þc‡³ÍÕÀãj®ʞ,‡†U§¾m¿f?bO¶¯wûmý~Ʌ$ušÌs7ËKqg:)›PëœñÑGG¶–¿¸„Ú)ËßQ™æŠœ¥œ‹5N$ÔíWís<Þ¹OÑï¸útqµÜ,w‡ër¼D€àÿkÅù3ÎVzºì(›ÜÑàõvØ óaEÇ-å«ŸT®SŽA4«öT¸[7ž ëu¸Œ•OZõ=äžÚH#éÛý-4=;åÀñÕa¿áºá“ã›ð;ô9j=®Zü©¾¯3ñ¢jOÉ»ûä×Åjuôûfø°¡1hdåái@/SëÞ§RÀÖQM¨±»§ÉÝýò°&ðє´C+ø åm\íIߐ@†$ï@¦O¶$Ðn¤‘¾é×o{ú¼²2ܪ_o—¸enÞA œ‹Éú!ÛM¿âhÆ{ºfä'øPs-ÿÝ÷Ö¡·|pBMÍpõ?~{³Ûj»‡Íא¼½¡D£#l˜ÐBã2háÝ-ò4܇Ù-Wý\:pX˜8‰‹4lÅ_úír¸e¢ÿ¯Ïûùïäptv‹*DÂbs)™ @˜øgž!ÍÞ3Ø@‚‘ XÌÒ,.?·¬<Þn°öÁìô¹ôÑè‚bۛý)?íÐƒÞ UmÑ¥B‹êì”÷^û;÷'«%ND¶†S19éçïu÷⬏×=e‡”v^Ð3´^•§ÛuO%M_!mwÙ«–›RŽ†²?8álm4[üºÜ\$ÙøþÏÅì»üŸ$:i±Ä|H±(ÿ× í‹a·¼ -7æ¶9è©$»Œ£Nº6cK"ûlÆþõìbÊæ“ÔKãlÿ…nÉ y>aîʁ䴗­MôÃÌ]ß÷ËÕš„xäÓ6=27Õâ³xôQŽ•Üî;{/)<3þ|=Öº•éÍ+ëq‡†n+¶g§ov ¾Fã0·9©Èÿû³†ËDïc47bÇã .=BɔLóÛír'ûÏ')y 2:±Ðô¦Ø†­¢²ßlèK4ôÒ*t¶`•oøKŽí胋ŽîÔ#xshOûÒy¿6¬—A„û2oR•ûº­R` Md­‚ûN°7(Z¤ÀÀ#5{ÜôÈ!€aÍÍ°1ð*¶áá Œ‚»c£ìëçýÇÅVlÂÅêá%{ؑ÷2ª=ÑßWD¶.½íÊÂãëë=…ŠåÁSØú^¹Ã—*?ޕÕ9”Êæóò‡(ñaÆE4^ÑøB§¥(ԴߏƍH¼µXênûœ6¯†Ë[݄¸}ºÐ ãÐÚ+÷îóŠÓÃײÁë_è_õN“ŽŽ8TXœ G¾¹^̗½ôÝÀ[F½þNN=ü¿é×ÿ¾ÆsÏË·D¡B.ŠƒV¦Á€ª½}´·Âó¯IÙËÍðëé&ª -­¿?âN3>œ^-փ<'£mÝÑoúw ê/²Ùñ.dèy=á¿Áy6 -/éÌ[5Ã;á–Ç©¯ìHiøY¹»óà¨GUÆRN¸Êø¼ß¼ê7¼U0…u=´žÈñä¡ 7Æ{Þ²½E€ µ=¥x±™Ó£x†æ ®nö»VhߌÒa±_"ã@Ú"‹ÏMÂ/~ƚaD™#\šc‰—ZÆ[í‡A*t_È^ZîáEn{´äM‡WêžKðÖÇïÿ ‡£uóD Ðt»ó!xï;òËX¸]•%þ7M~ïbáØz~œœ.þX¬†kyÉË[}(VàÔŽb¾I;zkk¹\’R/fÏ~zö?1yendstream -endobj -562 0 obj<>/XObject<<>>>>/Annots 161 0 R>>endobj -563 0 obj<>stream -xÅXMsÛ6½ëWàèD$A€—Î8NâKœº±¦=Ó-+•HW¦é¿ïÛ¬”ºãK¢dÆÉÃÓxû ùï™V9þje UÖj¹›åYŽ•øãË­¨ºjðs§Ê&ÓlÕíLÀ2&«'àN5MV -NÀÒºÉœ %[ÚCV`°Î²ïTQé̊Ëš¤”d‚ëºHŠ€;å*’É$N@!#Hºà„Áš*kË⬊Îcœ8ï­È ç9R9Vaš:+&D§uÃDzCWr$Y¯a ×XÜ7qzù’„Þ\™šBÈ~+~› q-H‰Éo‡¬ßÖÔH©i[iÛÀiMî7‘”˜¶µØ!±ÞUÉñð.`\¸Æ¬È H.8$ý]˜‚\f鮁ӕ¡€DRblëXIb‹,pÒV`d:÷¶”v&/9(\¤Ѝ 5›8N»ÉÎé¸ +I\@j“¡Ä`m‰rO,{½jr&{݃èõ‰sv‰óv–²1ÔkÅ Ùá©UâÄe¸ $’\SڙÑ5ǾHœ€œ87a×Tt|Ø…i' Ý¥FwH†^ w´I ƒ$0pՏ#"é :w2d ‡N[¨*rï³ó*rµ¸Gq ©£uÙJ-VÜó±¼<[´wÛN ÷êrèÇ®Ÿ~Y|…•A“Õ<˜Í 2;»|hÇnOŸ¡ÌÂ~Ødu† ÉhM“7üʧ¶¿n{ZDYÙ¼ Ëm¿¢µ"Ï*W„µÏ ¶E‡.š°tÓ>=}öüÙÊf¥ÉE}è—ûÇÍÀ[Ÿ¬â=1³lƒû–p>‰ýŠé˜_Ÿ¹`¦ƒžvwtŸdÐ)âI÷›-š0.ùôìlMw>zŽQó¢F¡ü_Hªã\«çmÇ®òÌ5!T'õßGZç¥Æ˜Ö9Ò)Ecš%ň^¬^Ú~l×^f -ür²@kòjæÖG+¦%ࡈOC»Úôk’Ž’ªôT)»-4ãìÉ¥ENÄ“œь˜ŠÿvlÇ͒‹ ï¹Ü…â•’ µ:aYeA ^;‡)†$ú^ÎC»ï¸C”è.Mˆ„:’cBäŽá'à F‡¡9j€î7ã”i˜L±Ó è ± ÿ„{¿v„m(wæG™V¾šiç·1Bµ5ôÔm»å4,ð2pfÊÐMO'h•1;—C¿Y?ï»Ì“xèa”þ˜ªóEW/0{ÞÔÕ g§´_n.¹ÐLVFu7Ûçõš;1ŒEœ¿×©« Ö'ê*.§{Éá]V™•uh¾kõwÃóHV¢Í¼–=§X÷’æ~¥‘eŽ»ýU×wûvËJÐzê){éö/›î _*ËSO²)Fé!Hùò†gG}œ Ÿ‡ÑèP=͂q ©(À&N¼Çvù†ùÞ¿P0 êT}oL§éŠ2Mu.F_}œ£àêx˜†‹²;u ¥N/fnõÁ¼Ã¯8\ñI%ûƒŽ]ntÊÿOqáÕoé/8øM¿…o/®ß]¨÷ÝK· uõ¼Yq,óýßlÞЫyóB±ý°˜ý>û©ô]endstream -endobj -564 0 obj<>/XObject<<>>>>>>endobj -565 0 obj<>stream +516 0 obj<>/XObject<<>>>>/Annots 55 0 R>>endobj +517 0 obj<>stream +xÕ[moGþî_±S Rvö}?ú%Éh’ž¥ë§…l­m,)'¯zÍ¿ïCrfÈ]%HÃyÝHõèYΐəUþsæ’ÿ¹¤Î’¼Jn·gé<Å7ñ¯ëwôMR-þÞ&y;¯=xLgn“¶˜†3p›¸¬œ·†Ì+4/ç ­Ë¹ó€5‚iF‚ü$‘¬LÚb¦mR¤D1TÙäAO—ðz¸MÊÓ)g lh1¤rBç ®’ƒ-k(eXƒÁb¤¬ÁÛ$ËÒynd- KËŒIóÁ¼ƒÍëÁÈì÷²"eàˆŒÆe@N2üî°ÒJŠ`YÍ«(È@=ç2G.Œ¤Å¶*1‚²2lA&}谞k +’‹œ4kÈÈHRŒ”®6À@Ás²ò‘3p›4% 9À,ŽéŠšLŒ¤uP§2P#<ç«°"’,X´©:U@ 91K”´öc¶–5la|••IkŠVïò‚Nê9—RÜ)i19¬¬ [Ð3 Ë@‡õœ&’‡µ,"+֎“#´` Ãz®¡-¤œԑZJR€Eg4ç ×3(Sȃ<ŸB$-^„81_Zç"i1Ø¢‚ï k0XhŽÅŒ²â¤].êÏՔR‹ÈH +µäHZL +q„D–§ÌÛF—R@œ2pˆ¬%d(Ä œÓ”´,V­1¢2%v^朁Né9™2r’ÖK-‹ºRV¦ÄºÅ]›3Ð)='sDÎ@š’Ò¤ +ZLSæp²2eÙè~Ï蔞ãÅSÎ@ še4¨ +pZ^” uCneÀ+¢Ùç‘,Y0§ÑÎü$ô-¦ˆ¤:éD +zŽRO™ä‘¤a²–‚Íï;$Çû.p¼ï”3‰¹Æ+g ­Fó•äùªŠ ” è|ž“ "g /YäyY"óå)ÍI^߬”„£XMh ڌ†<Ág A!¥¤ +õcœf tPÏq`*g &¤ +«œd»4*f¦Ôg tBÏ5´ñ•3©ÒphwĄð,ÔA)3'MǓšÐ@t4 ?ÉÚ° ÊTŒàŒ +zÎaI¡j$9‚b‡Ò O! +ŽvpƒœLOÆåË ÈO¨ CR•f”'U°’R/32PAÏQs#)ªâKÊÿ"È@=çÐrˆzRgÌ¥ ‹ ôœC¶ˆzR‘,Ô9 TÐs²½)­X礤P• +zÎÕTI]$ÙFœ(/ ³Ëè(Q±.ŠàRQÍFê"3ü™E$D»)RÝ~SrßЖ|lËNj€‡´©ÃB™ÀÌæ(=òýh£<;¬$ä4Û ÓPȅ„ó­Mê0lÒÅj{³¢¡pƒçŠœç‡Û‡MßÝöÇo(t;“g¬z´ÇœKuƒaaƋù~×öëãmÜù/+å²93œZÍöÂQolŇãc¿éÝj½ÙÝóÓê‘ø$èБä¾&º¢8ü„ÍøÜá)ÖQÏjÓ ²ìؾ¥5 ½qróÓöF<Ž‡>•?·ãùÄ(\m*þ²M»—gSC!5;±©Û´»ÙÊràôËøU÷´¹ßqöÀ¥AëËðØm“`¶Ë6Ðh4¾›}t†Ü¸|žç§X žb¾DISG¼¹ø×;òžKž¾<õ÷«((qƒ>«;ZRÊ4&®€BCÔx™?vÿ%‰,Ÿ—.4kŸŽýç£4®Öæŗ]¿úƒí Î3Ü×<«uÃÉØ֙ÜåORª_VÜz5e(xW´€¿¾úõ^D“†>¬nû`d3e q)©1sݱ]ï¤TÛSûί®‚‰¨;uRm´R^N‘lŸ°hõж¯¤ÖoØöÓ/?Û¨ -B5´¶¥¥ßÙøù£hÜ°b‹ý•Ý÷ö¸ã†Ï)¸Îò’fœ «zÐU“U’Uð†$ôŒÉúæ¾ïþèà +á}Ɣ;É,ø·´12âa}6ÐÕË 1b¬ ·Z&óá)G˜5ânØ®úßÖÝÍñþ7»&ÓToÑÜÖi\=R{õ½cŒÏ ¡T_îC{ŒÛñ6^,Ž÷÷ݝxûàvòó›Ë%ãm8F¿g§ÏÁNmîíq Gî°[=JŽÀíKL7¾ÁK ž!M8½JÀ‘•®Èäf ©®LÃü8è<úó’GÑN}ãÆͲó8¥­ÙØù& }ejðÝ ÍãTXMQ‡MfÄGodÛjR )ŬWXŽ<\!ÔñÚm³£8Ç;kí’o¾ôÝþ°îóâð²¨-§\HÇw(³vÐt…§ìò—sô7Ç»?K¬é‡Y¸©úì¹PÐ}ØSò§…ë翏ò§k1pý¿¯Åýx5IýõŽwh¯Ù oGOŠíâïãx©3¶Sxª¼ôzF=Ê7WO4+±Ï¡˜¯¾êúÅxÇÒÉi2íCàÐKîQäÔ'ê“óOÔÇ[ù õ¾?I—͉ú‹Aä›M;ÉÙ%xE‹ZËpýAÓžª>ˆ{U½á·SDOT¿êîRVž^vù°HØï7ª=׸gVÞùK`üqìv´´ªCÞ¨>I¢ÊÆIyµš_‚Ý7ø ÃT{5¨ž6ã +…È»ýzî^ù ódT½äØõR`‡®ø^ƒ†~´úì t‡†cÕ¥¼Ux^UŸn«¾~‹6ÉO1ð9\–U5ý?üÃüÀ$‰?(ÉSüÜÎê´¥'7`o–gÿ<ûá¿ñ'endstream +endobj +518 0 obj<>/XObject<<>>>>/Annots 100 0 R>>endobj +519 0 obj<>stream +xÍ[MsG½ëWÌm½ÑÓ=ßGYŽUɶlʵgš¢c®EŽ–Nüï÷èn`†Êjw«L*©Jøøˆn Ð=£¹,Ç¿.k|VÔÙ|u–Or|“þóñWú&«Ëÿ]eE7qÜgÓ3WY•8WY[M +#èӘ®È'­!‹š&,*|‰Aý¤ +€&4p•5ͤ3œ«Ì¹nÒÒb°§´¬Á`?¸*I!ï'5jZR–)d a †M¤æ¾Œ‚ T0pÎ9L¤Å4lK +$–¨êj¬aX i"åªL91¨wÒb°e…åSQŠªîØ%ìt4£!”ãˆrƒÂʈù\PÒbZ€3++ PÕ쉊.@àږ¦Lœ´-@"ÙYUY¨³$gEÎÁ¿Ð•I¤Å¤k9d  ¬¬LŠ°!Wr,U tÒÀ…IiqšTY™4ÊV vŸì ^eÞ5´IVT—´ßE%ªRà\î(Fi1Tª6‘a ەpž²âќÜCšM*2"A9ښe—ë֐”œÃ$Òb¨SQlª(…{Y—ìŽo$h`wå8Ü£\WA)å Ä|y3 -ëÈHµlɺ²vl‰Á`›ÞTY^Øæ‘7y%¤¤RG*ñ/ÙNÊÂeѨG¨`à\^"ï+)3zòoœ‘ +Y¶ÌÊÄm<íC%ePΒqP:hà$ËD²`ÑQ‚’`ä: +WåDі֭` rk¨"*g ¬€­!eP$¾å4pœÛ•3–ÆÓ IP­Z]¸¦ÀO”34¥`WRE ÊÅqR0ÐA×Q}VÎ@ Z64h¤]U .§FBÉ»*r¼”3p•a«c¹y’3V†‚FI‹Ábâü$j1ؖʡʒ®ÖP³r’®‘cå”3p•Õ-tUÎ@̗SH*i1Ø2G4*Ëîðˆ­ä¤{'r²‹ IùÑ×Ò*p2@‚bFà"ü’GeÁª`gÉ/¨`àœ+H0‘¢*–,Ÿg ª®eg ¼L¥Yå ¤µ©im’ ×+ï¥M¨¦£$‹%O¤Býԝy*8WR()‚¹)ڞ +Îa.D@"ym\+¥•ý& ­Mä8)g yŠ¶ª’ƒ…re ÛRYƒ© ‚®,Ûé'ȕ¼²’‘sŽ‚YI‹Éa%FPV†­MÍv tØÀIh))‚H*Éa”aÊL‡x:‰9´D©É¢&͹À¹Ü#–•´vÀ›X¼$j1ØÂÓ¤Ê mæ@Ö`°8ºTFVFƒžZ0êÎs£pàh×Âۉ´˜&¥.ðƒEvs–5˜bÚX••°ƒ4èÚ.¬Y"-Ƥ¾%…•5˜¦C›²<)wŠ!þøsš202C¢ ĈðB•)§f£‚¨œBp-µQ‰cEP!Ràñç¤H`dæDH“y˜¦œBšŒj¢r +ᇂêRâX’Éü9)™9Qb2^qå’’|¼§áiHž¬’ëA'©„Š ÄÎL”àpŠG›Åx@´«C<¦©Å%)É%Êqj‰Z¢"KO먂óðü9M=QB]9…àQYixòÕíÙË7¨Jyvû…—1Ç­ESf·w|—‚¯ç/ngŸïYÿ%»ì×»Åz·ýûí?!…ïHêœVbçžÄ^\~=ìú JAî^dՄ¾‚ˆÀélõyÆ?ª&8´‡o¯0Áf=»S`#˸Åñ˜uÍÓ`hïd´1&ã]_¼£Ñ<îkªøÝÛÙzö»¨B«[–s£>v>|{qsŶ¡“ï&GýÇ54ÿ9åÂfd¬csqä!öÞÌ6³Õ«ÅK…ö-2GUyOæýú ̀•÷qm¾,eèÒ ¿>¦Ñã¹|.‹’^ÏÑ‹µêóëşËùìžäP0š"¤ì)ìÇvÉ[w U\ ñ”ÇÅbà9î+l(“Y‡éå·Ùúî~¹þ½†v#eɞ‰†»sEðð?¾.w‹íÃlÎÎGƒÐvGŽç`]·Ž=v˜xþÓ®—k‰h\¬'{© .×ûÙnÙsþBwZ¶¡Šü\F;qλ°àØ´â¿Ò#ù<:òÃ~¹ù&A‹'mHU?פ8ºwjè%†Å[p¼é¦?ֻٟ¼ç‚âqŒgñÿ`·¿©’‡›ìâs¿ß±!ðB,ìTØ·“9cő·Òp ½'5…¡åÐ{ª04ⵘëß-v¯®ÞOi0ԀÊÇD¹ä DÙÍ£46Ü¢“ëñi½dgSgW×1åô›û;^!|}øv¨úOF¾•IÕÂáZÙT‹æ°Z ¹ÝôwûyÊ'uíh}ĞsEFì¾O[jÐW Nh˟“ “I°q’¶!3țØyà²/…Ôû?Öh¦¿.8Hñ°ô¸ùoäƒM¸¶·µ 5glÖÍl»ý£ß܉k8ž´«46ðG_ÒҞ×Ã"]36亟 ½uO²çÇ£CpÎ4QZam_/Ö?È`¤Êª‰‰ë-N ìÔ<òz>¦ùŠƒ§pÃ( ‰\ͺÝÌîúžø8%ÔmÌñŸ®^³eHÔy}’ôaH«öN;¹›~՘n$ÓÑe½_}l\e”±<œæèßDo56»£6ý®Ÿ÷|>Áƒ™<•ÝË~õp³ËŽ÷‡e<±Ý™PìôHáO5Á‹1™óxd±ÖnÓUžøÄ+…lûc»[¬(èqõ]¹pӐá8'·O Çߟ>Ü5ÝÓæGóßݒ1x¢¡~~ݯfÒb Üÿñæòo’„Ð=üèíÃåƒvRx0oR+.ǁý¼;)¶ç»jdÄá`Úï7óPžÁ ˆìłïAÎñڋ=c’Ïҗ›ÅÝR.„éÒó)ÕÁˆÆ$H\!ãè]‹ ®Ñx»)¦÷ Wa'ÕE<•Lw4îûMè{ñP¬:íá3ˆ{™Ôƒ‡1¦6žâ˜ô—õ$è/×£ìâņï[Ø[š§ím ¹¯h©1¨x3ŠîãO«|ØèÁ„ÖppXz;E¹à2‰¨;<ë¿Ës¼Óã»xՋ¼Þ⺛~‚Sûx±ôF9®ÛR{³|àË5¼Ób£eIÊxÍ4Ê%ôÐø`7½Ü7Ž@9×[¾»½ž^¶8Öã5Žp™÷ÿ§Î'm”¡+¯F©RÎüÖÂ`ù6¶Þ?,Ödôà"ি_Îå~k€×ö((چ§ƒí'ÿ§lû°_lØ +z ;=ÿºZéÙbœ¡ÒÕÇÐâêèÝHåzÎ[å ù”­± ‘Ç\ø‹‰\#xÃ¤T8<¶N/ Èù‹‹^Mú¹E.Zˆ·²Æ{QΊOYøh¤NóÍB.GN©r°rãHu9§XŠÀ؞<¶ /ïû­<ÌÃòħÐGÙbORŠ9¸?Ä"†p†|šë¾ÿ¶ç»j¼œ©/L¯^O%×üÜP{ܤJŽŽã7X¸»’~ä)'ý…YÔ@ò6âÇjGé­…b×Ë7x”ßG”ø .~¯oGL/Þ¾ºÈ^/¾/îû\f¿î—ò2H?ø(Q¤Î›¼£—–KrÎ/·gÎþ 1î)endstream +endobj +520 0 obj<>/XObject<<>>>>/Annots 145 0 R>>endobj +521 0 obj<>stream +xÍ[ÛrI}÷WôÓÂ>Xôý²/ÆƱÆ0Hó@ÄF#·±Ií‘å!øû=™Y••-Ùà˜E¶™ÐéÓuÉKeeeõü¹—D1þK¢*²2š.öâQŒ'ú×»Wô$*ó/¢¬%Ì£ñž‹¨ˆœ‹¨¬œ‹(‰ëQj:µlÃf%M'+F5¦S¤£ÂšŽh˜4&¿I¤Å`³„º ¬Á`«aÇ/¢4®=[ 6mF¹é¹ÈiÂi:*1áªÆ¼М Ä q:Ê i1Xè²r?,ŽÁ`ëjб ÓLü   Žsƒ(i1º-2M` &¶¡))˃M‰&nP:¨çd@ZŒn³lTE†5,t6` Û˜Rh+Sª3v^ÖvÁ LÉqn +JZŒnÓÞšZ ¶Œa¸ÀÊ P¹¨ Ê ê87ˆ’렁•Iø¶e +=Êòº(Š’ÝŒ‚Ô@RQ…w IþYäYpa¶ŽK`hÿ&‘Ólsê–ßeÖ`°9[MYQQWau\¤[%-F·º6¬(!©ØÜ"5êÖÀEÔÔ$ŠrR§ÏՔ/Î@²†µÉ"B2‰ÈÄ ˆè8‘I9±+”HŠSå ¤ñªi1XWLU›Z ¶Ih®ÊŠR—e’ÿ¤ ‚ÇÙDà D§8ða¶ÚÐbš.O(°ƒE"iµ,/LÏ2]„N=¸%ƒ0]ÇQ.["VћDZŒnq“Ö`°Øï1%eeÐXr[()ƒ0¨ãÑ«r¢Sœ^áyJZ 1lÀ ®a;¶,6+<ôl0؆ÎJ†5«jÒ¶,*=)¥aQ¨¨žÃš«ø³zyC§Lš|¾¦TJµ3ÓÁ¾ÔRâ¼E›¤¼É 4t\’ÐÆL'³R j0i(¥ù(+Ý"‹%?‘n„nçºUÒbé6q¨j*êÉ$Uõ0 Î@²„¬ô¢ÒCtŠì’()sEâE:—¹2su\cåhNoi1Íuƒ5˜ MÇ®ÐVEÝ#ŒAÔq²z%Y í¸ÎAø75c8;Z)M“ÎJqwµä—ÜÿÖ#e(¾bEhùŠSDµÄ3M• éå>Ê„¹AÁ8}R×ԝà8 \€àj²hà„âóž©ˋGº]óo•×1RÚRŠa“QóomäN™” óÃî‹@°\’ÌEå‡(”îùdïÙKŠ4ÑäœÝ-F±¨Ê£É×ñxútÒ~šwQöËu·\_ýsò_´*0µÚ'/E³ý”š==¼h/×݊Þ!ہ@'gO£fDÐDàé„!Â}Ú¸GGý¢-é1Êfáñ»·‡OܐX)2$J8`h:ç£w,鞶7À‹ÉɛWoN©?”aÊ4sÄêrÊCc7n*÷l²j—Wítí/Ÿ¶‹îŒžbiIí^;»ìè!–mž¹évõ§Hh¨ýG\(ÙJœ°ÌØz+/ôÉø€ç• +Uë»îÏëîŠEC NšÔ CÍçÝò3K‚T·ªv-Ɇ†ŠTÃFnH–ÞI²ƒëõüq6m×,‚MS:é¸oU:‡Û{×Ð˖äC“ewlÜ­þrKæEzÛ^]}íWìŽXÅMâ=zܱu¤8sÑ]Ë'ý™³ rÅ Êzü‘oŽ^³¿bÙÖ~-žôŸû%=Å¡©®s±çýÈcGñ²!°nÊVÜ͈·Èv~þ„ËÅp)ªøÉhI£ñçõÁñÉøäÍäãÇÓôW¬Iî|Ðjng¿‹BfMtcÒۑð·ënõÍ)G#Î{ޘ8•.«£Czc¹‹£;“àû;ù¡M˜GíeËݾ»lP_,±7ò.øýñvÊ%«i¬0%‹bÜküîýø=ëå¥Â-öèonÇHõp×rŸ’•x$ÝF \²m»ä© ÓÈË2/éø¢]I*ó¿¦#/–× öI”œ’{hÃ%œ|¨ lH·í“7Jwã>öê=/Ï{–¨©ËP6æ²kXÔΖƒåWmzìáêÛåºÿ¼j//fœHR¥I-w5;sÆ£¼ò¹nÏuô°e»ô‡PÝÅCú;HÓL’3“}±ÄŽ„¼âç.p'}Šë©q‹¾~ŽºóÙr¶Æt8/ÇGpþŸ;¿cl'BE·Ë&€âždK‚·«~ÝOû9Y§”G1}¹hØQ¬Úa;o<ì Ëï5ë»Í6nòTF̾Þ\Bãã#v›¶KÎká~!8¾óï¡ÎQºíú¶Áïë¹·¼jCÈíuò¡›Ï÷¿,û¯K²* +Y©?@ªPËtyï}  ã”±Ä;z7$Ù^/·K©”‚(nJ> ۂ"$YsúnIåFšºMGÚŧ–žáÊ+Éý©úíj†Sæò3TÀñ¾£²Z¶söf|7¡®«J¾‡eFózöR‹#ô’uNˆé|Óý>]­W®ÜÍæ1o«(‘h Æ8&¤p~饰fiìÏÃl–óv*• ,ó̚“ ìÄYì—âûv5ë¯Ù‚¨ÿ…cÁóvú…‹ÊnVxOè–gü& T¼Ë=Ï)‹a3ƒÜF0ÐO37‹ÃÏ5 ¯´|09z.u4: x߶j¿Ïß^:Ô 7\Õ¼€¨R¡Du|Äk¯ +õЃ!ç3쇬 #`tØN/ÜÚÅNÒ­’2v(WwAÅP+e”œ®-%<Ô=}•ñS¥œkSÜI Þ¼.>̖gýW 6¶þs:y–þ›f†JZH1o“F4ʯãx¡®}Ú¯gçþÄ\W;ݕD`±S”Ã)iøaĖ@öÈýáøț£X KÃhÿ@§ä’6`gæÈŸÞˆÖ* êaj®—ílÞû"!®|šÝF£;Æ/Z¸€EïdX‰íÆ°“ 9HáfL-øûå´_¸ÅL_^iÛDpZÑU;þvµîøÍ\û¸£ ÿïk%'òÖÆ(nè¡ŸÛlØxÜM¯W³µ¬?¦äBdèPô&߆®‚°O–ÝWzˆ‚^\øÊ´ò„bs¬ .JØßÊGðå'^>aŒÆk¤ÿí¼_²`°¬&RÑùª—Rö7­šü~zü‡¬ÂÚÙå6|»#T.†‡Û¨/©†Âý +Ùæ$(i©àÆ’I0p¥¦×MwôïXZÜô Ÿ"ÜË!×+»C¥llë'í·n%:ádõaLx»qGNºÑßD–.}íìÓƒËË9ÝBù×oä”*‘›?¾•·‡qÄþiçï½Ä^à “h|¢ñ@»¥HTÉ%è°ÉÒÈjû‘4¯û³k·q:z²ÐC×ÚH÷n²Š‘Ãf³jö‡ùá¬SŃ-Ö¶§]vÓY+u7ðÑE®QP\þ_µ‹ÿ\âÞóìQøä"Ëvš™zý9‰è룍õãïc¬ÇÑ,[9>žj¢¡¶çGœj†›ÓënÑË=-‹`ŽvÙ~ÈjÇ·¾æátÿz[¤ÉÀ½¤2¯9Äß8øs_Ù>²-¥â/̙@Ý)3–g2ã“vùº]òRAZõpùDŠ›‡ÚŸoøÊfðÔzKñb9¥«°‡yf'¦®2À$È(ß Âa¶™"cCZ!ŠOu†¾ÇªbD˜}šCŠZ†Kí×^2t›Èžõ.ÝÇÜz4ãE‡Oêüš‹ðÕǗ_H_(ÝÜSTÙ¶~xËá{Gþ §«<Çÿ¦É€ã[,l[Ï¢£î¯nÞ_"ɋ^]»K± ߤ6äóUÜÐW[³ÙŒ„z1Ùûmï¿Èendstream +endobj +522 0 obj<>/XObject<<>>>>/Annots 148 0 R>>endobj +523 0 obj<>stream +xÅSËr‚@¼ós4Ç}²ìQz‰©$ò¨Xš0bLåï3³"µ~A  +ª»çÙ,_‰A·§@§°©‚˜þñ±`RãéYö(;p„UÁ +¬Å4Ò"X÷¨#-‚Hé1‹Ä“ªÝ£aR3û¨F¸e$º¨²NyÍ)4nÖ^%‚8‡¾ d-‚<ä]BcLªÉ¸e¯Nòd4÷ ä;–\´:ù6˜Lôfëc ͦM})ëKû”R–%g8kØ¥ § ¦ûât)ÏÃöS=*²Ð\ȜLñμõ²¨™4Ð]`Qo™SM¦:î5¹d‰òõV´íOs±†üp|T¸Ñ¬ÞœO—CJæ¦Ÿ“‰ó4¯Főô¾Í¤îmò}úз÷)Ûj}âV¡‘ÕhúF»Ãñn- Ýñ.gxîÑ<ëvÕ +Sï鯹mº/'cx.¯å±9•ç߇m˜] Ú’)NxöäpåB³>/XObject<<>>>>>>endobj +525 0 obj<>stream x}Ž»Â0 E÷|Åa ØiHÃ؊ÇĀð 6•Š¨€"ø~\ډY–,ßã#? ƒ´¹CPu†,!d+ëác®³Óîš1pdÝoPŠYîÖpiÔò©¡ÒM5;‡²À&½ÓõvOýûW[§¹\¾WìÇ«EÆj–zÂ%»‰`žàƒÜ”>’ÑëŠñ`؊9šÒ°7~endstream endobj -566 0 obj<>/XObject<<>>>>/Annots 204 0 R>>endobj -567 0 obj<>stream -xWÛnÛF}÷WÌ[ ¦ER¼ÈOõ%q ؎k)y -PÒJbJrUriÇß3³¹’Ò¤0`ûè̜¹ììúçħ~|J -cZ”'#o„Oú_Ï·'qâE¥—RI~â{I‡ -šžIäMz6Œoì°Ð¡(äßðŒ|/ì{¦^@ãÉö%E‘w€)–Ç` ™s 4G)²HsDŽì°OÃ:ì$Aëà’‚1÷d`] 6™ì—°q’ à’&®[€”*\<¶-òNX“¾ƒ¹)¶g#qEM|.8ŸÆØӁp XÞ!9ƒ0AŽ%GÜ]ìç@¤šr zÎƃŸ˜ïXEÐP‡ïK~೪ ©ÃÁpûœëÀ:lò‘ö¬D ‘ŠÌЈ]-asÉk]Ó±\k*ÈqݱAŠa{ÖºbÖ¹G8΄Bìé@îC›ä©qPÜ#¤u€ýˆ‰Ÿ  kȜeD\³ƒˆJ$‚8ò„ãHúžp©H¢„#® -Z'–Lº,‰÷¬­? ¤ë¨²Dv€\ÿ„e{ÒÅ`qç!Û³VÖç9F[EGÀ Ûq<#èyOº²2#keG¼Dv²َóCž£°']̲#®¥gE6˜ðJƒ,7Ó‘ 1ß±CNb¶Åœð…÷Cþk{ZkL ÁSÐ@"°ìÚt‚kb’g+€šÜÛYYÀÔx€Ý½8q b©Bîw @Üøö[ˆ"=g«ÇxK£æ,Ď¾ƒQâXºÑ³Ö&\¢s €=ˆL.©çÈ}‹p%RDý”[‹\S$n‹:ŽÐ ÒÅ`£pÏUŽƒŠ»êÇä-b]KÆö!Å$t $žÒ ”/»/h Ãn¯ËÎö d`7·g¦b4#»žù!YA=9éV0Ì1 è©´[Ài„ë# §ân…â˜SÀ”?â#ˆøüP>êÅÝÁÀá&Jkˆ÷2ÀÀakÊà ‰!"€¹«ÙÉùÌՈf+¼\ÄIJ³¥¼Sà“Åéå¼1u¶0ïfß`c…X»3°<½ÏCŸ¶ËÌ(k3îlNé‚tESµÅ5ÅQ^áEÒõ͌%`ëÉCg¶Éšký7áoF ]jarè-õ¢-Ue2›ÌP™¯7†æŠÚF­Ú‚Vº¦­ÒÛBÑR½¨BoójMMVÎ3e6ºQ”WFÕª1j‰»àr |©ÅA{tg~k¨ÒfÔºV±úIB¯unŒªhþÖì2P5ʘëÖ@  ^eEƒjb¿du®Û†¶YúP¬Í;«–â9}¸¢m­FGºô“ŠXè%åÑ !Jƒ¨Õm¢DïZ‡Jš¾¡¨ ]\éÁÐ׍1ۋós©À“4<]¯Ï=z*T†6 -v­œ5NBÓ7U”ªþ£·ô~t¦»³Ëä09™#•Ï[> V|@Šn?Ñ­ªTôÔ΋|A÷9ŠAØ/§·O÷_ÞõU]b@¶oÜ-øTWqC(ô¨h—ˆóš›m§ E£ÛzaÙe‚^õš{MÑÕY‘W -Í9ÒµêõõÕ[5+iS·9_o Ï|ï®Lâ\^ë<êÙ“ŠÜ¯5fSÍÚ{—k7—¾G7j•Wùî"<*su÷qJOÝDÉcV*zV.Z±{ÐK%šø’p6HAìñýŒÝjÁòèêùãåÍõåtF]Œ#£þWS—?s#@d*ݽ¬›Üàö¶µœÍ¾Ò¸«L­—­\os†=°ËΣ‡¶08±ZeK¾‡\¤HäxÈi֛5å|yd1v-ªYDUór‰N7ùZ6Ã^Y³/¥Ý¼¿útKÍÖHÉ¡ÜÒB;¬^éck¶¸÷Ó·ÊdßÂÚ^WQúrŠ±~ȵ>2ëŠÙåÍÍO,¥BEbyÿùþ'–¨”óûÐVÒú£ ½ˆkXÎ×F}7,t”žªb°YÖ;Þ==V@æXÈef¾.Õ¼]uµÎðÕµ?j$~­å€§ízÕŒk(99〔íPafTÍô°í’òõ&ã§vɟ\ÙõAæ’7¯É - X¹ Ø †Üå8xu`¥¥k,(osTNûúó%ú=oW¿ousÔ-nºõôK#DîIýþ’?”C˦Çrî pP4íîØê ÐØJMò?ÔJ¬Ö¯ÌR¨íeöŸ%L`¹—Ý`y_[­ê}0>(ßA­îÿ±Å©<ïek›}þï“ò‚#sLì¾v߁Æ)^ýÒ1ޔ°Èåæýì䯓…˜V¸endstream -endobj -568 0 obj<>/XObject<<>>>>/Annots 256 0 R>>endobj -569 0 obj<>stream -xuXÛrÓH}ÏWÌÛBÝ/&\6U¹Íò‹"+‰6¶ä•e ¿çôXš¶Š*¨Ãé{÷ôŒüßY`|ü Lš(5ÕúÌ÷|üÏô××Ïgz¡IóÔóÍÚYìÅ{´2ó‘ÍB/'[d^aRAŠM -/–6RAd“ÐKL§0¸6YB»È)³A>IŠY…Á&œT5fÀNl‘"Ò4Š BUB4lÉù“ †$H¼*LUIfbm2>­#‰W€$ã ÍÆ h"5ç^¦Øq&E$õ 3TÁZUpmÒjŽSpmÐ:­'‘&¹/eÏ3˜¶€6d¤Š$I©N’f¶tqàÆ"’Â¬NóŠUxmB?A™k '¬ + †)Ã#k 9Vaèb:±c†Û(a!&Öº9P -æ#HÜ*LÃ[± -Ãp²Š“.b‚TSŸÇä¸"'¤Û¸e#y\¤Fœ* »1†•Va²lªf‹hVa°˜ÏX±’N€….S† ‰[…­áP³0ã@‰IÎäÈaKáZ¢ pBï¾FÎAd€]+käÄ]¸ÿRwœ»‘íŠËƒ‚ÖÝmp9ŒÜûÅÙ»OX YÜó31Í3³XÊ'¢oÕ+lW‘ùzñÏìòÇ«»Ýý›M·ýñúõâß³·¾y .„‚•‹!7ŸkÁ7?ËÕ„ -XUÂøZU¦a÷rvm®Ê¶|¨{3/×w¥™Ý^0ˆcÉÀ3·e_®ë¡î·82öB¸­‡]ß„¶«%Cì¼[Ö¦z„ -fÌPÞ­N%SÏ,k³]ßyU×ޛûÆ -ik©‡x.ëßMU®Ì¬-WÏÛF¢:‚Øße»\5íƒéîÍ÷Çf¨·›²·*D -Zö²ikDÜM»+‡¦k²¦ -:x"f¾ìšþI¢y{̟ۡü}\` &4»ëvƒÙ°Ì[¯’bt¦†ež¹®‡÷7sÓ´¦4ßÚæ·ùÞõ«å±=\“ž¹h‡¾[îªBÇ£Á3߶uߢ¡ÇÝÄS×3ŸPtsó«E³›ÍQæxÒs¶Û_]¿.ξœýì¤ó§endstream -endobj -570 0 obj<>/XObject<<>>>>/Annots 308 0 R>>endobj -571 0 obj<>stream -x}Y]SÛH}çWô[fPô-yvŠ@ÂP „‰=É<¤jKØmÐĒ¼²Š¿çܶÕW6;IprºïçéÛmò߳Ȅø™"6InæÍY„ø—á˗ë³I”&/ó 4‰¢b@+3=Ólc•[+¬Â`‹$țńE ƒ ËIPì·:¯Ù$ÈIÆí -» -;¯¹fáõ€ÁæE(ÖNó Ãa01¹ gØclÍ"&;°.à$ bl$äH¼bc’1‚Ô˜M˜¸g;‰šg]¼1ZÂx£”^I¼ -ƒMšb[D jØë ‡ìî`X2|`Qö¬Â؛§,¢g[f¬ÿÀJ3TÏ5–y9t¨ÿck¢PŠU¬tG± -3¨rlYáÆÄ'V–5 ¡Š•Jeeè$“–øî4žÌ 2Š"JÄ« Of©k^š¡N™ ’®ȉ (r$@NAHMö œ‚ðGÌē·”7Ëœ ZÆÖbÂxÖ¥ EÉÉpK©­¶¤H3ÏRýYÈP#çÅîT°1\ÊBr -2•JñdÆZ¦%¿¢p£ã -žp‚ISa’žÔ,4kVa°ð]jVa¨$â8ó–5›pÂxÖœó¢ - 9RáE…ӁÔ,4„¢ ¬3+’ Uç&D»ƒ)Å* ýF6~¯Â`¡¹«°;MÚ2OÓƒM#´Õ[Ö,T§cv a~Êq‚P"“ -r yŒ d‚*Va°8„…Þ«0CNG¬Æ`“”!{¿”wórÛËÛÆ$ò>pÐ Ä& É)ˆ€puÂè@ºLCJ ŠµàF±Qn»t ¡»Ò$襄œÃ=àFa”js Ũ‡0f(€'5‹S£ÍJ¬‰z7vךUfKt̓3ÖU± -ƒM‹ñ^…Áb(#‰n]H¸:E(Qˆï‰ ’‘Â؊ª bÏ* 6G{á̽wd–$$WN±1ÊYÔ,NêˆUlƍګ0XäŠt¼e…ÁâòYVڕšßëÒÁ“H&eȝ¤L¡¤ï_Yð‡îR,²tO%~O {Œ˜p½¢Äžu–C÷VŠÜZAjïÅÉD-V"Ž'îŃ~GÜ© œâ,•ŠŒÄiŒ»“¹F ›å8UlqÄ*Ìà «½Îr¾µà]•™X-»€3÷>ÅÄÈ)§èrn<é6".j]D¦\¸Ì „3'£€‡âåÀ à91x<<§ 등>âÁ9ôlɦxօŠc%¥x•Ä‚$^ÎR•Ë-Bq ‡!t€°Š±›*Rc°˜l‰f‹ªçŠ•ˆ¢Ò=Wð­@ÌâÔClDMÂ@j ï18U,Rã[™=‡pø<Å1£¥4#AžLՓ$@NTà ã¡@=éd%îm%!Í -âV±W>+(V„E|“:Ë1#r{ùÌ؂W†g]qˆú$S°‡4K½ñ†ˆYqŠÏ)ò‘¯ýÄ—ò–Í‘ËÀ)èæTª8Œ­=ž“ ¯p%z™ù™Þ<‚ÖÞÀx„øñҙxJòÎÝõ)*—ŸiN<ËYK÷æÏR¶lÏDxÐàãÁÚ_ÇRE0¼q÷uòJŠÂÀx„èB*Oñ,a^JmC^ÃćÙÙûO젙-ù‰=/ 3[ȧõÐÌæ¿L‚4Ès;½0Ӌ;sÛ=uËå?fã³ý9⌱«°æ;þÜ]ÜÜNo?Ͼ¿ÿÈ/³ÛÏןï¹þxy˜ßw¶5Ë®7W—b3›ŒƒÁiû†Ïô—¯Ó¯—fÖWí¦šoÍ}Õ؅y¨×öÔ't˜{»5Ó窷æc»kNBÜûE¶ÿi{sõ7í²{Ã}˜Ëþu½ížújý\Ïͦ^XÓ-ÍýÌ\uMU·æb·}¶í¶žWÛº“ÆeÀã$0WvY·5lèeTŒñÀ<ôݶ›w«7Ø1tM²÷¨)% -tsµ1U»0_ð ŒÀË*0ßìjuþ£í^ZY~â¦djLM¹èz$€Ám¦UóX!Ü)·O¨ÛÖömµ:ñ‹µp{ñ¸Ùöhš˜RYƒ•¤µ•e5·fۙ¯U_w»ùPÍÛ.\Öãͨ‰„@}í¬™]}x'ËÆ«RTî¹jŸì͕ÔçrU£Šæ²š?3v´QŒ@lß ›î¿Õí¢{Ù íï㻜qsßmë嫤¨+!W­o7÷Ó¿©>œÀ×|ªêUIžÚBµfÏÖü±žw cçA¾n¶Vô=r‹ëŽí|××ÛW…BŸæ]k_¸éMëôð’Ãê-äS­ºÖšeß5æû›?OZ¨úoX¸²{¹¡a›ƒƒ½ýSóhÂmõjûS…`ŠFÖë•:=ãàR ɊÐ(‘·< 0ä®[ìœD~TôðhÅÉVmmçuµÚú§ÙTÍÖÕf³x<õŠk#Õ^¡G1¹îlÓaúÝUmõdy€O­`ÀÌì†Gé4jdu[µØ-âÅÄy@(/]¿À\›s*½1o0­‘ŠÕ£óà -]SŒs´±{1‹ŽÝÛXüñëqdxQü·_Ì¿¨»MóÈ:¼,̲^I Fc¿{ÐÅUÂõxñ³j·¨ÂÉ)•ßvՂªn|l8QoqBçzչΌ¦(fŽþÅhՑ1öÇß{”Bâ`Àãû½É]Y©)E?ïÚeý´ëmP»‹k4)¡·/—æaµ{zªWöÿ–'“#ðØíNÄ!»¶­í¡ÈϘ -?kûrªè ­Äè\cd¢Èoœ5¹¿‚föb{ÿ 3yð÷ïù¿‹-å¦ÇAùp+ë§]ukl1×;Üzâ9ÂC‰+ϋpÂGžï)~ÓY–)þ_DÊågg¿Ÿý/ nüendstream -endobj -572 0 obj<>/XObject<<>>>>/Annots 310 0 R>>endobj -573 0 obj<>stream -x==Â0 …÷œâ04$¡8îØ -èÄäЦ¨h)çÇAY¶üó=Ë~* #fá–„榌6Òù‡C­V¬ ˆIâ kú=Ž‰yÒ9{ɝøÑ©*¨Å–`-B—6{„ö»Ø 43+Ý½ú8ÎÃUhþÑ6wšŠΉbv,wU‰u|ÇþþˆÃˆzº´1)2ëå3oŠ„–çñ5œšWæl4s.¿É`•:› öêq7endstream -endobj -574 0 obj<>/XObject<<>>>>>>endobj -575 0 obj<>stream -x•WÛRÛH}ç+ú¤Ê–-ã`Cž€À–«8±©¤*ه±4²'Hef„ã|ýž]Úl¶R¹€­éÛéÓgZߏBãOH³ œR”|œM‚ Mç3ü>Á?#)9º\nÎh2¦u“ÓٜÖ1áøßD¯®v¢pÒPÐ;™¨\9¥sÒ ÝIw¹¸_ÑÒh§#’Èã×ëoGcN¦pñêNd’>J«ÓÒÛ¼×±´|‚Ã…³*ÜðdŠ”p: áîzÍ>«CS -ÃúÐdœz—uLSæ–ôÒr;Ô ÓTïU¾%gD^hãì9­¯–£Åò­OóúaÁÙÑbùy´Z~h%² §*­´m-ì²®!<©òªüt£ ÅÒ •"rîãVZ㕴–±YIó¤"Ù~ÿN8±5"k |.5|½hŒ™•’L…ãq¸ÎTŸ'ü9¨­&§A…4`á•%AFìÛÐ ÂJ*š©¬He&s'|CÜNÀ5c÷Œ@\'kÉiÚHd’;Ò¥ëåÙb¼WF“Ì62ŽeL{åv*§ÛÛ+òÁ-šúœ]®H÷½„ Žîdø¹o —¼Û -Ö^À¦TˆF*ǵF&҈M -¬ïל°Ê­CAÏ!>‰œKOZ!Å>x5)©åŠç‘ü¯2V–+² - ■-ßPüE„; Š‘–,‘ÇîP@´Ú _Å7PK¥Â`°röÂø ˜fˆ¿X’ˆcl{5q§ß7äG9/¡…ð€“Ê>ˆ¦;C±ç ïË´ FÂ~ž*šÅŠÙÆÅ×mì‡-1Úc ´ž.\ î‘oL%0øwîë[¬‰ÂL{vÊõÊ­êk'¶?CU<‡¡¹žÆ`‡/±&o¥šÍ H®ŠÂ<ëÝ¢r†Öd@§—‡-•óÚï}ó5‚©³åQÞ¢à[‰”.ŒŒ¼Ì©€JÄòÅ׿§÷JâNÔw‹×/}¼XtÏûƒÎ_6“©Z ¯h,ºéÑÅ¥ŸÈAáÿ>=Be1ŸÏ{×ËHV¯Wçti´ˆ#\ ~z–7tzèñ¾û{—ßÂ`ÐåÇû‹wW«uÃRNstó‹ ìÊ$F¬-Ó÷¨ê)ÃT SÅá.§ ¦K›”)@khQÛ˜ªþêµi -*T)xTõ—¡‡¬ HŽ¦­tMÖí¨tÄNöLŽs<ìßÉ+‚LEF[¸Ú2ŠÍvKŒ¬.Ìèjq³±=Ïï]àf½‘øÑ y÷þ)R‰òQ¨=sŽå™{ÜkûíÅóè~€Üþ{”|£2X¶Xª ï -( nØ*Dô(žÕ+®WKáÉl€ÿæ>ÅðäìßlR„Þ£:Ö7Ü+~k7‡€‰¿Ôwâ ´#ÈàVÒs¦¿¼ñ­æ»ÉÛ/a}•‚²³7THù]2©zMNÁ4–"eŒxm씉Å(ITЗnNÍÚ@=TÜzøòþÓÛMüUŠªE -Iˆ„פæ‰!jXH?1êÞÖ,ȸ.·;P–aßö2:™ÊÑ%ๅ3/L£›yçue^½®üÑ»ùþÕûÒt>æó)^ÎðžtÊ¥^¯>ý3vmendstream -endobj -576 0 obj<>/XObject<<>>>>>>endobj -577 0 obj<>stream +526 0 obj<>/XObject<<>>>>/Annots 191 0 R>>endobj +527 0 obj<>stream +xWÛRÛH}ç+úmIU–d]ÌÓrIØTa±“§T¥d{l++i¼ÒÂßïéYÛ¹lQŸîӗéiÉÿžø4OI@aL‹òdäðIÿëéö$N¼ˆ¢4ðR*ÉO|/éPAӓ ‰¼Iφqà:…üž‘ï…bÏÔ h<Á¾¤(òâ0åÀ’â¬!s„æ(EVébŽÈ‘ÖÁ`ã òqXƒ$¨Óa\R0æž ¬‹Á&“ýr6N\ÒD¢ +R…‹Ç¶E~ bÒw0—#Åöl$®¨‰ÏÇãÓX{:ŽË;$w>LcIãwWû9©¦Ü‚ž³ñ Å'æû#V4ÔáûR£ø¬*Hêp0\Ç>ç:°›„|¤=+QC¤"34bW‹DØÁ\g²ÇZ×tlך +r\wlbžµ®˜uîŽ3¡P{:ûÂf yªC÷éD`?bâ'(È2ç@—ÃÄì â…Ò‰ Ž<á8’¾'\ª’èራ‚Ö‰%“.‹ƒGâ=këé:*‡¬‘ ×?aٞt1XÜyÈö¬•õyŽÑVÑ0ÈvÏzޓ.†¬ÌÈÀZÙ/‘¬€A¶ãüç(ìI³ìˆkéY‘ &¼Ò ËÍ´@dGÌw쐓˜m1'|áýÿZĞ–Ä“FBð4,»6à‚˜äÙ + &÷6DV05`woN܂Xªû7¾ýb…ˆFÏÙê1ÞRÄh„9 ±£ï`”8–nô¬u… —(Ç`O"ӀKê9rß"\ɁQ?åÖ"׉[À¢„#ô‡t1Ø(Üs•ãàâ®úqy‹Xג±}H1 ]A‰'4(åËî È°Ûë²³}AØÍíã™éc„ äÈ®g~HAVPONºŒsLz*ípáú詸[¡8æ”0åø">?”zñpg0p¸‰Òâ½ 0pؚò0Hbˆ`îjvrþs5¢Ù +/q’Òl)ïødqz9oL-̛Ù7ØÅX!Öî ,Oï²ÆЧí23Êڌ;›Sº {]ÑTmqMq”Ax…t}3ãA ØzDg2ÂЙmò†æZÿCø›ÑB…Z˜zEK½hKU™†Ì&3Tæ덡¹¢¶Q«¶ •®i«ô¶P´TϪÐÛ¼ZS“•óŒ@™nå•QµjŒZâß.¸\_jqÐ}04Ti³áJ]+ŽXý"¡—:7FU4ív¨eÌuk Я²¢A5±Ÿ³:×mCÛ¬F}(ÖæUKñœÞ_ѶÖF£#]zÉ‹E,t‰’òh†¥ÆAÔj6Ñ3¢w­C%Mß¿ƒÐ T†.®t‹`èëƘíÅù¹TàIž®×ç=*C »VÎ'¡é›*JUÿÙ[z?:ÓÝÙer˜œLŽ‘Êç-Ÿ+> E·ŸèVUªÎ +zlçE¾ »Å ì—ÓÛÇ»/oúª.1 ÛWî|ª‚«¸!zT´KÄyÉÍƶS†¢Ñm½À°ì2A¯zͽ¦èê¬È+…æéZõòò⭚•´©‹Ûœ¯·…g¾wW&q® ¯uõlŽIEî×3‰©fí½Ëµ›KߣµÊ«|w”¹úðqJÝDÉCV*zR.Z±»×K%šø’p6HAìá݌ÝjÁòèêéãåÍõåtF]Œ#£þWS—?s#@d*ݽ¬›Üàö¶µœÍ¾ÒøP™Z/[¹Þæ {`—'6œG÷mapbµÊ–|¹H‘>È)ðÓ¬7kÊùòÈbìZT?²ˆ<ªæånòµl†½²$f_J»ywõ閚W¬‘’C¹¥…wX½ÐÇÖlq璘•É¾$„'´½®¢ôåc}Ÿ-j}dօ³Ë››_XJ…ŠÄòîóÝ/,Q)ç÷¾­¤õG3z×°œ¯únXè(->/XObject<<>>>>/Annots 243 0 R>>endobj +529 0 obj<>stream +xuXÛrÓH}ÏWÌÛBº_ØTåØ,/¼(²B´Ø’W–üýžÓciÚv(ª §ïÝÓ3ògññ'0Yh¢ÔTë3ßóñ?Ó_Ÿ?œ~è…&ÍSÏ7kd±ïÑÊÌG6 ½œl‘y…I)6)¼TXÚH‘MB/1iœÂàÚd í + § Ìù$)f› pR՘t:±EŠHÓ(‚ +Uý Ñ°%CäO2,’ ñª0U%™‰µÉø´Žd$^’Œƒ43 ‰Ôlœ{™bsę‘Ô/ÌP hUÁµI ¨9NÁµA봞Dšä¾”=Ï`ÚÚT‘f4*’$¥:IšÙÒŁ‹H +³:!Ì+Váµ ýer¬5œ°.¬€¤ ¬5äX…¡‹éDĎUn£„…˜Xë6æ@5(˜ q«0 lÅ* ÃAÈ*Nºˆ ~P=N}“àŠðÁl(…$N‹.¢û+³àsØ׃‹hPQAÌBÀÚOœ‚ãœ8NÆfoc†®Lœ‚Œ”Ýq¤¤ç¹mYà#(‹$æ£öRXŸ=±È‘ŠÅÉ"ˆSptéHëçC*‡­T˜X³Š³8…O†«ÍX€xäÑ´‘Ljœ¢ŸKXm±‰Sp +u"%Ô¨HlŽ¬ƒâÑAzäÚs¤UÌyxû B -U$g#’yY›˜CeõDÁ3/Rœ‚°ésá9EÁF¬¸cÅ£,A€u‹У‚˜8ž Ç)ˆ ym8ÎfïïªH¤ÏÕaËUÅÌC#{•QÀH‘´f}»ò±Í (€œ‚‡Æ§ Îí«H†bÒìUÁCnÑN˜ÙË Àx‡Æ"G¦v§1OG(hŠ5Äq–à[ Š"ž€GǑƒÅ’+4«0Xœ[/^hXcn³àЭdí×> +ÂDUaFwÅʆ eu€Ä%Æ"IGì¢ËvýÒ~(h"ùœn㖍äq‘qª0ìÆ<VVX…ɲ©šu,6N Y…Áb>cÅJ:ºl L‚$n¶†CÍÂðˆQb?£ÛIWc°§Ê±Ö-Þ1òd 2f+HÜ*ÌlœbfP Cžt­ád\âbX2<²Ø´ˆØ± +ÃpÊ5ªX…Áâ !¨I׺Edc㑏 åvda¨Ð¬Â,#÷½ÓÕ,Nl¦Xë]’‘²e¤ÜŽ¬-›cfyf¹eöã(/d>Re.ˆE$–†.«¨£c­®$ÖÊ +Rº#‹—3t«0teš+–1ÁvA1(ÎîȉÇ9£E€.MœlRÜ ¶q!ª Àp‚PÃ㣂‚Â9_¾â´ -Ç~î!¸æ&›ÒÍÔÞ°4S€ …“–}¹®‡ºßRà ÈØ á¶v}kÚ®–<m °ËnY›ê v*˜1Cù°:•L=³xªÍvýàU]ûh+¤­¥⹩7U¹2³¶\=o‰êXb—írÕ´ßM÷h¾>5C½Ý”•¸U)Ð Rв7M[#âvhÚ]94]{”5UÐÁ1ói×ô?$šóÃpà`þÜåïãã`0¡ÙC·̆eÞz•”£35,óÌ]=\\ßÏMӚÒ|i›ßækׯ–ÇöpMzæºún¹«^Ï|ÙÖ}‹†wO]ϼGÑÍý¯Í~j6G™ãIÏiØnuýòT¾éª(ù‰z{U·Ïæƒpªˆ}¹Yv]o¾\_ +äpÛõƒiwë‡Ó1ď(àûnèªn…έ7+LÈð,…ԝ€ø©8[™ùíóv¨×ô:v +“w sÕ­KÔüóÇË¿D@[ÃírZìcˆÌ»]_dMm4㲯—Í ¶†+ +tZƒ16ó¡GCw½5sèDFHDÊN°òU«{™äÓ$C6ýÐúQàoç(€é~âè¢~í§ØÜa‚–æc³‘uVܨDS¯Xr8su¹¬û“˜qó¢Me³záBD$ JòÖþ3«~HŸÕ™ÆÝàaï7óٟÖ»–òPJßoꣶj*;=GV1¨”ú´«ûgœ³ÇNɉbÖ(:¿F ; Ûr?R/Õ#7Å0¯«¾^(žü"u¹ê¶Çˌ‰à†þ¦ë~ì6f~}5É +êO_{)6S":ê=ê}÷nqsÿáþÎô›êOÅ<ì~ÌîÓøçú¿]½ÌåÎWÝ~? W®ŠÎvÃS[•Cm“€ñõjMÎëžS8î 3·5:ì&Þô{éÙ-2ün7øÛ÷x7˵àÇÄ´À¯¹\µóÙíÅ ëég½ê6Ø.æîYJ¬çÞO”<Ïü‚·òìa;ðc€1¾…ó<ÆïÁ "þÏ»ÅÙ§³ÿþó§endstream +endobj +530 0 obj<>/XObject<<>>>>/Annots 283 0 R>>endobj +531 0 obj<>stream +x}XMoÛF½ëWÌ©iføMª—±“Ô¨í¤‘šô `$Êf#’*%×ð¿ï{³wdM;/o¾gvv¥&‘„øIK’Ë¢„Aˆÿ|z?™æA)y™¡´EňÖ2›X 6!åd•5l‘™a³˜°ˆad9 Š=¢ªóšMƒœd\Ю"µk°óš[^l^‰aá4R5SÉ9ÃC5‹˜ìȺ€“$ˆ¡:MÈ)Ðx=„b’1‚‘´˜M™¸g ;šg]¼1ZÂx£”^i¼ƒMša [D jÔu†Cvw4¬È>°( {Ö`èæ)‹èYƒÁ–ë?²ZÄ Õse^êÀPMCÊ°ƒÕîÖ`U[6¸•áÄƲÅ`1¨…aµRYº‘IKüvHÏf2E”¨WEžÌR×¼4C2E$]%Pä(H¦€œ5Õ9á1Ž˜‰'5œ-o–18E´ ÕbÊxFÖ¥‰‰Ò“áDÕ[rH3Ïrú³¡´¢çÅjØ +†.UœL¥Ä¤x2c-Ӓ?Q¨è¸‚§\`Rä dG˜¤'-‹™‰-k0Xø.-k0¦$â:ó–-›pÃxÖœó¢ + 9ZáE…Ó‘´,fEYgVG$¦:—TíZLÃ+áYƒi¸`6ž5lɁ2¬Á`ќ#˳šÞhÙb°¨ia,»„°?õ8aP"I¹„<†[Ý †5,! {]ƒá6LX‹rŠI4ºï4æå¶o“Ž÷Ã ¢*HÎ@„zÃèHºLCŽ&B§E „¢ÞvéHbîJI°8JÈ9Ü*£œ6'¨F=„Ñ0CyýD2_ñóR^2_êg¥P拧Ad\ÏÎev~#×ý]¿Zý4ÿ{r†OVgH%†8¤ ónί®g×æ_¿Þ¾åùõ‡÷n)ÿ\< +ä÷‡zx’U?ÈÇË Ê„Çã`ôÙ½à2ýéóìó…̇ªÛV‹ÜVm½”Í¦>u™py[ïdv_!õ·ÝC{âïç½L=ü[òâWݪÁ{ÈÅð´ÙõwCµ¹o²m–µô+¹ËeßVM'ç»ûºÛ5‹j×ôšÁqp1rY¯š®¡Àö$ô;C¿ëýú6A }Û‡ê>kI‰ú\]n¥ê–ò ÿ ãp«ò¥^¯Ï¾wýc§â'nJa„`jF¡3LË8842«ÚoÂmrw‡ºíê¡«Ö'~! ·ç߶»=SS¦ñ`5ikeU-jÙõò¹šþa+oªÅw©»¥š>ÖEI4×C-óË7¯^JQ¸ûª»«¯.å¹X7(¡\T‹{Žª ôŸ½Ú±}gǾ0ó_šnÙ?nÑô×ño£š³-·ý®Y=i‚¶î²wµúru;ûŸ:áY”yW5ëyj µšß×òÇfÑ· ž‡tö´ÝÕ:ÜGnqçÀq½xšÝ“`>1òª«©ôŠ¦mz¸C!½ÃðTë¾ÃªúVþ¸½úó¤aq€¢ÿ +Áu½6´k{p°·j=¸®žêát>ð)L'd³Y›³s\ªá!Y3ÈK rÓ/œFþ¬$èá3‰VmS/šj½7ô³l«ö¯MµÝ.¿zÅ#?PÊÍçÑ©Œð%N 7uÛcóÝT]uWóøžZÁz™×[¤Ó¨‘ÕuÕA[6öÍG„òØK,µwÒ Û›y Xj±8Hؚb•£ý£,{vo'°øý—ç‘á. ø?êØmÛo,ÃãRVÍZ;ðú]¹¿LøµY>åGqÞp¸$Pç7çØwÿÖë~ƒ¾Ëû¬LM/*J•=+Â)EírHñEY¦øBDJñ·óÉï“ÿ¥rendstream +endobj +532 0 obj<>/XObject<<>>>>>>endobj +533 0 obj<>stream +x•WÛRÛH}ç+ú¤Ê–-c°!O@`ËU,8±©¤*ه±4²'Hef„ãýú==º ´Ùl¥r[ӷӧϴ¾…4Ɵf:9£(;ø8›šÎgø}‚FRrtµ>ݞÓdLë&g³9­cÂñ1¾‰Þ\ïDᤡ0 ÷2Q¹rJ示—îjñ°¢¥ÑNG:%‘Ço×ߎÆ4œLáâͽÈ$}”V§¥·ùSÇÒò ΪpÓ)RÂé0@„û›5û¬M) ëC“Ypæ]Ö1M™[ÒÏHËíPƒNS½Wù–œy¡³´¾^ŽËw>͛ÇgG‹åçÑjù9 •È6‚tž¨´Ò¶µ°Ëº†ð¤Ê«òЭ6K'TŠÈ¹[=jWÒZÆf%ͳŠdûý{áÄֈ¬y0ð¹Ôðõ¢1fv@VJ2IŽÇaà~8oP}žðç ¶šœҀ…kT–±oC'+©h:¤²"•™Ìð q;×ŒÝ q¬%§i#‘IîH—®—g‹ýñ^yL2ÛÈ8–1í•Û©œîî®É·hêKv¹v Ý÷68º“9àç¾5\òn+X{›P!©×Z™H#6)°~XsÂ*·½„Løh$r.E_ö®{–¬^¯.èÊhG¸üô,! nèôÐÿâ}÷÷.¿;„Á$ «—ï¯/W놥œæèö'صHŒX[¦ïQÕS†©¦ŠÃ]NAL!—6)S€ÖТ¶ +0UýÕkÓ4T¨R8ð¨ê/CYM[隬ÛQéˆ7œì™xØ¿‡W™ŠŒ¶:q´e›í(–Y]˜Ñõâv5b{žÞ»À+Ìz#ñ£WòîýS¤;å£P{æË3÷¸×ö»Ë{æÑ'ü¹ý5ö$ùF5d°l±TAß!PÜ°-TˆèI:<5:«W\¯:–“ÙÿÍ}ŠáÉù¿Ù¤ ;½Gu¬o¸Wü2Ön-©ïÄ3hGÁ­¤—Lzã[Íw“·3^Âú* dç§THù]2©zMNÁ4–"eŒxm씉Å(ITЗnNÍÚ@=TÜzøòþÓÛMüUŠªE +Iˆ„פæ‰!jXHcÔ½­Xq]nw ,þíe +t2•£KÀs g^˜F·óÎëʼz]ù­w'òý³÷¥é|ÌçS¼œá=é”K½Y}8ú3llendstream +endobj +534 0 obj<>/XObject<<>>>>>>endobj +535 0 obj<>stream x…V]oÛ6}ϯ¸{J8²åx¶³ ’nݬndhŠŠ¸H¢FRvýïw.)9ŽÚa(âԑx?Î9÷\þs–ÒÿRZLézN²:›$š/æɔfËþ?ŏU”‡ÓÉ÷ø:xp·9˜QšÒ&G¬ùrA›Œg2¡¼p{á åÈä´µFdR8Oފ<×ò»¿’ËÍß8~C)Nññ«ëY2C€‹4¹Nhu·ZÓJù»ûOëøæk¢«é"™ó›6—éd’&þ‹§L9iõV¹‰ÊÔÏÈeÞ’/4¾ð[‘®šRUªöÂkS“¨3jB…8Dç]:Z‰JÑZٝ–ê<ԉêÒk ƒœ«Íøv¹²ŽÎt™½£ûÚ+[+ÿö,í - Ҏò¶,ÔÕ;ž’4¨D‹ÚhÛz*„ÃOFސ/Š>Ié%5@#!CÙ{í ’Êz¡ë#ªQ´#üÁ،»6T!iÏ"}B¹±¤¾aÄO2%JG!ÐdµêY;ÐR‚ßRù¨w]>Q–œ3ӌp¥½8¸„î¡´¤Ñp·Jd`¥À_?ji3¹§‡ûU ÷¤[ ü¦Ê†r]¢).›D½h¹t—=)Óy”ÌA#‘à‘c’‹Qdë!ÀRŸ¨Lí}éÕ2ôì3(ؙ²åÖÑLäçk„š–YN ªãþnðUïq„W¹v‹¬Ä<+¼b8äp®TG4 È £ƒi-ý~»©vnW#–ŽŠÑ]ÎÜ¡°yÿy|ÿù¤ŽFȤ÷P¨š³@};DzƒëóâYjp̊AŸ[¼¿Ezt! & Hp§èãQr7ÔÖ)֐ËÊxÄ)°¬1&¾0ʨφ£,!¶ì(\rLÙiâ®Àf;í4*Nh3¨óIŠú)BàØä‘´k5$(² яf= /¶%>^´®ç‡ §dkµ? ²BûÎԁKªôsÁ3‚A‰°9ÍÃÚ´Þ³|ܙ©x®Skʒmú^ÿ2{úFaŽbɃ¬]áÑ^˜`W˜¶Ì¨6œ b° g BZèTQ¥*… û^/cAf·2ðÕFXøÖÙÇ QÙC¥%#5à†kh¬Ù´b@$:Ï[ÇþÌYKÄyĔ ¶Åž#_˜ [9^dì0Rê(øΏ£}ó9Z}ڐÔ´fDj‡ÐÁ™p…ïôpÜ œ0Ak¢{Ë` Ýr>ÕJeîéÛI;_Ú*)xT¿Qo7„QùaÆã yuO¯%„µ·(̳7Â÷݄BÐ$K¡«èÓ0”èÄVS^x°ë×Vµk%švqO…“h9ì”Q”ŠÒC :šÜÕÀäúT+Þ,r¸ÝQ*Gl/¯`ñ"Ȟ-ðT3t‰Ü7 dWE‚}2Îìó8_¥iìøýý‡õ˜Ïóöá;À¡ËõÇ»°7ƍ…ÅB÷¿c|Âus~õñ’ôÂÂAóCyDÇ%x, M„UÆĚ›>줽°Ypü#˜Œà²”[SQçÁ<±ŽÒëÅËPbz}ÓÏA­ø#\+ǍbD…Ù£M‹-{Îp1àIáb©öYuk=›WA0ÈP!¶LØmx;Ü2”çqÇe¬jT6˜ƒíáÈ ¤'£ïãD}ûâvÒ: ¢#VºÖ•†–y:jÅ*‚ òÈqdíî€=½vÃPöF°N«'2Ž¸rž³Ç‚Ž·Š“¿1-|-ëó×{ÑWL³ÂãÕ0ÎÛ9ü"^:¡G4“ x¤7‰¯†'Pá |.üíî -´òÉ ÿ¿5An_MˆÎÆ–ݍ;],“ùÍ Ínº«éúöãÝ-ýçƒEúk WåCWý»W‹ÉÍÞ±gËI²\ÎpÇ=wÁç~ٜýqö/M?øÿendstream -endobj -578 0 obj<>/XObject<<>>>>>>endobj -579 0 obj<>stream -x…WÑnÛ8|ÏWì[ qÇIœ{)Úâ -ä¡Eñ!/ -J¢-^$R%)+¾¯ï %َÓáHaÅ"wwfvvóóäR¦øw)·3¹º‘¼>™N¦2¿»›,d¾¸Åç~¼–Uúâjzýû/®ïxìõO˓÷_îd6•å -1nn²,÷Oñ›üôs©š¨=ȃª3%}^š¨óØz}¶ü'¾¼í_\Í'3?M.'ro£wE›Gãlÿæ\./‡7g·“¾¹,MÂåm­m”µÙè JÖÚj¯*qí7FwâVRºnH¡sþ9ˆ±È˪ªÚNdYêụVµ”*HôFä®N‰NåâòªO¯m¤3±D Úº’®4y)H$âžL‡( Ád•æéÆ»Ú~;­­èJ¯•Íõ9ÞòQe¦2q{.Aç­Ç'QqË㘹³!z…¬‘zû‘]¶MQäVjÂV¾~Jç?ßyŽ.wՄè!ýÙÍdNÌ*¸T"rv8:pP)‘b+¯¶€´B>á±ðÈDÐ¢Xþà­PÓþÚ0`˜*Ñ@ÅúÖZc×â¬üm͡õËö_i*WÎ×ä±TH(smL‘½sÀσÉʬÁ¦ ¡ÕììCTÅ)ÄÁg<î(ùîˆrĉEÔmÁ‘ת`|ce£¼qmFy`ˆW’ _] •_üXnÅ"£Rm4ÇUÔ7ä‚Ä*çupUKˆÎåñþÛÃyJ'ó® HàuW}6N¯ý‹ÙµPý‰ŸÙy|}?KÛåûþËo:á»v G£@lB”¶Ek !§kç(2$–Ä’ÑýIGÖäšhAƓ%bà} ÎÍÊäP'†ªïçºf»÷™uå2U=%ô8YÆá~0\F",Y./¨ì§S ë$‹kP ¯Fã#€…þ«]©xs"h3³ªk]Ð# J‰©0´¼e÷³ï¨¤ÎÀ>º7  ©1AX˖€" [à[#fUét¯kšU.g¯L䛳ã“`ˍª€Q?7yU˜‡z³9JŒìª2©%h -‰¯î¹S¾2´v!qµc÷sƒý ¡™#æS¢–Ã2˜.;Š×©ä­X kµ6`b $” LÿNñä–žLn€€y‘4€Ò½ *Äs¢ÒD„= v9æ -\ôâ`²攌 Ø6  iÇËÕ]¿ŠC[Éõ 4*俋܃ú\N:nk0µ¬ì1t[5ÕkYJ5Æ´ €Í“ƒÊï׸ _Óþ¡9ǤU°#kLl|»‹ŠðœKP"Kß2vÀ|¿#Œ ,zè؄²:äÞ4¨LÍ “2eâÀþ œóô«d¡mè› +½ m[g¸Ô­Žø”ð&±ë·‰!ˆ1}õ ¹b¦§qÔ¤ ÇFý“ZÉ*ǚût -µ&% %ž' o—JÚ?oÆõm1üA’Ö·þ9Òÿ÷Ožùb:Y,æý.»`í.Oþ:ù3l)endstream -endobj -580 0 obj<>/XObject<<>>>>>>endobj -581 0 obj<>stream +´òÉ ÿ¿5An_MˆÎÆ–ݍ;],“ùÍ Ínº«éúöãÝ-ýçƒEúk WåCWý»W‹ÉÍÞ±gËI²\ÎpÇ=wÎç~ٜýqö/M5øþendstream +endobj +536 0 obj<>/XObject<<>>>>>>endobj +537 0 obj<>stream +x…W]oÛ8|ϯطK€Duçë^Š¶¸yhÑC|ÈK€‚–(‹‰TIʪï×ß %َÓáHaÅ"wwfvvóãäRføw)·s¹º‘¼9™e3YÜßgw²¸»Åç9~¼–2}q5»þõ×÷<öúÀÇåÉ»Ï÷2ŸÉ²DŒ›Û;Y‚ûgøM~ú©RmÔäQ5+%|^™¨óØy}¶ü;¾¼_\-²9ŽŸÎ³ËLlô®èòhœÞ\Èååøæü6»á›ËÊ)\Þ5ÚFY›¢d­­öª·Ñ~ct/®”Êõc +½ó/AŒE^VÕõ6“e¥Çï–Z5R© Ñ]Ht’»&%:“‹Ë«!½®•ÞÄ +WèZúÊä• ‘ˆ{V:Di]fUkžn½kLà±×ڊ®õZÙ\Ÿã-ÕÊÔ&nÏ%è¼óø$Ê"nu3w6D¯5Rop?²[mSD¹•F‡°•Ç/ÓùOŸ£Ë]=¤?¿ÉÄì!ŠªƒK%"g‡¡G•)VQzý£¤5ò /ˆ…§@&‚„Ūð;o…šö׆ÃT‰*(ÖwÖ»gå/k~¾OPÿÜþ#m­bé|ó^ž*…„V®‹)²wøy0Y›5Ø4!tú=ƒ]€}ˆª8…8øŒÇ%ß¼ñ@Ž8±ˆ¦«#8òZŒo¬l”7® Ò* ñJ䫋¡Ò㋟ª­XdT©áA㸊šàæ€\PƒX༮îѹ<=|}LP“Œ›àãlNÛdÆGl"Üc"¡Õ¹)Mub¨úaŽ¡k¶{ŸY×n¥ê糄'Ë4܆ˤQ„% ãå•ý|ªadq ªáÕh|°Ð½+ofò„6S0«¦Ñ=’ T˜ +cË[vÿ8ûŽJê 죓àÁš„µl (2°¾ bÖu^º& «Úåì•L¾:{1= æ¼Ù¨ s“W ‡yh0›£ÄÈ®Ú(“Z‚¦øê_zå C+a÷'P;v?7ÚJ‘9b0%j9,ƒIಣx½Jފ•°Qk&FBBÅÀôïO¾bé)ar#̃ˆ¤”îU!ž•Þ "ìY°Ë1Wà “í0§ddÀ¶Õ0`H;^®î‡UtêÜJ®çX ±¨PÑ ÿ·È=h˜Á…át ãvSËÊþc‡°eQS£±–¥TÓhLûÒØ<9¨Lñn †Õø0íïšsü{Z[8²ÆTÁÆ·°¡Ϲ%²ô]!S,ö[Ð$0ÂØ¢ǎM(K¡CîM!€Ú4œ0)S&ÜáßÀ9O¿JVº–¾ ²ÒÛÒvÍ +—ºòˆïQ o»~›Ø‚ÓW:`”û$fzGMêzlÔ?aR¥”9ÖÜçS¨5)i,ñ>/XObject<<>>>>>>endobj +539 0 obj<>stream xuWÛnÛF}÷W ú°XÉql¹/…’ôâ"MRXAú` X’#i#r—Ù]ZÑß÷Ì,©D‹ ²MîÎå̙3£¯g šã߂n¯èå UíÙ¼˜Óõü•|.oñy…ÿi£/ËëâfúâõúìÇ_ïhqKë lÝ,´® væsZWçWÅuAë]`S[·%זõÅú ®\Ó'åÊìêf×õùzg#|ßÔT2ٚMsIeŸhË)RìݞÊ#u>$SÚƦ#BûÚÛÀ-» ±+ÖnŠk±¶ruà¥`¹¦äélb2”8&JQ¤Æ–Á„#m|ÐØðÂ$ê#®x×ɸhgo¨ò.¦ÐWãñ¼’Iäô¥íp@óßÅËâJü6Þmñæñ¢ OvSïLb؊¾eúðÀ‘jÞ0Ü$ÉDl•Äìp[®LÓÈ#S#‘qOƒ3¨GÜá?pr}ã€Ã)¦ª Œw‘Œ>ŽÉT{¤`ºf\BT«û¿©öjÜF Z«Ðš=¬ÐãL†¼aؐBž`›x·mçc´eÃ=xI!öÜ%DK¾§°ºÆ$@Ó¢Ü;¦V›á¦c\Ì©#¢OÎ~vÞëµ0õ ‚|xÈõ͞E"Ä%¥˜0c%ï²0¤Ú±é²Kƒ84 $AŸ;-Z«ö¢1ܑ>½ý8`•}›ìǂ~7OR Aæ~3ê;}àv”íüíòQš§¶Á´ÀŽHtÝ«nü'´¾GŸâêê£•…ÒÅ%j»†¿M\guGÅ!àT:0gœb*è3êk„xAÔ\²5ՎF)åÈÉ .[n=ÀˆGˆ@«Ãéùœœ½¼ÎcêªxU+ۚÞj»I`ÿ9?»µJ ÍΣMÇÔIJTomÛCZeÌá—dgY»'¼“IyI‡EäÒ6*0:FìšãßÖ@”…0¢­R}ï6y Ö\ö[Ä%í‹9Yл÷Žív—€†0º óªáÕ©¡¯=÷zGÁQ–L¼î™;(K’d¬ŒÑÖ$Xÿ»¶«(³#Ôÿyx’! -9vHú€!¡¸A#e*€‰ç±áÕ7²Y喴Î&k‡8d¶€–ÏìòŠ°X®U3LØöº› Ã‡Æîæ¼G±¾L×èžÆw\ëPآ׺À ¤oìQFª¾ ƒvʚÇ#í€5‡™5Äa3øÈ3dƐ€?•FfXFtÚ |-_í¥}]³ô˜Ö_gP±ÀˆYßpø‰äˆyÝ·%à—†½C8†Mn’¦Úpm•…òÒbq=ø®JL™|Ä»²p&jåÐÄï×/"í98Ɔ(E'ZÀ÷ìo6\M×­‚ê,h0ubÊÐéÓ5sôcɔE-SY¶ØL½<²¼À˜¼À×鄩‰ AHIå€-µ {ybÈÙJ» ”ÆK| _Î PÈޝ‡*z:Ñg²ÇdÁÝÜ#b^veßPmñ¬a¦2K‡gÿä¿~Qçà$x*vÝ$€àzƒ0Û¨s'›†îVøá 1<“ô”¦Ce¬c”"3YâU9²\À%"ܤ$ómVÔ}âXÔZžc…ÂÁ2øƒ®ÜRèÏ÷ïƵrÕåðMbq»,nîîè¶aý>ñ°úóõ ²šÛ ôü­G<âk6žÝÎïdiÿŸ¯)×Ëy±\^ãK -ÎÜÉÍ_Ögý ·lRendstream -endobj -582 0 obj<>/XObject<<>>>>>>endobj -583 0 obj<>stream -xVmoã6 þž_ÁoNÄµ÷ 7àÚKoz9 ç4E!ÛJ¢Í–À_õI¡×Wð7Ý  …ÎwcnZsw}“UWà-—Ò«oþl®Þ¹líeïރxþe^ǃ»Ù¯³;ð<¸ßáÑԃûÛxþuñ€àm4™/ðÁòÂ{Ùz=É"óz/ ÷”²Žg¿Å.ÇÔKÞëd€¼2Ц"²‘ûtÃ*–bÑ5ðç4ßftn°ø’ïúhà7í.W„#k'’œ?ñœPé¨àZ³5‡e›IXÄ5*KHû¬bŸ¾ˋs`˦ Ó1¬(ÏM,»µkÉ -Þø´ÊYUª€ÝF¤ëËjã͎iXsÉ+†ªz[—ŠH¢V[™¡$üH[îÎò)·E‚DÔ$¹à0Gl.:zeæŸ ¢æñ<Ök¦EÊò|ßÁ\ñ’½‰Ÿ1S&5f`ûÇA7ª öñ6+XÆa[RH'\i벋͋Ã!kcƒ“ðc7ì¹®Ÿ1äøä1÷Á†#zLf@Êvƒ¥>D[ÍKÔ5¸¥˜H'3HöÀÈ[·ñV+òUskR§v’pœ+vÂ894ecrÁ¿©[.Ó\iŒ 5›`üÁ¶á×}и'͑;¹t,ôËjc}Ž‚lãDŠ°Ry®vŽŸٜLƗþô Œ¦ƒÁ4t |Y$™ŸN—íá`²¼h \º`¿Ü$B!e¨LÍ+¤ ˆ6f¡?ñÃIw+ËË -V½†á ΍*÷•Xo |”Y… >®D¶æ8g0¸~ÿŒÞðÿvä½\ï,C6úÑ°÷Nôs)Œ`¹øAÊYç*a9 s¡ME/o_­·…28=hÖbf‰z:Nz=Q(.B,0i*ør“A-êzpPå©™ÁÒ%¾Yõ#÷vóŸ^áú£¾?Žë¹‡YÜú¥õŠ "þendstream -endobj -584 0 obj<>/XObject<<>>>>>>endobj -585 0 obj<>stream -x¥V]oã6|÷¯X(âEr¤O .¹½´(êë=Ô} ¤•Í³$êD2>ÿû)Ég'uCóØ"¹;;;;â×^D!~#š érLIÑ ƒF“`D£é‡ø¯™²Þí¼wq?£hBó 'Æӈæ)awÒ<\Àæ+¦÷w·Ÿ>,‹SzI­Nç_pnD¶»sçÃI0ÆÉÁ'ͤ22G -w„¤&[&+Q.9 ö±fMf£¨µ(Øp­›¤™¬µqç\¸‚µK¦œŸ8?s¤ŽÒ¥Öœ¨2í¶Ç*Ý:$‚2d5R•”ˆ<'£pÛeä êփ6Þp šo¾æD‚fVËrù|ý®ë¢$þ&Š*gÚ¬d²¢BliÅy…Ô±4=d´U–6Êæ)mji<ð‹ûfy£&cUËÒd‹õç+T?A?é®ò`±(ûgÔOô>-N~Ùß”¨L8֔5•5®jmR|ñĕoÔvÂ3z3ªæ`úš(“9tƒ.µ*U]ˆœ:^ ¾Ì=1í ։¨ œª×Ï{ó›2ŒúÔSzD¬žx×(—Ò×ÖqÛ¨Ê1®Ù³ôØM0írH"߈­nu9;ýÝ --Ä¶g$› 8¬ ž#¤ƒU’ª‰¿ZÔÖêq™«ߞDn[hïþºûضk‡÷¹ä0\p釤ªU‚ø®BÞé åõF™1“V˜¾•ã6—k¾näõR¦„Ÿ¿£ÙlzN..a3ãë0¼¾ŠÎ(ü§éarÝ Õb §‹ÓwLÝh¹_éDÞ´¿¥ËÃ?4/ë;áêfø»%5ƒ7*%o0x"åšÞÙÒqýnÀOjN)ÞúÇUÍORYLxë »˜ÚÖXR™R© ¹™ÚH³BªÌâI@¿ï¦ëPĮוp½@¦ZÙ¥;³'ÝØfP6~½Ynõ -›amõöYv# nŠËeÉ.2—‰²%lÒù(ÜÅån#bÕ#-*³Ex.÷|k®RN½¨<[²tæ€-a`Ï3‹ªBÉ/õAì<¥ñGÐÍÓ «ôknÓ%†øÁÐF€¾¤* 0r",Þ;ži…-1%ƒ*ÕØ£{‰ipëNÍݘu¶Û`fSj‹Öйp«ñµD»üg'臓‚ŒÈñpIP¿5¯ª»EØøÌ^Â(¯fcëHûv>çÞ@{²–οÝnÿn9¢ü6¾·Õþ¼¶Ü?s½{Ñí¥¡ŽÅ&ƽÀ¶ãAòù÷È÷|ÿ1iŸ!rPä…Õ¨¶ÕW£,¹¾.P¸-£»zw …µäJ­½¥ ¢Ô¯2ÿv_^°û¢_ÝDíñ÷#yŽújü¡ÇёŽyàgк<1TXø!§½+ùcçk?†0ãoîjå|îç\´§íÍ-šLƒñlF㫖›?oooè½»c© -1ú`eê«<ïöžOB\\ÒWÉ(˜Œ§¸bc9–îæ½?zÿ !>/XObject<<>>>>>>endobj -587 0 obj<>stream -x•VkãFý?Ÿb8`+²åŸ)$MzähK݃R³’V²ji×·’â˜ÒïÞ7+˖sº³›`cËқÙ7ïÍ̗«>¹øïÓd@ޘ‚ìÊu\NGÎï|àe$Eö‡ÑÔ¿½þ0¿ºýiFý Í#@§}š‡×¥yÐñÏ¡ùJÒãÓÃïîÅ }Ñ7ó¿ñèúx‚í &€Ÿ‡ŠD&E¢š -<½NË0–;ÊuZ6¯ûF¯¥¢4Q’6Fû©Ì(”y`_†$|ý"» €#$9 -R)ÔÅfÆi xßsü$όó$%_¤¡X*iD!f%E(C Ú&iJb³‘*č[*äkQg”ÆHU #¿Œ)“y.bI@S”Doâò)#m2Q_F"a™mŠ]Å_¾S…x%Y>Z²Ä팑‹L’àÏ@jÞÍÄ¿‰içTupiV—aˆêƒ Ÿ³èÛ¥Eçz¾B}œ(1ya‰w uM¨êâæ‡:€ëLO lá[PrhÇõc˜f€b•˜ã/ͧ¢±’ùÅè° dþ½³üٟͦ·îäփâÇw®{7êwÉý‹¢$•Np•*`m-:£þàÈUã(%·2ÐrìÓ{›ç<{sãäÕyŽöêy¶4ž3l¸êùóó®úÙëaï”â-VG=YJòÛZA{ º\#È -:‡³`ËXp‚Ÿ@ZÅý¨UžÀÀKl¦’¯"Û¤¸Ñ©Ì—9p„Rœ3÷ß®Û>¯ ýñCËT"]f"/¤YÖlvGÅn#éÝ+ûˆûà]Nè!yé+$‹/üÃV›ult¹ÁVn·µ,~²€]ŠSísÈcvÎÈ ÷¾‚]Vµ÷žß—|q³wC‹X¹§l/*M@k§¡Þ**óDŵQ«4ße£G:Mõ6?O!ylb:ËbÓj\ÃŽ¡k¨6¯ÑpQ‡7´}«?|yR0€µÐ}9XkÁ­šÅjൔëžò$KRaºèÌм‰Ká§;RIµ£õ-‚•í‹%“GCÕƬúlÕ<*Y”Få47%&“íéµ ÷s¨ž)ÆEÊà)ÆwuE±üRŠ´3•>+e>/XObject<<>>>>>>endobj -589 0 obj<>stream -x…U]oÓ0}ﯸ›´™¦éšîqÓ`LHˆ/“;­!µKì¬ôßs®î# ªiÛ÷Ü{ι7¿&Mñɨ˜Q¾ z3™Š)9®óeë ßNSæ‹L,_[ÈϦb1^¸,'oޝSVPÙd±Ì¨T€é”Êú(g‚>ê½ëmŒ³þ¸ü‘NÌӉӜ£–*nÍ©jôïpwtwœ¶Î)CL~:Š:*×ÆS3Ä£mglð¤tÕ¯h£½—+M‚£°ÖÃJcZMwGÒ*Ú:ïMÕîyƒßûÖ­îŽéÞȸ»qÝFªú¦Ñ r­9 `g¹˜1úpïµ'I÷²3²BpÙ­ú¶ZãýèqiÍOl¸r]qžÿ‹ÁÉØmÅ:´Â¤%‡¨÷Æ®8±Q÷¾RÜCN'Äõa·¥­ôÑ+Uô=ôý@­ ›†ö®€¦«·—_®o¿ÞÆùáδ-r -ۏ#l¤ªrjO®‰÷âS¾O4ID8äAïLà6é=‹z¯U÷?¹Aky( Ò®3!jð\üµ–Šµ{¡¬m]à‚jø¬üEì‹Ö»Qµ871˜I…>óëƑõfö Ÿj âÀ9ŠJ\ðª¯á ÖúÙ}Ö]Sí6lõG <‰hÚ8clã"¯Ü‹ÄæM4ã°éØܜtxÖ*QÖ -hÈ,(Óé:´{x!†Uûd‡èvS4ÇÅÕU´ì?ÅÌÅë^K‡^oc(ÉLý(®±©iESóE'ýo©½™æî5"Âc Ù`Z2aD¬¶µëmÐg`õ®5V úƽÃQ‡'T¯e'klc­œP' 5~È. |êŸl6~œ?ôí¡í%k8$;èåv½Ê RŇ ,æŠe©A…^kyb -µ¬×0ƒŽQÇ2} _Âþ¤­ïÛĆò'…Ê•112͆ÇênmV·ZZ¤¹Æê¨ð ƒ/b9Ìõ¬XŠÅù9åó"½>_|¸¼À ¼×­Û²>×½Q±ŠÓÃÞÓbz~˜!/_/ób.ŠÅo Œ™,g¸·åäÓä‘E6Jendstream -endobj -590 0 obj<>/XObject<<>>>>/Annots 315 0 R>>endobj -591 0 obj<>stream -x…W]sã6|÷¯˜Ê=œ6eS–­øcßv}vΉ÷,]*¹r• "A1pPZåק )‰N]jk]â03=Ý=àדãߌ®/èòŠòúä<;ǝáÏó|‡æWsü­éâò&»ì®4-Ò³Ëëì -Ïf·3~3^ñ³Ï˓éÃ-]œÓ²DŒ«ëZqkÜÉ'w•h‚t4ÏèÎʬiÑ®×Òeÿ°ü‹ç4›¥Åg7Ù–O–v¶¥­0‚%Q”ÛBòW‚²,ãÅçtvq•Íyɓ‘dK -•¤B´&p¨ ü›§Rä|!¨qvíD]#‚¬›ô’¥­SA¦¥u]å©5…t>ÇÖ]ÌÙeJs#œ²­ç•!·f#•QëeA«ò±^Rm} ‘µ‘¤LLÉü.óÑ²’xãpíVº´DïF[éi9Q%uƒ(ªÆ^ØX*dèÒæÖ±RZ…Ý)¡€ô“Pâxå±C¾ëábd9 \ؼ­Qm•Ö£Ød܃á5A¥ÜöûÔi#Ž-:PÇu粃D ¡)¨ýJP¤–2 -ýn+Hò[üP?Ê+a֒¼Vë*hT¶a â4%Ñ~mí얄G;8SOZ -g°ƒXÙ6]ù¼uãÇr:ü"x „ˆ=f[‹4'w¿Åg?}€Þ"­'ž;õ¶u¹œ*5¡}†÷Ӌ=ÿ'œëñZð»çÚÑ.Âå(›äûW1!ôá(ÎUhÐÔ®cæc送¤-x -äœÔ‚AýÚ&rs;ø}ØéÀÝQe虉±¥=@Ý6ŒO*c葉“>*þ ¨P¾]±Ne.›(x/X9xöH•µÑé6Ük¾)¹ËÜs¦7Z¬–Ñf˜M±/(9-‚°W£òqù§Ðs[†³¯­å—û¢=a—o{OªBh>N§ú›Ë´2í·Ì؞ÿê”2½‹²`€ÿz‹ív›•¾Ì¬[OQ^3®$\á_ƒÍ³*Ô½\û؟Áhôu0dÇ-ìQaÿB«Š6:+] ³£B•Àm<êÓÓ¶²©PApjÕ¢üÐ>èƒÕÚn£ÛSo¡ñcÍD¼}e[]°EbSö2°2°ä¹wùŒì7Jä•ì¢<}qSÖ«èz"Œáÿ²wAV;U p÷('&I—AÙx•5p Ï+ŒD·ÝÞ¯1¸è>KHs%Xfm2€Ów©AuXŽJïÓÅOŸÙ526ap86dŠÿÚÏlk ?V*,’—è»j•.ðØӈ[.ZN4â7ŠÛÕ"(ZGé‘V+Çu÷õ¥­¹@ˆT™}K´ïKé¢r32ú¤sÏ$ž1)cæÊ(öזéž?¨yÊÅS®ª>ª ÷ Xß6l²§É23PØV*¯¨ŒtB¶’??~Š8Ž".e^…Ré™E¹&ée‚ANj`ïˆëè'•;ë¡ZØ[ÿÒ^¸ÝË¿NŸqeíÛ0˜Ð²íåÃ(2 °„méÝXÿîŠü· j=‘¥8… 'ÖAñ -nšP¢ð QD&¤;|")”/à‰ò× à¼I±‚!ƒ ö Š))øä„ñÉÉ5Fc+Ö½±ôÊá­¸¢3L©þÞ,‹³ wŽ’[|z¸}x¾¿?Ì®tR©Àk[¨Í`'¦E+5ú>G™°˜\ìÃô‘ kþ"³WH—8e{ Z þÿÝ??½.–Ïÿ½[F78¸þÏâî¹0§¿<-í«‹1/ÿ_L\ÞìâÎø©Á‚— wŋR¾~O´ÞÜþåLJÚÆ*̤êW-{g<€¸6p‡ºqæœÞ÷u¯%NxÕÖ¬O# .ÅŽ:bôÝ?8—úÃû 8)i•+>Á¢û x¡U uD[i„«©Þ³Ã{§`Ûg:Çç0 e>)lõ2a~oaRÿ`¨ÇùÀ'0¯ K̉.b. .Iÿ(d©â©k+vIU‡¼ÚçßO•8$úämÄ«†å²GcGá€(¹¯ §oñ%ÀÍXzp\^r?Ù~ùôz÷ô巗 Z™3ʾÇ7z-æ×àǧCà8K@”6çÃ,Lºn‘JS§-ÀúGg§‚=¬›)øba÷?þBª叝(è% G_ûõŽË[|€A>0ƒ‡IH:Åj¯5æCŸû7Ð&6a²PëøÔ¸?JäfꘞüQ&×-fÏê -1o©4|œ¹ë~ž¥§ÝU7ì#:qmü,ê†R °ìàh_ÉgÕPVÛéۅ²ævŸ{\²”ƒÜax8z ñ€ñ¡ žg0ѵ4|´GïðÝö]-Þø$iƒý¹ ¡ø;«ö0Jü]vWÙ{g=O NnºÏ‚³Ù-žŸÍ/RSÿö;y~=Ï®¯n’ƒÎæü~yòŸ“?ñ‰4ìendstream -endobj -592 0 obj<>/XObject<<>>>>>>endobj -593 0 obj<>stream -xmWasÚ8ýž_±ß.MÁJ ¹o„¤Î5moBç¾d&#luȒO’!¾_oelÇt2MŒ¬Ý}ûÞÛ埋! ðoHÓ}šPZ\ ’ÆƒdBãÛ)ÿŽ'iuq¿¸¸þ<¦á+>;¹Ò"#œ h‘^V^’4™†¼XI*D꬧]. U¦éF™5=?Ý{z¹ôRÒ²ÒºLº$'a2R&Hg„öIfӗˆ*¼5¿“±áÃâï‹õ‡Ÿ’b^Ê­tµ5’ÓÓW¼§ùD8In¨=4&ÄOãÃþh’ŒùÕï6HúeTj3Iª(µJEPÖx²+Jsá¼ ”#ÍÙ6‰ž$–Ð3²/+­_¯bâeåóæד'ktÝÝÎyŠ¥ÝÊÕhUv ˆŽ i[¸š‚%±µ*²œ±2׶ -T -' -‰L¹u]r+TÎP&‚@¯UŠPóΩ€Ö(S¾{ýåà Bmç`M*˜B>ˆ¥Ò*ÔT:»Ô²ð‡äÛL‡ããüÛÖ>_©©-k§Öy`â¨YˆøÔ9™†e je ®Ò©l-ódPiëÊ%e*c„c- }]Qm«“üq„Ã4g‡Ïdäß N'^¦ªC…V¾)Ó*äñ°“ø ÄãŸE±ôåç7™ÅK’3uߜ«{ö*È=kÉ×=̳×ûo? µ•u¤¥Y# /eªV -׳òúܱ;ØQªLŽC¶ Xpy"Û -ö!C¶l‚ñµKFj…3-Y:JBH“Ö§‘¦ç"íIž¢¾iöô:›Ïüú¾W\•‚~Ü*î®®{|¦&ŸÛJ£N$ßDÍ[%¨Ì–¯k’$y¹„Á@å'íä0€ö@›½?ƒSM:SJ‹Ððö¸š–¢M5i.Ó !hwì²'±ʀÌþ4[öH蝨=[]|_~m_uDZ‰T6”92ÊV^ÚBÌÐoA¥®Öë½Â è²¾;—õÞ8áKXYX‘ÈÑ!#кlü Bƒ¤Ví0~4¦´Þ+Èø+Òj48Ԇÿ…ƺBhšÞ¢&xº¦+ 8#2&÷üãǣϮž…\¡I3Ðøu£­£s¬‚BœNåÙØ:ýÍïîØ|L&\Ö#oaV³¬¶p -¨(fT*Í.˜Ù¨z&WH…3Z?{(£¥à–Ö ±ýG¥Î~~í$ÓÀÙQܓ|+5èÁ¾ùaшÖ<×áÇ Ë ©a>= ‰¨Ž% t–´AåLíÇ ƒV}¥ð|nñЖhY)Whf8¹¶ P¼Ž>âÞÕ@d‚D:×Ñ!ÈR¥ȱ*áBô`ßêµ4Hˆg£'+@|„g+Ñ»øé -&ÙR– Ûy„sv—Ђ/*¤ÀX‡¿›½×[á”@žǀˆ -oWú ŽÂsâÉüŽlåâ¸ðXi˜ßZWAf = -̾Âf•†ó7þ“‹-$CšÆœ6U±DpX¾5«fõVuú8¯sóºŒÏÁòn”·°°Ú+b4ا¥ ãµ1v§%/Í|•FOK%yb"ÅfAòV TÇÍá} „Ëž`š¡áa[sï®ãÛÚd°ä`²#0V% âªèI[ȧcOý†=ÓÞaqï·%/`cc -ËQÜÌã -·8Ïȃ?¨}8Ò£%X„H@³ñzvÔBԔK]2{Ìª´µNÖ+sJb'1Œ7,|8¿!#w{884(•2ã°gåèÇØ9 ŠozÚ_Ì ÁN‰ |UrÏÛ¢§Ÿðiÿ=‰—T´NŸ_¾ÝÓNo“ FÓøfÚXÞóìé~Fp, ËÃ0úRaûã—úíÙþtpÇ,™ç¢­šÛ˜ûó3~c<'ÓÉ-¾ò·‚~ô¸¸øóâ?xN‰Ãendstream -endobj -594 0 obj<>/XObject<<>>>>>>endobj -595 0 obj<>stream -x}X]OÜ8}çW\ñD+&00t߶´h‘º­vVBBNâL¼$v; óï÷Üë$3 lUª’Äö½÷œs?ܟGS:ǟ)-g4¿¤¬>:OÎébþ)YÐâj‰ßgøÛj*Ž>¯ŽÎn>ÑìœV¶\.¯h•–ŸãMvr]ª&è–.ºSuªèÖâѪÊXý+;§Ë¸s2_$3ì=¹H¦ a_«2Þù‡²yeì:®_ÐtÚ¯Ÿ-“K^¿*'¯³`œ¥\û¬5©ö”'x¨ìO!c£#§¤<™º©t­áR>~ 9BÃjR©{Ölõœ&³KD[·–B©©Q>ôñ”*§gÝnIå“ÒeÿcÑg*  -eëºuéº ge.×´Á²]­ñ ®«*âËÓyDeSš¬¤ÌYcwÕ“u•jɇøx -î¬h]M_~Üaa®µÖ>¡;ܺ‘ -¥Ã0¸ÖáŸ-¹‚‚®g2Eô`ZícX?ò92wðµ7D®¥Îš—ñƲŠ#v¤Èšuj³°%AGOZWd®G&”Ö÷͔±¼†Á(0®µÕ­ª€×IÔÊ'Úזðw‘Ì" Vo¨è¬ˆ¦—â»Ò+Xé·>½kŸ‘yÒ@ÑøßØ ÒcThþ?Ž”ë èÒç؏£ãá»øâ5ñ—º«‚™¤Û ‡¯‘*þ¬YvŒ=Ä|P® caº•EbaXzL®‘¼À ¾Nè§t&H£_¤‰7c$°ÆfE¢¨êæF^gU1ÞKð”R£ìö`0Ó:#r­fÖË!¿W -WUnÃ*„b(Ýè·0ײϺ٠Ù÷ûoß<é—L7Ø'$Zm¬âÈ9²Éô<™_-PžÂª6¾óKM5-'©á“ëۑ3"7º89%ïz^ؼʆþgÀ¸u½PDz$s<›‘lèÃ"“!]¤ ³¬væYUx;<ÒV{6 …7d¦oÉܔصuu åaWsÿ F;¡'ئh¬²ka%èZ³²U¿å ºÙ¯ÑUŒ(âÌ\Û¢bW[*]…RÛ'ŽTü¾DÁaàYÆAp亹!/#À -Bóhr2»ØU˨_—÷Sº_ÝL®X̜'¨û¨íµƒ„ö2NyƒwìY/Y·°ªï¯ïf𻃻¬½7¬Š¶‚› 8E>ôRµJûŽ´éUÂýòUiHÁé\ºàHZÌG gÖȔ•ššvEÙé1‚€!‘@è„,¥i0°`öå ½H {{=æUüœHµ´ -†œ ýë”àó#=øöª×âKÔÛà: ë B„3‡V›Î—c1îû•¬ ´ìÝE/]NIt(8‰€<œìH}øR¬M‚ù^¬+¸ÿÚ²—çiÐܹÅÞÎÈF!>æ;â.f‘K&lÕ\šbÐ,¹Cc#%`²³¹n¹– `K6E·E­²µƒÛ¹—Š2ًf‡TPèNŠRÎòÆ–AMڕwœEì&L¶ z?îþüŒFŸ=aZf„QnÜî…&ï]»’¢Y©³'9¬¨&’Âh˜”ò ‡Ó.8h‹«J@®c½Fɞô ±óÂ…’½gW1µ2Dĵ1«Å6֊¬t¨•„$Â;”/@ŒÇag)7ð!<+9`Øõ„þqÝA¬5Æ$Ì­Ž#‹\ό繳ã.a\ýýxÿýöúǗ¯œywxüýîúöVÎÅ8vƒ—ì PAGÎϘáK•Iñ錏ƒX›Vqí³)W(âQôáÛgù]hcLÅQÑÙ¡ìxzâÏ&q<nkƏÂ@‹0»Æ#À›œÇ§÷ŒŠ4{¨„"Œ›]0hۉP€ŸµE7u{æí\É2ûœdћ×á½æÎChU²†ð<æ…s{ð~Æ -HÇc{8yøÀÞÈh¶À¤Êa±«/Ӌ«x Y!YS³Æpϙ*ºs¸ŒÕZ"<¤¤>wꇞ9Q £™Üã@Ê,2ðCsÚÕÎwP‰½™‘æ¼ÔÊza.S–Û¡òjéAºAl¡ªÂÃã2)³- ý(z„ä u`O`]HU)Õs?4ÈågŒƒ³šUÆe3Eá"µæ’‹×¢žrÖçóüz8ñZc$\W[Bî}‡6•ŠÙÙžÅS².åœX0ô¾zä&T³²}¬™¾„n)$üÈÍÐcԊjó¦pK€Ê ÔBßð`Œ ´kd–ƸUò°»Á5´öèG@Ûo2EÉ>/XObject<<>>>>>>endobj -597 0 obj<>stream +Î,åæ/볿Îþ­lQendstream +endobj +540 0 obj<>/XObject<<>>>>>>endobj +541 0 obj<>stream +xVmoÛ6þî_qßä¶bÉïF: iÎ@êb¨: ˆƒ€’h››Dj"ÇößwGJ~k2 ËbêøÜÝsÏÝéÏV=ü`BIÞêù=èþ“1þâoÉaݺZ×wS{­ñÆh<(´îáIÒþ°e…á%ô}ˆ¶4Ëcç·ß>ÞkÃó«èw Œ@·?ðC„h÷ýÀ‡%ßÁ—Ê•¯{i؋3@ÔæáØ‘¹E·& ÖÀ åqµÙ¹Lm`-2BcÈEÉ5—†§ÀôÌ¡õ`ڀ üüdïÓµ˜½{Õ'¹ÞÜÀßt¯Ý0p¾sûК»ëÛ´¼oµ’^}ÛðsóÆekl/{D‹Ïsð:Üϝ߃÷èÁÝâf<Ü}[~ˆ_–ÞF“Ŭ®¼7­×³,2!1¯·ÒpO)ëhþ[äpLòîX'䕁6%‘Ü'[V²‹®¿$Y•Ò¹ÁâK¾#裁ßÑìw^*P%ä +W&ñ¡;ÀIèç\²fBôh»dàÄØ ‡ÇÆû™—ÜC­+TüÇ®7e÷ä¿ì4€‡`:\÷ð§A8gá°Á#Ȩb_ŠÍÖÀ{™–¸ß£R¤ŽcƒtñÏøÿ¯GÞÄíÎR`n£úoD¿Â–‰ï¤œM¦b–‘n1ZTäðúî‡í¶T‡ÂZË,VÏGÂI¯g +Å=ˆ&MeßmR¨E]Ï ª>/XObject<<>>>>>>endobj +543 0 obj<>stream +x¥V]oã6|÷¯X(âEr¤O .¹½´(êë=Ô} $ÊæYu"Ÿÿ}g)Ég'uCóØ"¹;;;;â×^D!~#š érLIÑ ƒF“`D£é‡ø¯%e½Ûyïâ~FфæNŒ§ÍSÂî0¤y2¸ †ÍW’ÞßÝ~ú°,NéQ$µ>Á¹EØÎç·“`Œ“ƒOF’ÎÈ)ø)C®LV¢\Ê4Ø hÅZ²M•¨E!­¬M“4Sµ±|ŽÃÒ±””Ë'™Ÿñ#Ô@rj#]¦ÝöX§[F"(CV«tI‰Ès²º'c·Œ|AÝzÐÆŽAâÍWžBÐÌU.Ÿ¯ÿ"k‰uQ’ü&Š*—´Y©dE…ØÒJæRÇÊôÑV;Úh—§´©•õÀ/îCšu䍚ŒU­J›-ԟ¯P5þýdºÊƒÅ¢ìŸQ?eè}Zœþü² ¾(ÑH0Á¬ig+g¹jcS|ñĕoÔvÂ3z3ªÆ0}M”©\tƒ.µ*u]ˆœ:^ ¾ŒŸX‹v4‰¨ œ®×Ï{ó›¶õ ¨§ô<ˆX?É]£8¥¯­ã¶Q3n¤g+ 豚`ÛåD¾[Óêrvú»F±Ä¶g¤š 8,Ï’a•¤k’_jkõ¸ÌuŒoO"w-´wÝ}lÛµÃû\òVXYÈÒIUëñ1\/„¼ÓAËë!2cIFcúVÌm®Öòº‘×K™~þŽf³éE8¹¸„ÍŒ¯Ãðú*:£ðŸ¦‡Éu7T‹A4œ.N;Üa0åÑâ_éDÞ´¿¥ËÃ?4/ë;áêfø»%µ <*¥Ü`ðD*kzçJæúÝþ €ŸÔ%2¥xëWµ|RÚaÂ[_ØÅìжƒª”Jm‰gj£ì +©N0‹'ý¾›®Cs¯+Á½@¦Z»%ŸÙ“nì² (¿ÀÞ,wf…Í°¶zû,»U…lŠËU)9²,íJØ$û(܅s·±ê‘•Ý"¼,÷|k\©L½¨<[ªdsÀ‚Q0°ç™EU¡ä—z +‚ fOiüôCóôÅÁªýš»t‰!~°´ Ã—Tå"F™‡÷ÎgZaK,A•nì‘ßVa¸`Ó©¹³ÎvÌƔº"†5t.Üj|­Ð.ÿ™ýpR9. êwöUu·߃ÃK$Ê«¥uu ¤ì¾ÏñhO֊ý›wûwËå·ñ½­ö絓ý£ñdnv/º½4Ô±ØĸØv<ÈA>ÿùžï?&í3DŠ¼°Õ¶új”ƒ%îëb…»‚ÝÕ»cÈ¢(äh¬%×zí-•y•ù·ûÊðj|„Ýýê&j¿ÉsÔ¿Pãÿ =ŽŽ”pÌ?û†2剥ÂÁ18í]É¿;Xû1„ã«û,Ü/ÎeÑž¶7·h2 Ƴ¯Znþ¼y¼½¡÷|ÇÒ.bôÁ©ÔWyÞí=Ÿ„¸¸¤¯Þ G“Q0Oq3ÄÆ(d–îæ½?zÿ ƒ!;endstream +endobj +544 0 obj<>/XObject<<>>>>>>endobj +545 0 obj<>stream +x•VkãFý?Ÿb8`+’åøG +I“9ÚR÷ ÔŬ¤•¬FÚõ­¤8¦ô»÷Íʲåœîì&ØزôföÍ{3óåÂ#ÿM†ä)Ì/\Ç¥ÑôÆá}‚ÏC¼Œ¤Øþp3uÆo¯ßÏ/®š‘7¡y ¨ñÔ£yD€q]š‡=ßñš¯$=<ÞÿþáîáaÑ[\Ñ'}5ÿŽÈÃüè`8ü<ê}T$¢(-S­¨ÔTâé笊¹¥BgUûz`ô³T”¥JÒÚè “9E²MȈD _dŸp„´ Aa&…Ú£ØÌ8 ÷|gÈÁòÌ9ORòEJ¤’F”’aVRDÒ8ô±¤Mše$Ök©"ܸ¡R¾–MÖaeŒT%2 +ª„rY"‘4Eiü&.Ÿ2Ö&%U# –ùºÜÖü[UŠWÒ±å£#KÜÎ…È% þ ¤öÝLü›˜öxN]—fMF¨>˜ üÙ8‹¹}Zô.ç+ÙʼnSS”–xg±P—„ª.®~h¸Îô¾¥¡q\?†i(W©9üÒp,+™_ŒŽªPß;˟Þl6½v'×>?¾uÝÛ¯Oî_§™tÂÛ¸R!kkÑ»ñ†®ZG!(¹“ŽcßÛ>çɛ['¯Ïs°×À·¥ñQËUOŸŸÎpÕÏ°ÈN;§o¹:èɂԒß4 +Ú ÕåAVÐ9œ[&²„‚"Ð*qèG­Š®^jëÐ2•|ù:ƒÀÎIåA´,€#”Òàœ¹ÿvÝv ø}èZf:Ù2E)ͲÈa³[*·kIï^ÙG¤Øï +B)ª@!Y|á6Ú<'FWk\`åö;ëÁâ' ا$Ó‡Ü2fŸáŒ ïkØe}‘Qïù}iÁW;7tˆ•+qÜÈv¢ÒdñLà4ÒEU‘ª¤ñ J `•¶óûlôXg™Þ§)$ŸML'Yl[k¸7À!tÕEø%.êð†¶oõ‡¯1 +°ºÏë,¸•@»X-¼ŽrÝQ‘æi&Lš7I%‚lK* ¡v´~£E¸²}Q£dò`¨Æ˜uŸ­›Gí/#Ëʨ‚æ¦Âd²=½‘án5Ó"øÈ<Ãøà®®"–_*‘5c¦Ög­Œ§ÇϏOô"²Š•ª¿£Š4†,ý6Mòkš4öU'ú§ãZ$<éÎÕS×`hAü/À:O?'@ÎÖMοÌW‡½9ôþØ0t3rì¬]g=6¢@ÂÐÎ~ Çõ<ÆÃXc¿(Ʀ!¢ á®Ì[4R„+™K[t¬sƒÖ“hÜ׸e- —#ŒV±æþËù°†ac‹zžCü_÷;Ѻ¢Âè4!V èˤð"ë8n¦JQŠð™º[Š,~ Ù‘4)Ö9pЀø|œÀðë0Þ1Üm7´ø8‡E7ö L@½déª\äœ-Bc¹(kNyҝ k]Àén5õn|g<›ÑØŸÕ êowŸîï聝©ÁgA*L¾šÅ vdÜ;˜¸Ø§¢Sûïh2r&ãéŽy!ç¿^üK¯mÕendstream +endobj +546 0 obj<>/XObject<<>>>>>>endobj +547 0 obj<>stream +x…UËnÛ0¼û+ö˜ kَåäÑi¢j{ P"e3•IW¤âúï;KÊy(i ò,’;»3³«_£ŒÆød”Oh:§j=‹1äS\g‹× ¾­¦:.Ìæ™X¼·0=‹ùpá¼}¸:¥,§¢È|‘Q¡ã1ÕÁTœú¬·tÕÙ*gýañNÌ҉ã)G-Tܚ Rå2èßáîàî0mQ†˜üxuP¬Œ§ºG›ÖØàIé²[ÒZ{/—š8Ga¥û•Ú4šî¤U´qޛ²Ùñ¿ó[ÞÒ£‘qwíÚµ Tvu­[AÅJsÀΦbÂèOÀ×ž$=ÊÖÈÁe»ìÖÚjŒôÐáҘŸ:%Xs=äZºà<3þƒ“±›. +Šuh…HKö Pç]rbƒ,}¤¸ûœŽˆëÃnKé=¢!Vªè>t¿§VÐMM;×@ÓÅåù·ëÛï·1G~¸5Mƒ„\‰Âvä©*Ú‘«ãýžø”ï EyÒ;¸MzO¢Þ+ÕþOnÄZî ň´mMˆ¼¥¥bí>Æ_hk[¸  +þ+û¬ñnP-ÎÁM fR¡¯üÁºqd½Þ„ȧJ‚8pú¢—=¼ê*øõ.@vA_5G×T¹5[ÇCýA/"šÖÅ[»È+·Ä<±yMÄ8l:67'^µJ”µ² Ê´º +Í^ˆ‡aEå.Ù!zÝÍqvq-ûO1§â}¯¥Cï·1”äƒ ¦z×ØÔ´¢Š©ù€¢“þ‰·ÔÞLs÷ž ṅl0 ™0 VÛÊu6è–3°zÛ«ýàÞá¨ýªV²•¶±Ö5N¨£„?d>õfÜô6?O€§ŠŸúvßö‹’5‡ôr[^e©b‹Ã +–sŲԠB/µ<1ЖZV+˜ÁGÇ c™¾„/aÒÖw‰í>fOù‹BeŒÊ˜™fÍcu»2«--ÒÜôcuPxŠ„Á— ±èçz–/Äüô”¦³<½¾ž}:?à|ԍ۰>םQ±ŠãýÞã||ºŸ!o_/³|&òùo Œ™lÂp—ÅèËè‘;6Iendstream +endobj +548 0 obj<>/XObject<<>>>>/Annots 288 0 R>>endobj +549 0 obj<>stream +x…WÛnä6}÷W²ë lµÛv|™·¯õCâYwo, l‰j1¦H IuOçësŠÕ Æh]È:uêÔ)êëєÎðoJ×çtqEe{tVœáÎøçùG¾C—W—øÛÒùÅMq1\iš¥g×ÅžMo§üf¼âgŸçG“‡[:?£yW×74¯âÖ¸Sß5¢ ÒÑeAw¶RfI³~¹”>(kü‡ùïX|IÓiZ|z~SœcùñÌÒÆö´&P°$ªŠJ[Iþ=íBPQ¼øŒNϯŠK^òd$ٚB#©½ *ÿæ©%_êœ]:Ѷ€#Bm—^²´v*È¡¶n¡<õ¦’Îa"pl=Ĝ^$˜+á”í=¯ä¥5+‰ÈȌz/+Zl€ÇzI­õDÔJ’2$Àü.ËPм‘xcwíZº´Doö†¡i˜¨‘ºCÕb/l,º´¹uA,”VasBH ý$ä†8^yìPn2]Ì,Ã@•-û)ÐZi}{ Œk0¾&¨–ë¼Ok`86¶Héç]ʁ‚r¤ ZÔ+Q‘JºKÈAèw[ D’ß:ð‡ü¨l„YJòZ-› ‘ÙŠ‰@ˆ“H”DYøµ¥³kå`¤ž´Î`±°} »ðeïkÓø‹äA"Öœ­-`€N®~&Å£Ÿ< ß¢¬=+vâmïJ9QÝ`„öÞO/fý3ÖýµÐwÖÚÞ.• $[àý«X +ý‚ÆQŒUhÈÒn#òÃցI[èÌ9©“úµO=ÊÅè÷a£#m wC:#nÌJŒ%Í€ TÛX(>uS$NúØñ;I…zðý‚;áT–²‹ ïwž=R# m”FºךoJ®2ל¥Å… O^ʖ-$ú\ÖÒ9¼Ž^KâJìçÄ3§u´VS¬ RN‹ÐHØ«Såaú'Ps[‡Ó¯½å—sҞ°ËÇA·Ù“šº“‰þæ +­Lÿ­06ëà_C§Å‚L̘à¿Þb½^µ¯ ë–¤×M¢+ Wù×`Ë¢ mn×û3 ¦l¿„™ö/”ªê£³rÒ­0ªT þØ £Á1=­›Š.N-z¤Ÿ ÍA¬ÖvÝœz‹ßï™È·ol¯+¶HlÊ^•¢ ¬8·._Ѓ‚ýƆx%»è@O® nÊv]O„Cú¿l]»€j´»‡‰E2 ¨{¯²®áy…‘¨¶{Ãûm'F]Ãg 01W‚eÕ&8y ]‡åÈôîña6™ýô™ÝQ± £ƒÀ±Ñ¦ø¯mð¬¶ýǝ +‹äÂ%ù.z¥+<6à4òVŠžFþâ¹*…Ö±õH«…ã¼s~ikNMªÌʾ%ÙçT†¨\Œ‚>iÄÜ*‰gLBÌZ9ˆýµçAºÕržpòTj…¬÷r‚† =t¬ï;6ٓdÀ ֍*ª£œ€VÒìçÇO‘ǃˆsY6F!Uzæ¦Ç\“ôrŒANj`ïˆëè'U:ëѵ°·üÒ¶q‡—¨^¡MjT$ª¨„t‡O$•òÐ9¹ÆhìÅ2Kîފ3:ŔÊ÷¦Eœ]¸³nöéáþõáùþ~]í¤¡Àk{¨Ýh'¦G);5ú>G™°:>߆ɑ+kþ¢²H—4ŽÎö²@þÿ»~zÍŸÿ{7n°sýžÅÕ±°¦¿<ÍÍÙŘÿ/¦®ì6qgüÔPÁË1WŋZ¾~O²^ ÜþåLJÚÊ*̤ݬ={g<€¸>pǼqfLLïû¼—'¼jk–'‘ˆ—cÇŽaäêïœKöýá}œ”´*Œ`Ñý¼ÐªFwD[é„k©Þ³Ã³S°í³œãs†2Ÿ” ¶z9f}¯aR1þÎT‚`^¡/1(†¥@{IúG%k]k±Imµ+«my¬Ä)‘Ñ Z‰W Ïe“Ǝ0h„Á/ ã·øàê@ Ü{°\brAÙ~ùôz÷ô巗cÔ2J‡áï ÏG³Å ùd ‡ ”Ò—|š…K·=à 5epܯ ~*ØĆ¡‚O&`vÿã/¤êƒ üµ{ š ӑs¿ÞÒqq‹/0ôÜ Äi=“âvo€"cßê„Ó&\ízxlܒ{äfj_Ÿ;R¦Ô=†ë1Áo­4Œ¢¹~ž¦§ÃÕ0í#;qmü.¦ +ÒPaÙÂQ¾!’/š1­8·ÓÇKÔhÊ@o·Ø3sÉSv°Ãñpö âA â£)x ÁE—ÒðٵÇÛw­x㣤 ö;` ø»h¶püº«â‡ßô,œ<Ü ß§Ó[>/XObject<<>>>>>>endobj +551 0 obj<>stream +xmWasÚ8ýž_±ßš¦à%Ü7BÒN皶7¡s_2“¶À:dÉ'Éî×ß[‡a:™&FÖî¾}ïíòïŐø7¤éˆ>O(-.ɀFãA2¡ñí”Ǐ“´º¸_\\ÓpH‹ŸÜNi‘δH/+/IšL C^¬$"uÖÓ.—†*SŠt£ÌšžŸî=½\z)i¹ÒºLº$'a2R&Hg„öIfӗˆ*¼5±áã⟋õ‡Ÿ“b^Ê­t{k$!¦§oxOó‰þp’ÜPsh8LˆŸÆ‡ýÑ$ó«?lôÛ¨Ôf’TQj•Š ¬ñdW”æÂy(G:š³­=I,¡gd_VZ¿^ÅÄËÊçõ¯'y¦Ö ÓðêƒãÛV•Ic¬¤­sGÍüThõ_üåL)£s¥'kô¾½óK»•Ç+Ѫìu i[¸=KbkUd9ce®m¨N™rëÚ*(ä" V¨œ¡L^«) æS­Q¦|÷úËǘI§•M“ç M*˜C>ˆ¥Ò*ì©tv©eáÙ7©ÇÝšÞ>_ª©-÷N­óÀÌQ)Òñ©s2 =ÊjØÊd¥…SÙZ~ðdP Wy Ë%e*cˆc1 }[ÑÞVœL'á0õ Âá3Ùû7(…Ó‰—©€êP¡•oÊã´ +y<ì$þóøÅgQ,}ýõ]fñ’äLÝ7çꞃ¾ +:BÓÄZòu³ÅìõþûOhmeiiÖèK™ª•Âõ,½>·ìÈÄöcԚ+“nȦ .Od[aÂ!dȖu0¾v)ÐH­p¦aKËIhÂiÒýi¤é¹H–§è£¯aš=½ÎæóŸ¿,ÀW¥à·Š»«÷=>³'ŸÛJ£N$ßDÍ[%¨Ì–¯k’$y¹„Ã@æ'íäp€æ@“½?ƒSM:SJƒÐð¶[MCѺš4—醐Ä»ƒ¶Ù“X e@ æš-{$ôNì={]|_~m^uDƒZ‰TFÊtØÙ¨K[ˆú-¨ÔÕz}Øÿ6é»sIŒ¾„•…9«ËÚß 3(jÕüãG_J뽂Š±"«Fƒn &üoD0ÖBÓè…4ÁÓ5]ÁH@‘1·çŸ>u>»®ir…Ít@ß×µ´:çX…8"ʳ±µò›ßݱ÷˜L¸¬GÞ¬fUmaQ̨Tš]0³QôÌ­2 +g¤::;~PFGÁ-)¬ +bûBýúÖ*¦†³e¸'ùVj°ƒ}9ÒâwԦÏÁ•NÃ{Žr@Q7JȄhƒÉ™:ŒA©úJàù$܆c¡-ѱR®ÐÌ>prM4 x;ÜáÞÕ@d‚D6ï£ÿA¥J7PcU„èÁ¾í×Ò !ž8Œž¬qÏF9£w3ðóL²?¥,#®òçì.¡_TH±#~7{¯·Â)"<'Žù7Þ(Z®&ô7 …ÇÄ ’;ØÙÊÅiá±Ò0¿µ®‚Ìz˜}…Í* ã¯í'[H† +49mªb‰0à°|«WÌê­:ꣃ^ë<êµ)ŸÃåÝ,opa%5W Çh°OKlcìNK >Þê *¦–JòÄDŽõ†ä­(»Ã —>'ÈÔC5âöæÞ]Ç·5É`ËÁdG" ¼$jÄ]ѓ¶Ð;NÇ0žú5}x–ÆÙrtåÄdéÅ}ï, €Ÿ˜;vmùÒ«µãQ€g§Œ`Gðb.@üf—*-n'aˆGÉÒmfjú¾ÀSC‹^ã5ë`1!Š Ž…s¼_uÜ´rôn×¹%·L|0Ül )'WXD÷‡FîXmÐûNiÍ×# b;ãþIÍ%cÉ˲ø· a¹aQgè/VÉßïPr׌TlÉðù3·¶WÁ3°'tÛO +øR§¸ÆñG‡…¦?¼ÃêÞoj^ÀÈ<¶£¸›Ç%6®qž¡P(Lúx¤GKБgíö쩅ØS.uÉôu2«ÒÆ<h¯Ì)‹Ä4Þ°ôáý†ŒÜðà|СTʌoÀ¦ ˜£#cé€:€(¾;êp1wK%.ðUÉMo>ˆ®~B¨Ã7%ÞRÑx ~ýåöð]k8½M&Nã›imzϳ§û=À³4Lãèk…õ_ê7gûÓÁÓdž‹¼"phncîÏGÌøñtœL'·øÈß Æüèqqñ×ÅÿYŠendstream +endobj +552 0 obj<>/XObject<<>>>>>>endobj +553 0 obj<>stream +x}XÛNÜH}ç+J<‘ˆ1̍™ìۆ-R6h—áa%$Ô¶Ûã^ìnÇm3Ìßï©jÛc†l¢`»»«êœS—Ώ“)]âϔV3š_QRž\F—´œŠ´X¯ðû kMÙÉçÍÉÅÍ'š]Ò&֫՚6)aù%Þ$g×¹ª]Ó2¢{UƊn-­*ü‡Í¿²sº +;'óE4ÃÞ³e4ûj•ðÎ?”M c·aý‚¦Ónýl]ñúMn@¦¾v†ÈÕÔZó:¼`ÃXVpĎY³Í›RÁ,lIÐÁ“Ú„‰«à‘iò#ë£@åA,¯aðzJŒ[mu­ +`çu´ò‰ÆÚþ–Ñ,bõŽ²ÖŠh:)þTZ`+ýÞ7@oçêgDdž5P4þ76ƒôÔڄÿ%Æzzƒô9öSÆè´ÿ.¾xMü¥l‹ÆLâ}£û¯*þ¬YvŒ=Ä|Pª3ca¼—Eb¡_zJ®’¼À ¾Œ#è't&H£ž_¤‰7C$°ÆfE¢(êæFÞfU֓ÞIðœb£ìþh0ÓZ#R­fÖó>¿zW2WnÇ*„b+(Ýè÷0—-²Ïº*²Bdß¾}ó¤_]5Ä>!ÑJcGΑM¦—Ñ|½@yB +«.ÚðjÈ/94Ö´šÄ†O.+lGΈÜèºç䜼ëxaó¾Q¶é¾qà[×Ø EÄÇA2ǸȆ>,2ÒEš0ËúGk^T·ýÁýÎk;²-¼#3~Oæ.Ç®½k©­)'» +œ»5Øi:r€m¬Æ*»EA‚®6[ [t[Þ¡›ü]ň"ÎÄÕ5*v±§Ü(µ]âHÅïJž…aG®›;Bñ2’¬`!4 &'³å¡ZÞ @ýª¸¼ŸÓÃæf²f1sž î£¶—eœòز^²2laU?\ßÏàw wY{ÕɨB‹¸3‚» HEBtZµ-jûµé:â†y†²Ôçàt.mp`-¤Š£ŠSk ÊJQÛ, ôt AÁÐHCh…¬¥©1À`úå Ñ ¤„¾QoàL*¥W0æ\éßæŸøÁ·7Í_‚àz× \¯úœa«#£Uëó§¡wýJ–Z¶‚—.§$8AÀ<Ϥ>~ )Ô&|duïßZöò|°" š;ƒØÙˆÃ($ÃÇüÀÛr¨d\š£’KSˆ™%wll`D¶6Õ5פlɦඨU¶vap;÷RQÆÚ; Õ(t'E1gyåK/¦ íÊ;Î"v&kh½÷~F£Ož1-õ3 6n÷ÂÌw»’¢I®“g9,+&’Ìh˜”òõ‡Ó¶qW=”€T‡z†<éb æ…g4 +%-zĞbjeˆkCV#Š}¨IîP+ 9„w(_€ýNRnà}x VRÀ°ëýãÚ£XKŒI˜[çE&¸žÏsgË]2À¸ùûéáûíõݗ¯œx÷xüýþúöVÎÅ8vƒ—ì PAGN/˜á#K…‰ñ邏ƒX»Zqí²W(âIôáëù]hcLÅQÑűìxzâÏG&q<nmƏÌ@‹0»Åu˜×à×ã™×#á¶Ø3rï;¶©üsÈÎnpð,žœ…)焂¡Çꑛ`Mòú©dþ"ºíµ ð#7CQ+¨ÝqÚI|ÂlZ)…¾â¹h[É(i+çYw‡"îihì]ÝB×o2DÉ8’áF:4§¾áÒÍAò`%݊KCQš-Ï÷;h§ik”0¾½u" ]¸T[“Ð)R½¸DBíªä‚-ñm ·­a» +6/nÖÝM]æ2Ñóõ/ÿ;`±ZD««uë¦Köýëæ䯓ÿÚxrœendstream +endobj +554 0 obj<>/XObject<<>>>>>>endobj +555 0 obj<>stream xµUMsÚ0½ó+vr)™‰Ë6þ8’¦i;ÓL?p{â"ì5V 2•dþ}WÐ qHHé0ÆöH»ûÞÛ'ïïŸ~’ŠyÏg>ÄÏ҄žº4Bµ^ð9½v, ¢€Å] Qu§Š‚K»"ÂÁAöDD&,êJœ¬.ün¸qðíEÞ;¿Š€sÈ+'Rœ&—@Bù>äE_Ìf°¬ T­*¬l”+~!´Jނ±Zª©apÙ¨7ŠF-Q[¸©QÁBC‹`°5ÎOóŸ=ŠPβŸ0pïçWpªV À #âI«2¸…n H“•ÅF—¨Y½ºëSXBD)$¯¥ƒw¡DSh9ABZ#Ì׉J¬¤Âr'!ƒ¼F³Ý$È -­¡]xkQ¹ÄÙÊE¸<#1Ÿ€Êòt¤²ES"Û2!ðñóBþ—gðöÇðÓ¸?i«³EcƧ\*¶ÕN\*僰ÐT•A 7ÒÖN‹¶ªP»BQŒœ:^E-´(,©´OÀàËÁx–bÖ"¡Ù¥…0ö®Á«…sÄŠT§Ï¡(sFUžT‡d8@²Ü2ýï—#"¯—ÃõjËÚÔ YÜç1L¤ŸÂLZ;CU)©QQžk+ƒávïŽÙHòÉàÄvvoæhåœl®‘LA Þ䊓¿å'û™|<ó0pŒ_Éw¯[ãu{F‡Ÿ­]]6ž^_ áij4 ÔÞ·²Dgï~§—ø™ÛºÄEIĒ8]ÏJž¸ ïòÞ×ÞÑ8’ìendstream -endobj -598 0 obj<>/XObject<<>>>>>>endobj -599 0 obj<>stream -xµVÛr›H}×WtåIvƒä}’“Í®«âÄkió¤ªÔƒ4»0h‡!Žÿ>g°îÎuå’ Ó}út÷éùoà“‡?Ÿâ¥åÀs=ŠÂÈQ8Žq=ÂWqÊíÂ%.Œ&nxl!Œ}8b*˜œØ„'vøÿÐÇõ|ðò̈́üæ9‰Æ¸ÈAxÍÓ᥸¾çÒlöaúv¶&M~±®ê‹O¬XœÍÿÁæ|¿ÝìŒblÖ\פWœêU¥4-†~D‰Ð‹3ªÅRòŒ -¡uÁ.3Á$ ©ù’+bšª<Çf‚zz%$Á_Ž5ü#]Y£ðÜp¯ۺß`wXÐ>@ßüèc02˜¿êò'°Ž\º7?ñ{’[Åu£dKoËDfÀu#;rHOÄò;©þ -³Ðfڎæ_Ž14ŒîPúm%û¿qjÊw·t=rü2‚UEŽÆÀ;¬¦Ïþ|?ñ•4\šwòð3!þp"³z%0zâaߓHÉÛé;ºe’™vŸ±2a4½»9¢"ndX™¯DM5Oµ¨$e¼N•Hx[úy#íãš$oy+Ù¿œØŽ‡û»W”²¢pÉZ2¯TɬµË(á\ß[y¨̈́Q¨ä‘øgV -)äÒ¶W‹6­28‘H:n;#ò…²*mJ.µõâҍ6ØÉJÃុ´BÓf6óØ#/1* -Á’‚wÉ÷hÒkkG¤‰è#[‹ÅÂIk•J}a4”²Íe¹õ¸ìž÷¾= KÝ']1Eçk¦XyAíMÆ4ë¯ÏÕÎÒ¹2‹‹³ß“¶IYŸBú2ž[B!åi!¥›ZZš™„øÏn¯I+&kÖ¦`D&/+ ¶×â¹>]èüAÏ5Wõ!,;‘æH—Ã¾D ó}–WEQ=ÔWff·3ŠÚRµä]Ù˦LP«ÐØäQ1.¶ì$|‰¸j•±á`bhfC@2÷¸}êp›„“6 ©(ãÖ0ö­µùm͕ì³(›’ž‡ú°éª/Ƅƒ]3Gx¶ƒÂ~ài ø3žlßä*°ïÃ2z…”¯+sPý¤ßbeЇLC÷­(GŒY„§ÌD‡fÚºß3´ØÆú Pª˜6 -þ}Ïp[0¦8q[Þ¶¤ ð-íÙô5JeS£¡9:¡Jºg¡šJt„z|*µ~xÄ-ø—oÆÝAÌ¿ Üh2¡(îz}6½½žÒkþ‰Õ@菲cü;~<¶ï:±¡éŽNϝ÷Â8tãhÜúØù}>økðIšMPendstream -endobj -600 0 obj<>/XObject<<>>>>>>endobj -601 0 obj<>stream +­¡]xkQ¹ÄÙÊE¸<#1Ÿ€Êòt¤²ES"Û2!ðñóBþ—gðöÇðÓ¸?i«³EcƧ\*¶ÕN\*僰ÐT•A 7ÒÖN‹¶ªP»BQŒœ:^E-´(,©´OÀàËÁx–bÖ"¡Ù¥…0ö®Á«…sÄŠT§Ï¡(sFUžT‡d8@²Ü2ýï—#"¯—ÃõjËÚÔ YÜç1L¤ŸÂLZ;CU)©QQžk+ƒávïŽÙHòÉàÄvvoæhåœl®‘LA Þ䊓¿å'û™|<ó0pŒ_Éw¯[ãu{F‡Ÿ­]]6ž^_ áij4 ÔÞ·²Dgï~§—ø™ÛºÄEIĒ8]ÏJ» ïòÞ×ÞÑ.’ëendstream +endobj +556 0 obj<>/XObject<<>>>>>>endobj +557 0 obj<>stream +xµVÛrÛ6}×WìäIöX )Ò¤ä>ÉmÓz&N]K͓f2 JhI@Á8þû€¤uµs­<’I‚Ø={v÷,þäã/ dLaLY5ð=Ÿâ(öÆM\ñ՜ +·p‰G““ 㩝Zˆ’N˜ +§Ïì£gvÓàØÇõbðú͔‚ˆ‰'¸È Aø>-²á¥zïÑ|þ~öv¾¦Mq±QõÅGV.ÏÎcsDAÐnlÖÜÔd֜êµÒ†–à ¦T˜åÕb%yN¥0¦ä#.sÁ$ iøŠkb†TQ`3Á=³’à¯Àþ‘QÎ(<7œðëµî·ØG¡è o¾t‹1[Ì_uõXÇÝ[‚Ÿø}–[ÍM£eKo˄3ຑ¹G¤§bõ•T†Ùh-³?mGóÇYF÷(ý²’ýß8µå»_º>‚2‚ÕEŽÆÀ;¬¦WÍÿã~ñê3i¸´!îåá{BüæDæôJ`õdF}O"%ogïè–IfÛ}Ϊ”Ñìî愊x±ee±5Õ<3BIÊyi‘ò¶ô‹FºÇ5IÞòV±8±=÷w?SÆÊÒ#gIÈBéŠ9kk–Sʹ´¾wò RÄU¨ô‘ø'V )äʵW‹6S9œH$ +·Œy„B¹ÊšŠKã¼xtc¬6eNR8°X!œ´Ñ™4VC)ß^V;«îyïÛǹÔ}²5Ót¾ašUÔÞäÌ°þú\ï-k»¸<ûé8i۔õÉ!¤/ç…#Rž•Qz™£¥©‘IˆÿüöšŒf²fmšÑ6@dRóJ°½/õAäAçï,zn¸®a¹‰´@º\î%b˜Çè³B•¥z¨¯ì&ÌîÑ8nKՑwår,›*E­BcÓGĸر“òâªmTÖÆsC3’½ÇíS‡»$‰ª©èe¨k‘­ûbL9صs„ç{¸!ìGžv€¿àÉðE> ‡>£WHùFÙ³€î'ýÓ( €>fxhÍB9aÌ!|ÎL|l¦­ûC[ˆm¬¥ê€ ÚáïÑ÷ ·c‹ÓêwåíJÊQ¿#>ÛÆÆI©jjt4G+¨Œ¡ pª©BKèǧZë§GÒ¢ýfҝĂËЋ§SŠ“®Ùç³ÛëýÂ?òRm€„~k ;@LÜ»£Ä‡Òtg§—|QyI<é*=±F~] þüƒìM|endstream +endobj +558 0 obj<>/XObject<<>>>>>>endobj +559 0 obj<>stream x•W]oÛF|÷¯Xø¥6`1’,Krޔ¶) $AZ -Z0ŽäѺ„¼Sy¤Uå×wö>(ŠVŒJºÝٙÙåßgã߄SºžSV“1Í&ÓdJ³åÏSüՒ ÷ÃÍøå÷ïÖgoÞÏh2¡uÁg̗ Zç„sÆcZgu.ñ–mÒ¬©1½»Ê6´SeI©$+þÙ­ä‡f#qyÓÖZæÄç$´ÆW™(Kd ÷ô(¶êáâáòrýålL£É5b\çUkÊ%–šL4g)K•¬L½Oxéǵ˄ÜWÓ]ß&sޏ‹¬$Ü9Š­¨E%¾%òÞ´dÚ§ ØJ_‘Òn©©sö©šÄv+±Yg2.è΢±}}ËW¸ÑtžÌø敦V[õÄIO攪;ù„SWŸïH·U*ë„þDvcÚ2÷¸q~Ï¢l%àl6tÿûêã’Ð冴iè«6»L»ô)"Y²uIçÒfµJeþ¬‰ ðõ#^Ýÿxw÷Ù¦Vú ¸»Ýü8@/T•)Z5Êh -Åù ?¬>ÑG¡r웬­¤nïôt(TRw¨^… -¾ÛÊúÈi”%²dªJ5H L§/žRaq»Ý=¸’Oyo€'F\ ݊òÊÁ̘­‡@DÖà×r(-®é0%Ÿ0ü ^ÅÔ]€ð[ -zVvŒ„˜¢pºË ÇüâúpSdÿJs\~{ÚÆìºR±ô®^/c5@ð¨hØ^8Jç÷®:ç$4cï¼OJge›Göœ·ä³,Ï{Av9Åf‡´"¦¯Èȃõ¤žeàˆúæԙî|_á -¦mQ€8;Ö쩅@@ÞZfûx'9ê9Nú©Åž9®‘Mès-m[‰Lp~ô‹jñel«¼Îtê%Ý- ˎ9» êŒ8Ü ù/ܲmÚ±*š]wûTtW€ët¼¤)÷W.µaœÞX}“µ¡Rê§fó¢síh`Ŕ™Ü•(+ԟd$ʝØ[×üÿ±x<›owpO CÍJØ0d"á7ˆ\zQøBù‚ß9ƒu½ ×òoÞßÒF] qŽ®'Þ³o’Yÿ暕·a¿6vF¬rcä¾Ò¡Øc4=\ø™3ËÒ=ÕN’—±¯ •t¥×SРþOñÌÏ TiOþ¾µý`ClïÓ Ä -‘sr}î{Ǝã~íõ×Ó-Cä_УÙ̃{5²,}L¢2-¾ >à0;ØèGÔ¼Â|D‘ü‘Ñ݇A¤ä ꉑÓ;a›œ£1˜C²'ØFÔM4ˆã N²'g#¼cô -†!nAïAÝÑêÙ ašÂ&7ÄݦMF‚•Em*^‹né8Á‰öŒ™” ì\%kk˜G]°[`”81X·ë䝢טn¦Éҍ'à'ؤø“,%³+Rgƒ=?‰˜a(qº¥åyÏZ•–l‚ó”ÔÄ~”5˜¿Tny¸ØÛvwô}¡åYÊŒ0×¹s ¿Ý^áù!l€uh”ýáC¹–j±“³Í—M2å2ÈY8ò[݀ÁñÀQ3)A‡#ñAXÏÂó|=÷Ý÷ˆ«ñÃ幫›L"Ùf¬„ÐóƒÉP…¶ÏAŸ9>eʧIJÄÁ3Æ«PéÚà¹ó…B“ÄÔ4Hl ™X–¾ÇÒ·;+‰ù9màÂ(Èàù‰Í…rh¾[ÑO<9š-¿·ýÒªÜÏlqåh1¾eGûNóž-fÉb¾D›ÇšÉ-ñóúì׳Uhækendstream -endobj -602 0 obj<>/XObject<<>>>>>>endobj -603 0 obj<>stream +Åù ?¬>ÑG¡rv…éÕ57Y[IÝÞêùP¨µî`½ +%|¹•õ3 Ó¨jdÉT•j¨„O!`<¥Â"€v»5z€Ÿò2à€O ¹ºå•Ã™70]ˆ¬Á¯åQZ\Ӂk>=€ ¼ +ª»á·8%ô´ì( 5Eåt—AùÅõá¦Hÿ•æ¸÷¼Ùuµbí]½^1Æj€àQÑ°½pF”Îï]uÎIhÆޙž”ÎÊ6ô9o?ÈgYž÷‚ìrŠ9ÌiEL_ёëI=ËÀõÍÉ3Ý7øÆÂLÛ¢qv,(øS …€½µÌ$öñŠA’oè§{>å¸D6¡Ïµ´m%RÁùQÐ/ŠÅZP”¡­ò:ÓM ¨—t·pp';æ@Í-Âps@æ¿P˶iGªhvÝíNÑ]ªÓñjp¦Ü_¹Ô†qz_`ùôMֆJ©ŸšÍ‹:Î}´£SfrW¡¬T’‘(wbo]ðÿÇ>àñ@l¾aÜÁ=- 5+aÃP‰„ß r=êEá åë=|ç Öõ&\Ë?¾yKuÆ9ºžxϾIf 4ü›kVކýÚرvʍ‘ûJ‡bÐôpádÎ$K÷T;E>\ƾ‚VÒu–^OAƒú? Ä?3ðO¥=÷ûÎöƒ ±9¼O3+DÎɍz®ì9;Žûµ×_O· ‘Af/æÕȲô1‰Ê´ø0ø€Ãì`£uRó +ó]EòGFsç0z1”äò≁Ó;a[œc1Ÿ—C±#ØFÔM´‡ãN’'èf#¼_ôêf!nAçAÙÑéÙášÂ&p7ÄݦM6‚•Em*^‹fé(1È™”ëëL%kkXG]°Y`’81W¯ëԍ¢×–n¦ÉÒM' ×&˜¤Ÿø“,%ײ«Qç‚=;‰˜a&q²¥åqÏZ•–ì㔛ÓÄ~”5¿Twfy¸Ø›vwô|¡á9ÊŒ0×¹3 ¿Ý^Ýùd€uh“ýÑC¹†þ€j±‘³Ë—MÐ2åþ1ÈY8ò[ÝxÁñÀP3)A‡#íAXϺó|=÷³·ˆ«ñÃ幫{L˜!Ùe¬„ÎóƒÇP…®ÏA›9>eʧIJĹ3Æ‹PéÚà¹ó…B‹ÄÌ4Hl ™X–¾ÅÒ·;'‰ù9màÂ$Èàùyͅrè;h¾N!™ñl†0¸;•…Á(„ŧð8ʑv”=^z pBŸŒ{—Q¹Z/¹· ` èû¹7˜nœ*Ô?ÙFԏۦæa5ݵ¸Lh®—ˉyilÛ‚9™ ¤S÷ëýpá ÷jÝg¨;îÝ  Nc7u¡{ϵPõ0‹ ò +>G6T̓`ñ~ׅ.äÓë6A +Ró'/»üÖd‡—â•nfè7ï—áÕs²X&óÛ[šÏœMݯ>¾[ÑO<7š-¿¶ýÒªÜquWŽã[v´ïôîÙb–,æKty¬™,9ˆŸ×g¿žý ãæ=endstream +endobj +560 0 obj<>/XObject<<>>>>>>endobj +561 0 obj<>stream x•TMoÛ0 ½ûWð˜¬ÚŽã]‚$]‡Y¡véE¶éXƒ#e’ܬýõ£œ ­klXaĐò½Gò1¿¼zBH#˜'Pí½€g1‹èÒ9¢Fh¼uá]ßæ¦P4”’d!5Px@QÍlÁ`£j„ªåšW5X^vxUü¤ÄBŠw‰~”²„RgԖ 5·ŒÕ}e{8ÑÕh*-J¬¡|†=ri@5°zØÜݽ¸X!w*%éø–Ø0(Z48@Ùv@Äᜪ"âwÁŸœB*ޏ»ßû|@⶝°¶Ce-¸„^±“¤KH‹;Ô.קҨõ,dàît½pÝV¥zi~ӗoê<¶¢j¡Q]§Ž#˜h -sC0êõ‡%ͧXkÂ*{œ…mA¬P’wgøû@S0T"7`5kðÐz¨ÅNXóx5’O)^FrUÓ´`}{ÿ}»òÆ^Hn‰ã4Ëùè}»¿àI%ýô† ç¬4ÂJ¦X%Ð_% î;wâ4¨7 ’h8(çÚEëCÆvž¸Ê¾iP/—Ë‘ÐlŠ±…åŽD;âæ5¬Àÿ`åS¬d¿/I¹ð‚%d£ôž»é¢A»u½KØâìêà„w}›—8\ä,ÌsˆÂa_V_×+¸Á'ìÔµ/½¨‡¥óÃ4c Eúi» ùç¿DœÆ,M²k¸þ|.¼oÞcÂ`endstream -endobj -604 0 obj<>/XObject<<>>>>>>endobj -605 0 obj<>stream -xVËnã6Ýç+.Ѕm VüªL1‹™ AÈ¢E Ì¢ÚÐm³‘HH'ñ|}Ͻ”,ÙNfš Kä}œ{Î!¿]i„ï1-&4SV^’MïfɄf· ü?ÁO¥i-/&ÓÑå‹ÏË«›‡;šŒh¹F¬ù▖9!ÎO²þýV킮hžÐr«É—«$svMkSèÁò_Ù;^ĽÃ)'^æýy2NèQ¿šLôɪâà«g4׫'‹dΫ?+Ï ‹Ã5¤àÈd<í*—iïuNΒ¢ÂXM«Cý[¼T„æ7èö…ÃN{rkYãLyYéÌm¬ùŽP€\ʈ†ãi,·¨+U\éw4›öwªR¥O²tðÜádžÌ¤ÜBÙ§:ŐQ–'@”±ÆnPlq —­ ÚïT¦Þ>DÏ@3ïþŒÇä÷®,µ gWzc¬Ä{1aK¿P—"¯K3Ì\HÞ¹½ÍɛEѽßzü´÷K/œæ\æý[gÁ ÌV«¡^OM?gé²í´%ÿmÏ`¯*•=éÀÿ¹H5½Lõ'ƒ©™E?Ér '}f[ìÈ°!AŽ%8‘ëµÚ$s’N€Å¬Ãɯí xãÚT>PxqB„­²yè׬Ø{ó¬1ªÈ:çÀ5Ï0ېuA]e”@¡·Â1…“‘uÀ… ê°ÊgÊZ$[»Šßt)4¤} `D?¢ÈZ/7¼1Ûî†gUìÏRÔ#:ËG)¡ÓHâàž´…•ˆ08Q§#ÎÒ qÒ~ð¸dµ$ç¥ §Xà £Ü<›œ1ª\‰¤(ÀF`* ß -a÷ê}ì §Ù¬Æ"›Õp:ŽšdÁ¶þàùŠ×ôõ(AÎyópb<¬Åv» ä¤<ÁŠèÈ@û"ÀN˜#F³#6q„õXsc÷Á4žþ夜à˜½íCxÌlyâ±>ëj¥‚)¥NA,Λ]ˆeªªŒÚh(ì+{Æücy>Ž½Âد…zØ­‡­¶Ò¥{ÖùE—mzx„‘3÷úP)#B蠉²ëhQnq(­<9䤪 µU›¸EWo€±«·G°Žîq»*N~Cv5úÓÃç”-Ì_/lYiP?€Ú,̬rq ˜¦WÁ'X5óW8—|¡üö=°#Öiʧ–ÝBȦbžlô{qmZÉIÏŁií!-@† ð_jÙ)œ4iß:;lQ‡–“nù|Ö>ì”Áa~rNr5ŠŽ-ÉåȾé#¯õÁøb `Ɩ¼‰W*Îïl¦‚³*E¹M°¸³}U5׎÷ÎÀ„Pš~U%—{ÐÍÈîšëÛ,z/Õ_R}”êÇN+Q3>TÌÍ4m&3JøžÙo6K]<ғÒ§’ãW·/Ø AhŖÍAß+íÿ”ÅUü°‚ÛöÖ:«ï¸÷?¹Ï³d1¿÷¾É˜Kü}yõ×Õ¤ÿ¨ endstream -endobj -606 0 obj<>/XObject<<>>>>>>endobj -607 0 obj<>stream +sC0êõ‡%ͧXkÂ*{œ…mA¬P’wgøû@S0T"7`5kðÐz¨ÅNXóx5’O)^FrUÓ´`}{ÿ}»òÆ^Hn‰ã4Ëùè}»¿àI%ýô† ç¬4ÂJ¦X%Ð_% î;wâ4¨7 ’h8(çÚEëCÆvž¸Ê¾iP/—Ë‘ÐlŠ±…åŽD;âæ5¬Àÿ`åS¬d¿/I¹ð‚%d£ôž»é¢A»u½KØâìêà„w}›—8\ä,ÌsˆÂa_V_×+¸Á'ìÔµ/½¨‡¥óÃ4c Eúi» ùç¿DœÆ,M²3kîúó¹ð¾yd`endstream +endobj +562 0 obj<>/XObject<<>>>>>>endobj +563 0 obj<>stream +xVËnã6Ýç+.Ѕm VüªL1‹™ AÈ¢E Ì¢ÚÐm³‘HH%ñ|}Ͻ”,?’™&ÈÃyçžsÈoWcá{L‹ M甕W£dDÓ»Y2¡ÙíÿOðSiZˋÉttùâóòêæáŽ&#Z®k¾¸¥eNˆ3“¬¿U» +š'´Üjòå*ɜ]ÓÚz°üWöŽqïpʉ—yžŒzÔ¯&S}²ªØ{ããêÇÍêÉ"™óêÏÊóÂbM)82O»ÊeÚ{“³¤¨0VÓjßüÅ/¡9Å ºº¢°ßiOn-k<‚© /+¹5ß +ƒKÑp<åM¥Š+ýŽfÓþNUªôI–>ðb€;œÌ“™”[(ûÔ¤Ò#ÊòH‚2ÖØ Š-öô²5AûÊtÂۇèhæ}ÀŸññüޕ¥¶á,àJoŒ•x/&lIãêRäui†™+‰ãÏ;Wۜ¼ÙXÝû­ÇO{¿ôÒÁiÞÉeÞ¿u ÂlµÊšáõÔös–^!ÛN[òßj{U©ìIÎøÏEªéeª?LÍ,úI–=9é3ÛbG† r,Á‰\¯U]DdÌI:8v³'¿vƒâkSù@áÅ ¶ÊæX _³¢öæYcT‘t΁kža¶% ë* ƒºÊ(Bn…c +'#ë€ tÄ*Ÿ)k‘lí*~sL¡!µè[#ÊøE†Ô!x¹áÙoxVE}–¢Ñ9X>J F÷¤-t¨D„Á‰:Eq–Nˆ“ö üƒÇ%«%9/•9ÅxgåæÙäŒQåJ$E62Sé4øV»?PïcO8Íf5†Ù¬†ÓqÔ$´õÏWD¸¦¯ rΛ‡ãa-v ØmÀ0( 'å VDzØç™{`¹H;í§Z×6ê(í{­)c6¤ýé}:ÀKðLï3à ×±úEøsHÅzJS E‰Õ¶ïQœð•qZéL՘“ Ül0k¹I0ÃùxxU :¦‹áœãÄ•‡èX$}l“ãt&€ÀрO]å 7kyÍSï¨"¤¥Rí[£$c¡!Øíqބ>ùÎ:‰­Ï°÷ó~ ~FžÌ•;H“OވÉãèˆ=P=”ܺý‘^ZKÿrRM pHÞµ!4f²<ñTŸuµRÁ”R¦Çͦ +À2UUFm4øêʞ×Þ:œS¯0õka¶Fça§­téžu~ÑÑɶ=<ÂǙúŒ|¨”‰²›hQmq&:9ä jü´›˜Å±Üã±ÜA:ºÇ1hl Tœ4ü†êjô§gÏ)Y˜¾^ȲÒ`~³Y—Yå<ã0;L9®‚M°â¯p,ùBùí{`G¬Ó”-9¹…mÅ<Ùh÷bÚ´’ƒž‹Óº3Z€‚÷´ÀiT§pФ}ëì°CR>±£óYûpPgùÉ1ÉÕ(:´$w#û¦¼6ç⋁|€;ò&Þ¨8¿³™ +Ϊå2ÁÚÎêªjoï = 4ýªJ.× ›‡ݵ··Y´^j¾¤ú¨ÔG­DÍøP17Ó´Ì(ákf¿Ý,uñHO"HŸrH.Œ_]]°‚Њ›ƒ¾WÚÿ)‹«øa·Ý¥uÖ\qïr/ž-fÉb~¯}“—øûò꯫ÿ§j§òendstream +endobj +564 0 obj<>/XObject<<>>>>>>endobj +565 0 obj<>stream xµV]oâF}çWÜ7“¼ØPC¶›H¤MV•²Y­–Vª–< önìê±Ãf«þ÷ž;c‹š>”(‰±ïǹçÞsÇvà' qHÈâ¼3ð…CD£É×!~ IKû |}ñàzÖys;¢  Ù±¢É˜f !Î`@³¸{¯KIåZ”ø#Ip´ôI’ÙˆXZê,ÓÛT­ø9mu‘gÊ7¼2o i¤*›çZՎ´åVJÕ“PðœããÍþè ¨ ýPº©²¡K½¡,U²G›¬2öÖRW!C,eÒdp¶i¹ö¨ö42ÖÎÎ>Í»¿KÓ£_¼œb]퐥*NQ¦Zùó³BH@¸ƒ+ÌÙº²&¯E!âRÆ2’®”.dBZÑ"êÑ&Ã#¤ȗĥ^"Hž#ñi¶–ÏÖ÷\«ìùüEÑ(J¯Tú 1¹T‚*œ¹Aò\"»Ëã³ó›Û €–›ØxäþÐ'‹ÿ§}üŸª´x4Îo×ü~ÈÍozŽF·Í•_E¾Éä[ç1 ‹:Q8r‰¨þXd¤€Ž.ióId:oç‚æó¦Ø?á|ìûݛ\º-ñ€üºÜ}؇£”§I’Iç“:Wº?cï~=†5ö[UkÒ°iò…N,!YHm°Ý¦:=NDïØúª©ÿ¿½¼$ú‹ÞÕå\Ñßtóñö¨žÝóÆÙ:6·É ÐG²…·{Ok½ -ï‹G÷Ó7„Q;öyÖù8ûK~›ÞýzC÷wÇZ¯…Ic‘eÏ<Þ`+—Bñù)JvÀkC¿9æDËhMPµaÆ¿ÉB¶LŽ®? |´!X#(bãL1ƒPÌVÒ£’[›e~fAox£HºOœ_Û#~Úæ{¹TêÚì’;¤ÈfĐ9n&õkNðÃЏ..(nÈ>O?\Oégù$3½áCý}³S?O¬m<À¡—t_q¤ŽÆ#M\¹aÈanfO»Ýšendstream -endobj -608 0 obj<>/XObject<<>>>>>>endobj -609 0 obj<>stream -x}SMÚ0¼çWÌmaÞ|‘À¡‡ ²½ì®T5Ýã8à6ØlìÐòïûl@»¥RE -ö{ófæ oQ‚˜žeŠ¬€ØG1‹Qd+ÏKúNéí%Úp1+fôóæbYG9’uëAŠy‰ºÅ1j1ª`¥pÊhì$ode¡©j•l°9k˜ƒÔJo±é¹ø)5p²ß+ÍݹÈí$Dgì‡*†z'Çõ(Æ4ÉXJcGRû"jy©žWïs,|ÿ…ó=S"|mÊüLӂå§Â÷|/‰:¥¥gݨ#o ´3àç ž(Çkõô}èà¾U½u÷oï`ՖÄé0=ÀXéq´7¼=½@¹íÍ>”À ŸžÁߖphù+ Š -Ïu=zyÂ'Ü­×ún=þGi~Vúð¸@B:[<Ã4Ïiß$º`)KªÜY¿eÂ}_0YúýŽÈz_öaÚÀXݪ-ZÕ»86ÊaЃõN¨'3€S˜¿²°“¿'8q!&Tiž@:Á°4nç6®yw²êÖ®õÈ -®}dÖã–+}kúý97a$ƒá•wƒ´Ag(‰ ŽŠƒ†t -™KŒèœöT~–=¿ä:)ç¬XiÙ%gߪçe…Ïò(;Ênoñe lø¦éµvZƋÿºš—9+‹9ýÉÏ4óÍ«:úýq&endstream -endobj -610 0 obj<>/XObject<<>>>>>>endobj -611 0 obj<>stream -xW]oÛ6}ϯ¸00,\%vÒ8¶kѶ¥[\ô%/´DYl$Q#);ú÷;÷Š´]µ†¦@"‘÷ãœs?ôÏق.ñoA«%]ÝPޜ]f—ôææMvK×·+ü¾Ä§©” y4yñv}vq÷-/i]ÂÖÍê–ÖÁÎ%žäçï*Õíh•ÑŸ:¼½x$Ӓ¢­y¡OÖÕÅ«õg±°X^_]gKØ8_e‹ŒîÛàlÑçÁØvœ A·ìhÚö7®yÊÒ!q@Â«”_‚'äÛj@ºK^˜ÁSüÅß*[fôÑkתFûÿ_ j³Á润 -AÚ¶òôšúhƒýæº ½WïëtËÓÓ¹ïóŠpùÝÃßï¿6?þðûÇǧWp±ÓÔÚ¯,3 ª®á`„ ´Z±øŽNòڀWÄW2„ -@6] ¹–,Oø}:ï” &ïk ¸sÂÑÉyÄœ3¥q>ÐNÕ¦€n˜Ücx`†5vÚMy•Rð:ïAìÀ2Þ(¯ èÄömq°qÑ)ï÷Ö`ž2úM¤Cûªïë€HöÐdJtP\;D)%Ýú~ãƒj¡Ô+N„ž2‘2ñ\H¨•”m§qCáŒìµBõŒ6ª5¥öدëzd¥â Ë<æÏ)‚š™¯¤ôN×3¼Šù7¶Ð\=cEóÕB—ª¯Ã$>ÇbáªË-’@:3VÕß° -({ˆc ÒºŊ¢5pQĊà_ÙàHT2ï¡ÿ‰wq;¤4oƒ4ÉiŽ´ Kžx-²ê8i47Aû)š÷ßE„Š‘¶Ö5’©r‡Ò‚m>7óÚ{nZ^‡¾›”?§ $ZX\‚J&Éø¾ë¸\Qyn›1²~“ग¥à¤Mù|‹éàm/xöžoIÁiÄP•X)¯àk’þ$÷ÝÃbã´Â†îã÷‚ŒbŽi$6í`Ò¸Øy,àÆ`±BŒÃK{ž¸î‰–ÊÔÒ4I>ôeÉjÕ¤À6…}ËvòyTT÷méB[§OµyÆ&Ѩg= `ç‚Q€tâ]–g$=g¶Un.înŸjW—ãÓÿû¼^]g«›[|Oâ»gyÍîÞ¯Ïþ:ûu´ìÁendstream -endobj -612 0 obj<>/XObject<<>>>>>>endobj -613 0 obj<>stream -x}WÛnÛ8}ÏW ò²i‘(¶ãÚÉc/é"@“tkw‹y¡$ÊbK‘*IÙõßïRr¼Ú`8H$r.gΜÿ:™Ò?SZÎèjAEs2É&´X\á÷üz‰ß3|œ¤*¾˜Ïn²ùK/n&ÙlüüÝúäò㜦SZWð±¸^Òº$؟Lh]œ­k »/·Ò M­õ^å¬î‚²ÆS°jå©u/šsR¦Ð]©Ì†:/¤F´-œ“0%UÖüVoe¡*U¼Zÿ8™ÐÅô -®Ë³Ã5œ¤V¸ ŠN G¾F(>ãӗohŠ`9ꋫ92ƽe6Ïè³ð~g]éÓ±çä.fËlÁÇî…ÙÓêþZIpPzÿøåö󧯫s”cäÍæ[e;ÏVL™?ýè|ˆJ!s·'gQE#9b¥QÎ\£ff€;[$p¿õû&E„ yÔVf´.U,:0šú-ËtêØßV†܃3cW+Ñä÷ø¶TØVÒN…a–|Oÿ…Î3<Œäéà4¨ªOɶLOÔH5l!OÉ0–íÖrŒYU¡zå!Ëä²kÅA†DWœ0]“ý­RvŠ±‘þœÀW÷RT©¨CX#Ç)H¡µÝ V)°s+´BÅ8™­è SoDQ£rôtö­*pyŽú¦Ììe=½zXZˌÛ6i -·O˜52Զ䖜ÎQ«dô`ƒÄE…os•Â`d”Ö‘Iû^Îz[22 Cré´e”Á:Ì×Ç|¼ÿòýóúîñ! H¯aÝ)%ÜëÿÕº7}²£ÈAËøAéVbÐ6¶Ó,›A&âŸ$&?eÔÉ O;©u±—E$gÜ0Q–c^­‘×p™™èIl~D¢3%:EЇÇÕ%ØY2Å¥Ù*g Ã5§éУ:ø̟€ôgð; Š# -ˆx g>šB«Ÿ2õûÓ+*jk“RØHY®ƒJáPïÂýt†c9FhÏB÷ïlÂX]A(Œ:Ÿ›c8 ê2ÁðÒÙ­â(WazÒG4m#~ðhK“•>²±´>ÚòQûò(‘‚®fl)uڍ‘%"u¬7EM¼÷Àƒ<éä(ï"¾#’&+ç´Q[æw=p3n–AÅÐTºòøévö<-‘lo c/5H‚t‡X¢•( #ßLpXà ¬5˜ž(~4g֖XÀ êÀЀJ­ZX,= :ÇÑã“\*ƒpR*qN`ïp¶u -yÄ`}­*žÎ‰Û£à¼”M¬` €ÁƒoÈmœöh‡;ƒ«.°|@_=K2–‰…íT(QÞ=e >! ãù5:}nc–ÜNí-äBÆá]K9ĺÛðúr iI¥ ïa>/XObject<<>>>>>>endobj -615 0 obj<>stream +ï‹G÷Ó7„Q;öyÖù8ûK~›ÞýzC÷wÇZ¯…Ic‘eÏ<Þ`+—Bñù)JvÀkC¿9æDËhMPµaÆ¿ÉB¶LŽ®? |´!X#(bãL1ƒPÌVÒ£’[›e~fAox£HºOœ_Û#~Úæ{¹TêÚì’;¤ÈfĐ9n&õkNðÃЏ..(nÈ>O?\Oégù$3½áCý}³S?O¬m<À¡—t_q¤ŽÆ#M\¹aÀanfO±Ý™endstream +endobj +566 0 obj<>/XObject<<>>>>>>endobj +567 0 obj<>stream +x}SÁŽÚ0¼ós[X7 !CAe{Ù]©jº§\Œã€Û`³±CËß÷Ùí–JU)Øï͛™7¼bDôÄÈÌ3ˆÃ(b²yÆ2¤Ëœ¾z;‰&\,²ý¼¹X—£‡ÇqŒ²ñ Ù2GYƒ€¢¥°R8e4ö’ײƒ²PµÔN5JÖ؞Á5ÌQj¥wØv\ü”ŽŽj8Ù”æn(r{ Ñû¡Š¡ÜËIùcaÏYBcÇRû"jy)ž7ïs,|ÿ…ó=3"|mš3ø#:™%K=N#ïøA ´JKϺV'"^CigÀ‡ ž(Çkñô}èà¾Qu÷o=oaՎÄé0=ÀXéq´7¼=½@¹éÌ!”À ŸžÁߖphù+ Š= +ϵ¿<áîªJßU“”¦ƒÒ‡ÇbÒِàfiJû&ÑKXÌPlMïý– Oô}Áduâ÷;&ë}I؇icat£vhTìâØ*‡^÷Ö;¡œMNaêý~ÈÂVþžâ̅˜R¥5z +éÃÚ¸½¿S‚Ú¸æíÙª[»ª±\ûÈT“–+”]cºÃ›°F’ÁðÊÛ^ÚÀ 5”Ä'ÅACÚ-…ŽÌ%FtN *d//¹Žó%ËVdÚü’³oÅóºÀgy’-e·³øÒS6|ÓìZ;Ë£Õ]Mó”åْþ€äg’øæM9ú:úqendstream +endobj +568 0 obj<>/XObject<<>>>>>>endobj +569 0 obj<>stream +xW]oÛ6}ϯ¸00Ì\%vÒ8¶kѶ¥[\ôÅ/´DYl$Q#);þ÷;÷Š´]µ†¦@"‘÷ãœs?ôÏŜ®ðoNË]ßRÞ\\eWôæöMvG7wKü¾À§©”sy4zñvuqyÿ-®hUÂÖíòŽVÁΞäÓw•ê‚v´ÌèOÞ><>‘iIÑÇÖ¼Ð'ëêâÕê³X˜/ ¯¯o²lL—Ù<£‡68[ôy0¶NÞÐ|O.–Ù-Ÿ\UÆ~ùʺ@…ÍûF·B¥ð—ö¹3íÉÛF“-ñXã¸ïñHNä¶-ÅyEO¼%ÓtµæûŠ½~zD;#ÕJ°Wôz~=„XÙ==©f£(·¬íM¨Øz“ѪÒjԁ*]wÔi ›´¯,)àY[ûlÚ-!:6ýóë_?¼. +fœÚ˜Ú„CÆùÂÙâ6»á,í|8‚n)ØÁ´í9n\ó”¤Câ€:…W)¾OȷՀt—¼0ƒçø‹¿e¶Èè£×®Uöÿ¾Ô:gƒÍmM‚´m}@TÈÓkê£ ö›ë.dô^9¼g¬Ó-Oë©ïóŠpùÝãßï¿6?þðûǧõ+¸ØijíW–PU×p°BZ­X|''ymÀ+â+B ›.€Î\K–gü®§rÁä}-wN8:;X˜sæ 4ÎÚ©ÚÐ “{ +Ì°æ€ÃN»1¯R +^ç=ˆ=°Œ7Êë:±}[m\vÊû½u…§Œ~éÐƾ°êûº ’=4™ÒÝ×¢”’n}¿ñAµPê'BO™H™x.$ÔJJȶ㸡pFvƒZ¡ÆúF՚R{l‚×u =²RqeóçAÍÄWR +z§ë ^Åü®ž¡¢ùj¡KÕ×a”Ÿc±ð UƒåI  «êoX”=Äq ÒºŊ¢5pQĊà_Ùà@T2ï¡ÿ‘wq;¤4oƒ4Éi†´ Kžx-²ê8it o‚öc4¾‹#m­k$…-Rå Ž¥Û|nâµ÷Ü´¼}79*FH´°¸•Œ’ñ}×q¹¢ òÜ6bdý&ÁI/KÀI›òøÓÁÛ^ðì=ߒ(‚Óˆyè2gAŒü¢Ÿ’ø6’Ë—þ’²¢ôh¶+¨ÇZB î¹éw)îò Ùæ#§…)Kí˜ÄôKð3ˆSíY‹ÉсZ 2‘Ýz°[ Nþd…$€Ì²ëXÓÜïÏØ7’#q|Ŷì*¦ÃI,T*šÔv»ÅCÄg'rÉ®§kM£ÍÓ'ÓvïYË¢Â1´) +4z”ãPfííˆÆ=ºSÉ89CŒž¥Ð5%ì³^ÄDÇÅ`a†W`,¶Iɹu“rä<ÙãP0BeôK7Hp…àXíùÎ+HMZ*È£w9USÙÙbˆ4a:æ¬ÊXé;…iÓ¨ÏV¦âÎ15†Ã£h£\ÌëMó}£:ˆ‹ˆM®àWäØ|°îÈ 0¶ ˍåhc P¦ìÈëin‹²Ð 9îTÃv ëWs I5¯§Ã!†Y@‚€v‹Õó ¦®¨ûï¬1×Ýl_û[Re:õòþ›‹$k°id}ApÅhGI{G”ŠWÒ('ÛþöG KÈFç +÷‰ß–ßØýСKD2IÒ8«R,ŠXjfLo©ò0ãõåÀûÃÏ×ØƐ@Ús"槚„˜6XR¶žúŽ7!¬¼NÖØŌÄhf:£Þ –{ª_/¼<µÐÛ%Ûñö&>Y©Ãô–Ê’-Xðç·#Îá +6ÞQµÂf c‡Ã.hÃÆ +"3æP<ì â Nµ9KŁkžXòÜkî|c=}KØ°ô×Â=硍Óèõ[ZÎ``Ÿ‚YE„áXR§.$3Ü)¸+ÎY >P•X)O¯àk”þ(÷Ýãbã´Â†îã÷‚ŒbŽi 6í`Ò¸Øy,àÆ`±BŒÃK{¹î‰–ÊÔÒ4I>ôeÉjÕ¤À6…}ËvòyTT÷méB[§OµyÆ&Ѩg=`ç‚Q€tä]–g$=g¶Un.ïïNŸj×WÃÓÿû¼YÞdËÛ;|Oâ»gqÍîÞ¯.þºøuªìÀendstream +endobj +570 0 obj<>/XObject<<>>>>>>endobj +571 0 obj<>stream +x}WÛnÛ8}ÏW ò²i‘(¶ãµ“Ç^ÒE€&éÖîòBI”Å–"U’²ë¿ïRr¼Ú`8H$r.gΜÿ<™Ò?SZÎèjAEs2É&´X\á÷üz‰ß3|œ¤*¾˜Ïn²ùK/n&ÙlüüíúäòܦSZWð±¸^Òº$؟Lh]œ­k »/·Ò M­õ^å¬î‚²ÆS°jå©u/šsR¦Ð]©Ì†:/¤F´-œ“0%UÖüVoe¡*U¼Z?™ÐÅô +®Ë³Ã5œ¤V¸ ŠN G¾F(>ãӗnhŠ`9ꋫ92ƽe6Ïè“ð~g]éÓ±çä.fËlÁÇî…ÙÓêþ-ZIpPz÷øùöÓÇ/«s”cäÍæ[e;ÏVL™?}ï|ˆJ!s·'gQE#9b¥QÎ\£ff€;[$p¿õë&E„ yÔVf´.U,:0šú%ËtêØßV†܃3cW+Ñä÷ø¶TØVÒN…a–|Oÿ…Î3<Œäéà4¨ªOɶLOÔH5l!OÉ0–íÖrŒYU¡zå!Ëä²kÅA†DWœ0]“ý­RvŠ±‘þœÀW÷RT©¨CX#Ç)H¡µÝ V)°s+´BÅ8™­è SoDQ£rôtö­*pyŽúªÌìe=½zXZˌÛ6i +·O˜52Զ䖜ÎQ«dô`ƒÄE…os•Â`d”Ö‘Iû^Îz[22 Cpé´e”Á:Ì×Ç|¼ûüíÓúîñ! H¯aÝ)%ÜëÿÕº?3úh F‘ƒ8–ñƒÒ­ Å ml§Y6ƒLÄ?HL8ʨ“9žvRëb/‹H>θ `¢,ǼZ#¯á23ѓØ"üˆDgJtŠ ÷«K°³dŠK³UΆ!jNÓ¡Gu6ð˜?:èÏàwGñ@Ï|4…V?dê÷§WTÔÖ&¥°‘²\>”¡ޅ úé ÇrŒÐž…îßل±º‚Pu>7ÇpÔe‚ᥳ[Å P®Âô ¤hÚF|çі&&+}dci}´å£öåQ"]ÍØ +Rê ´#KDêXo2Ššìí¸…sç+Ur—ƒƒÀ’çC¾6©:==¢Ó1öKÊ*Tw¬XqÀT ëíÏ¡{ªœmŠ¿ÜõZ2,q¼.üPZGN$L@m,FX?ýÞ”vŒ1RGõ õ\±ÿ4$v +%°ÆFW ä>‚IÓ1:èƒE*”þŽÅEôh»}Ñ(GmÒªù£‘¹Ý¯‚ h¨ª´ÌÁ…Ù[¨ˆÔ܊Nq#0Sb²h˜ØÔèý˜o<Þ°‡‡~3 + +ø°«>èCèÁ_lri†ò6 P Ìü6®%\Ë^X÷°û¨Š´Ãe[Ê{ÌÜK°¦ïEçdŒK½>˜N+Kœ½¢^~¸î¿·L—×Ùâ憓k^ïWoîß¾¡÷¼bmtžþê°­s<Ãɋåäæå/ óå<[.®ñ­–fs¾u»>ùûä7BP…endstream +endobj +572 0 obj<>/XObject<<>>>>>>endobj +573 0 obj<>stream x}W]O;}çWŒòR*AJ MàåJ|^U*ЖTèJ•®œ]oÖe×ÞÚ^Bþý=3ބ°ÀUÕ*õڞ™3gΌÿìŒèF4=¤£ eõÎÁð€>Mñïø˜ÿ=Ä_¯©ビ·?ŒÆo|8›í|º:¡Ñ”fŒLŽG4Ë h–íN‡“!]h»¢k—ëðqöÛÇ4Â.Þ¾ˆ 8°{_jKŠî®Ï(«Œ¶‘\£mÀRa*M&’  ç±Ô(MÖVÊÓ ç»kÜ= èh®©©T¦sr–b‰pzH³R-»ÄØ Ùî¯Ý‹Ë›þ½¹½¹Ü#ùùãòô¢ûyÿãËl½|úõk·zu~FÊæi÷Åíݯ™bEËREqˀʢq$”®­rvPU•[ÂÃù @@ -1240,10 +1129,10 @@ x}W]O;} ¥‘òc±4Šõ§o÷0TÛyé8°U¸0ŠÂXS4¥=¬^ANÃó šœRl§²XMmLŸ3Ä»¡Sq…BÍ:¡Ûdˆ{aˆ*¶ArY£À‡G®ô•!EÆtÙ#på䳔‹°æhˆÿTUÏ5¨Qãøœ{Žðµ‰ ¥‘Tîó5 ^FáOêy Ý% ¨ڎ& èžá¥ó˜åæ:.5(P« êÌs71ôLšVԟd”5–÷hÞrgë´ÖÄ/•Xd “·é4*-±2NtvŠcBþnïàKk»ÊÕàZŸÔ7duHÅÕ_ .ž^²‡— —fÝ­A ÆeiÐZ`nËáD¹¤$À™µÀ•0&tyÑ̗ª÷ÐÍHû JÐ]o+¸à)Ó>/XObject<<>>>>>>endobj -617 0 obj<>stream +574 0 obj<>/XObject<<>>>>>>endobj +575 0 obj<>stream xmUÁnã6½û+¾4lÅvÛ9&»I`½íÂÚC.”4ŠØH¤JR6¼_ß7”ìÍj‹ ‰M9oÞ¼yüw4§~æ´^Ð튲z4Kf´œ/’-7k|^à×1£ÇýèæyIó9í YmÖ´Ï á³í³«ªSE¡T|[ì<ÎÖXўgӊë ÙP²#Ïî ¾ÍJRžþÒæëžrk~“ÃMc] FĉÊi´5d‹~)SUu½ÿg4£éü0÷ù•29é@%®RUm} Œ]PÚT'J™ )*Yå*+Qˆu´ÝQŽû+ÛŠ`/IŽêRæ’o·}$Ɇ)K9æ=(])T–ô‹U²@{TÉr€TjÛ@«;ÛP%YÇ$ycUž´ÁåS¤`3[ÑëH3ož*ý·À“ DG§¿^'´³5å.óŒ[³ªÍ™ÊÖäŽs/Õø6­É„M¸+8…‘¶l ÄͳŸ#'ŠÏÖÿé´ ßòeö+‡{«ŸL[ ¼‡ª’¬À (Ôᥣ ‹M‡ rš)CY©ÌGŽê$ÿOt´î=¡­2ø.‡sûõ—r‹¤hµAgëN+‘f?ÆUhۇë}pmZÇ}G s.íOǺá¼F!÷2AU”¢…‹_“Kã>¶õÂnB/!´Èpƽ¥B¹×ëžéfׁŸZ“ÐÓ’ÁþÃH (ÌÝP{þ¬uŽM@æK%m#µFиü˳;_Œe6£ì&t,5æã*1Ö0¶ƒ Qz’!½¿pÄá½MîúÒfïÏ#ß©96£3Õ¨TW:hF @@ -1251,26 +1140,27 @@ xmU ¸~ˆI&®"õÂ?|B{qž’«&Žx-2’ÂtÝÀŠÀÍÅWþo käÅ|hvCº÷qԑIUè¯:[u(c>q‘X\֍<†9@ßüÑ Õ²;‰"|ýbjí»DA1ÑH`tښDS(`B±ÄÌJýµ Š Ê\á[ö˜bV˜ IagèZ½iaaØt欷EÀ,dt  Uó°áRJ8 ‡>½<ï ïO¶®aÔ/&0&)гÆ\îN>0 !"-Õ¢jÓJûÍC#;f }át¿Ä9Qø ft–†÷2¶OÏVn³VzêÏ4ööëƒÆüÂû}dí]Ü´`Í —J¯À -xdWpN¸·¼(£8”ÐÈl¨ŽƒJ¦HJÅÄ' ±ìH.BTÑÍó¦NçëM²º¿§Åf%ÏÇîaûø@Ÿ>/XObject<<>>>>>>endobj -619 0 obj<>stream +576 0 obj<>/XObject<<>>>>>>endobj +577 0 obj<>stream xWkoÛ6ýž_qç 8®íºNZ`Öu M·xø %Q6‰ÔH*ŽÿýÎ%)?”ÖHä}sϽúçbJüÒõŒ^/(¯/>¬.^}zK³ ­J¼Y\ßЪ Éx2Á“|øëV4^ZºÓʊ\é 9Qg‚ÜÞyYS.ªÊ½\}‡‘9M§ÑÈÕìf<ƒ™áj«•ª’TH—[•IG[³#o¨0tf„<ÌK2šî‚}Ù{O¦õ´Û OÊ;\âvÖè âaãø§§ÒXbBWÓ×ѵßJ*…ÒžLI[)¬Q[ª¤½iIXIVŠ‚íy6„óúð¦±&Yµç°i…—ãd~¶Ï9³_rß"õ}‹#Ž2QðöÌÿEf$ÕâI+OδºÑ÷Öyä¡/=ÉÇFæ>œE– ‚Cҙ¤i÷ÔXéýžÞ]­_ö\ßޏ``§ÃéÖ)-Ó­FñÊ`,SŃÐ^làO[­b¡dž Š÷¤QdT(7µ¤òÛ0ý’„Z¯*…È‚ Ü3;ê†Øk£•76X;åG:‹œÌƊšACYPú#ˆòÑ[YK„Âm~h!³v³áwB£Î•3€µjØä¼Ý(ÏX³GÑk xq >b•xD:ÖLƒ9žµNö2NI05Ù‡ù(4,;%BÕU ¯À\Óð×çÊ d8±$©+!bâþ‘ª,¥•`kˆ é“gñr™>+ݞ`‰¦H&\h Îw×ê)ßµúöŽæ¬éx½Iò=ìÒíëú¢Èþà¨Ì·¡+mu£`ØѱíÆņ`"T3è:ëBÑ"=ÏçÛgõB°QÌ î?f# ìXiT¢#ƒ\ž¡ŸÔ­WæN}¢"s±ÙjÙV~LßXt!leÂÌk¤†RjDÔ];4ÿӀGµ‘ž*ƒ€Ž±÷¼§Ìƒn•*8’<,°´3°’@іå!Ž·2qháœÛbŠ:³hO”Oú%ÛhcûBFÜzØê Ã"ls¥?=1§ì8r¾Â¨‰˜!>ž}µðØ BÚ34z– dü.^ÐÛn˜Ç)»³ÊËõp:¢´¾2뵌h^yòçgZD+÷° Ì<ªƒ D¤›Âv˜®L©¶aÙ6 EºÏZž¸k ¾ÄÞPŠ#PØ8,“îÒÊðAm; 3CK@©!åZ­Ù·«3ț›<û˜íĞ–ä%¸^$Û¬A&Iee0!/¦¦zOT<‹¿þÊ'ØO\¤œ´èhI¶·ÎCE’%]ô˜ºÛª|Ë´GG:Z~Œç•âñÿ]äېU² ‰´1.!Öϰડ¯Ëç 9Ðh-†Œ†HnAã^T uHÊ+ÛíMÎc¼ÙŽI¡êI肃¸€²cLcb¡k¨Î5÷ÂåeÔSôœçn Ãxd&¾vŠ˜ ›P¾* ¿¾Á–ýþE‚~ M;Ïÿä‚ë6¯ÿïéÄÍÞ¿˜>ëí‹ñqE\•ƒ´µW±0ߎ#ì0BÂÂïFiý:ÝûÂð {xè-æ^ÞZ^gzuLèÆMœ§a¾UUƒÜ6@è“i•Öú D&<~:¬!Å:ύ3Pǚw -º Œ·QɺÉû~Â~ÐóI¾¿benŽ,oÒËþܙ_ÏÇ׋|1Aaf7lð·ÕÅïÿ¥·\endstream +º Œ·QɺÉû~Â~ÐóI¾¿benŽ,oÒËþܙ_ÏÇ׋|1Aaf×lð·ÕÅïÿ¥­\Œendstream endobj -620 0 obj<>/XObject<<>>>>>>endobj -621 0 obj<>stream -xTaoÛ6ýî_qÈ'ˆe[5l¹ÀP$iRؖ51P KQ0Ò)fC‘IÅó¿ß;ÊJ3é`–EÞ»wïÞÝߣ9Íð™Ó*§wK*›Ñ,›Ñb¹Î -Z+<çøz¦zt±M¯4ŸÓ¦FȲXѦ"\ŸÍhSŽomÉ´w)ÜV1ªrËUz·l©T–*G»­Šüžt$ÈYÂ)•F³xTém©º íµÞ=n)Û#í´1§›ï£Mæï²ùÇ¥jc'IPa"7HgLèCóXQ£ž9d‡Ø|™-$öÞÑÖ턖ðÖ6²o= FÉ¡31| OlÙmO7Xùr‹sïº'ùer]l»Hµó¢ëCÖz¶ÀƤځGÄw¢Š ª¤­\³!£k`ñ?ªi Ÿ‘®‘W58}I¢ë `ã–ZöA;›„TTkÝÐÎu¦¸‚ØQ⤲\ dUè;Ñ{…êōsÏèdÚyÔl+á`´…–tnè{BÕå³43:È¡O×&*Gy+¥×mDu¶kÙ÷}=©1nw’¬1ˆ X0Œƒ }UÚLS¸:næïHÇ-˜H;“òP« ɛ°ÕQ«¨_8££'<ô¦µ¤+VäêžÇ`dÑ@j–þ¢X¨ÖG…µšE¸Z ðF¤s€ÁŽ¨é5f- ÐxZñËÔv½¡ ÖX2@YtÑ£‹;¯#+´ü ¼4´•Ù@çZX-ö† ZAqį{Õ<ª÷CÚu?¶“|ћÿ¯VW”ù²øšt~Ÿ¼R:9£Ûow¿Ü=œÑ/˜6º:¿¼¼º§‡ñ¯®£Š­æêátÈ;ÃÒÀXýùËÝíï¿þ ìÿ…üCŒ}¾” ›~lJ!Ïï)´±·ÍP÷Ïäö¬ªI’YŒn1øøï¬Ùgtƒ'uá±UÃʆÿâ¾ÙD¯êõ7†M9†§ÁҖÎ{.ãÛ©Mž^KÌWE¶\¯)ϋÃ~:ÿíâœ>b_LæåS“ -üd¸;YÍÐØj|‰íõE¨Â„"GöÓÛ}(‘‹Õ"[- ,pDåkyuµ}ý ý[çendstream +578 0 obj<>/XObject<<>>>>>>endobj +579 0 obj<>stream +xTÑnÛ8|÷W,òä±l«†­8’4)´—61P—Á‘V1/©’T|þûÎRVšú¥…aX¹³³³³ûm4§>sZåôfIe3še3Z,O³‚Å +Ï9¾ž©¯GÓ«Íç´®²,V´®×g3Z—ã[2í\G +·UŒªÜp•^Ä [*•¥ÊÑv£"?³'Ir–pJ¥Ñl#Uz[ª.hûH­w†›@ÊöH[mÌñú¿ÑŒ&ó7YŽüãRµ±“ŒÆ$¨° ‘¤3&ô€¡y¨¨QO²}l¾Ì{çhã¶BKxkÙ·ž…£äЙþ¤÷lÙmG×XùrƒsïºGùer]l»Hµó¢ë}Ökz²ÀƤځķ¢Š 쫤\³!£+`ñÿªi Ÿ®‘W58}I¢ë `ã†ZöA;›„TTk]ÓÖu¦¸‚ØA⤲\ dUè;Ñ{…îëōsOèdÚyÔl+á`´…–tfè{BÕå“43:È¡O×&*y+¥×mDu¶kØ÷}=ª1n{”¬1ˆ X0Œƒ }UÚìMS¸:læ9ïHÇ ˜H;“òP« ɛ°ÕQ«¨Ÿ9£µ£G<ô¦µ¤+VäêžÇ`dÑ@j–þ¢X¨Ö…µšE¸Z ðJ¤s€ÁöŽ¨éf- ÐxZñóÔv½¡ ÖX2@YtÑ£‹[¯#+´ü¼4´•Ù@çZX-ö† ZAqį;Õ<¨·CÚÓ~l'ù¢7ÿß­®(/òeñOÒù~|ôBéè„nþ½}÷åöþ˜ˆþÀ´ÑåÙÅÅåݏ?½¸Ž*¶š«ûã!ï KcõKä/·7}ø +ìßBþ¡ Æ>_J†u?6%‡ŒçwƒڇØÛf¨ûWr{VÕ$É,F·|üwÖì2:‡Á“ºðŠØªaeÃϸ¯6ыzýaSŽái°´¥óžËøzj“…§WÅÞóU‘-OO)ϋý~:ûx~Fï°/ &óò¾ƒI~2ܝ¬fhl5¾ÀöÀú¢TaB‘#Hûéõ>”ÈÅj‘­–8¢òB^]®GŸGßýQçœendstream endobj -622 0 obj<>/XObject<<>>>>/Annots 328 0 R>>endobj -623 0 obj<>stream +580 0 obj<>/XObject<<>>>>/Annots 301 0 R>>endobj +581 0 obj<>stream xWmOGþίåK@Âw>l„*B€¢âbWi*KÕÞÝÚÞr·{ÙÝ3øK{ŸÙ;;`Ò´ ^öm^ž™yfüu/¡.¾ö¨? ¬ÜëF]ìlÝ_ï%ÇGQ—Ý~—¸•DƒvUЄïSÿ8‰z|6Eývµ=ëE'8K†'x×+>K†½hH½ÑIt„Ó^··+>}¾ÆéÑ1n5w7r{xÏöô†Gü2¬¶g¸?:Ù:~= >{?݋¯FPFÓ9¼ Ohšg±“í_,E奥QDwSú`J¡4ݏ/Þºƒé_áe2l^vúGpxšï¢$¢í­ÉëÌ+£››G”$íÍÞÊqsºTŽr“Õ¥Ôž2£=¤;Rznl)ø)yC•5+•KšMx4öÁùæðQù%f“œ´+•IwH¼ijO~)IK™„á-Ñ¥NÒoŒ„$~"-Lõ3øº[”aϱf3§¥÷Õ»8†ÏÅÒ8eie¦Œÿ.²"ÎÔÜiŸH"ÿäƒÖ”¦kº­dÔªí ,x ]Ö¸ ©2Ω´ì¤“…Ì< À ^Šœ­Áç…5uE³}øʦ¾Dâ­£éÅ8¾CŽ÷J/Üì>ç;N‹9‡’Ÿ›´P á]“•©10Þ¯+ è¡®2Z”ò*áÏ_Ùáäê ˆ»y]k^MX ÿv5W••™žÃ¸¦9⒊쁀óÚԖäS%­’òBa$b‚ȳ‚Cv%¼øœ*ØɌ…@N×œæ¹ «ŀ6ˆÚdÙn@¦£‚%Ò#¥Ë¬J½¥´’2$¢$…Sð/‡}+Î&kJ„!X„K01)ÎSpk‹Î“Fbv°cНô¥Ñ‘|’}15¼-Š&Oa*áy–ƒÍ}ì O¨‰l „dn )9dˆÇÕlP)Ö;Js™TPHœËéí§ëOw‡T8a«, çìÊ­2šZ¡@Vª’.¢—õɵú¤à¤©:s,“¥ ‘¬!T®2:ÏË«…¢-@¥½xyã*°Z:vš‘·"“¡pµH¤åãReˀáŽòB=È* ÂÄåd™VŒ„ÿ0)Î gBLX`m2\•U!SÁó– où´0 -["ÙdÛ&¥Øq?³ëʛ…ìÞ±¸Ös¹‡ MIÔøG{•ªûN,Ä @@ -1279,51 +1169,58 @@ O ÉÍœ(SpQ8Aù!c¸bpdÉ¡`Q–»•tŽ@WkFà¥eïZu lIUû´^ ¢_#›E(ˆLē‹û›ñt>.¿üé¼w¦t>vONo϶×O?ŸŽÏz£þñ÷ÿ[3ôÑҗÅÎ3ØÝ Õ±o@ä×ô†Ë•®Ý¡ÐRiM˜‚ xÿo¯®‘±‹8[¨Nªt\Î]ÜMâê8†ñh(êEÜ폒ïÙûM)¸‰n´ë%§4èåõ­£æ1@÷dæþÖrÛ¾XJõûZ¡Y=ç£-¸¡f©‘‡,† ¥U¼i´ÏuÐ]K>m:s®dK%™WÑ0ÛÞ*`Ž6jYæýåõŸ“?Ц -5¼¦¹fºOÉ<|…üŠ¯0°mNj¶ÙþüËíÇÙlòe2½ÄߋCû LèÑéqÔ ³¨ ÌèÙl,,Z¨¼p¯åÞè¶û @¸ ‘äÞSÛêݚÊ$LꁱKvV‡v?Gí24·ÀЃ öÆuµ‘½ãËä|•€¨Xқ[%RU Ìß½!‘šU3ÄWÏg¯œ÷RXî%j ˆ£»H˜·¡Z<µT{ç6=j)ÀÌçÆ*ž¸xTÐt>¾ÝE㌕È"Œ Lhôøii؛wÐWB®-ÏlRc´¡îšvžË9â© †± €Ø°ð†Z‘2²pò‘UíRÑ«¾…ä҆J‰ö–bÇ Âc!Hîð8 ¬è£Â@†8‚,›ÉÑ(ê¥(Ù t$øT*îJބÔÃG„ΆÛ>Šª‚`4§û›°?]˜¦\;5ð˜ÚႳƒ`x‰‹Y;ßÇØÌ0a¹S?ÿé7Ldtó!Ð ÂõØì^‡‘0l¿ÔkÅW'mòvzÇÔéó¨ùñH„ÏÃÁIcQ¿Ë]N÷~Ýûɶ5«endstream -endobj -624 0 obj<>/XObject<<>>>>>>endobj -625 0 obj<>stream -xWMsÛF½ëWtù²r•“àwr²£8å*IV–Lía•Ãh’df ™ùõy=ÀðKÞ¶T&Mp¦?^¿~ÝüójHü i–ÑhJyu5H4YÌð:žËk†–i¾G“ï}1šŽÓÅåŸVW>i8¤ÕF¬Oç3Zƒ­òëՎ‰¿©ÜSÅÊh³ýPðFíum¨ÞЋ²ºnUj«sÊkã¼2ÞQm‰M[±UrÒ¥ïW\%ð£Åõ(%ùŒÉp”fòHüXnÊ=±µ¸œ×“2µŽÅß)úÕëŽ )z­í3<†h֜×;<­¸Z³•kŠŠºRڈ»ÁÑÛÓµ¯iÍT°Ë­^sA¥òlŸÞ§ôY鲘8`Ù·ÖÀµvg®uY"ßgœAЧ Úú.VíI»õ‰_UZVÅþ,D1Òy)›¦ce|Äi´H§òHNçvßøzkU³æN©€Ó{»dûÂöQ9‡ÐŠ%{`YU€ò†^q~‡ˆÛ² U–õëe0ƒ|§Ì–I£¤Mo2¥• ?"M)R!ˆmÙHÅ;dÊÚl Z‘cç„/ϼOé¿_jj<[—ô…WË0ø`?„.TxfnBÄ  jK†} ç÷7(N:?|^аn(É&”Lfé\]¤CüѲnmΡ`Ç~¦ãQ†ãóðŽÃù3à\Y…“´±u%€W5ºŒ}ºäuÎô¨òg´«„¬Öõ ?½NÓÁt"^ے>º&rê®™îXoåÉ¿Ð<¨²¥w+º ì}‚ä]^B¦ƒ•ÏKù]fúH(×7Mý7ÿÆåÿ8 eñü D}ê£,‚§,¥Ÿ, ƒXÿœQž>Á¨¬Uœ6¡\ôªýN`£û·©5[‘òê‹ÄU Œ×y×Ûnï%£³lŽ:…ïDëôGY«öÒÑça¸è) ^zn»ƒ˜_¸c Ч m‹MŒdˆ¡ *Hæ¡«ٛ•s8˜tªàï‡ -§bwÈêÜKw óN½Hÿ¢•1ŠÂ{0vß+¡_¨ÏEÐc:•®çR K›Ö?Œ;¡ ˜„zŸ2çû¼é;>º¿p…¡ç¶Ôé2Žx™T–!‹q±©eŸŽ ÌÉ1Ñ㰅ŽÜ\8ìî¡4kü*8)u/;HSDðˆz§’½Á0+嶋ÎÓ¯jQ -©—ʶÀ^µÎlj?Á’'“û°(Ïû߃ÃÉ(.4ÍFéhΠ>}¤ÛnÓIý¥ÅïI*Îæát2,âÆx¾Ygãt6÷?‡rëçÕÕ¯Wì¹Üendstream -endobj -626 0 obj<>/XObject<<>>>>>>endobj -627 0 obj<>stream +5¼¦¹fºOÉ<|…üŠ¯0°mNj¶ÙþüËíÇÙlòe2½ÄߋCû LèÑéqÔ ³¨ ÌèÙl,,Z¨¼p¯åÞè¶û @¸ ‘äÞSÛêݚÊ$LꁱKvV‡v?Gí24·ÀЃ öÆuµ‘½ãËä|•€¨Xқ[%RU Ìß½!‘šU3ÄWÏg¯œ÷RXî%j ˆ£»H˜·¡Z<µT{ç6=j)ÀÌçÆ*ž¸xTÐt>¾ÝE㌕È"Œ Lhôøii؛wÐWB®-ÏlRc´¡îšvžË9â© †± €Ø°ð†Z‘2²pò‘UíRÑ«¾…ä҆J‰ö–bÇ Âc!Hîð8 ¬è£Â@†8‚,›ÉÑ(ê¥(Ù t$øT*îJބÔÃG„ΆÛ>Šª‚`4§û›°?]˜¦\;5ð˜ÚႳƒ`x‰‹Y;ßÇØÌ0a¹S?ÿé7Ldtó!Ð ÂõØì^‡‘0l¿ÔkÅW'mòvzÇÔéó¨ùñH„ÏÃÁIcQoÄ]N÷~ÝûÊ5³endstream +endobj +582 0 obj<>/XObject<<>>>>>>endobj +583 0 obj<>stream +xWMsÛ8½ûWtå²N•Éè[ÖÌ)O¦Re;ޕ¦ö°ÞD¶$ŒI€ €v4¿~_ƒ„¾’Ã–+Rèîׯ_7ÿs5¤þ†4ÑxFE}5È4]Ìñ9¹•Ïþ9¦M| KÓ=Ï&ùâòÁ§ÕՇÏiµ‘Ûg·sZ• ƒ­ŠëՎ‰¿©"PÍÊh³ýPòF´5d7ôªœ¶­§ZmuA…5>(¿úã*ƒ\Z^s’ßø™ ÇùH–ÄŽã¦Ú;‡Ã…-™”)©õ,vÂN…ÓGo;6¤èͺXŒÞ¬¹°5{¬Ö\¯ÙÉ1E¥­•6Ñüàhîù:XZ3•ì §×\R¥»ç÷9}Vºj&68­3°­ý™m]Uø{àõ© ˆÀºÐ9«i/vO̪ʱ*÷g.ʝ“F³|" LŽ8ùL–dwáöM°[§š0÷HE„˜9¸%»WvOÊ{xV.9˺”7ô†ý;8ÜV%©ª²o—\ Š2[&œ6ý9­‘ôaJ–JAlËFRÞ!SY³Í€jMž½¼ð>§}d¨±X[WôJŽÿ`.Â~ð]¸ðÂÜD—ÁAÕVá ûäο¿ƒqÚÁøáó‚†ÀuCÙhJÙtžß +¢‹|ˆ?ZÚÖv,ˆa>°ý6~csñ巀 Çi”Ó/ŽKAnÿ œžž>ÀŸ¨²ªDL›˜.zÓa'°ÑC‡ÛÏԚ’èF }‰ùEàª&è¢+n¿÷ëŸQ’vl +Náõú¡ë¦â#©V}i‘o›Xš¼«‚È®žðÑ:½Õe±§µ÷]k +eh WýFsUJloYů\!ªÚ{¹hCË<ýBOºáNùΒv¯ óÅ ‘ÚþD³e[HèEe/KºZ'ßðòÿOmJûæ{ò:È<±à@UÝe ´‡¨ƒö)§ÓcN‘ÑGD5AÃepmÉKeêþ,ò‘TK2g,u\hÏ8ñbìzœ»0–8“‚.–ôÀÈfékI¯{,~¿{¢ÇÕý×ß¾>ÒŒ¯lø?àÁqáX§‹<µt¿hí;dä´täԁÁ„ä|Š§Z~¹‹"]S†u5@^fŽ_µ¨z†v¿¥d‡™|Žò<—ïǜ8ßFK']p™ ³i6³Ét–Íoéÿy40EÒ…ô+Ôíú`è ìÉå“9"¹¬Ì^ô¤EäwÝn è6Ú aPi}« ÿ“%݅åƒôÛѼ£Òxá!¦š€ⲙ£3¢È¥ˆòÀ2@óªª6vÀ=ù] +ôjM¤TNƒo˜®0Ó #´F®£•ÒÆèášG׳ÐP颅roGñä*Ó>ÀE¿ßߧÕ>^JÇ`"»ˆ4 +VD¢b³ »ˆò‰á/>ç8 +Ä܍øl0ȂoE¦‚L'¶:E‘-GDåô×5-Î ü|ݕÙiÀÊ[ìæù½Ø‰ŠRªVÌQu?‡à2® Ü¢xCô+|½¶Jr¤;D_é~ù‘–.jçÞnÑ | †UÆh#^&HRbÈ_ óC(]mȤ§DMÀv‚ˆ„yaS":‹æ(UÈðNtÐøNòÐt”sj/E}î†O–"µPäUå¶;èù…9F“JÚ¶˜ÆHÊ †jêj1únðŸºøû>Ì©T2>÷ê ½S¯RÁ(ft£8 ¥*̤Ý3`%ü‹ù¹pú@c4¨ÊÛ¸/²´iðCÇ:à‚•ïSæü˜7}Í'óF“4ôä–<]ú‘¶ ’ºÆ@`Ñ16V†ê4Ĝœ‘+z¶P’› ƒÝ9¤fWƒ“T÷ƒ0E¨w:Ù_Û¥¼õ`¢q(=«6¥z¥üaìG¥³»¹ŸbГæ}–oû—ÂátœÏ šÆùx÷ ~>}¤»nØQý­ÅKˆ• ç·qw6,ÒÔx>]Oæ“|>»íßrê×ÕÕ߯þ 2Cº¼endstream +endobj +584 0 obj<>/XObject<<>>>>>>endobj +585 0 obj<>stream x”ooÓ0Æß÷SÜK˜;Áqx×n+L¢c´·(sÜÖ¬ù3ÇAƒOÏ%nYË"wŠ*Uò=?ßÝs¾Ç …? ƒˆƒ,'! ‹”Ä‹ÿ3üëá ï‰;`!'|ì€2:®à=ü¿+fÙäÝ<C¶Æ¬8¨Í -ÀœÂ2ù&% ?¸®ºR™Üêºjßf?ˆ:QÀ”ì#)Åjyw ŸT^(öw£œ úOÀ±X”Ⱥ,óª„ßc¬®Àn”­i$4¹|P¶ÆøKÂp׏¥zìTk?œ^„Ý hDXSø†§àøø€i¬Où9ì,g¦«ÂϘ½Š1•~̥àCg‡’˜p½uÆ¡uΎ;×N]­k'±#뛯òJW¨×½-Žá.ß´ [誢–8•UÅiú!lïè\›ÖÎM¾ñ'NO'^|Î_Cð¹p[Ûü|±'‡¥’KÕÃ…‡q[/ºÕÍN=y›A}ƒ‰¥ÌksS¨²ñBØȺ63‰õBb?ä[§ýí{ýaŸ ¶Fôy#+k:i;£|k$"¸F¾¹¹‚ ×à‘amõ…CÚG]ôã1¸×¶%Npxýh=Üä67ç°}LOÇP±g4„§)p¬mØ.«éb6…+õKíêF™>b«†µbƒ$LŸ·ä‹}'1I¸ÀŒË*†û:›|ü‡¶endstream -endobj -628 0 obj<>/XObject<<>>>>>>endobj -629 0 obj<>stream -x­UÁr›0½û+ö˜t‚Š È-§­q¦5éÅÉd0ˆX#\$Òäﻂ›ì6Óað€µì¾÷ö­ôkDÁƋ‚ï€Ë ÉG6±¹Œ0ðŸ¼KY½0( úÜÁÇ$éIå،8} ”ÔðÜ÷µÏ£Ñç/!P -Q†gæÑ39ºÄÙk½Ô3²Ý0ãû’U\.náeµ^[š—¹±Ì&ŸqW¬!êÐ8Áu’›ÇlúmbPUR$EÊÛl+§¼lA¶êãh·ÒGR6Üä5—÷zePu3÷¨Ýî‡Ræñ|0í¾ÑôÐy•Ü¶ôjµãº[VÐêæ ›u¥`YezySÜA÷ŠYwaXÌ®„Ð4g’?¯¦“OûÒmÙ¾Ù|ÔnÖ=ÜÚ{cÑ.¬ƒfYìÏaS·EÌtl¼ìÂÔs C`c¯9Wæg—çg0á|]lp àk%Rn˜YÔêXË·Cs@5GÌÛ^™(Ï÷ˆÏ@endstream -endobj -630 0 obj<>/XObject<<>>>>>>endobj -631 0 obj<>stream +ÀœÂ2ù&% ?¸®ºR™Üêºjßf?ˆ:QÀ”ì#)Åjyw ŸT^(öw£œ úOÀ±X”Ⱥ,óª„ßc¬®Àn”­i$4¹|P¶ÆøKÂp׏¥zìTk?œ^„Ý hDXSø†§àøø€i¬Où9ì,g¦«ÂϘ½Š1•~̥àCg‡’˜p½uÆ¡uΎ;×N]­k'±#뛯òJW¨×½-Žá.ß´ [誢–8•UÅiú!lïè\›ÖÎM¾ñ'NO'^|Î_Cð¹p[Ûü|±'‡¥’KÕÃ…‡q[/ºÕÍN=y›A}ƒ‰¥ÌksS¨²ñBØȺ63‰õBb?ä[§ýí{ýaŸ ¶Fôy#+k:i;£|k$"¸F¾¹¹‚ ×à‘amõ…CÚG]ôã1¸×¶%Npxýh=Üä67ç°}LOÇP±g4„§)p¬mØ.«éb6…+õKíêF™>b«†µbƒ$LŸ·ä‹}'1I¸ÀŒË*žÇu6ù:ù ‡µendstream +endobj +586 0 obj<>/XObject<<>>>>>>endobj +587 0 obj<>stream +x­UÁr›0½û+ö˜t‚Š È-§­q¦5éÅÉd0ˆX#\$Òäﻂ›ì6ÓaìÑj÷½§·«_# +6>|\I>²‰ Ìe„øøîà¯äÕ 〒 oÁ\pL’žTŽÍˆÓ·@é@ Ï}_û<}þ¥eȃ>D) ۆ(9 +‰C\|à:š^^Gí½F[#ÆÕ« ¸,…V' d*’X yZä¿Añ¤©%dÂÁ¦±¤¡oH‹¤Ê¹Ô<5a‰È#úIÃÍnÑ¢à’1lâ{~Rÿ6XÔEþXܵoŽImKÄr‚ZÃÀ#0‹öRh– æÕþü ’1ÉÕåÝ|:A~i‘ÇHÙ|(]V‰®J~sÜpa=2Og‘ëtOM÷ª„¬r(2PÕҊ+½*J¡WFÔm¡nrkwû5¦†³”%ʜ–ZòòãÉþÔ»FË`ù¬‘|V”;ìÁ‚iŠV™à%œ½ˆôübŸVòwªP¶w(«QUí)º•ùí!ô(Õ6ϬÐüôŠïâDî´_+þ{ÅK~ÈçŒÀ<úa:G—Ø{­—zZ¶f|C²ŠËÅ-œâ«¬ÖkKó226Ùä3îŠU"D' Aòqx̦ß&U%ER¤¼Í¶âqÊËd«>¶v+q$eǼæò^¯ ªnæµÛiq(e?ÁÓîkMWÉ푾Q­v\wd­nΐp°YW +–U–¡—7…À ºWÌú†ÅìJÍáìQòçÕtòi_º-Û7 ›Mí°îáÖÜ‹va4ËbO{›º-b: cëàe +SÏ!, ½æ^™Ÿ]žŸÁ„?òu±Á6€¯•H¹afQ?¨c-ßÍÕ\A0o'¼2QžïŸxçš+¬êÑèûèÓW>?endstream +endobj +588 0 obj<>/XObject<<>>>>>>endobj +589 0 obj<>stream x­VÛrÚ0}ç+ö‘tjÕ·Ú憴¡ ÅN_’NƑ(c,"Ëiøû®°I€“K‡a±òÙݳgw}×rÀƏ¡ ^tѲ‰ cü(Äß.~‡éÚà{ ^2¸‡ N=¢—´¾|ë€ã@2EïABÂ=Û6$´Ý!.ñÆ£îð®ÚÏgzn‰œ šjΠÌ•ŒC¡•ÈgW''É-"ˆ–1ÛƒQ⹕ٯ͘§åx˜ Ú+dÓ=È]@kûé—ƒæe–Yš«…È×ÑVQn;¡óT¥¯¤‚ِ±öäFUð5‹Ñ N&.R‘fb–¿•¨)ÚeÊ’ZŒë=À·nVšÃÆí_¡ç ç†ùTi“’9ÄÃÌyʸªÓÙTâqMµX¤ðÎz4ÁÚ`aRLÒrÁsϑÒ6A½3ºfµl«c-ê'q׆K`ÜûqÝM’ ŠCÞÜrª!ÕØ7¥æÅ:Ã~p"d®Nùª-r0J@H9ÍÊJ3XüúÆTðŒ5•ÿ÷xÐÿt¸iL™””˜P˜„T+Lh)–Lí§±#«WàÖ¼ä邿ôØÜ0Ñ>ь Û ûh¸§¥zŒT‰¥RýǸáïJlktƒ]\pu/(?.8ÀÏñùõÙ¨Ç]XÊLÐÌӜe|?s¤i3‰ª/]»alî Ä'ЯãAßÌE&)JOf)”T—Š6ÇÏRáÄDk½6¢ ƒ_ ð†ç›¿N“Ö¯Ö?+MO.endstream -endobj -632 0 obj<>/XObject<<>>>>>>endobj -633 0 obj<>stream -xÕVÑNâ@}ç+îÃ&âÆVZ°…Ý'”Ր f¥ë §:»e;Sª¿wÚª@¸ñÁl ±p‡sÏ=çÌ  ZôçAèC;¾l´ÜíÀ  Ó éÙ§W†0/ nÏíì+øžÛÝW×ßýüÂxËö%㉐»s(ø¡ £q4›ÜÞm#KúsSÿ?eì3¹ÖŽŠA·¾D¼Žï½~yåNú×ç}àSEg†«\Äh“ãxa·\鄭ž½X«[ &Ï·Wy°vŽ]ú)A+Úgö‹?¢ÆÏÆ_w‡Øendstream -endobj -634 0 obj<>/XObject<<>>>>>>endobj -635 0 obj<>stream -xÝVQoÚ0~çWÜc»Aš„(„½Líh;¤[I»‡nB®cŠ×$Nm§ˆ¿s¨š ¾LÓ@‘ >wßÝwg?u°ñëÀÀ…¾4éؖ ¾c[.xÁ»øHËbÁkZpý>Ú½ÚqvN.†à8.щ ŒØ6„ôhh¹Vßr ¾\ŸæðóˆJ±Ts+øš' ”&Iöóø8üXþ VÏõ-юèŠÈ»àW¹îUëȤçô‘‚1¨1÷Az»V7áxrÞ R‡RÚlInP†Rñ"Ÿ«i¸O/f.’RL>3Ùs䆄dNu.Ù˛[ˆN…fŸ`½b)C8Ð+®j, YƈTÀS X®§œ)݅È!ɕM.P‘m@,q3«ÂéQÓ<&šE°‡ai×9”Œ2þÌ¢.Ü3JrÅ ÂÖ<Žñ þŒc•ß+ãIÖP@WŒ>*«ð™I¦ò¤°Ö¦Î"d¡$„§ é+×$GWhJ‹+f'ˆ“‰ÔÄ! ­jÏVEúç×·e­ÞEY ’FP–R’0Unتl_ ãiܵèì3~ #QÄӇ.,…¯w¿Ñ˜ö˜?¤‰ÉʚëÌ'g°b$b²»õž»ÛÙxô¡9þL`¾Œ -ÄVVuÆUnÑi͸¥FD-YiØ´C ÒÒ®½Ó;}@(yŠêüoþ¹Ž¸š]ó¨¹ò±xÀn¬jƒÝ¼¥í›Íð7UäX0Á/T7£f)êÑ×3" Æ©ƒÓ2@µ”– - øÂiá~3]7'2f˜óò”S±ªßÛ@qºôÝfЌH’àøNµñßkÆ)«<µAà‡Ú–ïewr-äãƒyöNÜâìwü–¡L$õàj³ð(…ž¢îû€Au›på‡à<+0WŠùéäìFFq"cxê^æ<*bokÛØCcZÞ `¾=ô‹#ÆC à•-ú¾ è<ì|ïü´Ø¾Dendstream -endobj -636 0 obj<>/XObject<<>>>>>>endobj -637 0 obj<>stream +í‡> ƒ_ ð†ç™¿N“Ö¯Ö?+CO-endstream +endobj +590 0 obj<>/XObject<<>>>>>>endobj +591 0 obj<>stream +xÕV]OÛ0}ﯸ“€‰„& I»=ñ1P¥R´6ã©2ÎMã-µKì4ðïw„Ò"¨˜x@ªH{ÝsÏ=çØî}ǃ.ýyùÐ /:]· a/tCú=ûô*ÒºônðZÁnÿµBºþËÏOãÎÑEžqJÍÃ~qԸۅ˜ï•Áo`2¤¶B®dš nàM…(m J)¸J´)„œC†,Á˜L^« +£1Oi0 +ªLðÌ>”éßAü»ÓÇëÑ8Ù2œ™5pŽrn2—P‰K%ò$"5QƄÑ*_aⶠ~HòÈz˜ÏÁ<.i’WBª +À¶XæxHŒå‚éï4h…yîü‘ª’0/T¹4¼íLÍÅËJCݵZ`eª] Öb:~¿¡0p}·çzÇ.œ__ÝNˆÆl?Q &$Ø7$[ÉMYàìÀrßôÃyšâ×p÷ü¦´($k©ŽÁÙ¤L£º”$ÇêZԃÏö5"L3UœôËNÎ&Ö{z•òY‚mÒÿõ¬Â@(1dH-'9‹ JŠ"v§V6)™#9¶ktÓéɦšî £BFח·ÃñÅ59E +®° tp®Jiç‚¬—mMør5WlaÍ +c3l(ý•‚½ÙlxÆ +Æ ´ÑhïPÌÊå’ìãL7á¢AŸòз”LZo7cÓ¬åX7K µ¨K£é Lð¾Dmà,c¹ÝOûšƒ/@$-Rs’OШBZµ6¶äیn®‡ç_m_ èf`à®LÉX*A[¨Øeýx8';r¿%íö9ôØ-aßK›Ô ßÖ@#¿%“%å•ËB˜Gkº”˜×ÓGoÙ¾`<òåÁÜÀï +~äÂÙhßN'7ÁßȒþÜÔÿOûL®­c»bÐo//ðÝp0€Ð¯¯ÜéÉÕé œã +sEg†ËR$h“ãxQ¿^éD݁½X›[ ¦O·W}°QàFaŸ~JЊ^`¿ø#îüìüm‡×endstream +endobj +592 0 obj<>/XObject<<>>>>>>endobj +593 0 obj<>stream +xÝVQoÚ0~çWÜc»Aš„,„½Líh;¤[I»‡vB®cÀk§¶SÄ¿ß9 ª&¨/Ó4P$ˆÏßÝw÷ÝÙO-lü:Ðs¡ëMZ¶eƒïؖ ^ÐÃß.>’Á¼Xðê\¿‹v¯vœ…­“‹>8„stâ=#@¶ !=ê[®ÕµœÀ‚¯×çƒ)ÜQÉ"–jNbAó„Ò$ÉÃ߈å¿`u\ßòíˆ.‰¼ ~•ë^µŽL:N)ƒ-æ>Hg×ê&ŽÎëA¶¡”6R†”¡T|úÈçjΆ㋉‹¤“ÏL¶Æ¹!!™SKöòf'¢c¡ÙgX-YÊô’«-,cD*à),×SΔnÃZääJƒ& ¨ÈÖ æ¸™Uát(‰iÍ"؉ð´·9”Œ2þÌ¢6<0JrÅ ÂV<Žñ þŒc•?(ãIn¡€.}TVá3“LåIa­ME +ÈB HO5>@ÒW®IŽ®Ð”!VÌN'©‰C[՞&ŠôO¯oËZ½)Š²$ ,¤$aªÜ°QÙ¾@†ã0¸kÐÙü@F¢ˆ§‹6̅¯ó°Ö˜ö˜/ÒÄdeÅõ¦£3X21Y„½õž»ÛÉpð¡>þL`¾Œ +ÄFVی«&Ü¢ÓêqKÖˆ[²Ò°i‡¤¡\{§vú€P*òÕùß6üsq5¹,æQ}åc±Àn¬jƒÝ<¥í›Íð7UäX0ÁÏT7£f.¶£¯ fD@ŒS1§a€j)-g<šð™ÓÀýf<ü6¸®Od$Ì0+æ ä)§"bU¿7âtéºõ ‘$Áñj)â8¾WSVy8h‚8Àµ-ßËîäJÈDžyöNÜâìwü†¡L$õàj“Ÿð(…ž¢îû€Au›pzå÷ûà÷<+0WŠééèìFq"cxê^æ<*bgcÛéÙ}cZÞ `º9ô‹#ÆC žà•-ºŸL@çaëGë´Î¾Cendstream +endobj +594 0 obj<>/XObject<<>>>>>>endobj +595 0 obj<>stream x­VßoÚ0~篸·µÓHó«I覶” i…­M·—JÈ$xKlf'íдÿ}g'ÙÊ AÝ "ßÝçï>ߝùÖsÀÆ·¡ ^Iѳ-Ž!>ýH?]üH @@ -1334,34 +1231,34 @@ A T À/–­q‘”Æò'’¥>˜%QüE©‰àöí©Î)ÅmD±’¢`m5ö–ÞùûIlòì8ø$gH³ÖT3–aH…‰àBýÓ²)ÂFu}šŽ‡/kû¶ÚZ ÆË:ÏÇÒÎ;ªöüêb¸ö1ô-¸@Ý»PoÆ“Ø vãšj€œÞѼ#ç}(ꞕÉîH^ÑƆnf£œë×Í«ñÆr4a3Vž>oۊt·Þ Qœ »ÅúcǺŽM=ÌÅҙ.õ™ózGÈϚyÛMºò ‘¦“< ގ‡ØD )ªUÛ9ý¢Eó:Š±Å©·Ý>Éö@˜‘CJ]óª¤ É Ž-‡Ë)Ì×zdz–„§ø}ì´\Û ëÃٜ¾Ãéåìêb„`͜”4£’ò„šÖhQZÂZ§fBìiŠ§"© -l5M¯ÊšvÙWÂ]:òªÀ)ÔPL¡&­ÞtÈúžïŠçãì¹Ø¾ùH~Ž2ˆ Pɨ꠽¯ |Ä|ºx[¾þÛm KJR*kÊQs 9¾kƒa ÛoŸ³Sê#VT*x[áøÕ!}'ŒŒg?´qX´W\·w‘ÑÂ}+ "üï^¨/âÞÇÞ/߈LJendstream +l5M¯ÊšvÙWÂ]:òªÀ)ÔPL¡&­ÞtÈúžïŠçãì¹Ø¾ùH~Ž2ˆ Pɨ꠽¯ |Ä|ºx[¾þÛm KJR*kÊQs 9¾kƒa ÛoŸ³Sê#VT*x[áøÕ!}'ŒŒg?´qX´W\·w‘ÑÂ}+ "ü™dqïcïß~LIendstream endobj -638 0 obj<>/XObject<<>>>>>>endobj -639 0 obj<>stream +596 0 obj<>/XObject<<>>>>>>endobj +597 0 obj<>stream xÅVMoÚ@½ó+æVÕ®mÛô%"i9@Ô`z U´ñ®a‹½Kw×Aù÷$Á-ª*d Éã÷Þ̼ÙÙ_ü¹zÐ É;Ží@à:¶~âÅ ­^ô¢žm¿¸Ž;Ÿnp]ˆSÄ ¢b ˆã8'Ýéxøupï=ˆ"T,}¤2זûã,þ‰ŸùÍgÈm¹=$iƒ˜b"a0–p…à‰¤ ´Q\ÌaÁeJׯÄÖ&rNâûý ® 9Û?:¸=N†ƒV"”~܈î7iW¢½Èö˼û¶gc .l(™†ãÛ;˜u¥\¤ò#dì™ez@… سÀ²`³³ÙY[»–ÔÈÓá8Žh½¼¼„¡´¬®‘0g|ëéÅ0 Ÿ‹œ knØ¢ È&£ë¦mÖv× ŽkCÓی‰9òœƒ÷p¿ß çûå‚ʤ(‹ñnÍÊBö§"EçÂJrŒPôÿzçÕþGÓÔSÐrפmŽÁ¬Ûž²m;µیÂþR5ȨºŽ9døÀ†éäæþÕñ…Æfr.”®ßÖ±aë±4ì3p´¦,2 O ðœÀ‘°r ë1Õ|¸T^®5Ӛ#ö’½×Je—7aãx8ºÙŸ[­ÍðœÕ1;O ñ i '¢,y²”§Ã¬ˆÖk©(dDÐ8ý'êzLˆ€dAÄÛrZÁÞ ó5‡Y¯žý, ±cq°U;í0ð4W‘eðOjêDñ•ÙÚ`§«_)™òŒáFÀ“¸}*œ¾¸s)W,1R½‚š%éúžôû„^>pQN®F×W0(—¡\áE¾œVÃh¹aTÅZ¡Óß©01ªHL¡Xµýзà » -‚õ¢²7qç[ç7 ‹y+endstream -endobj -640 0 obj<>/XObject<<>>>>>>endobj -641 0 obj<>stream -x­–ßoÚ0Çßù+îmÝ$²¢ž¦VÙX¤–j%쥚PˆðìÌ?Øøïw&©ÖVŁxŠ8üõÝ×çûÝ ÀÇ_ñ†›ÞMÖûø%‚ €¬Ä¢Q ßó}²âj>M¿&ﳟ¶Q¸° ½^­Å†a’ZÈɶ g… ”–Œ¯`MsBeÃxÚ©ÿ2O§YÞ¤+Á¡†ë3(˜@+õGHrl88,i®¨„4éã"L¤0õyn6°²åÐñý>M>>ˆáDfC¹¦–¦,ñ\µ`ø)A‹ï9ø¶x®s›©²ÊW.‘Å:—AôáÓbUŠ¡~ѝKQ‡g;!o‹È“½zœˆMÎøÉðSj՜¢Ýˆ¡µ›¢9ò²Orè;’ú(ù™êœ{ƒ—;M•¥ÑFR ëœÛ:|rlÖe ú€þ]½¦r¡Q.ZGb¦óÛ[ä½ÔþßÄû= MÕ,M”ÓÏÓt–=8®¾54Ï±í½´Ž+Ç ß)ÌoUÁ…Ñ­Ù Éj}Aŵ%«(6T½¾ öÕsr¹ ¿¿õN¹ -ØÑãŽjē4y´Žo:¶ãî€ñR¸$uyÊÑåÎǾÙßØäþn¯‰µsD¼h<ƙc?JÌ®ïn®!¡[Z‰šJõKúO‘ýØÛ©cì ¼¡3-Ma[Òþi ãЋ£11ۅŸ³Þ·Þ?áPgmendstream -endobj -642 0 obj<>/XObject<<>>>>>>endobj -643 0 obj<>stream -x­UMSÛ0½çWì:µ*9ÆÚm$˜^ “qm™¨`ɵe -ýõ]9†Ø’”a2g¬Ý·»oŸv÷Pü1ðlè»g=J(¸N@|p|ÿÛøÒúÀ¡a«úÌ!ÞóƒÃ°÷éÄÆ L ºë{&€(…0ÞIT Óá`7ü…¦ncj¡­ÅúÄFëÁøt†—²Êf¥HÊ Û쓩Òs^Àµü²° Ú¸¶Oƒ›`ÀôÛl8:ÏØì,œÀÕN®„Ô¼(A+¸åwüé)ç’ dª Ô…×åÕn7i -–í. GJó}(9‡X¤eå6Ñ÷?ÄZ(¹÷ò蚣¤[ -#NßFøøÆ)¤ªÀЂÍôCnÂ'"Ž4/!‚(ojŒË\BÝ=ãÁÖxœaÚÎ+^ñ—ŽöÇ¿ñ -Ÿþë>†gG‹|…½÷Mÿñ¡H¶V9ü†õ-‹½Úí”;IÂÍ1¶¡¡íI-/xû>>t¹m+ª&Tr-£ŒƒM»M·ñ#˜¯ÝÎväx1…}{xÝ- ê—J›¬ñšYPÉDÅUÆQ`Éó:Ú9nSBÁ³¨¸éV«Ì€7Ðë„ï·…?­…ÿ&±_Œ†è½‰‘%ݕ±Jxséنõ­‚<ò2Æö¼†—ƒÉñãL8 -'Ýn·.úb*ÄJjœc8zþ=Ç6c -ÁËý®ŒZ~›Dd”r¼™ð(éâü— Òa•¦¼0 µëã”Z™üç÷Hÿ}R—JZy¡:¼²$6º]FEpÙòY³s,rlÖÃã$)×ôk/ÍB4ËgÁoöslâ¸Þ ìz»MN'7¿U¹Ùe_+‘ÔsÍbž_[[ –‹¦º¨b]¼NßñpŸ»>ª·ŠCM¼ã°wÞûvT8sendstream -endobj -644 0 obj<>/XObject<<>>>>>>endobj -645 0 obj<>stream +‚õ²7qç[ç7 y*endstream +endobj +598 0 obj<>/XObject<<>>>>>>endobj +599 0 obj<>stream +x­–ßoÚ0Çßù+îmÝ$²Pž¦VÙX¤–j%쥚PˆðìÌ?Øøïw&©ÖVŁxŠ8üõÝ×çûÝ ÀÇ_ц!›ÞMÖûø%„ €¬ÄÂ8‚Œ€ïù¾Yq5Ÿ¦_“‡÷ÙOŒµQ¸° ½^­Å†a’ZÈɶ g… ”–Œ¯`MsBeÃxÚ©ÿ2O§YÞ¤+Á¡†ë3(˜@+õGHrl88,i®¨„4éã"L¤0õyn6°²åÐñý>M>>ˆáDfC¹¦–¦,ñ\µ`ø)A‹ï9ø¶x®s›©²ÊW.‘Å:—AøáÓbUŠ¡~ѝKQ‡g;!o‹È“½zœˆMÎøÉðSj՜¢Ýˆ¡µ›¢9ò²OòÈw$yä£äg~¨sBì ^î4U”FIþ­snëðɱY—-|èúw!ôšÊ…bD¹h‰™Îoo‘÷Rûï÷€6U³4QN?OÓYöà¸úÖÐ<Ƕ÷Ò:®\ƒ|§0¿UF·f/$«õ×R”¬¢ØPõú‚ØWÏÉå2ü +üÖ;å*`G;ªOÒäÑ:¾é؎[¸ÆKá’Ôå)G—;ûfs`“û»^¼&"nçˆ Š½p<ƙc?JÌ®ïn®!¡[Z‰šJõKúO‘ýÈÛ©cì ¼¡3-Ma[ÒþiE#/ +cb0bۅŸ³Þ·Þ?áFglendstream +endobj +600 0 obj<>/XObject<<>>>>>>endobj +601 0 obj<>stream +x­UßS›@~Ï_±Ú)W>´£FÛ<˜h‚}ÑN†Âa®Ê…ÃjÿúîИ¤Ž“aÈp»ßî~ûÝîï< lâl`\' >8¾‡ÿ-| +i}à˜¡«lêïùÁa8øt⥦Ýõ=À¦ a¼“È,âf£ánø MÝÖÔ@[ƒÚÄBëáätŽ—¢Êæ%OʍmöÉTª+`‰Z~ilƒ.®åGãÄ"Â#0û6O&s:? §pµ“K.+JPnÙ»EzÊE„$p‘J(UÁÅuyµÛOÚÃrè±TlJÆ æiYD¹EԽ±âRì}„<ºf@MÒ/…ǶÅ#>¾1ERY`hNçê!×áGŠ•Á—7µ?Æ¥.1Ý=íA×xœaÚ +Î+V±—ŽÖÇ!»ãñ +ûu£³#Èy¾Âͼ÷uÿñ1‘l%søÉ59 +ë[{µÛ+wÁ“„éclCKۓZ^ðö}2~èsÛUTM¨`JDÚvënãGÐ_ûíÉñb4mkxÝ-ê—LÛ¬ñšP‰DÆUÆP`Éó:º9nSBÁ²¨¸éWËLƒ·Ðë„ïw…?«…ÿ&±_ŒG轉‘%ݕà±LX{éنõ­‚<ò2Æö¼š—ƒéñãL8 +§ýnw.z3b)Î1=¸Z`›±gå~_F¿M"ÒJ9n@¦,Jú8ÿ%GtX¥)+4Híú8¥V&ÿù=ÒŸÔ…Æ_VÈ^¯,‰M„n—Qo\v|Ö윆E†Ízxœ$åš~-Cà¥yCˆvù4üv¯QÇ"n€ëí‘Àª·Ûìàôðpr³[™ë]öµâI=× êùµµá™ÁrÂLU¬ª‚Õé;îs×G5àV±ï8œþv£8{endstream +endobj +602 0 obj<>/XObject<<>>>>>>endobj +603 0 obj<>stream x¥V[¢H~÷WœÇÙdd‰â¾âÆ´€ ÕmO6‚P¶µƒ”Sc÷¿ŸÃ­íNf×Ú]D±8_}—:UßFèø6`fÂd Ùi¤k:L ]3Á²gøÝď p¹dôëj †䀏Líp¸®É>=¬bÿñç/ä/fõðäؘ`-’:§yÎÊgž©„ºdÏ)TR4w­ñþURH ö\Ò.Lñ¯THàG @@ -1372,246 +1269,250 @@ x $;ъ×ÃÝͲ6È×æôÓt8«ímQ »‰½;Õ1m»ø¯¾Õ´V±d¹v6rE8ë 7¬«œá~Q!ø§}aèO^°~RE´ñ‰–ì¥7Ia-ä–1è zOÔKîV»[5щ7+mv¬Ìù7WéÉíé£&: µ‘F‰[Ór¡Îf/ h|âFáaopkäzã&©„,-›nÐîN{±Ñª·×YÜ=lÁ]ߚÝ{,¥Õä;1Á]_'¦¡üw`ÿjh -â E¯­¡tßé¨Äm.ÐÂÍ:&Il¾tv -2f¶6ÏñˆØžƒbÇwXRlwüLE¿×,oûÃx9žéóë‘ b)êLւ¶-ךYÚljã™UV{zòÈè~ôÌ\çendstream +2f¶6ÏñˆØžƒbÇwXRlwüLE¿×,oûÃx9žéóë‘ b)êLւ¶-ךYÚljã™U–Þ`ydt?úÌRçendstream endobj -646 0 obj<>/XObject<<>>>>>>endobj -647 0 obj<>stream +604 0 obj<>/XObject<<>>>>>>endobj +605 0 obj<>stream x­VÛRÛH}ç+ºò[X‘lǗG°qU ›Ô¦Ö[ÔXÁ$òŒ¢دßÓ3òu¹U톊 ¤q÷éÓ}Nϯ½„bü$ÔoS§Gé|/Žbê ‡øìúølã%)/:ühçÅñdïýY—’„&9é ú4Ɂâ˜&é~üÐÅoüNu=—•p’Œ.IjW)ii.ªŸ2£w…IEñî`ò{MÀ"¶’NÔFÌýñ·›É÷Ëӛ“/çG£‹›Ó‹ëópz#ýêpü0i7󞘹PÚF4¹“TڿDzZȊ„Îø¯ð–JQ‰¹t²´Ú:šIº¸þü9zY»uÙõèbÒi?æªoQY—›j~£²'b-«üöetòÛó¡J£4°‘3¤ó…@¯‚¤¹øa*Výbu9–ÒÿK,÷XJš®ºE͔£\É"›¼òíÌ¥f>Çø½ëúb4ž\½ÐR»Hâä†[€Òk­R“I²˜h}K&'&ëµ½žå†Ó4x_ÊÔyjJ—“Å1øó¯PõSš)E–1~ÌÖ­t»Uu[³GhWêVC¯÷ÊÝ¡`Q9®×APãócº“"“UƒbH Ì '¯âN7heu":_]~$Ãâ›TB[‘:º—]ª²ê%BH§Ýz¬³3 X&P……‡¬’>␔ªÜö"÷Ðtx ×–×ê$k4Éç¶Ûôø䜚# V–R£³:u€ëKÚ×¾‚Áq?‹” aa¶Þ(÷§ÓËÑåétºm?¢ï¦¶“« æcf¨V“ ¤Ç*à〴ìh® Iw°¯BÒì5kß@ÁxL)õw§dP~^Ÿb«…]¤;€†EòAÌËBp)ªE<ïPJY±·ÁK×\zgõ&šŠªz$S»æ@ZË{À÷p£ 1ÑaJ‚B¼ð„#„ÍZ50WKg'írI¨ b‰â¸Ý㌠Ny—‚phéÐ'~'[oÇÐñZXôÉÏ ËÖ¡ µ’‡y'kmjµ¹¾Ínñtð3.@ðà -U€Í…üWÓpî„YDJ‡uãG è.Gô†Ì[BiJœî³CpÜéŠõY¶ÚNÐ!§æcŸ¼ëîT‘›¢0÷€e,O2€Pø¡€Oì¢çY iC ÓÇ^Ù\4ümg!ŠšÙ–¡nàÁü¯r1\8>º]âÂø\I[mqabeøQ—³ð”xºÀ“U~ KQek%®ÎAÞ¸™÷iîÂ;Ï÷%üÉÆ» nä»­m‰®‚kw' Dßj–EÖ¢ -ùÈÁØ:*¤€Ãµ·×Êt¿¬ÌLÌpA gzÀýBå­yƒiLq(³¬°?|ƒÇÎÞ,QX¯ +ÌXªÍ¦23¿Ÿ³&EØi|#`œXkŒsµí V`c©p¥Ó¢{_Ûܒµº{îúšñðEïë‡Ü?Ïíû³A³$’þ ê ‡ÔûÐo.ÀGçÇGt"²€¹ã~ú{v3¸Öòl«y]½qËvûݨß`#â;]Ý9ì}Ýû©6—¼endstream +U€Í…üWÓpî„YDJ‡uãG è.Gô†Ì[BiJœî³CpÜéŠõY¶ÚNÐ!§æcŸ¼ëîT‘›¢0÷€e,O2€Pø¡€Oì¢çY iC ÓÇ^Ù\4ümg!ŠšÙ–¡nàÁü¯r1\8>º]âÂø\I[mqabeøQ—³ð”xºÀ“U~ KQek%®ÎAÞ¸™÷iîÂ;Ï÷%üÉÆ» nä»­m‰®‚kw' Dßj–EÖ¢ -ùÈÁØ:*¤€Ãµ·×Êt¿¬ÌLÌpA gzÀýBå­yƒiLq(³¬°?|ƒÇÎÞ,QX¯ +ÌXªÍ¦23¿Ÿ³&EØi|#`œXkŒsµí V`c©p¥Ó¢{_Ûܒµº{îúšñðEïë‡Ü?Ïíû³A³$’þ ê ‡ÔûÐo.ÀGçÇGt"²€¹ã~ú{v3¸Öòl«y]½qËvûݨß`#â;݄CNö¾îý©,—»endstream endobj -648 0 obj<>/XObject<<>>>>>>endobj -649 0 obj<>stream +606 0 obj<>/XObject<<>>>>>>endobj +607 0 obj<>stream xÅVێÛ6}÷WLƒ>8@¤ÕÍ·ÍÓîfØ8n­ê>еfV&’¶×ŸC]҅³N AmX–EÎ̙3g†þÜ )À;¤QDñ²m/ðÄc?¢d<Â}„æTô®ÓÞÅ4¡0¤´€Ép<¢4'lJ³þThc_“´|m3%ÿ$\$ϬP’„¡-Ë9YEvÃi¶¸ù•Ì†iîSŠßOvnwÆҚ7ÛwFÈ{â2ÓÇÊòüeú©Æ@—æýŠsP:7¯H*KYəö,´µSفQ˜À8•¨šØn-¹¥9ÛòœxNï˜ÌKNKË,?‰ÙÁ3\ºl Ë56"Û|õê"iÎò£K–e¯,]-fÈq»…_ãÓ3¶<:x¹#++•áÎÊùôÛxÑÐO\Ž©rdhnT¹çùåÉjù•A(Õ~2rP(VU Áņ=Bž WVÒúh¹iA;ä®,A˜Þ ‰LsZ­³ÅíjE\P¡à»~_Ü4tPñ‘•;¸3œK2Š DEA©ÆùZóRj¼Ӏ&h¼(iÒ¢ö%$°hhʤùg8µ—݆:úú(xŒ†T1Ͷ¦c# ü±ãª³y±Â«Édµ* ÓUö¢[ûç;xàm¿ÆòÇ%p·Iâž^wÙ~ϹÑ{³Þù(v‡µÇ[ܵóÁ‹×Î/¦ -Qd×M^Œ¶ÊûÒöéäõð´ã¼Èu\ÿ/ÓöTSbÍZXË¡ãB•àÜuŒæН* ò€ÂӛÌ\sZ&M!x™ÿ}¢¥™„@½³G;ñKÕ¶ <{@QsfœWØ­²ºµم˜˜SŒ$V–”xNnµÈ£æÖõjÇjÛÂxµ‹ù۝–ˆÁ´ÚÉü—t)„h,ÓuNœ¡ß›Sç<½[^ÕQæ·é݇·æµzóZ²2¼ÒÐAØM+ÆÁ×æuM¦ŠI¶ë݈ë#Ÿ¦ÏX|dZ°5f„=VüÃ?fótüc[Çæ7¶òjÍoÙ'ôߞkƒÞ=ëëòð¬ÅÏC7ȅüÈ£ÿyÔ"‡¬+%1Œk¹Û³HαŸµøy¬ÇÀ¾jNß©f÷´Ö;ä€8Õק[Y½<‹î\>ÉY‹çÿ‹B>ÛÁ#fI;L¼ï žÛ¸íæp4ö‡“ þ–Í ³¼z}EoøçP….¢·;‘ק¹×íõFÎ¥g¦n2JüÑpŒ¹ŒÕ¤®êmÚû­÷v•Þendstream +Qd×M^Œ¶ÊûÒöéäõð´ã¼Èu\ÿ/ÓöTSbÍZXË¡ãB•àÜuŒæН* ò€ÂӛÌ\sZ&M!x™ÿ}¢¥™„@½³G;ñKÕ¶ <{@QsfœWØ­²ºµم˜˜SŒ$V–”xNnµÈ£æÖõjÇjÛÂxµ‹ù۝–ˆÁ´ÚÉü—t)„h,ÓuNœ¡ß›Sç<½[^ÕQæ·é݇·æµzóZ²2¼ÒÐAØM+ÆÁ×æuM¦ŠI¶ë݈ë#Ÿ¦ÏX|dZ°5f„=VüÃ?fótüc[Çæ7¶òjÍoÙ'ôߞkƒÞ=ëëòð¬ÅÏC7ȅüÈ£ÿyÔ"‡¬+%1Œk¹Û³HαŸµøy¬ÇÀ¾jNß©f÷´Ö;ä€8Õק[Y½<‹î\>ÉY‹çÿ‹B>ÛÁ#fI;L¼ï žÛ¸íæp4ö‡“ þ–Í ³¼z}EoøçP….¢·;‘ק¹×íõFÎ¥g¦n2JüÑpŒ¹ŒÕ¤Nä6íýÖûv•Ýendstream endobj -650 0 obj<>/XObject<<>>>>>>endobj -651 0 obj<>stream +608 0 obj<>/XObject<<>>>>>>endobj +609 0 obj<>stream xµUˎœ0¼ó-åÂƆð؜f7ÏC¢\žlO,St¶ßÙúHžšliuá|û‘²A?ºÃø Ï0ۀû5Yxh¿RIƒ?Ì?®:i9Zñ.N«ŽH™ÙN´:J.Kl¡Tƒ4'“Nˆåù9—´”ÈûV ¾¤ ^уÆþ«ç40ôp; 6´¤örèhY#“ -k!QŸ>@Gœu…ÇòߙµEÞ›cloý¢p «EõŸáú6הæ‡/eÓƦKò’(g‘Ýl>oÞ]màÞa«öØkx=PYÐêwí* r[š³5‹¼w[§1K“Œþ5­Æã¼½,¼Þ/"Ôð]endstream -endobj -652 0 obj<>/XObject<<>>>>>>endobj -653 0 obj<>stream -xVMoã6½ûW öÒ¤ˆUR’%êT؉Óæb›xÑCS´DÙÚèÃ+JNÜ_ßRÌÆÍÚNFÎpÞ¼yÃ/# ÿ8Ä>¤Õˆy Â@x„"Ƶ¿VAn6‚0¡í·þ$|{b¶ýtç°È1H$bXd€ƒEz–xç{܃»—”é£ê oZŒö¥Wº»À…Þ4µV°,ê $þì"}¬›§Re+U©º;_|Æ8ÑKœ±y!F:ûtóÛBÀVµºhêJ~¶†á`ˆéŽ9ހ,[µ)w e¥@jwx8cÏlòp¾`üúà~ˆ¢þ®ì!ºÝFvÞÔ -šºµ‚Û{‚sæ ê¾Ò'/Ÿ—r5XýOh˜)× ksˆT`þ½³Õ;™Rà#Î,1VPvX ÃÙ©R‰1~@AÞÊU©êU·>‰´6ÎLv´Jé†îÛýí ºVÖ6†µ' ÆزïÖ_c³¯Ä#þ ©,Ë";|/ڇ"C¨Š¼P­‡ÔTÞÊ#Ô“IÅûGÐ]¿„O÷sXlm§ŽE´ª’XVÕº”m¢©ª³¢^¢A†ˆ—¬3×é¦A|a{Ð6¹ïÁMÝ©6—©zÉ#ýFÙ×½ä¾p‡4H!äóRµ*ó¨Kw(7°–[UÿÐa‰T UƒFÝZb¥°!^C¯Uænlš|S`{ÔÔîºÝêmj`X¥û¡½½\j,tÚ)g^_ -Cv~ð(f´ãÉ4ܧµsÍg×ÆƐ“¶4Ttæ RÝÁ%S!&W,¤œ_&ür>N‹¹HŒ§ˆ…‚3ß}'¿¾+¸C3Þ-⁕ÕƒøÝ6Áƒ¹ÜuêOýu˜Hb2ÒD[†}—oTY=(ïa§{%Þsë²ú—B›ê )¸Üœvý‡A‡˜,s¤£¡ðZI"z‘d†'$—q]XŽ»1ÖòÂÙéuӗ8’Œ.Sy‡aBg§éã>>¯®E=pVò¹ÓÅ?GT-Šª¯¬ÖT…¦1fdŒ¦ÐYà ï@t‡“ðD@lýT[ø(—ßË.µnÒÕ193…ì°+WmÓoPL&§Ó@÷È>UšÁdj³,M‰°ÎÞÂå:ÇuÃêbqÒ•ç¹;–ÄëÙåì_´mhîÓ º¦Þá |VïÎÇÙc>k$«,ŸäN#QùÏç$+Üe)†ç}/J|… 4½ŸÞΦp¥¶ªl6øF‚_zœ0ÄÚ1ñý‡¶ã˜¡"fÃK ~5Bazq$ðQ‡»á„>Í£ßGÿQ-ÜGendstream -endobj -654 0 obj<>/XObject<<>>>>>>endobj -655 0 obj<>stream -x½VÁNÛ@½ç+戸vçÐiiËDÁ¨‡RU{¸µ½fwƒ¾¾ob’‚ BÊÎΛy3ófï{¹øx4ÐЧ(﹎K¾ç:cü?ÀŸ–”lN¼'xíÀ †/¦aïß<Â ~0¦0&¸.…ÑÁíùeüüuþÙ¨6C}oô0>õgk+Idé¼Èea©qœócs‘ÆÒÍŔRÄRW^°þ¶›#3cµˆl -·7gt}õé÷y""َ],sELR‡TB¸+5ß¡(K9˜ÔÐÒ šNdÀ&‘úm­$j¡4JR" SOjò6igÄìMÐèœ8›lOãXKcèúÇn¸.õ~eÏåð|Êd1·‹vbªsfÄ.$WPr¢lÉ¥¡b™e¦ò´Vu—¥TºªGå¥s IÌԃ1õ™$îã]T3Cù^jüŠški¦)*ÝPÓtâ5ŒúJU€}¡Ì¸D‚<7,T-ÈQU–e¶F¯F¥ÝÇv.VÖ¤hD(üû¥4ÿ9Üéóº€p©ßÒåpx£¢y·WèQjµ›ëNhGdd¤Šó«Ÿ&°îÉv§L&ßàÆ­Z“o(–&Òé e–Bcºšì½4fƒƒ6Ìì2³õ\6­´­FœìfhÌPmNwîÊõî;8|ÏT UdíũΫÀ]úH"Šdi÷f°ñ,Œ*º<óù³çB!˜ÍO¦”Qš¤2î„9¢Fuͺ°bõÔp{$Ÿ+Óܤúj¢U^õÖøuèí¸•ûKhÐ~QɱȰ¾=­T㥴°äKì¢5)„ óÍ÷«š°¥[Ü2<¾Y¦¢VP;çœ;‹F‡±ËÅ -5Öغ£_]° ƒº–h ¹•« 6Âö6E‰kkJcüąÕUÕ;Ë[£©SԞ*¥®@êaã óN:=C¥8m~!„W[úÔûÕŽ?™?ᵃ{sz1=¥Ï¨Lƀ†¾.‘ GÕolûcwò¼ŽéÛÓke'c?Àȟ:>_: {ß{ÿoº¬Åendstream -endobj -656 0 obj<>/XObject<<>>>>>>endobj -657 0 obj<>stream +k!QŸ>@Gœu…ÇòߙµEÞ›cloý¢p «EõŸáú6הæ‡/eÓƦKò’(g‘Ýl>oÞ]màÞa«öØkx=PYÐêwí* r[š³5‹¼w[§1K“Œþ5­Ækûêeá}ô~"Êð\endstream +endobj +610 0 obj<>/XObject<<>>>>>>endobj +611 0 obj<>stream +xVMoã6½ûW öÒ¤ˆUR¢õq*ìÄisH±M¼è¡) +Z¢lmôá%'î¯ï )fãfm§‹À#g8o޼ᗆ"‚ÒjÄ<"ˆ½DáÚÇ_« 7Hhûí†?oOÌ£Ÿ®à9 ã`Æ`‘ž%^àù÷àîãåßeú¨:ț£}é•î.p¡7M­Õ,‹:‰?»Hëæ©TÙJUªîΟ1Nøg쇞ÀHgŸn~[Ä°U­.šº’Ÿ­¡ 1Ý1ǐe«6å´¬Hí.gì™MÎ÷Œ_ÜQÔß‚½#D·Û¨ÃΛZA“C·Vp{Op.ÐTÝWúäåóR®«ÿ 3åšam.‘ +Ì¿w¶z'S +|Äyƒ%Æ +Ê t8»#ÕA*1ÆOÈCÈ[¹*U½êև#€ÖÆÁ™ÉN‚V)ÝÐ}»¿A×ÊZÃÆ°öÄ[öÝúklö•xÄD"•eYd‡ïEûPdU‘ªõšÊ[y„:ã"™$â(Þ?‚îú%|ºŸÃbk;íp, U•Ä²ªÖ¥l…LmTõ + 2ü@¼ü`¹N7 âǶm“ûÜԝjs™ª—<Òo”¡qÝKî wHƒDB>/U«2ºt‡rqk¹Uõ–HÕP5hÔ­%V +âå0ôZeîƦÉ7¶GMí®Û­Þ¦6‰Uª±/ìíåRc¡ÓÎH˜¾¸¾Œ ÙùUÀÈÑZD“isŸÖq<çá|vml 9Y`KCEg^Ljc¸“#¸$0ñ4Ž'WLÐ Î/~9Ÿ §ãyœO!1g¾ûN~}Wp‡:!g¼[Ä+«7ñ»?l‚5r¹ëԟ<üë0+Äd¤‰¶ û.ߨ"²zPÞÃN÷J¼çÖeõ . ›ê )¸Üœvý‡A‡˜,s¤£¡ðZI"z‘d†'$—q]XŽ»1ÖòÂÙéuӗ8’Œ.Sy‡aBg§éã>>¯®E=pVò¹ÓÅ?GT-Šª¯¬ÖT…¦1fdŒ¦ÐYà ï@t‡“ðD@lýT[ø(—ßË.µnÒÕ193…ì°+WmÓoPL&§Ó@÷È>UšÁdj³,M‰°ÎÞÂå:ÇuÃêbqÒ•ç¹;–ÄëÙåì_´mhîÓ ÅtM½Ãø¬Þ³Ç|ÖHVY>ɝF"¢òŸÎIV¸Ë2ž;\ø^˜$ø +hz?½MáJmUÙlð¿ô8aˆµcáûmÇCĔ—üj:…,D$¼(ŒñQ‡»BЧùbôûè_Q#ÜFendstream +endobj +612 0 obj<>/XObject<<>>>>>>endobj +613 0 obj<>stream +x½VÁNÛ@½ç+戸vHçÐiiËDÁ¨‡RU{¸µ½fwƒ¾¾ob’‚ BÊÎΛy3ófï{¹øx4ЉOQÞs—|Ïu4 Æø€?-)ÙŒ¼‘¼và'/¦aïß<Â ~0¦0&¸.…ÑÁíùeüüuþÙ°6C}ïèa|0ìÏÖV’ÈÒy‘ËÂR)â8-æÇ$æ"-Œ¥›‹)-¤ˆ¥®¼4`ým7G$fÆjÙ>noÎèúêÓïóDD²»Xæ$Š˜¤6©„pWj¾CQ–r0©¡¥A4È€-L"õÛ [HÔBi”¤D¦ŸÔämÒΐٛ8 Ñ9›lOãXKcèúÇn¸.õ~eÏåð|Êd1·‹vbªsfÄ.$WPr¢lÉ¥¡b™e¦ò´Vu—¥TºªGå¥s IÌԃ1õ™$îã]T3Cù^jüŠški¦)*ÝPÓtâ5ŒúJU€}¡Ì¸D‚<7,T-ÈQU–e¶F¯F¥ÝÇv.VÖ¤hD(üû¥4ÿ9Üéóº€p©ßÒåÉðFEó4n¯Ð£Ôj7םЎÈÈH1æW?M`ݓíN™L¾Á[µ&ßP,M¤ÓÊ,…Æt5Ù{iÌm˜#Øefë¹lZi[8)ØÍÐ:˜¡ÚœîܕëÝvpøž©@ªÈڋSW»ô‘DÉÒîÍ`ãYUtyæógυB0›ŸL)£4IeÜ sDêšuaÅê©áöH>W¦¹IõÕD«¼ê­ñëÐÛq#*÷—Рý¢’c‘a}5zZ©ÆKiaɗØEkRæ›ïW5aK·¸ex|³LE ¬ vÎ9w&c—3Š…,j¬±uG¿º`u-Ñr+W@l„í)lŠ×֔Æø‰ ««ªw–·FS%¦¨=!UJ]ÔÃÆæ:=C¥8m~!„W[úÔûÕŽ?™?ⵃ{sz1=¥Ï¨Lƀ†¾.‘ GÕolûcwò¼ŽéÛÓke'c?Àȟ:#¾tö¾÷þo°¬Äendstream +endobj +614 0 obj<>/XObject<<>>>>>>endobj +615 0 obj<>stream xµVÛrÛ6}×Wì¸/r§b¨K))}èØ­›x&Q\›™ö3ˆ-ÔI d÷ë{ ÑvT硺Œ(r±—³gpßRˆ÷¦#G”nzaR4‚MfS\ðՒr÷àÇpD/=OgÏWœÇ½7¿Mh8¤8gïÑlJqFˆ†§}A•H拉LV²Èda©,È®$Uª’Tˆ¤¤_ér)–ëG÷@Vê\¤29%Qdî^YQQo–R'§§ñß9oBs0šDíσq0 f]_ýò×µ4‹Roèú¿"jV„°¼ýçËE<‘X¯Ët…°Þð šÁÙówdÔ?’ÊÜecl½¤LXAª å£•¦Â%Õ.å È*-MZ¢´‡£aØ «ScOŠqS¹’X†L4쾖ƶ€´å=‹=£T©\§e}¼Bo† °ûÂ‡ðÎ9_½•Ù1ì9º.TàC–©âöbߓøóÍÅÛ+GŸcޙLZn„½tÛ"-«õ£_ª€99dÆÃ/T µîúfz0…û1܂±ìPŠtÕ:^ÄnÎ/ñ‡Oï>-‰3ÇgÃ+ í”]½íxÀºÀ½ºQ™Å-aš Ì¯®g­¾îEK[k¦P&½ÑWa˜¸y¡sàGoüÏYz×õ¼G“åL (†›c]¦ÒÆGS¦ Ü-nO¡Ÿò¤/ƒ[J’«Ë«‹$Y¡«ÃÍ0‘ «EarôÎ<‚ù'Lré²FØéKVC×)Šƒ> ¬$µ®Jý*5e%·+eŸº¸+Ê]tq<èÅ¢´ò­sÒH†Cáæã9Ŝ”Hm;gìŽ'Ógmw%ÕP ¶ÐX­1—.ãsʕ6–×`ŠÂQôgpP g$æ;cþ—«µ¤ô?¾w2ÃÀ¸gȧ„zþy˜”©ÊÂHWÙÖ³‘,†6âÁ²ŽýÀWÚ) ¬kÛ­ÂEÓR'16Î óí"±ä¸¬Qæ“bZ÷Í ä=#é±8„ÖÛRÛrßñƒ#q›­r¿Ü·}®M0ôF;)…BøÜ®¾îVÂõˆE·Þo[ÒÒ±úI…,q -Ô[Jl~GBQŽÜ¾Ä¨*&Þ^©32%åB£4§=R…²J¬ißÕFÉÅxiû9D°-ò‰ÀtÄá$ÁËO[’½5Ûô„KêlÕûÑêXƦ±~qS阣eúµ®1øæõž½Lü?¾wwæ õ·@Òî ¯Mý‰ý¬9§ '8‡Íç8Q¹ÈÍÙÇó3úUnåZ€a~WƒlÜÔÁ3¶LÃù—c½—"[L¦“`Ípľ6™ò­‹¸÷{ï_ápêSendstream +Ô[Jl~GBQŽÜ¾Ä¨*&Þ^©32%åB£4§=R…²J¬ißÕFÉÅxiû9D°-ò‰ÀtÄá$ÁËO[’½5Ûô„KêlÕûÑêXƦ±~qS阣eúµ®1øæõž½Lü?¾wwæ õ·@Òî ¯Mý‰ý¬9§ '8‡Íç8Q¹ÈÍÙÇó3úUnåZ€a~WƒlÜÔÁ3¶LÃù—c½—"[L¦“`Ípľ6‰øÖEÜû½÷/áfêRendstream endobj -658 0 obj<>/XObject<<>>>>>>endobj -659 0 obj<>stream +616 0 obj<>/XObject<<>>>>>>endobj +617 0 obj<>stream xUïoÚ0ýÎ_qªö¡•ŠIBH ß -[¥µ£%“ö¡Òd’ d;µü÷;҂4röó»»wÏ/ z»zÐ ^4æ@Çí±øݐ~{ô)Rp]—¹: ß?DÖ0ׅ(¥3‚nQ„ï8ÅçRãD3„§Ñõïç¨!-ù4G1Õ3Xàb‚%d&’þjZ8ÈDOøR¡ÒÀé·}ЏçB¾æ˜L(4,* ÆRhž‰‹èOÁ¦Ûf}n0Öè2µˆ´!£ìˆ$\óK:.Ϋ$SÞa6Cž`É bkèo²jzó öšÖ•Yà2¿íAÓ Y—¾Mp“¡ 7 ¥€9A§ŽÑf“Š nFUH¡ð¡U ÝöÀ%²)¿bØöj†=ÖfÑ÷q¢’ Åc | Œ²ó6Ý<7íS¦!"F šÒ¦Œ¸‚æs U1SPðò“ n•æ“c0֒N4‚I³aFjËñû§ª¥²³ì’JBâä0&EoKß,Pºš %8o~ÛqAÇv·Ó K~$ó,^ÒZåï’[GVÈi_\[~{+× Í–K¸©„ýcÔ% ŽÙ‡¤:Ôë\ªÊe¿këŠõêo0Í*He¹ÍgbF6]Öe§ŠýZ[»~³™Ìwe´c´ar½?8o^¼zm[ÍÝð‡å: -ç„'ànEµÀÒè!*É·HÈ7rAÆ¥ŽÃZ§Ø&{ÀÒªfŒq‰ú(Pšžà÷]ÊyUÀøîæ8£tmŸÖm d¦áҩܬ†Žfå8«¬6ngšØ&…Ç2F°÷³µ_²ÏÚÛöŽ*V#¸òˆIæ²4±$£»b)+ȳùJñ­aw}=¸a—½~‡u\{Œû÷ƒ>Üà_Ìe¥‚¯IÚ߬W7C§W3=eÉ~è³0èÒõJ©ù]ƒs5ÿŽ4Ÿendstream +ç„'ànEµÀÒè!*É·HÈ7rAÆ¥ŽÃZ§Ø&{ÀÒªfŒq‰ú(Pšžà÷]ÊyUÀøîæ8£tmŸÖm d¦áҩܬ†Žfå8«¬6ngšØ&…Ç2F°÷³µ_²ÏÚÛöŽ*V#¸òˆIæ²4±$£»b)+ȳùJñ­aw}=¸a—½~‡u\{Œû÷ƒ>Üà_Ìe¥‚¯IÚ߬W7C§W3=eÉ~è³0èÒõJ©ùVm·Qã±ñŽ 4žendstream endobj -660 0 obj<>/XObject<<>>>>>>endobj -661 0 obj<>stream +618 0 obj<>/XObject<<>>>>>>endobj +619 0 obj<>stream x­T[oÚ0~çWœ·ÒixqœÐ—‰Švcj¡wOH•IÌH µ^4í¿ï8÷uÒ@(Æçä\¾ó}ç±AÁÃ/…ȇ€A2oxăv;"!„q„gJ¤2„,À¿» ^HØ.C@=âï2PÊvºû”7>w€Rà,—Åð°TÏž4;$ ŒP7ò±”Úóôgoþ-ŸaLž6¿û½ÎÖVìºE,Íãr2‘ E–©Ö£´Vïý[~ã¥zÂH¹˜KhA™gI‘JÐFeù|eìá93S0ύFGú@¾áé·û.ç7ûã™SŒK#E»ëxp xŠ%§RgJ¦ ’Dê:Ør~ì uØû{½(r-×Ûðà ü«áÅý×Ao·]Ä~–%¯0y:Ûµ6%M©òý±0/dyš%±]®·d˜@¯bŽÞ¶°%\—R½B?ŸpUU³Ý‘¥_sPy|*1ú&3¡5Q-˜—ÚÀX‚Am™ 4ž…±NöN9¶‰®ElÛè=¼þ¯ÐZzP¶ڕnGM1Óˆõ±}¯·´E˜ˆ¼‡0Qk™§ERÎ%j5…÷K÷_º[Nm¥åjÀՖדó óÆ'?t²Ð¨íd £æŸW*8^\‰±%P"´„àÄbµyÛÞ¼ý¹áÕ^Þ÷çCH‹¹Àšlš0“Or¦!”´1»ÀÕ½¤_]ïJª_uPŸâòƂœ¨?è„!Ê]ÜÇN:±“ÎYŽóP(9à ɏséUåm,|Õ¯$dUo|¹š­[½¸óä‹QRa„#W\/pńu:Às°Þv/O»Ð³P ©4|)³´Ú%­¥o+òpd®tæJ.d¾¢÷0 -IÄbÝŽMyÆ׍ß>â‘endstream +IÄbÝÂئ<ãëÆo>“âendstream endobj -662 0 obj<>/XObject<<>>>>>>endobj -663 0 obj<>stream -xåTMoÛ0 ½çW=¥k’íØò1mº k»Å»4IA=8R*ÙC¶_?Ú²·´s³Ým¡øH¾÷ÈûŠy Ir;£„Âb‘“Ržãï¿Næ¤yL²©@üT€åét§$~ŒtVÎ^½.€1(7ØUÆs(`G”B)çI'1Úï¬ñú´üŠ Ù¯„(ΰïRÍ?½»*“8„Ó!ŒãE,Á¢§6íV;ÑTր´¦Ñûæ!^t˜ñ<ÄÆUÚ#]B½ªq­o 2ë¶}‹GðœnZgŽ »ç”2cŸ =ºV ìVTƟ€o¥ÔÞ#j U@&7Г°@k'@Aàr½„ë6°Ö‹‡Ê¿e‹âN¶^­‚°N­ûVûáÙ¨*0Š… !÷N€øŒÖþWâ·FY‰ú£ì/•ê¿ƒê-1ŠÌtOÏ{%éà1´ÔøÞ Çü…>8t£Á^çµ×{ÒXøî±³&ÎÀÍõåç·W«§WcgëJ~‡;aT­¡±ðEƒìJ¦k‡‘œˆõŸcÅ¿6@=Ò*ÂÃfn碮á‡vÖߞvLҎٕQ• ޝa‹Ã¸|8{,ç$+ -Èï¶r½|¶„•þ¦k»ÓÎÛ¶ -;/£œãó ÇÅp+5”ÝaÂÓ± -§£«•â‰Ï3Žñ´û뢜}˜ý7ޝÃendstream +620 0 obj<>/XObject<<>>>>>>endobj +621 0 obj<>stream +xåTMoÛ0 ½çW=¥«’íÚò1mº k»Å»4IA=8R*ÙC¶_?Ú²·´u³Ým¡øH¾÷ÈûŠy Ir3£„ÂéiNRHyŽ¿cü: ë>æ1ɦñs–§Óœ’ø1ÒY9;yScP®±«ŒçP*ÀŽ(…RÎ ’NbŸ´ßZãõqù ²ß Qœaߥš~U&q§CNjX‚E1N!mڍv¢©¬iM£wÍC¼h?ãeˆ«´Gº„z%TãZß@eÖÖmúà9Ý´ÎvÇ;)eÇ>2zt­@ٍ¨Œ?ßJ©½GÔ@*ª€L®¡'!aÖN€‚Àåj×[m`¥%•ÿÈŝl½ZaZ÷­öóQ T` Bî%ñŒï×þWâ·FY‰ú£ì¯•ê¿ƒê-1ŠÌtGÏ{%éà1´ÔøÞ ‡ü…>Øw£Á^çµ×{ÒXøî±³&ÎÀÍõå—wWËçWckëJþ€;aT­¡±ðUƒìJ¦k‡‘÷œˆõ_bÅ¿6@=Ò*ÂÃfn碮á§vÖßwLҎٕQ• ޝa‹Ã¸|8{,ç$+ +Èï¶rµøp¶€¥þ®k»ÕÎÃÛ¶ +;/£œãó ÇÅp+5”ÝaÂÓ± §£«•â‰Ï3ŽñÓ¢û뢜}œý8-Ëendstream endobj -664 0 obj<>/XObject<<>>>>>>endobj -665 0 obj<>stream +622 0 obj<>/XObject<<>>>>>>endobj +623 0 obj<>stream xՕÝn›@…ïýséT…²kº@ï9i-9vÓÞ$‘…a¬ÐKXˆä·ï`Ö?$&­Õ´ReYBÚÝÃ93³=ý8´g™[˜lסgNÿaµY°»8óL÷Ø &˜i?]8÷{ï.=`6ø+z»pé!z³eö=s`2fÂd>„‰”?ªæãÑüÌÿNÇ0Ö3¸CÇúSYâȪtYYĨ ÎȱÊe¦ÒJ•°DPAŠ¨çû*T¥Ùh“¥¶K¶I]{!7׸Ùú܅hv~žMŸ¦£fÝÖJTSƒ ¨˜$UÇÉe‡k¸²(Á¶”q¸÷ëxêx·ÖAÜT¾ÍÆ£7Ý"UÉ°J©lA$Ӏ G…†eµZaA^cZ)^W?«ûpÚ nÂÞA—iíVA)ë~'Ä ¥ªrÝÚc Í®”·­¿¯C—Ô–ÀVÃÂû ¸aâ®»Ú¡LóKLÖí LÀr]¢zÂàF·)ä5… Øí®X`paêúâ²Û‡X õ³wßJ[²•îᶟĪ&*XÊG¼={Aö>›™¿äUÃÂ[´ü²Ê„—¢Š¬ ™nÈ[h×G÷ý(Uš¥H“Q`YÍ[ƒ&d‡Aª -CTª ²ÉÆ ÛÛùGÜÌâ)}ÂúÀÖtÍß¿ÆÜü?‡ñ ½|¥Of?ʎN\WßQÌæ¦ð<} ÷çëó!Œð™c¡àcG›»Ê`Ž»Ùi8–·ƒãøEm;¶é—h#ˆÞ³:хßûÒû ŽñN endstream -endobj -666 0 obj<>/XObject<<>>>>>>endobj -667 0 obj<>stream -xµ–_oÓHÅßó)®íªüÛáe•&hÒlc`%Šc_7gƝ± ùö{gâ´1¤)hµ­ªTõõoΜ{îLo{Øôí@è‚@ºîÙ̆À±™ ~Òï.ýH„Ü<ð"E?>8{/^à8çÄ -¢⠈cÛ§'ï/'£?Nã/Tä·E´’åx´Dœ4<i³F^c™X'ž¬–Mž£„JôHn»U¬}Âl0äÍú31dêÓã‹i°‚ZÀ¡â+-ÙTì;]%òã`GýrS݂<)–¨eÂU™è-&#PµlÒº‘øçvÁ~ë†ÙŒ1_ÛÑgs\æ2¸BU ®°«ÎË ¶¥£Ëéç«ñëÇwÛº)‘|Dž"õñ²cæ»É,öÜǙ{>ÃõIY(½»d)îðú´«´ƒýürãÿ'­Æ×Éè#՚L VdH.Ś:wÛ ªÏ kϱœý×­l3ÔC"¥ŒÓ(ZPð¬H) -T“¦¨Ô¶G=R=­–çï‚ç3˜ã‹Ë7—3U -±Žo’Ö0£©É`^Tmwc¬³²@Ç6^!(½m3‘½VPx¡N¾"Á¡^ -*B@"ñ•Vá0ßs !¢ObÔɒ [A©à AÏjMìÉ|ø #’É‹éyM%ÿ\Ÿ2h-*7•b•(õMÈL¯IŸ0;x©é$#áp5šÀ·¢^²9kž]Ó×|2ëϝ Ï,jA+jyQ"¬ž•ø3»à7?‘œ&¸o üetPSôæìï¾gÛiuõê‚aYСÃUR–ÈoiêÅb° Yç™Q»@yGçæÃ;ÚìºL}*K)ê¼ÅM &‡4{А9î¢5Bÿ}ÿϚÜU]¦/Þ£,òͽt‰ÔÙ yóÚÃä¡|§Ú”Püv0… qC›yû»r[nž?Áí,(”ÝÔnüSäG˜œ†3’^h'ä ŠŒºN&îrEs%7zp´1ûwíý]p0fÌߺöwÛïÂ:ǵƵ™·#¥[v<Üõè8¦½|^õF×}KŽs¼­œ¨½eßeA¿AHWläé#a1˜ž`„wXŠ -¥‚7 9¯_³œ02ÕVh÷ui{-›é¸ šÊœŠæ8õCŸ…AD‡)¾4òÇqïïÞ¿íf¨lendstream -endobj -668 0 obj<>/XObject<<>>>>>>endobj -669 0 obj<>stream -x¥VQoÚH~çWŒt%'pmãÓ·´½T‘HrW¸¾”SµY¯ñ^Ì.õ®ãòïof½¦ºi¥SDxö›of¾ù–/£Bü‹`Ã,¾…Aé, RH²9¾ñU (܃${dCf³løDœ$A>/XObject<<>>>>>>endobj -671 0 obj<>stream -x­VMsâF½ó+úˆ+–, , 9á¯ÔVÙN²(§uÊ5µ@AÌhç¿OÏH€°ÁÙCŠ¢ -ÄtO¿×¯_ó½CD¯F Rà«^F&ƒpÃñˆ>'ôV…ÿá:JÂôÔƒäútD2ˆ)Á‰Tñ =j4“÷7Yïêaq YáêLÇ#Èr Z£2ÞçU‰ÂœUÜVÌ`\aNJVé‹ìoŠNÛè€Âƒx@wdyÿÏ/ÏÙøÛ_͉Nþýšåy)æ`$ ƒ·­A`U9°)Í´aʀ,`öt d9ªð?.$çï8-*6×}–T¼CÒ>/XObject<<>>>>>>endobj -673 0 obj<>stream +CTª ²ÉÆ ÛÛùGÜÌâ)}ÂúÀÖtÍß¿ÆÜü?‡ñ ½|¥Of?ʎN\WßQÌæ¦ð<} ÷çëó!Œð™c¡àcG›»Ê`Ž»Ùi8–·ƒãøEm;¶é—h#ˆÞ[u¢ ¿÷¥÷ŽçNendstream +endobj +624 0 obj<>/XObject<<>>>>>>endobj +625 0 obj<>stream +xµ–ooÚHÆßó)FU_$§xëµMߜÐj \pۓšª2ö8¸5»Î®–o³‹IpKH«ÓE <ûÛÙgž™å¶ç€M/B¼ÒuÏf6ŽÍ\ð£>»ô/róÀ‹<ýøà<î½x€ã@œ+ˆBˆ3 ŽmCœž¼¿œŒþ8¿PßÑN–ãÑqvÒðL¤Íydbx²FX6yŽ*QÐ#¹ìv±ö ³Átü‘7ëÏĐªOo¦Á +jK„Rˆ¯´eS±#ìt•ÈG€ì—›šèäI©°Ü@-®ÊDl1ªe“֍Ä?·ö[5Ìa܈ùZŽ>ó˜ã2—ÁªJp…Ýìl°Ü`:ºœ~¾¿~ü´­šIGä)R!;b¾›ÌbÏ}œ¹§3\Ÿ”…Ò§K–â¯O»™v°¿c‚_.üÿ”«Ñu2úEKµ"S ’K±¦ÊÝ6¨ê3èÊsÌgÿõ([µÆH.ãԊ<+Rr Õ¤)*µ­YšTw«åù;ãù fãøâòÍå d•B¬í›¤5̨k2˜UëÅ]k/†,жWJ[ÛLä@Ë +2/ÔÉWä 8Ô«BAEH$¾ÒY8Ì÷\Cˆèu²$ÁV@*8GCнZ{2>E͈$òbz^SÈ?ק …@›ÊM¥X%J}2SFkÊÏ ˜¼ÔtJ#áp5šƒÀ·¢^²™5Ï®éo>™õûN„g µ uyQ"¬ž•ø3»à7?‘œ:¸/ üe4 ¨(úpöwß³mƒ´ºùê€aYÐPƒá*)Kä7HiêÅb°3Yç™ÉvòŽææÃ-v]¦žJÄRŠªoqӂI!Í4$Ž»‡h…Ðßï­ÉݬËôÅ{”E¾¹O]"Uã!텼ƒù­ +ƒaò¾ËڄÈø)ì` +â†óöwÓm¹yþ·#° Sv]»-ðO–a^pjÎ\HZÐvÈUDÜùŠúJntãhaöïÚû»à #L›¾uíï¶ß…uƵƵ™·-¥Kv<ÜÕè8¦½|^õ&¯û’çxÛt¢ö–u|—ý>!]±‘§GÂb0=Àï°JoR^/³œ02ÑVh÷uh{-›î¸ Me¦¢§~è³0ˆh˜RàKG¯ǽ¿{ÿí\¨kendstream +endobj +626 0 obj<>/XObject<<>>>>>>endobj +627 0 obj<>stream +x¥VߏÚ8~ç¯éʞ MBB߶ímµ»{W¸¾”SåuâÛ`ÓØٔÿþf‡Â6ÝV:!Áó㛙o>óeAˆ¯æ1ÌRà»Q„ÎÒ …$›ã÷ßµ€Â$Ù« :˜Í²a8I‚xÈ# +r¼Y^^¥E°.VšÍaB +CXóñru —-!~}±þMoŠÐ§Ñ ­óqø5,ºÓ>Ðôô˜b,õV+x«•­uõ|(хZ@”&jøADPÄâK#Œ…·%«*¡¶Þ­GÂ4¦RƷڊ×P¹üFԏ¢ÅvŒeµ5ÐJ,ζ^l6/€—¬f܊ÚS9HÍ~œ. +›vXNóJ +eÉޖvŒ—R‰ (mÝ &v's©¤•¬‚%S7L±-æÛ3cZ]çP2SN€m™TXk[JŽhсvUSNiL#òɓô®L¹Ÿ”´FTlƕn}Y›‹€""áZYUp/8Fîc¢%õzÕõíÏÕJØͅGã¼NãH3Ša¤pÑ©¶O `.ƒø]üЭƒnÀj`UËr½èƂ…šÕ±›± (€åÍo  ÷Õ·»«T8k¬íIV VJ¿¾¼BjyºOãì”XH-O«Îð”L~êï®ßýޝ­B£r͛’Aäpß SK|tˆ¾­Úنü}{½ZˆöŒ¾’\çÄàÚ·÷ÿ…õäýå°´$Ÿ²~ŒÖ‰ØÄ VI¨½¤QÙ¨æêIçLsoh:¨Ü ï8?[‰՞ñaÍózÓUô3½XÞ½ÿ|}{u×lH2|×¥}Aì"Rºóé)v¦gېy=‹æø—`±€tã¼ûV—7o.áx•ÆkÌÀûÓPØio;‡‹_¹Y“yÌÓ ·ã¾rìÿc=úkôxf•4endstream +endobj +628 0 obj<>/XObject<<>>>>>>endobj +629 0 obj<>stream +x­VÛrâF}ç+úW,Y, y·ÔVÙN²(Oë”kzé[mY +V[„JCôa§ÞÅeùrÑ&BLFÔ‚8aB/øŠº‘Bãq…I֞äs¦¾>!C£Z¡:¤öÿ‚«Ù’˜ÕvGA%Huß-jãïð]ÛªÐX%H¶T¢¨8ѤA[ÎQëJVՖÛ2eÅBȵè +%†ˆ”Ò…’.wü¤!>ç¯_ž~kOœ2¿Ž´Êiٕpõ®¢J”òø’#‡õ¦ò‰§ÍOV’Û%!ƶ{­ÁüW»ýz7=ñ£Ô­ü¼XÈ㗠°¦A¦HÞ~¦iHZ/¾ ?lL¿cßzǎ2và[]µžñ§AçO“'x”3éå²ßh®û®D¾W¯$,åÖD®Üº([½º‡Â[-9ÆεæLÏý|ùH(¥òâîì—ôYÈ%9D§¹Q·dbÚÓÙxLÿhýéäéfw¸ÂZ6HTýjI7U°= £ñ~#yǝìՍàWã`8‡Ùˆš’^§.Á}Þû£÷/®Ì„endstream +endobj +630 0 obj<>/XObject<<>>>>>>endobj +631 0 obj<>stream xÝUMo›@½ûWÌѩ–/cÜ*竍”:jŒ{Š„,ÉVx×YÀMZõ¿w†…[D=U•jd ¼Ã̛·oÞ>Ž°ñr`ê‚@ºÙ̆À X~8Å{¿šCÞ,x®Ç¡wâ2whÁ ýá…Àcþá 'ÑèíÅ ¢Qᢠ‘mC”ŽgÌÇËapÃk^VGÑ7Œ^â-7ÀœQ6^Î?Ǘ‹‹kà·؟åxˆ#Êd‹ ÊJ×iUkn"»Ò…º¡IfªºTµÜ(Y¶±e¿^_ž½y½f-3•Ök.+žÁ]ç\ÃF |Ôû4å;¤§7çgËד–\o1Oªy†‰ER” Úÿ*±æØa²Þ@²ÙðD—P)¸ã î¥Âxf²Ú0#ºMÏH0Ñ#r¸o“BdqÙn(ÔFúlÜ~\ÿyð ígu¹ˆœÀ>/XObject<<>>>>>>endobj -675 0 obj<>stream +632 0 obj<>/XObject<<>>>>>>endobj +633 0 obj<>stream xÕUQoÚ0~çWÜc+A›„iš+« ¬Å<iJÙBLcC׿³CR²¶À´ía "“³ï¾ûî»ó}ƒ€_…¶ Ѻa[6¸´k9àø®)þr cèxÿ¾`hߢ/ÜÎsO}Öxó± ĶÀà®O€Å€mXtѵ:Ìñ3î GÓфÍçÁ@?Øhr= .Ù7<îÁSúx‹z–‹.¡ø[X‡I*S¡$<$i ‘ÈT˜dbr#2É«MPVI´µâOv¹Û4†;’gÊ2FæK® àª?œL5 Lژ3ÎÂ5‡DÂíàf6˜²¯AoöÒ-|` JhM„T‹°èÿz<=?~G…=T¡ñ„Ý€õ:Ò|µÂœ]˜_`{m7žG¡äóË:ܚÓÿPX'ô Tyf†ã‰¼Ï’'’YߜG‡W\ 93¸Nr{–|ÿiŒr2Ÿ•‡¿—?q¨åv»à¶©åëé?íû=¸â;ž -ԕ„ëm›Ñ×"žoö¶<»[Þ)'î^Çs,ÏõñæE×3µ¬qÓø „b8cendstream +ԕ„ëm›Ñ×"žoö¶<»[Þ)'î^Çs,ÏõñæEםŽ®Ó€5n?„X8bendstream endobj -676 0 obj<>/XObject<<>>>>>>endobj -677 0 obj<>stream +634 0 obj<>/XObject<<>>>>>>endobj +635 0 obj<>stream xÅUïo›0ýž¿â¾µ“ -3†ðc_¢VݦHm¤%ìS;M.8‰W‚SlšmýÎ@hؘTiKé*_Þ½{çw~9@ðρ€‚ëC²›À8rm¼0À˜â·à°¬¨;Æ;¸ŠGo?Dàx/Ë1Hq89ì±MmX\ލ\ÉüMü ó}pœ:ߢæŸÏ¤æï`ÒµÈ9älÃAäXYme®0V°-xÂSžÂÃÐ; g÷÷g¬YÁÍ e`õ‘{ 8‹ŸñLÈünng±–¼ -)©ÂN †}ê5eŠ3…±ÄÊ+ñÌs“gŽ -þTr¥×*/Zæuv‡½*7ì!CòL¯m -ë–j)æ5?¥lzÿ<ÅŽ_{Ò8^Ëqmj´!ß q(X§¦b&5š@"Ë\w)uqfÓE±[¯÷(3t™Û%ñ*Œf»Ô¸+#WҎ•q/Λ ×­w°Ç†W^vÑË{$#÷‰m۝á?ö#RÜÉâG®qƒ.J¥ÿÆ4›;l^Œ®†Ýf¼õ?îNØ\ 'm?ŠÀšõÓ»º„kþÌ3¹Åç >–"­º³ö¹V@"³É½®^àفâ[Œ ãÀ¨ò>}ý«…Wendstream -endobj -678 0 obj<>/XObject<<>>>>>>endobj -679 0 obj<>stream +Cø±/Q«nS¤6Òö©&œ„•Ø)6Ͷ¿~g 4Þ˜TiKé*_Þ½{çw~¹ààŸ !/€t3rlƱgûàG!Æ¿%ƒe}@¼1þûÛÁU2zû!ׇd‰XA„Aˆã8¤ç±=¶‰ ‹Ë[¸+Áß$ß0?×mò-bþùL(ö64]眧9ÇÊr+¸ÄX¶d)ËX?@íœÝߟAº¦%M+¥­°H€Ü;ÀYòŒg¹àps;K”xduHœ:4jPìS­H]œJŒV^åόë<}T²§ŠIu¼V%YÙ1o² ö²ÚЇÉ5¨:^+Ú)5-5Rº6ÌJÙöþy:KÜ 9ö[¥q¼–ëÙDkã|w—€uj*ÖaòX« ¤¢âʤdâ̦‹d~šÔáì_ÓM¡£—Gwç64/d!z{B¡=rº'ZbÇpêx¡ÒAÀ2Œ8,¦× 󟬧?íŠ;™g_uޗÓô^/@,µù:L±ÆP/N5g‰T£»ä ~`K³,ç+Pü  Xh‘¯8ìrµ©h©té½Öµ³zŠö‰Ýy½G™¡ËÜ-‰Wa´Û¥ÁÀÕX¹Vƽ8o7œYï` 1®½ì¡—÷HZîÛ֜á?ö#R܉òG®pƒ*+©þÆ4Û;¬_ SC³Ùoý»µà #;ˆcÂv}ãô®.áš=³Blñù‚UžÕÝYû\+tb½É½®~èÛaá[Œ ãúxŸŒ>~«{Vendstream +endobj +636 0 obj<>/XObject<<>>>>>>endobj +637 0 obj<>stream xÕUMsÚ0½ó+öH:ŵc›\:ù.3 iÁÉ¥t2Š½µXr%9 ýõ]ÙÐØBÒca` +=í¾÷võ£çKo"†!¤EÏu\£Ðñ!ˆ#zöé£ò:pÄ»A8t‚];|ÏuÂ]¡ÿ눓¤÷î"σ$·é„qI”’ëB’ö?^ù®‘ßQ$ßhå<Šç0 ¥ƒa@ $Yä„̦·³ÛSHš¥&¬À >ñ›Û3\øåGûÎ0ç5äRYr %­~ ,ﰉ)ÄÖï‰ρ]™µ °l÷'Òà躀>à ˜È@ÿä&]Â[U\Ô\(Ô¥-PÒ¯ª`÷«uÓÄ80MϒüÙ@ôiãØLۄÕ'¦<׊•¾c ÌûSÃ¥€Ãùl ÷2‡/¸!)™Ö\&R„%*¬kCÔÖ±Øq»rª}ŠõÙ]Â[IÜ^ÏÞ>/XObject<<>>>>>>endobj -681 0 obj<>stream -x•VQ›8~ϯ˜‡>¸@XH*õM²U´Û´MhV®qnÁ¦²ÊýúÉ]Ú,«S‰àñ7Ÿ¿ùfœŸ#lü8¸0ñ#›Øà{>qÁ›øìâ·â°k®®2½´àÙñ/.LÞÞÌÀñ ÚarŠ `bۆˆ3‚Ù ¬y [^íyðq%vrý…;}pœn§å¸ÓX˚¿ƒœïy™‚:å hÁaOó†U‰öeÅ6\Õ¤ƒA'˜)Ñú́Mù{>¿ üº^m£Û­{=êg9‘TG\ së¿Q_Wëh2„òœÕ,íNvNº…qÏh£d®J)Ô/)m°Ü#ïÿð(öïoŸV‹?^>|)3QcÙj ÛåæÛró°Zß|zplg@‹‹‘Òfèˆ )òÐ$á d;èeo×ʺÒnRXóJÆc¼Ó­W£âuS t …I2Fk®@5Œq¥Nr£Ã´I­‰wôH@`^ÊZ>V´L3*K8Ȭ#XȂ¢ÛÂM(j ™IqÂê oMllŠÖoA·-ø.™ŽìÓEוk&Il„ŽºÝ1ÞÞ\Rf…ªçðãP#›*áj‚Ê´Àš“UÕ$ÉÄ#x]à3F¶ B«Š„P‘@Ø»òÈä¬üËظ5CLË-,ç×ÀÓJáÉ4i—2¡5…4JÓºwOü·îÈ ù¼‹¡œwT@ß”ªtIÔ¯"a_ùüg—áRŠÄ‹‚²4ü¡¤Ji‰ã1¼íR®hÒ%¼éce¬[.ŸõÂió|­3hžÚ]q3`§M#2&~ڏõg@‰p3G¦·æݓ¹0ïâËgÒ¡¿³¯"–5çâ±Ná.W)´¥Ôå>¾à°ÿ^"bÃÌãñýËùUóCဠ{ØU²hM£ Ð#F˜ [‹i‘ ìfAËD·=v4ÆôTò&sl—W}­ÿ= $0ƒ{³ýaâßëfÀò0Y”ž!¢é@‡RFYåÒ½oRÖ`çŠjÜ0tfÎû rɘ}û±<ÓXºËûqÉR”‹ˆÌ7ÌܨwÇN½z:WŸhÚ_~Žç6ÿx}ëÙ¶ ?^‡8ÚðR–%¯|hpLjö–àŸŒµ{öïµû҅ï ü)Î`D½ši„e4ú2ú|a¢endstream -endobj -682 0 obj<>/XObject<<>>>>>>endobj -683 0 obj<>stream -x­VMSÛH½ó+ú´1‰,lcl jSEœ°›J¬-*‡8‡a4F -’F̌âõ¿ß×#Éãä´å¢ìžþxýúõ< i€Ï¦#:žÌá€F““ð”ƧS~ƟQ´:x]žÑpLÑ -G&§xˆ æƒE²wNÃQH7F;-uvý€ù€ÎjëþèÖ½Yÿí‚æêq–ˆ,˜I6P8@4üºè¿ÑÌ6ߎØoFЂ¤ÎËÊ)²ÊÚTô 6ôÉҟôaÙ»ùúí, ‡'߃úe†“ïÁE/{3Ììò?ϝžÓ\âôÌ(X}²HekÑ&ãS½¨\¢ -—JáT0‘/ÜpOn, a­2nÙãÝãE_ò¼-yûüÉ tørjpÇ4¶èN«ë‚~è´H‹{BÚë\¤…”YŠ2hféÒB‘eΩ¼tä4ÉD÷ŠRg©DkmbEÜu$uáŒÎ2e(›¶wÇáˆcµª¬bOU-x¢X•ªˆ9´Ì¨ûÔ:³AÃw6¤(Im“Ȭ&-eeh­Ô§¶rʬ…‰mXWÛ¡Ò8¬©qÞþ(ÍÕ²ÇÈÏå«n;æòMô‹Æ.”ù©ÌMSéB9t÷UÉ@9fJ|¦ÁLÊr½^-{h€…Í Ž÷¢™³]ZùÞ _.:ýå”; nræj"æV[\ w;*L½çÅZ»/lƒè·,ÛÉ¢u¶/uÏyxü oÁþsºEc]òÄ¥¼ÛDYfH¦ï™—ºK®e/-dƒ¥"#H­d‚1 PñÁ:Á¤õŒ¬iÝâÑÐOç)¸×é>ӝÿ,WÊ}Ö÷ºXˆÜÿo¹r»‡-ÃIP8O˜ôp8ñ‚ð‚S°jhÕZµõ<õ÷IFvzS³zy¸Õˆ–”séšK4F/.¾ìkà>bÕj[+ðVۇ-Q ¦Ü¤ÅJ/{h#Zb¥IKÜ~|,>¾·r{F®Ã÷=ó!:þwpøýHu÷Qÿbû5tÒLç9¸ä)tÙUÊi£”«ÔX÷+½ìî©«,¦;Õ.!3]Â/ýUañ¡~k۟pÿ­Eiçn<žŽÃéäiü>ð±ÑÁ?ÿ³¬ˆöendstream -endobj -684 0 obj<>/XObject<<>>>>>>endobj -685 0 obj<>stream -xUQo›0~ϯ¸ÇDª= ÈÞh³UÕZª5L}Aš8 +Ø©Á¡ù÷;CI›µ"IáàówßÝww~ž0°ðËÀ·Áñ «&µÀó=jƒø¸¶ñ§8¬ºsæQöنí8Ôùã"ž|ùîc¯Ð‰øç€, âlÞ_ºÉôG}Våø”í*™%3h‹f ͚CÍՖ+ÈdµÑM!û—i…\´ÈšB -ÐõðOÃ6-5¯¡å2¼¥³ø/2˜Cdžq\ê"‡éœ–׋R‘Ã=.zÓ7²Äö©gL¬ ÅT´¼,!—™®¸hx¼¬y»æŠwþЋíõ^Bã -㢖<Óªhv€/“iÍ9,în“ºQ:k´âɌB¼æ»Î\u¬¤ª¾zŒºŽè> ð‰Ôß5æDYê?¡nÖlXØá´ãEªgyçG­—èÝg84ó¥0åî¬Ï;Æ33±³."@~Ä”˜U2‰|²ÖpÏË´)¶3ScjŒ˜‰½z(Y¯úÔCØԁôF¤½ùk¹a¢ÞŒÑü—@ªNËNÀ½}îõ‹4 -Ð‡µmB˜ƒýaŠƒ0b«7È{‹©Ê|!Fnd––ãö(À¥âi#ܵÛéX4ÎIXWJêÍ Xl$°C^˾ۏӳO€ìé éŒ@&ÓL‹âYwå™ÌƵpûmœ9]vµ`ïëÖ¦f˜!rR Æ0´ÍnÜóùH‹gãæÈy2¦VěVª§ccê\¤M¶>0¦Å5Ž[•âèßòc0¯2|ڒ¦.Šì(„×ûø"Rì*©ëù(E2MŸRfZ”æ?^]µ™ËC­¯ÅÀü€zó9^¯eN7?Âۋ|ËK¹ÁáWºÈ;fd0&¾5æØÇ+Ëõ]ê{Þm8¼NÀoñäçäÏä Bendstream -endobj -686 0 obj<>/XObject<<>>>>>>endobj -687 0 obj<>stream -x½U]o¢@}÷WÜGš8³ òå¾l0¨!©¶+˜ÝML‹cË;€µÿ~g€º¶*í¦M1õÎ=çÜ{î ÷ªø°4虯;*VÁÐu¬n[â»&nNaUtKÃ橀fØ~/#`%ÑMۂ` ‚AU!ˆd ë"ø#֙Í:$"ÒüÁR¹æl÷XÇpöáÀnð)ßR~ÉnX¶P¢»–l%Ä,+8KSÊ!ŠcVfÅââ=< ¥âÏÍ_2ÐOô«EôB™± •Yr_Ò·ª;b Œq+î LÒ‰úë6´IÍ+sԝ¦Öˆ} ºô±ò§G°ø±TúØƆ4MÑ]Æ2˜y®ÿ¼‘* Mú®82Iäåo•Å-ãIñÛ(-i¢6/€­€&Å­´|Ïíã $‹ Žr*ãcÎʍ„Ë»ûw¯&áØs¥Aû4EyÁ˸(¹àhpæþpzÓÑUHà8zé;à;¨-å4ß°,§MgEªy–eه] /ûeNy^7Ã8È2묪†,ZÓ¯Ïû¥È*oV"E¡ãN¼éYœoâ:‚Pwb5Νà¨Ç)d¤Ÿ%y»Øñ|ègq>P¬Q“œõãh.áFNÍ; Ï®æ×áޑfÎO´÷êÔZ<|Ւrå$}ŠZrÖøÿP[MЧÈÕj¹v³9‰ec³ßS<«ãM\º¥)ۈ½ ã2YR™„žÖ"Kí·Ÿ„º¥cË´Å[VœfE9 :ß;N3ÞZendstream -endobj -688 0 obj<>/XObject<<>>>>>>endobj -689 0 obj<>stream -x½•;oà …wÿŠ;ºƒ)p—ŠÄndµŽ]ƒu²¢„HiGõñóKíÐÈC$ Ã=‡+|üîÀvàz f+# LD(„Pp»§ví ,¼ön" ôÂJ'H€žƒ` zæGH Šz&¦i‚·õæk eôYN÷f£_­AÿÏ  Ì¢çþh·ùØ®§+sw* Ï%>Äy&Óq-ŸR©jkUË8KǪÕéގ ümùp«ÆÚ^J(m\[©¤tBKZ¯wí¨J”v‚K»À-òIRÖÎZÜë‚Y‡y5Öu^8ésسzQ:É\!÷»@.ÊÔ]“YÄ9|¬ -WMæ'dqZÂbQd##ÝW2HˆÍ§i6[³ÛÃèc97Qð[pÂûúÿ"ÿø¸C"΄ýUØ2vü|í={?+͋Ãendstream -endobj -690 0 obj<>/XObject<<>>>>>>endobj -691 0 obj<>stream -xuAKÃ0†ïùﱓ,&é.’Ù9 -›Ó6ౌ5µkgeêÏ÷+›x&>Âó¼oÈ;“´%¬ÂÄ`»g‚ 5áÚYš!bÇf]ßß@J„)ÆY„„ °MC>/XObject<<>>>>>>endobj -693 0 obj<>stream -x­WMoÛ8½çW z©[4Ší¸v²{júÍaÛtëîöÀ (Êb+‰ -IÅ1öÏï’r'Ø]´mPÀ¶¤™7oÞ¼¡®&4Æ߄S:ž“lÆ٘^žN³)ÍNø<Å«¨ Ž¹p¶<8zwJÓ1-KĚ/NhYâŒñ‹½®D略É8£O¢É]XÝzÝ®é¼Å…VÔîÙòkˆ1YćÇ3X#<4ÉèUî¼ÒÇÛf4™¤Û¦‹lη-+E]o;ã™’|¥Föj=á³7ÔYs­ EÎ4ŠtëôºÂ¥W¨§w$XeßJ¯ €i¿%шA8ÿ˜'Ç\¡œ´:Wȇ¸ª¨J: •õB·T*á{«Âoé¶0G²ÖŒjȖ=Vû,Õ>ÍöÈ*…D:C -«MïèLÈo¤Ú"1ø5‘òÞ„ /ò:04”HAÑÊŠœºVÀœªw1­ÃW&пí8Q¨R·ª…\~,B¤ÎŒRu僆 Ô¡Ÿ½djGֈÅÛ!ÇÐßю¢ê~œQà r=œÎ³@•UÞj µ>."ºêUŸ@Êþp‘°ú!ŸËé|A÷s„‹»Nw†àӏ†ƒ" Mô#Ä-~ÆBÕÊsЯ&§Òš&àý)…ǘ±Ó?,3Pû}yÊòƒ¸]Ÿ7šãsHÌ Oèw¶îpz’MNoµöº·òª·æa0-Ý°Ë$ÉÓ`’nºZ± ¶ØRœ›´V­²ZÂI<{È0xŽJcicì7¶Ìö9S¶ ÏïÏ¿ÜæDÑnë¼j’|ÒŐþõç‹Oä:%u L·`.GÁ]aª¡hÕ²¥`zÙu…§j[øŒbÃÕF -[„'išN×aïø¨×º|–Œð>èÁ/îLè)Å-1ôe–vVÅq²KúÈãNË7gOÿËÓZ€ûƒ{S T)dÅL‡=‚Öö¾ëýí@=©»+®n_< ­Á“è¾Ãš­]fëCê±by%Á¥J½împdˆÞ)üRàÉù5[{ÔÈk×XžÌmˆFLVøZ+Ç«#×ä”QׄedÕU¯ÙPì+u£$FBšnËÕ¡Œ~3ø¦}B -)H†«{Ãx£«ÚuµØ†i™¡Ñ)y¡ÝjW©‚íôN‹¡®C“ñó`ÜKÔUkÜi°L‡Q¸g‹±—  åKÓc)ヺœÝb¸C _ä«0ˆ«"Ǭ¤Mãèr´Ê©ä -¸qU)–Ð0™$ˆ’^E³gܶ­wCҍ°›½·Ñ~Y+¿ƒµÊ·­€êGœ‚I Ë܅ƒ¯0/¡±…Á$µj F -Û½D¿¿ú²ºøãüýrõæìÓêÃÅÛ÷l¥àK•P§gì,/xvElÜõ`ˆNY -\ÝTØtál& &q-tZ>œÚxúé¼±íyÿ¶orøÖ`â©uêF*UàœbÁZC8þE,¸Dî0·wôü5¹X%£c/óñlm,Œ± óØàäŧ/îJMê -€‚#<¢Ádãìà±uÌܦҲÂóà ‚I’2Ã×X,PhqT N‘H‘:ª-€B2¸)­#Ծ׵ݮ´w>ŒùÃ\ᴊód`.nÈ`7¼N¨À¤KÞE s»Ë …å+¬û„U%҉)VÀ±;-¿¡²¾£|‹éR²bàÀ÷Œ/™õ˜N‡“ø,žÄŽžŠ¬ûQÂ!d7=?ªgüŽ0Š³gÿ{ï:¥.V81ëâWBüÈ Œ[²ÖçUø͎žY†( ˆ°‘(„ášâº„1ÔÝå³pVH -þ× eÄÁ3uÎï<;Շ߱ƒâb £w'w^ZNâKËÿ}1š-fÙb~ªó—ÌÑÛåÁǃhy@õendstream -endobj -694 0 obj<>/XObject<<>>>>>>endobj -695 0 obj<>stream -xWÛnÛF}÷W òÙ°dIq$')ZøZ¨õ%•&„¹²Ø» -—´âù÷ž™Ý•d9¶¡½$Ϝ™9sá×­µñÓ¡~—^õ()¶Ž†[{gmzCà nôðKJíV»Ý¦aÒ ð¯Ê -=ªÈUª¬ø÷w´·Có©6TM5ýcÇþ–NÉͬÍ3sK;{ÛöÚÔì´[]`eF€ªÚ -’.s‚÷äë.ûW¨à²|ø·KU>Oa¦nõ(±µ©"Œ!Sc]2ßuä6à]]{u*(Så(«h¬§áhe%B ßëê·§iy¸bŒx -šÓeï"£èúâèùøL\Urü'Y® -©bˆx@µCž@LH :ßzšVD­€œv> Û쎕`Lã{ALòŒÝ2‹\Ê&VBU`Æ:c’Áó0_k]/½Ì]–èÕt"$À'¶è&‰]G'§ŽO/®NNiÇT£Tß6ÕïÖ$ý]öÎö©ÓñÔìöXëCOê²äÊdÍϬ‰*1!_7eTu‰ç­©Tf8ɓLçi «éãåà³äǁÔWQ?h 0ík>¤'¼Iw™¢]æÖ¾ÇZ¬3¦}¯—¸È@µduúÁ®òßçn}:ÇV½K ì êPŠð_²²><"F¼®`ñ±ìÛcÅí0CvX-Hm" ž[û¥žIþJpÓ \Lm¢Qí܃±nXD?A3ÄkÅãíIœ‘üY¬Ú q‰†âu¥ØxÖÄ%Ôä÷€¾?q_Ηۀ¯\‘ùë™ïwý>|¢sÍ -1÷œ[ì~J—çºT¨-á<\xÆþ¨z+B“]–§´¡PKÁÍ¥5vfQýÇ0+aòu¼RäêË€Ðì¾^ö¨K ?e@vќ¹]ñ¶#7.ý ¿ñÀbËAƒÓ3 ,ihQ؜Tã±Ø‰bzBt ij¨ô8H†€y¸ï…ΰ…>³°èb•–Nˆqiýž)#ÞXÓLõDÕyµÆèDó~zbw6áÒ<«¦â–ODÑ"¦AeòŽY¦ijLáÅXض3“ä5otŠ¼…5³b0$þj¦Í{¿Ÿ~㡋& HõØiÌESa|ºz\dÓSÒ4y~<ð±ÏJZLñn®e¬!7k¦ÃÔkZ˜.ˆÒóÔJ¦ã*i+´\Çތ<\~>/XObject<<>>>>>>endobj -697 0 obj<>stream -x¥WïoGýî¿b¾™¤æ Ø5•b"· -¸ø¤¨*U´Ü-°ÉrKvï î_ß7»{)r~)â|3oÞ¼y3|=iS ¿ÛÔëÐE—²ÕI+iQ·{/û=üÛÁ_+i´Úß?x›žœ/©Ý¦tŽXÝ~Òœ§Õ¢4kŒ }O…)š¹œ‹J—ôNnT&éƒÉ% „v¥±2§­*—´¶ª(鳙9R•K?ùZÉJRúîmBc|j·ÊÉ3ÿiQ³}‘t¼ác+GfV -U øܚÕC8iñä³ÌJÚ.eH“i%‘Y9WIG‚ÞËò3›6´ÜHM¯_Sgú<‡+Îv>¼¢6*咛—É%çm·’Ë„KQ,äÍ;ENƒx ²¥*dætË5ÂM17v%JeŠðÃf§—t9à?©¡ØWZ£ -P¢^ý÷G~Mè£*r³u4JÏ;îòX42¥šßÍø‘Ùû…ÑúžM&-75$C&y'eiÕ¬*¥K(]b& -fPæ•Þõû0{hR!eîó})Ìr%Š*ä–IKáäˆÿTnñÈ–R{èx¶ ˜Èn”¬C üÉM! œ(+1SƖK³0…О" e®s@…F°Œÿ åNŸ{]‚0^ÜhL§$"*¢© -,Y¾hè©c>=jµÖrÅ£óT1ޜβ‹7‘+Ô5„B‡Êº2C€¤yý¦ š ‡·ƒM_p€óaý¥ÙKúìY˜i§Û£ð´žÿpç©Fòۏ2ž›‰Ëhãä堖á๠&r­ïÇkYÄÏ!‘ö±>#”ÁœMäÜJ·|¢pßE¨åg›Øìô“öՃbÆ=fN±QBël(˜±J öL¢€8ÙtΣÏO x‡ "ÝûA­]Ì­ÑxÆ/` ½âòé3’bIÓÆÏið>YÕ*Œ¿ÖœòÇl=q粁ƒ:½Û= ÝLèÖ饵ü¦)‚|sƒb_–Z­TûËã‚nÑUÜϝ¸Ÿ¯Èÿû»ïz”ç…=Ðï-F?©Ó·’>{Nx¢Üh£„‡îJD6§½½þÆÊÁþѺöTœ>Ê]„1‘h0ª÷kVÐFh•ï -†\·¾.‚º„;¿Pk›Œ—IˆàãÊšå= #¥D<‰ ,LÈ£ßϵXÄ~…Öò‘hàre -…“îŒÉœ6fˆ$èvr3J¯'ŸFãôfø÷§ñmz3Ýáô³UVVaKð5p@3úÌ»žµÆEù̈'ÜM,ۘ.!¯Ûm8}Ž «‡Ÿ—­á»Ô ×&»‡ßg|²xÐÇz–Ço/quOÕ -£¿”ŒÍ_þŽA—Ÿ|4¤ƒ[pˆÇXÃÀÉDÅOå²rþœT¼}Ãߪ¤†ü¬£÷•ÊýÝÕ¬¶ÙkÁ -Ÿ÷ýä²w™ôºýp{u{ ê:=ùëä´Íbendstream -endobj -698 0 obj<>/XObject<<>>>>>>endobj -699 0 obj<>stream -x¥X]O9}çWømƒT†$¥Iè„Í© ,DZU›UäÌ8‰Û{j{ Ù_¿çڞÌ$J…ö2“ûqî½çÜË÷£ë⏠ûìý€¥ÅÑåôètÒeçlºÄƒÁ?d¬›t»]6M;™ÿ7] f…y†QæRXö$ݚqŸ1|Ãîno?Ïon§×“/óë›Éíüêbzq<ýzÔe'½n2‚ÙN°Å˜u¦J]e`eÖIµr\*‘1 cÏ 5oώ“h°ßKdpû^2‡Ó5W+Á”vr)Sî¤V e¹`Ò2¢Ï·p¶ØÐW˜"CåØ£äˆh2¾ß íîw¡°BeoÜ’Í8×VÜ©œ0³Îìø€éh‡-xú9âî–ÒX—0öI?ùXyí”iÊOÚ&',ÙÒè¢m)ë¥Uڬĭ¹ó¯•F=üñP ""Ï¡È҂ž2QӑA1!.°)ÓõŠÛÄf ?íiK€8µ?!A{劉‚ÐIr¼)¯,jåX©­•CJF„|hDj0*ò/ªÜÉ/„¬-¦Ú4ÆQ´A‰Ú“Â)‡ü+ëöR%È ÛŽz¨q'VڐŠ mÈ/5¼Gñ1Ån¼+àY6±Ä²ìŒ•fÏ»v‹ìÓýݘñ²‘Q¶†`9Õb­q#ìåõ¶ê®Q×Z-j‚šÂJ¨gÝ+;È ŸRàX U* -Åû½G4[i§Ðbî%ÄY{øÕÄO@› _و -(@0a1¢WBKbò<³RC«Ð‡í–öl…¯d¯ãRJ=bžë'öÈó*ö»W?*î’/(YÎ!.÷“›vö{ëÃÛây¶ÖX¿8Rì¤¢²øeíW|îk€ß5O'<ŠQçù"¬×zÔ©#²éÁ~yA¿žŽˆc—9_a¥€”±ƒ¦3±ô++=¶k/2DU³P‰·–2î¢Gâ<€¥ªbA-´d˜/?º˜*zð j¿y‡µü-€NÃvüSH·K~³Ìt¶ñÅéy/ 3·)‰ó D\û|”coîÃÎØìOñÚ£~%½ÝýƒbðR¡ÀzVӃâõN¨:ž…6s¿êVŠ®&•PUVú…˜¾Àª»¨œ?M^OB¥óÉ¶•ÿmýlo° .q£§Ì©§+UïøøäõÌ:K¹–™—%š®÷ØÔ4”È4…£xñüûdÅ'“$ŒX–j (›qSiìÑë¸4_¶îIהx3bä¢n9œNâ4Ì'wk‰½¯x™Øó%-²+z[EÁ©7ñ0¥ÚR•°¸Ð‡;Û \ +cʄfúadaΓÞçÞo1ž!endstream +endobj +638 0 obj<>/XObject<<>>>>>>endobj +639 0 obj<>stream +x•VQ›8~ϯ˜‡>¸@X •úÀ&Ù*ÚmÚ&´÷PV+×8nÁ¦²ÊýúÉ]Ú,«S‰àñ7Ÿ¿ùfœŸ#lü8¸0ñ#›Øà{>qÁ |vñ[qض WW /-x¶Gü‹ áïï¯ãÑۛ)8Ä[Lî‡ø&¶mˆ™1%˜ÀŠ×°á՞Wð—b+Çñ_¸ÓÇévZn€;•¬ù;Èùžç)¨w-8ìiÞp  +2Ѿ¬øφ«št0HàM¡ÏìXw‘¿çó»À¯«å&^»Ýº×¡~–3AáIuÄÒ8±þõu¹Š'C(ÏYÍvÝÉÎI·0îm”lÍU)…ú%¥ –{äý¿Å>ãýíÓrþǡ/e&j,[-a³X[¬–«›OŽí hq1r@Ú ý‰!E~š¦<…l ½ìíZYWÚ B +ëo^Éd¬“wºõjT¼n*´Ð!iÆhͨ†1®ÔInt˜6©5ñŽ ̪CYËNJ–»ŒÊRr «沠趨AŠZCfRœ°zÃ[›¢õ[@Ðms¾ÍD¦#û´GÑuåZ‡Giš‘cFnwŒ·7—”Y¢ê9ü8ÔȦJy…š 2-°¦ÇdUµI3ñ^øŒ‘mƒÐª¢‘T¤õ®<29+ÿ"1nÍù“ùb‹Ù5pÁ´Rx2M ìR¦´¦0‡FiA÷î‰àvÀy!Ÿ·‰1”óŽ +(ð»£j7€$êW‘°Ž¯€|þ³Ëp© +Eê%FAÙ.ü¡¤Ji‰“1¼íR®hÚ%¼éce¬[.ŸõÂió|›­3hžÚ]q3`§M#2&S~ڞŒõg@‰h=C¦·æݓ97ïâËgÒ¡¿³¯"–5çâ±ÞÁ] +8®vЖR—ûøþi€Ãþ{AˆH 3OÆ÷/çWÍ…w‚îa[É¢5‚Ba‚l-¦E‚²›-ÝöØÑÓSɘ̰]^õµvþ÷€À îÍö‡Mˆ¯›ËÃdQ6z†P`ˆ¦Jg–kH÷¾IYƒ+j¨qÃИ9ë'È%cöíÇòLcé.ïÇ%Û¡tXDd¾fæZ½;vê…ÐÓ¹úDaù9žKüéÿ:àõ­gÛ&úxáhÃKY–¼Rð¡Á1©Ù[N€ +0Ö +ìé¿×îK¾x$ðCœÁˆzj„E<ú2úra¡endstream +endobj +640 0 obj<>/XObject<<>>>>>>endobj +641 0 obj<>stream +x•VÛrÛ6|÷Wœ§FN(V²e]<ÓÌ(LÒz_*ѓ‡(0™ŒIBÀ¨úûîE™fÜN;u98—Ý= > i€×&'t:&Y ž…SM'x‚?£hí˜ÍÂQ÷ûwñѯg4Q¼FªñoBšÁ€bٛ…“ð$¤£–:?Ž¿#|DÃaÞ?™ ¼õß.i¡£TäA$iÙQd9z@ý“1ÊrýBK’ºØTN‘UÖfº¤µ£O–~£«Þ͗¯³0ž} êƒ0 æI²êE2ˆìê˜_ݴ紐8…¸O ¬ŽÉ·4¯\ªJ—IáT€ %B¹ÔS(R$¬UÆ­zœ¦ý#ò “Ç¢ó}ááixÂóŽ!eû˜o³ÓäuIßuVfå=¡%Jt!²Ò¿•y†i›å9é$"Ïw$œSÅƑÓ$SQÞ+ʜ¥ jnµIH”I;‘Ô¥3:ϕ¡Bì:}µ®¬âLÕ&ÈD‰Ú¨2áv@Q÷™ufNœÃw6¤8Ílݓȭ&-eeh«Ô·¶vÊl…Ilؙ2:‡f€oœjÕchòUï…|ØY*óC™›ýHKå@Ñ« –A§a䈉ý +9L‚!‘z»^õ P€šö ¸ ߕƒ¯ùfÈLž·¨F_-Òö¡åNñ˜õÒÌS èùDÕÙYô ‹ X+O•l§Rs nÈë§:HÞB‘çt +\úÄú >ÛTYæ2×÷¬ ݖÁª—•2K '‘¨d+™¢‚h¬,/¯Z€Yu‘AuÉKö?h½Rî³¾×åRþÃêmڟyŽƒÒyjoÀÄpì—ó'öµ@õŸ˜í Ûlo#‹ÍqË¥Ëh—ó˚¢gèðT;ÝÁyš7ÍaìžÉʵ^õ@à·ÒdÜ^¼–ïm œßˆ¶b ÍN·OŽåK´òÿ‹à9GÛÜû§ÃډÙÕOCŠtQ@+Þ§_puxÖ:3Öý“sµ\ê*OèN5öŽ÷0Šr§KE9ÌEy몀 °TŽ%ÉÒÄÇΰ…i†ƒ 5”"LÀ~`‘¥Þ–ôCä• +éޞû|͸–QwZCÆlsÞU½ù±ŸµvºST•Òì`¸W±_Ï—hUÑVìh]•’ǒ^zÂJ¥ïn×CŸê±ÊÐcÒ¼Üs@¿­¢êÔ¼Skó H3z§›ò~ ,±‚¿ÃïáªõD©øáOeæ¥Ú¤þÚ@ÃIH×kðQÛ¸f`{(z íãB_ø쫂I ѵû+F˜p:£\eJ îGf½¼ç™ìicô:Ë48_c¼ôZl6J˜×lhP‚œ’Lâ]÷6C+è‹/.”5¨-jEÅÑ nJ%lUtÑ ˜ÀmS',6”¯¹/™Ý—à"yéèþŠ¶¸1Y‡ ?jëÙBö F¡ñ<ÀñX)¬N-’ ’¢|å°N˜W0DâCúCo7ÅW;ãܑÐG(Nø%ñ¾ó'°±d\¶ží¥ÖÌ^ùˆHýš^]Ç 2æq¤=(ÈÑl¤áŽlv‡‹~¿¬$ ˆÇƒúxs´² ¡Óò|ù»:(üg+ç;ÙßbOîM‚Iô_ +èºY2LÜ|Óõ¢óæÔðÎ/ýÞÔðäÉO¬ýÓQcjÓ°«jUqo_ Çüäæ%×DùöޒhY±!r•[µ…¾Ô¾ÞtÿÈ;œLÃñlFãñÏ؜j~ùnNïZ®7Ž~¯pså~۟ fú³ôh2 +'ã)ÆÀïg3>ö!>úóèo×Ü«:endstream +endobj +642 0 obj<>/XObject<<>>>>>>endobj +643 0 obj<>stream +x•moÚ0Çßó)î%•f7NBöÆZUjÓ­dê&!M^0#«±['òíwNš–nȁ%àóïþ÷àËӀ‡ƒØ‡ ‚|3ð¨‘Ò„IŒÏ>~€U³øŒÆÿ.L³ÁùEŒA¶BV”Đ-9žY>œÀüjE \AšÁ\äµ)ª=àŸ‹a)Ìno~Z“²2u^ÕF,Î(dk±ŽŽõ +ª5ú×fóñ,û3`4 | ~L¼gË¡Û¢,´"iJæõ¯I]­Y÷àw¥Ôî&Q/½Ûê=§Ÿn“óŸ + ÊUÉý‡F®§fcgMD€úˆ¨1…À”`€Jïðî„äU±˜™Ss‡7̄U}~1¶é%ú¶âÇ4¡ˆ½R’–NËWó—j`¢ÞŒÑü›B¦ävÇ6F¯e$~ÔúIk)m [rWglÂÚT`Nñˆ×trhq¯\ºˆp®uÎ¥à;ŸŒà•6p»SÂ`†Ý¬à$Ö¥Ñõã ,æì½®¹0Xþ ÈVÞÉÈÀ\ S<`µ*žê¦=gîü…í2vmӆM/øÉaßúÔƒ“{0ƒîØìݞGŽ(f—õcÏ~âªV*ª6}Wu¦¼Ê×}W-®T% Ïí¤èü”á葴}Q佈¨õq1QZí7º.¯õo­CþÀAÙi!ío(Eiçr_¯ŒHìðñÅè羒“Ähûÿ@áRox¡ ת2ZJeÙóÉÍt3±R?â̆˺X6#,Nc{ã·ñ~ì]Æ!£ßËHŒšû9|üP_endstream +endobj +644 0 obj<>/XObject<<>>>>>>endobj +645 0 obj<>stream +x½UÛnÚ@}ç+æёX×ëËÚô¥22 K\Zl”$˅%qklâµÓôï;kLJb ­‚BÂÌΙ3s³ +¾)Ø: Vێ¦jÀ ¦20¿ëø)8lê€Å,|<0lGÕO(Õہ~Øù4d@)„¬ÎÂ5`eMƒp¥,•iYž‘*K*¾'–77áL2›$äJ¨ÈáZ %ў¨ETUݟ;€“ãƒK¥_%iI’ Öù6N²K¨¢AÕµ=b¨)éֈUña­ôTl[…[ž¦äg–ÿÊ`î{ÁKª]ö§¸2‰€DõÄUyŸIùã´â]ˆì⢄|<)ïyßëB^RÆ_` .ã£"¯vNtŸsdܛM¢‘ïIXö0 QÕª¬ +¬Ñà,‚Á<ò§ÃYD¡.îÆù]ž¡øb—g‚7“Å94²Ý9ž}=¨/Ä~ÖQÛgÕ=dñ–~9/EváúÓ¨&‰=F®7ñ§gq¾à«¡=¡—åNÔFÔv +šg‹ü;ÙÑb„gq®HÖÚ9«G˗p']óAFóÙâkô¬Hãóã½Z—ú ߔä/]é¤aKÏ +ÿlk}]ý ­¿tœ&¸‚Þá!wì»ÁU<ä4+…âÕÃz=`ÌnîwÒwÁã<Íw¸`T%k.[%‡³ÄÖz—÷·i›ªÍ¼ps³Z×AØùÖù[ÞË_endstream +endobj +646 0 obj<>/XObject<<>>>>>>endobj +647 0 obj<>stream +x½•_KÃ0Åßû)îã|hL³4I}‘¬«£¸­µI>Ù2P÷ÏÉԏïu›ø0ú „6B8çÞròD@qE ôÌ×%8#¸’¸eøï,ƒ ®ïbˆ"°Kt%Á.Ք‚÷ª|xse_PÃϚPÆèéìÏ2A8:{£ýö°Û<­Ý…mXLt>mô8צÁºMm²Ê´ºÅï¢ýB®öæ-´Qk“ЎêÌØNp™ܲ˜eUw#îû`ÖiZÔSÛe'sæ>˜Í£±Ù¤+äØrYåÝ Yø èô¾.»²ô\eå8Oµ-ªÖjNš¨sFGR‘$ âSÙèÉ@ÃÐ}¸Õvçöï0:>/XObject<<>>>>>>endobj +649 0 obj<>stream +x­WMsÛ6½ûWìä%Ӓ¬Zv{Šó1õ!‰Ó(mžÑ€ ("! -kúçû%[ö´$ñdF$Èýxûöíòú`BcüMh>¥ã’ÍÁ8Ó/gÓlJ³Ó9~Oñß**ÃÁññ#狃£·g4Ó¢„­“ù)- +‚1îÈÑ«Jt^YšŒ3ú$š\Ð¥Õ­×íŠ.Z´¢vÏ_ƒÉ<Ú8<ž!€E1ÂK“Œ^æÎ[!}|lF“Izl:ÏNø±E¥¨ëmgœ"S’¯´£ÂȾQ­'üö†:knt¡È™F‘n^U8jq‚zêðD +«ì[éµA`ÚoH´!D#ìL‡“ã\¡œ´:Wð»ªÈJ:@*ë…n©TÂ÷V…{é¶0kG²ÖÕà-{,÷YÊ}šíU + w†þV›ÞѹßHµEBðh"ä½C‚¼Èë€Ð"uI+ rêF!攽ˈa.@oü¦cC D¡Jݪrú1 i¨Ì€QL³¼_¹¡ž½dh`GÖ° Ý·2ÚBTí½0]§'Y€Ê*o5¢•µ>€."ÎtÝ«>)S‡óì”Ùú\MOætßG8ÜVº01ý¨90ÔD=‚ÝâçÄX¨Zy6úÕäTZӄxJâÑf¬ôÏ –¨ý>yòòƒq»>o4Ûg“èîÐï,Ýáô4›œí¸öª·ôª7læf0-_®Ye’†ä©1I7]­X‡K +d)öÍ + Z©VY-¡$ž5dhìÚ¸ýtÞXö"¶Û79l\!Ö â©têV*U`Ï@²ÄZƒ8þEL¸„ïзwøô9ºX%£c.óz¶2Â؄~l°yñöÅBª‰]!  p0É8+øZl#·®´¬ðþ°Að Iôƒgè“%JY‚-.REµE   Jã¹ïUm;«íí‡Ñè+l«Ø'rqB¹áqB:]ò, +±0¶[ÿQP¨Q¾2ˆuPDU‰´1Å Øv§å7dÖw”oÐ]Jö løžð%±ÓÙ°‰Ïâ&vô¡Èº/`%,!Û¨èùѐý8ão„QÜãcïïSú×éb‰Y¿ìGd ܒ°ØW¡7[xx¬"Â|„£`†sŠãÂPwWÏ®ü¯FÊ÷Æ9plYîcÆECGoOw«1ö‰ðÑò?ŒfóY6?9«êÉ1côfqðñà,n@Âendstream +endobj +650 0 obj<>/XObject<<>>>>>>endobj +651 0 obj<>stream +xWÛnÛF}÷W òÙ°dIQ$')ZøZ¨õ%•&„¹²Ø» +—´âù÷ž™Ý•d9¶¡½$Ϝ9så×­µñÓ¡A—^õ))¶G[{§mzC£)nô÷ñKJíV»Ý¦QÒ ð¯Ê +=®ÈUª¬ø÷w´·C‹™6TÍ4ýc'þ–NÉÍ­Í3sC;{Û£¶ÚÔì´[û]beF€ªÚ +’.s‚÷èë.ûW¨à²zø·KSU>Ma®nô8±µ©"Œ!S]2ßuäžÁ9¼¼<óëTPfÊQVÑDC§áheE!QÈwºúíqZ®˜@OAsº¢Œ5ñ^AEWç‡Oë3uUÉúO³\BÅñ€j‡8˜t¾õ8­ˆZ÷9ì|@7Ù-g‚2Mî1É3vÿÑ(FLp)£þL¬DVç“ ž? óµÖõÊ[ÀÜf‰^'$©>µ%@ŸK±‹ÑøøäïáÑÉùåñ í˜jœêÛ¦úÝFJ—ƒ½Óu:¾€šÝ>çúēº,YƒB™lª9Å3kb–ɐ¯›²NªºÄóÖT*3äi¦ó4ÕôñbøYbž¥TjóýC¢÷ÒÑèøp&=~tÕÄÞjötÃè/;·Ê Èl¼¬è‹± $Œ.l™b\dα¥™.õί|r£.‚³JSþåe·ÇW£ƒ£X±Yºa¯Ôs+I‰7áh+Üîö[=Ö|ˆÐ–)R eœŽ¬é"ÊNvúƒ\„j]åt—\1I¹ +†5*taË;–è´¼-©o[Þ¾Š™¯æóÒ"‚ªBù#õ-²*Xôê6ݐ¨×óԋÃ/ +¼YžÓ\—Àó 8µyn¬¤«ôÜ!¿'SaÂ\yº,«£2T²ª•¼•ëXàÇbU_7®·ýk±¨t½ý–0°P^^N¾°ÖNkî‘ +I†8{ééP|ù]Ì1‘h'3fé«&¶¥öP«Ò¾††;BóÃsÄÏU¶DÑ ,÷½kœ]ý)3oï´*ù³48kŸÑ%Š×µbãY—P“ß=ôý‘ûr¾Ú|åJš¿^Kó^×ïÃÇ:ל!æŽc‹½ÑCéò\— +µÅ£3œ‡ ÏØRÍBh²«ò”6j)¸¹²ÆÎ,ëqðfM&_ÇkE®n°±ÜØ÷ÍîëUº°ðSöD͙Ûo;ÒqãÒ¿ô,·4ø8=ÃÀ’†Æ²0ˆÂæ¤ò¨Çr'Šá :ÜëÒÔPéqŒsß Y8ÇúÄ¢ËUZ:!Æ¥õ{¦ŒxcM3ÕSUçÕ£cÍûé96J$»³ è”Y5·|¸-bzT&Â4M)¼ü Ûvf’¼æN‘·°aV †À_εyï·â“oöY «ã¯€Þ͵Œ5ÄfÃt`˜b€úœ¦K¢ô4µ’é¸JÚ +­Öñ°'#Ï΄ûCË\ÚÜOqÇ×%VM,ôü…ÀKýƒðj|‡'$r’/{§ûa¢wû­þ›7Ô ü®}up~xÀrëÜb+rô{¥â}3>Û´ù«ºq4SsþÁ1]©b¢HÀBùëĨܱl½A¯5èïûÙïñÑÉh믭ÿ‚¸¯endstream +endobj +652 0 obj<>/XObject<<>>>>>>endobj +653 0 obj<>stream +x¥WïoGýî¿b>Õ$5gÀpÔTJˆ‰Ü*àⓢªTÑr·˜M–[²{gìþõ}³»‡11‘"ç—"Î7óæ͛7÷£6µð»Mýõ([µ’õzgø·;èãßþZI‹ð ÕþþÁ»ôètÔ¥v›Òbõ}JsBœV‹Ò¬1)ô=¦hær!*]Ò{y«2IM.I ´+•9mT¹¤µUEI_Ìܑ*¨\ÊøÉ·JV’Ò÷ïšàS»QNžøç!ڋôËQ‹ší³¤ƒä [92óR¨ÁÖ¬ÂI‹'_dVÒf)CšL+‰ÌʹJ:ôA–˜ù¬¡å­Ôôæ uf/Àp¸2ál§£sj£R.¹yÖMºœ·ÝJº —¢¸‘—ï醰C‘-UqCfAW\!\ cW¢T¦álvúIÃý“šƒ{¥5j!ZàÕ”þUBŸT‘›£qzÚùs›/€¢±)Õâþ`ÆOÌÇÆدŒÖwä!Ú¯Hr'¤˜)ZçÔ\ ± ,ôÎI{‹òJC•“4½ò,rî¾È–Ö¦r `§_™g *8•yRÄ¥ã·cZŸ&“–[’!@à­hH”¥Uóª”.¡t ˆ™(˜A@YTzÛíýì¡I…”¹Ï÷µ0ˆE”(ª–#-…C #ò½*ge(ÿFðñø§r‹G6°´—ÚCdzmøÀDžp£d…àOn +IàDY‰‰2¶\šSí)‚ÀPæ:‡@T8`4Ëø÷RnÕ¹Ó5 ᥍ÆtzAÐ)¢"šÊÐ’勆;æÓs Vk-W<8OuÃ͹á+ÛxS¹B]#(t¤¬+ã0HAšw4kÐt4ºŽiö‚œŽ²è.Í~2`ÇÂlÌ:½>…§õäø‡[xH5–w?Ê4~n&.g¨“O”ƒZFÃç&˜Êµ¾Ÿ¬e<‡DÚÅúŒPs6• +Ýò‰Â}¡–Ÿmb³3HÚ犙@ô˜9ÅF ­³¡`Ä­PZ°÷`ÄɦsB}~ZÀ;léüÞjíbnmŒÆ3~Kè5—ÿHŸ¡(Kš5~Nƒûðy€Ìº¨Vaüµæ!‚)oÄ(ñÄfô[ +¾¦ŠLW¹<µëì³ë\²d”;CY3Ny®K1Wÿ ‹¨+ ‡€ ,¼ý²¡¯ývýÞewL–}“—®É¤Ãþ\ÄÔõbµòF9ì ŽÌñ©Á‡›çh ÷É¡n­±ŽBàãá1ÌÖ7.8ø ãëí“Ð̈́Þj½—^ZËoš"èÁÁ7oaPìËR«•*`y\Ï-:Û¹·óð5ù_à]ò¼°ú½Åhâ'uúV2`Ï ¯S”Ý*á¡»‘„ÍigD/îX9Ø?ZמŠãÀG¹Ž0¦ Fõ~Í +ºZå; ‚!×­o‡‹ .áÚ/ÔÚ&ã]"ø¸±°fyOÄè@)‘Aâ ³†òè÷ -nb¿ÂŽkù@4p¹2…ÂAwÂdÎsDt5½§ÓÏãIz9úûóä*½œŒ¯qøÙ*+«°%øØ£}æ]ÏZã¢|f Äî&–mL—×í&œ>ÐÕÃÏËÖðUꅃ[“ÝÃï3>Y<èC=Kã·—¸:Œ§j…{Ñ_JÆæ/Ǡ˂G>Òá8Äc¬aàä¢âgrY9L*¤h¡œ8°õýƒ0¸e†—#Pç ÏÏ×FjÍ,CI|fmO«=2ío/ÐZ: îW_«Ž«EÀõY¼®Vo=BõPñõôp|1¹Êô§ahí#cZ;qƒCnï½zzK`L®qÁ9rUæ]+ÖoˆÝ£Mto’8N” Õ‰–団Ä!ŽøZ؃TÛ— YfËÐô +^Œ ãÍß,àÆÜØ([™µsÈòOœŽñj÷Iïüß²b×o?¾{Ëß©¤†ü¬£•ÊýÝÕ¬¶ÙoÁ +Ÿóí¤Ûï&ýÞ \^½W é"=úëè{¦_êendstream +endobj +654 0 obj<>/XObject<<>>>>>>endobj +655 0 obj<>stream +x¥X]oÛ6}ϯàÓæb»©íô-qæ5@—d‰¡˜ƒ–h›­Dª$•Ôûõ;—¤,ى4i_K¾çÞ{νù~Ôc]üï±aŸ½°´8ºœNºìœM—x0ᇌu“n·Ë¦içá#óÿ¦kÁ¬0Â0#Ê\ +˞¤[3®7†oØÃÝííçùÍíôzòe~}3¹_]L/Ž§_ºì¤×MF0Û ¶³ÎT©« ¬Ì:©VŽK%2&a칡æíÙq ö{ɀ Žcx×Kæaºæj%˜ÒN.eʝԊá£,LZ&Bô¹àÎúʁSd¨{”MÆwã¤ý½Ö½óŽ"V¨Ìâ{@²çڊ;#•f֙0í°O¿1§CÜÁÝRëÆ>é'+¯2MùI{À¤â„%[]´Í!e½t *@›Õ€¸5wþµÒˆG©«ƒVÛ("àñÄ-Ë +nìšç9`Lµ1"uù&»ä@¤Ú­RŠTPJwÜÛ|2Z­êÚÖÍòB륱õÁ{˜Ïÿ§æb˜uîn?_¿Ì?Ý\͎NÆ2 «”Ÿlز2èó’õf=Bˆm·¢HØã]†¾`øý«^øTO'g¬× cwÒ÷íLS–VXçÒ:i§™£[•¥6.tñ/œ¥(ò= +d€Þ?x!•T«]´_äÈUª:‹÷IŸɚǹ-µÎ­+—¤ôü€¸’3zãŸûh6soæïè­ÓIÓ8&#¢¼>ë†,<­“ôOzÑ@xƒ­“þ(é7Ñýµ]ºT§Àº}žê*‚ZI§ÈÞ1[,2_iÝBXËÁ¨›tVäKƺ +è$aT–XŽ=ؚ¢Ã…3\ÙB:ª Ç<‚/ª-ѯ¥Ñ)zïumZÐDRíQK ²Ê5Ϩ¦W—{~+3µ.ºÕåÐ,Ô¦0ùèdDz +m·ò®Eщs­K®Kt7’ö…ÅK§¡²Iꂬ.+•ƒnù¡nÌHÓ+D›þ¼°+â<ÿeo²®.MÔ<Æeý+-ÍEøf"•–øù>­04,4”Ldv$†˜µO?B<臈Ès(²´ §LÔtdPLˆ lÊt½‡"‡Å6±ÈO{ÚàŽ@íOÈGОD¹b¢€ tҁ/EÊ+‹Z9Vjk%ƐR!‘ŒŠ…ü‹*w²Ä !k‹©6͇qmP¢vÀ¤pÊ!ÿʺ½T 2ȶ£^j܉•6¤âACrÅ A ïQüFL±ï +x–M,±,;c@¥Ùóî…Ý";ät7f<…ld”-‚!ØcNµXëEÜ‚{y½-…ºkÔµV‹š ¦°êY÷Ê2ȧ8h•ŠBñ~ïÍVÚ)´˜{ qÄ~5ñÐfÃB6b… +LXŒè•Ð’˜<ϬÔÐ*ôa»¥=[ákÙ블R…˜çú‰=ò¼ŠýîÅՏ +„»äÆ +E–sˆËý䦝ýÞúð¶xž­ƒ5–@Á/ŽE ;©¨,~YûŸûpõË­Õγ‚õZ:uDö#=Ø//è×Óqì2ç+ ¡"vÐt&–~e¥ÇvíE†¨ +c*ñÖrBÆ]ôHœ°TU,¨…– óåGSEžåé7ﰖ¿Ð)l‡ï†t»ä7ËLg_œžgð’a·)‰ó D\û|”coîÃÎØìOñÚ£~&½ÝýƒbðR¡ÀzVӃâõN¨:ž…6s¿êVŠ®&•PUVú…˜¾Àª»¨œ?M^OB¥óÉ¶•ÿnýlo° .q£§Ì©§+UïøøäõÌ:K¹–™—%š®÷ØÔ4”È4…£xñüûdÅ'“$ŒX–j (›qSiìÑë¸4_¶îIהx3bä¢n9œNâ4Ì'wk‰½¯x™Øó%-²+z[EÁ©7ñ0¥ÚR•°¸Ð‡;Û \ °°ï¯+£C1ʌ? -Œàߘ r}TP›(+€@ˆ…Îp3#Gh#®3 ù>/XObject<<>>>>>>endobj -701 0 obj<>stream -x5K‚0…÷üŠ³ÄDj‹Ha©¨óÊ0;6E:ÁâÐjâüú¹øHӛ¦=÷ë¹ç×à´dˆyŒêèqÆÇsªQ"©†´…Æ[åÞlAäͨ‰¼é9G^ùy«`õŸ‚¶PÚµj@á—Åt„uƒ6tÊ\ mðý¶ËÞ×4ýðx´SÒïŸúÈ`uÊ¢oîUí®“üÇãĜ…äÀ¯•­}rý0Ñ -¿"¿‘ëҕ¸”ÝYY6vͶÕc€@²Dà‰(ÂXâ.H±àlÁS„·?¾–¯«%Öꢺþ¤‹—³®ÕØ™°8MHR“ÁYе¥9¨Ý¥©‘uZ‡¬¬Ú1çƒâp”ÐÎPÇÒéތ°HFLÆ ¹'PœŽW›ÜûôþwGendstream -endobj -702 0 obj<>/XObject<<>>>>>>endobj -703 0 obj<>stream -xV[o"7~çWå¥Ù6;B!Y‰ÒÝTHmÒ&lûT‘™1àvƞØH¤þø~Ǟ )UÔ\ȱ}Îù.Ç~êô¨‹ßút6¤´èt¼~?L†48ṏ+iѹœuN¯.¨ß¥ÙK†£sše„é]Œ¤Ç?¬D饥^/¡;QÌý>½¾£©Æ ¹û0û3¬ïâúgƒ¤Ž±KÂä+¡r³–6Î`¯zn„|0w¶’”VÖJíë ©Éä\8I¥qNòyž$J1W¹ò/ä Uø~iMU:2‹ÊI‹@¦8H÷xà/f7·õÐãOÓ»ýѤßM˜ wlx´QÚQäèÀê:h“Ýëç˜&Ÿ?ßÞšM~<˜'¼Îo=ŒI•"Ë,ýM‹§ìö½¼±skÑöqL@^éåÁ„p¶KøiHˆùðà¾;¸8àðl/ø§WmåÝNÈ©¢Ì%Ég>!CAk‘«ŒZèƒïQÓèã~™›¹ÈÝÞlL½‹~ÒžÃ_ýÖóWý/INu°Ž\³»‚/´!†_9ÊäBi™‘ÒÁ¢Q!ÞÙn9lpB®˜g$œSKèIðQå>lz¾=JhÂo êµÁ°= š±QƒIk)¯ŠèÍlÇwэÞ,%bۄ¾–°ŸóÂúª>†¤ êå,Êâ%Öǂ ~ñª€*M™„¼MîVÍÙ ç¹Ù°GіT.,N(j‘cíƒvn8œ9ýÜš•-vÑ]«ýÊ榃üm}^—Ö,qº7}ª¤} é%å.S,ݖ÷¨‚¶ó=8%L‹0‚oÊ«5ϝ,²3æ^„†ã>—P Oô°7ZXSz ’Ù ÉÄÇ 3™í…Ör‰;ÀZÂ|0<³®±$vxLhÊ=Ÿ¹SdRÜc€#æE`])SµPi»~Ö_Rb~ñêÐêa…°~¤—™ ta¨´±‡/* ©c‚o²“ÏÛýbxG9Eãy‘z™%tÃ0Å{UsD)²“šÙÐrC›Ùz¶à}v -à[ԛÛÓéVú…{O›Ò* -ö¢÷ºT(]yéêþu¾½.ö†£Ø”ßs)ŒÉhxŽ+-nK£.‡ù2ëüÚù[0dþendstream -endobj -704 0 obj<>/XObject<<>>>>>>endobj -705 0 obj<>stream -xWßO"I~÷¯¨·Aƒèê˜Ûœ‡¹³÷`Bš™zé»{`ùïï«îAÉìær1A`ºëÇW_}U¼Œhˆ¿݌éòšòêä·ùÉÅÃi¾Â“ë›Ï4/h8ñMÞ»Û¨:°£Ñx@ó ÓsÛJ›5Ínÿ¤ÙÞ®Nçߣ‰ÑM2q~y5ÃHwFšqÞ8ö¤ XÈ ïäv–î]ÑhÔÞß ®åޓa²«xx©×köjg—%Wžv:l¨VÞKҞtÈðRÕxÆ&¨ ­‘«™ofºÍsöžrk‚³¥\ÂE™rL{ÛHC:]¦˜µTˆÎ++F3Z*¯}Ÿ”)à6ʓ±b/ç:ˆ·éœnï½d<•ú•©,TíU…ãKª((«ÔZçÙ¹Î(ßpþêmXãëÁ•@òaľ",Ä¿e·'ÏNÛƗ{ÚmØЎÉå´³î5E+p Ú>¸& Æ킽^9'PFƒ¨ jZôiål,ç bcílƒä›z@•o(We)IÉ3á@¢ÃbþôÇdzéé9.y«Lx9ÅwH;UBp\ 4À ÕóĈ„]§(ùVˆ3¯•Sƒ‰}².V\ç: {ßÔu©ql¹ñØåwÎ-YHš5ڄËqÿ¢E¬µŠ(Gg…­”6ýŽÕE:!qõcD·wwOÏpøûíôþqBgâM¢9Mù7alÁ9*ÛFX à¤éóã#½ôbxj< ^—¥ÝI=¬ üCþI%<‡ hj µ-oÈ3a‘4ã!ƒ¶—´ôºjÊ  GŠ§0AÊC;Hx 0ÄÀè¬j|8“0}͹^šZWÁGâvЊtÜ6±q!L¾gýÔ -’¬*½SŠÖ¥]ª²`æ£ì¡USy»ä: -®-œp,®¡£ ºˆZ $ÚVòÜæäC³ZýÊlªù…Ä+Å%Ñ0´½)”C¾“-@ÛA ¬AÚµ•wL-U蕹Žþ¤ïØx(Ù@îp¥°& jwÓmÌ[£Êˆi&u®=¨€Vàƒ2K~0"juåè;Þû—Ón>ßúQŠb¼A%I‚­Õ[#¢Cœ±`3U-UŸ–(2°T‰âAÐÁ9„~ÞÄ -Üc¡d -ú¼Ûè|Óɪu}hënpG5Œ‚,¨Á#0âƒÐˆðU¶hJN“ѱò ¦H<œ©¥Ýr³@O³[©<Ê02K Õ -Ë7à4ÕçÈWª‘®¢&‘ ¯Àø0-4ª‘vi–‰”XkÕ0ŒQuBŠñˆ^Ȅxk˜ÂÁ˜™|î`à&ÜÄ$)c¥½t»B½0It§,‡\b“œ0„Ö¬¢qv˜÷øú0aÀQaJŽP1Ÿu‹Xi[àu3ä]叠 žËU,Î_ -½Z±´vg7…¡“l¥€u„FǃÕ¼½ŸõeK”0„_êBi>kÎg³Gƒá#IÒ’qXrÈSárÚv'tN—PsÇo †¢ìžÎ¥“ '-Yº8Žéږ:ߋ¦¶µOô‹‹cÐ(›Qh©(zÒý·ï’IنKtO&í›s…@”}mmq˜Œ"–¤¶VÂì?m%/½‡ÆIž•u˜4ûÒ{ÆTíQË倁Ñ>6sÝxÙ9@‘-£¢rþ£p€Àð…MKÌy7 œ¨lXQF#8í8xK¬2"GâFäŠ - ›cWøiŒÄe&)ÀNÃ?ˆ5úXšÕ¨ò}m\•ÐºÈde€¢¤Ù—üdŸ,.>X=ñî AarÐÉ"ÃHžÌf‹ûÉôëä>v¥YÖÇV!íÂ8…½·m+r-]Ä=-æ×ò«]¥½m”ôwþtܦé˜&âû¾ž‹Pì[A}ò(ÝùqÖ®UQ O¡i±Ù!{%.´—‰ß€)m€×ëŸÁt΢ \<|þXÿ?}J‹ÑÿüÉqus5¸¹þŒß,X¦nFâm2?ùëä_áê9vendstream -endobj -706 0 obj<>/XObject<<>>>>>>endobj -707 0 obj<>stream +Œàߘ r}TP›(+€@ˆ…Îp3#Gh#®3 ù>/XObject<<>>>>>>endobj +657 0 obj<>stream +x5ËnÂ0E÷ùŠ»ª@"Æi– bїšî² ‰C\‡Ú‰~}'hžæ³5Ôþ¡ôº7ƒ*–1“IJµ“&‘ÃÕ:>ƒv8endstream +endobj +658 0 obj<>/XObject<<>>>>>>endobj +659 0 obj<>stream +xVmOë6þί8â˸7´¥k˕øPv/S¥ 6èÝ>À„ÜÄi½%v°¤ýø=ÇNhZƄƋš¸¶Ï9Ï˱úÔÃoŸÆ:QZô¼~?JF4œŒñ<À¿•”\ÌN.ÏhУyŽ%£ñ„æaz#éÑ+Qyi©ßOèV” A¿Ï®ni¦1¨Eá>Ìÿ ëûã¸þãé0`‡#,À’0ùR¨Â¬¥s‡Ø«™;#̝¯$¥µµRû&Hj2¹NReœ“üGž'‰J,T¡ü3yC5¾_ZSWŽLC9iˆ' On%P¢ Ô”¥Ñ½Gû§1?-Jé*‘céJú‹Ùõ-ñ(pY*ç­ðÊh:À3Eͯ q®XQŠ‚*a1ÑqÏڋ'R =:k+&C®šÆãáöËÍo_n~™ÞLnÆÏ)Òø‹ùõM3ôðÓìvN´é÷&èn”v9|cu´Íîå󜦟?ßÜ}šO|+0Ox™ßy8'U=ˆ,³ô7åÙ ì{ycç΢íã9y¥—o&܂³]ÂOçd˜÷÷î»7ÜžÝåïÿ䲫ܠÛ)9UV…$ù$Â'd(h- +•Q}à=jú}Ü- ³Å[`w7;§þÙ é&ð× ó|ÊUÿK’3¬#×ì®à mˆáWŽ2™+-3R:¸@´*Ä;Û­€ ŽÉ•‹Œ„sj = ^#ê‡-Pï᷇ Mù­E½1¶‡A36j0i#ÅàU½™íø.ºÑ›¥Dl›Ð× +ös^X_WǤ9‹* +Þ˲B-¦qjì,osîZú…2.:”Ô«ýŠŒ–M&\µ銼X.‘hÈ2iªŒ¢q§˜Ó[;æ“Ñ^ښB{i:Mꌬ[™ ¡ ™Ð•ñ2ÏyqÓlŠhÎí'4"¼ïÁÇsC,lftñL‹gh\3‹m[Â7ÚxPâeºÒ*EK²ò±VV–˜*9¹|݋þ¯Ö>"/â;Ý$è¿!ï½’F¹ZÖ±Á¶Ìšº€Ê^S„þÆíèeËg‡…×@Š#·t!SÁ0¸‡\Îa£Í•©Ójô¸‰ŠL³V-›a¤"Ð9®$ˆ=âvNû#.ÛããþC`Hº ^Î"W/±>d0hô‹W%TiêÈ$äÝjrï°jÏ&X¸(̆=Š¶¤ +aqBP‹tsÃáÌé‡äÖ¬l±‹îZíWÆ0·í¸äo›óº²f‰Ãнrèc-ísÈH/Ñ(w™bév¼G5´]ìÁ)aZ„|P^­ùxvè `‘±ð"t0÷…€Òhx + ‡½8p¸PnMIèHf'$7Ìd¶ZË%îk óÁðÌV¸ĒØià1¡÷|æ +L‘Iq +Œl˜u•LU®Òný¬1¾¤ÄüâÕ¡ÓÃJaÿýH/3èÂPecÏk ib‚o²“OÛýbxG9Eãy‘z™%tÍ0Å{UsD)²ã†ÙÐrC›Ùz¶à}v +à[Ô«ÛÓÉVú…{O›Ò* å{Ñû=*•®½tMÿšl¯‹ýÑ86å÷\J‡ãa2Mp¥Åmi4á0_æ¿ü[ueendstream +endobj +660 0 obj<>/XObject<<>>>>>>endobj +661 0 obj<>stream +xW]O*I}÷WÔÛ¨AtõÞd_\Åìͺ˜]0wLH3S@_gºÇ§º%ãÍfc‚Àt×Ç©S§Š×£! ð7¤ë]\Q^ý6;:¿ÿJ£͖xruý…f úƒ¾Éoתìh8êÓlÍôTç¶ÒfEӛ?iºó«“ُhbxLœ]\öG0rŒ;Ã>M9oœ;҆,d†·r;K÷.i8lûWrïÑ0Ùe<¼Ð«û@µ³‹’+O[ÖT+ï‹iO:dx©jÝä9{O¹5ÁÙR.ጢL9¦m$Š /RÌÎÚ@*Dç•£-”×¾GÊðGkåÉX±—sÄÛdF7·^2žJýÂTªöªÂñ‚‚%U”Uj¥óì¿\g”¯9ñý6¬ÑUÿR ùÎ0b_â߰ۑg§mãËm×lhËäƒr ÚZ÷’¢¸m\“‡ ãvÁ^¯Œœ(£AT5-z´t6–ó±±r¶AòMݧ±Êה«²”¤ä™ð@ Q€a>{üc<‰@=ë%9.y£Lx>ÁwH;UBp\ 4À ÕóĈ„]§(ùFˆ3¯•Sƒ‰=².V\ç: {ßÔu©ql±‹ñØÅÎ-XHšIù6elÉ*ÝF˜ à¥ÉÓÃ=Ç®ðÔx”@x^–v+õ±.œó›ü“ÊxA +ÒÔ4Új[*ސgÂ*iÎ}mG.,hêuՔAŽ”Oa‚¤ûöð`ˆ€ÑiÕøp*aúšs½Aú4±®‚Äì é¸mb#C¨:~.Ïz©5$YUz+¦­J»Pe'ÀÌGDë¦òvÉv\[8á[«×FD0"†8cÁ¦ªZ¨-P>d`¨„Àƒsý¼#ˆ¸ÇB7Èôz»Öùº“UëzßÖÝàjZPƒG`Ä{á!¬lєœ&¥cå&L•x8S »á,fžf·Ty”ed–*@ªZ–¯Áiª-ΑoT#]E%L"^‚9ðaZhT#íÒ,)°Ö,ªa£#ê0„㽐 ñV0…ƒ13ùÜ À4ÀM¸‰ÉRÆJ{év…za²è6sÝxÙA@‘µ-£¢rþ£p€Àð…MKÍY7 œ©l\QF#8íxx ¬6"GâFäŠ + ›cwø4Fâr“”`'ŠáÄ},ÍjTù¾Æ®Jh]d²B@QÒìK~2ˆO!¬¢x·× 09èd‘a$§ÓùÝxòm|»RŠ,ëd+ȐvaœÂܶ 9–.âÞókùÕ®V‚Þ&Jú;:nÓtLñ}ÏE(v­ ‚¾ y”În}„8k×,‰¨† €§Ð´Øì=ÚËÄoÀ”6ÀŽëuÐ`:gQÎï¿|ü¸üE­ÿùäòú²}õ¿`pçê«øώþ:ú^<‡endstream +endobj +662 0 obj<>/XObject<<>>>>>>endobj +663 0 obj<>stream xVÑnÛ8|ÏW웒ÀVlÇ°“¾¥Ms íÝÕ>ô”DÙ¬)RGRqü÷7KÊNêÅ¡-چÔrwvfvÿ=Ó¿Æ4ŸÐåŒÊæd”h6åš^Íñï þ8Iu<˜Î®ñß7Æ8˜¾u0›þéýòäânJã1-k<>»šÓ²"<<Ѳ<ý¶–†v¶£Ìː‘0d‹ï² ôpZ ­•Y‘Íc×V"ÈGQ–¶3ááŒÂZ’2A:#4U2¥= ä.VB꼬rú(Ê5•kaVˆp¶ü~2¢áøi.«ÓµðTH¼ßˆ l Ú?8«µX­d5 o ÷qKLfsâ@/9žç×iÅÊ~èzzß¿£\Û¤/Hx™¸¤‡S`Û ï«‚g$—Ìd¼À®«ë‡³]» „uT€ö¸§J•:h½È*ivX6ÑRÞàz\¸_)ÜmmË KÁᚫüÑ@øý¾ó -’ýZ3œ\åãkNûE»Í4§Ob½'ðpkZZ€Fi›‰—Æ𷶅"ãjõ#ÐX–&¼KŸÆž³ë‚K`VSð²*ˆ‹ê˜³<Çâdù ˆ§Œ»%7 v7›¶*$öYò*@˜K¶B¶ìÈtàaL„—Y‘æ Ö<^¤Ø·3ßÂa{c·Ø$V2c׉B²…ä-A›(¸‹»«ž^ãùU>»¾¦Ùe\\ñÈûºEþš5áé·ãˆ3îoç£kÆá×+ãt>Íç³+옸:Ÿp„Ë“¿Nþëû-‘endstream +’ýZ3œ\åãkNûE»Í4§Ob½'ðpkZZ€Fi›‰—Æ𷶅"ãjõ#ÐX–&¼KŸÆž³ë‚K`VSð²*ˆ‹ê˜³<Çâdù ˆ§Œ»%7 v7›¶*$öYò*@˜K¶B¶ìÈtàaL„—Y‘æ Ö<^¤Ø·3ßÂa{c·Ø$V2c׉B²…ä-A›(¸‹»«ž^ãùU>»¾¦Ùe\\ñÈûºEþš5áé·ãˆ3îoç£kÆá×+ãt>Íç³+옸:q„Ë“¿Nþëç-endstream endobj -708 0 obj<>/XObject<<>>>>>>endobj -709 0 obj<>stream +664 0 obj<>/XObject<<>>>>>>endobj +665 0 obj<>stream x}W]oÛ8|ϯØ7'…­ú+vronÓ;hp=Ô@_ ´DÙ¬%RGRv|¿þfIú£jîдIj‘»;;;;úûfDCüÑ|L“åõÍ0ÒýlŽ§üï­¤2|0½¿ÏÞú`2™gÓ·>=>þzâÃòæýï4šÒ²DôÙ~(‘‡CZæ·£q6ÍÆ}]¼Ð³öҖ"—wË84¥Ñ(Œç8t»Ü*G•Üˊzæ ]üVÒ^XeZG[¡‹J’ó¶Í}k¥ë‡7Ò¿wғ5­WZ:2ÿoÜõ“„£ÔX³WàK›v]©œóÒ`4ÉÆ_òËh‰gDÓàán¬ÄQZªÅ‘”V^‰Jýƒ¨—œyõÈÔÐ× çdÁ¿ˆªÂ£©Þsr}’2TÈR´•ïw2p²*§Né ¥tP¸\ËYɂSd´ÄÑ!±Ré"†¤­i¬^ÒZä;‰ÊkS´@®46Ôî…Ûõ’NpoÐÙK{Ö¶ m¢«[uQž˜·Öâd(‰ 18b<œïÐì›ÒãÄÐrc¹\VÏØN`Q°†3¤®^gXž%zQIHOŒt­+`†ö-†û0¸ë¼?&J«»Nô?©C±1ÀέiMX1aUcJ19§dHô-ì%@  §Åƒ‘b\­³áÏçQh<8ÎÆï'°s Raf´«B4‰hP<Æu1œW]ý_ušeô"knç‹Ðb¶àdµÆ=-<á=ø¸6ÓðÞ$YB}|œY$žK«ÑLåÙÜD¦Â³%ÅqBƒ?¯\àS‡4:Ð×礂õ8‡°9,4Á?`“½[ÝâÓàXð=u•YàÑn“CÆ`Óú 4£T@CjãÈ¨"ºxõâƒ+ ¯èˆÃUh2[“v £IåÊUËK>T¶:øm‡å‡%h/¾`©A[(OUu§›öÓËùd*£¯Ç°¨œ' -ÕÄ÷&–S]|û 7vP@8¨ /@ªË/@Ы/ôî]Rž‡ôÒ7š?d³ÇGšÍãËd䞢Ž°²ÿÑb´9×ÁéÙÁ|ø˜ìÑÛï”Óù4›Ï`º`¢æ>üiyó×Ϳðî®endstream +ÕÄ÷&–S]|û 7vP@8¨ /@ªË/@Ы/ôî]Rž‡ôÒ7š?d³ÇGšÍãËd䞢Ž°²ÿÑb´9×ÁéÙÁ|ø˜ìÑÛï”Óù4›Ï`º`¢æ#>üiyó×ͿÜî¬endstream endobj -710 0 obj<>/XObject<<>>>>>>endobj -711 0 obj<>stream +666 0 obj<>/XObject<<>>>>>>endobj +667 0 obj<>stream xVÑNëF}ç+æ¡RB”˜$ä&‡JBË-µ1Ò}ˆmì1l±½éî:¿ïہbÚ !ÐÊ»;söÌ93üu4 >~4Ò阢ì¨ôi4îCM'Xñk™’rcr*»¿_„G'×# (Lj<PÂôûFíkc‰_U¶Mùü8ügûtVí GÁ‡Û‹p·%9•­Scž‹íÚéxՎLî<-gwëËûE8ÿRŸ<¿ú.U{‹pý°œÿ±ï›/$~Ÿzƒ~0•°EìÜڛgλÎnoï/חáêdœ­#ÿzˆru·^Þ\QYñíIYêtr•q·²Ð¹?RÇï·¼:®ÞóþöÞp,yCõ̎” ¨ä ©45‘òLþ‰©%‘[d€éåI•—Gök<ȹ_oö_ä§ÿ[Ôà§~[MZÌN[6ÊÔ 5âITÒ&eš]^Þ? ˯³ÅÕí$Öþ“«YMŒðõ¤ò8eÂ_rÞXp(lÕÔi“¿Š¥R¾¾Ô †ãJM7ØÔùsuD"$I^tþø5r^d¦Ý4Øàä9þ@&ub“)—ì ûƒ1/eÚ´©¼Zx5Ÿë’öniçóÅÃÝ;ãî@ù àH±fï´tÛ`L ÙyP"àÿißÞpT"®öI;Úi¯RÒ9*³§­æˆÉ$äLâ_”ånY°¥Ê6JGl=ޔî)70~Ä[Òt““Hê1GR)£œ_ԝ¢ÝÀ8®Ø¸½óœÁŒêîàx …G±ç®ÀJ{ÉÄÊi¤ñ*:ÕyÌ[ÆŸÜ ÝÉH.ÍãߏþÅêþ¢endstream -endobj -712 0 obj<>/XObject<<>>>>>>endobj -713 0 obj<>stream -x•W]o7|÷¯Xø% ˖c[ÎSÑ|¸ Ð8i­ )àêŽÒ1¾#/$ϊÿ}g—¼“tv ¶ùDrggggy?ftŠŸÍÏèÕ%ÍÁéô”.^½žžÓùÕŸÏðç5­Þ,N®_ÓÙ)-VØr9¿¢EIX~Š'ÅÑÛJµQ{š½šÒÊ~T–”-éfAŸUçKzo ÿØFãìËÅw9l6O‡¿:Ÿžá¸#ìžM郍ޕ]±]zN³Y^z6Ÿ^òÒ¯&V+M¥~еkm#¹U®ÖÀ¾[ºM` …kZͲÖÔö˜ô€‰VÎÓ­j–jB&’ d݆žÒ1` <Å{££U›REM]@˜ÂY«l cIÿTE¬[P¦z$HíBC¬d8åAûiŽvv ö‘ᢈҝ¤VêPx³Ô*·‘Ão?¾y6U¯; ö{ ›JqN¡Ã~†Š*ü©ÄN‚Eå\0võš—Ñ£ë€Ì"k$ f¦ô7ž…Êuu e¨’Ù*pÚª«ëÇ éÐêÂ(|­ò‘ÔÒu‘‚.:à„ÓGä~þëÓ­|÷öÓÍí!/g+¬¼]±?\•)ý6J‡´ƒóý%‰ëÅ$YŠ2vÊŽƒk´Lcjå9Ù/7¾=Çî”Ð\*3Âu]È*ˆÊX7ÊKQ¥B¥KVM§Y¢Jtó" çó¡ÀßŒF¬]‚=uϕQÃò¢þ‡0ߚ9JÕLœ0#Z@)£ïlýó™ŽfçˆJlUYŽo¸½,Jš–e„yWNxÁ@ÉâŽG—´4qüÝû[º×Xá(³Žü_4jmŠ¤ÍºŠ!9á.l‹¢ŽÂkS™¢b†Bt>´-ÄÓ¤‹ÚÀàEÚerûKM÷èk˜“ôæÚô†p8n.Ý Ê -ðàõGú¡êF•²&4(Š³Á¡å.$déã»sÑ9ħ/Ö®w| @õ,“ÝÊg¿ÊePupԊGŠ{ª8™œhL ³Ç‰Sa^O²«4CIdÑÝѶE&ƒ?±/~Ecýæ]׆íó׬-?w/ic t)uã:˜†‰Aì•Jo4‚a7[ŠJ® / ®ó…¾{)¼2>D<üˊÜe[›“°zí¢A³¤B‚è -Wƒ58S—’!`ëÉÍ»17𼑠^·lZÿ@/9²|“pç}kmµ—¸|˜j[mK6Yº½NÈã¹kF“üŽÓÙ[c^0Ö½jє'D¼š‡‡Ãç}ýBsu­íZ&gþÅÇÆÒ¬Vp~œÄ%eM<ö•ßr;VÈb`’Y&,>jÔ³W¡¤Špy`£¥{²&²Ð½â.;þß -#ıòZgS¡ÞF0_|Ý1‚XЎ»0q ¹(OÝå,ù_úbyŸaè²E?ƒà¼¬ŸÏY6<† ðäp÷»ö(ÁÊ<Õ|KᙖF Ô´Æ„Ó%úåÔù”ˆr »C…Ù:ø_‡Mä¨>½< Ç•·[ïÌ]/‚ß—à”®÷Z{~è5Á‘ä 5fŠ®Æƒ±âœÅÀ³´t&"̛gMÄ-ËzÄh©'yôm“©ŸÐÚ<ÈÃêSO2õ¼×m¢j4Zï¦\ˆ'ÉL {>ßÀ‰xzä!”š:gÔË?5Ƙ²þÂyw$w¦•wŠ×\ã -.÷Û£Ð,eÉ ?¹îo1GéŽq¼ÓT`Y{h‡]AÄÓÁވ¾->‡¡<”‡I²O±X¢x¨E#éWHh$ MªÝÃéú—ÊkhTФ‰½u£ÐC)q4nn=ÀlHãª}ÀÙ[$JÓÅ'͒¾·:]‘ ç=šl¸/¥©ÃtíW+svÌYŽ€-k.#K¼jl2ëx¬:è´Æ3¾ÚÜ­0uqeIiä.ÿ-ù 1ðT²1:Ôr›H[³==ß{Ð ƒFޞ°-;¼“KžH6Õ¥¨5nå|ü—f<¦ï†ïO#XÙü§ç‰^¦"ò¯|?¾hۘýU‹]ï¹*H㓠E˜¬¡1‘/Ș(É4­ÆÝÓߏVÃà…N+iÖ¾r"¦“뫝wÈËô>÷öÿ¾´žÏϧóË+¼ÿâýl~ÁøÞ/þ<øo­endstream -endobj -714 0 obj<>/XObject<<>>>>>>endobj -715 0 obj<>stream -xµWÛnÛF}÷W ‚–‰’|‘,£ 4uaÀIÚZi\ÄyX“+ik’Ëì.¥èÇ÷Ì.EI´ 'µa@Ö^æ̙3—ýz0¤~‡4>¦“ÅÙÁ Ðè|ÒéùŸñg$ÍÞÌú—Ži6ǑÑè,:§YB80Ð,î O¢“èhöÏA‡^ϖ’lv_k× ÍU*y¡yJÃa8ß;G#œï\å¤M" ͵¡‘Ý rš -aœŠU!œ$•“Ã}â^¯$F;디£¬´Žîy%•|(ÕúÊÂïŽè¾ÂᥰK™ÐJ¤¥´ b@= =fÓ µ’9 *-Ìç"“}ÌÕ9ì¦U—„õ—}|u HpPÃ]¤,‰Ôj×¹¤µ¨¼)š—yì”Î鮣pPª¶Y•ÚZUƒ6Ò%áû§ŽËoŽôÜÁÐíÖv€Ì[=&öŽ·*ww´d%ˆcΰîw܎uî„ÊU¾€ ¸±¡ÊsԐú ÑLS†­™²žz`Î,­•[2:|çÖ«š¶e»´Îñåºt-ÔVyÜõ®y‚, @/‹N_º¸ïïKöÓ!‘'þXëD£²ö~ԔN¥ÊUÝ°~¶±DÙCs4²ËÖé.‡R[©âqš—w\È\zšÁøžÊint£?ècõ©Ç#äÄ æ3ï§ Uº4 …l†Åîyœë4ÕkŽS¬³ ì^ì_´姰2¬¹›D'g¨À G;!£[¬Òkê—ÖôS‹´o9¹û…Q+(´ßø.ßT†ž¿½aájNp’J)s¯Yäh¯¬“xdéýÕM—?ý¸UÁnÑý̖5¦ï”ËnaDÆ -œëª¯ë_¨!%%ÊÈØiSEô¦¢DÎE™ºW ±¾î>.?Ç jÜú|Ä4j;b¿¤×ȏM ۏHçÙ«÷uÐÙºHv©Ë4áJo¥ãBo´†³›ŠPHƒúdQt-j1_³“ª(ÀŽÎбî:Á`–x™é„xé9ˆ-„wG휽VrRùt r‹jâs¯Î']dîàkå|ÆÇ'‚Ú¦h0zÞG^jTò¢SP4Å IR7¥æìFa “w¥ -- ‘B_]Qpe) áUþVn­Ü8eîLEa8­Úñó%nß`tw@h²&NCÑävɍü¢TÉÅí ?/o`3¬¥u:Tÿ|žÆ12R¬ -ùåâú—YïçTX׋—"_ȞS™|}q­Q[Ì>øïda[ ƒçiÅÂ;EÓ£6îìßЩ{ÙÎ>Õn—¶¼ÀÅmÛ}nÙõ¹µù ÿ¿“sHÌÖajÓÓº‰í§&ÌT¨ôV-r5W±ÅœäüÏvD¸Wc<꜐Z˜¹ú—£†Ê¿®fÓëë¿Ûvy3Ž ùV‚À’ïä˜o 5"vÒ°¦Ýše-~ê9¼Ø[®Qæ­/½/|t+eö,ÔtvCUšÒ\¨” F1•ð'òʧˆB‹óM¹vÈ2LŒù@kÙÝnÂ@ÇÙ¬ 稡×ïÛµÈ1 l‡:1ëz&19¢qp_ -{?©<Ñk4ßYËâ -Œ¡·ëã§eMàÞÈÈ7ÆFÂ]Ä$°êmð°ÙÇe‚9«l/珣´Û [ü¨›( ™‰q,->2µÀÀv#òë7×2±¥Ý'0ђFH{Ž""l¬TËöR~‰ŒU&RÔü…rsЛtiÚ»Dá¨`,cƒz]…Á—Õýs¢.½›Y£ºÂȎµø°ýÔØð׆Kn¥µ›îõ”ïÌòw–† ‡2ÇÌ ™ ²ŠëI’§Ç• -xSÉ$,³À0Óo•×bd󄨝õOÞÒ¿lÙWï?Ðïӛ›Oþ|û*¬m†Äèó¤ ¯³¯¥vÒÖݸy^çüp|&¼fý<}3}÷fJoñÒJ5ڍ¥ßÐ#|ÅímvöÆ4”$¼dŸ{ЎO£ñè< ÀãûuvðÇÁ£³»øendstream -endobj -716 0 obj<>/XObject<<>>>>>>endobj -717 0 obj<>stream -xm•[oÛF…ßõ+Î[i@¢)Y!e-`7I ¹´VÐQ–äPd½Üu¹¤þûÌ,uqS p×3g¾93þ2Gğ9’nbdõ$ -#,_ÅaŒå*áß þ6„br¿™\¿]b>Ǧà?‰W 69øza“omú¦ê'MS´™&Õ - OʹÞ69 -¾Ò9jÚtŠ²rpuêOù¬Ò2m3 ·Î¡­}„® ë«Íœ:Âí˜y¶X†KÎàðp¸õ<ŠÖ>âÓÝÃÃ?ÿ~ýïKÏú¥—Ïß­¿|>ƾ®ÿü}3ãêü³¾·é/E§5Œªi}ÍYK{øáJÒz”y&4»‰Ã•è|W`°cTZÛ¾2;ÏÁ 'â)Qd¶®•ÉåÐQ+‡UۛH7õñjŬ”á»jO’?Âl~.$«vxÆ•©ÚŠ pVÂÈ-ŒmQª=‹°ÂŸ»£ðÔо²;eD_’AV*³ñ|uTe¨¿Èzjö6È I5drÊ·W!Þ°8‡XA˜p$„ã±8èñÕÁfÁÙ!?Ò X£Ý5ªFݹ)“MÙ@.³ÆPÖ^È¿<¿Œ›+ª­5ªýÚWmÉ N8B¼1c>QPyî¹°ÛueN–=–Á]YÄ£gèÉáW ä~”ðìò¨_vÚ¦Je;dmÅâl!¨„MÈåãðlϐõåàÏUj¹¯.#£šÊ‚O^hɧ† -j¸šazÁL“©–¤Qãà:öFN…êt{ªA˜§Ä¶€PšŠµ¤±?9ë̋ ðٟ{j±úø´XN¨>XÎ}þãTØr¿-\é÷ž½Ð2ÊÁd>/XObject<<>>>>>>endobj -719 0 obj<>stream -xuV]oã6|ϯX\ ÄbÙ²Ûé=%mH{hãG%Q6IԉT|FÑÿÞYŠò‡b#QäîìîÌP߯Bá'¤ù˜&3Šó«Q0¢»0 îiº˜ãÿ1~+I©{1™O‚ð܋ñx~þÅ|Lº—Wç{h™"ùl¾ eBH<ÂJÜûu#J++ -§ý¡“:“¦¿üÇ ç͑ÁdŒq¨‡=a@ɇ(¬X·§†~#pÍxãr#©[ʛ€dvÆʜ6ūTg™ÞªbMbëÎÓɘ³À_T‰Â”¢’…¥L‹„Ï蔌VÅ$Š„Ìo“}¦U¯ÐH•TW$ÈԑOn5½zK"Òµm÷¯úœvDƒpŒfwœòUåe&ÉÈLÆVé‚"i·Rm&—´Éߖ',źHÕºÆì¬Ê姠_ÊJ2þ6ïÒ¥ Î(UWR®­”VrQÄÜ¥Š Æ'Ⰳ°¢XaìŽ~Jdª -À¶uš¢1»\WŸakàwg£=¤Œ‹û´ÇHÏ_Dn^ò‡Œ‘$¹4%G±fþ€&ŒËãl#t‘†ß Ÿ‡¯4þҜ;^øø›Î§Á|¶€+Ã=æ ðûò꯫ÿ@¦r7endstream -endobj -720 0 obj<>/XObject<<>>>>>>endobj -721 0 obj<>stream -x•VïOãFýÎ_1º~ÀHÁ$´_.܅ -©WlZÉZۛdg7絁´êÿÞ·?lz-”س3ofÞ¼o{#âwD“c:9£l½7 ‡4>95ÿÏ'øŒ¿’Ó¾OÂóþ‹Ëxïèê‚FŠðuv>¢8'ø)΂Ñ8< é÷RTB.i­òºàú þŠCcÁÖ:<ž„g8ÌX¶òF´bš˜$!q”B³J(I‹ZfæCHWªlüQµb12+êœçô$ªi¶N^ -M’­ñÖFF¼ÑIxlâí;$Ì# tê­®øzaôìR–=p™÷­ Ö}‡Œ?W¼”¬h!Î òIIþÈKJ9¥µ(ªC!øT‘’Å–Ø#K N&|~`Bu€ws"V<±­¦}>q%Šyp-‘;§ŒiNjÑ"y¥Fg¨äB,k”ÑEX–Û<;Áýó…°kê•øŠ$Ã<˜ؾy0æûü ¤`6¥ªTµÝ€Sèà[ÓSýèj:¤‹†ãplZ%dµëóQ‰|~ðÓn —,“bÓôÆ1镪‹•@> -¸-ugɗBWå.µ´CÚ?\òª.%I%ÿू¤Ÿe\÷IÅdNÅÍDACß¾ã3—Œá.fëMÁ´ÉÓ¤ÈÙæ¥v™’òߋÑ;æÊÑÐdˆAEÑþì}'üèuš¸¼y™l˜Öy:Þ—wŽe’4 ÏÓ(úx™\ŠgwWÓ³ä·Ù]t}ûÉWß0ÃÇû®ÿDÖì•æñÿcbùžÄw÷3K„”¿1 L ™£LNF!EºžE+ÈFNšÜê -8F(¿›ƒPHçeGªŒ—HANÖ,+H»{‚–\rPŠÛ™zd¥Pµ&70FÑ SSi¼ö¢%¹a+·ÍL4óW)zRåCÓD/Z™*K€ i -6{EuÎ<Ía¡tkⲺ¨ ¦¤Œè` ‘1>q0ø¬Úì{K?³ÚéX/tËY± C ,0×2a±yԉ€oMˆþÜ:yJUU©µ¨nÝÝ\&7·ï™Y=yÉÍL10úÁ;÷*ÛCk>/XObject<<>>>>>>endobj -723 0 obj<>stream -x•Vaâ6üίxßʞ ¶=tE½ªRO½Ô~Y 9Ž!î:vj;Ké¯ïØNnÛ[µ»E‰3oÞ¼ñ˜¿SšàJ˜f âõ`’Mènq—­h¾Zâ:ÇÇ -ÚÇùlšÍ¯|¿Ü~¸§|BÛ=°ËmKÎwøp]±Æ KÓ»Œ~û´¦Oª=X¡}4e«„»Ùþ¦Ë0žÍ³C¼1Íè}aZŸÖÌi:íÖäËlÖl+é¨4¼­…öT -Ç­,„£Êɪ٣ Ö ò• -Ž/3 ½`¾µxÍìiÃê‚Ñ,›dÀCå §³Ä‰Y^I/xXNG戕¥(C)©¹¬+U3©=>¬JúÓ3.SÊ¥>$"²AM¼[ËØG}UЉ†Yæ…:Ñޚ:6Ðiýû† -Ë4¯QÀtÉN*EL9ƒ/śҖc Ï“Ð¥±±6¸*¹o5÷Òh©ƒ^’ÄWÖ´‡Š p,µËÒPîé|pónpyF? --,Sô˓°ORÓòføG%41%áàJ© ãDiWå(~“·2©¥ +‰‘«˜…bJB{¢â”†Ìj‘*ÁÖ½[ú酵 ß½m ¼ÆÂw™3—´†¡hÅt Ï$>{’0—NãéQCÌÎ__¬Ô°:„S§Œ>°ÏÌÑ<&Fôóæ}„†ࣄR†.©;ÂÊ1ç¾äšÅÉÃrR•\eZ@AÊp¸§„=C?—ðgÔÞº`{kŒw‹¢·éJ˜¬›B–÷¢n|ôOT(H%µô»:îiê-DG ÛÅҗ$OÑ=g֕àIò.0Œ¦„æho,®¡”Ô¸¬Ypg/IH‚ŸR•—XŒ"no”N›È;¸!˜agÅA:ÌnÇM]cüîaøp“๏4AÏIÆ3î{Óïjf1‰Ü·½Ò÷}`ÍMä½V•˜„8¼Mo¸Ò~Dçwœ}äP|‚ŒFßôú_zÛyÛrO¬‘»îò ¯K7‚ žœüG<Ü|—/žwM6¸´ŠÏy¿V2ìÖ°¡BЅ[Ấ ì%êøü]4ó:ðÁ“ã‡Ö¾ŽÌLŸåSeÇESÈØÙ­H·u!RL~vtðM‡ÞkuÙÔüzñ(ND½&€A…#mÕ¾ƒˆÜ;|#D´Ž‹²ÜB¾`ی#;Ëì´Ç³°u•uÈUñ7«Zïò+ÈÛnst™¾:3Á>/XObject<<>>>>>>endobj -725 0 obj<>stream -x…TK›0¾ó+æ˜UÁBB¨ÔK¹µjUÔÓ^ 6Á]°½~d»ÿ¾ƒ!iµª¢ÉÌ|ó=ÆyŽ2Hñ“A™Ãfí¥$…ív‹Ïb_â3ǯáÐEïëh}¨ O¡î°eWî¡f€å)ž´«=ՎÈv¾(Ç-8š¶Oôȍ}¨†î¬œ»“MArì_ayFà–%…<΅dÙR˜—d7~8µ<~ÁkF×s8ÍÍ ýØ !aAYde•7-_ ÙžñõROúÛY«‰ðRs‹¤@uSm -I¶™i¿"äYºFú„¢…ä)¢1a¶{a{°ŽJF KdžBãÅÀ,tFÐzëԘ„£›×wCW wh–EVŽKdáÚþÌÅ>>8(üѪ(•b“^”4üíÙ£êìsAŠÉç% -̽ªª7’:èžæY²…?òFP9wWp•ç’fNà³b~àKæ‰ò{p@ªè©ëµVÆð`Ád¸¦ÆM;°Lþ(¤½7[+kE3à&¨8@\„kïîüՀÆWû<\æâ¾P°\s3-Ô²±1n€™Nl0Ô«9ÈúıG*3RÄ j–><¼ŸÊZ²°En( 5/ ÀчïuÓEy Æ˦FÖ­’8z¼ªIò"\ŸØžΒqãÑm|êlL½ëc͚¸Å÷–¶ëÃþυ+¶›)Êÿßç¢,H¹Ûã–ï³ÉìOuô-ú ®þY”endstream -endobj -726 0 obj<>endobj -727 0 obj<>endobj -728 0 obj<>endobj -729 0 obj<>endobj -730 0 obj<>endobj -731 0 obj<>endobj -732 0 obj<>endobj -733 0 obj<>endobj -734 0 obj<>endobj -735 0 obj<>endobj -736 0 obj<>endobj -737 0 obj<>endobj -738 0 obj<>endobj -739 0 obj<>endobj -740 0 obj<>endobj -741 0 obj<>endobj -742 0 obj<>endobj -743 0 obj<>endobj -744 0 obj<>endobj -745 0 obj<>endobj -746 0 obj<>endobj -747 0 obj<>endobj -748 0 obj<>endobj -749 0 obj<>endobj -750 0 obj<>endobj -751 0 obj<>endobj -752 0 obj<>endobj -753 0 obj<>endobj -754 0 obj<>endobj -755 0 obj<>endobj -756 0 obj<>endobj -757 0 obj<>endobj -758 0 obj<>endobj -759 0 obj<>endobj -760 0 obj<>endobj -761 0 obj<>endobj -762 0 obj<>endobj -763 0 obj<>endobj -764 0 obj<>endobj -765 0 obj<>endobj -766 0 obj<>endobj -767 0 obj<>endobj -768 0 obj<>endobj -769 0 obj<>endobj -770 0 obj<>endobj -771 0 obj<>endobj -772 0 obj<>endobj -773 0 obj<>endobj -774 0 obj<>endobj -775 0 obj<>endobj -776 0 obj<>endobj -777 0 obj<>endobj -778 0 obj<>endobj -779 0 obj<>endobj -780 0 obj<>endobj -781 0 obj<>endobj -782 0 obj<>endobj -783 0 obj<>endobj -784 0 obj<>endobj -785 0 obj<>endobj -786 0 obj<>endobj -787 0 obj<>endobj -788 0 obj<>endobj -789 0 obj<>endobj -790 0 obj<>endobj -791 0 obj<>endobj -792 0 obj<>endobj -793 0 obj<>endobj -794 0 obj<>endobj -795 0 obj<>endobj -796 0 obj<>endobj -797 0 obj<>endobj -798 0 obj<>endobj -799 0 obj<>endobj -800 0 obj<>endobj -801 0 obj<>endobj -802 0 obj<>endobj -803 0 obj<>endobj -804 0 obj<>endobj -805 0 obj<>endobj -806 0 obj<>endobj -807 0 obj<>endobj -808 0 obj<>endobj -809 0 obj<>endobj -810 0 obj<>endobj -811 0 obj<>endobj -812 0 obj<>endobj -813 0 obj<>endobj -814 0 obj<>endobj -815 0 obj<>endobj -816 0 obj<>endobj -817 0 obj<>endobj -818 0 obj<>endobj -819 0 obj<>endobj -820 0 obj<>endobj -821 0 obj<>endobj -822 0 obj<>endobj -823 0 obj<>endobj -824 0 obj<>endobj -825 0 obj<>endobj -826 0 obj<>endobj -827 0 obj<>endobj -828 0 obj<>endobj -829 0 obj<>endobj -830 0 obj<>endobj -831 0 obj<>endobj -832 0 obj<>endobj -833 0 obj<>endobj -834 0 obj<>endobj -835 0 obj<>endobj -836 0 obj<>endobj -837 0 obj<>endobj -838 0 obj<>endobj -839 0 obj<>endobj -840 0 obj<>endobj -841 0 obj<>endobj -842 0 obj<>endobj -843 0 obj<>endobj -844 0 obj<>endobj -845 0 obj<>endobj -846 0 obj<>endobj -847 0 obj<>endobj -848 0 obj<>endobj -849 0 obj<>endobj -850 0 obj<>endobj -851 0 obj<>endobj -852 0 obj<>endobj -853 0 obj<>endobj -854 0 obj<>endobj -855 0 obj<>endobj -856 0 obj<The smbpasswd file)/Dest[714 0 R/XYZ 0 771 0]/Prev 855 0 R>>endobj -857 0 obj<>endobj -858 0 obj<>endobj -859 0 obj<>endobj -860 0 obj<>endobj -861 0 obj<>endobj -862 0 obj<>endobj -863 0 obj<>endobj -864 0 obj<>endobj -865 0 obj<>endobj -866 0 obj<>endobj -867 0 obj<>endobj -868 0 obj<>endobj -869 0 obj<>endobj -870 0 obj<>1<>5<>6<>10<>12<>14<>18<>20<>25<>28<>32<>34<>69<>74<>75<>79<>82<>84<>85<>]>>>>endobj +Ø ‹f—·´QP­!²’º ÝRQÒ-ꮓ=úäµÑÞ*»¯oWªJŒmh%7/¢äu0ًZâŒÚ0%Ɠëi]ÖÁdŒÏÎh<üV50@¼˜Ñï8C;ú¥@’½ÃÙÞ¤âö§.<šŒ‚ÉxŠ>ÝÉP.ÍãߏþÅÖþ endstream +endobj +668 0 obj<>/XObject<<>>>>>>endobj +669 0 obj<>stream +x•W]o7|÷¯Xø% ˖¿ä<͇ۍ“Ö +’y¡î(ã;òBò¬øßwvÉ;Ig·@aO$wvvv–÷ã`F§ø™ÑüŒÎ¯¨hN§§tyþjzA×s|>ß״:x½88¹yEg§´XaËÕüš%aù)žGo*ÕFíiv>¥?”ý ,)[Òí‚>©6ΗôÎþ±Æٗ‹ïrØlž;>¿˜žá¸#ìžM齍ޕ]±]zA³Y^z6Ÿ^ñÒ/&V+M¥~еkm#¹U®ÖÀ¾[ºM` …kZͲÖÔö˜ô€‰VÎӝj–jB&’ d݆žÒ1` <Å{££U›REM]@˜ÂY«l cIÿTE¬[P¦z$HíBC¬d8åAûiŽvvö‘ᢈҝ¤VêPx³Ô*·‘Ãï>¼~6U¯; ö{ ›JqN¡Ã~†Š*ü©ÄN‚Eå\0võš—Ñ£ë€Ì"k$ f¦ô7ž…Êuu e¨’Ù*pÚª«ëÇ éÐêÂ(|­ò‘ÔÒu‘‚.:à„ÓGä~úëã|÷æãíÝ!/g+¬¼]±?\•)ý6J‡´ƒóý%‰ëÅ$YŠ2vÊŽƒk´Lcjå9ÙÏ·ï¿>Çî”Ð\*3Âu]È*ˆÊX7ÊKQ¥B¥KVM§Y¢Jtó" çó¡ÀßŒF¬]‚=uϕQÃò¢þ‡0ߚ9JÕLœ0#Z@)£ïlýó™ŽfˆJlUYŽo¸½,Jš–e„yWNxÁ@ÉâŽG—W´4qüí»;º×Xá(³Žü_4jmŠ¤ÍºŠ!9á.l‹¢ŽÂkS™¢b†Bt>´-ÄÓ¤‹ÚÀàEÚerûKM÷èk˜“ôæÚô†p8n.Ý Ê +ðàõGú¡êF•²&4(Š³Á¡å.$déÃÛ Ñ9ħÏÖ®w| @õ,“ÝÊg¿ÊePupԊGŠ{ª8™œhL ³Ç‰Sa^O²«4CIdÑ·£m‹Lb_ü‚ÆúÍ»® Ûç¯.Y;[~¾½¤Ð¥Ôë`j$±W*½yІÝl)*¹.¼$¸ÎúÛK1à•ñ!âáXVä.ÛÚ¬˜„Õk š%lDW¸¬Á阺”Ô[Onލ¸€çlðºeÓrøzɑ囄;ï[k«½ÄåÃTÛj[²ÉÒµèuBÏ]3 +œäwœÎÞÊó‚±îP+¤ü8!âÕ<Ü8>ïëš«km×ú09Óðÿ(>6–fµ‚óã$.)kⱯü–Û±B“ŒÈ2a‰ðQ㠞½ +%U„Ë -݃”5‘…îw¹ÜñøV!Ž•×:› +õ6‚ù¢àèŽÁĂv܅‰XÈEyê.gÉÿÒ£Èû C—-úçeý|βá1\ „ ‡»7èص_A ƨPæ©æ[ +Ï´4¥¦5&œ.Ñ7(‡ Î§D”cØ*ÌÖÀÿ:l"GõéõàY8¨¼Ýzgîzü¾§t³×Ú£ðC¯ Ž$©1óPt5† Œç,ž¥¥Ã0Á`Þ úQԈÉù‚Œ‰’LÓjÜ=ý=ñhE1 ^贒fí+'b:¹¹Þy‡¼JïsoþïKëÅüb:¿ºÆû/ÞÏæçŒïÝâàσo™endstream +endobj +670 0 obj<>/XObject<<>>>>>>endobj +671 0 obj<>stream +xµWÛnÛF}÷W ‚–‰ºX–l£ 4uaÀIÚZi\ÄyX“+ik’«ì.­èÇ÷Ì.II´ 'uÀæ^æ̙3—ýz0¤þ i:¢ã ÅÙÁ Ðäô,ÓøtŠßGøo$-ÞÌúg4œÒ|#“ÉItJó„p`0 yÜGÇÑÑüŸƒÍW’lv·ÖnZ¨Tò÷þ؆Ãp¼7šFï\æ¤M" -´¡k‘Ý ršÖÂ8«µp’TN÷‰;ý im´Ó±NI9Ê +ëèŽWRɇR­ï©XûÝà ݕ8¼v%zi!-ƒP@Glz©dN‚ + ó¹ÈdDsÀpE»iÙ%aýeß_ÞœÔp)K"µÇu.i#JoŠE;¥sºí(Ü”ªmVekm­ª@錒ðŒ}ŒS Çå7Gzá?0´C»µ óV‰½ã­ÊÝ-Y ☳lÍýŽÛ±ÎP¹Ê—07jª®?Ç jÜú|Ä4j;b¿¤7Hº†íG¤óìÕû:èl]$»ÒEšp©·Òq¥7ZÃÙº$¬¥A²¨ºŘ¯ÙÉUTàGÇ'èX·`° K¼ÊtB¼ôÄÂÛ£vÒ^©{¹A­|:¹E9ñÉWåÀ“.2wðµôN>ããAmS4˜<ï#/5*yÑ)(ºb†$©ºRs¶VÈä]©B+DOB¤ÐX7F¬×pe% :áeþ* ÷Vîœ2w¦$„0œVíøù·o0º= + tVOãP5¹_r'?/Tr~óÂÏËØ kiàGU?ŸgqŒÌ„˵ür~õ˼÷s*¬ëÅ+‘/eÏ©L¾>¿Ò(® fŸaÜw< ÷ÍR‡°-ÑÂó´Üén£ºKÕîìßÐéVE»Oµûå£-ô7l|_#»N·6á¿w’Ž3³ušÚµ®@jûÁ cj½UË\-T,@2_Æßx¼ƒœ ý‚ëäQó„ØÂØÕ¿˜Ô\Ò_—óÙÕÕßm»<Ždž|3q,WN¿ãÞBjDì¤aU» [üàsx¾·\¡Ï[_z-bøèVÌìY¨êìæª4¥…P)—8Lc*áQNä¥O…&ç&šrígò €Ö²»Ý„™ŽóYÌÎ;PC·1Þ·+‘c ØÎu>/XObject<<>>>>>>endobj +673 0 obj<>stream +xm•[oÛH …ßý+ÎÛ*€­ÈŽk;úô²(°½ìƋ-P÷a$іšÑ0«‘ìêß/9ò%õF~14òðã!õï`ŒD~cÌ'¸™!«÷«Áõû)Æc¬6r2[̱ʑÄI’`•Eï¹ý4Փ¥!FfÉÔh +“ñ~ÏuŽ\i=ÕH9¢(=|•†S9+-\SwØsksXæGØò‘°¼ZýÔ nûÌ£É4žJî‡GÂ-ÇI²üô_îþùü×Û¯/=˗^>·üö÷1&ð}ùǛÕHª ÏòžÓß<6­µp¦¢åµd-øðÇdm/óLht3‹ªó÷05ÁXËûÒm¯œH tF‘qU—롧F˼w'~âUFX'7ÛrGš?Áh|O4«’öxÆ¥+›Rtð¬a;ä Ç +³¬ü¥;O5íJný)#ö9d…q[/W{UŽöYOÍ^G¹&­†\Nùú*Æ1‚äP+(‰H<±ƒí!¾:Ø,:;äWº‘hämm*T­o +ÙT $á2vŽ²æBV¯ø…àùeÜÜPÅF՘¦÷ë¾l +uÂãëó©ê´ƒÉóÀEÜnKw²ì± éÊdÖ{Ö©Ž<^£#ÿ«„g—{Õø¶µœû]ì5¥ˆã¢R6±”»é‡g†"h_táܤ,}õ9S— 9y¡%_jÚP-Õtà fژÌ4¤ê׋7rژÖ6§”yJb (¥¡ZKû?gyI!¢øsGuÜW?;-–ªO,¹Ãœª+E¶…/¢Þ‹AC9$`‡L&Mµ‹qç:–~„š,#f.€ +12㰎Â19n·ÅƒGÇ{Kù–ŽÌ5glýú +[#UŸ£†¢>ÞK›Ba"•z¥¢¸)dœ*–àÉy™C8™'!긮LØϧו?Ñ£‘-vntMMvÝïËþäLE‹9\®ç‹xv{‹ÉtÏt!<Ü}¼¿Ã[ڑå'Ý ¿·ent¼;š'²dóHvÈMôŸ×’¦Ð´Óù4žÏò ‹óWúêÝjðçà?}˜ò£endstream +endobj +674 0 obj<>endobj +675 0 obj<>endobj +676 0 obj<>endobj +677 0 obj<>endobj +678 0 obj<>endobj +679 0 obj<>endobj +680 0 obj<>endobj +681 0 obj<>endobj +682 0 obj<>endobj +683 0 obj<>endobj +684 0 obj<>endobj +685 0 obj<>endobj +686 0 obj<>endobj +687 0 obj<>endobj +688 0 obj<>endobj +689 0 obj<>endobj +690 0 obj<>endobj +691 0 obj<>endobj +692 0 obj<>endobj +693 0 obj<>endobj +694 0 obj<>endobj +695 0 obj<>endobj +696 0 obj<>endobj +697 0 obj<>endobj +698 0 obj<>endobj +699 0 obj<>endobj +700 0 obj<>endobj +701 0 obj<>endobj +702 0 obj<>endobj +703 0 obj<>endobj +704 0 obj<>endobj +705 0 obj<>endobj +706 0 obj<>endobj +707 0 obj<>endobj +708 0 obj<>endobj +709 0 obj<>endobj +710 0 obj<>endobj +711 0 obj<>endobj +712 0 obj<>endobj +713 0 obj<>endobj +714 0 obj<>endobj +715 0 obj<>endobj +716 0 obj<>endobj +717 0 obj<>endobj +718 0 obj<>endobj +719 0 obj<>endobj +720 0 obj<>endobj +721 0 obj<>endobj +722 0 obj<>endobj +723 0 obj<>endobj +724 0 obj<>endobj +725 0 obj<>endobj +726 0 obj<>endobj +727 0 obj<>endobj +728 0 obj<>endobj +729 0 obj<>endobj +730 0 obj<>endobj +731 0 obj<>endobj +732 0 obj<>endobj +733 0 obj<>endobj +734 0 obj<>endobj +735 0 obj<>endobj +736 0 obj<>endobj +737 0 obj<>endobj +738 0 obj<>endobj +739 0 obj<>endobj +740 0 obj<>endobj +741 0 obj<>endobj +742 0 obj<>endobj +743 0 obj<>endobj +744 0 obj<>endobj +745 0 obj<>endobj +746 0 obj<>endobj +747 0 obj<>endobj +748 0 obj<>endobj +749 0 obj<>endobj +750 0 obj<>endobj +751 0 obj<>endobj +752 0 obj<>endobj +753 0 obj<>endobj +754 0 obj<>endobj +755 0 obj<>endobj +756 0 obj<>endobj +757 0 obj<>endobj +758 0 obj<>endobj +759 0 obj<>endobj +760 0 obj<>endobj +761 0 obj<>endobj +762 0 obj<>endobj +763 0 obj<>endobj +764 0 obj<>endobj +765 0 obj<>endobj +766 0 obj<>endobj +767 0 obj<>endobj +768 0 obj<>endobj +769 0 obj<>endobj +770 0 obj<>endobj +771 0 obj<>endobj +772 0 obj<>endobj +773 0 obj<>endobj +774 0 obj<>endobj +775 0 obj<>endobj +776 0 obj<>endobj +777 0 obj<>endobj +778 0 obj<>endobj +779 0 obj<>endobj +780 0 obj<>endobj +781 0 obj<>endobj +782 0 obj<>endobj +783 0 obj<>endobj +784 0 obj<>endobj +785 0 obj<>endobj +786 0 obj<>endobj +787 0 obj<>endobj +788 0 obj<>endobj +789 0 obj<>endobj +790 0 obj<>endobj +791 0 obj<>endobj +792 0 obj<>endobj +793 0 obj<>endobj +794 0 obj<>endobj +795 0 obj<>endobj +796 0 obj<>endobj +797 0 obj<>endobj +798 0 obj<>endobj +799 0 obj<>endobj +800 0 obj<>endobj +801 0 obj<>endobj +802 0 obj<>endobj +803 0 obj<>endobj +804 0 obj<>endobj +805 0 obj<>1<>5<>6<>9<>11<>13<>17<>19<>24<>27<>31<>33<>67<>72<>73<>77<>]>>>>endobj xref -0 871 +0 806 0000000000 65535 f 0000000015 00000 n -0000000242 00000 n -0000001808 00000 n -0000001882 00000 n -0000001961 00000 n -0000002039 00000 n -0000002116 00000 n -0000002195 00000 n +0000000243 00000 n +0000001809 00000 n +0000001883 00000 n +0000001962 00000 n +0000002044 00000 n +0000002122 00000 n +0000002199 00000 n 0000002278 00000 n -0000002354 00000 n -0000002436 00000 n -0000002521 00000 n -0000002580 00000 n -0000002681 00000 n -0000002783 00000 n -0000002884 00000 n -0000002985 00000 n -0000003087 00000 n -0000003189 00000 n -0000003291 00000 n -0000003392 00000 n -0000003494 00000 n -0000003596 00000 n -0000003698 00000 n -0000003800 00000 n -0000003902 00000 n -0000004003 00000 n -0000004105 00000 n -0000004207 00000 n -0000004309 00000 n -0000004411 00000 n -0000004513 00000 n -0000004615 00000 n -0000004717 00000 n -0000004819 00000 n -0000004920 00000 n -0000005021 00000 n -0000005123 00000 n -0000005225 00000 n -0000005327 00000 n -0000005429 00000 n -0000005531 00000 n -0000005633 00000 n -0000005735 00000 n -0000005837 00000 n -0000005939 00000 n -0000006041 00000 n -0000006143 00000 n -0000006245 00000 n -0000006347 00000 n -0000006449 00000 n -0000006551 00000 n -0000006652 00000 n -0000006752 00000 n -0000006852 00000 n -0000007162 00000 n -0000007263 00000 n -0000007365 00000 n -0000007467 00000 n -0000007569 00000 n -0000007671 00000 n -0000007772 00000 n -0000007874 00000 n -0000007976 00000 n -0000008078 00000 n -0000008180 00000 n -0000008282 00000 n -0000008384 00000 n -0000008485 00000 n -0000008587 00000 n -0000008689 00000 n -0000008791 00000 n -0000008893 00000 n -0000008995 00000 n -0000009097 00000 n -0000009199 00000 n -0000009301 00000 n -0000009403 00000 n -0000009504 00000 n -0000009605 00000 n -0000009707 00000 n -0000009809 00000 n -0000009911 00000 n -0000010013 00000 n -0000010115 00000 n -0000010217 00000 n -0000010319 00000 n -0000010421 00000 n -0000010523 00000 n -0000010625 00000 n -0000010727 00000 n -0000010829 00000 n -0000010931 00000 n -0000011033 00000 n -0000011135 00000 n -0000011237 00000 n -0000011339 00000 n -0000011440 00000 n -0000011540 00000 n -0000011640 00000 n -0000011965 00000 n -0000012067 00000 n -0000012170 00000 n -0000012273 00000 n -0000012376 00000 n -0000012479 00000 n -0000012582 00000 n -0000012685 00000 n -0000012788 00000 n -0000012891 00000 n -0000012994 00000 n -0000013097 00000 n -0000013200 00000 n -0000013303 00000 n -0000013406 00000 n -0000013509 00000 n -0000013612 00000 n -0000013715 00000 n -0000013818 00000 n -0000013921 00000 n -0000014024 00000 n -0000014126 00000 n -0000014229 00000 n -0000014332 00000 n -0000014435 00000 n -0000014538 00000 n -0000014641 00000 n -0000014743 00000 n -0000014846 00000 n -0000014948 00000 n -0000015051 00000 n -0000015154 00000 n -0000015257 00000 n -0000015360 00000 n -0000015463 00000 n -0000015566 00000 n -0000015669 00000 n -0000015772 00000 n -0000015875 00000 n -0000015978 00000 n -0000016081 00000 n -0000016184 00000 n -0000016285 00000 n -0000016386 00000 n -0000016487 00000 n -0000016856 00000 n -0000016958 00000 n -0000017061 00000 n -0000017163 00000 n -0000017266 00000 n -0000017369 00000 n -0000017472 00000 n -0000017575 00000 n -0000017678 00000 n -0000017781 00000 n -0000017883 00000 n -0000017986 00000 n -0000018089 00000 n -0000018191 00000 n -0000018294 00000 n -0000018397 00000 n -0000018534 00000 n -0000018589 00000 n -0000018676 00000 n -0000018731 00000 n -0000018818 00000 n -0000018885 00000 n -0000018971 00000 n -0000019073 00000 n -0000019176 00000 n -0000019279 00000 n -0000019382 00000 n +0000002361 00000 n +0000002438 00000 n +0000002520 00000 n +0000002579 00000 n +0000002680 00000 n +0000002782 00000 n +0000002883 00000 n +0000002984 00000 n +0000003086 00000 n +0000003188 00000 n +0000003290 00000 n +0000003391 00000 n +0000003493 00000 n +0000003595 00000 n +0000003697 00000 n +0000003799 00000 n +0000003901 00000 n +0000004002 00000 n +0000004104 00000 n +0000004206 00000 n +0000004308 00000 n +0000004410 00000 n +0000004512 00000 n +0000004614 00000 n +0000004716 00000 n +0000004818 00000 n +0000004919 00000 n +0000005020 00000 n +0000005122 00000 n +0000005224 00000 n +0000005326 00000 n +0000005428 00000 n +0000005530 00000 n +0000005632 00000 n +0000005734 00000 n +0000005836 00000 n +0000005938 00000 n +0000006040 00000 n +0000006142 00000 n +0000006244 00000 n +0000006346 00000 n +0000006448 00000 n +0000006550 00000 n +0000006651 00000 n +0000006751 00000 n +0000006851 00000 n +0000007161 00000 n +0000007262 00000 n +0000007364 00000 n +0000007466 00000 n +0000007568 00000 n +0000007670 00000 n +0000007771 00000 n +0000007873 00000 n +0000007975 00000 n +0000008077 00000 n +0000008179 00000 n +0000008281 00000 n +0000008383 00000 n +0000008484 00000 n +0000008586 00000 n +0000008688 00000 n +0000008790 00000 n +0000008892 00000 n +0000008994 00000 n +0000009096 00000 n +0000009198 00000 n +0000009300 00000 n +0000009402 00000 n +0000009503 00000 n +0000009604 00000 n +0000009706 00000 n +0000009808 00000 n +0000009910 00000 n +0000010012 00000 n +0000010114 00000 n +0000010216 00000 n +0000010318 00000 n +0000010420 00000 n +0000010522 00000 n +0000010624 00000 n +0000010726 00000 n +0000010828 00000 n +0000010930 00000 n +0000011032 00000 n +0000011134 00000 n +0000011236 00000 n +0000011338 00000 n +0000011439 00000 n +0000011539 00000 n +0000011639 00000 n +0000011964 00000 n +0000012066 00000 n +0000012169 00000 n +0000012272 00000 n +0000012375 00000 n +0000012478 00000 n +0000012581 00000 n +0000012684 00000 n +0000012787 00000 n +0000012890 00000 n +0000012993 00000 n +0000013096 00000 n +0000013199 00000 n +0000013302 00000 n +0000013405 00000 n +0000013508 00000 n +0000013611 00000 n +0000013714 00000 n +0000013817 00000 n +0000013920 00000 n +0000014023 00000 n +0000014125 00000 n +0000014228 00000 n +0000014331 00000 n +0000014434 00000 n +0000014537 00000 n +0000014640 00000 n +0000014742 00000 n +0000014845 00000 n +0000014947 00000 n +0000015050 00000 n +0000015153 00000 n +0000015256 00000 n +0000015359 00000 n +0000015462 00000 n +0000015565 00000 n +0000015668 00000 n +0000015771 00000 n +0000015874 00000 n +0000015977 00000 n +0000016080 00000 n +0000016183 00000 n +0000016284 00000 n +0000016385 00000 n +0000016486 00000 n +0000016855 00000 n +0000016957 00000 n +0000017060 00000 n +0000017093 00000 n +0000017148 00000 n +0000017235 00000 n +0000017290 00000 n +0000017377 00000 n +0000017444 00000 n +0000017530 00000 n +0000017632 00000 n +0000017735 00000 n +0000017838 00000 n +0000017941 00000 n +0000018043 00000 n +0000018146 00000 n +0000018249 00000 n +0000018352 00000 n +0000018455 00000 n +0000018558 00000 n +0000018660 00000 n +0000018763 00000 n +0000018866 00000 n +0000018969 00000 n +0000019072 00000 n +0000019175 00000 n +0000019278 00000 n +0000019381 00000 n 0000019484 00000 n -0000019587 00000 n -0000019690 00000 n -0000019793 00000 n -0000019896 00000 n -0000019999 00000 n -0000020101 00000 n -0000020204 00000 n -0000020307 00000 n -0000020410 00000 n -0000020513 00000 n -0000020616 00000 n -0000020719 00000 n -0000020822 00000 n -0000020925 00000 n -0000021027 00000 n -0000021129 00000 n -0000021232 00000 n -0000021335 00000 n -0000021438 00000 n -0000021541 00000 n -0000021644 00000 n -0000021747 00000 n -0000021850 00000 n -0000021953 00000 n -0000022056 00000 n -0000022159 00000 n -0000022262 00000 n -0000022365 00000 n -0000022467 00000 n -0000022568 00000 n -0000022669 00000 n +0000019586 00000 n +0000019688 00000 n +0000019791 00000 n +0000019894 00000 n +0000019997 00000 n +0000020100 00000 n +0000020203 00000 n +0000020306 00000 n +0000020409 00000 n +0000020512 00000 n +0000020615 00000 n +0000020718 00000 n +0000020821 00000 n +0000020924 00000 n +0000021026 00000 n +0000021127 00000 n +0000021228 00000 n +0000021557 00000 n +0000021660 00000 n +0000021763 00000 n +0000021866 00000 n +0000021969 00000 n +0000022072 00000 n +0000022175 00000 n +0000022278 00000 n +0000022380 00000 n +0000022483 00000 n +0000022586 00000 n +0000022689 00000 n +0000022792 00000 n +0000022895 00000 n 0000022998 00000 n -0000023101 00000 n -0000023204 00000 n -0000023307 00000 n -0000023410 00000 n -0000023513 00000 n -0000023616 00000 n -0000023719 00000 n +0000023100 00000 n +0000023203 00000 n +0000023306 00000 n +0000023409 00000 n +0000023512 00000 n +0000023615 00000 n +0000023718 00000 n 0000023821 00000 n 0000023924 00000 n 0000024027 00000 n -0000024130 00000 n -0000024233 00000 n -0000024336 00000 n -0000024439 00000 n -0000024541 00000 n -0000024644 00000 n -0000024747 00000 n -0000024850 00000 n -0000024953 00000 n -0000025056 00000 n -0000025159 00000 n -0000025262 00000 n -0000025365 00000 n -0000025468 00000 n +0000024129 00000 n +0000024231 00000 n +0000024334 00000 n +0000024437 00000 n +0000024540 00000 n +0000024643 00000 n +0000024746 00000 n +0000024849 00000 n +0000024952 00000 n +0000025055 00000 n +0000025158 00000 n +0000025261 00000 n +0000025364 00000 n +0000025467 00000 n 0000025570 00000 n -0000025672 00000 n -0000025775 00000 n -0000025878 00000 n -0000025981 00000 n -0000026084 00000 n -0000026187 00000 n -0000026290 00000 n -0000026393 00000 n -0000026496 00000 n +0000025673 00000 n +0000025776 00000 n +0000025879 00000 n +0000025982 00000 n +0000026085 00000 n +0000026188 00000 n +0000026291 00000 n +0000026394 00000 n +0000026497 00000 n 0000026599 00000 n -0000026702 00000 n -0000026805 00000 n -0000026908 00000 n -0000027011 00000 n -0000027114 00000 n -0000027217 00000 n -0000027320 00000 n -0000027423 00000 n -0000027526 00000 n -0000027629 00000 n -0000027732 00000 n -0000027835 00000 n -0000027938 00000 n -0000028040 00000 n -0000028141 00000 n -0000028242 00000 n -0000028667 00000 n +0000026700 00000 n +0000026801 00000 n +0000027226 00000 n +0000027329 00000 n +0000027432 00000 n +0000027535 00000 n +0000027638 00000 n +0000027741 00000 n +0000027844 00000 n +0000027947 00000 n +0000028050 00000 n +0000028153 00000 n +0000028256 00000 n +0000028359 00000 n +0000028462 00000 n +0000028565 00000 n +0000028668 00000 n 0000028770 00000 n 0000028873 00000 n 0000028976 00000 n 0000029079 00000 n 0000029182 00000 n 0000029285 00000 n -0000029388 00000 n -0000029491 00000 n -0000029594 00000 n -0000029697 00000 n -0000029800 00000 n -0000029903 00000 n -0000030006 00000 n -0000030109 00000 n -0000030211 00000 n -0000030314 00000 n -0000030417 00000 n -0000030520 00000 n -0000030623 00000 n -0000030726 00000 n +0000029387 00000 n +0000029490 00000 n +0000029592 00000 n +0000029695 00000 n +0000029798 00000 n +0000029901 00000 n +0000030004 00000 n +0000030107 00000 n +0000030210 00000 n +0000030313 00000 n +0000030416 00000 n +0000030519 00000 n +0000030622 00000 n +0000030725 00000 n 0000030828 00000 n -0000030931 00000 n +0000030930 00000 n 0000031033 00000 n 0000031136 00000 n 0000031239 00000 n -0000031342 00000 n -0000031445 00000 n -0000031548 00000 n -0000031651 00000 n -0000031754 00000 n -0000031857 00000 n -0000031960 00000 n -0000032063 00000 n -0000032166 00000 n -0000032269 00000 n -0000032371 00000 n -0000032474 00000 n -0000032577 00000 n -0000032680 00000 n -0000032782 00000 n -0000032885 00000 n -0000032988 00000 n -0000033091 00000 n -0000033194 00000 n -0000033297 00000 n -0000033400 00000 n -0000033502 00000 n -0000033605 00000 n -0000033707 00000 n -0000033807 00000 n -0000033908 00000 n -0000034333 00000 n -0000034436 00000 n -0000034461 00000 n -0000034545 00000 n -0000034631 00000 n -0000034705 00000 n -0000034791 00000 n -0000034824 00000 n -0000034902 00000 n -0000034989 00000 n -0000035095 00000 n -0000035181 00000 n -0000035253 00000 n -0000035339 00000 n -0000035398 00000 n -0000035485 00000 n -0000035576 00000 n -0000035662 00000 n -0000035733 00000 n -0000035819 00000 n -0000035884 00000 n -0000035918 00000 n -0000035952 00000 n -0000039512 00000 n -0000039555 00000 n -0000039598 00000 n -0000039641 00000 n -0000039684 00000 n -0000039727 00000 n -0000039770 00000 n -0000039813 00000 n -0000039856 00000 n -0000039899 00000 n -0000039942 00000 n -0000039985 00000 n -0000040028 00000 n -0000040071 00000 n -0000040114 00000 n -0000040157 00000 n -0000040200 00000 n -0000040243 00000 n -0000040286 00000 n -0000040329 00000 n -0000040372 00000 n -0000040415 00000 n -0000040458 00000 n -0000040501 00000 n -0000040544 00000 n -0000040587 00000 n -0000040630 00000 n -0000040673 00000 n -0000040716 00000 n -0000040759 00000 n -0000040802 00000 n -0000040845 00000 n -0000040888 00000 n -0000040931 00000 n -0000040974 00000 n -0000041017 00000 n -0000041060 00000 n -0000041103 00000 n -0000041146 00000 n -0000041189 00000 n -0000041232 00000 n -0000041275 00000 n -0000041318 00000 n -0000041361 00000 n -0000041404 00000 n -0000041447 00000 n -0000041490 00000 n -0000041533 00000 n -0000041576 00000 n -0000041619 00000 n -0000041662 00000 n -0000041705 00000 n -0000041748 00000 n -0000041791 00000 n -0000041834 00000 n -0000041877 00000 n -0000041920 00000 n -0000041963 00000 n -0000042006 00000 n -0000042049 00000 n -0000042092 00000 n -0000042135 00000 n -0000042178 00000 n -0000042221 00000 n -0000042264 00000 n -0000042307 00000 n -0000042350 00000 n -0000042393 00000 n -0000042436 00000 n -0000042479 00000 n -0000042522 00000 n -0000042565 00000 n -0000042608 00000 n -0000042651 00000 n -0000042694 00000 n -0000042737 00000 n -0000042780 00000 n -0000042823 00000 n -0000042866 00000 n -0000042909 00000 n -0000042952 00000 n -0000042995 00000 n -0000043038 00000 n -0000043081 00000 n -0000043124 00000 n -0000043167 00000 n -0000043210 00000 n -0000043253 00000 n -0000043296 00000 n -0000043339 00000 n -0000043382 00000 n -0000043425 00000 n -0000043468 00000 n -0000043511 00000 n -0000043554 00000 n -0000043597 00000 n -0000043640 00000 n -0000043683 00000 n -0000043726 00000 n -0000043769 00000 n -0000043812 00000 n -0000043855 00000 n -0000043898 00000 n -0000043941 00000 n -0000043984 00000 n -0000044027 00000 n -0000044070 00000 n -0000044113 00000 n -0000044156 00000 n -0000044199 00000 n -0000044242 00000 n -0000044285 00000 n -0000044328 00000 n -0000044371 00000 n -0000044414 00000 n -0000044457 00000 n -0000044500 00000 n -0000044543 00000 n -0000044586 00000 n -0000044629 00000 n -0000044672 00000 n -0000044715 00000 n -0000044758 00000 n -0000044801 00000 n -0000044844 00000 n -0000044887 00000 n -0000044930 00000 n -0000044973 00000 n -0000045016 00000 n -0000045059 00000 n -0000045102 00000 n -0000045145 00000 n -0000045188 00000 n -0000045231 00000 n -0000045274 00000 n -0000045317 00000 n -0000045360 00000 n -0000045403 00000 n -0000045446 00000 n -0000045489 00000 n -0000045532 00000 n -0000045575 00000 n -0000045618 00000 n -0000045661 00000 n -0000045704 00000 n -0000045747 00000 n -0000045790 00000 n -0000045833 00000 n -0000045876 00000 n -0000045919 00000 n -0000045962 00000 n -0000046005 00000 n -0000046048 00000 n -0000046091 00000 n -0000046134 00000 n -0000046177 00000 n -0000046220 00000 n -0000046263 00000 n -0000046306 00000 n -0000046349 00000 n -0000046392 00000 n -0000046435 00000 n -0000046478 00000 n -0000046521 00000 n -0000046564 00000 n -0000046607 00000 n -0000046650 00000 n -0000046693 00000 n -0000046736 00000 n -0000046779 00000 n -0000046822 00000 n -0000046865 00000 n -0000046908 00000 n -0000046951 00000 n -0000046994 00000 n -0000047037 00000 n -0000047080 00000 n -0000047123 00000 n -0000047166 00000 n -0000047209 00000 n -0000047252 00000 n -0000047295 00000 n -0000047338 00000 n -0000047381 00000 n -0000047424 00000 n -0000047467 00000 n -0000047510 00000 n -0000047553 00000 n -0000047596 00000 n -0000047639 00000 n -0000047682 00000 n -0000047725 00000 n -0000047768 00000 n -0000047811 00000 n -0000047854 00000 n -0000047897 00000 n -0000047940 00000 n -0000047983 00000 n -0000048026 00000 n -0000048069 00000 n -0000048112 00000 n -0000048155 00000 n -0000048198 00000 n -0000048241 00000 n -0000048284 00000 n -0000048327 00000 n -0000048370 00000 n -0000048413 00000 n -0000048456 00000 n -0000048499 00000 n -0000048542 00000 n -0000048585 00000 n -0000048628 00000 n -0000048671 00000 n -0000048714 00000 n -0000048757 00000 n -0000048800 00000 n -0000048843 00000 n -0000048886 00000 n -0000048929 00000 n -0000048972 00000 n -0000049015 00000 n -0000049750 00000 n -0000049907 00000 n -0000050074 00000 n -0000050263 00000 n -0000052866 00000 n -0000053056 00000 n -0000056162 00000 n -0000056352 00000 n -0000059894 00000 n -0000060084 00000 n -0000061357 00000 n -0000061514 00000 n -0000061743 00000 n -0000061942 00000 n -0000063751 00000 n -0000063922 00000 n -0000066005 00000 n -0000066176 00000 n -0000068463 00000 n -0000068634 00000 n -0000068890 00000 n -0000069056 00000 n -0000070701 00000 n -0000070867 00000 n -0000072409 00000 n -0000072575 00000 n -0000074309 00000 n -0000074475 00000 n -0000076211 00000 n -0000076386 00000 n -0000077652 00000 n -0000077827 00000 n -0000079038 00000 n -0000079213 00000 n -0000080460 00000 n -0000080626 00000 n -0000081536 00000 n -0000081726 00000 n -0000083690 00000 n -0000083846 00000 n -0000085623 00000 n -0000085789 00000 n -0000087771 00000 n -0000087937 00000 n -0000088673 00000 n -0000088848 00000 n -0000089890 00000 n -0000090056 00000 n -0000091692 00000 n -0000091858 00000 n -0000092482 00000 n -0000092657 00000 n -0000093987 00000 n -0000094162 00000 n -0000095236 00000 n -0000095402 00000 n -0000096003 00000 n -0000096169 00000 n -0000097955 00000 n -0000098121 00000 n -0000099838 00000 n -0000100004 00000 n -0000101853 00000 n -0000102009 00000 n -0000103124 00000 n -0000103308 00000 n -0000104915 00000 n -0000105080 00000 n -0000105969 00000 n -0000106168 00000 n -0000107893 00000 n -0000108068 00000 n -0000109893 00000 n -0000110068 00000 n -0000110679 00000 n -0000110854 00000 n -0000111629 00000 n -0000111804 00000 n -0000112561 00000 n -0000112736 00000 n -0000113574 00000 n -0000113749 00000 n -0000114585 00000 n -0000114769 00000 n -0000115609 00000 n -0000115784 00000 n -0000116544 00000 n -0000116709 00000 n -0000117334 00000 n -0000117518 00000 n -0000118286 00000 n -0000118461 00000 n -0000119423 00000 n -0000119607 00000 n -0000120942 00000 n -0000121126 00000 n -0000122144 00000 n -0000122309 00000 n -0000122888 00000 n -0000123072 00000 n -0000124132 00000 n -0000124307 00000 n -0000125185 00000 n -0000125360 00000 n -0000126454 00000 n -0000126638 00000 n -0000127525 00000 n -0000127709 00000 n -0000128486 00000 n -0000128661 00000 n -0000129262 00000 n -0000129437 00000 n -0000130099 00000 n -0000130283 00000 n -0000131259 00000 n -0000131434 00000 n -0000132442 00000 n -0000132617 00000 n -0000133611 00000 n -0000133795 00000 n -0000134627 00000 n -0000134802 00000 n -0000135534 00000 n -0000135709 00000 n -0000136391 00000 n -0000136566 00000 n -0000137395 00000 n -0000137570 00000 n -0000138558 00000 n -0000138733 00000 n -0000140117 00000 n -0000140301 00000 n -0000141095 00000 n -0000141279 00000 n -0000141941 00000 n -0000142116 00000 n -0000142523 00000 n -0000142688 00000 n -0000142994 00000 n -0000143189 00000 n -0000144721 00000 n -0000144896 00000 n -0000146611 00000 n -0000146796 00000 n -0000148377 00000 n -0000148562 00000 n -0000150328 00000 n -0000150494 00000 n -0000150873 00000 n -0000151048 00000 n -0000152345 00000 n -0000152520 00000 n -0000154223 00000 n -0000154399 00000 n -0000156151 00000 n -0000156317 00000 n -0000158211 00000 n -0000158395 00000 n -0000159665 00000 n -0000159840 00000 n -0000161568 00000 n -0000161780 00000 n -0000163402 00000 n -0000163585 00000 n -0000164497 00000 n -0000164672 00000 n -0000165960 00000 n -0000166154 00000 n -0000167493 00000 n -0000167677 00000 n -0000168711 00000 n -0000168886 00000 n -0000169535 00000 n -0000169591 00000 n -0000169690 00000 n -0000169843 00000 n +0000031568 00000 n +0000031652 00000 n +0000031738 00000 n +0000031812 00000 n +0000031898 00000 n +0000031931 00000 n +0000032009 00000 n +0000032096 00000 n +0000032202 00000 n +0000032288 00000 n +0000032360 00000 n +0000032446 00000 n +0000032505 00000 n +0000032592 00000 n +0000032683 00000 n +0000032769 00000 n +0000032840 00000 n +0000032926 00000 n +0000032991 00000 n +0000033025 00000 n +0000033059 00000 n +0000036406 00000 n +0000036449 00000 n +0000036492 00000 n +0000036535 00000 n +0000036578 00000 n +0000036621 00000 n +0000036664 00000 n +0000036707 00000 n +0000036750 00000 n +0000036793 00000 n +0000036836 00000 n +0000036879 00000 n +0000036922 00000 n +0000036965 00000 n +0000037008 00000 n +0000037051 00000 n +0000037094 00000 n +0000037137 00000 n +0000037180 00000 n +0000037223 00000 n +0000037266 00000 n +0000037309 00000 n +0000037352 00000 n +0000037395 00000 n +0000037438 00000 n +0000037481 00000 n +0000037524 00000 n +0000037567 00000 n +0000037610 00000 n +0000037653 00000 n +0000037696 00000 n +0000037739 00000 n +0000037782 00000 n +0000037825 00000 n +0000037868 00000 n +0000037911 00000 n +0000037954 00000 n +0000037997 00000 n +0000038040 00000 n +0000038083 00000 n +0000038126 00000 n +0000038169 00000 n +0000038212 00000 n +0000038255 00000 n +0000038298 00000 n +0000038341 00000 n +0000038384 00000 n +0000038427 00000 n +0000038470 00000 n +0000038513 00000 n +0000038556 00000 n +0000038599 00000 n +0000038642 00000 n +0000038685 00000 n +0000038728 00000 n +0000038771 00000 n +0000038814 00000 n +0000038857 00000 n +0000038900 00000 n +0000038943 00000 n +0000038986 00000 n +0000039029 00000 n +0000039072 00000 n +0000039115 00000 n +0000039158 00000 n +0000039201 00000 n +0000039244 00000 n +0000039287 00000 n +0000039330 00000 n +0000039373 00000 n +0000039416 00000 n +0000039459 00000 n +0000039502 00000 n +0000039545 00000 n +0000039588 00000 n +0000039631 00000 n +0000039674 00000 n +0000039717 00000 n +0000039760 00000 n +0000039803 00000 n +0000039846 00000 n +0000039889 00000 n +0000039932 00000 n +0000039975 00000 n +0000040018 00000 n +0000040061 00000 n +0000040104 00000 n +0000040147 00000 n +0000040190 00000 n +0000040233 00000 n +0000040276 00000 n +0000040319 00000 n +0000040362 00000 n +0000040405 00000 n +0000040448 00000 n +0000040491 00000 n +0000040534 00000 n +0000040577 00000 n +0000040620 00000 n +0000040663 00000 n +0000040706 00000 n +0000040749 00000 n +0000040792 00000 n +0000040835 00000 n +0000040878 00000 n +0000040921 00000 n +0000040964 00000 n +0000041007 00000 n +0000041050 00000 n +0000041093 00000 n +0000041136 00000 n +0000041179 00000 n +0000041222 00000 n +0000041265 00000 n +0000041308 00000 n +0000041351 00000 n +0000041394 00000 n +0000041437 00000 n +0000041480 00000 n +0000041523 00000 n +0000041566 00000 n +0000041609 00000 n +0000041652 00000 n +0000041695 00000 n +0000041738 00000 n +0000041781 00000 n +0000041824 00000 n +0000041867 00000 n +0000041910 00000 n +0000041953 00000 n +0000041996 00000 n +0000042039 00000 n +0000042082 00000 n +0000042125 00000 n +0000042168 00000 n +0000042211 00000 n +0000042254 00000 n +0000042297 00000 n +0000042340 00000 n +0000042383 00000 n +0000042426 00000 n +0000042469 00000 n +0000042512 00000 n +0000042555 00000 n +0000042598 00000 n +0000042641 00000 n +0000042684 00000 n +0000042727 00000 n +0000042770 00000 n +0000042813 00000 n +0000042856 00000 n +0000042899 00000 n +0000042942 00000 n +0000042985 00000 n +0000043028 00000 n +0000043071 00000 n +0000043114 00000 n +0000043157 00000 n +0000043200 00000 n +0000043243 00000 n +0000043286 00000 n +0000043329 00000 n +0000043372 00000 n +0000043415 00000 n +0000043458 00000 n +0000043501 00000 n +0000043544 00000 n +0000043587 00000 n +0000043630 00000 n +0000043673 00000 n +0000043716 00000 n +0000043759 00000 n +0000043802 00000 n +0000043845 00000 n +0000043888 00000 n +0000043931 00000 n +0000043974 00000 n +0000044017 00000 n +0000044060 00000 n +0000044103 00000 n +0000044146 00000 n +0000044189 00000 n +0000044232 00000 n +0000044275 00000 n +0000044318 00000 n +0000044361 00000 n +0000044404 00000 n +0000044447 00000 n +0000044490 00000 n +0000044533 00000 n +0000044576 00000 n +0000044619 00000 n +0000044662 00000 n +0000044705 00000 n +0000044748 00000 n +0000044791 00000 n +0000044834 00000 n +0000044877 00000 n +0000044920 00000 n +0000044963 00000 n +0000045006 00000 n +0000045049 00000 n +0000045092 00000 n +0000045135 00000 n +0000045178 00000 n +0000045221 00000 n +0000045264 00000 n +0000045307 00000 n +0000045350 00000 n +0000046037 00000 n +0000046195 00000 n +0000046362 00000 n +0000046552 00000 n +0000049149 00000 n +0000049340 00000 n +0000052448 00000 n +0000052639 00000 n +0000056177 00000 n +0000056368 00000 n +0000056827 00000 n +0000056985 00000 n +0000057214 00000 n +0000057414 00000 n +0000059219 00000 n +0000059391 00000 n +0000061477 00000 n +0000061649 00000 n +0000063568 00000 n +0000063735 00000 n +0000065380 00000 n +0000065547 00000 n +0000067089 00000 n +0000067256 00000 n +0000068990 00000 n +0000069157 00000 n +0000070893 00000 n +0000071069 00000 n +0000072334 00000 n +0000072510 00000 n +0000073721 00000 n +0000073897 00000 n +0000075145 00000 n +0000075312 00000 n +0000076222 00000 n +0000076413 00000 n +0000078380 00000 n +0000078537 00000 n +0000080320 00000 n +0000080487 00000 n +0000082471 00000 n +0000082638 00000 n +0000083374 00000 n +0000083550 00000 n +0000084592 00000 n +0000084759 00000 n +0000086395 00000 n +0000086562 00000 n +0000087186 00000 n +0000087362 00000 n +0000088690 00000 n +0000088866 00000 n +0000089940 00000 n +0000090107 00000 n +0000090708 00000 n +0000090875 00000 n +0000092661 00000 n +0000092828 00000 n +0000094545 00000 n +0000094712 00000 n +0000096561 00000 n +0000096718 00000 n +0000097833 00000 n +0000098018 00000 n +0000099625 00000 n +0000099791 00000 n +0000100680 00000 n +0000100880 00000 n +0000102605 00000 n +0000102781 00000 n +0000104608 00000 n +0000104784 00000 n +0000105395 00000 n +0000105571 00000 n +0000106346 00000 n +0000106522 00000 n +0000107279 00000 n +0000107455 00000 n +0000108294 00000 n +0000108470 00000 n +0000109306 00000 n +0000109491 00000 n +0000110331 00000 n +0000110507 00000 n +0000111267 00000 n +0000111433 00000 n +0000112058 00000 n +0000112243 00000 n +0000113011 00000 n +0000113187 00000 n +0000114149 00000 n +0000114334 00000 n +0000115669 00000 n +0000115854 00000 n +0000116872 00000 n +0000117038 00000 n +0000117618 00000 n +0000117803 00000 n +0000118862 00000 n +0000119038 00000 n +0000119916 00000 n +0000120092 00000 n +0000121186 00000 n +0000121371 00000 n +0000122257 00000 n +0000122442 00000 n +0000123219 00000 n +0000123395 00000 n +0000123996 00000 n +0000124172 00000 n +0000124834 00000 n +0000125019 00000 n +0000125996 00000 n +0000126172 00000 n +0000127179 00000 n +0000127355 00000 n +0000128349 00000 n +0000128534 00000 n +0000129366 00000 n +0000129542 00000 n +0000130275 00000 n +0000130451 00000 n +0000131133 00000 n +0000131309 00000 n +0000132138 00000 n +0000132314 00000 n +0000133302 00000 n +0000133469 00000 n +0000134905 00000 n +0000135090 00000 n +0000135823 00000 n +0000136008 00000 n +0000136635 00000 n +0000136801 00000 n +0000137199 00000 n +0000137385 00000 n +0000138913 00000 n +0000139088 00000 n +0000140802 00000 n +0000140988 00000 n +0000142570 00000 n +0000142746 00000 n +0000144513 00000 n +0000144680 00000 n +0000145058 00000 n +0000145234 00000 n +0000146531 00000 n +0000146707 00000 n +0000148414 00000 n +0000148591 00000 n +0000150343 00000 n +0000150510 00000 n +0000152404 00000 n +0000152589 00000 n +0000153859 00000 n +0000154035 00000 n +0000155763 00000 n +0000155975 00000 n +0000157598 00000 n +0000157782 00000 n +0000158672 00000 n +0000158728 00000 n +0000158827 00000 n +0000158980 00000 n +0000159059 00000 n +0000159162 00000 n +0000159360 00000 n +0000159454 00000 n +0000159571 00000 n +0000159670 00000 n +0000159830 00000 n +0000159929 00000 n +0000160053 00000 n +0000160167 00000 n +0000160281 00000 n +0000160379 00000 n +0000160543 00000 n +0000160647 00000 n +0000160766 00000 n +0000160888 00000 n +0000161010 00000 n +0000161146 00000 n +0000161246 00000 n +0000161358 00000 n +0000161468 00000 n +0000161592 00000 n +0000161749 00000 n +0000161854 00000 n +0000161971 00000 n +0000162129 00000 n +0000162233 00000 n +0000162350 00000 n +0000162472 00000 n +0000162589 00000 n +0000162706 00000 n +0000162824 00000 n +0000162942 00000 n +0000163064 00000 n +0000163186 00000 n +0000163310 00000 n +0000163434 00000 n +0000163553 00000 n +0000163672 00000 n +0000163796 00000 n +0000163907 00000 n +0000164064 00000 n +0000164163 00000 n +0000164264 00000 n +0000164371 00000 n +0000164530 00000 n +0000164669 00000 n +0000164780 00000 n +0000164911 00000 n +0000165024 00000 n +0000165153 00000 n +0000165243 00000 n +0000165408 00000 n +0000165507 00000 n +0000165616 00000 n +0000165730 00000 n +0000165839 00000 n +0000165946 00000 n +0000166056 00000 n +0000166169 00000 n +0000166281 00000 n +0000166387 00000 n +0000166519 00000 n +0000166676 00000 n +0000166811 00000 n +0000166907 00000 n +0000167003 00000 n +0000167159 00000 n +0000167253 00000 n +0000167367 00000 n +0000167466 00000 n +0000167633 00000 n +0000167733 00000 n +0000167841 00000 n +0000167947 00000 n +0000168068 00000 n +0000168195 00000 n +0000168312 00000 n +0000168435 00000 n +0000168566 00000 n +0000168683 00000 n +0000168795 00000 n +0000168913 00000 n +0000169019 00000 n +0000169187 00000 n +0000169297 00000 n +0000169417 00000 n +0000169542 00000 n +0000169657 00000 n +0000169760 00000 n 0000169922 00000 n -0000170025 00000 n -0000170223 00000 n -0000170317 00000 n -0000170434 00000 n -0000170533 00000 n -0000170693 00000 n -0000170792 00000 n -0000170916 00000 n -0000171030 00000 n -0000171144 00000 n -0000171242 00000 n -0000171406 00000 n -0000171510 00000 n -0000171629 00000 n -0000171751 00000 n -0000171873 00000 n -0000172009 00000 n -0000172109 00000 n -0000172221 00000 n -0000172331 00000 n -0000172455 00000 n -0000172612 00000 n -0000172717 00000 n -0000172834 00000 n -0000172992 00000 n -0000173096 00000 n -0000173213 00000 n -0000173335 00000 n -0000173452 00000 n -0000173569 00000 n -0000173687 00000 n -0000173805 00000 n -0000173927 00000 n -0000174049 00000 n -0000174173 00000 n -0000174297 00000 n -0000174416 00000 n -0000174535 00000 n -0000174659 00000 n -0000174770 00000 n -0000174927 00000 n -0000175026 00000 n -0000175127 00000 n -0000175234 00000 n -0000175393 00000 n -0000175532 00000 n -0000175643 00000 n -0000175774 00000 n -0000175887 00000 n -0000176016 00000 n -0000176106 00000 n -0000176271 00000 n -0000176370 00000 n -0000176479 00000 n -0000176593 00000 n -0000176702 00000 n -0000176809 00000 n -0000176919 00000 n -0000177032 00000 n -0000177144 00000 n -0000177250 00000 n -0000177382 00000 n -0000177539 00000 n -0000177674 00000 n -0000177770 00000 n -0000177866 00000 n -0000178022 00000 n -0000178116 00000 n -0000178230 00000 n -0000178329 00000 n -0000178496 00000 n -0000178596 00000 n -0000178704 00000 n -0000178810 00000 n -0000178931 00000 n -0000179058 00000 n -0000179175 00000 n -0000179298 00000 n -0000179429 00000 n -0000179546 00000 n -0000179658 00000 n -0000179776 00000 n -0000179882 00000 n -0000180050 00000 n -0000180160 00000 n -0000180280 00000 n -0000180405 00000 n -0000180520 00000 n -0000180623 00000 n -0000180785 00000 n -0000180887 00000 n -0000180985 00000 n -0000181147 00000 n -0000181250 00000 n -0000181358 00000 n -0000181540 00000 n -0000181640 00000 n -0000181750 00000 n -0000181847 00000 n -0000181983 00000 n -0000182087 00000 n -0000182191 00000 n -0000182358 00000 n -0000182454 00000 n -0000182594 00000 n -0000182712 00000 n -0000182863 00000 n -0000182986 00000 n -0000183149 00000 n -0000183237 00000 n -0000183403 00000 n -0000183516 00000 n -0000183637 00000 n -0000183770 00000 n -0000183913 00000 n -0000184014 00000 n -0000184130 00000 n -0000184231 00000 n -0000184379 00000 n -0000184495 00000 n -0000184592 00000 n -0000184710 00000 n -0000184805 00000 n -0000184981 00000 n -0000185081 00000 n -0000185199 00000 n -0000185306 00000 n -0000185456 00000 n -0000185554 00000 n -0000185706 00000 n -0000185810 00000 n -0000185914 00000 n -0000186053 00000 n -0000186169 00000 n -0000186333 00000 n -0000186426 00000 n -0000186530 00000 n -0000186678 00000 n -0000186776 00000 n -0000186871 00000 n +0000170024 00000 n +0000170122 00000 n +0000170284 00000 n +0000170387 00000 n +0000170495 00000 n +0000170677 00000 n +0000170777 00000 n +0000170887 00000 n +0000170984 00000 n +0000171120 00000 n +0000171224 00000 n +0000171328 00000 n +0000171495 00000 n +0000171591 00000 n +0000171731 00000 n +0000171849 00000 n +0000171998 00000 n +0000172121 00000 n +0000172284 00000 n +0000172372 00000 n +0000172538 00000 n +0000172651 00000 n +0000172772 00000 n +0000172905 00000 n +0000173048 00000 n +0000173149 00000 n +0000173265 00000 n +0000173366 00000 n +0000173514 00000 n +0000173630 00000 n +0000173727 00000 n +0000173845 00000 n +0000173940 00000 n +0000174103 00000 n +0000174203 00000 n +0000174321 00000 n +0000174427 00000 n trailer -<<189abffedc06aaee73d71f659ae7c647>]>> +<<37e21dd5bf11a0bb7770129df9f0d2ea>]>> startxref -187413 +174907 %%EOF diff --git a/docs/Samba-HOWTO-Collection.pdf b/docs/Samba-HOWTO-Collection.pdf index 8cbf9dbcd48..449b529f392 100644 --- a/docs/Samba-HOWTO-Collection.pdf +++ b/docs/Samba-HOWTO-Collection.pdf @@ -1,6 +1,6 @@ %PDF-1.3 %âãÏÓ -1 0 obj<>endobj +1 0 obj<>endobj 2 0 obj<>endobj 3 0 obj<>endobj 4 0 obj<>endobj @@ -20,48 +20,48 @@ endobj 16 0 obj<]/Interpolate true/Filter/FlateDecode/Width 24/Height 24/BitsPerComponent 8/Length 223 >>stream xUQ‡‚0 5âÀâ8@‹´öÿÍÚ4¥¦wo%w•R+©8¸çóCŒ+N"]ׂ*³ÏW ,D¶1Ž|áŠØi"%õ~öÄ0íÈ)û܁1ªlN!3€Ž1ˆìTÆ4HԆÞË<ê <~õZ>ynõ¯.ŒHãê«>LÜê…K·ùb؎¼ÑŸ'4¦øËûŽžY}Íü-?f&tïA¿Â{2é“»7L}On4žïàKùIÿˆ" Ÿä õP†B‡hïG]áz˜$>—ÐÔ³å.mcoendstream endobj -17 0 obj<>endobj -18 0 obj<>endobj -19 0 obj<>endobj -20 0 obj<>endobj -21 0 obj<>endobj -22 0 obj<>endobj -23 0 obj<>endobj -24 0 obj<>endobj -25 0 obj<>endobj -26 0 obj<>endobj -27 0 obj<>endobj -28 0 obj<>endobj -29 0 obj<>endobj -30 0 obj<>endobj -31 0 obj<>endobj -32 0 obj<>endobj -33 0 obj<>endobj -34 0 obj<>endobj -35 0 obj<>endobj -36 0 obj<>endobj -37 0 obj<>endobj -38 0 obj<>endobj -39 0 obj<>endobj -40 0 obj<>endobj -41 0 obj<>endobj -42 0 obj<>endobj -43 0 obj<>endobj -44 0 obj<>endobj -45 0 obj<>endobj -46 0 obj<>endobj -47 0 obj<>endobj -48 0 obj<>endobj -49 0 obj<>endobj -50 0 obj<>endobj -51 0 obj<>endobj -52 0 obj<>endobj -53 0 obj<>endobj -54 0 obj<>endobj -55 0 obj<>endobj -56 0 obj<>endobj -57 0 obj<>endobj -58 0 obj<>endobj +17 0 obj<>endobj +18 0 obj<>endobj +19 0 obj<>endobj +20 0 obj<>endobj +21 0 obj<>endobj +22 0 obj<>endobj +23 0 obj<>endobj +24 0 obj<>endobj +25 0 obj<>endobj +26 0 obj<>endobj +27 0 obj<>endobj +28 0 obj<>endobj +29 0 obj<>endobj +30 0 obj<>endobj +31 0 obj<>endobj +32 0 obj<>endobj +33 0 obj<>endobj +34 0 obj<>endobj +35 0 obj<>endobj +36 0 obj<>endobj +37 0 obj<>endobj +38 0 obj<>endobj +39 0 obj<>endobj +40 0 obj<>endobj +41 0 obj<>endobj +42 0 obj<>endobj +43 0 obj<>endobj +44 0 obj<>endobj +45 0 obj<>endobj +46 0 obj<>endobj +47 0 obj<>endobj +48 0 obj<>endobj +49 0 obj<>endobj +50 0 obj<>endobj +51 0 obj<>endobj +52 0 obj<>endobj +53 0 obj<>endobj +54 0 obj<>endobj +55 0 obj<>endobj +56 0 obj<>endobj +57 0 obj<>endobj +58 0 obj<>endobj 59 0 obj[17 0 R 18 0 R 19 0 R @@ -104,48 +104,48 @@ endobj 56 0 R 57 0 R 58 0 R]endobj -60 0 obj<>endobj -61 0 obj<>endobj -62 0 obj<>endobj -63 0 obj<>endobj -64 0 obj<>endobj -65 0 obj<>endobj -66 0 obj<>endobj -67 0 obj<>endobj -68 0 obj<>endobj -69 0 obj<>endobj -70 0 obj<>endobj -71 0 obj<>endobj -72 0 obj<>endobj -73 0 obj<>endobj -74 0 obj<>endobj -75 0 obj<>endobj -76 0 obj<>endobj -77 0 obj<>endobj -78 0 obj<>endobj -79 0 obj<>endobj -80 0 obj<>endobj -81 0 obj<>endobj -82 0 obj<>endobj -83 0 obj<>endobj -84 0 obj<>endobj -85 0 obj<>endobj -86 0 obj<>endobj -87 0 obj<>endobj -88 0 obj<>endobj -89 0 obj<>endobj -90 0 obj<>endobj -91 0 obj<>endobj -92 0 obj<>endobj -93 0 obj<>endobj -94 0 obj<>endobj -95 0 obj<>endobj -96 0 obj<>endobj -97 0 obj<>endobj -98 0 obj<>endobj -99 0 obj<>endobj -100 0 obj<>endobj -101 0 obj<>endobj +60 0 obj<>endobj +61 0 obj<>endobj +62 0 obj<>endobj +63 0 obj<>endobj +64 0 obj<>endobj +65 0 obj<>endobj +66 0 obj<>endobj +67 0 obj<>endobj +68 0 obj<>endobj +69 0 obj<>endobj +70 0 obj<>endobj +71 0 obj<>endobj +72 0 obj<>endobj +73 0 obj<>endobj +74 0 obj<>endobj +75 0 obj<>endobj +76 0 obj<>endobj +77 0 obj<>endobj +78 0 obj<>endobj +79 0 obj<>endobj +80 0 obj<>endobj +81 0 obj<>endobj +82 0 obj<>endobj +83 0 obj<>endobj +84 0 obj<>endobj +85 0 obj<>endobj +86 0 obj<>endobj +87 0 obj<>endobj +88 0 obj<>endobj +89 0 obj<>endobj +90 0 obj<>endobj +91 0 obj<>endobj +92 0 obj<>endobj +93 0 obj<>endobj +94 0 obj<>endobj +95 0 obj<>endobj +96 0 obj<>endobj +97 0 obj<>endobj +98 0 obj<>endobj +99 0 obj<>endobj +100 0 obj<>endobj +101 0 obj<>endobj 102 0 obj[60 0 R 61 0 R 62 0 R @@ -188,46 +188,50 @@ endobj 99 0 R 100 0 R 101 0 R]endobj -103 0 obj<>endobj -104 0 obj<>endobj -105 0 obj<>endobj -106 0 obj<>endobj -107 0 obj<>endobj -108 0 obj<>endobj -109 0 obj<>endobj -110 0 obj<>endobj -111 0 obj<>endobj -112 0 obj<>endobj -113 0 obj<>endobj -114 0 obj<>endobj -115 0 obj<>endobj -116 0 obj<>endobj -117 0 obj<>endobj -118 0 obj<>endobj -119 0 obj<>endobj -120 0 obj<>endobj -121 0 obj<>endobj -122 0 obj<>endobj -123 0 obj<>endobj -124 0 obj<>endobj -125 0 obj<>endobj -126 0 obj<>endobj -127 0 obj<>endobj -128 0 obj<>endobj -129 0 obj<>endobj -130 0 obj<>endobj -131 0 obj<>endobj -132 0 obj<>endobj -133 0 obj<>endobj -134 0 obj<>endobj -135 0 obj<>endobj -136 0 obj<>endobj -137 0 obj<>endobj -138 0 obj<>endobj -139 0 obj<>endobj -140 0 obj<>endobj -141 0 obj<>endobj -142 0 obj[103 0 R +103 0 obj<>endobj +104 0 obj<>endobj +105 0 obj<>endobj +106 0 obj<>endobj +107 0 obj<>endobj +108 0 obj<>endobj +109 0 obj<>endobj +110 0 obj<>endobj +111 0 obj<>endobj +112 0 obj<>endobj +113 0 obj<>endobj +114 0 obj<>endobj +115 0 obj<>endobj +116 0 obj<>endobj +117 0 obj<>endobj +118 0 obj<>endobj +119 0 obj<>endobj +120 0 obj<>endobj +121 0 obj<>endobj +122 0 obj<>endobj +123 0 obj<>endobj +124 0 obj<>endobj +125 0 obj<>endobj +126 0 obj<>endobj +127 0 obj<>endobj +128 0 obj<>endobj +129 0 obj<>endobj +130 0 obj<>endobj +131 0 obj<>endobj +132 0 obj<>endobj +133 0 obj<>endobj +134 0 obj<>endobj +135 0 obj<>endobj +136 0 obj<>endobj +137 0 obj<>endobj +138 0 obj<>endobj +139 0 obj<>endobj +140 0 obj<>endobj +141 0 obj<>endobj +142 0 obj<>endobj +143 0 obj<>endobj +144 0 obj<>endobj +145 0 obj<>endobj +146 0 obj[103 0 R 104 0 R 105 0 R 106 0 R @@ -265,56 +269,54 @@ endobj 138 0 R 139 0 R 140 0 R -141 0 R]endobj -143 0 obj<>endobj -144 0 obj<>endobj -145 0 obj<>endobj -146 0 obj<>endobj -147 0 obj<>endobj -148 0 obj<>endobj -149 0 obj<>endobj -150 0 obj<>endobj -151 0 obj<>endobj -152 0 obj<>endobj -153 0 obj<>endobj -154 0 obj<>endobj -155 0 obj<>endobj -156 0 obj<>endobj -157 0 obj<>endobj -158 0 obj<>endobj -159 0 obj<>endobj -160 0 obj<>endobj -161 0 obj<>endobj -162 0 obj<>endobj -163 0 obj<>endobj -164 0 obj<>endobj -165 0 obj<>endobj -166 0 obj<>endobj -167 0 obj<>endobj -168 0 obj<>endobj -169 0 obj<>endobj -170 0 obj<>endobj -171 0 obj<>endobj -172 0 obj<>endobj -173 0 obj<>endobj -174 0 obj<>endobj -175 0 obj<>endobj -176 0 obj<>endobj -177 0 obj<>endobj -178 0 obj<>endobj -179 0 obj<>endobj -180 0 obj<>endobj -181 0 obj<>endobj -182 0 obj<>endobj -183 0 obj<>endobj -184 0 obj<>endobj -185 0 obj<>endobj -186 0 obj<>endobj -187 0 obj[143 0 R +141 0 R +142 0 R +143 0 R 144 0 R -145 0 R -146 0 R -147 0 R +145 0 R]endobj +147 0 obj<>endobj +148 0 obj<>endobj +149 0 obj<>endobj +150 0 obj<>endobj +151 0 obj<>endobj +152 0 obj<>endobj +153 0 obj<>endobj +154 0 obj<>endobj +155 0 obj<>endobj +156 0 obj<>endobj +157 0 obj<>endobj +158 0 obj<>endobj +159 0 obj<>endobj +160 0 obj<>endobj +161 0 obj<>endobj +162 0 obj<>endobj +163 0 obj<>endobj +164 0 obj<>endobj +165 0 obj<>endobj +166 0 obj<>endobj +167 0 obj<>endobj +168 0 obj<>endobj +169 0 obj<>endobj +170 0 obj<>endobj +171 0 obj<>endobj +172 0 obj<>endobj +173 0 obj<>endobj +174 0 obj<>endobj +175 0 obj<>endobj +176 0 obj<>endobj +177 0 obj<>endobj +178 0 obj<>endobj +179 0 obj<>endobj +180 0 obj<>endobj +181 0 obj<>endobj +182 0 obj<>endobj +183 0 obj<>endobj +184 0 obj<>endobj +185 0 obj<>endobj +186 0 obj<>endobj +187 0 obj<>endobj +188 0 obj<>endobj +189 0 obj[147 0 R 148 0 R 149 0 R 150 0 R @@ -353,54 +355,54 @@ endobj 183 0 R 184 0 R 185 0 R -186 0 R]endobj -188 0 obj<>endobj -189 0 obj<>endobj -190 0 obj<>endobj -191 0 obj<>endobj -192 0 obj<>endobj -193 0 obj<>endobj -194 0 obj<>endobj -195 0 obj<>endobj -196 0 obj<>endobj -197 0 obj<>endobj -198 0 obj<>endobj -199 0 obj<>endobj -200 0 obj<>endobj -201 0 obj<>endobj -202 0 obj<>endobj -203 0 obj<>endobj -204 0 obj<>endobj -205 0 obj<>endobj -206 0 obj<>endobj -207 0 obj<>endobj -208 0 obj<>endobj -209 0 obj<>endobj -210 0 obj<>endobj -211 0 obj<>endobj -212 0 obj<>endobj -213 0 obj<>endobj -214 0 obj<>endobj -215 0 obj<>endobj -216 0 obj<>endobj -217 0 obj<>endobj -218 0 obj<>endobj -219 0 obj<>endobj -220 0 obj<>endobj -221 0 obj<>endobj -222 0 obj<>endobj -223 0 obj<>endobj -224 0 obj<>endobj -225 0 obj<>endobj -226 0 obj<>endobj -227 0 obj<>endobj -228 0 obj<>endobj -229 0 obj<>endobj -230 0 obj<>endobj -231 0 obj<>endobj -232 0 obj[188 0 R -189 0 R -190 0 R +186 0 R +187 0 R +188 0 R]endobj +190 0 obj<>endobj +191 0 obj<>endobj +192 0 obj<>endobj +193 0 obj<>endobj +194 0 obj<>endobj +195 0 obj<>endobj +196 0 obj<>endobj +197 0 obj<>endobj +198 0 obj<>endobj +199 0 obj<>endobj +200 0 obj<>endobj +201 0 obj<>endobj +202 0 obj<>endobj +203 0 obj<>endobj +204 0 obj<>endobj +205 0 obj<>endobj +206 0 obj<>endobj +207 0 obj<>endobj +208 0 obj<>endobj +209 0 obj<>endobj +210 0 obj<>endobj +211 0 obj<>endobj +212 0 obj<>endobj +213 0 obj<>endobj +214 0 obj<>endobj +215 0 obj<>endobj +216 0 obj<>endobj +217 0 obj<>endobj +218 0 obj<>endobj +219 0 obj<>endobj +220 0 obj<>endobj +221 0 obj<>endobj +222 0 obj<>endobj +223 0 obj<>endobj +224 0 obj<>endobj +225 0 obj<>endobj +226 0 obj<>endobj +227 0 obj<>endobj +228 0 obj<>endobj +229 0 obj<>endobj +230 0 obj<>endobj +231 0 obj<>endobj +232 0 obj<>endobj +233 0 obj<>endobj +234 0 obj[190 0 R 191 0 R 192 0 R 193 0 R @@ -441,52 +443,52 @@ endobj 228 0 R 229 0 R 230 0 R -231 0 R]endobj -233 0 obj<>endobj -234 0 obj<>endobj -235 0 obj<>endobj -236 0 obj<>endobj -237 0 obj<>endobj -238 0 obj<>endobj -239 0 obj<>endobj -240 0 obj<>endobj -241 0 obj<>endobj -242 0 obj<>endobj -243 0 obj<>endobj -244 0 obj<>endobj -245 0 obj<>endobj -246 0 obj<>endobj -247 0 obj<>endobj -248 0 obj<>endobj -249 0 obj<>endobj -250 0 obj<>endobj -251 0 obj<>endobj -252 0 obj<>endobj -253 0 obj<>endobj -254 0 obj<>endobj -255 0 obj<>endobj -256 0 obj<>endobj -257 0 obj<>endobj -258 0 obj<>endobj -259 0 obj<>endobj -260 0 obj<>endobj -261 0 obj<>endobj -262 0 obj<>endobj -263 0 obj<>endobj -264 0 obj<>endobj -265 0 obj<>endobj -266 0 obj<>endobj -267 0 obj<>endobj -268 0 obj<>endobj -269 0 obj<>endobj -270 0 obj<>endobj -271 0 obj<>endobj -272 0 obj<>endobj -273 0 obj<>endobj -274 0 obj<>endobj -275 0 obj[233 0 R -234 0 R -235 0 R +231 0 R +232 0 R +233 0 R]endobj +235 0 obj<>endobj +236 0 obj<>endobj +237 0 obj<>endobj +238 0 obj<>endobj +239 0 obj<>endobj +240 0 obj<>endobj +241 0 obj<>endobj +242 0 obj<>endobj +243 0 obj<>endobj +244 0 obj<>endobj +245 0 obj<>endobj +246 0 obj<>endobj +247 0 obj<>endobj +248 0 obj<>endobj +249 0 obj<>endobj +250 0 obj<>endobj +251 0 obj<>endobj +252 0 obj<>endobj +253 0 obj<>endobj +254 0 obj<>endobj +255 0 obj<>endobj +256 0 obj<>endobj +257 0 obj<>endobj +258 0 obj<>endobj +259 0 obj<>endobj +260 0 obj<>endobj +261 0 obj<>endobj +262 0 obj<>endobj +263 0 obj<>endobj +264 0 obj<>endobj +265 0 obj<>endobj +266 0 obj<>endobj +267 0 obj<>endobj +268 0 obj<>endobj +269 0 obj<>endobj +270 0 obj<>endobj +271 0 obj<>endobj +272 0 obj<>endobj +273 0 obj<>endobj +274 0 obj<>endobj +275 0 obj<>endobj +276 0 obj<>endobj +277 0 obj[235 0 R 236 0 R 237 0 R 238 0 R @@ -525,55 +527,51 @@ endobj 271 0 R 272 0 R 273 0 R -274 0 R]endobj -276 0 obj<>endobj -277 0 obj<>endobj -278 0 obj<>endobj -279 0 obj<>endobj -280 0 obj<>endobj -281 0 obj<>endobj -282 0 obj<>endobj -283 0 obj<>endobj -284 0 obj<>endobj -285 0 obj<>endobj -286 0 obj<>endobj -287 0 obj<>endobj -288 0 obj<>endobj -289 0 obj<>endobj -290 0 obj<>endobj -291 0 obj<>endobj -292 0 obj<>endobj -293 0 obj<>endobj -294 0 obj<>endobj -295 0 obj<>endobj -296 0 obj<>endobj -297 0 obj<>endobj -298 0 obj<>endobj -299 0 obj<>endobj -300 0 obj<>endobj -301 0 obj<>endobj -302 0 obj<>endobj -303 0 obj<>endobj -304 0 obj<>endobj -305 0 obj<>endobj -306 0 obj<>endobj -307 0 obj<>endobj -308 0 obj<>endobj -309 0 obj<>endobj -310 0 obj<>endobj -311 0 obj<>endobj -312 0 obj<>endobj -313 0 obj<>endobj -314 0 obj<>endobj -315 0 obj<>endobj -316 0 obj<>endobj -317 0 obj<>endobj -318 0 obj<>endobj -319 0 obj<>endobj -320 0 obj<>endobj -321 0 obj[276 0 R -277 0 R -278 0 R +274 0 R +275 0 R +276 0 R]endobj +278 0 obj<>endobj +279 0 obj<>endobj +280 0 obj<>endobj +281 0 obj<>endobj +282 0 obj<>endobj +283 0 obj<>endobj +284 0 obj<>endobj +285 0 obj<>endobj +286 0 obj<>endobj +287 0 obj<>endobj +288 0 obj<>endobj +289 0 obj<>endobj +290 0 obj<>endobj +291 0 obj<>endobj +292 0 obj<>endobj +293 0 obj<>endobj +294 0 obj<>endobj +295 0 obj<>endobj +296 0 obj<>endobj +297 0 obj<>endobj +298 0 obj<>endobj +299 0 obj<>endobj +300 0 obj<>endobj +301 0 obj<>endobj +302 0 obj<>endobj +303 0 obj<>endobj +304 0 obj<>endobj +305 0 obj<>endobj +306 0 obj<>endobj +307 0 obj<>endobj +308 0 obj<>endobj +309 0 obj<>endobj +310 0 obj<>endobj +311 0 obj<>endobj +312 0 obj<>endobj +313 0 obj<>endobj +314 0 obj<>endobj +315 0 obj<>endobj +316 0 obj<>endobj +317 0 obj<>endobj +318 0 obj<>endobj +319 0 obj[278 0 R 279 0 R 280 0 R 281 0 R @@ -613,54 +611,54 @@ endobj 315 0 R 316 0 R 317 0 R -318 0 R -319 0 R -320 0 R]endobj -322 0 obj<>endobj -323 0 obj<>endobj -324 0 obj<>endobj -325 0 obj<>endobj -326 0 obj<>endobj -327 0 obj<>endobj -328 0 obj<>endobj -329 0 obj<>endobj -330 0 obj<>endobj -331 0 obj<>endobj -332 0 obj<>endobj -333 0 obj<>endobj -334 0 obj<>endobj -335 0 obj<>endobj -336 0 obj<>endobj -337 0 obj<>endobj -338 0 obj<>endobj -339 0 obj<>endobj -340 0 obj<>endobj -341 0 obj<>endobj -342 0 obj<>endobj -343 0 obj<>endobj -344 0 obj<>endobj -345 0 obj<>endobj -346 0 obj<>endobj -347 0 obj<>endobj -348 0 obj<>endobj -349 0 obj<>endobj -350 0 obj<>endobj -351 0 obj<>endobj -352 0 obj<>endobj -353 0 obj<>endobj -354 0 obj<>endobj -355 0 obj<>endobj -356 0 obj<>endobj -357 0 obj<>endobj -358 0 obj<>endobj -359 0 obj<>endobj -360 0 obj<>endobj -361 0 obj<>endobj -362 0 obj<>endobj -363 0 obj<>endobj -364 0 obj[323 0 R +318 0 R]endobj +320 0 obj<>endobj +321 0 obj<>endobj +322 0 obj<>endobj +323 0 obj<>endobj +324 0 obj<>endobj +325 0 obj<>endobj +326 0 obj<>endobj +327 0 obj<>endobj +328 0 obj<>endobj +329 0 obj<>endobj +330 0 obj<>endobj +331 0 obj<>endobj +332 0 obj<>endobj +333 0 obj<>endobj +334 0 obj<>endobj +335 0 obj<>endobj +336 0 obj<>endobj +337 0 obj<>endobj +338 0 obj<>endobj +339 0 obj<>endobj +340 0 obj<>endobj +341 0 obj<>endobj +342 0 obj<>endobj +343 0 obj<>endobj +344 0 obj<>endobj +345 0 obj<>endobj +346 0 obj<>endobj +347 0 obj<>endobj +348 0 obj<>endobj +349 0 obj<>endobj +350 0 obj<>endobj +351 0 obj<>endobj +352 0 obj<>endobj +353 0 obj<>endobj +354 0 obj<>endobj +355 0 obj<>endobj +356 0 obj<>endobj +357 0 obj<>endobj +358 0 obj<>endobj +359 0 obj<>endobj +360 0 obj<>endobj +361 0 obj<>endobj +362 0 obj[321 0 R +323 0 R 325 0 R 327 0 R +328 0 R 329 0 R 330 0 R 331 0 R @@ -693,63 +691,61 @@ endobj 358 0 R 359 0 R 360 0 R -361 0 R -362 0 R -363 0 R]endobj -365 0 obj<>endobj -366 0 obj<>endobj -367 0 obj<>endobj -368 0 obj<>endobj -369 0 obj<>endobj -370 0 obj<>endobj -371 0 obj<>endobj -372 0 obj<>endobj -373 0 obj<>endobj -374 0 obj<>endobj -375 0 obj<>endobj -376 0 obj<>endobj -377 0 obj<>endobj -378 0 obj<>endobj -379 0 obj<>endobj -380 0 obj<>endobj -381 0 obj<>endobj -382 0 obj<>endobj -383 0 obj<>endobj -384 0 obj<>endobj -385 0 obj<>endobj -386 0 obj<>endobj -387 0 obj<>endobj -388 0 obj<>endobj -389 0 obj<>endobj -390 0 obj<>endobj -391 0 obj<>endobj -392 0 obj<>endobj -393 0 obj<>endobj -394 0 obj<>endobj -395 0 obj<>endobj -396 0 obj<>endobj -397 0 obj<>endobj -398 0 obj<>endobj -399 0 obj<>endobj -400 0 obj<>endobj -401 0 obj<>endobj -402 0 obj<>endobj -403 0 obj<>endobj -404 0 obj<>endobj -405 0 obj<>endobj -406 0 obj<>endobj -407 0 obj<>endobj -408 0 obj<>endobj -409 0 obj<>endobj -410 0 obj<>endobj -411 0 obj<>endobj -412 0 obj<>endobj -413 0 obj<>endobj -414 0 obj<>endobj -415 0 obj<>endobj -416 0 obj<>endobj -417 0 obj<>endobj -418 0 obj[365 0 R +361 0 R]endobj +363 0 obj<>endobj +364 0 obj<>endobj +365 0 obj<>endobj +366 0 obj<>endobj +367 0 obj<>endobj +368 0 obj<>endobj +369 0 obj<>endobj +370 0 obj<>endobj +371 0 obj<>endobj +372 0 obj<>endobj +373 0 obj<>endobj +374 0 obj<>endobj +375 0 obj<>endobj +376 0 obj<>endobj +377 0 obj<>endobj +378 0 obj<>endobj +379 0 obj<>endobj +380 0 obj<>endobj +381 0 obj<>endobj +382 0 obj<>endobj +383 0 obj<>endobj +384 0 obj<>endobj +385 0 obj<>endobj +386 0 obj<>endobj +387 0 obj<>endobj +388 0 obj<>endobj +389 0 obj<>endobj +390 0 obj<>endobj +391 0 obj<>endobj +392 0 obj<>endobj +393 0 obj<>endobj +394 0 obj<>endobj +395 0 obj<>endobj +396 0 obj<>endobj +397 0 obj<>endobj +398 0 obj<>endobj +399 0 obj<>endobj +400 0 obj<>endobj +401 0 obj<>endobj +402 0 obj<>endobj +403 0 obj<>endobj +404 0 obj<>endobj +405 0 obj<>endobj +406 0 obj<>endobj +407 0 obj<>endobj +408 0 obj<>endobj +409 0 obj<>endobj +410 0 obj<>endobj +411 0 obj<>endobj +412 0 obj<>endobj +413 0 obj<>endobj +414 0 obj[363 0 R +364 0 R +365 0 R 366 0 R 367 0 R 368 0 R @@ -797,63 +793,63 @@ endobj 410 0 R 411 0 R 412 0 R -413 0 R -414 0 R -415 0 R +413 0 R]endobj +415 0 obj<>endobj +416 0 obj<>endobj +417 0 obj<>endobj +418 0 obj<>endobj +419 0 obj<>endobj +420 0 obj<>endobj +421 0 obj<>endobj +422 0 obj<>endobj +423 0 obj<>endobj +424 0 obj<>endobj +425 0 obj<>endobj +426 0 obj<>endobj +427 0 obj<>endobj +428 0 obj<>endobj +429 0 obj<>endobj +430 0 obj<>endobj +431 0 obj<>endobj +432 0 obj<>endobj +433 0 obj<>endobj +434 0 obj<>endobj +435 0 obj<>endobj +436 0 obj<>endobj +437 0 obj<>endobj +438 0 obj<>endobj +439 0 obj<>endobj +440 0 obj<>endobj +441 0 obj<>endobj +442 0 obj<>endobj +443 0 obj<>endobj +444 0 obj<>endobj +445 0 obj<>endobj +446 0 obj<>endobj +447 0 obj<>endobj +448 0 obj<>endobj +449 0 obj<>endobj +450 0 obj<>endobj +451 0 obj<>endobj +452 0 obj<>endobj +453 0 obj<>endobj +454 0 obj<>endobj +455 0 obj<>endobj +456 0 obj<>endobj +457 0 obj<>endobj +458 0 obj<>endobj +459 0 obj<>endobj +460 0 obj<>endobj +461 0 obj<>endobj +462 0 obj<>endobj +463 0 obj<>endobj +464 0 obj<>endobj +465 0 obj<>endobj +466 0 obj[415 0 R 416 0 R -417 0 R]endobj -419 0 obj<>endobj -420 0 obj<>endobj -421 0 obj<>endobj -422 0 obj<>endobj -423 0 obj<>endobj -424 0 obj<>endobj -425 0 obj<>endobj -426 0 obj<>endobj -427 0 obj<>endobj -428 0 obj<>endobj -429 0 obj<>endobj -430 0 obj<>endobj -431 0 obj<>endobj -432 0 obj<>endobj -433 0 obj<>endobj -434 0 obj<>endobj -435 0 obj<>endobj -436 0 obj<>endobj -437 0 obj<>endobj -438 0 obj<>endobj -439 0 obj<>endobj -440 0 obj<>endobj -441 0 obj<>endobj -442 0 obj<>endobj -443 0 obj<>endobj -444 0 obj<>endobj -445 0 obj<>endobj -446 0 obj<>endobj -447 0 obj<>endobj -448 0 obj<>endobj -449 0 obj<>endobj -450 0 obj<>endobj -451 0 obj<>endobj -452 0 obj<>endobj -453 0 obj<>endobj -454 0 obj<>endobj -455 0 obj<>endobj -456 0 obj<>endobj -457 0 obj<>endobj -458 0 obj<>endobj -459 0 obj<>endobj -460 0 obj<>endobj -461 0 obj<>endobj -462 0 obj<>endobj -463 0 obj<>endobj -464 0 obj<>endobj -465 0 obj<>endobj -466 0 obj<>endobj -467 0 obj<>endobj -468 0 obj<>endobj -469 0 obj<>endobj -470 0 obj[419 0 R +417 0 R +418 0 R +419 0 R 420 0 R 421 0 R 422 0 R @@ -899,46 +895,51 @@ endobj 462 0 R 463 0 R 464 0 R -465 0 R -466 0 R -467 0 R +465 0 R]endobj +467 0 obj<>endobj +468 0 obj<>endobj +469 0 obj<>endobj +470 0 obj<>endobj +471 0 obj<>endobj +472 0 obj<>endobj +473 0 obj<>endobj +474 0 obj<>endobj +475 0 obj<>endobj +476 0 obj<>endobj +477 0 obj<>endobj +478 0 obj<>endobj +479 0 obj<>endobj +480 0 obj<>endobj +481 0 obj<>endobj +482 0 obj<>endobj +483 0 obj<>endobj +484 0 obj<>endobj +485 0 obj<>endobj +486 0 obj<>endobj +487 0 obj<>endobj +488 0 obj<>endobj +489 0 obj<>endobj +490 0 obj<>endobj +491 0 obj<>endobj +492 0 obj<>endobj +493 0 obj<>endobj +494 0 obj<>endobj +495 0 obj<>endobj +496 0 obj<>endobj +497 0 obj<>endobj +498 0 obj<>endobj +499 0 obj<>endobj +500 0 obj<>endobj +501 0 obj<>endobj +502 0 obj<>endobj +503 0 obj<>endobj +504 0 obj<>endobj +505 0 obj<>endobj +506 0 obj[467 0 R 468 0 R -469 0 R]endobj -471 0 obj<>endobj -472 0 obj<>endobj -473 0 obj<>endobj -474 0 obj<>endobj -475 0 obj<>endobj -476 0 obj<>endobj -477 0 obj<>endobj -478 0 obj<>endobj -479 0 obj<>endobj -480 0 obj<>endobj -481 0 obj<>endobj -482 0 obj<>endobj -483 0 obj<>endobj -484 0 obj<>endobj -485 0 obj<>endobj -486 0 obj<>endobj -487 0 obj<>endobj -488 0 obj<>endobj -489 0 obj<>endobj -490 0 obj<>endobj -491 0 obj<>endobj -492 0 obj<>endobj -493 0 obj<>endobj -494 0 obj<>endobj -495 0 obj<>endobj -496 0 obj<>endobj -497 0 obj<>endobj -498 0 obj<>endobj -499 0 obj<>endobj -500 0 obj<>endobj -501 0 obj<>endobj -502 0 obj<>endobj -503 0 obj<>endobj -504 0 obj<>endobj -505 0 obj[471 0 R +469 0 R +470 0 R +471 0 R 472 0 R 473 0 R 474 0 R @@ -971,52 +972,53 @@ endobj 501 0 R 502 0 R 503 0 R -504 0 R]endobj -506 0 obj<>endobj -507 0 obj<>endobj -508 0 obj<>endobj -509 0 obj<>endobj -510 0 obj<>endobj -511 0 obj<>endobj -512 0 obj<>endobj -513 0 obj<>endobj -514 0 obj<>endobj -515 0 obj<>endobj -516 0 obj<>endobj -517 0 obj<>endobj -518 0 obj<>endobj -519 0 obj<>endobj -520 0 obj<>endobj -521 0 obj<>endobj -522 0 obj<>endobj -523 0 obj<>endobj -524 0 obj<>endobj -525 0 obj<>endobj -526 0 obj<>endobj -527 0 obj<>endobj -528 0 obj<>endobj -529 0 obj<>endobj -530 0 obj<>endobj -531 0 obj<>endobj -532 0 obj<>endobj -533 0 obj<>endobj -534 0 obj<>endobj -535 0 obj<>endobj -536 0 obj<>endobj -537 0 obj<>endobj -538 0 obj<>endobj -539 0 obj<>endobj -540 0 obj<>endobj -541 0 obj<>endobj -542 0 obj<>endobj -543 0 obj<>endobj -544 0 obj<>endobj -545 0 obj<>endobj -546 0 obj<>endobj -547 0 obj<>endobj -548 0 obj<>endobj -549 0 obj[506 0 R -507 0 R +504 0 R +505 0 R]endobj +507 0 obj<>endobj +508 0 obj<>endobj +509 0 obj<>endobj +510 0 obj<>endobj +511 0 obj<>endobj +512 0 obj<>endobj +513 0 obj<>endobj +514 0 obj<>endobj +515 0 obj<>endobj +516 0 obj<>endobj +517 0 obj<>endobj +518 0 obj<>endobj +519 0 obj<>endobj +520 0 obj<>endobj +521 0 obj<>endobj +522 0 obj<>endobj +523 0 obj<>endobj +524 0 obj<>endobj +525 0 obj<>endobj +526 0 obj<>endobj +527 0 obj<>endobj +528 0 obj<>endobj +529 0 obj<>endobj +530 0 obj<>endobj +531 0 obj<>endobj +532 0 obj<>endobj +533 0 obj<>endobj +534 0 obj<>endobj +535 0 obj<>endobj +536 0 obj<>endobj +537 0 obj<>endobj +538 0 obj<>endobj +539 0 obj<>endobj +540 0 obj<>endobj +541 0 obj<>endobj +542 0 obj<>endobj +543 0 obj<>endobj +544 0 obj<>endobj +545 0 obj<>endobj +546 0 obj<>endobj +547 0 obj<>endobj +548 0 obj<>endobj +549 0 obj<>endobj +550 0 obj<>endobj +551 0 obj[507 0 R 508 0 R 509 0 R 510 0 R @@ -1057,118 +1059,116 @@ endobj 545 0 R 546 0 R 547 0 R -548 0 R]endobj -550 0 obj<>endobj -551 0 obj<>endobj -552 0 obj[551 0 R]endobj -553 0 obj<>endobj -554 0 obj<>endobj -555 0 obj<>endobj -556 0 obj<>endobj -557 0 obj<>endobj -558 0 obj<>endobj -559 0 obj<>endobj -560 0 obj<>endobj -561 0 obj<>endobj -562 0 obj<>endobj -563 0 obj<>endobj -564 0 obj<>endobj -565 0 obj<>endobj -566 0 obj<>endobj -567 0 obj[554 0 R -556 0 R -558 0 R +548 0 R +549 0 R +550 0 R]endobj +552 0 obj<>endobj +553 0 obj[552 0 R]endobj +554 0 obj<>endobj +555 0 obj<>endobj +556 0 obj[555 0 R]endobj +557 0 obj<>endobj +558 0 obj<>endobj +559 0 obj<>endobj +560 0 obj<>endobj +561 0 obj<>endobj +562 0 obj<>endobj +563 0 obj<>endobj +564 0 obj<>endobj +565 0 obj<>endobj +566 0 obj<>endobj +567 0 obj<>endobj +568 0 obj<>endobj +569 0 obj<>endobj +570 0 obj<>endobj +571 0 obj[558 0 R 560 0 R 562 0 R 564 0 R -566 0 R]endobj -568 0 obj<>endobj -569 0 obj<>endobj -570 0 obj<>endobj -571 0 obj<>endobj -572 0 obj<>endobj -573 0 obj<>endobj -574 0 obj[569 0 R -571 0 R -573 0 R]endobj -575 0 obj<>endobj -576 0 obj<>endobj -577 0 obj<>endobj -578 0 obj<>endobj -579 0 obj<>endobj -580 0 obj<>endobj -581 0 obj<>endobj -582 0 obj<>endobj -583 0 obj<>endobj -584 0 obj<>endobj -585 0 obj<>endobj -586 0 obj<>endobj -587 0 obj<>endobj -588 0 obj<>endobj -589 0 obj[576 0 R -578 0 R -580 0 R +566 0 R +568 0 R +570 0 R]endobj +572 0 obj<>endobj +573 0 obj<>endobj +574 0 obj<>endobj +575 0 obj<>endobj +576 0 obj<>endobj +577 0 obj<>endobj +578 0 obj[573 0 R +575 0 R +577 0 R]endobj +579 0 obj<>endobj +580 0 obj<>endobj +581 0 obj<>endobj +582 0 obj<>endobj +583 0 obj<>endobj +584 0 obj<>endobj +585 0 obj<>endobj +586 0 obj<>endobj +587 0 obj<>endobj +588 0 obj<>endobj +589 0 obj<>endobj +590 0 obj<>endobj +591 0 obj<>endobj +592 0 obj<>endobj +593 0 obj[580 0 R 582 0 R 584 0 R 586 0 R -588 0 R]endobj -590 0 obj<>endobj -591 0 obj<>endobj -592 0 obj[591 0 R]endobj -593 0 obj<>endobj -594 0 obj<>endobj -595 0 obj[594 0 R]endobj -596 0 obj<>endobj -597 0 obj<>endobj -598 0 obj<>endobj -599 0 obj<>endobj -600 0 obj<>endobj -601 0 obj<>endobj -602 0 obj<>endobj -603 0 obj<>endobj -604 0 obj<>endobj -605 0 obj<>endobj -606 0 obj<>endobj -607 0 obj<>endobj -608 0 obj<>endobj -609 0 obj<>endobj -610 0 obj<>endobj -611 0 obj<>endobj -612 0 obj<>endobj -613 0 obj<>endobj -614 0 obj<>endobj -615 0 obj<>endobj -616 0 obj<>endobj -617 0 obj<>endobj -618 0 obj<>endobj -619 0 obj<>endobj -620 0 obj<>endobj -621 0 obj<>endobj -622 0 obj<>endobj -623 0 obj<>endobj -624 0 obj<>endobj -625 0 obj<>endobj -626 0 obj<>endobj -627 0 obj<>endobj -628 0 obj<>endobj -629 0 obj<>endobj -630 0 obj<>endobj -631 0 obj<>endobj -632 0 obj<>endobj -633 0 obj<>endobj -634 0 obj<>endobj -635 0 obj<>endobj -636 0 obj<>endobj -637 0 obj<>endobj -638 0 obj<>endobj -639 0 obj<>endobj -640 0 obj<>endobj -641 0 obj<>endobj -642 0 obj[596 0 R -597 0 R -598 0 R -599 0 R -600 0 R +588 0 R +590 0 R +592 0 R]endobj +594 0 obj<>endobj +595 0 obj<>endobj +596 0 obj[595 0 R]endobj +597 0 obj<>endobj +598 0 obj<>endobj +599 0 obj[598 0 R]endobj +600 0 obj<>endobj +601 0 obj<>endobj +602 0 obj<>endobj +603 0 obj<>endobj +604 0 obj<>endobj +605 0 obj<>endobj +606 0 obj<>endobj +607 0 obj<>endobj +608 0 obj<>endobj +609 0 obj<>endobj +610 0 obj<>endobj +611 0 obj<>endobj +612 0 obj<>endobj +613 0 obj<>endobj +614 0 obj<>endobj +615 0 obj<>endobj +616 0 obj<>endobj +617 0 obj<>endobj +618 0 obj<>endobj +619 0 obj<>endobj +620 0 obj<>endobj +621 0 obj<>endobj +622 0 obj<>endobj +623 0 obj<>endobj +624 0 obj<>endobj +625 0 obj<>endobj +626 0 obj<>endobj +627 0 obj<>endobj +628 0 obj<>endobj +629 0 obj<>endobj +630 0 obj<>endobj +631 0 obj<>endobj +632 0 obj<>endobj +633 0 obj<>endobj +634 0 obj<>endobj +635 0 obj<>endobj +636 0 obj<>endobj +637 0 obj<>endobj +638 0 obj<>endobj +639 0 obj<>endobj +640 0 obj<>endobj +641 0 obj<>endobj +642 0 obj<>endobj +643 0 obj<>endobj +644 0 obj[600 0 R 601 0 R 602 0 R 603 0 R @@ -1209,69 +1209,63 @@ endobj 638 0 R 639 0 R 640 0 R -641 0 R]endobj -643 0 obj<>endobj -644 0 obj[643 0 R]endobj -645 0 obj<>endobj -646 0 obj<>endobj -647 0 obj<>endobj -648 0 obj<>endobj -649 0 obj[646 0 R -648 0 R]endobj -650 0 obj<>endobj -651 0 obj<>endobj -652 0 obj<>endobj -653 0 obj<>endobj -654 0 obj[651 0 R -653 0 R]endobj -655 0 obj<>endobj -656 0 obj<>endobj -657 0 obj[656 0 R]endobj -658 0 obj<>endobj -659 0 obj<>endobj -660 0 obj<>endobj -661 0 obj<>endobj -662 0 obj<>endobj -663 0 obj<>endobj -664 0 obj<>endobj -665 0 obj<>endobj -666 0 obj<>endobj -667 0 obj<>endobj -668 0 obj<>endobj -669 0 obj<>endobj -670 0 obj<>endobj -671 0 obj<>endobj -672 0 obj<>endobj -673 0 obj<>endobj -674 0 obj<>endobj -675 0 obj<>endobj -676 0 obj<>endobj -677 0 obj<>endobj -678 0 obj<>endobj -679 0 obj<>endobj -680 0 obj<>endobj -681 0 obj<>endobj -682 0 obj<>endobj -683 0 obj<>endobj -684 0 obj<>endobj -685 0 obj<>endobj -686 0 obj<>endobj -687 0 obj<>endobj -688 0 obj<>endobj -689 0 obj<>endobj -690 0 obj<>endobj -691 0 obj<>endobj -692 0 obj<>endobj -693 0 obj<>endobj -694 0 obj<>endobj -695 0 obj<>endobj -696 0 obj<>endobj -697 0 obj<>endobj -698 0 obj<>endobj -699 0 obj<>endobj -700 0 obj<>endobj -701 0 obj<>endobj -702 0 obj[659 0 R +641 0 R +642 0 R +643 0 R]endobj +645 0 obj<>endobj +646 0 obj[645 0 R]endobj +647 0 obj<>endobj +648 0 obj<>endobj +649 0 obj[648 0 R]endobj +650 0 obj<>endobj +651 0 obj<>endobj +652 0 obj<>endobj +653 0 obj<>endobj +654 0 obj<>endobj +655 0 obj<>endobj +656 0 obj<>endobj +657 0 obj<>endobj +658 0 obj<>endobj +659 0 obj<>endobj +660 0 obj<>endobj +661 0 obj<>endobj +662 0 obj<>endobj +663 0 obj<>endobj +664 0 obj<>endobj +665 0 obj<>endobj +666 0 obj<>endobj +667 0 obj<>endobj +668 0 obj<>endobj +669 0 obj<>endobj +670 0 obj<>endobj +671 0 obj<>endobj +672 0 obj<>endobj +673 0 obj<>endobj +674 0 obj<>endobj +675 0 obj<>endobj +676 0 obj<>endobj +677 0 obj<>endobj +678 0 obj<>endobj +679 0 obj<>endobj +680 0 obj<>endobj +681 0 obj<>endobj +682 0 obj<>endobj +683 0 obj<>endobj +684 0 obj<>endobj +685 0 obj<>endobj +686 0 obj<>endobj +687 0 obj<>endobj +688 0 obj<>endobj +689 0 obj<>endobj +690 0 obj<>endobj +691 0 obj<>endobj +692 0 obj<>endobj +693 0 obj<>endobj +694 0 obj[651 0 R +653 0 R +655 0 R +657 0 R +659 0 R 661 0 R 663 0 R 665 0 R @@ -1288,130 +1282,135 @@ endobj 687 0 R 689 0 R 691 0 R -693 0 R -695 0 R -697 0 R -699 0 R -701 0 R]endobj -703 0 obj<>endobj -704 0 obj<>endobj -705 0 obj[704 0 R]endobj -706 0 obj<>endobj -707 0 obj<>endobj -708 0 obj[707 0 R]endobj -709 0 obj<>endobj -710 0 obj<>endobj -711 0 obj<>endobj -712 0 obj<>endobj -713 0 obj[710 0 R -712 0 R]endobj -714 0 obj<>endobj -715 0 obj<>endobj -716 0 obj<>endobj -717 0 obj<>endobj -718 0 obj<>endobj -719 0 obj<>endobj -720 0 obj<>endobj -721 0 obj<>endobj -722 0 obj<>endobj -723 0 obj<>endobj -724 0 obj<>endobj -725 0 obj<>endobj -726 0 obj<>endobj -727 0 obj<>endobj -728 0 obj<>endobj -729 0 obj<>endobj -730 0 obj[715 0 R -717 0 R -719 0 R -721 0 R -723 0 R -725 0 R -727 0 R -729 0 R]endobj -731 0 obj<>endobj -732 0 obj<>endobj -733 0 obj<>endobj -734 0 obj<>endobj -735 0 obj[732 0 R -734 0 R]endobj -736 0 obj<>endobj -737 0 obj<>endobj -738 0 obj[737 0 R]endobj -739 0 obj<>endobj -740 0 obj<>endobj -741 0 obj<>endobj -742 0 obj<>endobj -743 0 obj<>endobj -744 0 obj<>endobj -745 0 obj<>endobj -746 0 obj<>endobj -747 0 obj<>endobj -748 0 obj<>endobj -749 0 obj[740 0 R -742 0 R -744 0 R -746 0 R -748 0 R]endobj -750 0 obj<>endobj -751 0 obj<>endobj -752 0 obj<>endobj -753 0 obj<>endobj -754 0 obj<>endobj -755 0 obj<>endobj +693 0 R]endobj +695 0 obj<>endobj +696 0 obj<>endobj +697 0 obj[696 0 R]endobj +698 0 obj<>endobj +699 0 obj<>endobj +700 0 obj[699 0 R]endobj +701 0 obj<>endobj +702 0 obj<>endobj +703 0 obj[702 0 R]endobj +704 0 obj<>endobj +705 0 obj<>endobj +706 0 obj<>endobj +707 0 obj<>endobj +708 0 obj<>endobj +709 0 obj<>endobj +710 0 obj<>endobj +711 0 obj<>endobj +712 0 obj[705 0 R +707 0 R +709 0 R +711 0 R]endobj +713 0 obj<>endobj +714 0 obj<>endobj +715 0 obj<>endobj +716 0 obj<>endobj +717 0 obj<>endobj +718 0 obj<>endobj +719 0 obj<>endobj +720 0 obj<>endobj +721 0 obj<>endobj +722 0 obj<>endobj +723 0 obj<>endobj +724 0 obj<>endobj +725 0 obj<>endobj +726 0 obj<>endobj +727 0 obj<>endobj +728 0 obj<>endobj +729 0 obj[714 0 R +716 0 R +718 0 R +720 0 R +722 0 R +724 0 R +726 0 R +728 0 R]endobj +730 0 obj<>endobj +731 0 obj<>endobj +732 0 obj<>endobj +733 0 obj<>endobj +734 0 obj[731 0 R +733 0 R]endobj +735 0 obj<>endobj +736 0 obj<>endobj +737 0 obj[736 0 R]endobj +738 0 obj<>endobj +739 0 obj<>endobj +740 0 obj<>endobj +741 0 obj<>endobj +742 0 obj<>endobj +743 0 obj<>endobj +744 0 obj<>endobj +745 0 obj<>endobj +746 0 obj<>endobj +747 0 obj<>endobj +748 0 obj[739 0 R +741 0 R +743 0 R +745 0 R +747 0 R]endobj +749 0 obj<>endobj +750 0 obj<>endobj +751 0 obj<>endobj +752 0 obj<>endobj +753 0 obj<>endobj +754 0 obj<>endobj +755 0 obj[750 0 R +752 0 R +754 0 R]endobj 756 0 obj<>endobj -757 0 obj<>endobj +757 0 obj<>endobj 758 0 obj<>endobj -759 0 obj<>endobj -760 0 obj[751 0 R -753 0 R -755 0 R -757 0 R +759 0 obj<>endobj +760 0 obj[757 0 R 759 0 R]endobj -761 0 obj<>endobj -762 0 obj<>endobj -763 0 obj<>endobj -764 0 obj<>endobj -765 0 obj<>endobj -766 0 obj<>endobj -767 0 obj<>endobj -768 0 obj<>endobj -769 0 obj<>endobj -770 0 obj<>endobj -771 0 obj<>endobj -772 0 obj<>endobj -773 0 obj<>endobj -774 0 obj<>endobj -775 0 obj<>endobj -776 0 obj<>endobj -777 0 obj<>endobj -778 0 obj<>endobj -779 0 obj<>endobj -780 0 obj<>endobj -781 0 obj<>endobj -782 0 obj<>endobj -783 0 obj<>endobj -784 0 obj<>endobj -785 0 obj<>endobj -786 0 obj<>endobj -787 0 obj<>endobj -788 0 obj<>endobj -789 0 obj<>endobj -790 0 obj<>endobj -791 0 obj<>endobj -792 0 obj<>endobj -793 0 obj<>endobj -794 0 obj<>endobj -795 0 obj<>endobj -796 0 obj<>endobj -797 0 obj<>endobj -798 0 obj<>endobj -799 0 obj<>endobj -800 0 obj<>endobj -801 0 obj<>endobj -802 0 obj<>endobj -803 0 obj<>endobj -804 0 obj<>endobj +761 0 obj<>endobj +762 0 obj<>endobj +763 0 obj<>endobj +764 0 obj<>endobj +765 0 obj<>endobj +766 0 obj<>endobj +767 0 obj<>endobj +768 0 obj<>endobj +769 0 obj<>endobj +770 0 obj<>endobj +771 0 obj<>endobj +772 0 obj<>endobj +773 0 obj<>endobj +774 0 obj<>endobj +775 0 obj<>endobj +776 0 obj<>endobj +777 0 obj<>endobj +778 0 obj<>endobj +779 0 obj<>endobj +780 0 obj<>endobj +781 0 obj<>endobj +782 0 obj<>endobj +783 0 obj<>endobj +784 0 obj<>endobj +785 0 obj<>endobj +786 0 obj<>endobj +787 0 obj<>endobj +788 0 obj<>endobj +789 0 obj<>endobj +790 0 obj<>endobj +791 0 obj<>endobj +792 0 obj<>endobj +793 0 obj<>endobj +794 0 obj<>endobj +795 0 obj<>endobj +796 0 obj<>endobj +797 0 obj<>endobj +798 0 obj<>endobj +799 0 obj<>endobj +800 0 obj<>endobj +801 0 obj<>endobj +802 0 obj<>endobj +803 0 obj<>endobj +804 0 obj<>endobj 805 0 obj[761 0 R 762 0 R 763 0 R @@ -1456,57 +1455,57 @@ endobj 802 0 R 803 0 R 804 0 R]endobj -806 0 obj<>endobj -807 0 obj<>endobj -808 0 obj<>endobj -809 0 obj<>endobj -810 0 obj<>endobj -811 0 obj<>endobj -812 0 obj<>endobj -813 0 obj<>endobj -814 0 obj<>endobj -815 0 obj<>endobj -816 0 obj<>endobj -817 0 obj<>endobj -818 0 obj<>endobj -819 0 obj<>endobj -820 0 obj<>endobj -821 0 obj<>endobj -822 0 obj<>endobj -823 0 obj<>endobj -824 0 obj<>endobj -825 0 obj<>endobj -826 0 obj<>endobj -827 0 obj<>endobj -828 0 obj<>endobj -829 0 obj<>endobj -830 0 obj<>endobj -831 0 obj<>endobj -832 0 obj<>endobj -833 0 obj<>endobj -834 0 obj<>endobj -835 0 obj<>endobj -836 0 obj<>endobj -837 0 obj<>endobj -838 0 obj<>endobj -839 0 obj<>endobj -840 0 obj<>endobj -841 0 obj<>endobj -842 0 obj<>endobj -843 0 obj<>endobj -844 0 obj<>endobj -845 0 obj<>endobj -846 0 obj<>endobj -847 0 obj<>endobj -848 0 obj<>endobj -849 0 obj<>endobj -850 0 obj<>endobj -851 0 obj<>endobj -852 0 obj<>endobj -853 0 obj<>endobj -854 0 obj<>endobj -855 0 obj<>endobj -856 0 obj<>endobj +806 0 obj<>endobj +807 0 obj<>endobj +808 0 obj<>endobj +809 0 obj<>endobj +810 0 obj<>endobj +811 0 obj<>endobj +812 0 obj<>endobj +813 0 obj<>endobj +814 0 obj<>endobj +815 0 obj<>endobj +816 0 obj<>endobj +817 0 obj<>endobj +818 0 obj<>endobj +819 0 obj<>endobj +820 0 obj<>endobj +821 0 obj<>endobj +822 0 obj<>endobj +823 0 obj<>endobj +824 0 obj<>endobj +825 0 obj<>endobj +826 0 obj<>endobj +827 0 obj<>endobj +828 0 obj<>endobj +829 0 obj<>endobj +830 0 obj<>endobj +831 0 obj<>endobj +832 0 obj<>endobj +833 0 obj<>endobj +834 0 obj<>endobj +835 0 obj<>endobj +836 0 obj<>endobj +837 0 obj<>endobj +838 0 obj<>endobj +839 0 obj<>endobj +840 0 obj<>endobj +841 0 obj<>endobj +842 0 obj<>endobj +843 0 obj<>endobj +844 0 obj<>endobj +845 0 obj<>endobj +846 0 obj<>endobj +847 0 obj<>endobj +848 0 obj<>endobj +849 0 obj<>endobj +850 0 obj<>endobj +851 0 obj<>endobj +852 0 obj<>endobj +853 0 obj<>endobj +854 0 obj<>endobj +855 0 obj<>endobj +856 0 obj<>endobj 857 0 obj[806 0 R 807 0 R 808 0 R @@ -1558,42 +1557,50 @@ endobj 854 0 R 855 0 R 856 0 R]endobj -858 0 obj<>endobj -859 0 obj<>endobj -860 0 obj<>endobj -861 0 obj<>endobj -862 0 obj<>endobj -863 0 obj<>endobj -864 0 obj<>endobj -865 0 obj<>endobj -866 0 obj<>endobj -867 0 obj<>endobj -868 0 obj<>endobj -869 0 obj<>endobj -870 0 obj<>endobj -871 0 obj<>endobj -872 0 obj<>endobj -873 0 obj<>endobj -874 0 obj<>endobj -875 0 obj<>endobj -876 0 obj<>endobj -877 0 obj<>endobj -878 0 obj<>endobj -879 0 obj<>endobj -880 0 obj<>endobj -881 0 obj<>endobj -882 0 obj<>endobj -883 0 obj<>endobj -884 0 obj<>endobj -885 0 obj<>endobj -886 0 obj<>endobj -887 0 obj<>endobj -888 0 obj<>endobj -889 0 obj<>endobj -890 0 obj<>endobj -891 0 obj<>endobj -892 0 obj<>endobj -893 0 obj[858 0 R +858 0 obj<>endobj +859 0 obj<>endobj +860 0 obj<>endobj +861 0 obj<>endobj +862 0 obj<>endobj +863 0 obj<>endobj +864 0 obj<>endobj +865 0 obj<>endobj +866 0 obj<>endobj +867 0 obj<>endobj +868 0 obj<>endobj +869 0 obj<>endobj +870 0 obj<>endobj +871 0 obj<>endobj +872 0 obj<>endobj +873 0 obj<>endobj +874 0 obj<>endobj +875 0 obj<>endobj +876 0 obj<>endobj +877 0 obj<>endobj +878 0 obj<>endobj +879 0 obj<>endobj +880 0 obj<>endobj +881 0 obj<>endobj +882 0 obj<>endobj +883 0 obj<>endobj +884 0 obj<>endobj +885 0 obj<>endobj +886 0 obj<>endobj +887 0 obj<>endobj +888 0 obj<>endobj +889 0 obj<>endobj +890 0 obj<>endobj +891 0 obj<>endobj +892 0 obj<>endobj +893 0 obj<>endobj +894 0 obj<>endobj +895 0 obj<>endobj +896 0 obj<>endobj +897 0 obj<>endobj +898 0 obj<>endobj +899 0 obj<>endobj +900 0 obj<>endobj +901 0 obj[858 0 R 859 0 R 860 0 R 861 0 R @@ -1627,230 +1634,231 @@ endobj 889 0 R 890 0 R 891 0 R -892 0 R]endobj -894 0 obj<>endobj -895 0 obj<>endobj -896 0 obj<>endobj -897 0 obj<>endobj -898 0 obj[895 0 R -897 0 R]endobj -899 0 obj<>endobj -900 0 obj<>endobj -901 0 obj<>endobj -902 0 obj<>endobj -903 0 obj[900 0 R -902 0 R]endobj -904 0 obj<>endobj -905 0 obj<>endobj -906 0 obj<>endobj -907 0 obj<>endobj -908 0 obj<>endobj -909 0 obj<>endobj -910 0 obj<>endobj -911 0 obj<>endobj -912 0 obj[905 0 R -907 0 R -909 0 R -911 0 R]endobj -913 0 obj<>endobj -914 0 obj<>endobj -915 0 obj<>endobj -916 0 obj<>endobj -917 0 obj[914 0 R -916 0 R]endobj -918 0 obj<>endobj -919 0 obj<>endobj -920 0 obj<>endobj -921 0 obj<>endobj -922 0 obj<>endobj -923 0 obj<>endobj -924 0 obj[919 0 R -921 0 R -923 0 R]endobj -925 0 obj<>endobj -926 0 obj<>endobj -927 0 obj<>endobj -928 0 obj<>endobj -929 0 obj<>endobj -930 0 obj<>endobj -931 0 obj<>endobj -932 0 obj<>endobj -933 0 obj<>endobj -934 0 obj<>endobj -935 0 obj[926 0 R -928 0 R -930 0 R -932 0 R +892 0 R +893 0 R +894 0 R +895 0 R +896 0 R +897 0 R +898 0 R +899 0 R +900 0 R]endobj +902 0 obj<>endobj +903 0 obj<>endobj +904 0 obj<>endobj +905 0 obj<>endobj +906 0 obj<>endobj +907 0 obj<>endobj +908 0 obj[903 0 R +905 0 R +907 0 R]endobj +909 0 obj<>endobj +910 0 obj<>endobj +911 0 obj<>endobj +912 0 obj<>endobj +913 0 obj[910 0 R +912 0 R]endobj +914 0 obj<>endobj +915 0 obj<>endobj +916 0 obj<>endobj +917 0 obj<>endobj +918 0 obj[915 0 R +917 0 R]endobj +919 0 obj<>endobj +920 0 obj<>endobj +921 0 obj<>endobj +922 0 obj<>endobj +923 0 obj<>endobj +924 0 obj<>endobj +925 0 obj<>endobj +926 0 obj<>endobj +927 0 obj[920 0 R +922 0 R +924 0 R +926 0 R]endobj +928 0 obj<>endobj +929 0 obj<>endobj +930 0 obj[929 0 R]endobj +931 0 obj<>endobj +932 0 obj<>endobj +933 0 obj<>endobj +934 0 obj<>endobj +935 0 obj[932 0 R 934 0 R]endobj -936 0 obj<>endobj -937 0 obj<>endobj -938 0 obj[937 0 R]endobj -939 0 obj<>endobj -940 0 obj<>endobj -941 0 obj<>endobj -942 0 obj<>endobj -943 0 obj<>endobj -944 0 obj<>endobj -945 0 obj<>endobj -946 0 obj<>endobj -947 0 obj<>endobj -948 0 obj<>endobj -949 0 obj[940 0 R -942 0 R -944 0 R +936 0 obj<>endobj +937 0 obj<>endobj +938 0 obj<>endobj +939 0 obj<>endobj +940 0 obj<>endobj +941 0 obj<>endobj +942 0 obj[937 0 R +939 0 R +941 0 R]endobj +943 0 obj<>endobj +944 0 obj<>endobj +945 0 obj<>endobj +946 0 obj<>endobj +947 0 obj<>endobj +948 0 obj<>endobj +949 0 obj[944 0 R 946 0 R 948 0 R]endobj -950 0 obj<>endobj -951 0 obj<>endobj -952 0 obj<>endobj -953 0 obj<>endobj -954 0 obj[951 0 R -953 0 R]endobj -955 0 obj<>endobj -956 0 obj<>endobj -957 0 obj<>endobj -958 0 obj<>endobj -959 0 obj<>endobj -960 0 obj<>endobj -961 0 obj[956 0 R -958 0 R -960 0 R]endobj -962 0 obj<>endobj -963 0 obj<>endobj -964 0 obj<>endobj -965 0 obj<>endobj -966 0 obj<>endobj -967 0 obj<>endobj -968 0 obj<>endobj -969 0 obj<>endobj -970 0 obj[963 0 R -965 0 R +950 0 obj<>endobj +951 0 obj<>endobj +952 0 obj<>endobj +953 0 obj<>endobj +954 0 obj<>endobj +955 0 obj<>endobj +956 0 obj<>endobj +957 0 obj<>endobj +958 0 obj<>endobj +959 0 obj<>endobj +960 0 obj[951 0 R +953 0 R +955 0 R +957 0 R +959 0 R]endobj +961 0 obj<>endobj +962 0 obj<>endobj +963 0 obj[962 0 R]endobj +964 0 obj<>endobj +965 0 obj<>endobj +966 0 obj<>endobj +967 0 obj<>endobj +968 0 obj<>endobj +969 0 obj<>endobj +970 0 obj<>endobj +971 0 obj<>endobj +972 0 obj<>endobj +973 0 obj<>endobj +974 0 obj[965 0 R 967 0 R -969 0 R]endobj -971 0 obj<>endobj -972 0 obj<>endobj -973 0 obj[972 0 R]endobj -974 0 obj<>endobj -975 0 obj<>endobj -976 0 obj[975 0 R]endobj -977 0 obj<>endobj -978 0 obj<>endobj -979 0 obj[978 0 R]endobj -980 0 obj<>endobj -981 0 obj<>endobj -982 0 obj[981 0 R]endobj -983 0 obj<>endobj -984 0 obj<>endobj -985 0 obj<>endobj -986 0 obj<>endobj -987 0 obj<>endobj -988 0 obj<>endobj -989 0 obj[984 0 R -986 0 R -988 0 R]endobj -990 0 obj<>endobj -991 0 obj<>endobj -992 0 obj<>endobj -993 0 obj<>endobj -994 0 obj<>endobj -995 0 obj<>endobj -996 0 obj<>endobj -997 0 obj<>endobj -998 0 obj<>endobj -999 0 obj<>endobj -1000 0 obj[991 0 R -993 0 R -995 0 R -997 0 R -999 0 R]endobj -1001 0 obj<>endobj -1002 0 obj<>endobj -1003 0 obj<>endobj -1004 0 obj<>endobj -1005 0 obj[1002 0 R -1004 0 R]endobj -1006 0 obj<>endobj -1007 0 obj<>endobj -1008 0 obj<>endobj -1009 0 obj<>endobj -1010 0 obj<>endobj -1011 0 obj<>endobj -1012 0 obj[1007 0 R -1009 0 R -1011 0 R]endobj -1013 0 obj<>endobj -1014 0 obj<>endobj -1015 0 obj<>endobj -1016 0 obj<>endobj -1017 0 obj[1014 0 R -1016 0 R]endobj -1018 0 obj<>endobj -1019 0 obj<>endobj -1020 0 obj[1019 0 R]endobj -1021 0 obj<>endobj -1022 0 obj<>endobj -1023 0 obj[1022 0 R]endobj -1024 0 obj<>endobj -1025 0 obj<>endobj -1026 0 obj<>endobj -1027 0 obj<>endobj -1028 0 obj<>endobj -1029 0 obj<>endobj -1030 0 obj<>endobj -1031 0 obj<>endobj -1032 0 obj<>endobj -1033 0 obj<>endobj -1034 0 obj<>endobj -1035 0 obj<>endobj -1036 0 obj<>endobj -1037 0 obj<>endobj -1038 0 obj<>endobj -1039 0 obj<>endobj -1040 0 obj<>endobj -1041 0 obj<>endobj -1042 0 obj<>endobj -1043 0 obj<>endobj -1044 0 obj<>endobj -1045 0 obj<>endobj -1046 0 obj<>endobj -1047 0 obj<>endobj -1048 0 obj<>endobj -1049 0 obj<>endobj -1050 0 obj<>endobj -1051 0 obj<>endobj -1052 0 obj<>endobj -1053 0 obj<>endobj -1054 0 obj<>endobj -1055 0 obj<>endobj -1056 0 obj<>endobj -1057 0 obj<>endobj -1058 0 obj<>endobj -1059 0 obj<>endobj -1060 0 obj<>endobj -1061 0 obj<>endobj -1062 0 obj<>endobj -1063 0 obj<>endobj -1064 0 obj<>endobj -1065 0 obj<>endobj -1066 0 obj<>endobj -1067 0 obj<>endobj -1068 0 obj<>endobj -1069 0 obj<>endobj -1070 0 obj<>endobj -1071 0 obj[1024 0 R -1025 0 R -1026 0 R -1027 0 R -1028 0 R -1029 0 R -1030 0 R -1031 0 R -1032 0 R -1033 0 R -1034 0 R -1035 0 R -1036 0 R -1037 0 R +969 0 R +971 0 R +973 0 R]endobj +975 0 obj<>endobj +976 0 obj<>endobj +977 0 obj<>endobj +978 0 obj<>endobj +979 0 obj[976 0 R +978 0 R]endobj +980 0 obj<>endobj +981 0 obj<>endobj +982 0 obj<>endobj +983 0 obj<>endobj +984 0 obj<>endobj +985 0 obj<>endobj +986 0 obj[981 0 R +983 0 R +985 0 R]endobj +987 0 obj<>endobj +988 0 obj<>endobj +989 0 obj<>endobj +990 0 obj<>endobj +991 0 obj<>endobj +992 0 obj<>endobj +993 0 obj<>endobj +994 0 obj<>endobj +995 0 obj[988 0 R +990 0 R +992 0 R +994 0 R]endobj +996 0 obj<>endobj +997 0 obj<>endobj +998 0 obj[997 0 R]endobj +999 0 obj<>endobj +1000 0 obj<>endobj +1001 0 obj[1000 0 R]endobj +1002 0 obj<>endobj +1003 0 obj<>endobj +1004 0 obj[1003 0 R]endobj +1005 0 obj<>endobj +1006 0 obj<>endobj +1007 0 obj[1006 0 R]endobj +1008 0 obj<>endobj +1009 0 obj<>endobj +1010 0 obj<>endobj +1011 0 obj<>endobj +1012 0 obj<>endobj +1013 0 obj<>endobj +1014 0 obj[1009 0 R +1011 0 R +1013 0 R]endobj +1015 0 obj<>endobj +1016 0 obj<>endobj +1017 0 obj<>endobj +1018 0 obj<>endobj +1019 0 obj<>endobj +1020 0 obj<>endobj +1021 0 obj<>endobj +1022 0 obj<>endobj +1023 0 obj<>endobj +1024 0 obj<>endobj +1025 0 obj[1016 0 R +1018 0 R +1020 0 R +1022 0 R +1024 0 R]endobj +1026 0 obj<>endobj +1027 0 obj<>endobj +1028 0 obj<>endobj +1029 0 obj<>endobj +1030 0 obj[1027 0 R +1029 0 R]endobj +1031 0 obj<>endobj +1032 0 obj<>endobj +1033 0 obj[1032 0 R]endobj +1034 0 obj<>endobj +1035 0 obj<>endobj +1036 0 obj[1035 0 R]endobj +1037 0 obj<>endobj +1038 0 obj<>endobj +1039 0 obj<>endobj +1040 0 obj<>endobj +1041 0 obj<>endobj +1042 0 obj<>endobj +1043 0 obj<>endobj +1044 0 obj<>endobj +1045 0 obj<>endobj +1046 0 obj<>endobj +1047 0 obj<>endobj +1048 0 obj<>endobj +1049 0 obj<>endobj +1050 0 obj<>endobj +1051 0 obj<>endobj +1052 0 obj<>endobj +1053 0 obj<>endobj +1054 0 obj<>endobj +1055 0 obj<>endobj +1056 0 obj<>endobj +1057 0 obj<>endobj +1058 0 obj<>endobj +1059 0 obj<>endobj +1060 0 obj<>endobj +1061 0 obj<>endobj +1062 0 obj<>endobj +1063 0 obj<>endobj +1064 0 obj<>endobj +1065 0 obj<>endobj +1066 0 obj<>endobj +1067 0 obj<>endobj +1068 0 obj<>endobj +1069 0 obj<>endobj +1070 0 obj<>endobj +1071 0 obj<>endobj +1072 0 obj<>endobj +1073 0 obj<>endobj +1074 0 obj<>endobj +1075 0 obj<>endobj +1076 0 obj<>endobj +1077 0 obj<>endobj +1078 0 obj<>endobj +1079 0 obj<>endobj +1080 0 obj<>endobj +1081 0 obj<>endobj +1082 0 obj<>endobj +1083 0 obj<>endobj +1084 0 obj[1037 0 R 1038 0 R 1039 0 R 1040 0 R @@ -1883,27 +1891,9 @@ endobj 1067 0 R 1068 0 R 1069 0 R -1070 0 R]endobj -1072 0 obj<>endobj -1073 0 obj<>endobj -1074 0 obj<>endobj -1075 0 obj<>endobj -1076 0 obj<>endobj -1077 0 obj<>endobj -1078 0 obj<>endobj -1079 0 obj<>endobj -1080 0 obj<>endobj -1081 0 obj<>endobj -1082 0 obj<>endobj -1083 0 obj<>endobj -1084 0 obj<>endobj -1085 0 obj<>endobj -1086 0 obj<>endobj -1087 0 obj<>endobj -1088 0 obj<>endobj -1089 0 obj<>endobj -1090 0 obj<>endobj -1091 0 obj[1072 0 R +1070 0 R +1071 0 R +1072 0 R 1073 0 R 1074 0 R 1075 0 R @@ -1914,831 +1904,836 @@ endobj 1080 0 R 1081 0 R 1082 0 R -1083 0 R -1084 0 R -1085 0 R +1083 0 R]endobj +1085 0 obj<>endobj +1086 0 obj<>endobj +1087 0 obj<>endobj +1088 0 obj<>endobj +1089 0 obj<>endobj +1090 0 obj<>endobj +1091 0 obj<>endobj +1092 0 obj[1085 0 R 1086 0 R 1087 0 R 1088 0 R 1089 0 R -1090 0 R]endobj -1092 0 obj<>endobj -1093 0 obj<>endobj -1094 0 obj<>endobj -1095 0 obj<>endobj -1096 0 obj<>endobj -1097 0 obj<>endobj -1098 0 obj<>endobj -1099 0 obj<>endobj -1100 0 obj<>endobj -1101 0 obj<>endobj -1102 0 obj[1093 0 R -1095 0 R -1097 0 R -1099 0 R -1101 0 R]endobj -1103 0 obj<>endobj -1104 0 obj<>endobj -1105 0 obj<>endobj -1106 0 obj<>endobj -1107 0 obj<>endobj -1108 0 obj<>endobj -1109 0 obj<>endobj -1110 0 obj<>endobj -1111 0 obj[1104 0 R -1106 0 R -1108 0 R -1110 0 R]endobj -1112 0 obj<>endobj -1113 0 obj<>endobj -1114 0 obj[1113 0 R]endobj -1115 0 obj<>endobj -1116 0 obj<>endobj -1117 0 obj[1116 0 R]endobj -1118 0 obj<>endobj -1119 0 obj<>endobj -1120 0 obj<>endobj -1121 0 obj<>endobj -1122 0 obj<>endobj -1123 0 obj<>endobj -1124 0 obj<>endobj -1125 0 obj<>endobj -1126 0 obj[1119 0 R -1121 0 R -1123 0 R -1125 0 R]endobj -1127 0 obj<>endobj -1128 0 obj<>endobj -1129 0 obj<>endobj -1130 0 obj<>endobj -1131 0 obj[1128 0 R -1130 0 R]endobj -1132 0 obj<>endobj -1133 0 obj<>endobj -1134 0 obj<>endobj -1135 0 obj<>endobj -1136 0 obj<>endobj -1137 0 obj<>endobj -1138 0 obj<>endobj -1139 0 obj<>endobj -1140 0 obj[1133 0 R -1135 0 R -1137 0 R -1139 0 R]endobj -1141 0 obj<>endobj -1142 0 obj<>endobj -1143 0 obj<>endobj -1144 0 obj<>endobj -1145 0 obj[1142 0 R -1144 0 R]endobj -1146 0 obj<>endobj -1147 0 obj<>endobj -1148 0 obj<>endobj -1149 0 obj<>endobj -1150 0 obj<>endobj -1151 0 obj<>endobj -1152 0 obj<>endobj -1153 0 obj<>endobj -1154 0 obj<>endobj -1155 0 obj<>endobj -1156 0 obj<>endobj -1157 0 obj<>endobj -1158 0 obj<>endobj -1159 0 obj<>endobj -1160 0 obj<>endobj -1161 0 obj<>endobj -1162 0 obj<>endobj -1163 0 obj<>endobj -1164 0 obj<>endobj -1165 0 obj<>endobj -1166 0 obj<>endobj -1167 0 obj<>endobj -1168 0 obj<>endobj -1169 0 obj<>endobj -1170 0 obj<>endobj -1171 0 obj<>endobj -1172 0 obj<>endobj -1173 0 obj<>endobj -1174 0 obj<>endobj -1175 0 obj<>endobj -1176 0 obj<>endobj -1177 0 obj<>endobj -1178 0 obj<>endobj -1179 0 obj<>endobj -1180 0 obj<>endobj -1181 0 obj<>endobj -1182 0 obj<>endobj -1183 0 obj<>endobj -1184 0 obj<>endobj -1185 0 obj<>endobj -1186 0 obj<>endobj -1187 0 obj<>endobj -1188 0 obj<>endobj -1189 0 obj<>endobj -1190 0 obj<>endobj -1191 0 obj<>endobj -1192 0 obj<>endobj -1193 0 obj<>endobj -1194 0 obj<>endobj -1195 0 obj<>endobj -1196 0 obj<>endobj -1197 0 obj<>endobj -1198 0 obj<>endobj -1199 0 obj<>endobj -1200 0 obj<>endobj -1201 0 obj<>endobj -1202 0 obj<>endobj -1203 0 obj<>endobj -1204 0 obj<>endobj -1205 0 obj<>endobj -1206 0 obj<>endobj -1207 0 obj<>endobj -1208 0 obj<>endobj -1209 0 obj<>endobj -1210 0 obj<>endobj -1211 0 obj<>endobj -1212 0 obj<>endobj -1213 0 obj<>endobj -1214 0 obj<>endobj -1215 0 obj<>endobj -1216 0 obj<>endobj -1217 0 obj<>endobj -1218 0 obj<>endobj -1219 0 obj<>endobj -1220 0 obj<>endobj -1221 0 obj<>endobj -1222 0 obj<>endobj -1223 0 obj<>endobj -1224 0 obj<>endobj -1225 0 obj<>endobj -1226 0 obj<>endobj -1227 0 obj<>endobj -1228 0 obj<>endobj -1229 0 obj<>endobj -1230 0 obj<>endobj -1231 0 obj<>endobj -1232 0 obj<>endobj -1233 0 obj<>endobj -1234 0 obj<>endobj -1235 0 obj<>endobj -1236 0 obj<>endobj -1237 0 obj<>endobj -1238 0 obj<>endobj -1239 0 obj<>endobj -1240 0 obj<>endobj -1241 0 obj<>endobj -1242 0 obj<>endobj -1243 0 obj<>endobj -1244 0 obj<>endobj -1245 0 obj<>endobj -1246 0 obj<>endobj -1247 0 obj<>endobj -1248 0 obj<>endobj -1249 0 obj<>endobj -1250 0 obj<>endobj -1251 0 obj<>endobj -1252 0 obj<>endobj -1253 0 obj<>endobj -1254 0 obj<>endobj -1255 0 obj<>endobj -1256 0 obj<>endobj -1257 0 obj<>endobj -1258 0 obj<>endobj -1259 0 obj<>endobj -1260 0 obj<>endobj -1261 0 obj<>endobj -1262 0 obj<>endobj -1263 0 obj<>endobj -1264 0 obj<>endobj -1265 0 obj<>endobj -1266 0 obj<>endobj -1267 0 obj<>endobj -1268 0 obj<>endobj -1269 0 obj<>endobj -1270 0 obj<>endobj -1271 0 obj<>endobj -1272 0 obj<>endobj -1273 0 obj<>endobj -1274 0 obj<>endobj -1275 0 obj<>endobj -1276 0 obj<>endobj -1277 0 obj<>endobj -1278 0 obj<>endobj -1279 0 obj<>endobj -1280 0 obj<>endobj -1281 0 obj<>endobj -1282 0 obj<>endobj -1283 0 obj<>endobj -1284 0 obj<>endobj -1285 0 obj<>endobj -1286 0 obj<>endobj -1287 0 obj<>endobj -1288 0 obj<>endobj -1289 0 obj<>endobj -1290 0 obj<>endobj -1291 0 obj<>endobj -1292 0 obj<>endobj -1293 0 obj<>endobj -1294 0 obj<>endobj -1295 0 obj<>endobj -1296 0 obj<>endobj -1297 0 obj<>endobj -1298 0 obj<>endobj -1299 0 obj<>endobj -1300 0 obj<>endobj -1301 0 obj<>endobj -1302 0 obj<>endobj -1303 0 obj<>endobj -1304 0 obj<>endobj -1305 0 obj<>endobj -1306 0 obj<>endobj -1307 0 obj<>endobj -1308 0 obj<>endobj -1309 0 obj<>endobj -1310 0 obj<>endobj -1311 0 obj<>endobj -1312 0 obj<>endobj -1313 0 obj<>endobj -1314 0 obj<>endobj -1315 0 obj<>endobj -1316 0 obj<>endobj -1317 0 obj<>endobj -1318 0 obj<>endobj -1319 0 obj<>endobj -1320 0 obj<>endobj -1321 0 obj<>endobj -1322 0 obj<>endobj -1323 0 obj<>endobj -1324 0 obj<>endobj -1325 0 obj<>endobj -1326 0 obj<>endobj -1327 0 obj<>endobj -1328 0 obj<>endobj -1329 0 obj<>endobj -1330 0 obj<>endobj -1331 0 obj<>endobj -1332 0 obj<>endobj -1333 0 obj<>endobj -1334 0 obj<>endobj -1335 0 obj<>endobj -1336 0 obj<>endobj -1337 0 obj<>endobj -1338 0 obj<>endobj -1339 0 obj<>endobj -1340 0 obj<>endobj -1341 0 obj<>endobj -1342 0 obj<>endobj -1343 0 obj<>endobj -1344 0 obj<>endobj -1345 0 obj<>endobj -1346 0 obj<>endobj -1347 0 obj<>endobj -1348 0 obj<>endobj -1349 0 obj<>endobj -1350 0 obj<>endobj -1351 0 obj<>endobj -1352 0 obj<>endobj -1353 0 obj<>endobj -1354 0 obj<>endobj -1355 0 obj<>endobj -1356 0 obj<>endobj -1357 0 obj<>endobj -1358 0 obj<>endobj -1359 0 obj<>endobj -1360 0 obj<>endobj -1361 0 obj<>endobj -1362 0 obj<>endobj -1363 0 obj<>endobj -1364 0 obj<>endobj -1365 0 obj<>endobj -1366 0 obj<>endobj -1367 0 obj<>endobj -1368 0 obj<>endobj -1369 0 obj<>endobj -1370 0 obj<>endobj -1371 0 obj<>endobj -1372 0 obj<>endobj -1373 0 obj<>endobj -1374 0 obj<>endobj -1375 0 obj<>endobj -1376 0 obj<>endobj -1377 0 obj<>endobj -1378 0 obj<>endobj -1379 0 obj<>endobj -1380 0 obj<>endobj -1381 0 obj<>endobj -1382 0 obj<>endobj -1383 0 obj<>endobj -1384 0 obj<>endobj -1385 0 obj<>endobj -1386 0 obj<>endobj -1387 0 obj<>endobj -1388 0 obj<>endobj -1389 0 obj<>endobj -1390 0 obj<>endobj -1391 0 obj<>endobj -1392 0 obj<>endobj -1393 0 obj<>endobj -1394 0 obj<>endobj -1395 0 obj<>endobj -1396 0 obj<>endobj -1397 0 obj<>endobj -1398 0 obj<>endobj -1399 0 obj<>endobj -1400 0 obj<>endobj -1401 0 obj<>endobj -1402 0 obj<>endobj -1403 0 obj<>endobj -1404 0 obj<>endobj -1405 0 obj<>endobj -1406 0 obj<>endobj -1407 0 obj<>endobj -1408 0 obj<>endobj -1409 0 obj<>endobj -1410 0 obj<>endobj -1411 0 obj<>endobj -1412 0 obj<>endobj -1413 0 obj<>endobj -1414 0 obj<>endobj -1415 0 obj<>endobj -1416 0 obj<>endobj -1417 0 obj<>endobj -1418 0 obj<>endobj -1419 0 obj<>endobj -1420 0 obj<>endobj -1421 0 obj<>endobj -1422 0 obj<>endobj -1423 0 obj<>endobj -1424 0 obj<>endobj -1425 0 obj<>endobj -1426 0 obj<>endobj -1427 0 obj<>endobj -1428 0 obj<>endobj -1429 0 obj<>endobj -1430 0 obj<>endobj -1431 0 obj<>endobj -1432 0 obj<>endobj -1433 0 obj<>endobj -1434 0 obj<>endobj -1435 0 obj<>endobj -1436 0 obj<>endobj -1437 0 obj<>endobj -1438 0 obj<>endobj -1439 0 obj<>endobj -1440 0 obj<>endobj -1441 0 obj<>endobj -1442 0 obj<>endobj -1443 0 obj<>endobj -1444 0 obj<>endobj -1445 0 obj<>endobj -1446 0 obj<>endobj -1447 0 obj<>endobj -1448 0 obj<>endobj -1449 0 obj<>endobj -1450 0 obj<>endobj -1451 0 obj<>endobj -1452 0 obj<>endobj -1453 0 obj<>endobj -1454 0 obj<>endobj -1455 0 obj<>endobj -1456 0 obj<>endobj -1457 0 obj<>endobj -1458 0 obj<>endobj -1459 0 obj<>endobj -1460 0 obj<>endobj -1461 0 obj<>endobj -1462 0 obj<>endobj -1463 0 obj<>endobj -1464 0 obj<>endobj -1465 0 obj<>endobj -1466 0 obj<>endobj -1467 0 obj<>endobj -1468 0 obj<>endobj -1469 0 obj<>endobj -1470 0 obj<>endobj -1471 0 obj<>endobj -1472 0 obj<>endobj -1473 0 obj<>endobj -1474 0 obj<>endobj -1475 0 obj<>endobj -1476 0 obj<>endobj -1477 0 obj<>endobj -1478 0 obj<>endobj -1479 0 obj<>endobj +1094 0 obj<>endobj +1095 0 obj<>endobj +1096 0 obj<>endobj +1097 0 obj<>endobj +1098 0 obj<>endobj +1099 0 obj<>endobj +1100 0 obj<>endobj +1101 0 obj<>endobj +1102 0 obj<>endobj +1103 0 obj[1094 0 R +1096 0 R +1098 0 R +1100 0 R +1102 0 R]endobj +1104 0 obj<>endobj +1105 0 obj<>endobj +1106 0 obj<>endobj +1107 0 obj<>endobj +1108 0 obj<>endobj +1109 0 obj<>endobj +1110 0 obj<>endobj +1111 0 obj<>endobj +1112 0 obj[1105 0 R +1107 0 R +1109 0 R +1111 0 R]endobj +1113 0 obj<>endobj +1114 0 obj<>endobj +1115 0 obj[1114 0 R]endobj +1116 0 obj<>endobj +1117 0 obj<>endobj +1118 0 obj[1117 0 R]endobj +1119 0 obj<>endobj +1120 0 obj<>endobj +1121 0 obj<>endobj +1122 0 obj<>endobj +1123 0 obj<>endobj +1124 0 obj<>endobj +1125 0 obj<>endobj +1126 0 obj<>endobj +1127 0 obj[1120 0 R +1122 0 R +1124 0 R +1126 0 R]endobj +1128 0 obj<>endobj +1129 0 obj<>endobj +1130 0 obj<>endobj +1131 0 obj<>endobj +1132 0 obj[1129 0 R +1131 0 R]endobj +1133 0 obj<>endobj +1134 0 obj<>endobj +1135 0 obj<>endobj +1136 0 obj<>endobj +1137 0 obj<>endobj +1138 0 obj<>endobj +1139 0 obj<>endobj +1140 0 obj<>endobj +1141 0 obj[1134 0 R +1136 0 R +1138 0 R +1140 0 R]endobj +1142 0 obj<>endobj +1143 0 obj<>endobj +1144 0 obj<>endobj +1145 0 obj<>endobj +1146 0 obj[1143 0 R +1145 0 R]endobj +1147 0 obj<>endobj +1148 0 obj<>endobj +1149 0 obj<>endobj +1150 0 obj<>endobj +1151 0 obj<>endobj +1152 0 obj<>endobj +1153 0 obj<>endobj +1154 0 obj<>endobj +1155 0 obj<>endobj +1156 0 obj<>endobj +1157 0 obj<>endobj +1158 0 obj<>endobj +1159 0 obj<>endobj +1160 0 obj<>endobj +1161 0 obj<>endobj +1162 0 obj<>endobj +1163 0 obj<>endobj +1164 0 obj<>endobj +1165 0 obj<>endobj +1166 0 obj<>endobj +1167 0 obj<>endobj +1168 0 obj<>endobj +1169 0 obj<>endobj +1170 0 obj<>endobj +1171 0 obj<>endobj +1172 0 obj<>endobj +1173 0 obj<>endobj +1174 0 obj<>endobj +1175 0 obj<>endobj +1176 0 obj<>endobj +1177 0 obj<>endobj +1178 0 obj<>endobj +1179 0 obj<>endobj +1180 0 obj<>endobj +1181 0 obj<>endobj +1182 0 obj<>endobj +1183 0 obj<>endobj +1184 0 obj<>endobj +1185 0 obj<>endobj +1186 0 obj<>endobj +1187 0 obj<>endobj +1188 0 obj<>endobj +1189 0 obj<>endobj +1190 0 obj<>endobj +1191 0 obj<>endobj +1192 0 obj<>endobj +1193 0 obj<>endobj +1194 0 obj<>endobj +1195 0 obj<>endobj +1196 0 obj<>endobj +1197 0 obj<>endobj +1198 0 obj<>endobj +1199 0 obj<>endobj +1200 0 obj<>endobj +1201 0 obj<>endobj +1202 0 obj<>endobj +1203 0 obj<>endobj +1204 0 obj<>endobj +1205 0 obj<>endobj +1206 0 obj<>endobj +1207 0 obj<>endobj +1208 0 obj<>endobj +1209 0 obj<>endobj +1210 0 obj<>endobj +1211 0 obj<>endobj +1212 0 obj<>endobj +1213 0 obj<>endobj +1214 0 obj<>endobj +1215 0 obj<>endobj +1216 0 obj<>endobj +1217 0 obj<>endobj +1218 0 obj<>endobj +1219 0 obj<>endobj +1220 0 obj<>endobj +1221 0 obj<>endobj +1222 0 obj<>endobj +1223 0 obj<>endobj +1224 0 obj<>endobj +1225 0 obj<>endobj +1226 0 obj<>endobj +1227 0 obj<>endobj +1228 0 obj<>endobj +1229 0 obj<>endobj +1230 0 obj<>endobj +1231 0 obj<>endobj +1232 0 obj<>endobj +1233 0 obj<>endobj +1234 0 obj<>endobj +1235 0 obj<>endobj +1236 0 obj<>endobj +1237 0 obj<>endobj +1238 0 obj<>endobj +1239 0 obj<>endobj +1240 0 obj<>endobj +1241 0 obj<>endobj +1242 0 obj<>endobj +1243 0 obj<>endobj +1244 0 obj<>endobj +1245 0 obj<>endobj +1246 0 obj<>endobj +1247 0 obj<>endobj +1248 0 obj<>endobj +1249 0 obj<>endobj +1250 0 obj<>endobj +1251 0 obj<>endobj +1252 0 obj<>endobj +1253 0 obj<>endobj +1254 0 obj<>endobj +1255 0 obj<>endobj +1256 0 obj<>endobj +1257 0 obj<>endobj +1258 0 obj<>endobj +1259 0 obj<>endobj +1260 0 obj<>endobj +1261 0 obj<>endobj +1262 0 obj<>endobj +1263 0 obj<>endobj +1264 0 obj<>endobj +1265 0 obj<>endobj +1266 0 obj<>endobj +1267 0 obj<>endobj +1268 0 obj<>endobj +1269 0 obj<>endobj +1270 0 obj<>endobj +1271 0 obj<>endobj +1272 0 obj<>endobj +1273 0 obj<>endobj +1274 0 obj<>endobj +1275 0 obj<>endobj +1276 0 obj<>endobj +1277 0 obj<>endobj +1278 0 obj<>endobj +1279 0 obj<>endobj +1280 0 obj<>endobj +1281 0 obj<>endobj +1282 0 obj<>endobj +1283 0 obj<>endobj +1284 0 obj<>endobj +1285 0 obj<>endobj +1286 0 obj<>endobj +1287 0 obj<>endobj +1288 0 obj<>endobj +1289 0 obj<>endobj +1290 0 obj<>endobj +1291 0 obj<>endobj +1292 0 obj<>endobj +1293 0 obj<>endobj +1294 0 obj<>endobj +1295 0 obj<>endobj +1296 0 obj<>endobj +1297 0 obj<>endobj +1298 0 obj<>endobj +1299 0 obj<>endobj +1300 0 obj<>endobj +1301 0 obj<>endobj +1302 0 obj<>endobj +1303 0 obj<>endobj +1304 0 obj<>endobj +1305 0 obj<>endobj +1306 0 obj<>endobj +1307 0 obj<>endobj +1308 0 obj<>endobj +1309 0 obj<>endobj +1310 0 obj<>endobj +1311 0 obj<>endobj +1312 0 obj<>endobj +1313 0 obj<>endobj +1314 0 obj<>endobj +1315 0 obj<>endobj +1316 0 obj<>endobj +1317 0 obj<>endobj +1318 0 obj<>endobj +1319 0 obj<>endobj +1320 0 obj<>endobj +1321 0 obj<>endobj +1322 0 obj<>endobj +1323 0 obj<>endobj +1324 0 obj<>endobj +1325 0 obj<>endobj +1326 0 obj<>endobj +1327 0 obj<>endobj +1328 0 obj<>endobj +1329 0 obj<>endobj +1330 0 obj<>endobj +1331 0 obj<>endobj +1332 0 obj<>endobj +1333 0 obj<>endobj +1334 0 obj<>endobj +1335 0 obj<>endobj +1336 0 obj<>endobj +1337 0 obj<>endobj +1338 0 obj<>endobj +1339 0 obj<>endobj +1340 0 obj<>endobj +1341 0 obj<>endobj +1342 0 obj<>endobj +1343 0 obj<>endobj +1344 0 obj<>endobj +1345 0 obj<>endobj +1346 0 obj<>endobj +1347 0 obj<>endobj +1348 0 obj<>endobj +1349 0 obj<>endobj +1350 0 obj<>endobj +1351 0 obj<>endobj +1352 0 obj<>endobj +1353 0 obj<>endobj +1354 0 obj<>endobj +1355 0 obj<>endobj +1356 0 obj<>endobj +1357 0 obj<>endobj +1358 0 obj<>endobj +1359 0 obj<>endobj +1360 0 obj<>endobj +1361 0 obj<>endobj +1362 0 obj<>endobj +1363 0 obj<>endobj +1364 0 obj<>endobj +1365 0 obj<>endobj +1366 0 obj<>endobj +1367 0 obj<>endobj +1368 0 obj<>endobj +1369 0 obj<>endobj +1370 0 obj<>endobj +1371 0 obj<>endobj +1372 0 obj<>endobj +1373 0 obj<>endobj +1374 0 obj<>endobj +1375 0 obj<>endobj +1376 0 obj<>endobj +1377 0 obj<>endobj +1378 0 obj<>endobj +1379 0 obj<>endobj +1380 0 obj<>endobj +1381 0 obj<>endobj +1382 0 obj<>endobj +1383 0 obj<>endobj +1384 0 obj<>endobj +1385 0 obj<>endobj +1386 0 obj<>endobj +1387 0 obj<>endobj +1388 0 obj<>endobj +1389 0 obj<>endobj +1390 0 obj<>endobj +1391 0 obj<>endobj +1392 0 obj<>endobj +1393 0 obj<>endobj +1394 0 obj<>endobj +1395 0 obj<>endobj +1396 0 obj<>endobj +1397 0 obj<>endobj +1398 0 obj<>endobj +1399 0 obj<>endobj +1400 0 obj<>endobj +1401 0 obj<>endobj +1402 0 obj<>endobj +1403 0 obj<>endobj +1404 0 obj<>endobj +1405 0 obj<>endobj +1406 0 obj<>endobj +1407 0 obj<>endobj +1408 0 obj<>endobj +1409 0 obj<>endobj +1410 0 obj<>endobj +1411 0 obj<>endobj +1412 0 obj<>endobj +1413 0 obj<>endobj +1414 0 obj<>endobj +1415 0 obj<>endobj +1416 0 obj<>endobj +1417 0 obj<>endobj +1418 0 obj<>endobj +1419 0 obj<>endobj +1420 0 obj<>endobj +1421 0 obj<>endobj +1422 0 obj<>endobj +1423 0 obj<>endobj +1424 0 obj<>endobj +1425 0 obj<>endobj +1426 0 obj<>endobj +1427 0 obj<>endobj +1428 0 obj<>endobj +1429 0 obj<>endobj +1430 0 obj<>endobj +1431 0 obj<>endobj +1432 0 obj<>endobj +1433 0 obj<>endobj +1434 0 obj<>endobj +1435 0 obj<>endobj +1436 0 obj<>endobj +1437 0 obj<>endobj +1438 0 obj<>endobj +1439 0 obj<>endobj +1440 0 obj<>endobj +1441 0 obj<>endobj +1442 0 obj<>endobj +1443 0 obj<>endobj +1444 0 obj<>endobj +1445 0 obj<>endobj +1446 0 obj<>endobj +1447 0 obj<>endobj +1448 0 obj<>endobj +1449 0 obj<>endobj +1450 0 obj<>endobj +1451 0 obj<>endobj +1452 0 obj<>endobj +1453 0 obj<>endobj +1454 0 obj<>endobj +1455 0 obj<>endobj +1456 0 obj<>endobj +1457 0 obj<>endobj +1458 0 obj<>endobj +1459 0 obj<>endobj +1460 0 obj<>endobj +1461 0 obj<>endobj +1462 0 obj<>endobj +1463 0 obj<>endobj +1464 0 obj<>endobj +1465 0 obj<>endobj +1466 0 obj<>endobj +1467 0 obj<>endobj +1468 0 obj<>endobj +1469 0 obj<>endobj +1470 0 obj<>endobj +1471 0 obj<>endobj +1472 0 obj<>endobj +1473 0 obj<>endobj +1474 0 obj<>endobj +1475 0 obj<>endobj +1476 0 obj<>endobj -1480 0 obj<>/XObject<<>>>>>>endobj -1481 0 obj<>stream +1477 0 obj<>/XObject<<>>>>>>endobj +1478 0 obj<>stream x+ä2T0BCs#c3…ä\.§.}7K#…4K=3cS’¢` g`NÖvôurT(ÊÏJM.QpÉO.ÍMÍ+I,ÉÌÏÓ Éâr á ä«endstream endobj -1482 0 obj<>/XObject<<>>>>/Annots 59 0 R>>endobj -1483 0 obj<>stream -xÍ[ÛrG}÷WLåe“ª=÷ËӖlÙYU%vbqK/y¡(ÊbLr´¼Äößçè0$²ÉVRåâ™3Ý  Ñh4zôÿ'Y’âÿ,iò¤¨“éòI:JñDÿyó#=Iê²Ã¿Ë¤èFM‹ä≃ˤ©œƒË$«²QåÖÔiQZtÚT£,êÔA4LóQçH&íF%ڕ)Q ¨QU[°œþæ¡Q)å5¢¤Á¨µ‘ÜcUj Vu¬b ƒé(£dIŀ(%B4Kç ô.©Kmçà2ik˜Æ8!fÖÁ˜Fz fÚ­Ç`k²§c^&yZ -Ç4MUFք*9Ê€U1¸LºŽÚ)˜k» 1¤’“@ìëX‡Áv9¦ÚXÓD~#10—Á- º’£[ÌDR¶*ñrÙ¥<ÓM‹ÞP·¢aV ¡‘S·4ێulSÀ€Žu,F÷=‹HMÞ.200‘—e9<ºT’MTÖ%»&›H€š(rMFÂò‹Ü©AH“fØHÁb.kÏ: k -Ԏ== ÏBïˆÉy&´­Ç`óšld¬Ã`yq+†@àQç-˜!'†PÎAˆ›ç0¤5ô˜T-iJµ©Ç`ë”fÆX‡Ár¨r¬ÃP&£Øb¬(Seƒã— L™À‰ôÊ9¨Ê(” -³²¦™0Öa´­Øóu˜”a1ÖaR†çMYiÞòÁ¸ƒí†={Œý_Ӟ=[U´®u¬¬*c¦Í…bŸkË0/e3 ØW2° \Cáß8Õ).ç LŽï”&'b°Ø€}SÅüX&¯¢Œ,‡m†ã^çÑ0mi+é1‰D‘ßXŽIE×B’Эí6rYFïI;RW$çåíQµs0ì–ÆñnÛÁ£êÐ µs‚BŒÇ#é1X¤8>³ƒíJ¸Ÿkë0Ü/¥uh¬Ç`ó:9Öa°-[A¥òv@öS¹¶ƒ­i¹Yϼþ‹ª5÷@úpå0è–ß$R–»‚¼ÉÀù쫜ƒä¤ô,2ì«M=ÛÒþäX‡É¾l}më1ج´õlÙ¤ò,4ÀÜXσíÈ"ŽuÖGϘumë1ypFsc¬Ãð}L€²ƒÅn0è™ÂJQÐ&⺛žÀ5”ç  -ې_¤vÂüp`ˆ£¤Ç`KVÅX‡Áb)øA=&óSÆ`=‹§!7Õý¶``ªNdWÎÁ¨Šr¢JhDWÒcUÅXQ%¶E„ë0TI2’²ƒEÜÜ)+Š"UÖ½¸``ŠN4SÎÁ¨¨r¢hh—ÁíaY%yÀ©0Dh[ F®n±\Œs):-Rã„í?}§ƒÅø­kê1X„šA[‡Á"/Í|[‡ÁB'/°Ç°;ÜÒ·õ˜Ü¯Â*4…<‹˜ä¥ò+˜ÖÖc°Hm¼Tb~l䴛r͘ù‡= c*ç ‘Vš‘ƒEjX8–6Ìb„37¬À€Fä 3r¼Cç /1kÚÇËI:Bé1X,ŽÁ¤r ¬/À 8:eÕáM–•"G3Çe` ‡œí”sÒpb¤Ç`«†,§M=ÛQQÂXÎ`râ41@qž92H‰ý‡þ%Òct ßàÆ: ;þ€už™Ó´Z[‰ÓŒTIŽa".ˆÀȉYÁX‡1hF!Ì:ö˜ /CmËŸµîØ/€FeÿG4ã„r -FzL6¢­ÅX'bu1:.·l{2pˆZGÎA„8Š5ÆIŸXYê}´Ìj×gàÐIÎKP8i‡$Q×;eâ"Kà´Q;3Ža!'oö¦ŒÎ¤@(ÔJ(É.årR•† ¬aàBC%¥!6/²š4d` —a}4ÈèM"=†<Ù0€±ƒí(5–ÅöAVå1ù·˜ g¾‚6±©ƒ¢ê8˜#@Í·ÃàÂO‘,ÖÖÎAZV)tÓñ‡czé8ƒäût^³v± 89Yquü[ ÍQ‘(å ”ÃŽœ:Î )N[€µ3HÊe˜>åX´ÕcÿVA“q QÊA †ä…\ê‚ÝÁ 8N”3A \kíX>TWàß*H`ä4¨”ƒ ‹ …NrÄ Ãt£J9 ‚ª¯óo,0™Nè5îÐ i͕)å ‚Cã¶rI -,Ê9Û½kÇBærLãÅÁ¿UÈÀÐù û½ÆBŒBÇBÆvplgÚÎ )À¡r£%µ6ô™#–b?ŠížŸ<}‰D%MÆ7 ÈæQ·oÊd|Í·x<ý~<¹Z̒þ&yÞ¯¶³ÕvóÃøw´ªGR«“Ðì$§fß_œþüì”Þ@’ÐätဇÉ/ëþ÷ÙtËÏQ*»ðü¬Ÿî–ès²÷+b)o)„}›ÿ2QÛUPéy- ¬ž=ýæ‚ãÙdIíxÛ¶ü¦òZ-hd–æÉ $åù:½Úlד058PTLøCuøINÖ>)X`Õå|Ä.4Jóè_?ÎV³õdAqQRaj’ùj³,êvXÈEÑ<2ÕkÖwb6[ç«íº¿ÞMãr©ÚG&óþt5¬ÄÔIz~;¹ÛÎÖôœ78"2ž<,:ÿíßÓ+(rF—L¶==ÁáµËBˆHÎe¹3dµi|>Y]sëtT¶yèq<ÛpB¥Õ:Ðp÷øª+·%ùž¾´0SãªÒÅT[Ä 5¢˜äõÕv2_ÍWo©)Êõj˜ -JQßÆW³™,¯&l”ƒ£)÷'îÁ0+ŽM£´˜Š"Ù¾®Øknæowë ?.{*]Ô^~ÝbLÞÏèXTÎpQÏ`µ¼¿¸žoƒNH®p² s»½ÑŒ FU$<Û,¯FS؁§‰qÜX’›ù"¾­Vù 1ïç•0ø~@÷Dš?™A¯êÅåé˜DG)äQm* u‚D#,·bßÇë<%~U-æ>\Ô1Z¾ÛÉzÆÉÝÎqKšü1™/(¥âiE7æ’!ÏÐuý±ßqœD¬Ílý‡„O\?¤Uà~æÖõ"VÂÁÊOsù96‚Ë®ëŕ‹snv©äý|{KjC¡"Ùn·š8xqº˜#UäÇõ(F'òýKP¡aè0Õ?4Æͺ—œ±¡8Ö<Çeܷ냳×ÿf•©f-ûÀåÍå[~†RÑ/ç«îƒ>.cÁãWcyìw[<Îß¾ýúâiÎOqB°ìv¶Â¶,*1ytX7¸¸‰“ü³ –,pج¼zߐ—·“8ÍUG;ç8ˆ^ªÆ·p2YaêPgýê_±}3‚Ë~ýî?¤ÊÌUèó/D½g*Kiè*f÷Ä{1¬Ës.¦ýG,ps„ó3Ö›|Quù™#è„2à¾J‡{ÁOýô]ÜöMš- -ø“,]@Â5ãÙèS©jÈVâÊûu7Ÿ¾c×BµHÓÍçë~Ã36˜Å‹ÝÕjÆΉÅÛèþñlÝ¿ß¡ 3œ<¥~Q…Qç>Þ-y÷Ûu¿»ãם‹$Ÿìùín~-^ŸÌ¿ð‘ñùË¥¯<ۇǘû ¡‰aël¾™î6›pÐǏ*+‰J'X[š×ĬÆ)aÇ‹ÙW~òŠQ­ ÜÍnÅ'5vƒÒ3Ç2öÛpâÁ—ڃy,º]Ïî=g&ˆdö&γ!§@èÖ¬>96z˜­®ãë¨q·eÜ~>©Ê.z'ÖFՆ%œ\èI_صûQ)+8è•ødÍÅ{lýûñþIgqåTEoé%ÜûÃÞ±Dá»7³e¿•\ -«¯ŠYÖéjÕÃú³ïxA Ë*cºq7YO–³pŵ .Zd_=ãþñ³`ƒœ¿ÓpŽuI=€ xé³iPgÅ×Q!}¸ø¸š²Y˜òâSfi"óM°×AV²WäøŠp0ò©Ï4Éåù« ê~ß!íÙó[À gÓøxrêœIMÃû^½³:¸XÐ9ۅ‚‹©x`O–ýZâ·q{;YqkEú•¬/’ùíûì·èM*ojFu·î·ý´_êŒ vx8ù™N5=Ä"©¼Æ>FqébE–ådŠLMÎB%ÂMö7f)«¨Û“±xè6Í~4y…åMïÒñ(&¥É›Ù¦_ì´l†ºÊÕ¡¬²¾ç)ÜÄ}öë{Œ(è³”ã?' á4f#X5rhDF©‡Îùê¦_/­Üَº&6¸ž`똈ƒavÊâìË× ]>Aß±ûy.ËaµÐo ÷'ÝD:Á·nëà rßYϗwýz;‘c-jz–U¼Â¶ÆKi°ŸŸ^õ;IÙ>âÁ³)*e[I -pË+}Ÿ”î>‰ )Ý1î©zx²9½þªNފb(º×môÂ#ûýÅÏÏxãú\³ê«éúã]\Çøp¯‹ëø>uÚï+ E¯z|h>Ï:_¦äª_ÌD©׬q:nó˜`ÝM6›÷ýúZb*Röêåø†c0…‰Ú8T)}¢†*%KÉÂãû£RËó~¹ ù'Î4t­ÈîºoÜÅqæðÝ÷@µƒüë—jëÁÝìøµ}àÕæKë*ï—tžI=Ÿµ T;È£Æg²Ž¬Äð%£|wƒ&!ؐ.ýtvú MUTS¸W#M(Lʱ:ÏÁÆÑå믞 ˜õ¸‚“ë‘8÷8ÅÏ¥Ò¶/¾„²ÁõÄ^ ºˆO–©“á@©Áì‚Ëî‡ñ%Wõu/^s¾ÂÇ|º•²bÓÛْëÈô4µ?V x3“+ðÍíü°rt¤öpìþæås›øC„˜QçEÊùœ—ê®ßÌ?œN§8•sDÅþi®3tÀÏCÁ$ôÝÿ~̐èÿ«ÛD­a Ê)Go*¢càd¡ÞòyÒþ½·â´¤øĖI¯c°m<}å]Ì!ŽMüT+g¦ -Hœ8l×HÎ胚R|k›µeó‚:ÉZwÍDÑFu^½AŽëO¦ÇÔãbïløæ¨zÈ2Ï`~£R(qîoíÁ´EŸÂ-©›ÍÝl:Ÿ,d‚‹x»]ϯvád0()â€G¶ç½¸³vzÏ综ä)̑‡6Œî@Õ&Ë»pï‰/ï´¸ñÓÙùKê%d»ü~/]æáú_¤jÕ㘚—f^oêßVÜ{Àι ñô%¾zŠá/8Ê ßYòŸÄOÅâ§oÉÁ§n*`%9H“vôeٜ$}1~òë“?Vªendstream -endobj -1484 0 obj<>/XObject<<>>>>/Annots 102 0 R>>endobj -1485 0 obj<>stream -xÕ[ÛrG}÷WLíSöAô܇³/[¾ÄYoE^'RÊûJS”Í„ä8•Ä¿ç » I¹,[–½I•¥Ãþ  ÑèÖïŠ,ÇÿE֕YÕfóõƒ|’ãýççøIÖÖ=þ]gU?)"Xeg\gM>â\g]=™ºv®³¢ªF¤Ç`»é¨ÛªåtªM0d9i"àt\g}1©²lŽulßAÇ:¼ÎJL¦q¬Ç`êÁÚz ¶ï'½cƒ8ÓJlH´Ý0q"W5UÒcª—=8ÖaŠCm;ÖaL©˜B™Æz ¶ª±FŽu˜ÂNG³lÚÞl0Š#6˜¸®Ÿt™qô¤¦®Ä -šglæ ¼¬£öä‹ä\gXA¬·rBy_1RÆ+:Ñz#+"€}’ªû\¼A¼8Ž>ž8ñbãÄpâ)Fz ¶* ¨cÛÒàë0XX~šƒL‰N_whN49×Ù4g¯òEr¢StïHÁÖ2]m*k\·µx`C€ 9(±ËÂÉ9ˆN«1é1ضDïÖ4 Ùa½Új6däÂÊ9È!§œ’âz5LˆñR\/vê -Õ#ß$é1çZY‡ÁÂÕ0[m+Ö“fØ Ö%€Ý:·ŒZ¹`]±Ý´¡r”s±âç gZŒH9ӆêÑnEçUÏØ·“Tç‰CdÏ! ¿(ª3ˆéÔèÓ81 v™Ú‘s²T•5õì”æg¬¬eMp+–Å @&Ä--qE^ÂŒôÝÂ* Ï:Ì)1î[Û0hG¥¦AØ ‘+ò– •ô˜ƒÖœ’±ƒE$Çô• ƒ"ìên] °A#W9U¤¤ÇtJõë0e@16 Z7b¶A½lÐÈר”ôÝÖbÆ: 6¬©²aЊ‘ ©W€ ¹"¯¨^%=¦¤ÜOë0%e2VŒ›—T²À1Œþiœøg€µôOãŒþiœøgjW%­Oô˜rÐ?ë0ØZ¬ÜÚ: it`¬ÃØÄKÊk¬Ç`±ÿŒX‡¡#$~Î5Ê>$“²9@:ˆ)Izf¤Ç§ƒ Ý"i`Ü ý°n#Ç­+ÏJ%CÃ6¤‹¡¡k¹ØPI1¨ó1Öa° ÓÇ: V¶lÇ: õ -×6L¸ a˜°›päúŠí”sCJ’f¤Ç`Z+×ÔcL(¯[¬­Ç´Z’c‹xR{Öa°0‹Q[‡aIðâεõ˜vÆìÎÆõ,ÆÁª«2$t”pXÌP‰¾WÌ ô˜ëJ—s¬ÃTc7f¦§´ ™‡õ,hÄ: æ kÓ¶Aœ²µ˜_ -0q"Ç ý+é1&ŒHau,bth¬Ãœ0÷wc=+ŸcæÊò`l§Ù~X&Nä -ü„–”ô–ÍÙ±ƒEZµ³¶ƒÅ~ -auìT¢±CXø>”¬lð؜»mŠM(NpàÈÉ¡µTÎA Yçԑ’a°rÆB˜„9]ÆEceB”ÉÌ Pâ`f…›‡ÌÍ :E¨é1X˜‰oê1X‰i6¨Ç`±Y¶¾g‡Áb%<„‘$( #À„‰œäú!["ç §ÛqºÚÐcN—Û•c E6žu˜ÆÃD­­Ø6ª¦gpJbê‰+pP-%·¢|ÑmNû´¦ƒÅ}[Ábߖ) 7š§ä0pFB¹Ì}s0¦4ÆIJ“ú,Jî`Fz õ!ŒX‡1W­*×Öc°åtÌCî(KÙ2‚ظ3èŒYÁBƒS×6XY阅³²È…4ÅHiI Ɔn%ÓIÆ+Àº\È6Bg²0SÊA -ÇlÕ8ƒàPN­gâEë8ƒœv¡}:HÁéXÆ'•%ã Âq:«¬ކ³¶ˆ*¿«à‘ ö¡”ƒ¬>3Î —jk:¡;© -³Ê¤R¸‡('֌H·ù]22²¨åñ[2}Eèçýå 8œ#P½SÎ 8l6(A*g*E¾Aè_‚¨¶sÎG¨$¦>'ù±qÁA<7ÁÁhÜ\äzKu2'ªD]ù©ø·ü®ªŒ *+-*2ø–¨RŽ‘9f¡Œ!0-¾nŒ"ª8”bwRÅô{mæ 8ø ëM©AªŸîfœAprÎQ.d}®n`¶>1xAh$¾­”ƒà°Yàd’š9ç$tʇ© rÁ!j"ÅTÎ Ö’â¼’8ÁÁ<Ü\Ÿ?xø ýäÙù¥¤ž9n_º:;¿#|<ÿî|özµÈ†ËìÉ°Ù-6»«¿ŸÿŠVÈ- -¶:aƊf'%›}÷äíìÝn±åw¸Kƒ@'ßeՄ¡I€¿\…ï îtU?\n.‡íz¶[~.Ýw©ÁÅl7{=»Z„Á±†ÁYˆ(08b|Éq ±0+Wa¨Ó÷g?ý(óa:/ŸM¾ÿʖS;©º± …HAí$1žlÐÌæ ¿Ž¤»­ê(ßî­(FVôeüÌk‹— X›û<ŠÆM|o…ÊCé†ÍåòÍõ6 -Ø ðñõ×* -0-ÆkLÙ¯Í/WqÞ%\¡Læün5[ÂcþÚɒ*Qönvuõç°½OB@oº6®Û Žƒ€×Uüh±™oßÃ¥.¤,r™˜ÔMìww³ÈeÇáÏ𩽅«î‡Å.Y% {ÉZ7Ãæd>¬®×öO®›d¯´M~ÈÌT¿ÜkùY÷-Q`%öŽæmýeÌ:)aÑ–©È7K2þ÷TŠ3„o'¬„™A\¬F}œK*™¢åóçA&Tšói´·ó÷ï‚~!è´KvyÉÅÙårsµ›­V­Qªcüù6ôPN9éV`—&ôf·.®ç¶Í܍Û|!¡Ë^¤h¦&ÁM{lðNÝc_ k¬ÐõVV×@Uòìç+z¶ØþwnÔ¯ò´—Ð $R¡NUâIÉým$UÁ9>|¦»=S ‘+ö}òl7ÛH¤ÄÁnª6ýh5l‚Q÷nãtò¢ˆߟdÇl%H+æ:’1l–.î<ÖØX¨7mÏ?]¬_‡åCzɟMJnN_&`gï³$\:cÊ×p…¸¿„7ˆÇìs;¬VQDœð¾úŠMªR|·Rû2æo+–¥¼êx´e$ˆ÷hžA0·qÀÌFAô¦ÔÄ %L6;›­_ËfÜ ¨ÓÆ9“p‚[ÃFs%ñÛõSÛò*¥þfÁ8Ø´w”äì™çqXU@jßzõ`ƒ¢“ú`ŒI(XÚ~övÂ2V·ëÓF{µ˜# Þ½ïFW¤ÕâÅŠŸ"ïéî?7š8a Λ:phêGuð£ -àå=ËÛW_'ëOâµ…&ÊvxP9¾l!ÃÍ}nžÉ¢U´ÑÖIáÏ1ÎÓPÌL‡’e¸:KÒ¸÷ñ³ª%þòŽ?©P¸Ã“Ê ø#¤Ã^“’ªû*ŒQ5Q¶C A֝;²GOÏ$6¸zÁGÈÕNºü+¬䫤êá÷—ö#òÛö7—Ù†ÊÁCÔªM6ýâ\LوíAñð÷ z}µÜ”¿±1*Ñz€}¹]®g[ ѸŽQ71ûbþ¥;Û8oáaû¹:¯ä€îòâÏ"]R…"Áþ¶ôr»Ø.~¿^^-w’£ Xê¦óóbv ¼.ÿJ6‘\+Hw‚w_‹QڗèñlþۛípÒýæëìiÎãŸQ܏å Ӆiì½ÌUõ,›ÂůÖúÌîFǁ±ÝÕ°‰”'{7¨ -gí/}$ÆÈþºÝXÇ<Íß.Ã1 Åw¼"‰9äùöúJJh¨õ[rüh>Çڇb4®í͘åZÿ–›dàØ’"²'«e*h#µÔ*i¶$`ø²È±õpšG5¿õî^…£½¼YJ:Øú:Û\Ï$Ä%L•ì= ê óQYøÈÿ34Ì x·ä:§ŽOpéÝ+)ã%ÿÛ6'PÿɳÕû¿± .kÌúïI~œGšxù‡©¥¢qRâRißM³±›¬ö˜)K¦vpÊoÕÀooȨáb+þÒGͨ¼Qñ‹Va}2¬×Ñ´qÄNûRör; ¼–S$|ßj—Ç|ÿûívØÊWq#¦÷QŸ³ˆ·i›Åëýñ‚Ç\Æd}õv¢>ÒS߀µ–+Ä>óù·‹Õ;Yj”Àu˜Ç,hôÜù\ÜeRëe›ÅîŸÒofú[Ç«Û~Ówk9R£þŠ²©„Tt£pÑ՗¹â¾F)5£ÃÕ!?ÃÃHSÒ·‹áÏd'v§Òÿõðô{éUdV7Íø.>¯c2χ¸£Hg$ñ.¥ZZG5¤Ö‹Ð稻oCõúꔏvq$Í^,v¸X’Œu´‡þ8¼6¢ìsw]¬÷“ù²Cv 1Ó5ÃMÅ¢¸äZç9Z,bžw-æŽôfZ¤¬À¬ãCÙ6΅šGh,4;°„ÊgîZ̹òݧ–LÉ%ï|Àî"™„«øþeïA¼qöŽK§}çþ†³÷(Á8{Ç3±}Žìߑ£-/—áÂd”Iž©gK3³åíH,ÕõÃVˆ©þ~,؄ qžÏó;È[R Œº)ù7+.ŽQ;‡qì_ßt¤rv ¾‚jP±17îS29ò¾«…ä–(Y4 ›ª&Z>¾>“ä8iÜkI;ÙR›Qða½7:…FÆOTÔvñnµœÏB‘Œñ[_ÛsÆ«õky„# Åc–}¹\-Ä<ðø©/¾ÐÝ]#Gè‡Ïð"<¼†›¢ÊÓvxÁÇ?¬ÀûŽ³G§ñ¸ôëb¾Ëžók¼°¸Z!YΫ*;éðt__.©ÅïÏüôà2tõôendstream -endobj -1486 0 obj<>/XObject<<>>>>/Annots 142 0 R>>endobj -1487 0 obj<>stream -xÍ[MsǽëWì!ç@û½8¤R”hÙLY2c2QªR9€$Â&%ûß罞™î^”%J“T%|x;3Ý===ݽ«ÿ>ɳ!þ›gm‘•M6Y<†øEÿç§ïøKÖT#üï"+Gƒ<‚Ûìò‰ƒ‹¬ö8YW -7ÎÁE–Uo Ç`›ÖáEVäÍ t{ ¶èú,plS*?Öah:쳃­ŠAçÆ֍TÖøq‘µ94’ƒ‹l4¢Ê9U‡õ q¤Ç`óÅÕ¡ƒ-;•€‹z ¶Î{"y ¶ÛÌÓÄÃÞºâCʒÜA€¹CäÂþ+ç`rå‚;Äq£–¢*ç $6ÔRIiƒao¨Ç`º°ëpÐÒ/[r¡zÔ`·àÙÅ Ž€j:U†p±ð 9)n‰ñFzœ”ñ¬_3¯8ƒ±A ®„XI &Pä‚Ê9¨)Š#ƒ5kNJ@‰mZì¹±A ‘.L"ÀŠ\dzQ+ç ÒBJz ¶ª¸¤±ƒíò+g°®i¶x @r—ç FzÌEÅð2‡=+Fƒ¤§Ó3r85˜U9qì[„8ãĂE3hé1X˜Ö³Axº9¦'rc_­ ¤‹\Ž3 çRÒc.ÙPZeÒyë\O€-9øÚ(«•c¤¨F\)FŠÄ¨¼G'¡Á8c¤0N"E'¡Á8¡ƒD -#=¦ÉGÊ±ƒEpo=ë0ض…%ÝX‡Gj8Š±ƒ­[lŠ±bÙ -¨o –M\×R^yœƒT•aÏHÁŠ³;Öa°Øjˆ«{LU;ÂX‡©*ϟ±ƒ-Z8ƒ±AU\Þ귕S5r-ŸqÂxRŒsfË뤃-Šm¨Ç4CEam¬Ã`G5Öa(:3(ë1Xܪ~f9%¯8®JMÐ -.²F”QÎAêRqՔ9e3 F\Nç$UâÐhî)ÉÝWSãÄrbX#=‹Ì0wC=¦Œ°c6Öc°-¥5V|¤l™«@&4ˆD8¥FÆ9N+Gz ÏvŽU4vŒQ¥3Pä‚E”sP¼²FFÈI8^™ ͓ÃïŒôlSôY‡ÁvŒCn¬Ã0bVZ‡Ëz ¶jû¬Ã`å괙=† -c=‹ûÑk6­¤"iÓئEnÔÑǔsªâÒ(é1ÍÄ$ˆz V®Ç:LCðë1ؖ©c¦™ÿë0 +ž¯ -yL3•½±ƒE$…m,3­‡E²;qufÄÈÁ°¦râT0G1ÎÁ``X_ÒÀ ƒE”JësIÁÂ(éYa ÇæØ̃…0¿±ÃÀ8«~fÁ"õñlð4D# ÌH‘ ®¥œƒ#TUÒc°ãXRYY²@¼g#)]2q²†q¦% K¦‘9ŠÒaæX‡1¶eõåX‡i¿Nf¬¤ÀŒª gH´ ±1,Ä´C–|áIÙR‡i†EcôM(†Â´8ÒA DLšJz U6·Ž%XA€7rùf¡¤Ç\”ÍÇ: ×$µ±ƒ…­Ï: óâ¢96Œ‹S°`G.vÜ5%=¦HCƒE|Å¢Æ: §«Ç: qЎŽõlÅìX‡Á¢`é±#`Á¨ž ¦ã›†3Eä¢êJz¬¦06˜" ª밚ÂØ`Š86ª®¬ÇÜYV3!ÜPdi -¦Žu¦@èÄöéÌrV¤ŽÇd¨Ài„•Ä‚Ê9ˆ³Ê»ÜÆ9H•ô~è1­ÀËXJ“·¥ @¥Iœ,oœƒ˜©hgá@Áâfk<ë0XĎʳò˜9w¬ÇÜÊmByÌ]aˆp¬ÃtоTÓŒ~6Vܗ¢j\€ÚJ˜Or‰Vtj$·sª¢U:Òc°’ùÛ´aI¤aRë‰*lÉȱÇ´JCöÄBkØWÙ0-•¦_, -‘6h9jìšrrKé·Fz¬[ªC©DˆóhraӔ”€P€9`ä‚Ç)ç ´Kj˜—QŸãPÙ'H»2)3R €í՝”¿Õª‘¡ ç™R2H’à½äo™¼`vh”4y™¸Å˵áß$—  ȇvö(SÊAZ’Õ€rr¯Bq&}2…ü­F&µ§ð)1!î5´\8…p¹ƒŠqq–pA¹q‚“ŒYlj¨bPDHù[…ŒL^𠥤E(ˆãR:«qÁI"oœA*À­QÎApð'‹(€¤Š" -Èߪ@dr=¸ø˜XÒ A„CxVÎ 8Ä_ϤìWØ8ƒ2/x‘§9‡6"¾rÁµ’í(gÇ FÁ½•¸gWOž¾ÀÃìê â¢Îš¶Ê®¦ò‚?O¾¹_ßβ՛ìùj¹-·›?_ýŒQ8n9GÄa'‡}óüf|·­ù ¯6̇I¦ßdí€?aH€—ãÅõX¡«ÒCÏƓ_îïägìO>ŠŸ­ãù’?W؁"ýLyÖ«ÛÛ°*ä-qÄvVŒòòƒ+~xjNòôYд@ ¬ æIÎN´BТNt›´x>YáU›ô=çTHTœi`¶½™‹iÑ}kÔ"ãÛ[ÑÄ=÷~¾½áoˆ<尋ÚýpvzñWþŠ+%o¢Îƒ#ÿ§rEç -®»¢ÎNø|кq†q°±î¸x "j2ÙéÙ¥Xª¾‚#Ž‹'Úg1[\? M4ۑí3¨ó` õ ¦4Pr nS°!OÆlŽº£îïo«{9S̱Óön׃Éjù†køƒql­˜?({‚\ÄëŽ*êO×ïél;yúËúºV- PrC= ÅÑ~Nê±~íí`¹»ƒÏ׳ñvÆ])Ñ÷mâ¾noä'XÍâøÛdµ¸»Ñ/®ŠQ‰ñd²º_neŽjP×1ŒM¹ý‰UÝ]ƒ¿úpw±Úlæ¸"DØ ƒ'ÏÖëÕZ1]¹ˆ†Ø_ê«üR”o×;«Ý½»šmÄêÈUÝ&=|¸5€ofëw!¢À#š"š_%|2!¦ø*î.¢×8{.âԇtž/ßÊþ¡Y”êÁ{1gr;GÀ§YÕ%#í®þ5°j(W‚S±ÙUñÕj;Kžõû~ÂAw—v£¿wŽ‚ž)É8œT}Ä=úêªâ~¢>¶»v%÷ .*Ôm1*½ž/‹_ÄM“ҏsáÖÍqŒ^—”ÆghÈdՐ~îúÁßV󥹺%ž!cë)ûêŠs£‘c9›%‹È-,Š<(¶è §C’¡‘)³Vƒ²9z< Ö9ÉÑ*¡vfÙ»“_ßüF±ø••nvLF‘pwéV:˜¡^϶ñC”oõÛÞÄ,ØÒÍlr¿žoe1´×ê6]Žáò¨7Õ«Bt - ˜ÇÒù¬ÅýÝáC[×Nßùùyð#RµÅéôÝx9™M)8ÊËÔP•¼™¿½_·óՒ,šÙ]}\ù“üÿº¦4pJp‡[ÎYDMï'IÜú+åÆ”õa²nD H©NÚ·ïWï¹g½+Q»J¦Ü;˜tï¹7óP õ’‡5 þ‰ÜC3oisàå»nÆádbs3^ËqGÞÖÕÇ:¹Ñ\EŽœ¯g°P÷É`9×Ac¬Þ/gëÍÍ\z}8YUýeCçÃ÷Ç.Õã'@}õBiøHõBrq:_Ï&ÛÕZr|-¨}Ý£ƒ~×ñoàFS'èÿ÷¶ùŸ\™ü®3f,ًäÌHrRÎêbk:ïꬻ>>NÊà“ Ÿçò ·Øõúœõ6/b4Tۅ‘”*«ãoEß>I¼wï»c¨ÚÕ_®¦ó7¿¥øìóÏÃçí3X[«4±73êß^¡ŠW•‘¨ÎÖcËSqOëÖ,Á]1›-.»ñ:¤í¨mò¸ÁÙá;ÑVš<Ãa*„ãäŠèÆZžu7^3ȼéÙgY-E>0ë»Bx•ò‡Ú堓·Ûõüý̽dg1¾»K¾ -£7ñÎè»þ' ¦ä®^+%ÉÿýŠ`¯òýn½Š/œ´áՎ¤a™—¥º¾ˆúþÇ×W?ri¼ÿÄW÷JÚ>AͽG›X¡þûºî÷¥cew¯èíýÈÅéKIc| ò†¿Á´VÖOY2È&ËBVÝê;l½<ïß_MP9­ñ+\{¾Å½@iõ6ÖÏHû5ßãÜ.·ó‰VVx+­[³gÿC#µ¡+˜J¼õg©¶ÜozvŸúCùp2Þ¿<2[÷’~îßAӓ‘¿¾ñf©¯ÜÙÎ^IÝütßȟ¬§OÓÑ_Nr¾’ëoÓNn™Œï ˆý> .*-zÃëb¤–ª÷^—•ƒ²{\ÑõUƒž.\ñƒ¦*©ó`¥»÷~âb=ÇÙÍz~Ú ÙåýÝÝj-æü£Þ’™ušÝîEŽÑËÏR¶©§q¯õÐ5‹ -mNÚÖåË)»Tù÷]RÞö>¦´7;~¡¿¢øz½£Fös~yƒ™¼Ìw -þ}GÿûÓxnñ9—ºßò¦‰úð_šì8ÂÜ^s‰&uԇݽèÏÖs¼Ä“„ N´úýHºúp1iããÛ_OÓ$þ=§œÉ4 >O=âOÐæcmcÝ6ò½ îa˜¾Îq­ö$T¶×\¸¯ß†6.sµÀò>}0fb©Mµ•|m€¸j/BÅ%’úå¸/=ÛX+ðºø;ƒFÑÒát:M;æÞl¾Š=¼îÒüg-­7‹õÞÛª,|«U¥6ú4µN/^ó¡·Ô ?¾oõ! Vyú_YƏ²Ðåå->悧òS¥ËӗÏN³‹õêg´!²³ÕäžMmͱJ|kVÓ«ÚሏÏçsŠøíՓ¿?ùK¡“lendstream -endobj -1488 0 obj<>/XObject<<>>>>/Annots 187 0 R>>endobj -1489 0 obj<>stream -xÍ[ÛrG}÷WÌc¶jÅ̕3ó´¥H묷b¯V’ËûJQ”Ä„ä(¼È•¿ß Àpè‹IÎnUJ‡gº@£Ñfüû«,Iñÿ,©ó¤'Óå«t”âýÏùÏôK2.[üw™í( `‘\¼rp™TÕhì8—I[*Ç9¸L²¢Վ¬JZ°¨F lÊQ-è fãQëHiZ–‡ç¡¡ƒ7£Âul[.:¶“HyŽ¡g£€æup™Ô5IÄç ‰Û'=[ñ’:T¬¶£R­ÀÀ¬¸,Ka©±’cÚ<%‰Œu올l,/ZµcØ<˜^€.¹,/1­‘“.5,åX‡Á6äKŽux™äEo0VDj - ‰"10‘—¥%|³RÒc,Z­ ØÁÆÊ¢ãÖ\°b`‹.,¢¤Çd‡1¶Ï†zLv ¯2–¬Âu2´(;YähHËO2I¦* s&mà²2#yÙÀ"uÛÍÀŽÎ¶[I¡Î0Öalh–ц*+¶ÅY° e`‹N¹RÒc,ZÖÛ±“HäöŽu˜Ø‡ß³†Á¶ ¬ëŠÀ)yHô@&pಬ!‘”ôÓ‰d¬Ã`ë”5Öa°8"Ø8c& 罙=[ŽÉ[t,«S¶)»ÇSªNä²4‡•Œô"åBºc&e[˜Â±‹²™cE$Ku%)pA%=V‘Œ‘âX¸@šØÄä"c, Ò:VDÓí6½d`".KɍôÓΩ:Ôc°ØFÏÊ¢UfG£d`‹Ž|iœé1¦åpd¬L[ÔæÀ%›6pAv%=&](šÙP67m'%šÕÁÇy@X¶&è8±^ÞЖ(é1XØ]YŽžEK'0\ÑHŽž‘Ë2Ú#e`S±ÑåI60p e …rr~ƒJ9ä7’”ˆé1XdVg ·,=ë0ü¦7VT©3ÞhQ…©8‰6)”sK¦ ÙGIÁ%â”cˑßX’è•V00'ÆTÎALŠð(é1ؒÅ5Öaˆ‚Ÿë0ì—Ү˥(+viH\I$ŠÇFz é¦åyh¨Ç`º!ë1Çe`6 -\ےÿ)ç DÑØHI r Ç: v\@:±Ç`Û¬?³Ã䁔‚ÛXÁÂ9z¬Ã`±g0¢®+†€e)120C.öÁJz,ÊÂÆBوÁ"äBYc&uè–7ÖcR'יH(Áò=ccEˆJiƒ¨ÃÀÔ \–³*é1Fu‘Œu,B=ìd¬Ã`‘É òë0)KY±ÏóZ -àH^C<7Žãy‡º)“Ð8IŠØ6Ðc°8¥g&Y)°ÛXic¨bq¬Ã`qo՞u,îœÊ³ã^ùòRy ¶"g²uyËs„=ÊtË#‡k -¶æÙ¼Tä(ÕóظÀÉÝe¤,ˆÝQËØÀÀ!za&z8ayÜO#=‹\9s,ÇÈ.K!ƒ¢€0-¶!p$+ŒÃˆHÉHcE?Ê&ø´ÐÙ+YZ±dNâ(ç iBCŒô,<;­CE“ÔU?9Ó$p䨘VIÅ@=‹˜—îKë1Ø2%mtf)ƒjm$@EŠœˆ`¤Ç$*Ç:ŒE‘±–Žõ˜Dê³"×Ça¿¥X6‘—Á°E¨¤e¿ C$n ÙPÁbýXY º:eëãè»94Ž_´¯”ôÓâŽÌ<ë°vб²(«5e`šŽÒ↠PñO±(<ÓêPÁ"7€¦Æ: AoìY‡!0z7~]wªÖ(”åÎJ“°a¤Ç$RIÞ¢Cù(f¹T!|öÄ@tž  ?);Ng)Ž”tݱœÎ+‹«VÒ±¢ 6Ÿ?pÒÓ³DÔüh)¼…qü· Œd‰JñjÈôÞä¿uP`¨w–&J9HF#ï6Î í"5 -•c{"1ÖKÿfÙ¹“(L†J-RDñ ,½øoÚôè1¢~º|õãë<¹¼„H 0c]&—×ÜÑÅÏÓ.'W‹YÒÝ$'Ýj;[m7»ü£à: -ÎröÃÉÝä~;[Ó3ØH´Ð,ÆÏpÑý†ì/þr¶ž¯¶óÕ-ýŒ6S3‡G/v÷÷Ýz+Ë`ËeêAÕ–£„3bBÄ,ž”Ò„8ëÅdy5áÕaÒ6SNV×¼:ꊢ ¿ñúARÿìÖfѱ,›0ÃèEþW$%,Šü£ê©Z°¢yÔçònÆúàJ¬¢æo–÷dQ·Dš·AÑË®[lflÏ-ã,ØùE4Ú_¤.YCnçû­,FÙ`+?ÜMXh„ǪŽÎ1gýàÅiSý¢âÿ ©Ñ¥-ŠÀì/þÜ8(GþØW/¨w²žMÔÿq9}Ñ1O×ó‡à¯DÑ g“éo“Û™l;jÂ,ø÷s)•Dñ2PR¼ÔÇG9êf¶ -æ¨\c(ÇsüuC¿£¯›h¦Áåt>¹]u9iè#q ™?g]q©ÐýÞ×bBÞ¬¶ëîz7ÕÝ@¥õ½µ -à]ξüÃq:»ÚÝކKm ëõöJ5>Þ¯;\×K ˆCáx¼7¢ó®PÅ´¡ï`d±äHf -½Ø®;š÷~tÄä ý€¤9+Âp7y˜qø§ƒU½äW×¢82˜ý팋Ù6F|ÜÄ-2&IŽv÷û²1¦þÞv·ñ²;”ÉðÃ4ªÙ*îx"ÑT̉ø¯ýhƒ¶Ÿž¡Hìü¿»+Vy¬tµý{?ÏéûJWƒ]ïvÛû] ŸÑç¦úéº!A2ܲþ~G5ñ'TÝlדÕ-gt¨©ª¬ &p -·£öeSÑQÔyô5­šžO>òöᥢžÈ³n³½˜®ç÷¼a¨^UþD:'äèj‰ð§÷æ+'¨[ÙBœÀA¨jº_?LVÓK -Š2žÙ3W¾ \•éKFS5j3pÈv Êùl²ìÓµ¿a  ¦Õ¶ÄËý%ÊôjKTyˆ«Ü!ù\u)‘ÆU—'ïÏ.HY´{¨l”˜â÷ìS%'ªÖ´ -'ðå4畚”$þñµÖ¼Y‘»Ã‡·¼§š¨ ²›ïÚ˜½D•£ºîÉ/ ŽÊ¯{„ú}÷èˆl€÷¸UþéÄD:¹¼[w»Û;ú°åJo»k®9Ü» )ƒ‰ú íéŝO -𪿁‡ª£ƒFy=_„¦ -ÃZù¢Ù2_É `s„gPèsS69wDßW÷ŠŠƒjñyl£Ô¹¢Þ±q(õ9=̧Rü"·ñ¤Nާᚐ KÝ«Cðöç@+ãõn½½ Ù:Ž±–ú|†ôQØÎn¶³{¶>ïÓLéi$ÿªYT½¢w€%Ìêþe¾œÇ„ñÔ1”¥mE<δ·Ú-¯‚ |vßÝð“øÔIO÷}ìgàÀZæ»CB+&Á9Òâ`:Yñx$”š7±UÙ­2¤ÏSµ«ÐaïHÒ@5Ч³¤GK`'bþ’B꟧±È¹YwKÖ -¦ôö"¨?Ö >ÌW×ÝG6U‰O#ë'6@[ҊGôn°—?á¨ö£Ûñn۝γX}£WÝšÜ÷ý`ŒØÜ£}ÉjûÈw3_È©G£+ÈýþUžý͵ÜxpÉ ¿™ûšäDœÂ%'ïWó›¹ä”½SÿKwۅxŽ`þäj¶ý8›±ŸÓ)Ӏè7m½Bß]ŸÐȑ„؉÷ÚÒNÞ¿{ó?z--ë"ï6!áì5Y ½Xé -^EOÃ¥ -zìµ\&»Ô¦À‹œ^àÄØsŸ+ª‹¦|Íãüurñ Ñè/ýþR_‹¿pŽ4èåhˆÌ}ù¶j¼;p¯;¦×ÝÃü:ÜÆø,$ö7¾ùÈ}ãÀ Ø OÊ {„—“õmx;âÚêï7¢Ý¿ÏÜQÿ²–mH6ÒÁ™Ù˲þÕI%îoˆOlևnýßtü¿K¯=è­Êñ[<ë5 ¦>°[oçÓu·én8, 9m7áùlÙm¥‰â2ÁälÝ¡|ß­™éUð'èÓKB¯ãÓG‡´/o›>UÄçžý`Aï0CÆ]*§èÓ£ý Â+µå{:_ϦÛný‡g|@—Æׄx¡¢é1þ…E¼|U°§û£ ]•^¶pØý}7Y²xÉc9[•á“þ‹óí”K:ôŠêò%ª·žQ¢^”ŠîïÝ°Á{¶@»žÞ—óVØ«“¹ÐÞý̧úbɐù.*Ô]HhP¹>﫯¨Ñgökù]>u–5¿>TˆýŒÒ[ºÕ>›xsJ†À«zK؏‹Î¬€wQÏé•a+³T²uú¸·—³’ƒ;·ç³Ín!y‡‹ÉÉdzk5d1ï¹Ë‹U‡¾qì;å^öæ3o#í">ñ¸™ßîÖæ¥ø¼õ%/U^zì«6¼»ÙÕw¿Ø{½‡Úå@¨?Ÿý¾Cð^ƯjÆ|¿?2µ~B—ËҌÎëjvǾUïÝ÷l+üS/l•\^—tB$­ÀçNi,öþ#ïmðýpY¾è5bœ¨Îì¾WíìÜÑ`ïg%ÜÛû'4ó7N…VïN-=qý -×L?gÇ)ž.PÈ ¾@øƅŸpXÐáÇ×ø,‘¿ë§NMW[ôÖïâøíOǔ²ýŠŒ&9í¦;: -|YÓRX¨ÑÕÁãó2È?/_ý÷Õÿ¬¢—endstream -endobj -1490 0 obj<>/XObject<<>>>>/Annots 232 0 R>>endobj -1491 0 obj<>stream -xÅ[]sSG}çWÜÇ샍æ~IzÚ -°l¨!‹"¯²-À‰e±’ áßï9Ý3Ý}%lLR•ptîÌt÷ôôtÏ ÿ{”ªþMÕ¸®š¾:Y<íð‹ýçõ¿ùKÕ·SüwQ5Óý”Áyuø(ÀEÕuû}à\T“ñ ]€‹*ui¿ #ۏÝF v2²/ª:ÃF ҏøMOE›nE»‰*࢚6ìU>$ jFìÔÈ®e?u )a…v¿Î€ Dúݟ2b°mCI?l1ØéhØ6`êI•¼mÄ`ûñ~ـ1ߣvÐVÕM÷[SG€«“¹,¾‘›:Ϊz¥­ŠïlÀ¦Ž±YÜ¶ÆLÁþÎŒ¶09¦Îـ¡l’)06b°êìƊ)ºi)Í3«ÀLQ8UÝɈ‹)+¦°¶¢z`†:¦«œ,$l#0Øñ’‡¶Ó=æÝYƀ®ŸÊÒ;( ®æàœÄ€Ò¢§Ü Û+@¶>²»®—e#‹Oˆ†£Ä^åK’ƒm&Vç 6÷í°¥¬F…hX‹uŒŒlKÁ¼iÄ°lJ´–µÕAÜQø ™Ëƒ1í8Î¬®€ 3VMcHR¼S€š¹”¸˜;##VBgaЂÁŽÅÜ "á[ˆd¬Š4jĉÔÚ\¤Ìe½ŒØìà¬Ú¡´‹€ÎL+u”±"R O´è¬ÀD*œŠàdĉþ؀9hƒälÄ`k:†³*Òxì.Ú -p‘2—E02bNM¢Hά"¥Àê =·§ì-­4s©N”ÖȈ1(–æ€ ìtL‘¼mÀ q¤ lÄ`Ѷ¶#ZÕÍ`܈ÁNêA[UI‡-V€+›¹lQ##¶IwV'½´Å(“Ê;ÖA›±;+ÀÍ\ÄȈuZG•7e\noÏ$+`¯æ¸ìœÄåÒ.¡}—{aÈ1"B -‘1„ ˜òŒ‡m¦o‹ç[ۈÁ¶cΚ³ƒÅ¬5•¡™ÒÁrv¦€2ɎP8ä–#؂’ Êp]91ؖ+°ƒÅ3h0 Á¼#´ Ê4õ çˆÁö\TÞV|¥™tî  -D®QãDUùÐUÍíR=Ájó†Ú)¢³[‰¾ï´pÒ©siƒKÉj§0¿ÅÏF€wZ8éÅ9‡4;£§7ÔN%ªIx§…“^œsˆNûžóa¤º¦ÁÝG;…Xð˜Ì©¿ :m¸yé—l1õè8¤5˜É|80Ø)3¹Ð6`8Hbôs6bºOcòSªˆ™ÉqËó¶j]lúýnÝÌ%¤þÔȈ©,CY`;fú؀!ðˆÕ ³*¶fwM.Ræ²FFŒA1XÎL‘Xž:+ƒÖÓP˜)°A Ç-nR91ºE˜m«Ý"—¶ “‰v«¡ˆkW!"weÄ1#‹5Yí>mt-À¥Í\Ât'¸¿”nF··Bg¹}p£¥áe¿PÀ†æíÃ9Ù>J;Nì#½¨"Ž9"KÓÀ ¶¯‡lÀ`¥¸ò¶²†ë: -8ª¬á©_81ºEmµ¥5‘c -ÌSguФ%ƒŽ"ÀÍ\Bš×a©òKµƒct ûÀOœ ˜ƒ2 lÀ`'ÜàU‘FZP¨H\¤Ìa„¢ÆˆN[™&#¥Ó$á.ï¯ -¬Ó©žNFL="0X”]`Å­Ó8” -8¨ìQ…K£ LàdÄ4Á¸ ,6êqd;al mF¨BOPG$¤Pƒí˜Á6`ÆeZØYµ°g p gnš°(ôœ‹\€á ÊXÈÁ¿`g‹)‡¸Î V”tVÅEXg$/cÌWßÇa"®qš¸Ffqs¯<éƒ@ÎŒ¶pg¦¸læ+~فNNÂ*ØçoHÊ/¿-ÏÏN>ˇH?Ƽ(⇳‹Ù»ù‘Â×ö™Ùã«Îø—å'‘G©£zšœ]œò3zµ“òá›÷ŸË‡mÓè‡û÷ÿOJ#ýø9 5 Oâ`l’5uƒ ’X¡.’~^oæ ¶‚ žËJˆiÎæ"4œ¡é2qÿ2ߺǬܪœmT'ž ùŸ®æ³ÍÙÅ;*ÖÂí›v8;(7ý7™ðò1²Õ›³‹Ó<ÅH$¦)Ï\5ýûñÁ\lýf`3œdOïa¢‹Ò5jÆÛj×2•§öË£–JãŠÎMq¸ù|.¦ÀþÔôe¡„•…³5ûùùÙ¹ºNÍpgòMëgwb]Ûi¾“A9$}ÆÈu®Zäo1RËùҀ2p øWú6ÍËJɐwY°ê½/GÀÉN\-ßbN(0r¯.M²Ä;!0Õãoš­"óþŒŸò… –0XéÕPß £ÚëålQ4ŽŽ&Yøê7Õ·„µ¾¿‡%zÕö³n{œ"o+´Ô®ó¹—Gâž(],Ba§|{öîr… ¸¼ ‹dœÛª8ä]$¾¹mщ'©;³´²®Sjú‡(Õï§iÙ«v•B 4}é‹Jí†(¥òsSýâރ/uúâ.ËDggúšñw\‚ÈÒi;‰OlwÂêWLZ^rì'ýMæá|sù¿bãhšš, ¶\wk5¯Xpo–«¿Ö8&ñyG^,¾ŒE~·ÈóâÛGHét&¥ZÆÈþ+4|\v2”’žÎW5·FÎkûýmäºÓ78ÐT¥ÚñVØפ>æ@‡ïg«û±¦¦–ÖoÅ~'Žç›Oó¹DI ­e÷o,Íc‰cIaÎï$2#±×ã?~£œ¨È|Ïùäž!ûÎ溼ÏÞd“¢vÃ5²í®º™Gͯ[•W¸«¬v”ð³%\¥gÑ-ñ|v[·é­^:ÊVÇ,ue§¿jÄïõ[JcNzÈÇxrÇùº1!S=CIúî;îÚZº` õT;g¡x¶SË8á8îK{¦×Q,\³x$út¶yÏ™[Áz8[Ïø+²»ÛºæmŒ‰‡6j/GQF ºLµÕ£/g -'PR[:úz¾^ž_–TGq-J}Í­ÏdÝ↽•äUtoÛ¾ûár¥}ântZRÁß/Îþ~üëÙÅ¥¤ë<¦/¾SÁvçZÃÃü¥†¿Â·ý&fG^;æÈy_ÞÏ7'ß/×zèø„ï ‰û²&EþñV²ÀÙÌ^Åéû¸‚¤†þ€ç—Ń¿<Ì÷`S-{ñÞNØ¡ì9‘‹²Óô&y÷ý·ïëu.’#ƒò]Rçô,J}±^c©Ÿ¼7ÉñVãÇ؇äœó=yäÃ<ÂØ-V¾¸Ž­|IJâþÕL¢¾ÈËõ\—m< `ÈÓ ­Ò"¾¢¤ÏÑ´„d„ö&W$×O֗™b”šÇáÛFÙ­ûŽÞKøÂ;ÏB^Î7O^¼:¤mqäiõ•ñóéìD»@ÒÖO&€¤ºÖ‰Ç…ü¶Š»UàU*þzðË«Ã#QqžË‰îý-èÙÞ÷ʦºQÅ0ۊíV‚¦®›,;©‚ -æ¾÷*äWt†ÇÚ¢Ïöènå÷ì¥LžòÛJüu¹üKK9Þß=Œw]£Ÿé"IR “pÂݜò…*ÃÀ`é}ÐçÞsºp¥6Y—˜Vâ2 wSV‰›NhÌ*VˏQùú‰Êñ -ÇÛå  ‰¢oZZ5µLkmi"Êø’[])ùýþ˜j©ýâùÂfXyÐw+‰|…õãÙüÍÀü·Î{#îÄ2qÓ˜/yú9$»ÂDYOì”É7x>n“Oâ”á*ÄÒøõå‡ËՆ -âÔÉV§Í¤ÅÊÊf·pvdx…Dßç'Ó³mzjì´Bå:nýäf -8~½¶•àŒöú1NÆir$”’ÖZÌáýß-gnv²Z®×2q˜î&'™Õúò©‡þŽÀzפã›fÓ´Kí`²ðpr'œâ6”:`kð‚ót™/|bJfêòÎȯª+Vˆ·jƒõ3V¸2^ìäŸü¯doyÀr{›à±1»ÞãM<ö¸8ͺ±˜ãâ`³”ï(¨=~ꉛX[š;…ꛫ6¤õàÈ­ùŽ‡À×XïãEu¾j®ç‰ß ùµAìŠhµk¥W¯ÿóïׯ~—£6” vōüwøÏîtÖGxm:Ô]Z÷g¯~~ñ’2áᗭ;hxSÓÔä4ïh†ÐóG3ÀóåêäªcWÛlYÖfIÇ6ÇZäàož–ä¢ÚäÂ'^-fx° ¯;ÒCœ§gáÕ§.\¤my‚â™!f}…®Ððt¹˜åŠ5ìã½íeÉMÓw7ޔÆÃÉ-¥ñ÷Žiš!AOâ^.7zÊãÿìxy)) >¤³ÓL¤82^VؙûìôüZ7 ŽŠYï¦ÈÍ­áty~ǃ’œÉeÎ.]ՃËóÍÙ½7ç뒐6Ã7ßÎNLþ¾xò3zü9?ÙTϖ'—|Ég³üïmÂ-âx4勸t»=úï£ÿ>eÛÄendstream -endobj -1492 0 obj<>/XObject<<>>>>/Annots 275 0 R>>endobj -1493 0 obj<>stream -xÕ[M“·½ï¯˜CÊa©Á|Ï)µ^EÑVY‘"®¬\G䬖?Ö$W’ýëóº@÷ éd+)“Š]µæ›7h ÑF£þåÂ%)þuI%y•ÌVé$œøçÝßèIR-þ®’¼8–ÉôÂÀUR–“Êp®—“̐ƒÍêImYƒÁVí@p^рòrÒ`@e È@4t%–ß$Òb°y †5lKò••N³ # 2ÐN=׶¤hä ¤.ÛInȲ Á§í¤€Ð†gˆ 5 ñ8¼É=Rò­Ð•o( 6 œs ÔP’{,›ÍCCÚÐs.sÔ0’¬ KÄIÀ£!®I'­,T!ԀÐð&‘ƒ­rL„Šµx•d.…1•Mʊ “U2PM/%Î@šmrIR‰´,º, +]ò~ºd ]zë9‡¢´±2G&E¿¾9åßÄ(Bo8òE!8Ìvc8…à`¥\9r˜JöRvþMyo‰ |ßÂp( -[¬"ôƒ çž@HcçÓKä‚CD2" ¤±Sæeòc41Áâß<…œ C›Q†‘òìÈåé(à9ˆt#$þz†ÍE‡# r.ÀxmÊ>̦CÂ*GEh„¼[F  ‡d9…à°U",Æv -Á!)F¬‰œBJP8žÎ@p99Glg 8œõŒLÁ5”ûj;…8aþ¢B‚ÃbEl‹œBpEfu7R 3NÁUCe*×PhSNá*)P‘0úc1ýýp{ñü%úH“Û;,683¼².’Û9Jðxöì¶û¸ì“Í]r½Yïûõ~÷çÛŸÑ -ÂQ«Kßì2£fϮﻇ}¿¥wháA„ÌŸašÐ3láÉtßÍ>“lz^ â4µ÷§—Sz†Uf­¶ÚÌ—=÷ÔY‚<Ÿœò—×4®ç/:½îy†  d:BEÇJf™ôÍz¿Å¸gûÅfM-‘o#{²[ÏéÊU|6۬]h›×èƒçðªz Ù¦å@31ŸÑl¶|œ÷¬ÂÒ¯•±Î%æéTc?:=A!$0õX!1E\²{œ/öÞõÂãbOû0(„s¬ƒ˜Åê°íg¿ÎdQQáU;í€z  ¦0Ö ç%c5X÷ûnß-?“!r$žôŽÑ4˜K$ì˜P»àeôqY„È•MZ„C‰|fE r¥1¢u_ºÅ2Æ?l•oÐ/wý×û~+G†ÓLBPÒ!‹8Ðòp­¼€>v»^b5»æ™Wº·ÑÁJGx>ð±/»YÇ!9ó³~R:ÚrIr2»³" #Kp²ôïöVñB»·ö³Çíbý‰È0ÒÆûÖ´[}ìxa!U îÑáœâ!ªl¢rÜPÛÖ,/¤wl¸¸¼öÓï#ºM&^‘˺ ´i¾ßy“dH´b¸ßìdÏA5X$¡•Å›+}/jCbô°Ýìû˜M' ê AQ‡Î*ÊâC[Wvr{×Í$¶!qȂgè–ùÉs‡¨ŠÄ6Ðã„úíxe¡¦ó¹»Å¶ÿÚ-—¼âŠSEr5ב_AET_†–ÿ•†7o¯ÿDڡ̘WaÛÝw²{áiÎûõ¯ü&¾=%-DýúÇöm“vkGŠ?|ÚvóÜwLqάƒçyg„®ñç‘dfTÅAE‰cDzG™Ÿ¿ÐhÃUµZƒü!ÀOÁ¥«ð9c¨ùhs‰Î‰òIՆè1mª£¾Œóþù2·hc­' Ž>|óÛד¶¦»zxè×óÅ7©àëw}–jÀ썪Gœ§ø§,L ÁfaªQñ½ÇÔl¡›íª[Ë6Š»n£‹ÝîQ&†2Ü}9©i1ÆñŠ' -Pd¸d¯7«‡n»ØmÖ\ÝAyþ¼Q'ØÕër‰*¾]x8 Ç?ÝÌ>÷t+oó@5V 혁égùoT©1i*6î¡BïúNRO0eð¹Ýâ7ÎÙ¨\ñ,:Œ; :!ùЃy9Î×^wßÈ1Q¢kß¸“o+_ì1‰÷XúY0nŒÿ_脚G::ÀJRÌÂqÝ4ïd¬V*D(¾6!Лy;ýOo){¦A5&ƒ¿ûmI¢ˆÉ›Þn¶¨N.–‹=9q³ìÜg;™®ð•¾XöB‚hs T†žùêíû’M™Ü -<ïo¯Îe9:¢àæÎP‹éõöBœÚ¢âèvæ*|,<¯:Ò{P -ßèA£gK/þ~æAxÿ>òV;{A Üqúרœõ®Ÿ¿’ƒ3nhÒ÷ãbý(Ö±ËwýêãËýåÍ Ùç&”~lçÜoWrÝŸ)QA*6J’®¼qN|z’ê=M›É\Q·ð‹ß¬õdÚÿòˆ­uÑqrkºxÂ?š2]ÝûWyq/ℇ@¯” ámú„.Y“ áǏ¾¾žAIoj›=>–q`±µòë‹·‘â珙ÉPp™7žd®ÿé%W”²ÆÜ †Ë×Ý åòÍîžtØÜ«Áõ(ºêSž¬ul¼n—|!É®F\Wjôfʳ€SX<'&;Á ·>ÖωŸµF_ÝI)1”] ¯|:Œ­-ÿýFœ[R¾rHÀTÏKù ‚2WÜúÍô¹Ì–­¬è¶ÞÕµd‰‹9k|¢ç¸s½:ÙðªÀõ5=ó>]hAâp±-d‘—2Â>wˆ_†ñ[&(VÑ3\Ù֚,/oq`<.8.˜&ܵÉpÔUøŸ©ø.1>‡N¯^ÿp•¼Ýn~†òɋÍìq…¯Îä4Vڻ봥ë9_4ˆ¿Þ^üãâ_ Y1endstream -endobj -1494 0 obj<>/XObject<<>>>>/Annots 321 0 R>>endobj -1495 0 obj<>stream -xÕ[KsÛȾûWà¶vUD/È%%ËñƇ­8+%¾øBóaqM -HÊÙŸ¯»gºeUR’VÞ­²ùáÃ4¦ÓÝ3€ÿý"MÆø?Mª,É'Élób<ãŠþñëÏt%™ þÜ$y3JX'—/Ü$e9š8ÎÁMҌGµãÜ$išŽ2Gz ψϧGz v2é ölӌJ'¹,HT^bÈ&© z*’ë ŽëQáHÁf“>ë0Ø<£)©`ÁVÕ¨ò¬Ã›$çd_ë1Ø|<Ê=ë0±5)kc[²un½9{ Ïñ¦ò,BÃÛÊc°“rÔ¸Yy Ú{[y ¶)zúz¼IŠqӓì1Ø¢êYC\ŸeÑèzæúÀ¥p̨¤ÇäúšLa¬Ã`‹ MÉX‡ÉõY¬Ãäz^:Öc°ÊX‡É¹yO²Ç`«²§‘Ç0rÊFVÉƒÍ -r®±ƒ…‘Æ: !æmå1XY¹6Öa°Mݳ¤¸/Ô} Ì} +UIÉ}­/cçÂõŽå%­\c&çr"2Öar.åë1¹/£¼¤c=Û¤äc†¡ÆUo¬Ç`‘‹à ë1¹ îi”O ªl&ð²y­€Œì ”gðŽÜI¤Ç`S2›cCeŽeϖuŽ§……)@=¹9*Å´èNy¨aˆEŽê±ƒEªýX‡Á¢˜’IvöOKØÐXÁNRRVNJ:“‹ê00u—Bl•”JzLêP™p¬Ã`±² -Ï: ¶&§»±cÂ(VÇzLêŒI•¨SҐ¨S'piž’X%=¦ ×dcÆC¹êë1X¬3¨£ceJEn© d`S -œ,}#=ƔP¶0aê1Xq«±cJ)›²2%®’ÑJ lJ 1¬¤Çx(Z,+c&¦dCc[—ÿÆ:Œ #míÊÊJO)uĕ΀&,+=pae+é1M˜Rb©¬ˆ…7)øE¸ FI!Å buì„\ïX‡ÉT÷ë0؆ó€J¦Ö¶@BU…{Y4_Ckk·¶q\=ÆpãDÛK+Ñ81¬˜Ê‘ƒ­¨=µ¡lÚbBƒi¨i#‡ÜÕ$Æ9¡ƒ‰#=‹%–zÖaš­ì1X6¬c¦õBm,¯—ñ«9_)Ã}xä҂jŸ‘2¹P³kÁÀNÖº‘c¶ûE‡zLvÈISc†.èÓ ‹²â6lt sLàÒ1•×BIñPt"ð·±˔zc1¥ˆÁÖTÇÝX‡iÂMX%{ QXzÖa°%%:7Öa°¨¢žS`7Gˉ—ÁÀL8lË°,”sÊ .bBJzL†`e”倠f‘–‡Ž ˆÈQªJ¹­Ì¤{pb±°Ï:Lö­ ß{ + ¸sÇzL6¢%kc=¦î2±lÁ©[ó²µ`ä°¼&‰q’©Pé1Xl Ï: ¶¤šàÆ:L† m¢±býŠ­ÏÀ¬¸4ã))é1Äb›„‡ë0؆bÝXy(ÂK[’œ=4pTNKìBèN"=†XìŠà6cMá6c%¶¢dôÈ&c†ËQ^*Çz )Í?—m:0×êÑ%F %È8.A1[N-Fz a@ËÖFÔZ1° -=¨©¤D'oeÂúÎØÀÀI8*ç f“òã•d¡*#¹cÃC@…FgF©ã$¡´å°"K3QÆÀ„SÕsB3j4Œ¡Ø¦j ΘÐÀIWg¤Ç4גÄêPå¡PÓXL"b°hÏ1_c‹é׎• s©ˆ¦e`ÎY0#åø¼M!){Æ!)0„¤q’‘Ãö· -{ ç YÀž@¤Ç`1?T´H¥ß—a`ZNÂ5SR"Ú¿ØÀÀQôdX¶t'‘<’¼.:0rH -8;å™cXIûË #e@œƒPÑß ѝDzL桒a,'<ò¼&<&6pA #'6²"VY‹=RI˜ØÀ±Jz¬³UVÄ¢ºjE¦Ò+†#.ˆQÒc«¬ˆEі‘jˆœˆØÀ1Jz¬b•±8CÑ -–20#.ˆQÒc«,‹ÅªRño‘¡”ƒQ¢r,°–ΊÕåß*00"A)£@åX ÎÔKü[F$(å`¨ D -`ÿÐñÿfŠh頔ƒà²ÓQŽ¢X²gHÿV J9*'ù@úÉ#±30´IP o#cHæŽô)zT€à0ÛƸ7W/^¿'WKp(µ8W¬ŠäjίVpyöòjúy½HÚerÑn÷‹í~÷êê7Œ*a#u†e4ìåÅõôf¿èèÊÁ!ó—(O#º†¢¯\N7Ÿ§|ªw¯N·sº–a³Zgal»¿‰´¿nªpõâý»K¾‹b\‡‹³õʦXèS¼êÈ+̕Ο1BóÂ3¢³†øð¿µßX"Z𼈧[º†Ô;NãSÞÓ¼[IóxS»]®¾º8jÆqî¿|±Ltq“I¸ýã´»á‹Õ(­éÍY(§+ô8™O/·ížï‚-ªxœ°]ÌöŸ^ý‰¨…4‹RO> -'†|'š#•ŒÆŽ;_´ì0J£*e£ÿÝ´ waßSÅg²ÿB7Ò›h´Qø%’¨³»ûª<2>0ÿ¹Ø¦š7Á*äz¶*ö…•^nçÉ!Æã3‹˜ºŒV\ív‡ÅŽnÎÝYûízÁnE÷`ʜ4ৗáa´ÑÕà»]t»U»ýôŠUǶV™?Œ:‡:Fêa· Æi´Úw*÷y“ój¨œJÍl^̾ÈBDóÿVƒãàîîÇ{10ø©xŸ·lYô6фƒhÿ²à¸Dü¤MŒó›n…ì ëm¼ȼ[ÁVÑþº‚æí·íº²Y°‹²åö­í¾®¶_جPYÍu*øNú+d‰ITaэuâŠÚ/÷Œ'±šEe?®¶P€H‹ý»“ü…¾tíá†o§ª¼É+þÄóëRÔ+ÅÚꇺöAXüsÇ+÷ÖºŽÖÓýb'é=¡¦£«‹¯ß`oá5Á$f©Ý~:ûÊN÷kqÙµ¾èóë/«Y×îÚ%˦“jԑ7OԟĎ*ÂÀoëŞm€S¦"æºÑÍ·5O?†Árµ©ït%L—a aX¸™îvˆm xô™š/f×ÓíyÞù!A=d  æÓ´ÏN*?̨0®–áÅ©ÆÀÇåGÖßW­;õ‚Zóµ­ät²áCj&²¢~t¼x”ôNç^L%¼QP,íøÙ¢ÓRÙ.Iã^aŒËòGG2]ÀÃkæ%ª–H!-ˁ–§Öð‹õD%š/–ÓڗdŽ¢ÁzÓµûvÖò2ÀÉrókÕ+=R­QL}5·Þ›jÊ×?55G-N?Ñ>xjéM÷^õ¡—×ýD,.¼W#ìþǬ'2é/Ýíj&9YX»¤1 ûHçn®›‰ -Ôn÷ûvÆ¡ê·oáè;uÛ.÷¼ÑƑ"^Ý?tHã%Mâ,£ëúö9Ú0¼9¬Öóhć6ʧìófµv+é,ñÒK·–îìÁ¢‚)9+8\£œv£šØ=Ä›œvù·Õþš½ˆ·ÜëçXⷒºý>òíªÃ±GÛñ¾¿w²;ÜÜ´]ìUÆRÖðxŸÓ)~Ôy\î§Ý>¶¹Èåºé?åÙÝæ³ lõÆSa»7RuxìDìݎÃSë;+hÐdÞ©üɝÞj»ØÏG3l/èØõWÕ–`Ó KêXµaÂ>_c·R,þ™¦K]·¶ÁØޚӑ¬âIɊ£ŸéI߉ÞzpÊ3Ÿ.6RÔp†öˆ&ÁÛÒĵa8f#/ßۆ5Çmد Zr!ìñ­…µXo_8‡Ó;Éx€ëì‰ãû8ÑY;.¼¥÷ÞÇ5+§¥lÐh<í¼Û>A•³Êï„pTڟþÏ‹í¢›Æ Z‰²-{„ÕvÉ}2Öñ ޓæ”;URšþŠÄN­¯ÔÛÅçƒ ú’°^Ü.ÖløÊo-ž2QþJUeq¾Ç-Ó¢ëÚNÔBû„òN•Fé„wgøà§W ‘=úŽ:ßãàï:vþ\÷DW;H„Ýa»¥ÑCFœ:è&ß$”OrÞÂֈŠÓ;®~֘ôÿ0ÝÏ®CËfán‹>-Ôp™YŠà}™]¥O·¿’†ž^LkcÝ]î9Øcöu½’Ccl¸ÿ¸¤ƒæQ O0œ?¡æSX—^ÀôªÀ9Þzmnh¯Ì‰ÇÅåioø´à‹3¼°ö]T8ÊùWxÝ YÐNº†âþ¸+QìýŠ ;e҆bëƎk¸5Á×;åÿòŠê15Ž:•möÙ3Ãþø¤Bálñ9)TÕÏ - _{œTˆ×ÚóòÐ - ßsœTˆG?/…ølxè¡á+“ -ñèB!é(WǞü¤B|BüC($_ôÜ«Ÿ‘=/…ØÆГ· ÷*ÄGC?„B²o¿W!>òy^ -ÉÁê mã³ÊçtNòÝE”òI¾ú*ŸEmÅËo.C•ûª^Á·¡S¸Wnž>uÝëŽ6¸—ûÕZ>˜Àf¡‰ßÎ]OoãÏ¿ºÂ۝¾3Üñw;øz)~uñ˜íÎiÙÁY¯ßÕáóAþxÿ:™¿¾ÇÛJ~‹˜|èÚßp"¼mg‡ ¾9ÄQa8Äÿb.ó<9«Æ }Øw»Z‘óÿzõâ/þ "“Õ endstream -endobj -1496 0 obj<>/XObject<<>>>>>>endobj -1497 0 obj<>stream +1479 0 obj<>/XObject<<>>>>/Annots 59 0 R>>endobj +1480 0 obj<>stream +xÍ[ÛrG}÷WLåeª==WòiK¶l¯ª|'·ô’—EYŒIŽ–_þ~€n4†Co[’•T¥tx¦»4@c&ÿ}ä’ÿº¤Î’¼J¦ËGé Å/úŸ/闤*Føï2ÉGƒÚƒE2~dà2©«gà2q¥”v`E“æå`ˆIërà< I ÄÀ4Œ ɤ£AqEJGT9ÌYÎZÿæaP )å1¢ ¤Åht$yƲTX¬a±’.–§ƒLŒâ’’Q0J€–* Î@è]Д:ÎÀe2¬`šÈ1Ýƌ¤Å`a(¡ÓZ ¶"{Öàe’¥å 7lNÛT:²&TÉhU¬J„Ëd4¢qÊf:Îág,©¤Å$ƒ} k0ØQ†­Ž¬„m"¿D<çà]I‹1-ö")[x¸¥¼Óõ³  i Ä@—c`$-¦ii· k0Ø:‡ k0X¬ng‘êš=]d`Eòœs<ºP’MTT»&›H€š(pµ#aùAž4BH“:,I‹Áb/+Ë g +ԉ-=sËBï€Éy't¬Å`³ŠlYƒÁòጬG·` á91„rBÜ,ƒ!ã@‹IՂ¶T‡Z ¶Jig"k0XU†5Ê8Š-‘er²¬wü‚ATÆs"½rª2JzeüHWT´‘5cKöüÈLÊ°¿DÖ`R†÷MY‹i߲κƒug¶ù_ә-[–t®#k0X9U‘5˜’ Å>3–aVH2 ØW0ˆ๚Âä DT§¸9es줴9ƒE¶C-óã`Dø9²Ò Ç3|Î#ÄÀtHç\I‹I$Šü‘嘔†ÄO+@§ œsôL$)#åpEr^Nhœ>[FŽ³eªü$4Î@ +°¯@¤Å`ÂúÌ vTÀýÌXƒá~)ÃÈZ 6A'à vÈVP©,†Pý”f¬Å`+:nqf>ÿy9Œî'€ôá 8ªa0-?I¤ ,Jvy’A蹚2m®œð[6‘rÂ~°TÒb²½#="k°ØÞ.J{0ì‡g+ªä} ÌDU<'²+g`PE9Qŏó¢+i±ªYQ%ŒÅ1ƒEÖ`r£šŒ¤¬Å`q°àdʊ¢¨ò4så ¢¢ž͔30(ªœ(êÇ9G%wœTDñ§Ù%gô\5DF‹œ¨)èDÎ@Øú뤃Åú8F‘5,|¹3Ö`°(| Jk0XԏV`‹awX܎µ˜Ü¯$×ՙ-‹*ÄJe1Ž/ßJâX‹Á"wZ©ØüDå‹…}jþÀ!èYÎ@2"´8Ðb°¨=rÃRDڊ‡`´¢>"GŽ#r‡ ËÐOBã $i¨F-‹Ãá +€UÔá3ў£2¾Ây¡'YVÊÊ$VÇzI ãg ¤á4I‹Á–5YN‡Z vD·ÞÈrŠ¤:•¶’3¯ZÔ@ „ +®h+ÖÄb°ð=,ÊóÐP‹Á"¥tXƒá™Y'Ž‘pqÑb cEòœAI‹U¤ÈŠˆ~læ(„ʼn-¦ÃBÇ0²²ßœZ}$—¼J"qŽ RRŠœ(£xI‹ÉF”J"ËKº¡¹Ê +Ð%‡ø1B=K²…"Dˆ£X9™×8õ>ºã y«!jÔ0NädN¤žw:žâ2ÎsÚhÎDŽ!ªÝI*m +‘“Ê:Pµ”P’]Àår'd7 .8?ŸdËðŠ™Ü¡d ƒ8Ðs®ZcKèI"-†<Ù0@d ;¢Z'²"-2&™UeõœÃ½"GBOò¢‹`½ÈÂ(Ë¢±"`8,k1°”Œ­3[ —²ÓQ ûk0…tv#˦@&Õh«!Ê°ø¥ò÷­æ5Š–fÉ$åý:>ßl׍ß\KÊ&|_þ%#kå,°êr:`¤Y𯗳ÕlÝ,ègôó«ÜoM2_m¶Íb¡n‡ÃŸçõS½bñê&îÖéj»n/vÓp\Êá“y»jÖbê&=»j®·³5ýŽáp$D8Þ<:ÿn¿Ð#èÅ—L¶-ý‚+ðÈù‘œÊ>òd¨Óð{³ºàÑé f~ÆÉlà Á8†+¸Ç½žÜÉ÷äE 3Þ¨™8ƒž¤Bô“¼=ß6óÕ|õ‘†¢«¬†ñÚ¢[Øóðð4nÊjœM³”Oɇ٦]ì´»ƒöºªþö¿¾ðu?Zá!%Ü¿Ç8îJÙĉ®ñM§%!qâÔÈåŏ^Žæ«Ëv½Œ]¹á`T‡Ͷ9oÄÁ°;Eþ Rˆãv–I}ôU°Ýç¼ßµéµì~ÜßuQè/¾MUŽ»Î~U~º¼n×ÛFî_h=Å;ˤ5>JˆkñŸ·;©tØ>âÁãÙ -_«Ñ¹E²¹ÃŒ¶¯²×”^Ÿí©Ú//>CÕæ£(†Þp5 ^x ߏ_?åsŒwÅZ>_M×ß®Ã9.àÇáïËu›Ø 9ø8ú eOÉ~Yþ÷”\µ«£™(5ãÖ*.rÃ̗óÉu³Ù|i×SQÃÞÉýÜ«—ჅŽv½"eâ›i¶PC3¥dáñáK¡åY»\ú*ÊozûÅîz›ó—s…ÃW´ÕzÅÆ»ZÀÞÝâMa;ûʧÍv€ÿrÍûzÀIÇŸ_tTëÕ“9Gñ6|_Þt¯ BH÷xõrû«“ãw´IÔù{Há^õšP-ÚٔC-‰^ãèrÿgD…ç?¼Ìz]ɐ¬×Qy˜âg҆Þ_BY§‹¾»¦Ô+Añ)Dêd¸Pj0s{˜ã0¾>*ï÷ý`æ;]þµlxeNû"¬£Øôj¶äŽ'=-í½Ëú0“7µ›«y¿É¡ocðÐ üËg6ñYw¨¨³<åzÎJuÝnæ_§SÜÊ9¢â£ÒZ§ë€7CÞ$>Åُíâÿï¥×8¼´C3^™¶Ôƒcàf¡Þr3iì©°í½²ŸoöŽ£·m¸}e£PCÚø—ÔÖg¦HØ8¤kgôÝm)>,uû²YN ¹¡yB^]÷ÔëÔ¸öfzH=~‘i ŸÆ”÷V¥ÐÛOÞ^Á§ð2/›Íõl:o²AC¼Ý®çç;3(`*½äã‚G¶ì\ç­x²ÿß-ßﲂ·0CÞI£žªÏ¿6Ëkÿ~ßVisãÕÉé šÝÎøŽö9>Șû×|øüR»‡Ôì½Þ±zÓÌøàÖv& ‰ ½µN¦×5ÝÍ×ßÆï_‘ˆÞw{š~$Êd¾í€ïEù³,ÄÓŠUø†/~v>3KzŸ•åhãäåu:¢¯¸æ¤èóÉ£÷þn“àéendstream +endobj +1481 0 obj<>/XObject<<>>>>/Annots 102 0 R>>endobj +1482 0 obj<>stream +xÕ[]o[Ç}÷¯¸ÈCá<ˆ¾ß$ûRÈJœº°lÕRà>((Š’˜ðC!©8þ÷=gvwf.I–mÉi 8<<ܽ;³óµ³W¿?)²ÿ/²~™Um6ž?É{9¾ÑÞþÄo²¶âßyV {E³ìô‰ƒó¬É;œƒó¬_÷nœƒó¬¨ªé1Øþ ;mÍåT †`ÚG +àrÄÀR®d#˲×ê@60rE1ìÕY«¤Ç\mƒë0WÛöJdž‡æœ0­V€=4rœ¶ÊZ%e`3älq`:0qEއŒôë‘}s¬Ã`‡}ÈâX‡çY‰Å4ŽõlC=ØXÁ‡½¡cƒ8ƒJŒH¶©`âD®(j>TI©^ÎàX‡)·Ø±cIÅÊ4Öc°U=r¬ÃvÐYUÕòAíPŒ°)É  8γíÔ8±ÜB„сƒ­+jPÙ Á¦5óm˜#ìÞÈ0³© 6l`ä +ì7¤R’îÓ}ü˵Â:à8ú\¨üœƒó æù•ssæ <ÛH>¯æ"`Có €s +ÕÖâ sjò8F¤c2NBPâ‚é1SPcÛÒ;ë0X¸iZƒ,‰ÖQ7…hNÌ!rÂ:rÎ*?$ç µ#*PÒc°µ,WY1ȪgT Ï`ŒôÛÏÂÉ9ˆI«.é1ض„þmhxdY‡ý¢Ô쑑 ÏPÎA>rÀõ()ÆZüÔXà¤6W--D~IÒc®µî²ƒE\Àju,­«‚kj‚ €ÓŠ±%NÌÉ8ÅёAeŽÃ‡ç¢êÀqr¥E‡ô˜+e°i=FTBŠªë1غìÌì1X‰œ6³Çpi MÆz ¶Î;3‹þ!™XƒÂ˜þ"¦œƒIÊýÅqAaÊ9 %|¯RÒc°Èª}Ï: ¶fùàÆ: 9Úµ™¦îٍõ,âC‡u˜ÚeIccœªº£ç € +tK’\o¤Ç§O£“yD÷ CUE¯1!›6r!ðփ*ˆ ÀF.TÒc¬*ÂzŒulôáX‡ÁJHu¬Ã4íš +ԙ‘N4úUlÁ‘ƒ;aœr⑒ñôlËXíX‡± œaÐXi+bIúXÁÂÂj?Öa°Cñqë0,)¯hßÊzL;cöu¬Ã`ñ؇Ž•ÐËÇi}•(¡7qEÁ¼m¤ÇÜWºœc¦û]Öaªq›°±ƒÅuX‡Áö‡°6ÄÁ—šIø‹:3q"WÀ˜jH±`D"«C=‹X”{Öa.˜§õ¬”0Žu˜;ˊÓØ NëÎ¥'r¬"¡%%=Ƃ‘â!Ž±ƒEم½3Öa°}V4Žuì€ÑDZCXø>”¬3‹Ç–M8Hˆ @=6qr2ÎA<y:’Y8Ðã D5Â$ÌåÒŒ BöÒR +°EbµØYþœƒ˜T"œ‘s¹²3:Ôc.ˆIÕƆ•¡Þ` ŠLb)ç &E\‚”JzÌå²nu¬Ã\.ƒ¬c‹ì =Ø̃…ix6ˤ3a˜0‘“â°TÎA.·Ï)é1—ËÈåX‡ÁbŸ`*6ÖaZgNŸQ68[žÃ ãá»Àå†P9n!Œ^I1m.£¬Ç`±@?Öc°xœMÇʒ(s²¬!]RâÂŒô8-ÉØ°¤46DXÇJ„UåQ+šÌÅôK‡1ó°@ìpcf*b-`¬ÇLET…cY¹ð¬¯Î€šKâŠ>³£‘Ó +YgyÖ0Œ¬œžÂ‰=‹ØR»±ƒÅÌP…¬PÆ:„õ3S؄ÁÂgüš=¦*XvÙ̬­YØÑq9 Ž>ÔA8ãºqÂ\˜7suw %ç ô—Ë>è=‹*¶qC= )ýăE= ýÙÌC»¨I<ë1X)m¬Ç`¥aâX‡Ã¾%}¦}K˜ûVª¶EÁƒÅj½Š=F£žê×ì1XX“g%²ÀÔÒ<>UÂcâB…o¤ÇP#–¿‘ydÁ²_¥k<lÚȅBÝÈ°9]Äød#'ÙÅ8i¬Œô˜ѧÙË<œÖã`0&ca cÛ™âXÁnÍì1XégÙ̃EDŦês%Ì¢= 5°|æ3%æF¦ÈKx”RRNCŒ3îÚqÁ!×µŽ3Hù¹¥:§ƒ”žVdœAp&nÒØy Ñq"øÀõ]ä³ +™ (¥„èò 3ã Rpvf3çÒq©&<'fÚòçÑJå3)Nél(cÓ!°ô3¥‡p†»NÎ ‡`†å ‚C[̏3ýK ã‡ì9´9'‡KgrkqŒÆ­ÅAî7KVST‰£™ñ峪22¸Í@Ÿ¿KP„žÓ£2†À0ð£ˆ*f¯K)©b:¼qÁÁOйOËpê§»gœ4 ”GߔE…x³|Á¸õ‘ ά”ƒ˜MÇ6ü0؈BpRNØ8ƒ\$éƇÊF&V sÄ~Bp4ˆç 8ÈåÖ"•¡'ÂÉg.2¸•AÉÉ_‘1„eHÎUÊAp0œ"Ò0Áጋ:U9ƒàОƑF9ƒàP… ˜WÎ DChrÏ{~öäÙ ”çyvv)GÔ¼ÉÚ~]È=%¾?=Ï&Ùò2;Z.6“ÅfýýÙ¯…¤QpÔO¶vPrØÓ£ëÑÍf²âoXDÀ$O³ªÇ¯0$ÀŸ×á7©ýj¿œ..—«ùh3].øcD«a? ¸mFç£õ$<åcx8¶tPàáÈb%Ÿcèò(Μþüv:»˜.®âªÒ÷½oý¿²åŠНØ¡Üáh5b‚¬xª:*ms-:ûÃ2~ç•Å;#l¨ýQåÂѤ·¤ ¶à7¦u9½º]EqÝVƽ{Ô%w]óªwöæçu\w O(“5ßÌFS8̟î1M’(»­× q$¤ª¦ßÆ}[Šß ”‹*~5YŒWàQ2 6¹LLš&Nûí¯³Ée_Œ’Å–Üñ¬fGôŸ&›d•ìÿ'‡[,ãåìv¾à\päºIöJÛä—,—UðËÕr._"r}Ô²fbïÞÖcÖIˆŠNúÈ7K2ž`/ιj¦’|7ì?ǯDÄ!õǛÙíÕTTž`²ƒ®±=Šâ¡I×Ý^àw¶÷/8ÔñNàD¹#ÂÏëÑU°\‡~û bû\Š >‘⨇“ +©ìåË`qx=@ëìÃMf8觨qIet¢Æt±ÞŒf3K¥hSÔ1;Ø +¾å§r(;È®)vń^lVˋ۱Õ_'¨=¨U.R4“à®(¤ -€^/çíءەì(z)UŠg(¶vvôt²ú#–Uhuç)ÓÓ $0°à-³ÇKóUÉ5>{¡¥ë@—/ɃýZÄ<݌’ÇÐU¨MΖ‹`ÔCWÖ8yq?ždûl%H{@síÈâË +?,çHûT ÊuËǓùyØ>oy‘’…IÉÒáaÒÙ>q¶¾KÒá`EgLÅt݋U»máâñh°ZÎfQDt¾ùŽõªJ|¯lË´›ç>U,;¨ãі«Š·Ôú@0æn–}½+…òMCÐéh~.¥*·¢NeÍH ڳV²â·ê§8®äU:—á—â:¼mšå—§zÂCñ§á*ù?¡ƒÂN¯G!ºÚ([OÆ8 l>p ;3›ü1™ýò=¿G£îÇjøÞª®j±Ž +^êÒÏ]škc*Ž÷“57’H€÷.«6Õø¯ÏäÉp5Sp¬ûñ…¿ï¦‹ò7.ý<­OVÓùh”Röê4¥Y/U¥ÛÖuJ^"¶Ÿ«­¤ÞJ¬.藸Zuç“í ²š¬&¿ßN×ӍDyôVÊa*]ÞNFz.Gñ–éúÒ:?ï¿Aºƒ¢p…?N¢Û=»Z-oC.kþJ5e”WĝMÙ ã»çm3Æ} 3xÜë±Æ쮓ëºvWÃ&Rpù¼mùø¨*Wq¡æÏ3è*oï۝-”ãÑøzjžÓµu¶º]Ëé‘Æ"ÿáxŒ½m0Üۛ1Çà†f·ugþµœ.RãÉGÙ£Ù4µÒpzÔM¶YÒçQË[Í¿o?œæÑÞÉï]÷Uáü$ï4u,%Um¾9s«Ë÷É+¬y=üóÙñ2(ɉî%Æ=\7|ÚAÁ—!;ym_s3AÚ%ÃÁ¦Ö §—h¡­B#jýwΊwc Ép}õz²A_êóNÅðjyµ\ˆÕ¿öy¾·E%ZßÛÂí¦®/îÔõô}mr+΀怪áír4OwRW#„žýpÈQ'é„ÉB÷oéÔ¡ØãßLt¶w¸cÔoŽ_¾þïћ×goß¼êmÂ-Œ¼6“’LvÕu¢î2ã×gbñxSLüžNó7™ÀWuVQãŐtþtko +ÎèzU0Om¤Þu’ñ0ßÿ¹|ω|¹§%¨ùñáXB&nò¬8ÞÓ'fŽqÉKxP +FƒóÁ Hc¦»Wñڢ⡡ÆwºÉ̶Ÿu‚>êLNƬ§uŸL͝ê;µ«¤‰×˜Íímq¸¾æUøŽ‘6YݸFSÐ;dºv]Áÿ£Cp¯{Æ«pÛö>G º‡`¼!·-ÂÞJàwu¦—±ìékÄâð†z*m2g*{§õBíè*JA÷Uԋ\¤€àšå_¡üO‘%ê¦äŸ'¹JíìvE-8h=—],C‘‡¿3/ÛQÍ;$GÜ@é-\BÕv‰bAbš€šm§á< Õh³ÒVº»Z'ß] zxýj×K“ÀŸúߦ暶ÏGTÌnr}w=YˆhÚk~›JÞÇû5–÷íîÉG1⚤‹Éäbr!òàu =U|êÚ¿èwQð­Ûäºmw9 +…/Þç·m³ðêûBçÒèã^ê¦ïXˆË ¾©pŸÒt¥jËb…'…c#BŽuj¥~®&“õಡëV;Ëý>E‹ðaaç@±ž„ Œ{\õ™ÝzlGËû÷çy’®yÌÓI²5Ô̝àƒÜ,ÖæːÏTÔjrƒcë(ôš¿õ}™}螟Ëk4»uO³b(z†ÅÝï4ñ¸Â··²töùߎ\„þ¡«Ñ7×10¡-©Ý¼°mr率k Lø³mk¼úáð$„%lÑß|¢w­<{¿q/ù! âñb"ߕ짇ÇÏًùu2Þ oq—nÙFþ&¤B W¢ðóé”rýxöäßOþêt¹¾endstream +endobj +1483 0 obj<>/XObject<<>>>>/Annots 146 0 R>>endobj +1484 0 obj<>stream +xÍ[ËvGÝû+z™YHf¿»sæø1žhŽãdbe2[Š¢-Æ"[á#Nþ~.PUÀm’²Èt’œ“èöíz…B¨æϏòl‚ó¬-²²ÉfËG“ó žØ¾ÿ—<ɚªÇ—YٟçÜf¯\fõdÄ\f]}^P;‚ˬoÏ;â.³|ÒØè2 c°ådԔ1ØFæf®m /³"·-u ²F‡¥8¯³F´$ˆé62¦q1d^ʐF2‹~*f ƒíëÑ Œeºù¨gÆ`«ú¼¡žƒ0E‡I.LäÂì#hÂ…‰-£0Îa„q–° cl&¶-ªVÔdlfÒãaF ¹¾4Ž „)deÔNkÈ[¤N°N×MÎËÌ9‚ètR¢½“ŒÁ6"‡³aÈN,$ÊQ+ð!#×UxÅ9‚2äD†´†ŒÁV• é,a°]>bk»BL¾íð¿ZLˆ æ j$c´9ä¬åa’SË¹¶’^#¨N!'N!A X4ç-‘ŒÁ™ Ó©J7ŸZO'r]'+m f¹Þ2ÉX†ldzƆ!áœÜ¸ø‘ƒ5õYmœxÚ6%ë¡®5iFJOëÁèiSO›úT×êAÈ žÖIÆ¢ò^ä×¹Étƒ­TåÎÛ¶¢Ig ‹/¨Å(e ¶neQŒUÍV½,F´­L³‰ëZ¼âAU\¿“ŒÁª±K,–ºâ¶„EÔ¶Gm ·ÇmÅí% ¶ha Þ6ˆ +]™Û«¸¨‘Ó%vŽ ˆ*Öä$c°•N׺e,”8¨-aFLgÃtÙÒieøt#׊c¨Œ#㕍íAE ÅIÆ`KqÅÄ WÝÚ ŒÁör.K‚Nt•¬-c°8ë¹gÙÂU)Œ*’*Ð=ã꥙qÑþ ²©}ª­¤v +¤O¡J¬¸Åf¥#qµŒíA ‡Þj"ƒ…wê˜% ¶3jKXLºÄzú°ŒÁâœGÔ©³— 3ÛØùΪ}•m®š­;‘[´$ˆ“C´á\h‡7Ôch;Þ.rphgAQ‚lC'ƒÅ6‚Š¬)c°ê!ˆ%, +”-H,a±®bÔ3c°M. +´qõ©dP}S…%,Šo$–0Xœ#–0&<‘(Ðۆ)aÁÌ4 >¥ÈÅ)Ƀb hCúÑ –)‰ët6 Z‡(>èA¹¼_UÉÝÂ=—ĆnñЌ·PàÝF.G~ƒU3’1ºÅž`6t‹óDÌ7ÌVw¹Ë ÝÉXTTŒØ°+ìjl¢Û@tvEäàÄÑ«qÑ©¦dN2‹l–mMƒÕèœXÂb(¢GgƒÅÂ`½­gÆ`±`£¶„Áê©Dm cÏ °Äž±žƒEOØçΖx_Žb /³ª\ÍYÆ`q¤ŒzV#ÐLƒ._žÈiðUGP–'Ã7’1XD,XYg ƒí+±ng C‰y!j2–1زË,œå¨-a°È °xÞ3a¨áLÊXÆ`±¥X"Æ`5U£¶„±¥ÄˆÎê¶Ëõ ˆÛ.Ûv‰ žÈIƲrüK,ê -³„Á"®Ê™%, $‡õLXHLgƒ…G,˜% EÁÝóœƒ*:˜c“¼¢SO«)@L V)É,*ÖYÂ`µøD,aV6<±„!R$k=3Uȱ@,a°°ÕžY¢(qCԖ0X¨|Ô3a±FU£ÍŠ1ØvKöžƒ’›­*p{‹\Cm`9ò¦Œ¡($9%³„ÁÂ=`Âޖ0ØN4b CXÌ°"–1XLKo=ëñ"‘‚/˜ÿJ\8¥œ”tHü”¥CH;Ý݉ÓüÇ9‚Ø®¨V;Qõ9„•Z’‘ŒE}%{SÆ¢ )’K*@…‡e º±„E}â}¼gÆ°•B|¢³ŒÁ"`à9Õ#ВíªGG®ÀU¹^ÂRçBÔ\ª6N25II•XÂ`µ¸C,aQ„¸gƒm¥nO,aQ“¤ZĆ"Pÿ‚0a‹šäì&–0X$mP¢·•óGžå ú·©02Xÿ<¼¥vf)¬VÖÆQÐlã”(6Bp(EÄa¥C‚à  nç,¾¤>‚Ãà=q¡O mšÁÁÓxjUj¥Ñ¨ôoSHdԆŒq„ih±É(‚àचÌ8 +9’–¡$ôÑ¿m¨ÈhçÆ8JC†Š­$7¦ ¢\2n-d`Õ¾CєdxÆ©·†Ï/¥ÎZÿ–VŽÐ¡æMF™ÅÓ§Â5Ù«[‡‘‘š-ÊJòšÎÐ!:ÔèÀ8U¢Rü(»]Z…hRÌPs¹D‘dçª)ˆ´Œsg$¢NãBzº÷ôòÑã f—o4àή­²Ëk½¿ÄãÙW—Ó«Ûy6¼Éž «í|µÝüíò'´‚“È¥Õ™„±hvVH³¯žÝLï¶óµ¼#ÇtrýU֝Ë#4 ðõty5՗bU饩ö ¦.úø¢¾‹H¯¿ZLƒÖàŸêödê 9CÉJ(þJø~~ýõt«Šü3”Pî+áÙ°¼[Üê’ÃhÛ¾]ˆÔqYOlÉë>®k×ñ²Vû½žoww¢`\ÍtfÖ¿ ;µH$c}ž6ìãùvöøÝúª>Ÿ «7ÒÁà$y‚Mçsóu+38S?Ú¾õ¾ˆÏÖóéV×LRØ´¿ŽíÜ–w½#¶9җ¸§³Ù°[C¬Îë:ºÉÏ-Óú3q÷d ΊÝíwÃf³À‘ »î~?¸±ùz=¬ÕùÈZQó”T’'Ÿ°y6ûkw9ߨ֥Pcö¨unæë_Âq"÷¸E2ڍÙ7N$|¤ª8¥`÷ö]wÁ`Å˳Ìí1™ãYƒp׎Ñ÷‹íô€=éçÏfy5»]àÔgŠ)éÞiœ0 5 5~¢¾¶á„%þ5¼å¾Z‚,Fu0Td ¢ú°”¢^]VºÒ¨å%÷šÅ…œ2mè«â¼ˆ ±N?%ÚªSä±/õqÝËl(¸*¹š ÜÜ7õ‹•›:š+é!™ ûêR¡`bÒs,=þ:ºQü„FÖfžA˜öŠ®9¹? Ú9“*65©å Ö:>ÙéJCJ\x5l×ÃûQ¢NgªAV%ãƒ!¨+¼‹OóE±F§q¦wÀ#¡b«o~“µÀŒ}Ñ:[”j']:Š·7ñ!Ô`ñ×Õ|m8”ÖŽííMˆ G§Çf>Û­[ i™GÜ—á;ÄÚi+…#åò׺M~ZO4E¹ »œ‹‹‹°ypz˜.¾½Û.†ÕôVf(iIž²2 Ðowë©ð¢€0é£\ÜämÞ2!n,Ýj»®w³4Ýú eƒP–¦T0ˏ °]y bJö.¥¿•• é$*¾m¿y­/£ˆ‘Þ†· Ž°´i³Õ|û~X¿ »Ù§yó~|x¸CÁÓÏ«Üf?¡.äڂ¶º\´¨Š”?y;_]§êBŠoþàRœ Yè Ÿåí‰ü´‰ñjºÔ ñæ$Oïç›ávgvŒ‚™Åß¡‚/‘<|S% ¾i«w·[‡>Qf77öÃjñë㗋ÕîW±©„™€ ÜꩀâSߝ$¼ê(P«;ÐGXØ2ۚ Þ ›P‚By鯱¶QԃæVt4ÿµ,à/žââë´~ÿƒÜÄ,W.tÇ{ +Y€îªÑäEù6õ:žàtdœ:b- uà +ðâá´W› ÜÖìƦ.— ’Ö“Æ¥t<ÖxÐ÷‡·¿Zm\<¥-ÅÚiNÞ~· EÂQ•Eüw¬–¢–”¢Ò,ž ôðÑÀ±_<Òù29oË;†&$¯jÉ{›1zXPµÐPi¸ŒUQÜ §bXöj¾}zñ­žoœ§fG½è³é,t!¹|÷¥,¡Ñôs¹bc£Eiø“d|ùÍ×ß¾¾TG^úM¬"õ7ߺw¤ç6Fáøp_²èEhõL‰Ží¤!,^92ÒzÔæáW æý ôü•. çB/‡á]¨{"wþ³\MÒUæˆÇ ÅLùõ„„AùFÙ6‰ƒ‹ÎþKm˜$ÿ? +#Ÿ-ŒM-¬‹¹Ï¯‡÷²„£tïj\6ú­‘“x³[inÂ]*seǒâ›Ø5× ·ƒFÖ|]Ïïn‡rMw=±zŠk8/6=H$_‡Û誔;Þ+Ê. ˆb’ï. Ðáðún\ŠhCÂT!Æd§LÃôù;ˆ{3àAóIU2*\Ž9¬<|¢’S&ªQ-2ƒÞnÃLdÉ­­"sì*l3Ÿ/o盰ø¸Û5³_¤T*$¹øF½Ìï9ê¢Kùkl—ôÀ¹ÿ°ÑùÂ]ú`¿CÁGjUGŽÿP›¹¦;\K¬¶‹™'î¸C·;AªqÃ5ž[ˆVK¸Ɨ#ûŠ9<õ¾™¾ ù —YŽ¯äAnã¾%ƲìfЫ$¤Ev¬`Sëfåòßô¯ÅSµŒ{Ýڑ¿£æÊü 1Â1`R¸×’LØøxȬøõ©¹L-Ÿn0HR?gQÅÌF +øì–ÂŽ¹%ˆ=»…ÏV*Oúˆ:¿ô£¶#£z~üû õœà,¨žóë‹ÿIO£ù»ùz¹À=\pLÝÃ=]„üX¾°³è*ž.øŽ­JY|Æñ=—~¢wÁw:v9ðd6‹þ?Ãp 壮¦åAdã~–½\Ä_ çøœä\Šµûu‰lÝòý¢Ïó÷éhÇÕ¹U<Ž«3Ômߦ—Q£7HºÆÏâ½æé:š˜ÙÙñÓöØÝïŸ}¿×XLo‡·:ô]VŸ^IZ;“&¬«½ÊÒ±ØèHó T*–7Š¡,N盒{% ö‰3ÈóTé‘KRÇÝÓæf+UøÒùd•†¨®.–½ ¢8õ¯æeî3®£ÊÞ¯æëÍÍâN$EŠ^Õ±~õ¥=ʹ2”Â¥:Ìö°+ÿ>ñ·D|ž^ãs¤ÙvXk°‹.ÛGû[‰ïç<$Ž+´5­†>8Â9‡{ŸƒCóEJœˆY)Ä}kÚïæMŽxʧIüšn>‰<‡áÓóÑBp4|(TY~)ƚI² ›ã~ª1\/Þü–ü3–&EÙñýöƒÄ'õ“q64žòÃQ«•­Ç/ðýxø ?’ës|ʊÏ2õ²ÿõ“ož>ɾ[?aeχÙn‰ÝtdçuwÞâ:|?¸X,dSÿóòÑý*‚á×endstream +endobj +1485 0 obj<>/XObject<<>>>>/Annots 189 0 R>>endobj +1486 0 obj<>stream +xÍ[ÛrÇ }×WÌCœªp=÷ËSŠ­D)Kňt)U©< —Krmî.³)þûÝfv)ɒ–vRåâÙ3Ý  43úï³,Iñÿ,iò¤¨“éâY:Iñ‹þçíß藤.;üw‘Ý$ à>¹xæà"©ªIí8I[O*Ç9¸H²2›äŽôlY‡Á¶ù¤ñc^$yÞ –õlÙ Y‡Á¶Ù¤t3{ ;äé¤u¬Ç`Ëz sQ“ ‹ +C`¦V™ÐA¨“¶´(?I¤Ç`‹””5Öa°X´ó¬Ãd¨ë0”Í:Ú;Ùc2T;d۔CÖa2{…Î,¦Ès ‰¦``¦\P]IÕƊ)âXQÝX‡ÕƊ)ÂØ º²CÙ¢¡Ý3Öa2EMÛg¬Ã0EÖÐö)KqUuä)à(®h\EŽÉ8¡KFNe¤Ç`Ëvv¬Ã`ëÒ:Öa肙½H“ŠÁº“ÈÇmfÉ%†RyL–(aËSµ& #@&r‡qBÕ´›Žô,¼³s¬,Yw®[2pY–Ò´J†ì‘…`_eeÚª6ׯØ´k) Œs¶”=Ez¬[j¬li˜7OyӔeDà˜20 œxœr.’®¢VÎA²zAæQÒc°UF.d¬Ãp!΄Æz 6oc=[W´ :³Ç`î^*á~iJÆ×±ƒå<æXJìâڜ“miಌÎ)y’É’ò~àpdg@œƒ°’ T’ö¬l8… +"T€îYäx“Œs{Fçžqb½¢… F²Ó–5IÂO€j9Ê<†ŸdiÈ4%öTM#À.CB„8Œ˜$ӔȫtX²-ç DÍK„­‘ƒ­©ª0¶âi1„™‡M¸,ki ’cÚª Eu˜¥‚ñ‹Oû±äÓƒ-) ÙX8£*$ +ÌÀ\–S •JzLVb‘k˜Ô¡uc‹$Z{ÖaR‡7Ngö,ÉKÅêÙ6¨#@Չ\†Ò*…oӓDz ‘p„Užul›Y‡I¾ífv#Ò:Çz ¶"‡´±ƒm(ã8ÖaÊ)96ÑX1EK™3š‚™"pYFE[¡¤ÇPɨö¬Ã`ëi΍u˜LAg°±æECŽÂ\‰Äjäz ?Hœƒ˜ÉΓƒE¤`I*VÀ䐳BàèT…é•ôÓÂ]°¨±ƒÅQàÇÊ¢ˆ4 ª‚-8I&FzLº4¤‹õlK—%Ç:LAG±"~´À``".KKdØBI±h9bÛÐÑoceQTýæ‚ lÑÀ…E”ô˜ì@oa¬Ãd:Œ'KÝ5¨`@‹bÿðhàhHk$åKçn*mäèêX†'yVØt¶Ý98)ôŠ v €õ˜G† 5–m›×R؋´ lÑÀ‰#˓DzŒEqÍQËÐ<Ì:L"‘Û;Öab¿g ƒE•ufá©Î30'G¡‘cÚ"#‘t¨Ç`ªÏë0X„6ÎÆ:L¦Ôl¬Ç`q»k+ê 8Ò"g`ê.C^†•”ô"áæZyÖaR¶£Ý±±‹²™cE¤\Jq &Rà‚Jz¬"+"űpx©±c,ÎnØPY)+\h00‘—¥ì‡JzŒiQYBSc‹mô¬,Š[s]ÎÀ ùN +ƒž$ÒcLËw*cyÚ¬•2œÍ+@§œÈn¤Ç¤ e3cɜgt@a{³hVq^Ò9,ç Ž÷f0ÎA¬‡[Lçz ’;–³'%:º8] +à%)?EN*q#e`áJøŒ \KƒqòÂè8Ü"$=ØJz 7ÖÖ õ,Ü6·±SàSi¬¨‚zW/Tì¦ì"b’Àq]bœƒXe7öRz ¢4žu,Ÿ6VB„hÝD.Õ:'ÆTÎALŠô(é1XtÛ ®±“@”üë0ì‡#Ž¡c9PÐ`ђ‹ÿ&GਠL†ó¼L”rë¡òIgZ¦qlî¢å¿ÕëÓQgFC˜7ÊÊ(I *Uu˜ƒàêbg\— æ4HÎFÕ¶Žs¼ÀsÁÁóJÇjÃMôÂ̫ځɰ3E¢”ƒ¢ºåz‚®‚CFEQ9ƒ¤yÊ9H +ÐeÍ8ƒàh[Æ9Y$11þ[L†“ízŒ(!$ßýŒ3¹­g +ê|Å9 ’rTÂ(÷üòÙ÷/qž¥Éå ¼sB»¦L.¯ùå~ž~wÙ_ÝϒÕMòbµÜΖÛ͟/ƨ +žE£N°“œ†}÷â®ØÎÖô eẇI®¿ÃÃú ÎùéÍ«ñc¸—TñÇóÙz1ßlæ«%Q´ºËà Ïç²4eœ¶ ?öËkz·•²¾›/¯WXLÔ4MM/gH„7—,’|ޅŸN§ÓنŸD'¶Kã ¤ézuÏÒ!ˆ³"<þã|ÕG¦õsÄ|›×°CgÅ:дf]ó8Ý+ØmÝO·Q+«K}˜oïXQiÖÙÞÍXÔz’©ú›-tí׬n‰35‹_ô‹«žEEe¯O׳~˳ s‘¦Ñ^‹~ó /‡.I óЯûÅ 2²%ªt’Õ"Èä‹þ×´´ÂIŽìÜT»4¿¿]næ÷b[«îk¿Ý®çW;±Ü֘Eÿð0_ޒBdô:léمµ)M墧àˆ8AøxøäãðÞÌowë  +,4¦ƒÿœŸ¾æMƛ’.îü͊ƒËÙo×ðgQœÝ +áÖè0́ҡ.ctNþëþþþW¶J!}Ñ/ûۙ8'Î °~_^nçÓ>z?2U‡TÁ!ùQ3¶™˜J#­À)éý)ŸHNÑ8; !E"EX7‰B¢D¶û´,ô«IÑô¤ë\° ‘1 –³Ñ^ၸ-§ûFþªþ2…Úœöë$Cœ@2K‡HlCM¢ñqhÞlnRNJMPó%»bæRäfq5™"Øñ‚¤}²ml ñK=é…%ºOÆ°ØÁ_m¶!~)ëÄ°H8£ˆüz>]¯6«ŽH®U™±WÀ¦{/Cª£ÃQMyñëf;[(P +=w·ë™8\ur9„³rRÔÁŸ 1\X¿8¶¥˜PC;GÅ:8+Šql¿Z"Uíø •SÊüÿËÜõێNpõø>©!IŠ^…ÅM{³ÚÎX ” ¿wîQ3´ÕÈ­©FÊ|Ò­ËñÑtŽC)ú5Z‰­yÏîáaµ/ÆäM(ÃT†'ÿ£­GŽ˜¥¸|ùì…vð0{¡˜[¯®Åip ¡'—}AÑæ¤i\öÅ!=”?Ó¢n ž¹?åÓþ@ÛuE¤Ã~½  +×j3;Üÿý@þ÷§ÿÐîà†©î÷´ºÐjAº–Žœ*ï>-\̶Qºèip¶ž¿µ9ÞM5E¼¼ÄŠõVóóÿC™pèHᘌ³à…B•^õF›h7¸÷s¶J »0ºDú«1Z1jžp5öw¢Óów¼>( ůô•`¼hùEµg+3üö`%O±|À?{ŽsFÎX’±5ð• +|æðŽïxè‹àª5ÜýQ!|®ùèìÆS$yµ`WeÑéÆ©ÕÜåju¿™ñىìPÝý35y챎¯f'üɋú¨¤éww= 2ÂÒԜõC¡yHÿ+yÞºE¸¹>&ı~ÊeÈ£S垧>z +…X%mÐ%´ÆŒdsþoYcÞ>刺à-ێÃ!;òu&*‰žåž’ûiú79êf¶ÆqŹMéXûk·ÎµC~€ûé÷ r¸m Ï¡·ÑÊnɋû9:¬^)ÄÞÈA9Žñcԍ®ƒ<*ši3älÞß.W‰4êƒþAj<±I'ÍôG)2ÖÛþ€Ü+¹ù–uÄóû3ö-(€o3Æ»°Ÿ#ÎfW»ÛÛpÆã5„•5¡, I"Õ2îa½BÓ}!éyè‰.J]A’àäÂwXcµö³ÂÁÌ4bɆë͍&ytÄäý€¾§V!wýû§¼ÑÅéyÌ +m´Ã])Šã¶:Ö{?a2PõÅB:¹¼[¯v·üR`«•^¯®¥÷î›ΣnmО¾ÇñE¾8àÐâ QðB&´*è2;p >™˜/å„G2‹5ÂQU۟¼ -«‘¯Ž.ÕâxÜÛÆǺ–‡JŸ³Ùû9>Ä 9„µ­µ/å·ý‡-‰W–£·Oø°ý@'ãån½½ ­&D±ö&ù$Œ<ßÅě¶V +¹Z9ßV…ÌfÚƒô#IVÓϏóÅÄaW@“aƒG±ïAIˆï_âCOùt …R]ã3Àª ï¶.N_??MÎ׫ŸgÓmr¶šî¸Òh ¨ ÷ Ô¬hàx|þžfûáòÙ?ŸýÁù{;endstream +endobj +1487 0 obj<>/XObject<<>>>>/Annots 234 0 R>>endobj +1488 0 obj<>stream +xÍ[Ms9½çWô1{°¦Ùß:m9É&ãÚIœµÍ^ÛRÛÖDR{ôa×üûyH-9“¤*–v¦*Ñë×$A°óÇ —¤øß%u–äU2Y¼HG)žèïèIRcü¹HòñÈy0O._¸HÊrTÎÀE2ÎG™á \$.O¤Å`k7*LS‹IæšA[‹ÁæՐ5lYjÓ³Å`›zTZÖ`ØÁ•©,[Ž=cX˜0/G LX6 +ȄÂLCNÚeìÚ1ˆí<ç æEIi˜Ž!chÈ 6ô\SМ)g ,Ÿ‘À‘´lUӐڴ, V9&ƒ/ô“y@Cˆ†µ6¤Å`áRaY“²ÉÙûØVT“À5ĉœ¤IKDÒb°ðÔÒ°¢IErMDMƒ8¨ç ßUÒb šUä‘5lY“¦‘5,‚`eYƒ!p–ƁÓÜ80ƒ(°ç$l”JZL"ä-ÊòR,ÆiŒF¨[^™s.….‘$œyLvhFcË [CaXÖ¥¨É÷üŒ P]ç +Ú'") + +D¡!ƒØÐs®hà …’Ò°$ÿ ƞs0{šJZLÖ#·7¬Á`k +ê‘Ûæä?>` ¢m=çœÃ¤DRfÆCC±¡çh`v%Iöû ™‡·qÔÎ@ôI»zä „i#i1Y€F4¬Á`{¬Á`y#‰mYͼ)yRØÙ¨š#\I‹Ñ­£Ø°“À´mGVÅRÓIÉÄA=ç°FÊ$’£[Ø3·¬Á4(-(ÓÖ`° yudE$@§;gEòg‘3”3ˆzÎ륤Ť'EœØÔb°ØÌ`#mËË,ϳ¸>Рdç҆LÀoi1 êȸ‘5,63Ìhd ÛÐÊ7¬Áˆªè êh[‹Á">#eŽ¬Á`Ml[±°“v‡2ˆöÜØÑ¢PÎ@ˆ›RâI‹Áò6kXƒÁbÊ!®vl1ؚgNYÃEÇgÅõœÈ§œ*®’^\ßÒ!lB ÈŒ¶œ˜Ö`—²#à Û#ӀíµgV&›$Z€*8–>re")ʄ–¢ŒaYeYxÔ1,+ÚÒyÆ%‘ej“Øg ¢2žS¨Œœ’ûHZ ; †Ôn-‹ð”[Ö`°U…EnÚ QȲ¢ ^¡=ˆWEÆ *ã9‘^9Ñ©(£¤Å`‹ŒìYƒÁ"¯h,k0 gˊ¸ØÆ)1¨(âg H\‘4Ôϑ3C"ïG§ÚÐb°¼Ö`ˆ¶ùȊ@ØMh™Š ¢@ž“M0SÒb²m{‘¥Ì Cô ÝMà ¨W}f9Î B;!3 -ƈYM#j·ƒÅN5•5SÊ!ƒ›0ˆnâ9I_3%-F·¼=Ö`°p*̋¶åA¦Ž&›}S€82ì$ô"qҐ´óG’÷< ¶>µ@ yÏ œƒë¡*Ãa™G¤Ãµ«$õ–7ƞsˆ36ä£[‘Alè9—Ñnç”ýsIŸEÜ)m`Îs %y¸Ó¡?: oi1X¸lašZ gG¾ê +¶ãƒ& ¢&ž#£—~h––mÇG³ÐAlè9ç(VÈ¡HZœ~ùeÀ¿‰àUàöze"ÂP$†2‘[Ð¥”à`Ï*r$:ÕÒÿV<ã*êI|0¤öÔ&"ŒÃöÔF’ 9dPŽ]§+Mø7uÈ~áñ<¥dњ<§¼Š¥@/ $BLDAÂz ^]½øåíë3¹ºá(™¢6WÉՔk•x-g7³nÊo¢&ØÔþÍßúÛ~Ƀ@Ùq“ùÇ×Ýæ±ë–ô:¬°êŸž-§ý#¿_ +­¨òJ~¸âñ°¦²ðj»äÑp¾,´ÛOÎþÇ"`JË Úv=[ÞÒSÔƅæ郱¨ŸŒýH£ïü[5ýå-§X.ÇÒªa9„äŒd†q[) JŸ^¯7«v²a i—gݾsÀç~Í+t‚9T"*q¶Ü¬úév²™õ<}ÁÌÏ-ß7û +Ôõ`ò¡øŸïZ¶?êJe]E¯S_€7Çù¸êfÓN¼Ù$ÖÄf,èEE ˆfý+÷FU¸ ôU»ºíÄÅp*~Z‹(~§GÑ"NZ'.Ý[/Åp®~íéMTc°uþýT}îW_dž°ò+¯uóP¿¢n<#v® kgçêýl²ê×ý Oâ]Tó¢[ô›ŽÂf gÀZMúƒÁìÌ£¢Ì4tFdA? à)ȃ(—Ô•øf¶ê&›~õ'©Žãø8 Áó²[=Ì&~1âì7Ï´QþÿĖ0œ@ %v?´ Ö!æé¼@‰—”'ÅÝÛ.g›É?ÎFu‘?“ü_™LU‹Ž»3' Ïjöq¾½½¥\'[qˆ/§ÛÍò†Ù¤ ;@…Ó·®Ï÷Øæ2K¸žÉŸq)ªBOxb¹ç‰€œÆà’«Ô™ò)Ž•*ðnÕoïy’lqö†áXš‡ý.9ÏûhÔǟÏ%uJ«IŽ*!ìì8õî)}Ñ­·sÙ LXL^·“;ŸQVT×QöCÕ¡ ê¡OÊ jêt¶\oáÔçJ”DƒG>5‹Ènof·Û•6À1ê û‚ª–7»Ë ·Ð{3µ—Uñü!Ûй +4”ãÛ8X>ç/º?¶ˆÜ‹p ¨xk?žø8gñ:g;¢ï‡ð«n½ ‹Ñ:8Õ­É(pE•†Ø~¾åå„È¢ð;“Zì?‚^X³»^%«_Ìo³ÅlÃÞÏJ˜õr1¿1.yyvj¤ Cߪya¨Xœ9Žoþ¤×ü78íu°'gºÀ…:|cýwggQҜÏ÷8iÈáeF¯å¥“\¯pöÎIéa¼s¶äí÷ áL’¬ÛÅuKOqÛ¢»ÙA Á[’9S ÁN+*åÃi= \®ãäžÔÊ|*„²DP˅G lVëô‚ò+;-Ês&¦à~k¨Û+;eH‘µ\±ÞÞß÷+ٌMœÑ™Œ1Fg5Ÿ"â3)C¨žHPcØÇQc¨'N"Hdäy±*³êÖý|RC\df°×ñ68—ìT±Dð¡F_¹–iápKUëíõ²“úUyó#lQ;W &ë©ÃæS§éi¯eqð´DÕEu1¦»¢.ÔôD:XŸ¨ˆjìzĉœÞtòOz‚[€Ÿ~vs٘º>É°fv¦y'“¼ì6ºßç&~Jҏ❦Mé¤Î؟Ï>\²ìÉç +„3Ö÷¹¯{l¹Ž¿;V® ‡aw'%ø~Í¿ºžˆVûV:¿ø÷»‹óOI*|Á£UãŸo—g¬z–î‡pÄ.îéþæüýéÙ’‰Š3á¨øó×q-"“‹’áä7C¼íW“æڊ’n68üǒù¦§^QpŒ»Ò5W°>ô¼˜ À¯a ×e¿h×áÂg_lWqŸí„;ುõ?â}ûåìð„†Ó~ÑÊ:À·Ê,zë…ijéË«Ò¸ÝQ¹(Ùµž2~ðõÄA5µ½îå@ƒã"¦·Ó &’ºáÚ鼯%ƒICªþ¼ŠRóEc| ›ÛÄ^º£ê{=f÷¾t…›B“6Ã7oZ_E„üU¸ÑznùŸêßëd¨"‘vßÚsR¨8±(*î^‰.«[óS5 É^ é€iš×¯T­Ë"CÙÕ §Ü©?ÿÙÛP3O(#•¸hŸÜÕ`¿¼…#J‹Ê)§âGHNáÃO䩼U£l?Ø´šÝ#fˆ\øZ«fE ŽíC;›küËâÅg7_ww¿1ÃçK‡1BP’þÙ̞–ûkå æèº]w«Ù5º^‚øû+k™ƒ—½+zXOÚ%ïÁG»x Îþv9ûíÞú½å9ÉÍÞo„ìyqÑÞ߇Ò®…ô»’_Ï?_sâ„:y袾ëâÅå°§3À§3ô²QõR‹ˆ^Ó¦{$MýjÑ.'œïã*Çl èÉl½Þú23üɃú­+RÒÀ&(9ÙÍ :îä¯ûÅ}»š­ýgIü½ËA…>ºó·×åÿšË„uÈ¿“-\ö“/þTzõàÕßSÑMÊTæÆbgÃB|4ÉIá«ó´ÉñQ}›ùåéûW§ j‰¿ãÖ?yÓO¶t…¤—v9.\ ‡ïyêtL¯?ÐdÿëêÅ^üº]b†endstream +endobj +1489 0 obj<>/XObject<<>>>>/Annots 277 0 R>>endobj +1490 0 obj<>stream +xÕ[Ms¹½ûWÌ!U±«Bj0ßsJiåØ«ªõGL9ރ/#rdq#r´e{óëóº@÷PtìB*IՖÞ<¢F7üû—¤ø¿Kê,É«d¾z’NS|‰ÿy÷’¾$UÑâ¿«$o§Îƒ›döÄÀUR–ÓÊp®’66†3p•¸²ˆ=P‹Á6ùHl^яóòÐeµ4p• ]áHœšæÓ̐"4ËÐSÊ@…z®I§mREÎ@ +%#)BÓÃB¨PÏÕÍ´LªÈHBiPJ²Ð²­0|/T@8ÖW9ƒP%E(~B&æI,¨PÏ54íÊHBK´WR„V­ªd B='C‹œêêižhCZVj¨’ +õœH‰œ$´šÖpW’B EhAþ²‚SÀ%⠄çð~å „ÐŒ¼XIZ5%FWîQàx™(g úkámʈþòœlÁ=P‹ÁÖ)<Ä°ƒm‹‘`™¬‰¸¦J$WÜÁsäQ$-†X×`F•e±Öz\U¢ØÀ‰%-†Ø,…Ö`b©Se9˜uÍÆl +̂êÔ@4LÉþJZLbÉ k0ØÒa®”•N+ê ‡;e zÎ!pA—HZ ±µ£!EVÄ¢/r"Ë@ÅzÎ5'’Ò0§¡!mè9?ӑ´8NBdÅ pt5(Ë~Rx΋‰¤Å[4ÚÈÒRÉۆ'w$Õ@D&Ú`”3Ð/åx©™4ÉÎ4d5r¯îD5ç7ä_òhhïÉa¤¸NhCÏ5´î•3Ú§ †I -‹±¶–5,âXnXÑS ’3ÐyNF9!+B#i1ؚg=²ÒeQꮖ3Ð.='}DÎ@X«@ÖvÒ Ð"PR:Ì3v Ë@;ôœô9C‡‘“};Š/V¨ÅNÁFM-¦ÙIɘ‘•Á:I–d° t°žs)-Î<’S§)v!ei€Y+é / $Õ@¿B”ãÚ¹ÂA¦’<Ô¬6鉀8ÔÀ!ðT‰rb )%vJZ 6oà̆5lY[¼J2H†Ò<>֓̐U&ñ Ãõö›Úÿ8i¸-\]Z Q3Är¨)óK«‘Ý3 ÊÀrgê1rÜÌI6!Öa@Í ÆŠœË·£¹$‹¤ SÓ>šŸŒÓv3ptÖ>rÜÎñR𙝠· \“¡?å ¤Y«`F%EhmÒÇ@…z®¡˜®œ´«L>àh;Ïay‰rb0¼+i1XtYš¦Ò%ìsp2r¡ó&›$冣dÎåfC@Cå8p”va¬üK"-&¯ià=†5,Œ…Nc[r‰þ %€Ä²ãŽ=E9Ùþ萃 µC¢?çÈ‘´,úý‹&ŠÁbUIÌLš´4íQ2O;Ì·%þ›Ú±Óy†~ŸÑ^ i¸ˆ ¼TŽ6NÍÈGža#FFÄ9šÜHq~TIÆÁæä¿Iœ"4ÂN#$ýŒUV.«FœBpØpŒí‚CfZN!…<:_Äv‚ËÉW”Sg'#Ó@pÐçÇ0ác˜œ¥g 8x¥‹àŠÌên 8L­§à*‡8¢ý)×pe!ŽEá*)RJb;Áa,¦?6,DL˜ùïhXψa#e`0¬rlØЎ-©œÂ`XåØ°¾X2rÃ*dž í°_â0Jê +™B´+iy*§“‰ ÃÙ0´3:ÀÉ0r +Á¡ÊSN!¸ŠSm§”µý)‡õ|ìO!–¸3 K›ql''ɼy"›ixVÁXAe)É°ä\Ê)‡$¯5œB2,¥žÚN!ŒRDœà2>“…aHÆ£ú“¶S ·ÑÁ@L¦£ÉŒí ‡óN¬¡?Áa2m;…àà9f,‚ã(¯2‚ÉÍ̈ÏâþÄÉǕçYj‘2 D9ˆr +ÅxHÍè Ã¡yHÆ£ð œB2m[Ê)$ãQ5+r’2¬.å‚kiRN!&…Cjä ‡pä3è` MtcuøéâÉÉ dÎirq…$+ºH.\šÅçùӋîò¦O†«älXoûõöîÙÅoh…mØQ«‰o6ɨÙÓ³ëîvÛoè7”K@„,ž¢‹)}CE,|™u«ËŽ‡Ão¾Þö›«a³êÖóž8”Ų¬ñ2–ww÷½ï¹ï•©¶n0rutEUî+Ë|»w}· aj"eèènù/îjI¡÷écøÎd4ØIUt*Æ:½ê¾²J¨“¹ÜëùuµÜòGršZ>>`^·O¥r¬Ò/Ã'}:-jº. ·¹é?÷7ü7k¿NÕX§½®·é¾JÐóöš©«ôa³ÜòÊÁ¾S·ÞÍÕ©-½?>׋ž‡°WŽÖS3Öjv3°Q(F`å‰÷Ý,CÀ£˜ÚÃÿ\‘ñrBÍbG©ö”Â2[®9Šþè„JÓ¬Yøc«Á;ÙÞ¯—k!È5›èê…ÞRv·Ä69á\ÿ?m–ŽU6›åÙ¦ï¶^;äY\w/7Ãý-Mê-dË ½Ý 7Ëùü½2›Þ‹ål ÈypÙu8wFîDƒ9y¡û6®ÅFÞ릢uܶ?,׋á {*TÖmîÏ-o}(•d—óÚMPͲA9ûx=~K£×49HdŠ¸—ótáèLzL7êQýqW?±îÂêœ-²= b¦!u»ì8%¤ Ñ躯‡­wF\T1Cß4ý“–"Œ¦‘d=±ŸÕîU·^tÛaÃk‹îÁ\Pñv3\…å…Ë”¢ñéç!-Tá›ç]e$+¶Ê¬†Ïýý]¿™ö_%Ûvd`!‡uì+ ¿Ívì ɯú˞S]Ê¡òõfçÏyáš)láQôQþúàbËúÖÎ å[Õöôä×·¤njòü¨I½×Ænf(ž’bßÝÏd™ýlÖÏï7ºŸi °§ÂãbP¨§¹7ÛVÛ;¢Ž0ðçëífXÜÏ·ËaM EB®ï™Ôõhø;ûÓû;o’ •€pÚJ®‡;^k™9V&—Ý]/‡j{ +@ ÜöQ{ÜÉ6‡vÙ (œu¼Ya7Ûj¿²KÔ86WTPÒêÃݲâð¨ÞJ؈‚BùhÇõ܆ƐyµÜô_º>b£psí ËAE¼zk¸S.Øo¿ž¿=û-ÅÑÁîîºÛH’‚bs8í-ú5ïêȍS—¿ º¢¡‘bŸ°ûnãwL{ûiÓ-BðÄ0fT1xbýýîµ±Ûœ–Èïn²RÍvñ~½œ‹þÕÅÍ]/%HÔã›ö˜Ù +EÕvg{p¸±^‹‹¶±ñ>\wLQ­ƒçyg„® •¯¹Q÷1J ¥NG™N¾4?%‰B…zèÜ×OÁÄUȖǚïl.Ñ9Qv¨áÉIuŸ6#Õñxéi³7ykÁ»@e6øðù?ؾ¸/icÑòôö¶_/–_åtCçÜú€Gí=:|ó“+¥ÖŒGb?´0e“1 óí°Ùv—Ë›å6ˆŽ½&­®®äB™Iß ¨uRÜ=—çÏoßÿJ‹È5¬Àãþíՙà’h´ÔPk1;{CJà¢i_h¡áÆ  +·2ÇUGzJÑÅÔØ4;ùÚó×çl”õ÷ÍZÐ7Ùc%vÒ²wýâgÙðÒD/£~Y®ïÅ:6ñ~ׯ.7ÛÉù9Ù—aÍa¶®Ì©cÜñ!+¶“zã¡è±Ï£oø‡¬EfoÔ°OûÅoÖz2ë¿GÉÙqF kº¸Sí½Ê9½öw‹xLŠçܧ¼R6½jSݗ¾y+v3!\÷e{ë÷e\¦ÆBV2l¯åfwtósvþbÆÑÏb½onnNp‹ʚ#³üO€+¹˜gBþƒÌ$Ø=š_usû†»kRcds¯çUô4¬œd´²"—YÞRÑ­÷õsàoA->]rš²o¼•>>û M¡øå´±×*ˆÜüK¼‘FpSî˄É=6Φ¼g›}×MpÚ°Æ\YÑ('9^÷ŒòZӒÙé?ÿ¥¡æþL‘PT–bÞ'ů3FÇD àö%Œ>«•ý¾\÷¼¬pÒQoÚ;ŸúÎoôfòs¿¹Côã3Ò'X-S,ÅÃñR6Üß%¸…j¢}Ïòã+ý£/²ïÖmâ„ãAç—lÍNø>_ ¼Êr2˜øՃhóÉ_OàDˆ[¼ÃÓ(”˜â +]l–˜+Ióï“p÷¹¾äåÞ j¸û2lþé«?£(´ÏùöÚk´«á_½þWÕ?'/ðJÛ¿À¢zgùßPàZ{vúê§Ówп!X&χùý +9(žSl#_¯Ó–ù|^’î»xò÷'ÿôhýendstream +endobj +1491 0 obj<>/XObject<<>>>>/Annots 319 0 R>>endobj +1492 0 obj<>stream +xÕ[KsG¾ëWÌ-ك¨y?ö²eË묩r"íúLSC‹1ÉÑò!×þûýt’Z¥¶$YNªóM£4@÷Ðÿ>˒ÿfI“'EÌVgé$ÅýÏï¿Ð“¤.;üw•Ý$ `™\9¸JªjR;ÎÁUÒ¥“Öq®’,Ë&¹#=‹9âü4¥Ç`ëz$Øc°]7©œä¢&QE…!P·U@rÄÀ4ŸtáMžÔa°YKbY³ƒmj2GÙª¤yòÎY%mIé MZ’s•ôl‘ŽY‡ÁÖd”ë0؎=l’^%yVM +7Öc°uFÆêX1'í&¥šÃÀÌ \±MR+é1™ÓŒY‡ÁV$ߍul›“Â&Ùa(œ×‡ÊzLæ¤dŽ²lNÕђ…Õ æD.+2ˆ5ÒcR¸…ÿë0&M ¬±ƒ-K˜c¬¨Ô›¨S)pYÚÂK•’C%lY(l¬Ã`yYë0TÊ(،•êŽ7mÅÀT +œÄ¬‘cRìå.q¬ÃäÌ|¨‚=ÛV¤’±Cá¼Ä²Ë;½ª(ÂN@ +óNœìt#=&…KD©±"¶,8øE¸ FI!6§à¯ŒulMòë0ù¡!Km¬Ã`;ÊÆR†C‰“µÒ×Á»ãÜǵ)©ÃBx½ "¯ÓN4ÎAè‚+u Ç`J…ÆŠk±Q47W ̵CîB )ç „" óJz ñ€2ÖaRˆ÷‹±ƒÇë0íley¿”¨ršó°ÿÈîÈeeç)›†Œ7ZÉÀNöº‘CےÖű“ +(æX‡aKJ6–¦¬I박èÂD.K©¼é1&EÝ,‡†z,*ÆB¥ˆÁ¶-"ɍu˜.Ia•ì1XDaåY‡ÁV”èÜX‡Á¢ŠzV\4E™™·ÉÀ\8ôp¿rÂÔE(¤¤Çä6FY™ÅQ·EÉÀ¦ âkªœƒ4%eV#=[Pq¬Ã¤eÇ: 1ê%Küò. µ«d@êJ8.ËY%%=†Ø’CÉX‡ÁvÊʤ°Q[’’M8ª?p½’ClC}cK¿6V̉’ÑA RŒu˜"´ øUÖc°È~^ÊÙª›öÛÈÎّã$mœƒÐ–÷¢‘ƒ-rƒÅ’·‹†V$ĵâ8Ì#G±š…7m ^Ñ2[0°ãp4ÎAh“ñô:C¾(+^N<…j Lhà_¡Œr’Pêэ¡°[³XÁÀ„ªaBå„Ðœ*³‘"¹_óAÁÀ„NÚ #=&]ÉVÇ:,“ÂLLJD ý,ô5Öa°P¿u¬(œºPÁÀ\W’FÊÑ9ê!m0ŽA4ÌÁÐFÇ!ÇáXÔ!4ÎAò€Í@¤Ç`Q üP¶"ÇÉO×R€Z9 W#e —–ç98ŠžŁò ‘2¦êÉØÀÀ!)ÀSÆ1äIH‡r¡qœ?ÂD¸º G"=&÷Põµ¡œðòLÚP‘ÃÀÄ.ˆQÒc«¬ˆMSö«ˆe`bÄ(鱊U–ÅRÛªç*6r"ÆH£XcEl# #k›10± b”ôXÅ*+b±‹´u£-VsÈ, b”ôXÅ*+bK×Øe LÛÀ1Jz¬b•±8¥èñ•Ž,¹Ó6pAŒ’«XeE,J´-Ó6pAŒ’«XeEl*ÍLK»)cÀb Ò@*æFz 6¯`¢±,‹WŒÄðŸUh`D†RF‰Êñvo¥ŸàÄ&†V òa–(cHÔo¢©m;ãÞ^Ÿ]¼ÇÎO“ë98”ÜN4er}×px<ûùzúyÙ'Ã<¹Ö»~½ÛþåúŒªà&u†ç4ìçËÛéÝ®ßÐ;ÈCXÜïá1²Ù„ž¡ØÆ'WÓÕç)¿‡ª^ƧÓõ =ËqÌkó0vØ݊D:¨vMxzùáý¿ŠMÛðp¶\˜ŠXà"n«Ú¢®–ê@›‚õÉãŸë›áۆ ‘.+‚ÀùÀ¶P×ÜÔáÙ§aóõËfØßñë(3)æa3'/÷Ž“dýy†â[X–±m0:ný綧·ñn[ÅgËé®ßî؅HÿM0!¹¾üxñá#=Æ%bSÇÇÛÝtö5¼\¨ŒùfXñC\eðϯ‹ÙfØs–MW'wO´ŸÎ[Í¡ò#¼ë—ýŽ}€XWrr÷mÉêÇ0˜/–=¯*²FÝŧÓyiœ"»4>½›n·ß† Ç+b&×ȜÝN×_d®¡Ý=‡ñ ©}~Òx‰l¿úعóŗý†uBö¶õû4ÿÄö7“¬+ý ]0ëf¹X¡´¹ë°Ÿ>èqìcûèèïÛòhq/§Þ8“YzmqÆÑ­0ÌI4’¢mòh±l$™4lÿ§·ÌKT+‘BŽ¬”|éWñÔ~`³Nْ‘7ý|º_ò–,5Xï6Ãn˜ ¼ p~ïžc¯z£'ju;NȲ¬&䟺ê⧮å¨Å=²ú“§–‘º‚hÝâCU–ðQ‹ò4MÙNdR.¯úÍýb&9Y¸9$ù“°ôœFcéêgH³˜/4©op؃ù8müï> æÝëú€ ß­ß ôd¾³au‡ÜLϑzJ­ÏWo~}û†žb‹·Ù3¤Ú£û¡Ù/Þ»fƒ®È-eáj†MÖ8x3›õ[ޠ؈VN¬ÂÇ:-=Ûa¿ qàêÖl¸aWà0^e±÷¹_p;×f:üò_W¤ªYƒ¬Ï½S‚3Îé¡ Ž{’ëÝf¸ÙÏv‹aMJâ><&éèÝþÔ¿¥.u¼‚ÇEt-v¢v¯,­Æs¡ê–ºßÉ°ábJ%¹ mÙ³›ÄGۑbáA”†j»Ø3¡§Õ…[CO©ÑÖæPbW"Ý'±SºÙþg=ãP…ïµÓ§܇ÔÚ]Îwww>òNÁ'g^Yú%áÝǹéAãOxë~w3™¡Ë¦)ðµ i^°™eˆ¬Cӎó֛%3ëénqßÿ•Ô¥æS»AœòlѱgãYqÁ#~ePÇ4p¢ÅäòÓ¸­z3íW’Ûé(ù|.Éjn\7B— pÅ£ÝHs؍üÞß ê|Ž³Nãíþ §2º…W>À^øϨ±´z®ñÀw)¿ú8ҍûŽ£zû²ðaÿSÎ h&é—~Ýo¦ñœR¡zI:Z¬çÜ.âÊ¿Òxќò IjQ7ޑ¨óã5y×ÞËyßÄ´ì-ûû~)Á†ïª¸{ÉDùuP9h”ad©jëúÍf؈Yhõž/hc}m1±Þþ˜}].äîçÎï—tÐÃù=‡]Ú¨ +°-ã*€.ü`n·ûÕ9‘àç ±Gù>h³†µ8ǧ˜QÖæükܺK´ óýÿ ÁèȐãN™¬¡]˜s«O®U¸›øîFE›ªÎyieŽûã“…+¶×d|þ92èøöÿ¤A­ÙëZ¡ :¾î?i×ñ×e|Ã8Z¡ã›ý“q6ü! ’ŽÁª8i¯ïaœ +5ˆ×÷uÄ·òçG!'ÍΣñè Ž»‚G â»ù×e«t¼Bø edº'‰ۓ›(ãûÉ,ŸT¯¢¶fµØÓ¤uoþœ=Ü*¼:{ÚvdÏÁ÷j·XÊïpXèâ÷—Ûé}<ãù/8øȱÇ/h¶#à—ðñÇ/ß…źx_>ñcàö¶ ¿|ES?‹áiÉÇÍðG?Û%ï†Ù~…_Óàª0\âáï-Uxÿ¼I;zý~± ›þ~}öÛÙyøv’endstream +endobj +1493 0 obj<>/XObject<<>>>>>>endobj +1494 0 obj<>stream x…ŽA‚0 …ïûï¨g;æ˜Gˆz3Ѹ?@ÆH$"ÁÿoN^LÓ¤é{ïk_ŠARŒÜ sˆ"MpÙA[XŸËl¤Ç„f ió+”Aí/GBh„årPC8$›¸yײÀmÚ'œ†øîR?UÓsè·¡ýFÙ.Ñ]Ƃõš ©ê‹ójqÖéùÀ?®õ¤½·òxyƜƒº«•ã;Òendstream endobj -1498 0 obj<>/XObject<<>>>>/Annots 364 0 R>>endobj -1499 0 obj<>stream -x}™]SÛJ†ïùS¹Ùœª ,ɟçf—„M[ Ø)ÎEnd[€KòJrÿ~Ÿî±59{*U×ïtOÏÛ#™ÿžÄnÀ¿ØM—ŽÝª<D>éÿûòá$ŽÓhìF³q4p¥KâI4Ý£›Ëz7š&|VºÉ8îPÓi”ö\<Š®ìíR±.]<Še¥"áÄÍpC©"òõ!Ö`ÉA,ÛÖ`ag²­a–ÇrܞµXBžRñ†5–ñÌÖàÒ¥ñ”ì[‹aG‰$¡ß×bØ©4¶a .Ýp¢Y`-†Mãg¶^æIì[7–rM©Ì#U’Jȁ5v41k°ÈœFË,2$äޖR@¹ÑT{’J‚HLâv‹Ûž´6•Ñ`Xƒa)]ëØb X攱5XNE¨~_‹aÇ2ö k°d^®ˆÀZ ›Ê, ¬ÏÞr ™ŠD O¦‰oëX~¦Š|òƔ9‹R5–†&5XN+s*°ÃÙêm-†åâ äÀ KOÖÚ¤d'Nº 3Ú*6\€p3¢·S—4“&C}(.ÜDÓÖ䢕ª"ƙÓßÅ* Òñt> -L@DÁƒ¯èâ@· -ŽàxC?p!oO‡*óVP3Šr1ãÙXÞ¸\€p*/Ä= ‚X»é¦$&ÌÞΤýƒ­Î9ù½?5ÓZºAÏ©¿ [ñpÏ<9§m¸áx¥æVèí„#'Lòž P†ÁDÆí3Ž–aP÷\€p¼ù1»ÜÛÅÉÙ{ÖÜâŽ/iƓ©[¬õ»>Y½>_¶]“­ºßßYGûÄ~Ý)V¾þ˜µûº]g]î×НºæµûÝÝæk÷Ÿ¬¢"„¸SÅX-ŠÖ-ëú‡ãgæVõf“¯º¢®\}çþ¸¾]\óñzyW»yV.3·®W»2¯ºÌ/û™7®{ÈÝSž5mä.]×<Éâ¼jwM•u.Ûlöûê$bß jµkü¼qË]çں̻¢Ì[u¦Ál²æçßë¥x!¢*wÛ¼i n,³‚ Š*r ¶/kŽßä+:Bj÷Gè8ßÑևøÕÉ2wwõ®Z;¢|èºíïggQ+'êæþŒ]5¢WöدÜ6»Ï#w³É³6wmŽ‡jOüõцßó¦yúWïÒ՜)ߔy>‹þ*-‡@½ÐH².¨µH1ï…ÿpõÕ}È«¼É6îf·Ü+÷±@âúöúÃÍÇo¿õ‚$‘;'ÇÛ'É.I; -S5c«¢Zmv’öÇ¢{P|òÛz׬ò 2÷>%)½žuuº)HX¦KÅ2oT¾kïTãý¾íÙývu¿‡}÷“Ð7ˆ†ŽòÙ{nоþåC*9[nr9×»ºê¨Mû³N9DpõzUÛQœª°xæ[Ñ>Ð8rԏRʗ~•ËÈò"§ÎæçŸÞž¿\ÅõRJ²¨îuñÞ½@Mÿ‘ÞÜ1‘„{WÜïšÿ¿(¥Âé© Ù—EÒlí Dgþ̊?wåžH •ØPý²Ï©Ñœùê}¬êª’þÆMŸØ]Uür«Mf/â½0»kê’Aqq=ãnïnïù¿¨f¿ôÇÕB$?Þ¸ëùYòÆåÝ*Š"ãüyPãÈÝÊx¸¼£…‰©uuõÎÝÖ͏êl>Ðêó®XýpmÝ|·¬òνmêÇVÎs¶ÿ\Œï›z· Ôý®Xk­?wGº.ŠvµkeXKÆS>ÿËÃw»J'#²S¾4ÖùvS?9ªHªO>a(ìMwᑸÚO/w%Ù_é\ߟî՗¼¬»ÜWSj•ËÜi2&åËó2ñ—¦*PîæOÕêÈÚïC½ñíåÕü(VЪvW× ·#º²ö“ÝÏäo¯cf̶©»šûC槹TŚÌ0¥W¤6?ÂI4‰Ü'q_ò¶Þìô.¹n˜i*‰M”W¤a$ÝÕMé‡!·\¶dòÊâçkIêeÕ5õz§É::Oðå¶nºŒ‹â -m[w¾¬¹€æ9÷QÑé€1ÊðÍ= -W.·YÛ>®éز$Ó賕$àfCû».ï‡Øaèðe~.Þ¾e?^œß¼ø}>=Í?|AL#÷ç'ýø”¿ãôã꒱¶xÚjéüÝX#È+îZæ{ÖÉM¥Íuh¨µæÉ*:ŒPtŽZkw¾‘Ø/>>öñlÈ;Êt:ä!Žk)¥þ½8ù|ò?îžy%endstream -endobj -1500 0 obj<>/XObject<<>>>>/Annots 418 0 R>>endobj -1501 0 obj<>stream -xZÑrÛF|×WìcîÁ4‚$øpu%Ûq¢«³ã³˜ó½B$$!íøï¯{†ØmH¹$•*%­ÆÌÎôÎÌ. üz‘…9þÉÂ:‹UصóÙ¿‰?>þpQ–³eX•«Ù<´!+–³Õ=„ë Å`Ë%žògɺé:Ÿ•gS†¹ÜÀŸûihô;b°«l–++ìf1Û(+¸ ù"ŸeÂ*[f³…°q±š j1Ç¿W†,(Á`×¥H¬`µž²‚±l1Ÿ­ÅV1XȀ„¢gÅ`7Ë©­à6,r -šlƒÅºêY1ØåšRÅuƒÅ:*².Õb¡TwސK•0¥ZrÙÄ -¦TK.›XÁH7_sï#ëËæ(Q.›,NC¶¬`°Èû—XÁ`WV‰ ¶œ£jÅV0Y *Ù -FÈó’éFÖCž¯¼ ò·Ï…,˜A-¦¬`°ë · Ù -¦Rù„U vYPŒh[u‰Vaû­WØcˆE³!%R1Ø%+JXÁTbŽ­M¬b°Y†„ Nlƒ-™¬Ø -F­f*±¶Kl¡µµÍ0G¶‚‘Í°ÄºéŠû ÎÃÒM„²©—†Ì¯£c -Å*V0Xì3¤H¶‚)#GMbƒ…䥲‚Á®Ø"b+˜2r +2欙Äzºè"›çsNš¥!KW0•²ýI¬`Ž 1Fìb ¨ÄZ8»ÙÄgm]ÁHhÁ¹›l3]6¡°‚ÁnJnQ\W1k*c¥GV1¥šÚ*»,YÑօÄd³³ †¢2äu“0Ò͗ 9±‚ÁâtC'V0؂e+¬`°+kÝd+˜ìfj+R¡"!F´UÌMàhM¬Ï´Ûχ‹f+° 况9mÀŠ¢ˆœ@‹Y‹]¤b°Kžç -»)&¶¾7ÈÏ>ãa»4ä{“0L%M[Ø@máêGÖøéŽ%Ǒ5Çšã‘Íq–bëŽ×…·eÎÈ CæX0#^C -aƒÅmA%[ÁØUª‰õeq³"¶î/ Ù²‚¹lŽV0Xœ¼X6Ù -fPå„õe‹ÒŠ)Ëy€†<ۄaŠq½PV0ØÍ|ºãÅò¼ñ+’†èØJ¸À Ëͳšu@Nไg%<ÚYÍ&N ¢ºØ[Á2 ‚Í• ‚¡ ’­`æÉ*V0{•÷‘ĺ -¸Á،Ç€b2äò&Ì XË -‹Ãlb+˜AåL7yÌRãٟXÅ`qEºÑV1XœعÈZB¼¼ú¬åáåÈUNAaŒl”Ìt9ÄV0X\ -&¶‚™îbˆ­`„Œ9ªQ)k²&[Å`×¼1&63ˆÛg­½H, 0[L–w™DÆ`SÖv4H¦¤băy·SÅ`1z'ŽyuZà—6ñî‚T yµ%L9؄L‘øFXÏ—–ñº¤¥úÈlx+L¤b°¸K-”̐¬"¢cÅ ç:”ˆ¬b°¸0@ïÄ -‹äPk‰ så‰UìZ,…õ P-þ­Š-”² Ðˆ#ææ²u… ߁Ê -ƲvGM¶Š'^b=(hvvÙ{*·Uð x¦9¦k.›XÁ`ËjYXÁXGA!¬b°H*GϊÁ¢jt]Åh?;Ž’­b°«Õ$*O#6½¦óå¶ÐtGÖÓK¬à˜nb=ݳí9½È*Žé&ÖÓmq9ÞØ+·G• fºK&mƒÅɆº‰,j7p¾iઍb5À͈t0ðà6’Š¹ów ²îÓØÚ Ã¤!+Á0Åg;”Pbƒµ×Eaƒµë«°‚¡"ê!Gϊ©ñ4*Å`í^l³høæ”X/šìüQ¾¦å†,]ÁLˆ7aƒõF¶æØ¿ãҔGÞ| {¶…°nZú ¯ßì3Cfj7{ÇpŒß/íç¹Ìƒµ#VlcYì9‚Šžm癆ßßpU¼ˆŒn!K)¤Ç‹B·’±³ŠCnnç$^€l2â™A "ºuÒÊnÑíXĐgš0Ø%/æ -‹9 £­;Îίyöþ›¢cOÔæ;:‡IfÀMñ­*‘ŠÑzbjkâE$©` 手ãøV´à¥Ò%ÈPä¹C¸\pÓ— —cÃ'.Apøìˆ?ÃDŸ b›í“O䂃ˆ«dg Aü]‡êH›1rσÄ%ˆP¬— –3™#gËáŽhó2à-gªŒ6 J"— 3ç -q ŽËEÎW?ûÌír9 odöÕªã&C`¡$ÈMð7±‘KÐCÁ5&Ú!”3‡ñÆ÷»Ñ.AnÇYärƒø!4q ‚[ûûæÙ§@pètÜäÆõ,=,c¥‰ïˆ<,½™/­‰KÐÃÄøíæ2Lž³‰KÎVµK'Sˆv¯¶/ß®Ðva{Ë?*®ÊuØîíŠó°Ý}‡kþ,|èë¾þõÔ›¡ëjßîþ¶ýåb^ØÙîñ\> ¯ªÝ绾;öÏØÅ,¼î·ÍÝ©‡qîëp]µ7UxÓµUs 9ôÝÃCÝ?3-`Ú×Õ@»wÕî¾9Ôa۟ŽC¸Üí°Øp ÕaþÙ5>òú¡©ù»¡³UÜ?¾˜„»d@mې]wóP·îåû¾ïúã³V³ðé¾B‡Àûp_?<†]uWá®þñìéõìIZá¶ëçæ°ï¾Ã淗ᄋ€ðÜ( l\Šxz|âº0¡ß“Œž¦ŽþڎáótÇT!\NÏ9ÿzªšÛ¦†@¿äfêák×~ª>^Bg(å‘ßÔðñG âÉ÷ÛðáÍks4;öc÷5ì;È~¬‡‘ªQ³Ñ@…(GE+F~ùæ¦VkmÝÞxM‡n×õ·ßºS¨ëË·8­5¾;¶7³*Ø=vŒ”^™þÈþe=ì^~îo–慝Âr¯M×]×>žì~åµnu3Yok4ƒ}¬û/xòœùèäIÈ'Ù$_›á> ¥5Ës§¨÷÷ÝP[#¼P•6Qßo‹à•þcuq ™Åõ]>w¾…â屘͟iÊ*ü4ô=~ÜÔÕîáãXï0M†oáïøOæíEƒ)»êêêj.÷_ªÃ®ÞÇ „YÒ¸’f†¹˜ž|ïåŒys¨wu‹‰®èâöÿÙ"½u ÍPC¶—ûé8ôÑb"$>d„Ÿß_ý7|¨û¶9Qx՜gÙ8*Ð ˜qõñ8ÎÇð/x´]™„žQÝÿ4õWî-‡áúÜ؏q‰c8ùk¶,œG÷MõÐÝ={üØâM‡ÙóîÃmóP'+„ŽO„ú´ýé©ON×—ïìÄÙ³ül}À2a‡2‡oðv¨îÐÕ ¹†f‹tRW ֕÷&« -~Ÿ¯ŒßÈ:—Ï<ª>x¡Àuፗ[7à óu*êâ. 6·®O]?0ŠI øëƒéÞwû“m¤)©+ãÊÏ߯ 1Ûéˆm‹­¿j¹Þ1l»î£ôiÎxa`ÎÕÝ¡;6ÏG$>)„×?¸þó¨qa|µ†„ïag_/ÂÇËOî1¢"îîYóÏZ?ó$,‚·Í§åë{\±ž57>!i áMß`†ú5èMý¥ÁÜy¦"¾–Ì0ƒÚÆvƒ}r8ñ0 Ý-Úâw„FñÑ.G&âSíð¦#cöC‡i¶ë›Ç!‰uÛwmxw=^—èàå[¼ûÚ1Œ;ö¼ÄÿQS渥~w}ùîÕ%,»_0%p7ٝ8¨ãæ¾à'6>þb=ßðùËŽãmh·Ð²,ð?ӁXp•ï·ÿ¾øsèÿendstream -endobj -1502 0 obj<>/XObject<<>>>>/Annots 470 0 R>>endobj -1503 0 obj<>stream -x}YËrÛVÝë+îbÉB4ñ «)['ª±d(Eق$$!& Jò|ýœÓ â6D:•ªTŽÎí¾ý¾ æ¿g›âŸÀ¥¡‹·ÜœM'Süeø×íogy<™º$Kðï ’p’õhíægƒMãI`Yƒ7.œÆ“Ø°ƒ‚áj¶ì,iŽsš‘Ò˜Ëf“Y(i L -§“Đƒå4Iôˆ;Óàp¤Øb°A6I¬Åt'£;ƒf‹Á&Éè^‹ÁæÑXÖà‹¢1«ùá óI¶Ñ!%cÞFoFM'¡.$‰@Á`A -ƒÁ&ïXƒað4˜äFVo RFQ(6˜6¥Ìg ›eŒÓÀªâi"ibQ,HL‹¦Ç³3=ŠÅ3ÄY‚ˆåNѧY6Õ *)ˆ¤Tâ,I%ˆøkâ3ÅS˜íI‹–¿a ›fcYƒÁæ¬5#k0\ ã‘QêêŒuÑ0Dn&Hbh0؄åYõUü@×EèșñÕCÆ,*OêÐ­5šP« ¹3ò¢23<«w ёðTˆ 6`7Ö`°]¸ÖËÌž4[̲˜¼¬Å`ejxV½EOh_…4JFØcz2Pž5,b “=k0؜5lXƒa…Ƀ¬Å`Ñ (qÏ 6Ÿl‡bô¢– Pä؄“Ù°Ó¡åfXƒq-rÖb°‹ÑËZ DnYƒéŸ/#k0&jœî•’‹Q‡|\à{êÐ[á†_±¾O i1XJlX¹“ãC&®|(¢^ýؔ°a †«ø0I «ŠÑ™ºQò™ ‰byhÃ&¼Ï©aUÅ(Ó+`µ„‚DÔ`º3C;Ö`°Ø³3ËÌÄr¤zY0zœ«¼ öj±°#ޞd¹ÅËs¨1$’Bì4J²ÿBAâŒÁ`c~Ö`°Ød’P¯„)×UR–ùo2ñ>ҁ2œ¬”'^Èç7(ŒƒØ  F¡ðɬAg÷ P÷1üx‚ßݝ}ø‚Àî&YêîVòKáÔÝ-á؜¸û®>ÿ\®Ë®ª·®~t÷7s×îêzí«uÙþz÷×Ù9~i<ÇÍ!üÃÝý¶z¬Ê•ûZ?ÕÛÖ-Êîµ,·î¡Ú®ê×Ö]ß¹b»r÷חº}[mŸÈ,@RÙ;]lX´]S,;²ÓÑEáÄ]n»¦^헴ïø@4qÏEwÐïnšú¥ZõVuÅ÷{ý:œ|¨›ïâÜøԌ7¶]±^úqQo«§}#9¶ñøZmªNh×X' Ë5B¡>Œã ú¦^WËîªØOå¦ÜvîœÆ¶Ƈç¢u¸t‚ÀÍ´]¹QéêTª2¨njæÑè>Jà‰»­‹ 3՟?‘÷\’Q>18x5ò½EþN÷ZuÏn^lÅÑ%˜,w]lJw[¶õz/Ñ­¶®p»}S²¢Þ>|­¶û7Uk©E4C/Þxñ¢Ey¡ y-T[;iÈ(ÞxÝåf‡Bä¢A”é ÄÛSvã4ìþöR6/UùÊ9ˆ¼+„…ŸúÚýnW7ÝH¯ñ§Qºˆõbz—Ž•¢l¥Å²©ÛÖµû"þ¾x¡Å;/;ÉÎ~‡È>\^£—azÙ+FٚÃÃ’’‡o·ÿþíöÛýͱªõ§bŸ¿]}¼¼¦ÌùØWÔᗺY2Ðe×Õ®{.ݦ@ Ÿ0ÕvU|78»ª7ìû™6!w]w¥+õ¾c¢ŠÕê]±Z!ÄíñX`v‘Þ«ýº«vh’j [‹å‰^ -qî÷º•àîªb*êÇÎ}®0¼ªÅ¾C5}a£õMÙ5eé0ROv”AM£“í¸Ýðˆ›wÅò{q|™» Æ`?í(ÀAÑåǤLåß -ˆÈdÅHZÁl£x”7üò7±7»â¥¨ÖbO¹nË×ç²)%Ù#s 3/—û†©;í<%?›ëØ!aÞ½ôå3Bî»-ە§ÞœÇ¥z~ÈàßGSéñ\S¾bÜ¿¯tüŽë]Þ\üõÏÕªÜþ8ªp|Ôàð£q5r{º™ÃƒÐíÐu³)¶K4DÛîOž…•õfW4U‹ à½Iø¸ƒ¶zù½ì\½ã¨?q9»-‹•k«ÿIّ-ýÿæÞð°k‡­X=ܺ|)%q¾`å•E¿L³ˎì*óWŸ>rÌþ…ÂqŸë垏ëðŽŸøXçñótšs·±›HŒÿ”e1þg+ˆ˜6üëîì?gÿ')µHendstream -endobj -1504 0 obj<>/XObject<<>>>>/Annots 505 0 R>>endobj -1505 0 obj<>stream -xmWËrÛF¼ó+ææä 5ޏSJ’#[Uv¬˜tœ+B,PP¶ÿ>=³vHª\%«ÕÛ³3½³ü·òÉÃ?ŸÒ€Â„ÊýÊ3þ²üøò~•GÆ£$KðsO¾Ÿ›hB ­Wƒ s(ÖJÓÀd, |&‰Ta°‘o|ÅZiœ›Df͘dguÒ88b­4J(H_† -Rҙ=ä–,lž›˜’0D¢œpÎqل›À%ÅF9G -ø =kÄR›’—LF$WÐBÆy8•š"‹l¾#.\J+qã̳¥þ·ÈÅMR[LȃbAWač3ŒR¬Â{ -‚ˆsZ´v֘ûR?49ł8°øGìëž2ÉHs -²GRËBj 6H¹RÇ*Ìù²[ŠUlÃ`ÇÚ|@z)âՍ‰ -³”αVêGS/Ŝ“ ‘úCÅ&T¬•¢Hé¥0唉Ta.'àÀŽUö{ÜZŽ•ÀQ–Yû%E.ðÂ&¼k¥idûÐJ)éÌ&>FEŽUç)¦W¬ÂÜ0¼´ŽÕ˜ÙãXé˜áyyÒ&ZÀ9)ˆnŠ¸Ȝ‚HÍ(Rc68ç„©õ!ʦ}“0)H|¶ÒH³5cöÁ_hF¥h¸´DÖlȽ¡X…Á¢¥cÅڔÃضöR$Ó*Ì)'l°c‹ÎAŽU˜‡›Ã±ƒÅ<:²Æ`qB å%²Æ`q…EVxO!šßWZ[.UΘPV^”«0—ˇMäX…y…$兵½ ¡t Øa°²p‘c‹­«0OË'”bf—%åE+[ ÌcÙy-àœDX¹4ɇp(ç*Ș·¬E¢G€=øͥΘ¥|9V\ -Ñ7b?6„O‰Ta–òàX+¦K_ ͳâ©1³ ߎµRrPã1Y©Ã<+;¨X…™å«Z³ƒ…¥(ÖEVkƒ ž.¬MʟžØ£ …‚8)»pž}0À[0§ æċÕ,¤Æ`å^w¬Ì sÅ~YV‹8®%Óé1…‹(äÈd~LðYr$œ²/#¾ÕALú¸×fÌñ»A± -³ƒþ2–µW›ÕۛoÚÜó[2ÉRÚìäéѦü-@gúR;ê‹¿o¾¯<ºÀÃ!À(&SCßúz¬^g3Cë¦ûA×M]µãp.ϧ»‡º}…÷=3‰i<´uûÀ!.ðàu9 ½»®‹mÝÔã/æOhßЇ»¯ÿŠR'Ÿ˜³_¦¯mýó4µÄ„†Þýu+²cUÄ~ì>#}¬ÛÃO€ý¶/ÚÝxq{ûÊ$±¡Kæ8o8·.öۂ ¥n|¬zº¾½YSé¼:*ÏCŸŠ²nÇnxœ‡ýqš8ßÐçu0ÙvN£®ou»ë~ tßõô­ëŸúîð,î_èRSƒRç±oòøí›<;‡úæ1‡OuÕ¿ÔeEwEùDrTzâZbì¨ìöÏuSÑúòÓÕ%<‡z/˲†É¨¡;ô\v»Š^ꂮÿYKx3^ó -ÝB°•qيöï¶ßïÇçӊ2^ù«CÝìæWu[ôuun®c,âXôãJmÔZނôÜw¼*çóòV,Æòq²J†Ú,‹!åSS#Ç8öJý*yÄá†Ãþ™í9Í<–oS g§ 6ñjÕMCÅ‹T…¾ß6Õ ›èíM6ƒ¸Í½ o٘¿;pÌIÒ]ß}¯Ê‘ÞuåaÓ¬XVÇÇ뉩—óøËí0öE)ÅEø,ɲŸê b.÷ÏÍêïÕÿw҆3endstream -endobj -1506 0 obj<>/XObject<<>>>>>>endobj -1507 0 obj<>stream +1495 0 obj<>/XObject<<>>>>/Annots 362 0 R>>endobj +1496 0 obj<>stream +x}YÉrÛH½ë+2|9‚°réˌdÝêÐf“ÍÁ,R°°°±XÖßÏË,•"=Ž°ôø*³rO€úû$ ÿš†M(+O|ÏÇ'ã_?ŸAäM(™O<ŸJ +ƒ©7Û£‚|ž’YˆÏJšN¼x˜šÍ¼hä‚iÌrrr”‹Xº¤ ø¤ æXM<‰…‹/ܦ,i>óÍÅ|4ñŖ ›i¨tvÎYN2§ l Ø&Gj 6œw°¨Æì‡?”¬Â`gSo®X„'¡8š"¸ £„IA¢XaVœ°ÅŽUì|Îs¬ÂHª5ÛkÃ"E<á­ ¹Va°H(LY+H_HA"ª0ØhÂñw¬Â`“ˆ¯u¬Â`g1_ëX…áO(YYÁÆ{ëX…Á¢¨´UƒK0FYq7B‘IŠ{9wG6™ÂdÅ* ‡Paè/Ñ$² +ƒÅµ±f†Qè·@±³»1*Îi¶&#^܎6C‘ eòÀZ«0ç àk«0³s¾V±³Évwd5f“g¨xÅ* ⍬Â%EÁ Ùu²ƒMBNÂx¯Æ`gÜ؊U¸¤Ø3Çj 6 +ÞÈÚ0OÛº—k$H¬0BFl²c›L8ŽU˜ÃySÍ*ÌaNØäQ¥€È%3iìiÄ À6)µ~ÀjGRc°Å* ¥«kÌóœR² +³Áj¼Wc°ûŠU˜3Ï+±ƒx–:ÖæGv;4gRÇ’Q¸okŽW$ÈöˆÃ æ)Ç*̊yf+Va°žÈ‡“Uކ<÷«1XœEGYk2Šß¶µ˜(H™<°ÖDÇ*<šìXkò kMt¬Âœ>·ÜŒø^ÁÆ>›ìX…ÁÂrd­C~bȇ)‡Ö:àX…᦮YQÎCi‚Àq«EV±ÃÅ"™iVaVöqÓðNôœÀw愜Å* 뜬Â`ñü“FVBÏ +mtyúX$1BK ¢è’©f+SÛÉZŨ'›îF®6›™55`ˆ¢×`±c;g)NJâùþEBô°9eµ7å=9rÒâ˜Lœ2˜:'ù¥* O˜‰c‚x«Š¥ 8u¢8m›(9îš=‡u(rÂ^¯!ÞÕ´HËUJë:ëKSu©=öÓ4Ô=z5iÓztM]óʇMÕö•v”Åþ^Ù¸7•õM=hÕwÔÖ¥éòÒ´¢LŒ)Òf å?êkE•¡iZ—–i#òÊ£%®/k¸ß˜ + &µ{:øwpõ`¿(YÚÔ}µ&XùÔu»?ÎÏ_^^¼–=õêf{Ž[Å¢wWÚíw´K·Æ£‡Â¤­¡Ö@C/±‡ýõÁ…?LÓ¼þkTI5|2Ei÷™÷»´ †Ú@#$ë5#ZHlÞþóÝ7úl*Ó¤=ô«"Ïè&G`×÷ÓÏ7ßߏ =º@Žw¯œ]$íÀPˆŠ®Ê«¬è9í/y÷$°Éoë¾ÉŒ³aurRÆxÖÕY‘#a©T,*nȼŠò¦ÝHŒ÷÷¶çÛ]áu¿‰¡F?>$ô‚†8²É矰fÆú燮ätUöëc]u¨Iû›N,¸öÆxåUÛ¡8%¬ß[Ž†ýY¿p)_ÛS”"ËKƒ:[\Ü^^Ÿ‡ÄýŠK2¯¶rx¯ž¡¤ÿ ޘ)›»É·}ó¿E¨pôTìó!n¶ö „Îü™æ…õ»¢W¤•Ø úùž3óÀ‹­Ž¬®*îo¨ÛWù/ʊ1;²/9Û4u‰Aqu¿ø@›Ç-þÏ«ù/ùq·”áóº_œ‡Èt™çyJù[£&=òx¸Þ …aSKWuõŽëæùŸâƒÎbõ¥Ï³gúØÔmK‹~U™Ž.›ú¥eÎ÷Ÿ³ð¶©û£¶}¾–Z«éºÊÛ¬oyX† _yô =d;…Þ}5eݺ¨*̋ÌðhR̬ãh‡2öQ1ÕÐâµÊ¤Uªðæ4 +?^ß-R‚×;X]ÓÝý’zXWÖvÆÚéøý4@·ïšº«1ÉytÝ.8?kÄó2CÍá8 =¤ážÐWÓÖE/Sý¾Át9ʀu«ÁpØÔMiÇöMºÂ äÃ:¼x·Á2¨º¦^÷²PÁørW7]Š‘}‡Ø¶t±ª± +›!ï¤ÕUdð-ª‘‹¿\íÒ¶}Y£wÊM)†¾9‰>hDêÌ8N†öÇGÐsuydâpsuñpôùÔ£Û×ŗ›#b†[`ÈzEÿ¹½¡]Ños[Gø È8F®1n–¯;)¤ÿ7n`òv ænÚñâDÝ-¤™EZ²¦ãs|ˆÝš. +ތöða(ðþÁõ»’nM¹ÂÎpUÈðÕïxŽhÃÇ€ÈÙ=¢ùò3{¹;Ø7(ûFF߂'ƑM%æ§)¾¿?!">ªÃò¸[ƼQ°á3=4y™bìík”Žž¨‘‡Æ4æï>osôèW“®1Ž.C(.ÓL¦ƒ-¼½Å>/XObject<<>>>>/Annots 414 0 R>>endobj +1498 0 obj<>stream +xš[o×…ßõ+ÎSÑ>˜æex+P²4*bYµ”¦oňIS“e8Œ­ßoïCž³† +‚ €›¥5ûìû>闋Qò¿Q˜ÃdVۋá`ÈOÒ?Ÿÿq±X ¦a¶˜ †aF“á 8¢M¸½P ; fÊ +†]Îû¬àmÃÁ\dÃN—ƒ¥²‚a—Ó¾¬àm˜Œ—=½ŠaÑ«++†Î#Ñ«=ac¨æãÁÂC5"d3G1T[¨¦¦6³‚-TSS›YÁ¸;žÆÂFµDdfjÇ#ÔϹZÁ°3r«¬`3ji gYÁ¨Íz+GµÅŒ‚@tTX™8rµ‚a 2e“YÁfÔؼͬ`ØÅÐÔfV°± a3ÆäᢜØhòd‚—ˆŽgV5Žb¤26£&}V0,‘!óYV°%hÜcÃN F’F-1f±UÏ̑¥ØXO°Û®6³‚agÞșL)ÝùÄ*¶&ñ`dV°5ÉԊ*³‚aÉaNlQX¡Îšd67o˜··R‰¸ ˙U[â’‚„9‰T ;š[n2+v:éË +†]Ž’í^1‚ p,ê´²bKÎȐYÁ–ïËÌ +†]Ž{V)&À㢷²bXË)Þf³âm(F«Å¤×kqºœÄQRLùÿˆÜ]ÁcaYÏl¥9}ð)¤#$éõÆóÙ0uäë +¶ØìV0,mX(+˜@ mʲŠ-6I„l)° &¬`X\™++8¦@­ŠîÒç¾gRåÈÝŒC…5­°‚c0X8ËŒŽÁÀ¨ÌúŒŠv¹Lߺ^Á84±Ý8Ë*6w­?… »\XŠ’^Åc4bèfV±…ª/«vºèE#’Æòudm0uë&cÜOÍäÌ +†Œ©=aÃV™Â +†¥q(¯,ØX›ÁÊfL¨¨H•UlI°/Ëúlœ²½ÛN>Ÿ™¤óVà6,–V«‰Èl´y›9Ë&ëIP1ìÔ6saÃ.‹žlÌ ½ë Ïv†¨#ύ`D oÌ +¶…‡–ôÌ +¶M,‰U ËJD"³‚a63M&%>†¢‰ŽÄäM̬àdrf£ÉGÙ£‰‰UœLÎl4ù$ËXÅÝĺÉÿú(¡y¦!"7Y0FÍ̱ÌFÑyql;#Ž\t”1¢“¹V0s(aá$FÛéÀ é(ÚäVœXÆL¡¬`Ô.lSYÁ¨Ù!+³Qm±ˆçS´päj›?c Tf[ Æ¦6³‚ͨEj'¶BŽmo,Eo3†eÛÃâÌ +†õ"Él\˜³¢§–Ó5¢ŽlaçW›|Þû'ð8 +2ç£à$罟9XCtɌkpO𡲂a ØBYÁæ§S^Y0YØI3ëõ(ØM*“#ŠáÍ،²6V0,ûQOV°5Æ]‘l¥V0ˆ3«– ÄBYÁ°ìºa£C S‡Z®_å(:”1,{ +FeV0ìbB +µÄµIV1¬Ÿm2ò­Š…G¶¡NÅÔgl&Ûv'¬`؉ \aÃr¨ëÉ +†¥ì¡Á6H×+“Ù•Ô*Å°1×IV1ìÜ.(²²C¶/k-ÎL3NL«@L-̤D2‹±3˜8˜{ԛ#·W°‰Z +Ø"aHXÁØ;´óqf[$¬E„ Ëý\õ²-³”?r Öh"2“#Él‰Åè=àÈýaڰ҉幁PdV0 Çâˬ`XnBÄ-³‚±˜îŸÄ*†ÙAGXÁ°L†“Ù¡áé +ï8‡N,łQ™lÙÁ[XÁ¨%A#É*†e“ÜÌ +†åލC™lY! ++˜0›’êõüé“¸GÌQ‘»ËÝõ„qÈ·a›CîfV1¬ok +†e3š«¬`Xo‘ Ë䪬`»+ØûZ–U ËV¡6+†e«[¨¬`n¶œîN±±X)†å¯z)uŒd_mogöˆRÉٔ÷ŠÛMá3g˜`rÀžƒVÿÖ3$غĎû +¶Ø%$³Š-öä!¬`XæìLYÁ°s{YÁđ\Çd³bX²©zÃ8õHq|] ie{m8aËAѳ*–:û–*žGXؑ§ÏsÍáÑa˜O 'ṳ̂bˏ]5„ ˀÀ×´°b¢Èõ“'V1,Gq¢˜YÁ–ŸQoeÅ°T¯bˏgZ9ƉG œËPëÈ N°¹ëéɬ`XFkOV°9dÇ©¼²bXžã09­¬“yP"{‰U" ™ÅÁ“&X6z]Y1,=J§fYÁVpvºÊl •Ÿvp7NKG*Á°1_™l´ýmœYÁ°<¥R™L¨b0«–S½™YÁ–{-V0,SL­R 'mZك ƒÉ^'åºI¬_v…Œ,å:æ_9&檬 GŽdáʬ`‹£•«È +Æߒ3«8Æb*²Ñ(~å·6ŽpüšË‘%µ<:arfÃò󉲂Që/YV±µdãÌl4Šå½uý9ՔÇs©]gnŒ³LpÔfV0FùéKXÁ¨åé«YÅ°¬I”Óʊa©Õ«˜öc‚ãP’U Ëɍ$6ºËaÁwÕ螣˜w÷ÄF÷2+8¹›ÙèîQöè^b'w3Ý?Éò¨±äf6šUcÁ殝ó2«–­‘ºI²Ô2pr|¡ë‰£#wW0ùυ ëϏ +†õk¼°‚q—‚Ää¤W±£o•bX!YÁ–]{1ÊlÌ.÷§xµ°+‹Ý¦Šx,ò+KÄæ=j +6vT’ {·›¨ÝFŽbÙd½¥Ò뢜ªâiÙîI\Яg'Ž 4.C‹¯m‹Y.Cô± /3ççøaõͯ¹&v2‰u”²Vè‰ÉȜ³SN¢š¶Ãg.Ãèö4s1Çþ)Ų.C8ºJLÇÛ[!rZôlqS¨?~ŸfÀ¢ìá”a5Áyœ‡qûoc2Â7ªƒ·úåëñŽà£ÚwV&å_{B¹øÚaó8/ßÝ]¼ýž9 +wö ³Å<Ü­ý†ánõgð¾­Ê®Þ=†åê©ÞUá®=ì»p¹Z5‡]·ånþÙÔ;ûäý¦®ìg]º§*|h¶e½ûËÝÿ.Þ ÃߘåYuʪÍvÛìÂMÛÜoªm\延mÚ½}Þûz6·/û®Ú†›fS¯ê*~èC½©^?„ŸŸÊ.4˜Ð†§jóVå.\…Ǫûû«Õƒ£™˜´ëÚfš6ü\ïÖÍ×}X~{ûñ»×,úôñòêú¿ï?]ß}þôã ûօ¿&±ë»óEÿnËí}éKñw")ûCóÕv¹êB‰ká]¹úrx>[`ƒ+õöæÐV›—¸ÚÉäMµ–X÷— rÕV¿ê}ÝUásU®IÕY¸ \ñcKV×çӘǠþr(7õƒçà7,$£–÷]Õ}mÚ/çÁæ›Ä“ +E¸¯~ÏY"—òæÃ{_HKˆK{ŒÛº!¯ûª ¬<®ûî$  ÍQ«‡øòÃmX{q†mµ½¯Zs¸ÿ9q»Úí»r³±Â6¯<†-¡~&Aå#eh•ò¡º¯ËW5ÎñîÊ®Ö?”ÝY:8@x‹^/J +®›.6ì 6Ý$¹¹¾+BìÀñ—ßO³lFO,–8q¢)qMþáÌh¦dRÈì:µúxÈßmEùó™Â|¶ò 5£í‰î«Îâ×=¡u_­mݽ„¿ñŸ©X­ŒÓÔäWWWƒð鹫›]¹ –¡úñÐ2U/w ꮫ¶¡{› Ö«¶Ù7]Oé÷¾íÅ3_×VU æRS÷z`bÙ>ÝâyL*즥i-’·‡çç¦õݶ· ¿ºô ¶Í:®ã˨§¼ä夤è¾ýžëªŸž¹“ ö—¬~Ľ½üøîÒ·ÿ£’ÙTV‡-iIboì—|öù›ùpiGâË{< MmÁßE-T 1±Ÿ|wwñ¯‹ÿ1Ñëendstream +endobj +1499 0 obj<>/XObject<<>>>>/Annots 466 0 R>>endobj +1500 0 obj<>stream +x}YMWãH¼ó+궳Ôú²diXzx;4½Ø½ÌUØ4m[^I†Þýõ‘)©Ò˜™7ïõ›p(³"?*«$þs¹ÿE.]’¹Õö, Bü2ýsÿå¬HƒÐeó ÿn]%A< [œY v–‰e ;Ÿ©aÕqs:N#’‚è8-ðs6+‚ ä‚@Î@**h(Oª"©(?2Õ5Ó &$#."ˆ¦J&Œdœ2A⑏l’rUÏLÇ¢Þ³ƒÏ‚ÈÚ¼uq<£¨ÉÖb°ÈhfX•3?p¬Å¤©blš3—yÖ`ØæÃõ¬ÁX6œ1ø‰ÕeÃLK§™d25²¨${Ö`æ‚}eXƒ§e'ÛAÆà9NÙ:ÞVDÍ +&ŽQÐ)Qƒ…ˆÇ°«¨Ì²5b°E–5˜åːGïÙb–/>f ›‡Gž-[°m¼g {AZ9 I +’p f@9JoXƒU2šl)yĔÌ k0ØL’ám Þº$’€&V%ãÙ`Ë7$’ †äò,“f6c»`Ò̘(Ôd $¡ýÑi1XìqHò¬Á9¶l4rck1Ù3œÉ³Å`33à ÛáÈÖ`ÔSƲZ´ŽLdÝ1‚˜ %ã\·—ŒÎ™ OF¬Š& +nIeen(›qZÖ`#6ßd««âGi™HúX86˜ ¶™g +§gÅqŠer¦t¬HLÅÊcXƒYž"žUÇhW=Ö¸—RASžÒ,Ò$âä)ˆ¤tbšò”Ü:¸ÁšÃB:"5¤Å`ág|Vƒñ˜yˆÐþGŽC—&œïꊉ)1X™’†5,Zk|vP Çq¬ VG‚Œã‘Íg‹ú¬°S1ǯa Fú±wÏäYÓΧ†© ]6¥«‘SœgÅ4Á˜Õ„¡+òŠ'£:µ¬Ál⠚¼­:Æjº;r›ÇØD#F°¸ÁÔ³“-¦gÅÖ`°yŽÂ[ƒ)Š½îY•Zx!ȈYáYƒµ>pìY9ÃÅñˆðKVMqᒍ)5$¦cUøžUS\´G9.#AºªÇ0•7Ϫ©¼ƒ”ûF$ȘŽ¬ÌÏÊü(†;†Yä¨Ü «\‚'NZӒ­R0ZùZy#ŒA|ºácêp‚ŒaŽäxÎCpsŽË‰“ð²ñ֓åq‰Ò .c(™81ÃO’OyN€79ùä9áçÞ·èD‚ãž“’ƒ—¼Ë‘ƒvœgì rºaõV ùÁ ì0g™;Ap(Ÿ)&êóòìÓ56Cä–Oüü•Ís·\˧¯Ð-W¿à $ Üò¥r7Û}[ïúÎ-›fÓUýߗœ…î\>¶,×|0 ÜU]>îȞã[šçg»üþmá¾ÑK½{v‹Ã~ß´âç݃Qànv}Û¬«¾nvïW |»û‹õmsx~q·Íº:µ‚×õ¦¯ZwùRÖ;jÃÀ@²BÝU[¿VmçÊÝÚ]U¯õªÒ؎mÜoõ¶–¸z$kwØ>b‰æÉíËçªs‡Ž>VåÎIOõe»X¿–»Uµvߚ®ïVm½ï}²žÚfënî¡Þ­›·$äðpè›ó«jS1k\\Âíö(˜{ª7ƒò£dcÝï»ú©Æ²¿5ÏÍ®sUÿVU»q%÷u)±ÿzó;Â`á á2Ä;_(ÜÅc×·åê¤=2í¯ªŠ1¸‡—²ý#øæµ^o\÷kó6=ùд?N*‰›Wìúr³)%#¬áe³{ªŸ­üò¾xà +)ôišqGw4»Õ©ÐÎ<îrÐÜ(Í+úØ¢RLX½s]¹},O2†±¸;ô×k]½±`£É{a8Ü÷yô×éÎ9òkû¯³÷¸©¶®­ºfsøhá<2NËUÛtë»ª?I&> nQõÒᇽ+ÝÃÍׅC[Cý©Z¤Ñ<< G"`xwÿÏ/÷wß¿š!{jvuw{qó•6çDZÎwÝ´+&Z²ìúMì¸ ·e‡~ºN¸Ûò‡±À³ëf‹yð§&¸£¸¯M_¹ò±9ô,T¹^Á½+×k¤¸û MQ]”÷ö°éëý¦Bµ å©ÈÑÖA ‹¾\ý(Q2÷ïë…Ûbø ö݃lÎÕ_55N@î´ìMiåGI`WvåkYoDO…qÿöRµ2VÛ‰ü‚±»GÚö{æó×»‡åÝ»„ã»—[°ÿÝ hÚ-ǜ«»î I³âYxÙl÷e[w˜G§¾Í¢Yý¨z×ìÙÖ<‚Pî«ríºúïÏ,€®¿-ºŸ˜×§Þ9ɛg·©^« Y›$Ø¢±Ås[¾Ú¢}Ú=ò!Ëo0´.7u…sôÔɔ°þéÁÄÄ jìúÃÙ}GÙcîÚ +à ¥ÐÂ` lêÕ½²·thÖ3Åý­øy1î–þé{Ùø{‰ ÃðÓï²±ú/ØØ«Ž~œûã(üt=.¼Ÿ†sþÍ,Æíã—ÅÅíç °?ªUﮚÕa‹ŒMû<Â7m>~ž‡Ÿ·gNŠÏìóyŠ?灵ÿXžýëìÿ9Jšendstream +endobj +1501 0 obj<>/XObject<<>>>>/Annots 506 0 R>>endobj +1502 0 obj<>stream +x}XÛnÛF}×WÌC´¦y¿<¶Ó$šÆ”´¯E[L(R%)'ùûž™%¹CÉ-9>sŸÙÙ¥ÿYyäâŸG‰OALÅaå:.~3ÿøøv•…ŽKqã灼ÈsÒÕ´ÉÄÇ/Aú‹ +bRc°aèxšU,´"Í*| ßw¬‰)ʜغ¤ÜNl:ŖU†=ÁÃaì„Ö° exbÏ (¶¬ÂÈ'N¬1Žo R†'Ö²¬Â0%°[Va°iˆÐ«0²uSnЬk‚Bm¥µaĤ JaîOâ$Š 3ž76G„¨± V»QŒíaû™d-†Ý AÀŠU˜½²Å* 6ã¡T¬ÂH6È0o–5A¥îØÚéD‚LPÃ0RÏ4«0Ø4␭nÀ~bnˁâIÀv¥LQÄGŠ® ƒl™Bw<<1›dI?15ôÌ$HÂU˜Ãõ8™™5™z< }Ÿ£díºžĀË » +C5J9^Ë*Ìg2ä˜fV¼†)OT½4ˆ KÂ$”TSŽÈæ„"ì%ŠÔ˜“á)´ªs¼õUóDû¶h›÷厎];”ÿ!LòU3”Ýc^”ÿ+Nâ9=V]ù-¯ëË"+tÿp÷õû¼+iW6?Xöjp áãS—ï8èu~Øæ"„¯+›ÙTE»+¯ï`«/‡ž…ÎdP›¿öù@ì¬Å(ovt2º¿žGŠª9Æ¥ˆM:âåŸýßvèæx,›]õ½¼ôŒš<´Ýo«º$ÅE`øŠsèÝç¿Å®N>ÿw8¹ïçÁ…²~ýǽ¨-µàðc¹{‡T¯šÓw€Ã¶C¢ÃÕýý NЎcæj~/õ–äÛa_vtwÿfME]•Í ÆsС÷yIiûý$vQU<Õú°öéNìœç…çúT5»ö[OmGµÝק®=¥²‹éÀwƒ•}•Eׯ²ôÒò˜ìù.¾Æ×e÷\aŽòâ+ùREޘ¸wí7Z*ÚñªKZß¼¿½aÁ39ä{Seߏ…êÛSÃ<ˆô\åt÷y-æu{bNßhñD£¬ÔóT“QîE±ë4…Ôýq8žgs…nOU-G‚ ÜVMÞUfô…&y7̾۝nðŸËܝ#¦•åoOO—ÓŒõåŽY8ÅJsèmٔ]^SÕ<¶ç $2ºåöôDuù\ÖâDן°â£ì˜(»®í^á¹†¼ØKn-åԝš†wåÒ/ZûÅ~,Õ¢©C›¹)¾ÖU?°3±ò×Áãõýépä|þŽOeoNÐRSºUÕ5íógÉ +s¿­Ë^Ñõ›tÜýx»i€/T¾µ±×e>é¡k¿`Óë¶8pBóé¸òðdd…«ÄÍXþfÛ]^Hr!¾ÅÒ4Ä_­@Dœîo›ÕŸ«!Ñ:3endstream +endobj +1503 0 obj<>/XObject<<>>>>>>endobj +1504 0 obj<>stream x+ä2T0BCs#c3…ä\.§.}7K#…4 Œ™¹…BHŠ‚žP$YÃSOÁ=5/µ(1G!3¯¸$1''±$3?O3$ ¨ÍBÁТM¢Ÿr =  !)f \C¸¹˜T&lendstream endobj -1508 0 obj<>/XObject<<>>>>/Annots 549 0 R>>endobj -1509 0 obj<>stream -x…YËrÛÈÝë+ºfO•/\¥$KvTeIc‘)e1ˆ%DÀ mý}ιMt_’ʤ¦ÆöÑá}?º›úÏYh&ø/4Ydâ©YÖg“`‚Ÿ¸?¾žåAdÒÙ4˜˜ÚÄaïÁÆÌϬM¡â¬M–@Ü*¡œ‚µ™ÅÎ9k†I+AÁ¦a0Sl©Ió>B팜Që!ÕÎè«#5;ƒD³ -ƒ%Š­Ñé,˜Âh8™1PA´ª1ØdB‹¤"›éÖ@"™pXˆ*Lќ{Va°³ ÓäY`m¯9šd²Ö,êÑl”ÑcA4kÉÑ 3ñW9!8™Ð{Gj 6µžU,¼G"<«0ØYD=«pm¢IÊ<9Vc°Q~à•Æ`S)“µÁ†,Ã¬ìž £;Rc†3ýž•lZ FÑNžUl2XÏ*Ì`óÍÖáI,ÍfË!À;¼çö:Rc:œÒ¨g¦ÃŽg¦ÃÒ[žU‡|óš5›LٗNVc°˜GTÖ³ -sõLYÇj 6‘ ãY…ÁN3v…g;K9Ž•$'!ŽeÆNµ@’ìamò þzNA¤)š žÔ˜ȂL³ -ƒÍfp×ËÊÀ&Y¶ؔ¤ zFSq·=kE§LȘ«+DQnö$å# ÍR -ÖfšÒYù 9±fsÚsœ‚t†äIÉr kÖc°‰wŠ5F«`„µYÁfé]é„Ç„×lˍ€íI -b¬–Œ˜TôÁD9á/Ž$ɑƒòPR¬Â`ÑèȄ—UÑ 1Q'Çj '$ö¬Â`1p¬Â6OèQ/‹¼,:í³ÆÈ"V6jëd5æHE©Ò7…0wv˜HÁâTךm ÂPº?‹XwR1Ž1+à8÷·ÏÉåÀB¤Ç2ì5; é¬gf‚',cÅÙS Ç'½³À9;râçÜ;ë9qv”³ÎyRc8+=©X…áì$³žÕ,|ÏkCÉÙh} E€eÏYߧ Ây“Ž´J3¦{%§ATª rÀñœ‚TÊëŽ'5³‹«0ؔK[± -ƒE¾RÍ* V."JVaä/ŽÐFžÕ˜Âk‹b‹+¦ŽHcn,^½¬Æ`±#umŠSîeÌĄV0Å -2Q"èHÁN¹b•(ƒƒÓ¼4"RP¨UA9QpÇáP!tF¼&{Òº -q9PU˜D­–ĪØßæÁ ‡‘!µŠ Gj ·`xàY…ÁÊmÞ³r^ƸbÊa §E´* Qìp(–Ï -«0Ø|ʊzVaöŠt¡cÅl„v’—€˜±È›u¬˜Q¬ÂczÖ6á(ár™`±Ó5KŠ#Ü6XTÌaŽ£“€œ‚ˆ{~ªHÁb;hÖªÚ'#†èoQë!†œ· ÏY9ü)‡ÜI¹r5¶Ï,œpUuÚìEûwTÊ1äÉpÿÚ±¤ Oâ%# ˆ»ÜD’w©3HÞ«0òŽæ?ë³Jód²H+ ×k<Áå³Â*LÅ< =«1؈™W¬Âlb‹ÆI4«0X\%«0€ÜÝ<+3û.±ï‹Æ€ÂÈ"P„+HX…aoU¤Ê±3 Žg­YYTÌ2oÍvmÙ,{Ì,³ñ«0X¹ë(Va˜EE´fkWvy@ãxIq‡ ²f=¦YžŸŠUŠQ.dÆÉZŸ¥K;ʘwv;9ö¥n1ã!fÇ* ÅhGDëXi–zÅ* S‰€œ¬u -ÏÛʼÚð1cÇ2DKØ9åYëÔ(‹­ ³žU˜.óÒîYé2ïåŠU˜.óíYY$!Z‰[<ÏÙ3X å•M ï§F€-ƒcå<'…吢ØˉJ¬Viy, pÖp±±åKM€X“‡ÛÈáE:Qœ‡Ì _ÍNNAæ…#î9Áák¶™â<Äã¹¢ä$‰ãÆC›}k“â 8¹üzÎCºÜã‡ÁÅw £NÁ!cøÊÀq2ùþc䤮‰½<ÊXþM/¹ÁåÛÈ{ -kÿw¥YŸ].Î>}™a­˜Å_tN³Ü,Vòý&~²üpÓ ]»Ú-‡ªm~_üŸÅF ígϑËŸþ°x©z³-ºÁ,Ûf(ª¦7ÏeSvÅÆTͺ5mc^ڟfhû¡ØlL_ÔO…)šÕH@p]=ïàÒðRŠ®Þ´ëýçÞڝùYA¬nû^L̹œP°½©^Ë͛iÊr˜?¾]_̯X±‚žª¬Ë˜)ç2Ï@º\wmߛùî©)sÙµ?{&ãÓþç´üܵ»­§žwÕJÊ¥‘â^Uýr×÷ûYÓ¡áådûði4°Þ52•(™£U¹Ý´oCÆö&Ÿ”ÍJ ݉‡sÎàQ}pÚ柽L;췇²n‡Ò\4M {åoÍ¢.‡“†ÀUé]IIHiæoÍò¯„Ñ{³7wó¯P׫ÖÜÝ/ÌÎխ쉢Áf)͟Â?7Û®Úe»á²¹³…V¨„©‹%ú ”Úæ3 Ì"1eßnvÜoæ¾[Ù¸¦Åf¤“UÖՅ|rU ÃEREü†'0Ç;Sõ.ÙàëmÛ E3˜;ä¶7Oíˤ\îºjx;îRŠ@éÅê$Šg|[k~{i®›e÷¶ó‘˜9”hÚæ¼´å -UìûŸm·²yÑ}ˆg6&Ô.ùÔ -«©®ÑJGEÁ¯€°p7Xsf(:.#Psuy"„J~»ºøã4J™Å¿Lùÿ“\¼(1Ï»-ó‹(iyåú:nœ¨ô¾|)k{=”©mÿRmyT±ý¾|ÆÉ<É̶í«_Ë%†à4R|#r¸¿e²ì:c=(ϔ{j¯ÍŽïWnvkƒ -ק{“î¢aÇ‘É–£äû”ÛD›~[.«b;ÃÐUO;vܺÅZçøN¼S¦Κ_E½Åùvuóíñ½lq Mᣉ¯·oóïßNˌo",œÐîàѳt&<òzâ$î˜\\·[6"ûз¶A§ÿŽôÁ×r8%X"»º1tËÈÙÄN…úN Èò¿n%ÌO_ðŒ‘˃ä"ọãŽNð Sž'¸jÌ¨ñzqöýì¿K›ñ$endstream -endobj -1510 0 obj<>/XObject<<>>>>/Annots 552 0 R>>endobj -1511 0 obj<>stream +1505 0 obj<>/XObject<<>>>>/Annots 551 0 R>>endobj +1506 0 obj<>stream +x…YÛrÛÈ}×WtíK¼U+˜¸ ŸR’e;ª’¯dJy؈„$ÄÀ mý}Îégš¤³©­’÷è /Ó·i@ÿ¹ˆe‚ÿbÉIg²®/&Ñ¿ñ?¾¾¿˜G‰L³h"µ¤q4ÁV–֒¥Ql8kÉ3ˆ;%”3°–Eê 3°–8΢ÔZ vG ÃN“h*Óy¡vANª jôՓƒ¥QfYƒÁ.²#ÅÎèlÍ`4ž,xPE´j1ØlB=‹ "šÓ¬D0á°"5˜¢szXƒÁ.& S`‘´Qs2ɏdYä'¡Ù$§ÇŠhÖ'E€ÌÕ_ä „àdBï=i1ØXÕÖ`°ð¬Á` ý ¬Áµ$“)ãäY‹Á&ó#¯,;ÕôxYwؘi8VA8ìÈÅIL‡=i1“2üÕh: FQN5ì<æak0;?Ò잤Zl. +‚Ã#7:èI‹éð”Fk0ÖãÖ`:¬µXƒápœÀ· Ùb°ÙŒuée-‹~Dfk0Gό)ð¬Å`305ì,gUÖ`°‹)[À³ä -ĶÌY©h¬ežÃßÀˆ0%"3y”[Ö`°ùîYmØ,Ïdž’TDâ$`*Îàv`èŒÁ™rteŠ(ÊɞMÙÆBŽBs€”µÌ¦tV$g Æìœö¦N.ã4õœž1sÅÀBQ@±ëÕÅëw L+Y=âãÝ,ŸËj£ßìð›õ«ÛfèÚÍ~=TmóûêßxE»g/¡$ÁÓ¯VÏU/»¢dÝ6CQ5½<•MÙ[©šÇVÚFžÛ2´€ýPl·ÒõC!E³9|¬žö])Ãs©ºziÇç^Ú½ü¨ V·ý@/&r©wlo«oåöEš²ÜDòùîíÕò­te±žªœËhUï2oOº\\_Q_;½CèßH>=0 Uó¤gOM¨?9:*¢€£‡ŽõbI‹äí¦ø ÃÔ×'Õ¶ü…R¨]Þ_­È\«J#Yu/²­ú ì¹èÊ^ŠïEµuÁiï¤/»ïew¦>s*`¿)QpéG5<«_û¦ú)ëm…¸ž‰MÏÄ»¶–Bn>-ÿûÇû'ü¬šÅOýçãJÿI¾ý!Ÿ–¯“?¤ÖQ嗦Ð +‘Ü?ƒÜ> +Š²yêå¦mþ6È}Û}û;}9öi„hÝîJ¹½Ñ8цÞµëoФAćmŸgP_öÕú›¼éÚ¾—åþ¡)¹îÚ=ƒñzü=-?uí~¨§}µÑtYg4¹7U¿Þ÷ýØkƼEòÏ^+–™ÿíkY·C)WMÓî›uù[¦¨Ëá,Q¸–)©Ž–²|iÖ%Œ,fïo?.O²‰‰!ÀòñÓJöp®nµ‹_ʟ¯â?—]×íºÝr|X2µDHêbü”s›BŒ­H>â$òµìÛížsG>uw®£*vçêtÄtu¡OnŠ¡x(ú³è⯠‘œÎ2_¬Íàë]Û E3ÈGĶ—«‡v&/×û®^N«‡"Pzµù‰â Ïcš,?\ËÛfݽìóÄÌK4msY:‰rƒ,öý¶Û¸¸ØúÀ"ŠÎqM¯Om02ê³è$)øsáãG†òçib÷€š›ë3!„ýîæêóù)µGþ2t¸¶ÿOpñ‰>Ûï_œ’†WŽ•Ó¦ÃIÿ—ëç²vÄ×r«¹íŸ«¯–ÿ×wop×NrÙµ}õój½FœŸ@ŽçêRoS‡³¥gÆâµabÌ¿gç²Zd¸>Ÿgt7‡»c¨ŒŽøÿíÓÜZú]¹®Š-ì CW=ìYq-Æ-<8ñ‹4-pü,ꮯ»›Ûw(7ˆ²Å‘4…O:¾~xY~¹;O3>>/XObject<<>>>>/Annots 553 0 R>>endobj +1508 0 obj<>stream +x=ÏnÂ0 ÆïyŠïÈõ’´sÜc« ÄaÙ P¦Uk+Jyœ &˖ÿü>[>«æ>/XObject<<>>>>/Annots 556 0 R>>endobj +1510 0 obj<>stream x•V]OãF}ϯ¸Ú— œ8 I¨Ô‡Á6j‚Z´TÕØ;ÓØwÆ&äß÷Ü;„¶*+±$s¿Ï¹gæï^HCü i6¢ñ”â¢7 †øf÷ëîKïlœÒt8 †TP8< fí§œî{ûŸq:îlÝéÞgœÎçoN‘…N§§Áœ&óþæ FRÊ5Ðd6 &ï„ãQ0:<8_öWg4Ò2E?Óٜ–‰kßÄý‹•¨ji( èG½¡ZÓ¢´µÈseBKikºÿ|}þùhù—‹Î|œ“ñ¹–I? àzÕB•ªÌœ—òø£E$¼ï„°õ͂)ûž«R˜-U"^‹LZÒ©w fUçM"üA"/4*å–~VeóBÚÐC©^(Q¶6*jj¥Ë€–+ Gv¹Õdu!9÷N±¯v—J< •‹(‡iMõJ¶‰Wp©PKë6šbÒ(t‘ÒV7TJ”ƒź¨\]w”] WcbyLñJÆkPT•Ñ•Q¢FŽª’e‚zc?îà½qºLa0 èB—©Êóß¼çù~gQ‘÷<R–l­Ÿk®ˆ6¡e£<4ÝØ0oÁ+« cöUô¨þ@ÖñÀõ8°moÑAÙo}öF=h¬ä:y#WÑGqzÄxcQ’T¨×LÂF¸b¾±2O÷DÎËÃÑ¥dÒÀ…ËØK^0U2#ª•BÀLçÖ·íØсL¶‰W$øLÒFF'‘°nl؉TĀx#êv`(fÇÉ Êôð¿B üxÃNÆ¡' C‰Ý¸D+\ë¿px;K8Ž°[I¹#1F_¡ù·Øò<XO¾8ÀÝD‰22ê[F’ßîÆ6–¬vL6R€É+YÌ-Æx҆iýaÊ3&VJZ±8 ¨®˜a–2¡f_ÎW×*–ÝØ ;ƒh3֓=o73n¸]¯%ì­âfQ^c¹‚wº¦nò„"ØbKA 5WkN§ì÷Ï:™x¨ýùšå:ù]ÃCˆ+¦Ýãÿ6ëÌ覢èúñËÝíÃ/­ñ(ôzµgü••Â~#l³†ûÑkÄ+õÇyaéàÐ%Æޙ®º%cFM}±°yՎ#$àF Ô$і’W±óq¬›%xBXiž¥9nw§Ý4À¢ å:Š¥(€°[idí4ó“kõS·%H;〞ú7çeÑÊ®ôŠú:Owꤊ¥©%¥ž*çw·¿Ý/n¾õKݍ¨Õj&N"q±äöé¨C¢eÌ.)?¸:í$ ´!Ú ÈŸusìc, a©ëîœÄ¡â}$s¼t^£vW CßP¢N›I}͕Ø—ïQÕ´×̾w›ŠE—Tå¬7lk+«TíäÛ÷±“e̶÷ÔçKd*š=BÓ4pÕk¶Ûƒ“ÇŠ²ß‘û÷û ÉÓÑa›WWà®A@D.ü$"~­Œq‡ÕÐY³BÌaÌE¶ÛCvÅrŒ½‡êb Rˆ Švmè¸)dyȉ‡›ÅïÞ_^<Ü-–Ì™WùÝ=.æûò vF©Õ¥¸©±  £SÁ7×)Ó¢Æå eÒ¦X$Gd†ˆ]Ï"Wø-_C.ÇXßbT»ˆÜnW„TãÚ*“c÷¥iJ{€âíOœW}íiã!ä -ʵàGS»¥Örœo 3õŒ÷.Zc9i-DúÔWî">g'äã¡ÜÅw cý²ºtÏ©Hd`jtŒ×Poš¿>ÿ&s/§ÿçí9™C°çܯí9ãrÙûµ÷äfŒ¬endstream -endobj -1512 0 obj<>/XObject<<>>>>>>endobj -1513 0 obj<>stream -xV]oÛ6}ϯ¸+6ÌbÙ²]ÇÎÀt]€ýÚâ!æ=Ðm±‘H•¤âúß÷\Rrl'†%Hk‹Òý8÷œsõõ,¥!~SºÑxJYu6L†4½˜&#šÌ.ðy„?+i&ó9¾>s0§É乃t:Nf§ogƒë ¥)-ÖÈ>]Ð"'di‘õ®Ê­Ø9²&/¯…­Hl„Ò´-¤¦i(+„ÞHz½ø‚H¨?Dê¹j•dF¯ãå.Aï‡ø}Né$&ì‡jy/MFø¥Û»«Åñ3Cꏸ¨‘r$h+Wý•p2'¥½´k‘Iò…ðTȲv±*äV›p9Q­D L•Úž´ñ´’$„*Ū”ˆ‚ÇÛ;99R¦cÀŽ¤µÈîÚ3¡YKu)üÚØêœVç9YK+¼¤öބ>—ÕaV"·¨­ºn#e¦ªU©ôæœ%>I,tN 7SrcmMEÎ46“I{ÿhŠi£Ð…¡R4:+„ô¥q>Œ #²´Æ*”äheÍÖIKœ¡6@”'Ux__¥ÉDYç/çÃtð*¡?$ºÎd‹è&LûûâA7ãð¶Ê-*@¸Ÿ¹ùS cÈ¥C‡<(Z­_>”«õZZ‰²»H'Èa”í°ÚNO¡úh€DàKà¯À½@Λ^€YèÝ|æh™yp­Â-JË0øö*—oÆ°+ÛÞtRøð 1mP¡QS£R$­…s[csrÍqPáömUY2a7Ýr5CHKæ82u·ÊFF ®¡-ȅÅÜO"7ÒdœÐÂî¨TÎsøÀöàCM{t76µÓsa2e¢ýOҖódü¹pÉg¥âûïã=«=W˜…L)&B<ëèÒúÿ‚£¸Â4eN ™B~×Íüqÿ^sB7‘:¹Ñ?{îRC-•ô˜Û†­CéÌX‹q–; é›º£F'÷GjàGü¨™"¥3<„†m3s¨³çt5ÉGX¤·ô^èBC÷|ÇѲçM8â@-wë»ÍòuWQHÛQVKAvK¥|% -Èà ~Ûd&WbG`{êº r²òkãf×ܳl%á`p=™ÀE±'åľ`œh´=\¿ÙOt?íãqöØç -–‰$”K“u šî´†Ë°k$ˆ]êD6 _=,vwR—ÈóŽÂ¦ö,£þŸ?q0ɖ€ü9k Êó ƒzØò¡°{|ƒ%i£ûžÈu·|»xV;“¨Éï}­Ñê[;×àé%>ú(–ÁàP.¬û :ÿ}A7‹]­`Ûàõ~VN}.&ë¢ô€ -k Äfø}šåÊ[Láѵ‹Jæ1ÀÚkû Œü“uñ|½°ÑõéÛ–CæÞ "Ùaá‡BÑ~émj(™p>† ª'ôØ®˜°%C|Ap -÷ë*°Jéã$J}áåæTº×€ü&ªš_1‚1¡fL€Ô\A¢*ìáP^i6p÷XŸÃ^A»Œ|œßÕòòIEKüS BºǍq:¶·ü¸-Þ>/XObject<<>>>>>>endobj -1515 0 obj<>stream -xW]oÛ6}ϯ¸ËKS Vldz“ݐ6 `]Úƛ1À(@ITÌY"U‘ªê¿sIÊq”n芮%ޏsÏ9—þr4¡1þLh1¥ó9eÕÑ8Ó|zžÌhv±Àç)þo$þÁìbšL¿÷àürñüěåÑÙ ‚OhY ÉübA˜`<¦evòöÕz½ºýãúnu¿^ÿòrùޞķ/&ÉåÏ8³ÌO´tÔZIeí&¯hÿ¬l¾ÊF‹JâsmLÉ_¨L†}ÂQˆ1šÎQâü`ººQÚQ¡JÉ BÈY¬êYHYÊ´Nž’iÈJS%IPÚ>³Ú4î§à’&èAÏB9“džÐj#Ý´Ü(ý`éÚèŽV¦Ùþú41ÎMɜÛXn¤¦i©R‡4"'·Á€P1ýv·ZÞQ¶µ“ ]+ñ U–*ã—n®>&œÏ LÕ:U–ø»Í¶ü\“kvü³#çäÓFÎJ¨R©¬ãNµììCcښÖ'¥1[R8‰ðŸÞ]]¿G^É¥Ã!»~™Ð½¨RAa)•HaÛ,“ÖmYîpÐ:Q–2'áIÝÆ´…[2Y夥Î4eÞ©x[C•Ø¥hÁTÒhI,ðI6Êq ՍIKYùæ9»i2¼MÊ%ô7ÈL[惬¢Dd¦÷³Z­|fr†l&4¥@)k[ƒªøËݍrõ ­Kb°žr«~V…úæ_Ž%ñkg7óȪªK)ì€k'Oܵu’íSæ&k+©pÊhŒ€¹‡†3‰Žr¹~Éå2$¡ÂAƒOc²ˆ£´l½ñ5ò}#g7 -¤h;y¤í3ÍL-éöچVzxž2cÞìÀ€B´¥‹ã¤ !¥¥Ð[`N'L| ͍‡`¢Ÿ[§tn:°Å|ÙªçüT6â«×cˆAk·×{rCL¯N@Ë@ƒ*H=zZ7ÔÔ±´ãë<ÛðžT -~A¶J“Ìèb×Ô<ˆ„®ú>¼WúÒ#[@éˉu⤵·¨žrƒ2YÖ`*fœï±²ÿ?“iB¿›l‹°ÿ1‘;’ÔmT¶ñ²qªÀ™ð³qÐ3ävS Ù¼ÜHXÛ†ë ¹]ߎq{¡ÌZ6è°¤éèß¿ƒÎÙ¹yìlX &‹tÇÜl“÷iè†z1N愠¬T >CƉñE#ôƒçzºcÀŠ^Ú;bHe‘P2ÒH|œK½£ -R±Çøì­°–™*”BÇ Á^€#ùô¤~4Yv*³Ôê6ü§†úqCª(#¯˜ÆT~Ώ­Ç« €„þ‚,Á,þ”à©©À+z -çƒ8\ƒú ¬aø¾È´+×'p†–k±;ëà‹+8ª +ʵàGS»¥Örœo 3õŒ÷.Zc9i-DúÔWî">g'äã¡ÜÅw cý²ºtÏ©Hd`jtŒ×Poš¿>ÿ&s/§ÿçí9™C°çܯí3Æå²÷kïäpŒ­endstream +endobj +1511 0 obj<>/XObject<<>>>>>>endobj +1512 0 obj<>stream +xVkoÛ6ýž_qWl˜ IJe»~äÀl]€}mñ ó>Ðm±‘H•¤âúßï\Rrl'†%Hk‹Ò}œ{ιúz‘Ò¿)ÍF4žRV] “!MgÓdD“ù ŸGø³’6á`²Xàë3ãqšLž;H§ãd~~ðóòbp3¡4¥åÙ§ó-sBæᐖYïºÜ‰½#ÛhòÒùZ؊ÄV(M»Bjڛ†²Bè­¤×Ë/ˆ„úC¤ž«ÖIfô&^îô¾‹ß”NbÂ~¨v™÷Òd„_º½»^ž>3¤þˆ‹êñ)G‚vrÝ_ 'sRÚK»™$_O…,k«Bnµm—ÕZÄÀT©máIOkIâA¨R¬K‰(x¼½““#e:ìHZ‹ì^ =šµT—ÂoŒ­.iÝx~P“µ´ÂKjïMès)Qf%òx‡Ú*¡ë6RfªZ•Jo/ÁyQòç³ÄBçÄr8%Ç16ÖTäLc3™´÷¦˜6 +]*E£³"@H_çÃØ0"Kñ`¬B‰@ŽÖÖ윴ÄjIyBðW…÷õÕ`PšL”…qþj1L¯ú]¢ëLƱˆnÂt¸/t3>o§|Т„›ð™›o0µ0&\:tȃb Õæå3A¹Úl¤•(»‹t†FÙ«íôªH¾þ + Ñ{伉à˜…ÞÓ»Ï<-3®U¸Eiß^å²ãÍvÅaۛÎJd ¦í*4jjTŠ¤µpnglNN£9*Üᢣ*K&¬ã¦[®fiÉ<G¦îNÙȈÁ ´¹°˜ûãIäFšŒZÚ=•ÊyØ^|¨é ‚ŽâàÂÆ¡vz"L¦L´ïãIÚò`‘Œß  ù¬T\cÿ}¼g}à +³)ÅDˆg]ú!@¿£ñŸpW˜¦Ìi+!SÈ㺙?îßkNè]¤Nnôž»ÔPK%=æ¶eëP:3Öbœåhú¦î¨ÑÉý‘xÆ?j C¦Hé ¡aÛÁ̜êì9]M`ò –é-½úƒÐÐ=Àq´ê¹dŽ8RËÝæn»zÝUÔÒv”ÆÀRÝR)d‰28ƒßÇ6™É•ØØރºnƒœ¬üÚÀ¸Ù5,[K8\ÏGfpQìY9±/'mO7o=Lûtœ=ö9¤‚e" åÒÃd]‚¦;­á2ìÉb—º‘ ÃÀW‹ÝŸÕ%ò¼£°©=˨ÿÇ E²% ŽÀZ‚ò<à¶|(ìß`IÚè~„'rÝ­^Ç.žÕÎ$jçHò_k´úÖÎ5ø_z‰>Še08–Ë«Ä>¨Î_ÐÍr_+Ø6x}˜Õ£S‡‹Éº(= ÂZ±¾cŸf¹ò–Sxtí¢’y pB„öÚ!(#ÿd]<ßF/lt}>ä¶å¹€w‚H`vXø¡ÐS´_zۀJ¦œ!ˆê =¶+&lÉ_Ð_œÂýͺ +¬Rú4ɑR_x¹9—î  ¿‰ªæWŒ`L( 5א¨ +{8”Wš-Ü=Öç°WÐ.#'ä÷µ¼zRQçÿÁ”ƒnÀqcœŽí­?n‹7Oß.¹·Ÿn/‰} +ÿ*½øþû¸¼äx¼"†qßàltIŸn£K’>K’äD%QŽ¶ +Ϩ2ë)Wîž!·/7üËÕju÷îãÛOw·«ÕO±Ÿn%ÍÓdÑî$ϤüŠVø‰rg„ã秪ŠÏÖ—Uãý‹Ë:*hÞÚ`:Å{ù|LÓé".ÇÛë?_Ógk¾€EôÖdM……(˜P\c¿{ ?.xgž½õNf“d6Ç}šù‘_—¿]üá¾°`endstream +endobj +1513 0 obj<>/XObject<<>>>>>>endobj +1514 0 obj<>stream +xW]oÛ6}ϯ¸ËKS Vbdz“ݐ4 `]Úƛ1À(@ITÌZ"U‘ªê¿sIÊq”n芮%ޏsÏ9—þz0¦SüÓ|Bg3ʪƒÓä”f“³dJÓó9>Oð#©ð¦ç“dò£góç'®'7>¦E$³ó9-rB‚ÓSZdGo^­VËÛ?¯ï–÷«Õo/_ðö8¾}>N.~řE~¤¥£ÖJ*k7~E+ügeóM6ZTŸkcJþBe2„èŽBŒÑd†Êç'ÓՍҎ +UJNBNcUÏBÊR¦pò˜LCVêœ*I‚Òö˜Õ¦q¿„4Fï ÂèlÊ'³„–ká趠ÅZéK×F¿p´4Íæ÷§‰qn2OfÜÆb-5mMK•zX;¤9¹5„ŠéÝÝrqGÙZÔN6t­Äƒ6VY¨Œ_º¹ü˜p>>/0UëTYâï6ÛðsM®ÙòΎœã3L9+¡JH¥²Ž;Õ²³ikZ•ÆlHá$Âz{yýþ-x%—‡ìêeB÷¢J­…¥T"…m³LZ[´e¹ÅAëDYʜ„$ukÓZnÉd•“–:Ӕy§ràm Ub›¢SI£%I°À'Y+Çý5T7&-eå›çì¤Éð6)—Ð?@ 3m™²Š‘™nÜÏr¹ô™É²™Ð” +¥¬mQ ªâw,w7ÊՃ´.‰ÁzÊ-ûYê»9–įÜÌ"«Ž¨.¥°®>q{ÔÖ9H¶K™›¬­¤vÂ)£1æÎ$:Êåê%—ː„ + >=ŒÉ"ŽÒ²AôÆ×ÈCöœÜ€¶N íø‘¶cÌ43µ¤ÛkZéâyʌ¹Ú‚…hKÇHACJK¡7À2œN˜øšÁD?·NéÜt`‹ùŽ3U Îù©¬Å7/®ÇƒÖn¯wä†,˜^€–T6zô´n8¨©c!h "Æ×y¶/à=©26ü‚l•&™ÑÅ ¯©y ]ö|x®îô¥G¶€2Ò9–ëÄ1H joP=åe²¬ÁTÌ8ßaeÿ&“„þ0Ùaÿc"w $/¨[«líeãT€3ágã gÈì¦2²y±–° ¶ ×rÛ:02¾ãöB™µlÐaHÓ-п…ÎÙ¹yìlX &‹t‡Ül“÷iè†z1N愠¬T >CƉñE#ôƒçzºeÀŠ^Ú;bHe‘P2ÒH|˜K½¥ +R±‡øì­°–™*”BÇ Á^€#ùô¤~4Yv*³Ôê6ü—†úqCª(#¯˜ÆT~Ώ­ÇË €„þ†,Á,þ”à©©À+zçƒ8\ƒú÷ ¬aø¾È´+WGp†–k±[ëà‹+8ª þÃ~Ž‰¡ ŠdN¥ëØÆ µ„¹Ø(i6Kæ1hŒƘå-ʄ›J !J^_ Æ1ùJ)xP…Èž/E„z2\ϏÐ|äÓ!’‹ -9§ŸÏ§lrÓÏóÙ)ì “ÌY†ðPΉuwï‹tíqë™n4¬Å¶5/xØÔ>Þ'b‹²žßŒCm¬U,/Ô¡à-X¾æF~Áb¶,R,..1¡›(APŒ9ŒõƒÀR=Exދx„<Àž½ ð©!iÃԘ:|9IöL° f&‰“~eè˜0qzž—;ó€`ތÅÈG´BÏ^ðG ,]c@Þ &*öLs -z‘Óýå‚ï ÞKci§¹c¯Ç àÙa_»áž¸–iëò-ÓN잁Åe ÚYÜ\Ê×0 ƒb“çéòíÇ«•™¿câu ß5¸Ú-‚ˆÁhxÞu-ôːwÊm¸÷A?(è@Ú¼A"þª‚=Ëô9pSò·ëܼŠu–pY9¦äYêW¬(+ã×-B³}iÉW5z…ßôw¨÷à¬ÔïòÊ=Py%¶`aØ'¾É= dÛ#ÀaRÅþ}5Ì ~•¸ÓG•Ð³‹†'§Ýﱘ×¹üV—*S~dv*öÛ)´sŠ«;ÐðäØXÚt 1ï}¯ivˆ­û•¿ï8̟5ÁF ×ô½Ñ)å/¦ ¡ŸG®¬`×@‰ö{(õØZÎqÜ?y ß=Ž. _Än‡Ç«frbÛ1ž]¸sÿë#úÚ¾GÐ7<ð›]®Opƒß€”åXaþŠËŠl®±Q’…¬tm£ýݔ7Y™ñ=»¹ˆ—àÉ?6/Îi¾ð¿rî¯Þ¿¹¢ù‡—Æõᅗύú×G‹ñ%ß7à×Ôl1Kó‹ð£r2æ0ï–GþØCÞ¯endstream +9'ŸÏ&lr“ϳé1ì “ÌY†ðPΉuwï‹tíqë™n4¬Å¶5/xØÔ.Þ'b‹²žßŒCm¬U,/Ô¡à-X¾æF~Åb¶,R,..1¡›(APŒ9ŒõƒÀR=Fxދx„<Àž½ ð©!iÃԘ:|9IvL° f&‰“~eè˜0qzž—[s`ތÅÈG´BÏ^{ðG ,]c@Þ &*öLs +z?1"Ç»Ëß¼—Æ0ÒNrÇ^AÁ³ Â6¾vÃq-ÓÖå[¦Ø>ŠË@Ù·7²¸¹”9®aÅ&ÏÓåۏW+3ËÄê@¾kpµ ZƒÑ$ð ¼ëZè—!ï”[sïƒ~PО´yƒD üU{–ésà¦äo?Ö5¸yë,á²rLɳԯXQVƯ[„fûҒ¯jõ +¿é÷î„QïÁ;Y 6¨Þå•z òJlÀ°O|“;ȶG€?2¤ŠÝûj˜ü*q§*¡g /NN»Ûc1¯7rù½.U¦üÈì&Tì·ShçWw á/È°±´ébÞ»_Ó6ìZ÷+×q˜?k‚®éG£RÊ_LAB?\YÁ®íwP>ê±µœã°ò¾{]¾ˆÝŽW ÌäĶc<»pçþ×Gôµ] oxà7;º\á¿!(˱Âüÿ–-Ù2\c£$ ?/XéÚFû»)o²>2ã{rs/Áã~lžŸÑlîåÜ_¾¿º¤ùÂKãzÿÂËçFýë£ùéß7â×Ôt>Mæ³óð£r<æ0oþØMÞ°endstream endobj -1516 0 obj<>/XObject<<>>>>>>endobj -1517 0 obj<>stream -x]R]o›0}çWõe´PH°§‰,DªÖ%[‹íirÌe¸16ÃÎ"þý.Œ½TÉÆ÷ø|ñ;ˆñ#[c“BvAFHã(\#É3^¯ùM°­‚‡}‚8FÕ0$Í3T5x<ŠPÉ{)´vðž´†ÔŠŒç}+<è £o•ùåpü¾¯^ƒ«u&|Ç}ÕIkjÆ ç`h+/ Àóñ]MfDgkrw!à‚e9ò8¢ïµ’Â+kpkÉ@y؞Œƒ@£4±´…6Þ°9¦­ÉÓÐ)C<Ï*ýØÓL-¤$áZ{Õ5ÎL¤µ½Q §º«ö½:=â¦|Ë,ŒašÅb`Aî‚ÆowåáÇÏÃñP~À¼|.‹Ý²<=?V%ìðï xzš]²ÃÉ¥ÐÎÂõ$•àhm׳ͳÒÊ/‘¼¡™ª`¹3Åþó–ÓY6»ã˜ýÃ>_zŒSî8ß Ï§D^Š¯ÛßûJÒcgåµãçL'ŠÕÿéU}œæã0 qšÂ{l¸îË1ʼó8ÙáòiÂ$YfiÎ?Ì4OŸÊ*øü³$¿Uendstream +1515 0 obj<>/XObject<<>>>>>>endobj +1516 0 obj<>stream +x]R]o›0}çWõe´PH°§‰,DªÖ%[‹íirÌe¸16ÃÎ"þý.Œ½TÉÆ÷ø|ñ;ˆñ#[c“BvAFHã(\#É3^¯ùM°­‚‡}‚8FÕ0$Í3T5x<ŠPÉ{)´vðž´†ÔŠŒç}+<è £o•ùåpü¾¯^ƒ«u&|Ç}ÕIkjÆ ç`h+/ Àóñ]MfDgkrw!à‚e9ò8¢ïµ’Â+kpkÉ@y؞Œƒ@£4±´…6Þ°9¦­ÉÓÐ)C<Ï*ýØÓL-¤$áZ{Õ5ÎL¤µ½Q §º«ö½:=â¦|Ë,ŒašÅb`Aî‚ÆowåáÇÏÃñP~À¼|.‹Ý²<=?V%ìðï xzš]²ÃÉ¥ÐÎÂõ$•àhm׳ͳÒÊ/‘¼¡™ª`¹3Åþó–ÓY6»ã˜ýÃ>_zŒSî8ß Ï§D^Š¯ÛßûJÒcgåµãçL'ŠÕÿéU}œæã0 qšÂ{l¸îË1ʼó8ÙáòiÂ$YfiÎ?Ì4¿ž>•Uð=ø ³.¿Vendstream endobj -1518 0 obj<>/XObject<<>>>>>>endobj -1519 0 obj<>stream +1517 0 obj<>/XObject<<>>>>>>endobj +1518 0 obj<>stream x•WMoÛ8½çW zi 4Nì¸qvo›vئéڋ\z¡%ÚbC‘Z’Šë¿oHêÃJ/‹ @"‘óñæ͛ѿgsºÄϜV ºº¦¢>»œ]ÒÇ«³ZÞ¬ð÷¿NÒ.½˜Ï–Ó緛³‹»ßhqI›L]¯nhSÌ\âIñîS%š ìзVÏôÉYïiÝn tëìÁ+³§‹ôüýæÇÙ%/–°ñîɺ罳m3Û·ª”|èânIóyry¾¸™-ø¦RžJ[´µ4|e[]ÒV"~Q’2TXó£5EPÖÐA…j°+LIµ8òá ž¥!á)TH[ø@Á Ä]S°9ÄùUò©êFKöÇYl»tD³ô1KOlþ‚¬£üüÐeæéû;<.m-”ñßßÏèéþaMHƒ½o%{·VÓκ‰_'½ÕmLÅîèA†Ûû¯k2¢–¸kéþ‘DYJï¥l>|݆«_dÄ#†+I+¸©£æäÏB6¶G:ˆãÄ)<±vëÁµ¦ÁµY>¹¸CPŠäïôeMOʔ¨1ø>0Z0 alTd§ö­C<°iéð6ÕæákŸ•}ÁÍ§Ç‹ûÇ­E½çW“ÈËB{K¾mëÃ,k[JBìÉ>ª£eÖÎW™BWË÷b6ŸÑgå‹Ö{d/§T[Í®9¿;å|ÐÇ$´§ RsqH8Þ ÌÀ¶õ—[Tz-gò¸‰½¤[m‹çïïó)OJ>=I¯Ù±´§ì·±ƒ: @@ -2748,50 +2743,41 @@ alTd äå>½zQb1(¢j¥…ãt =̺ sAüÑã8ÑZ}d#’ËWX͜B+$¶fL­)®k‰K’ "ƒ9|O‡JbE èD2‚ÏýåSwYTÆj»‡€ñi¦Eƒ‘£¶†êm™Ã$ÅS1BœÖH´ìýY‹¢Rø/τ¨ÐÉ—õ#Ó $…?²%²2ýH˜¸“æE9kŸïw¸YT]š]•8Ñ@Ɖ¥Â[OöEaLÓ"ÅëƀA꘏Pï×Úcææє˜ÐÇÇa³rEÙ›£¦°±®öµÞD¿³b’fÏåHÆ£mÝÀ”ÒrZ{ ƒgðG8sPhç’ç ܏[ð nuPç™Ó=z-Á€¬úãPû$&qòøŸ§44¤ïv ¤ Œ‘‹¶;NÓø5Úu“*%âd£!#±x2HV<ˆ¤ÛV?w<³*Pn+‘NaëZ… Ë´…°ƒj>(­'Y)Kfch1F»1ÇëTÊ«}ÈØù=¥w…Å431ÍÎ#ô£ˆ;žKax¤ŠÀ­eÀÓÇ6´DG„+&1«„cÕ ÷±Ê€ ›rDt¶rR}t#'«´Êbñ* ðJ¼ÈH‰ÛH lf¯ûÄGaãhM)Lqä AdõÀ x7EãgV°f¡J]#Œ¹1ñʺc=Õ¸³~1ÐEÌK!o>cŠòPˆP§&B_h…ýðºöи,B§e -‚ª[`~*qˆŠä3ÖMüÙÝL $Ë+CmÃŒ¯_Œ¤î"(-¼¢2¹ó®ÌyŒÓÐK®ú©ýÌ/ð TBw0Æ@ }ÄÐ̤Ÿ.,ž`9JÓ`Mh1Í¢éñšõUXE¡oÕ.®kR#ïPÚ¿%_H#œ²X½s-»fù #?NCˆ;”«1j )è,àNkÌ`nHº5Nj%xÚàìÉvTbEùºKb×EìaB"e0û_°Æ²5F¢¶8‹†æ©VÛC\T=t$4i¿_(¨´¥ã‘(_!ÌQ䑸€íd✿~E%–½3þ )X’X3vDl ÝÍtÁˆh^ÜÝ i׋ôÁôÿ>é©ûT>ÖúÀåj9[]ßà«ù|Á©ü¹9ûvöíñƒendstream -endobj -1520 0 obj<>/XObject<<>>>>>>endobj -1521 0 obj<>stream -xWÛnÛ8}ÏW ú”Ž|IÖI ìC²iÑÛË®]ôa³((‰²ØH¤KJqü÷{†¤dE1P`[ô*‰3sæœ3ß'sšáçœ.t¾¤¬>™%øçr–,èâê_à—•TœÜ¬O¦ïßÐü’Ö>Y^Íi^ŸÍh.’EB̎RkvNé ­Îe´#¡s*ñ¨1”Ëmeöä‘V’¼^ÿ8™ÑÙb–\à¼S<—:÷ûƒZÜJÔ©à·§ï/hŽàœÅÙâ2Yòw׎ÏldN"5rBWôMé¹P-²RiéPÇF¹FZjJ©,}’ÍÍÝçiQãáý©Jdò–Ÿu_ø'TKGÄLççÀ´*“Ô췒”&³•Vp½÷¯ÉhÎÆ6Ônº®œ™'Èqä“ȪeSšœÒ=íJ••È@¹:$Ž…oÄ’ÞV)àõ\¢®UÆsp$êDæÚ4¾¤Y¥¤n¦\Þ)‘Y*¥¦zÄÝ}ZQx8Š)òÜJç&ÈóÙù~üðyµ^QeÌC»åt¤ææÎ@t‹Æ!âè†3Uˈ=ûB6Yã.–wڗ '94èÈÕùºµæK¢ª^":ÚI<ŸÜì˜(þ‡äFKÆþëí—Q¹  È´IhÍ-QÈë{Ó§^s7+“‰Š\›jÙL¨Õ°¢|ß:tïV aŸiPÇÝ8v„Zº„P½kA §šÖ̑×m­yT9ò €Î ’äX/±¡êZìÑinD¦Òj?ªVé2c)ëñDYœ®)ÅÊÚ4r(-Tº3öâ "e^ÅׄÖ _ÑVX ‚Þ¿·ö›oä3Ò1ªÉqÞÒN¡“x;”wˆaíÕ½S ‹H™ÑÅíÔ»bD·"{£LhƚÖܪ)[>£ØCî®|BúŒH°²ƒcÿø„h“!ÀáS -Œ=”ê|¹©,ïy&A%#VÅ7{/g·A–ðc@q`݂;9™¡fÿó‡gF7ÖTÌÔ+"ŽFÅôÞÅ’¹Ë‡Áj9ª¯ÿ(’÷§ë T¸~×[!|«°¦î” {?Œ­ŽNò)+…Þð7CÕpXX-Dì dJxî~„\€O4^U{2iÃø -ä]o+(ç ªUÛO·¦è> ,b–E"&ô·œÏÏæ¿FHþœrÐ[)+oMý‰£hȉQ\0„£Œ9p³ÁEÓr*…ÿWÏî –V‰À!¢jKµ)%$ÝnUc’E¯ ÞpR+<…Œ“™ŠP§ƒ†ü'àDÒÅÃÈb×ØTNºÏl<ʨ±xÿð#SD¹Žº±Ï|\ç‚5˖É— XÙ:'”¶¬Jç—,7]Ä£P•HUŤ÷µ&0*ôˆñpHXіãQÒÝŠÓbz˜ñ”Î|®õž5P¨M¶ À¶¤°Š‡—æ~Ok/ZLx—SÀcξçB-¯™à’‘ö<å_ -¤¥o,Ï«f!G?l:ðN<§Ç“…Œ녕†ñçÚíÖXØ· Ét ŽÍcÜ^g¥ÑÊùÑÉ8Šoz72ñõ‚vÝl‹gðáƒñÆk 7ÇÕiÂhS¡*µïQê&7›zp$ÿþ17ÁM÷󷣯Õ8Éʟ-ëePW¨ÚöeÇdQÎÀbR«ò Œó»Ã›-3XÈ(¸“<Á¹]Ø0ü˜³ÞÒ8¾Žã¾›{pÏ ’0ö0§ÂE)ö·üÅ$ÑØfG!¾¤¤ üÒ´0,Xf Îôy3ò¿èO¿1 °ö|9 Ggìö!CÐ -ך0¼6с(;eÜh'þFàëÇ~”ceæõ7p-,ˆ£°>!ϹÁb‘ïèjFtì - -KfhTÀòhØy")W3J±îüèˆ>¼™u¨>¡±³Oˆ³œ¾ÇÐß·N§XΧ%¬×…ÝEì÷ ‹3Ú[çð¦xv~ÖøEržÐ×ÎѬ¿Ã>yýrQ|~üàž·4ùȂÉúîÕ×:¸Š×I·÷ârâ†f0åa!òwAVÛ¨Aè6föǎeÉÃöX8žÂ 8вûð™g¸·ÊoºKmŒâÑBM¿“Hà0INÿȤH6Iù/%I¾ë ƒæ¯Æߍý"\Å>Η¸Ù_ÓrynÏ«ë7×ôžЭÉÚDóŽÉ_žuœ]ΐcþ¿/û|ýÿÕõþâò"¹\^ár@ósŽÿn}ò×É£d›Íendstream -endobj -1522 0 obj<>/XObject<<>>>>>>endobj -1523 0 obj<>stream -x•WÛnÛ8}ÏW òÒ¨Ûqœ´À>$èeƒÍ¥[»›EAK´ÅF"]R²ë¿ï™¡d;JP`ÛÆu$q.gΜý8Pt6¤“1¥åA?éÓiÿ Ÿ£sþâÇkšË“áy2îÞ¸œìÓ[šÎaj|Ž/ÁL¿OÓôˆš?^—®Ò¤¬uµM5ýA*™%i’ßß}ùëӗ»¯Ÿé_Ì“E’ï.ýGI’¼ž~‡‡ ÑEo8†‹£u®½~oŽ÷o&#¾Ý˜‡ÇŒ»O !ßÞà$òÃ&6 >èúæ’Ž®]ª -ºQ¡ÂåKïÖAû‡×tõ™T–y¹øøÌ;•¥¡Ú]Ÿ‹™&e««µó’FÏ¥~·u÷ª¢ÁÛa2Ÿ'ƒdÐÓo}¥®.2šiZ˜•¶¤ÂÞãÃÓS4Ä ü•*<’ œïžGB]êŒ*Çv†#š™* QOڟþÃë„îsx` :E+µ­`–J•i¶ÂÄäR×Y‹ÑKX^i¿¡Ü´µ) -8J5ò"Wû-EØ[HhšÃ#þYgÂFªÉuÒsç5»ìí%XÛLãÕ¬@\u…87œ©…ñš9­5eŽnï¦ôhÝZRدè“hÁƒ†|-¿zû¤Ù÷·¼rËÊ8 &1Se9¢†kœ­[[bz,¼«—±è ‚{GË ºšÓÆÕTÀŸKú{Ùï¬XUʗLð1+(ßêêòênŒÒÜX€„3!C#PÄR8÷hì‚ -óØu+Œláp[x€·îßÀ‰dƒt9T  ㊚¡ ¥w¨P ÎÃQÈ[b«•3™ÎÄßÒàŒÛ]?Ş&£„¾Âd“Üᗨ*±;i²±é!-•G.hÚ§eRÃ3¨º} -Þ6ÜÑØže¡„>9;gò! 雭|!kepð¢U W?k¶œ{g ¼˜êU y¥0ÒU.E™¨r¦Ø`BWÑ@w·×ÿ0qá‹â}èÚà3‡0ܝãȃ)ë¢RV»:±Âò†2H0 µ(è÷[+RÃqœ‘B•ú¹…ü÷¸™Ð(òv ô†MñžÜ ç¥ÚI|;(8›=‘þ]×ré‚gtXD‚wbՑêzM¤û˜l íèxº¥ãýÕíäy áÊò3ÐÛ&‰XL¹öÍùot3¡{c3Бn§4‰EæÛ:È#7‹„Rº¥âN¡,£à[zµíõÓ"ÊìÖUn¡…»k =Rrñ[µYjZ©¢Æ´gü \tî–k(?©ÇüÊ`ˆ›®ê3ÕJ™‚58!½xÇD~)„Ì “ - ñ ª­ù¿G\- ¤ÿ³‚Ä9\iU÷¢!´Æ³0—¯­eõbƒ…²¥²j¦xKUžMµ¹<µM^ªGÜÍ$K$j鍷™±èIów°‡õŒëaoch¼=Épˆi3lì´mw‘Ø֑@ØÁ Éð;8¥±©4ÖÔR¡í¢ÊyPF©m é B`"ʃÁêŽòW6ÝÉ ‡u Ôk ø °¶þšr\؍|ó,{™Üy„ÿÛn€‚,þ…ka©0Œ›å¡ã{p -2n}%d°!½ŒÄ~Lƒ ->›uÖâ͹E$ŒK¤ã,–›ÒÒ~<•C……‚Qj웗D¡ɆÐ7ÛÒr^PZ^‹ŠµÂÊÂÉn‰Å9ªO'[vÊk?!Q4 áÞSº˜ (“"¹Ç’ÔR‹kŠÃ ʵ[@Ð[&oSËSÇoP+`»¶QåÕ|nRaú‚ËŽžÔ?—:3žC"qbó -lšç½µ/aoºs^˜ŒX:Ž¥½Tê6çV‰epA#i|$½W1٘œELX›°8¬xE •Q3Nþ-T(0öõ¢+‡<ÁÍ¢ö8uX”¼q†Cš›‚IÈìå‰ DìòPd¼cE¡—q V³ 9eÆuz‘A¢NR@6‹Hk¿t`О)“²Y4¤°»@hÉzÁŽ1˜_aã•ÿb`»»h‹ñOŒJ±ó÷òú’¹R!¼ -pgFïüþÂK—ð-×Å2FË ¸ -leæX“yPÀJB—]83=7ÖÈ'%“íW?€‡"q pŠz ehìv)Lè–_ÿrŽñÅèd›ÁjþçÕí§yÖvIq݈Þ´çºâۙ ï€¨‹…bX -Qk“‚ò94MZ{SIžÇϛ÷ÈÁï¾ç'x›ÅÊÉ+ãäâæò‚>{÷S‹Þ»oRX‹Ž´×èõùý÷èÿoª£³Qr6>Ç+4ŽFlõÃôàïƒ_©endstream -endobj -1524 0 obj<>/XObject<<>>>>>>endobj -1525 0 obj<>stream -xWÛnÛF}÷WLýRiÝ,Éú`'Na –܈i4E±$—ÒÆ䮺»´¢¿ï™%)[´…o2ɝ9sfæÌðï£õñ5 éFJË£~Ô§ñÅ Óx6Åç!~¬¤<ÜŒѬ{ã*>:{7¦Á€â¶&³)ÅÁN¿Oqz"õƒ²F—R{Ú®U!ɯ%½½½‚Ù\ZGބ+¥p^ZJöÖ>æÆRbÍÖI*”ó¤4®”Â+£Éèb½Š¿õét8Ú8;ùˆMNŸnæKÚª¢ ­±÷0h­L}± gHåtýûõ‡/”Š!ÅoîÎnîhc7©)Èy‘ÞÓZ8J¤Ô 'W«ÊʌqVðôßÁ(²ßàÐIû 홋èRïZã~-|°¥ÿ½rm¡FÎ,(]Á[í”Ãíx3"KA%ž¥¥+0ekŽ _)v4çÈi%=›½×fK"1ˆõÝh ¶zTŠt­´Dnp¾ãw-$q<µ/ÉÔl•_“xF.TQƒC‘eV:G…1÷Ն„÷²ÜxðŒÌ€T¤>dÄ[,ŠŽc~F¢$@r"8»ÈV(‘¦lZZk¬ëÖElÓHKQ&‚ÞC¸ß* „t¼Uڑ«6c=ýB;éŽÛueqAPÎeüǪ0‰(ܟäP_(Êÿà4´´½DZE¨)€GY²3•¥$ž^Æuön²oÑ}Ǽ]Ð|‡†`#m|J=A^þTç,d¾áìڍ°^¥U!,ºK¦rJ¯Pn?»f³Õ„.lJ$¢åF¦*ßñÓDhç:íºLB/¢B;nY몸 ä‡uèt4®eaM"zkB¤|¢äBa³ˆHúz2øúê±ý!-·Kú¤tÝi@ûµ¡¶+©bšF‚K‚ ‡LYÂN ‚4ŒCÈ$…,jÀUJ?·¦„¬!€¢à¡í5 ƀövÙ!­AÙvk·ü®˜¹ôW7‹eûyq¾æÌÀ1šNBë§,¸Ž™¥÷è¯'܊j0$ƒµÁ9•Ð%/YçP÷‚ÛAU[áø­‚ +AÊq5…¤e—`¡Æf(!xÞ@¡U&uŠAÑG êŽîí5HÙq“‰Žg[ÕÇꇝ– yô -L‰ -bÙJ#GZ´¾«”HNkº>\™JùƎAeòëª-ŒvXéîr]f—ìf"†—nÌÊqnªÕVþ˜jy#Å=Ý0ÞæOKƙÒ`0© ’ÍøY²™DÑ¡£þâû>¨ý< -MՌ>ÎñÍÝ綑(¾Â°õ-5S“Õ°ÂѶ4»L0ž}¤¡iÁy’ûâq$ӻǤ]‹ÍFj×ã Íf^€ÊøCîÝN¼AŠÑñãz_Î<g‹ÚÄ7[jܓZ‡È·˜‘6JèQ˜/%‰Vï¡i¸x¾<Áˆ@›‡%ƇÉë° Õ{7šB;=º¨Q§’óêM'ʼÒa؄¦ƒGNWåÁ²d6²YX=° 5ÙäµJVW9OéP²/Έ}ç=º˜ño·ˆ2V¸f9ZIvOákwDñ“|Îãq†X{ôŠìøgԉ’uº‘Ñ6  fp=øåƁŸ§þÁ9'xÑï¹(U±ëQÖrkSgJcVZ=z¾Ü0®€éóÝÃBS`Í*“–Û}AüŽ’u˜ùõŠÔh=ܗÜĉ KR¦r,¸X24(ý³ÉÒ -8‰èWæÙë¡6pâܬ„™dó n׎xX<¡Œ%C{¶Lõ˜Ê.çÜ'¼Ó®wˆ†çý¹zqz\ž¬Ö1:‘K(¥­Pß,7° “9vu,’ -;åýyJ—×´˜¿ÿ‚_×t÷a/Þ,Þÿh:O#šóîúA:STa[ð``¤‡`š1ûäAàh{˜÷_dÃ<Ù#ðŠÁÉ#64³Y@éªLêÑSb1Y]\{e©³Ú¡ŠMâ ª§ùÝF¢P_NP¡¯ù0Þ¢FðÌð·ySxª4a*½1EÃ̬YΓóhr> Éä‡G|hyy{uIwÖ|ÃxÆ"“Vü.ö^vr:˜à=m6¢Óiÿ‚ŸÿÿûN;'‚ª§ãh:™a“‚ÍÁ9»ºŽ~;ú‡À˜‹endstream -endobj -1526 0 obj<>/XObject<<>>>>>>endobj -1527 0 obj<>stream -xTMoÛ0 ½çW9¹@ãØùpÜ;´èŠ–¶C\ì Pd9V+‹™$7Í¿%7]»¤;,‰C"ÉÇGþꥐÐ7…ÙÆð¦—Ä ½åñ&ùŒÞGôUï²è ¯'¦PTÆ“ñ²|O³ŠÈ-I àÑ÷ù·ÛE±8iÁ:æ$¦K¨™)Á!4LjGO|R<ö¤YœdSBˆ. ²’3ëΡµÂÂýÕ]ðäLƒFGIXTÏ4kè–qƒÖÒaƒN€ëFhgê Kn0šÅ9%IÐÊ £)roÓ° -8hë$jš«¶öÜgv1Žk´Î¾«ìô ¬Ó²büɆn·]áA½W7I ֈ%ð%°jtîÂZ*I2õÐ'5Ιށ•Ž¸Ù2í<×Ę3’; P ŸÚ GÍØ°g”%¬öÄPâ «*Éc(j}Oü¾ŠqˆÝ÷M)L6̐ qí›O¯`j¡6ôgD‡cw$€íö¨o½=‚Ú1¼NàÌëŽ3šÄßTŸÎGGø[IÍUMh¬¼šÀ¿û´ÿˆ×ƒdâÍCwõ?ð>ËH(ÙHR1ßE z§¨Ë“Oâz:KQ±V9bêß”èëy-±+7ý$R [Ï<ô½WŸ°*al ޓÿ6®ÆÒú±#5ìÂõ½–/`w։ÆKI6%üˆ…˵ ëV;߃eÔÕé‡ùUU«y˜)Δò]'9ÐO£iè`µ3¨Tn߁n³Do““Yõ±®èŽYkk·Òñú˜‡üGŸw‰†Xˆù†Q^çû¥—ÑBÌÇ0Åù”ôXF‹‹ùåÜ|~ΐ·ž$Ú4¨}PZoË`–ûQœÅd7·…§¤æ¸šVjË(]žÀÆ CŽŠŽ`¾€ŸR—¸µ´9y-µ°w2›Ä3Z¼´qË(ÍüÑ×¢÷£÷ªóȬendstream -endobj -1528 0 obj<>/XObject<>>>>>endobj -1529 0 obj<>stream +‚ª[`~*qˆŠä3ÖMüÙÝL $Ë+CmÃŒ¯_Œ¤î"(-¼¢2¹ó®ÌyŒÓÐK®ú©ýÌ/ð TBw0Æ@ }ÄÐ̤Ÿ.,ž`9JÓ`Mh1Í¢éñšõUXE¡oÕ.®kR#ïPÚ¿%_H#œ²X½s-»fù #?NCˆ;”«1j )è,àNkÌ`nHº5Nj%xÚàìÉvTbEùºKb×EìaB"e0û_°Æ²5F¢¶8‹†æ©VÛC\T=t$4i¿_(¨´¥ã‘(_!ÌQ䑸€íd✿~E%–½3þ )X’X3vDl ÝÍtÁˆh^ÜÝ i׋ôÁôÿ>é©ûT>ÖúÀåj9[]ßà«ù<~ü¹9ûvöí(ñ„endstream +endobj +1519 0 obj<>/XObject<<>>>>>>endobj +1520 0 obj<>stream +xWïOÛHýÎ_1ê—©Yì$$)Ò}]{BW ×¤B§ã„6ö&Þb僚6iþû¾YÛÁŠÔ+E +öîüxóæÍäÛAL~bši4¡¤8ˆDD£ÙHŒi<›âó¿NÑ*¼F'ø³÷â|qpüáÅSZ¬`k2‹i‘ìD-’á +úâÙ•™¢7ŸUaKEgÆØÊ$ê m¤“…*•;Z|…©1Å°À¦é˜ÀØá‚ï¹úž|~Mûb)kV”HCKE•W)•–VÖ%z™ïH_!‘2“%É<±\©òüâzNþ=YC’C€ãx$†ìبrkÝ=­.5ŽƒY PBÍ A£ß™R~ßgúJÄڟÖÙFô®Mv Ðᓚ½Ûô;IEJÿ*±k‘ýGBˆç Èûߎo®?ÿõççë/Ÿö¾½æu›)§šÌ&:NêÔÚ¤I©Éáiøàà{íIi0ƅR}¼<§ÛÏ6‘9]J¶Ð¹³[¯Üí]|"™¦Ny±>¾tV¦‰GÕÚç5ûzUcïrkuºw÷`Jün(âÉLÄ"ŽÞ¶Æ[›‰­ò”ɶÖ +äñãÓ +hƒ`I!ý=ißó(½¯Šš©°3ÓR—‰âºh£Û#A7{óÌuxÄcµßá%Z‚ ^SìrЁ´2©òÚÉe®hY•ˆsLj÷^¡^ÑVQjéêzA÷ÆnC +݊>©xÐP¾å× Kš=q9ŽG-éAÜvSjkÀ$½Œ†kœ­Ýâ¶_;[mꢃ +~õD+Úيõ†ï!þh…%æe|Í”[9*d’i‚,…b(ŠXrkïµYS®ïû®`…‘Í-^ ä½û·pH²Cºj c󊡠³¨PÎÑÏZbË«S•6ˆ·"5r5£õ½îNšïLò«þ¢±YM»WŸ¨<’i¾ÕeÎZËL$V‹ ôŒ«ž5[Μ5^tù›§ùK®C ”Y(Ê\KÉ]Ԉzº¾úø¾¨~BûÔ>3ÃÝãBM:n¯‹*/¥Q¶ò˜Ll…FB0ÍH!¯ÖÜo|†ˆ.~:h~‚Û+³¦!sçâã˜yÚA!Oµ¨µJŽl:"ýZ×r©œgtXêÑ +ßPjˆUOª{è5‘v1énƒG:Ž÷t¼¹¸š?Ï¢Ù)¾ ´4ŸÞ6IÔÅ Ïx€Òåœn´IAGºZм.2¿ÆÐA™^g( ”Ò(w +½gíßÒ«ml§Öà˜rQf_`]i±d0w·z$Ãûr·Qô ó +ãaà yßa¹†‚ñ ?p:a>÷œ3åƒÔ9k° µ>e"¿Bª‘I‰„øUFƒßÛC®V$ú8‡šAæÞ¾h­ñ, Àå*cX½Ø`.M!\#a€·‘%–4´|p›ËíaÛ䅼ÇÛLB²‚Dmœ6À}fÜþ¡ù{éÂóˆzÉuªaoch¼=Épˆi[gØØiÛî #±­##€8°NB“á7>¡±É¤®©¡\™u™ÕK!n ét„À;D=ö Vw”?òé^¼¨<%N%À')ƪÞúkÊqfváÎBøá"îxKÂߦ ÇÎü®ùÄ0®‡Fßw|2î} â ée$º1y *z{¨M’Wi‹÷#ڀÎÒ±Ë ç{üaÖì‹ñß;f#šL"1cřŸ]žŸÑ'g¿‚ô‡M°1aÏæË|sÐ^L#ìÒé¯~ãOÇb:™áûîÆc6ù~qð÷Á3ä#Wendstream +endobj +1521 0 obj<>/XObject<<>>>>>>endobj +1522 0 obj<>stream +xXïSÜFýÎ_Ñç/!U X~ó! ¶sTÌ{§â”k$vÇHš½™›ýïv´€Bª®®l0¬fº_¿î~Ýòvfrˆ?39?’ã3)šÃìPŽO/³9¹8ÇÏGø +VªëùÎÁÇ™Íd^áÊÙŹÌKÁñÃC™»¿ÜÜ=HaZ‰Éã|ZÚhe“KL‘lÖ46Š‰|¶‘…M°»pl™É•µ³mÂS“dmڄƒ^j¿ßâ\’Ö¦µßÏ¿íÊþì8;„]:5ñQO(ŠhÃüU>ˆ‘ÄWbêz@ –æɾð¯—ïlúÙ/½Rôu—Î2®Ö'ÉíÄqm)¦>Ƒ@^4`ä:|fíZÐ˜­9ßSn ãɕ°òäŒ(g_}øª¿Å„ãØÚL¼¾­Ü¢C²ä]Ý,}LñT®FlÊhӁÀ‡]dLùî3Cù5y´ Àè3¡ØGÅaêè•5 ¤]XyTî ”đ±5>ÑÄÆM[,ƒo]ìƒÌ7êøçÛëïb&ú(°çƒS6QX.¼2ºvi©€ßß^˗ÝÒ74È1ªª÷¾|¯yVÌK[¯H‚¥C-(h“«6âÒwQ`%“ë)¥­\ë43š²µC²ºA’D pj„µR[}²¾[erçû ]B—o¢“%ÚìîÓüï7w?MÒx¥Wó²¦ TK°• Ì+žáÊîöA~qm žån.ï•öX7$—LMÊ{HZÑ—¦qÚöÉ!A,N8D¹l™U·à­ïí^TY +¾®‡þ}™ë—ÅLŽ¦õó¯¾L4%Ïl¡ìEåÕUòáßþùë¨6óïnîÙɾ†z™âQéË­E>=p¢ñˆ~¨:ì5çEwÕnFãƒÒ KµÿÊ^߁ƒj)r²àÚÞz§„>ñ +fÝÉ õ`P +jè{¤_c6rÇÈUxaö±õk1¹ïP)“ԁÃÖJ½@ñ =ñ«ÂÉxžÅ»¯¦AH^†Q׋®VVYB(„þ±[‰IÉ6+ZփÔ0Æú+a±®'ŽyÆB,@2ì+ŠMAUT±qZsÿœFy0Mn´Ê_±þâeJHÛÚµQb·ZùäÙX¨è‚w‰Mž± Tõä·EísÈÕï¬|öñÿà†FÚÞ"mŠ¢Ÿc?ˆÉà8+ÈÆwá5’ Ooã:øx¶Ýû£â¾ÿD‘І ‘çñ¾«¥ž#/EÆ7s¦R9pö'´+0JºÚtK¦£˜©(N0ûu+èB$€%‚Ѹ²ôS՞ ú¦Ð´·M®B…ZÐvÄ´Hðó·>€K™a-á~²|ҏ•£ì4ƒ„i¤¼Ñôë Tηò>ƒ”oÛµô¬}È£ÃÞÐد©‚§£óìŒìJ°v ‡|Óèø¦7Ì-Õ0†/ym +nìj”~|ƒáˆêš^C{ J5yBڨЮiù}P0Øi®o>=Œ--É<¢¯™NeCLÚ:ÀikÖ1`°Ö9ɾì²1¾ÀUk³Si KØg¸°E¬p¾š ê­0~ °_`X€ MZiñ,ôCÀ‡%Ï+(4g&v.mhÁ¶Ç«[{R:"žx]­oqØ ÂÓÂâ“;ËQiƒM ï’ArFÓýà*]ÁÈTHD±ì¦‹`°‰ ‚{Ì.;ÍÄ^¦a•w•ïKpØ¥wBH¨å•5ظ¾öŒùV_$ V¦ÀJ +É&~J6I4:Æè/ÿصGÚÙÃècP7÷ŸÇ:D¢ø‰.CíؖԔ=,½:–æ” âÙF:r^jrß¼ŽdF`O˜ŒK³ZÙ6î &4ͼ”ñ‰Îqôî$^•¢×èx¼'‰å̈X£6ñ—–Fr·¤ö!ò£„éÔx{(µ˜hÈ/Ñ €óå~%mÎ7—tòFìBýPáGÉÛºèQ–yM~eÕµ:l†E·Çª|µÃú•ÖÄÊwŸ!ÛJÞ¨d}•sJkɾ9#¶qœîÉ忸!Ü"FL◛ã¶hw}sx¿8Žvîæ'{r„—Æ=ù ÅG©á—ãI”TÎAFÇ$€¢¹¾Sª_6šò¥pÎÀú½2«7{’ëz#q黺dö¡4~×êÖ߉_âRLŸï‹í|Ùñ]Ю·×:”lÄ̧O,ÑýF÷ ›8·º$•®Â^½@Uéÿ4YÆ7Xp’ÉOäï]{¨ ÜӕZ_dKÉæ ×Æ <Oè±ð]ndj<€@-»Š¹Ï¹ÓöKÌ$`xÞÞ맃â0;Ãûÿűœáÿ0Ý®n¯¯ä>øo¨Eǝ^WMݏïŸ^òüÿ?wG½Ru99?ÉÎÏ.0ÑasvJWæ;ÿØù/.¨†Æendstream +endobj +1523 0 obj<>/XObject<<>>>>>>endobj +1524 0 obj<>stream +xUmOÛ0þÞ_qãS‘hš¤!)HûhH@Ù4MBBnâ4ŽÝÙ¥ÿ~wN e”MZÛ¤ií{îžç^ü«Aˆï²F)M/ BH³4ˆ!gøãe8T~!> ƒìυӼ7dLփõ^Ô}Ã÷3‰‰"1˜k4k-0ųÖAgN œ`ò w8^1µ+*·dŠ²C䜅tRë‡vîPÒÍö¨E ³ðo$q†U•(ºêÚ#Á6,ÖEµÉ‰¦Šßƒ3¸µ&^(ñÜpæ ær7Ã;»Âx¢eª$úœÛ8>ÃóŽÖ­¯[ï%˜Uoa)0¹²ñ‰‚UÐ3…½= ±oÅ{mÿÿºës)Õ…Êw}½£×»ýwüR³–¼b­t¨Ôß¾Ö)Ÿ5Ŏ®wúŽ§–¤<ì‘ÕbUÜÐxàþzn ?D¨í°V~éV‰'°+ëxC¥$š…äÔb~qNSǺيrp×ïxn͚ªU…%ŽYÊ:–~‰3ªÐÊœ¼»MºéÝî´·U¯yõ`×neíR¸¢ÞeAÿÚf+Pï«+â]¶¾Õ†çãõÁ¥xG$Ypûù?=¹:=£rê3]´$’Ÿ£äçbg2ÈB¬ßI–Y:Æ·F)!œå½¯½ß‰¿/9endstream +endobj +1525 0 obj<>/XObject<>>>>>endobj +1526 0 obj<>stream xWÛnÛ8}ÏW úÒpßj§‹E/lÆiÙúBK”ŵD*$W¿gHɱU/°(Š9—3gΌž.&4Æ¿ -§4[PZ]Œ“1ͧãdAó›%~OñßJÊ/žh²L¦ñ8ÿ˜$7xÂGpëúódAŸ }»ø°¾¸¾}GÓ1­s^,oh¬Žñ$½üXˆÚKK³„¾;üU:7¶^M™ðb#œ|³þ'ؘ,£«ÙþÖÙå,™$ôY{k²&å+ñäœ&“îät‰Àqò¾Ìh¯tföŽÒRIí9©3ªK¡4yùÓS-œÛ›92ψÄW¬LèATA©Ð”2Ýñ'ŽoZJm[{¥·À˜®&³ NV$à&5U-,ð劼 æ á rÞX™!ñð¨Ñê'5ŒDŸ}Òٜ.’9§²’{¼=›ŒÔ!X{ÉåÇ¥3W©(K<ý"t…,8 ÕšØ»t?ޜ¦;B$ÎK‘ R1ùY¬Z'˜œ? »WeIF—mÄø\Xƒ•92e0¥¸>$3¢F—Ò9FJYÜß*çmK OöRìd6 Á” @@ -2805,8 +2791,8 @@ cFKG< ½í*œÉ\4¥ƒœ¬T$#‰Ñ¡­º¹‰qΆ0OTè0Ë®o‡éċ¯¬c@›U™—à5~9S6a3Gƒö wEÄ–ƒ·Ž ìfWGØ–;سòJêÐÝg²Â~êÀY?^Ùèjx,J¼ád=TŬáh³˜ÌÌ÷ÈҝJ­q&(F5ÈÒS"Ò8è¯üY¨MH‚ç´æYÁ—ÒiÙd2ôÝOÑn…–è}àë0FB×Þ=rG8açjjžÐ”7hèÌT¬‡èÑ0žC7šÔ”˜¢ìá¶Ô-X(ÐþaEŒV¤~VÖh^=ºç•–£¹çuý(Œ¿¾ÒŸX=ãˆZݯÉuu±„5ÎÐ&É$ç¡#;Ì|º U7f;UŸí¡îpˆ™êT ˆƒ@òƒ˜am䯕>‡E2^¼åŸž贃™3šŠÌ+בë[|›†o«é,YÌæt5Ã_|Ofÿû t¾œ'ËÅ ¾aqi²äðþX_|»ø% endstream endobj -1530 0 obj<>/XObject<<>>>>>>endobj -1531 0 obj<>stream +1527 0 obj<>/XObject<<>>>>>>endobj +1528 0 obj<>stream xW]Sã6}çWÜ·ÍΓ/’Ð7BËLùXœÝíN·Š-'Zd˕d ÿ¾çÊv:0Ėt?Ï9Wùû`Hü i6¢ñ”’ü` h<G#šÌgø<Ÿ•”……ÑdðöÂp<Ž¦ÝŸ–Gi™ÑÆšÎ'Ñp|L˔ài0 eÒû¦ŠÔ<::™ÓŸNþõqùó`@ýá4LyãnýJ¾»ôÇ-ýfò°ÞF“ñˆú£Y4Çœ_n¿ÑÚ<ªbMÒ:e G&£«˜ZçY¥õ–\U–ÆzJM.TAN&•U~K¥5Þ$F»ˆCxå¡5r½¤qtüôn˜XŸD^áˆ+rkM&Ç(ô»–°ó‰bi‘ÍÑiú ŠD¦Íó»gP¤®í£‹iӟ×e»6^Ò/lmßÅީքšXYxÀBKád(¤J¬q&ó_}::»¼ˆ)Ñ ›Ü®¤¢ò¼P‰ðH” ¼àýmÀ :´ël#´–ÅZÝIW¢S’r™lD¡\N©t‰U+$»‘VF´(ÄJs[ÄbÉË'OO©‘Ž @@ -2815,8 +2801,8 @@ G& mš6keW™/wdØ]`•É[[`|…Ã?zíq/5ÈמGUëþCі·Hl‚$ 8vH@)om@—w‰áÇ(PXµKZ©5±h5 M›j›v¼W¡q ;—¯BIR:3yŽT_ŠÎ.Íem¿»òõ`$µNåJó°b_[:n®1½ºôû=2¶»o[Ö½Œç­Y[‘»ÀO¾züÕ‡¹F¸R®¶¾;¢žõ[êªç"¿NW´ \stцúì¾°K¸ Ò`M4—’~#0¬ |K6•gö{‘à²ÅJ¡M" 5ù*å Õ?,°ž|p{l¾R +‰ëWVÏ}ڝ²067¯2ã-}m}¡ny;oÊ?œâ;Ã|LÓÙI4žáâŸöâÓ«O§|ñüÉó÷Ü$UŽI.œ-îùõ‘þlpÂûÿãäšÌ&Ñl:ǗœÎÙÔbyðùàí’ïendstream endobj -1532 0 obj<>/XObject<<>>>>>>endobj -1533 0 obj<>stream +1529 0 obj<>/XObject<<>>>>>>endobj +1530 0 obj<>stream x…V]oÛF|÷¯X¢-Z²dE¤n€ã6 Ò¿œÈ“y1u§Ü­ðßwv¤%ÅI`ØHÀÛÝÙÙُ/'9Mð“Ó✦s*6'“lBÓég— ü=ǯ״–ç³Y6îC>¿ÊfÇ^/OÎÞ\PžÓr óË-KB€É„–Å(lV[®|¹üŒ‡³îáˆ*(Vš µU+S›ØRtTTÊÞkçË@ÎÒ'cK· t³¤ ý£öîF±2ü±niçüC ]¥-ûã0çÓì8F^itˆ„ÇAÛÈ!8(\Ýz³Q¾¥k·QÆҟÎFïêZ{2kj]C @@ -2826,8 +2812,8 @@ rt •àzÁÊÆÚj)8ôÌ°ÇöÚè›spµ6µ¦²ß2£3‹3Asö] ¡ÏZ}g£gô‰§ÒÐ àзÒÒPãÄÒµªuyʋ„”æ$Úùýˆý‹Œ–×ÒùOÅíi&(ºªúŽÝ&Nyó¦høF¿ÀÉ/8%–Þ<ŒëŽhìsúÈjƒúh¥Š êy0ؼ¿4•m²Re É+œ]›ûÆKUwß|zÍ҇×n/ð06D$.©ýJ·ïïëW·?bež?I%ƒjq‰$ÕN’§Ù<Ë3zËwNÙ 4½íWP(ç £-]!C˜çHáÍ K®â•àX•<®9•`¢Á­ 4¦šyKq«¢p VážÈX‹^õ´±ª“úYÕkíntq÷’XÉÈ@Î9ÜÀ‡éÆóœ{ØkÅí¦jþG+÷¥Bñ‚)¨ÑìZì»{ôáÉ+ô6bp£Ö|œ*™šlð”$„vbt%ê¥adí%ÊÇk_’½þT¾ÀYÚR9ÜuÇ¢Ñᔶµæn?˜`k\¦i›X¦yyöæ²» ó9nøË)Íç“4 >¼z÷ú.\÷Qpµ¦JŠ²8uÜ4É`¼˜\qÁŸh³Å,[Ì/ÓÁ™_±Ù_˓Nþ.!×,endstream endobj -1534 0 obj<>/XObject<<>>>>/Annots 567 0 R>>endobj -1535 0 obj<>stream +1531 0 obj<>/XObject<<>>>>/Annots 571 0 R>>endobj +1532 0 obj<>stream xXËnÛÈÝû+ ތ H”¨·¸ M<“1à$º±psڴȦÔc’Ít7­èïçT7)Ór2@‰ Sý¨×9§ŠúzÓÿbZŒi2§¤¸E#|rþõùýÕí"šÑ|9FTÐ8žD·ÍSNWñ,æçÅ8ZbuÏÎO¼:EsšOçÑ‹ËQ4nx­óXP<ÉÎâlÅ4Ã>ßÎàAxò6q´ Ù|ûØ£Y4ižx•/šM§X›.ø{Œ#)»Šá͒¦¸lΗ.c˜OþÒÎ3.ßb×Ëj÷«“åëÕÎ3Vç#¸Û9á >äüMFKÎ?´ÎNØË _Û\ ÿ˜RÓ&ãÂ̗ Ú¤¾.#Ú$½O•,îVkÐÁ¹ê×áðxQ!Téð#Sڝè~_ŠDiz§ëJŠÚ{õïÊÌ?n¨P{d AMŒªœ¥Ìè‚îï~_=ü?”ÞҁÈu!J±—T[‰ÌŠ2¥½/¤pA,‹‹ÌúÄøxèNs,p½tFç9•è2Sû:8ðÝXZPvP{K1°’!u; ûœ±3‰æÑ8¢{¾=­Ž‰}y!ê=fõ6F´…ËO}ÀC–gW\ײLÌ©rT k¸ÔÒè$í5GéúÅ6‚xz’öl± ÊìµÉe*—}Ÿ-I¢ëÒ]$H•nєÀgÐúí¥(pðáÃEjý` ¤í¿|D‰j8UðÇ\ŽÆ e¹Ø[øvRúTtoA Ôñ8à 8ݍÅ[L·½Ùöæ{Eø +! @ª¬HŸÀº€waEƒéi•cn(w œ9Q.ÌÞ3¡ãYY;†X0¶íù´½x뺶Õnoü¶¢µÑa¶ÄëV‡+l}Ð,F·ÿðÆ4]L£Å|¾.øèÿ^ý ýoNendstream endobj -1536 0 obj<>/XObject<<>>>>/Annots 574 0 R>>endobj -1537 0 obj<>stream +1533 0 obj<>/XObject<<>>>>/Annots 578 0 R>>endobj +1534 0 obj<>stream x…WÛrÛ6}÷WìL3cyƦu³d÷©Ž•‹ÛÄI-yÚÎè$! 1I°hEß³)SŒÆ‘lJÀîÙÅÙ³‹ÔÇπ¦CM(ɏúQŸìßî?†ƒhJ“Á$SNãñ¿ÃSFs^O“þ(â»)/ ÍWW#|6¾œbÙ/#iu4¸ºÂúÑïÍi8½Ä’ðÔlÂçewÛÛÅÑùû+Œi±èÉ%þH=Ö>-’Þ(šD£ˆæUYjãdJŸf×_i.͓4ödñ ›Ç4„ÍgÃ)6÷–Y‘§1%:•¤ F#ZöD‘R&œ4ËÚK±”¥òIfº„þÚI˾*«Š59˜ûRÊÂ{æp­÷Î @ŸÎœ)8N2% G™Š0Jڈ PÈÂnt•¥pH"Î$9M[mi«Ü†î¤³‰(å±¥™22qÚìê8=¤Úö|öGÔñúQoޜRZy›™HI¯|ŒßjZ |8pP¯XW¤f$‰ÎK0Òm¬wWëÝ|€\h‡ÅÇa¼••úÑíŠvºòæáPÀ[Èô”ÊL @@ -2853,16 +2839,16 @@ P  É2PÓ³ªŠ„Ç—mxüÊvµ_&¢åBÕ«ŽÓvçâ‘sé8ÓVÕÓ](v>÷€ï…‚âô3¸SŠ+W'šõÙ§š3ÚñùŠ‰»Û9óZÃÑÒùÁdñB©šØ@`È'4JS%³ÙÏ程ˆnt±RëÊp–B@~reSŒÒ`‡“8`>/XObject<<>>>>/Annots 589 0 R>>endobj -1539 0 obj<>stream +1535 0 obj<>/XObject<<>>>>/Annots 593 0 R>>endobj +1536 0 obj<>stream x¥VMoÛ8½ûW ‹IJ%;–|èÁýH`7í&ÞÓz± $ÚaK‰Š(Õñ¿ßGŠúˆ›»I‚¦‡óf8óސ#Ÿføõ) h¾¤$ͼÍý™Ð" ñ9À_Éig ØÚý»»͗Æ\zKÊèrá­ÜBÒýh°Ìh¹òæ[ãçÞ¢ó³‹ÞÏÙ¢ ƒÎfýüÕ ¹¹xÍ¢ókmÑ%¶ô¶Á2£U„<{[ƒ™“´˜vÑc:[4Gº~gküÂÀ‹:?»èýœ-\y>ù­ñ»\õ5óí¢÷s¶ðÒÄël¾oêëÏçöð~èT»2žï7£éՌV´Ù¡›ËRÛ«m’ñÙMy•LUÁs™²bª%+R/Qùî|óm4£Ià#ŸMjvêägŒvBrMÛq¢Jî¹ï„kQò”â#¥|ÇjYmÏH‘'²N9 ~NÂÛÓôÏi䜧³S%i–Ål$ªÎ«W‡Ò"oÏñJ TªÜ¼Ô*w%y%”=ÑsˆAê-7ŠøŸ=¯pò␳l;~A§°é@¨E‰Âw¨­¢ÍXpŒ+Ò6fÅ¡é/aw˜ƒL‡Dçº#9Ãu£!54û—íè«7è$S ´ÔQ&Å J€sl[uRг³¦¤¨ÀmÅ¼´év‰ö‡o¶íÿÛ¶$œºoÐ)ZÆMÄ?]š Ó+LøN[v–ν¥‡ËÌ£Öb_Û¢Ü6›Ãœˆ±aÝ3¡S ¬d¯0´Èԕý`B²XZ]é,¶—æDõЀ2—Ř&óíÄ\ ÒócL#Sk;ìSëN…ÀÀ:U©ÍØê Œ&SKZË7qQ'¡™W ´ –!=jß©¿Aàå^¾„¥h“æo„Ñõn'žÞ‚» {#ˆ¹þÄ$ˆ<Õ74‚$ gR®ÌdŒV'¬–7Ûñ%å`Ù{1Gµ0ÆsUQÌ1Ú Î*x>p<#è³:p´ê‚˜™ÈÛ&A¨2ÕØ{ä6¹Á3ËnÅs"J†3Ç®ÍúþóæÓõ——éûÞ^:ïèv}w{³nN9ÉøK¼Ô£9-ð¹ï׿¿_Ó×R™›Ž>ª¤6ï V e >i&áÌ<Ç͘ùyÈ4µ7…7᠗Q£Í 0_}ڌþý HJj‡endstream endobj -1540 0 obj<>/XObject<<>>>>/Annots 592 0 R>>endobj -1541 0 obj<>stream +1537 0 obj<>/XObject<<>>>>/Annots 596 0 R>>endobj +1538 0 obj<>stream x•WÛnÛ8}ÏW RìÆbùº¶³@ÒKÚ.šËÖŠüBK´ÍT"U’Š›¿ß3¤|‰àmƒ&¶)ÎΜs8þvÒ£.~z4îÓ`DiqÒMº4ìN’ 'c¼î㿕´ ýÞ$éY@Œ¤[ÿúü><:bcA£ËdLáuNӓý»‚zÝa2Ù/½žtnºtI³%Æœh–…¸]š¥-â¯(ÏD <¹ð2£RXQH/­;Ÿ=žt©Ýï÷,Û>œÉ¥Ò’üZÒÛ;ò†*'i³–šJgJ¯ø3^͔•©7ö™œ´Oûx½. îãÍðh)œÛ›ÑÒXìUŽCã·6žB–ÒäŠE’½Lˆ> d°¤|±³¨œ§…DbüyB†u†ý!QFí ñÆ΍ˆµi9™ZéËMü´®X댏ò󁎧âˆåÚ ùÜ1–K|¶ ¥Ê%à~\†•ÓPh‘x2Ó§ô$òJnËÜ8Bºz%ÝE,Ç®@•ç¤% h8¡•8cr ڋ\tE§©¾šŠb!èVh±’öÂTW¥4e./²ôÊñ¿0vuZÇktž\)Sµ|gùôöú¡n왣µq^ƒ64o¢Ê½c€¹I/Íψ0røÄZ,’€"„ãÞî¹7~"Szet$ˆ¡A·cü;–ûž™åòì¼ðÂzò¹ÃðïÌè³ý9æç?ïr ßí?ú@0¥áDQ25[ê::Ç'yY½̃…u$“ Œ>ý ʐõŠ“ËãÛº`"7tí¤°é:TöPÖÇ`Ò¹j¹Tߙr¿Ë°•ÔҊ<«™í)‚`AÁšØÌ×cj3«„yëÏy«RÙÕZÙ2‹G°$Í¡ÚHùë45•Cççö›Kê £a¶=6ªA2ÂÕO::£÷ÖT¥£"H©:QçfH=la³m÷Ǽ÷Ú±?ZlŠyðÆ·AÃk[5Þ× èã=›ŠÜÚTyF…ÉX}ü‰ü®s}[‚A0öV°¬X„áÉƒ3)rÚ(¿¦‰„÷V-*/ÝÖAú£gÏZ·‚.;D @@ -2872,13 +2858,13 @@ VǦq ‚ÃÑ𠣆 ºõCª`? ^i”Ž÷œ•…,ð¥0eÊ¥ G¡8Ät¨Êa6}­µc‹gÚMO¡­›Qí,¸Ú[•Þ±^‚na"à¨OqBˋ‡íhÅ5÷»w;é×C„BA¨ÒR§ö¹äQððnªa¤5Œö8™ð˜ ¯˜÷GãzœÚ‚ ‹í^íJGa‚Ýfèvœ‡¢KBöOJnBÝ~û/AÛ:s»?Iz—û¢¹Æn¾Z ‡B³S¨Ó¨üîI~«†54 K0‚…ÂðÌa%`ñFc~Èù,ÁnMå)“V=Õ\hôØXµRÔ=HóÆÃ.Š¤Àè z`*.¢Ò!L¦T&½P°v0êÓmçnÖÄÀÙÄðx#ë»»7Ÿÿ{˜}¼¿# ™h´Ýê5ØEûÃý—Ù}ûÉsž§ŒnúÊÌ z!³xI/•…ÓcæWÎU2ºÌn@9ÝMîû/8Â~L´\_–˜†&¶äƒéóLÔ?oE¾ÿUó°'Žz ŠkÛV·æçõèkBµ˜ÁP¸ítÅ^êE=9rm_[úÂ_nâw ¼/¥faÄ\“Go„ïu“&0VÅôúöõ5=XÃó½5iÅSBè"ïlo7´Ç]|=û!c8&ãÑ$j¯?à`ïf'ÿžüJ˜€áendstream endobj -1542 0 obj<>/XObject<<>>>>/Annots 595 0 R>>endobj -1543 0 obj<>stream +1539 0 obj<>/XObject<<>>>>/Annots 599 0 R>>endobj +1540 0 obj<>stream xÅX[oÛF~÷¯8pV)$Z’IàŎ‰ãU$@µ#r(1!gؙ¡ýûýÎ )ɔݦÝ"kÃօÃsùÎwnüýh@}üh<¤ÓÅÅQ?êÓËÁY4¤³Éï‡ø3’R¾€£ÛñGOù|AƒþY4&ÿ!§û£×³£“ë3 h–Büh2¦YâoîÓ,î°L+̓4]Êe–Jmm¶È%9M•ÅËJn_ï0nöîžÞ]MïH~sR%2!]J#\¦eʟ/sKÒ©?wэz1ûrÔ§ÞàÞ̒ŽÌ ÖP,¬ìÒFW$à˜uF«e¾¡$³±®ŒXB6¬ÀGá ZÁ<+ãÊdnCóË<¹~YûÖÉQ’µ9]@s.6Žwæ/¢Ú„á(:cnµcç„ó³C÷Tít¬sÆ!‘¥‘±p°^¥âAöˆáàç´E㈈ÞêµdT[ŽóíJ©<€y¶0Âlàx–ç¬ü!K$\¬ÊRG)4òy'Àªn¥uZC –뢨T#û…tk)Åy&•³-ÅB%u m‰tVíOÔèzß«SËAÀKJ«žHŠLe?xvK©Ñ­¨w`\)¬]k“à;»‚W|½e;—d@Ùi³‰hÆñ{B‰V,˜ñ©Tç¹^ó§éå;ŽK:¹Fºx^wl.Ê$‚ í¸¿jžþ÷†g!ü?ýD‚ezñǞ;Þ-JÔ1‰8–ÖviQ9ð@mˆC¹a“dneãE?š0‘ÂaÆH8gìE^ÜÕ®w•kÞ¶î!þY€éêâ8V÷¢Xš2¬]]]”R—¹ì&ñ)S_´¯Íò˜Öà~ۀFØÏñäúœ`9g|ï%ÓhM¢¸¶”q&rë Îà$‡d³lÆ4FîÕüÙ¯½!WŽŽ'ËÞ9ҋ/`œÃgNp„‹Bȕ]䝠l”=T»^“•;ðBචü*dÞôöýôvÇ­Á¨·Ø ™cH#m XÀ/ŠÁD;äá<¶ nȘ%š`ÔÅh%¿!ïâ¬9× °ÌgÈÉu\Ó«7Ž&jj×|8·øç¯o}xõ†àÃílg¿·»qâ»í§=‹[¾üö—ë䝰î^ºƒpô3åäÀº¬àué@ÙÊŠþà|ܧõ uˆó6ئé³Ñ%.O­ÃÏÁ¸×Fv”¢µD ìqÿ[üÐî:K_B…/ ËÔs·ãŠm ’†{!’Úþ^q;Cm¿Jgé·ÿìHÈ% ò9Ã(mtìyd«xÅ þý Ý×Ì_téÓ¼ƒBúÕó7Ÿç…’ÜTXù­ÌBæ‹ åÕ¼Swͤî|›Í¹^j5C¬ÈpSáAä•$4ƒ,Cû®,OÂñÇ)„‘#é<›?M‚±Æ4ý¡*¿fñ×­iv)ÔåJ¨åÃJßWÖý`­+]È+ƒYá€C¾¥—‹„ÏP.n4Ôõ*C:àMÑŽüz{ Ú;Ôzna¸Ï'œ¿#XÇ^FqÉz$·€ÿÞ\=3}ŸI¥ÁŽb6¿`Ö,o®0aý ¸!P-…–,¦ùÒgDøÇ#[ƒFo8‰ç»ÅÓ³_´6Zm+0v2t4­x<äíÐoaíENaSóƒ1onwW—l”À#€Ë/`3u‹å‚ßⱗÐÃ-½·>Í>øO¤–[<Yñ~¯±“ª4[V0 hôâ]“®‚šK­ðø)Ïyäޖ†“ëI½Fx79¥ÑØïü÷Ó÷¯§tg4ï¾WE³a²…½æxoÜǃ‡¿¹}Ÿñ$o4Á Ã3üfvôï£ÿ¶ë(^endstream endobj -1544 0 obj<>/XObject<<>>>>>>endobj -1545 0 obj<>stream +1541 0 obj<>/XObject<<>>>>>>endobj +1542 0 obj<>stream xµVïoê6ýÎ_qUiO*! ! HýÀ϶Rû^·2mÓº&1à6ØÌvJÙ´ÿ}×6)mÚ¾×îi ¤Û×çž{î±ÿlàã7€$„N Ùºá{>týȋ!J|ñ'),ÃY£= `¶À%qšÀ,œîû0˚ QbËø¢”@´–l^jª€àrÁ‹(-$ÍaËô ôŠ‚"ë9d™(¹ʵÜ[ؑ{R”û•\ðVN¤,4¸×ýO³Û‚m…±!†¦ZÏÏ̚×íi¶GØJ¼Ô$‡ã7aœ€­ðÛÁVÐñB “l£¯ˆ^ý÷…X þ}!V˜ÄX²ûeÒ @@ -2888,446 +2874,613 @@ S/ g*[É4µº]±jÀr&i†>´« ‹úˆwT¨8¤ %ð½ÄAâè­<è¦I½¥g+uùeøÛ¾J7Ÿ<—bô$c­Nàì©ãÅ^σ‰ë¸ŸOa‚nǐŅ@«|f„.LåS&4>ۜ!ȃŚrÀVÈ;Ô|4UƳ¢TLð=ó°Š=T.+淘~V`ŸZmO}èíñ†‘Ûó>Ý,тux ϔƒU`üVX¡x*v}/5(9š¨R,ïCš¤ãԢ؏GãA؋“dE“é èt;ÓQR[ºÙ日Ò#ä{IûQ¥8z1O²5‘»S)ÊÍù¸AèµPÅú€¢Û {~èw‚ád<éáîƒqguºÃnùÑdR[Š(.ˆÒ×Tcd¿I/£Ú$ëM3¶F˜~mÈñ;²ü¾(«1Ì=QÈoÁµw,»‹… ÿ& $Ëô´ KՇßþªÏµ`é7cIƒ%èù~\[dŒ¯*bS}zÀó÷uer'Iw¢…£Q§sì(ÛlÏÎ}s¼%Qú‘fD¢Y|H¥_©_Î*|÷-¨§T’"‡‘Ý¡ÆÍ÷hìÛ ~&£§ìÔP<›÷”ÖÚ¼wÊÅ|‡Öù;“»þg¸¹ émúÓÝ_(¦Z\'cW‚—CŸËõœÊ> ´ê}’¡Ç|•^±düzE‹¢í9ãí9Qörö¤‡Þ%î%Ë+Á ïëµW>/XObject<>>>>>endobj -1547 0 obj<>stream -xWÛnÛF}÷WLŸ$%ên£}pì5 ¬ (â X‘Kiã%Wæ’qô÷=³K*”D%FÄ!ș3·33»Ïg! ð'¤ÙFSŠÒ³A0 élLi<Ÿáyˆ¹¤Ä}˜ŒùÕÁ‡g -gÁÐãðCÌi8™á7àú÷á”n }<{³8ëß è’ d§s<Äkƒ-¢nV|Ö¾˜<¾¢ùl~;„ãé`zs{=¼œÎf×ãñŸw×áh2º»™/¾êf=Vo4VwÌz·}øøv'€÷l¬7 žJ$ è&—¢PيŠµ¤Xb)¬ôJc -ÃJiø¸û)I*扌¬,¨ÜÐ֔9™—Œ «%‰,&»‘‘J¶3QRǔ‰TZ* mâå¿éÖ>kzìZ)i)µy¡ÄäN82ºL36OÃ2³N÷ñœ SZ镉(uáM´€ï‰‚qï8ŠèïÊï"Ýhiû°ÚwVýï .ÓÍ~]ŠLV•ÁK E&ÏeTxò\Ê\ù8"Λw&—Ï¥Êeì½±}ª¼ŒLšr:®¼©IíùôJÿ~Y¿Gt9{(Þ[®-Z« vˆ›ŠH¬ßÈh]ç6Œß«$†µWý(ÖýÂô­H—¢ÿŠœ‚Ž;¶…ÁŽC°Íd‰Z•9çC:âØb­,mt¹Ri=Y²&•´2&¦ØDe*Q¥B™ì‚–eAà¢$h8!»6yA*KŒË8N½ùë8&áéh4çoøÅa®9cñ’–0-³xßÉ.}¹r,‡wŽ÷^`G8›.ð(9Ы°ëøÞpìýÚ·FÐgÃíÕó °_;OZ=É –´Áü¯ -¤XÚ¬S€ÿZ€^Ðî.o?Ð,™„œ›Uð"g?óŸÑL…È"4 4vÐ}âì×S"E'+´iCÄBĮאéÎ~š:N]hHeRº"5lcÈð˜ˆU’€±Ëžý­ò³Á ÅdšÌ†¬›lÈÕJ}“ië¼táׅõc>ñø¼Òf)ôLˆ•_ã2ÿðàÊ·>70µýôÈ}âƼ ØO977;ÚDBóÇNëÖ -j}~Øô§äxÜ´ù@½}Ë®ïiµž)Gˆÿ mÝÜö³6 ¦§ÓáRŠ{×£÷H3s“‹é…«%À-Âé±¾¢õ”ƒá ÄX™ã‘ÛM -üvúuÖw»ÌWÚ%™TaxETÌÙ£“§3†W‰E™Š'Ç>ÕbuˆÕBt«û'v£Èd›Ö 3ç3¼å%¸ì*Çëà/‚³` û!˜³˜ÃÅc͏-õ¢´æ)‘¨ï°¦âs¯ôÜÍis=Í>ú• |î qy|ìÞw¾aàÄ1 ¼Û ¯NPø‡RôZ@8Q¹-ÏOÎÊϵY˜S¨^Þ,r¾ÝËÇó:oÇÀ -ßñ„'=†x 3;“€OR‡®¼‡{´Ù -¼Ù çÕi Ú ^ƒÀçqÕV Â(ÁÊtþØN&8Äõ¨ÌÔwGTÖ:]¡Ø¤8µ£¶â¾_`{9ºç6CĸeÌûá˜X?q¿ÅwبN{ž”ZŸÈH ä¤Ýñ˜ƒŸ^óI(V8}»cr“óxnÁþÄ©f-VâcÜil–ˆs,½Vð&¶+â-¼FÚ¶RbpœèåêŠ:]u~Õz¸¸ßŽgã`6ãv‹OCw øsqöñì?æˆÅ:endstream -endobj -1548 0 obj<>/XObject<<>>>>>>endobj -1549 0 obj<>stream -x¥WÛnâH}ç+ê "a‡[€äe•™ «HIfG!Ú] iÔØmÜ»›ô%„¿ßªÆNŒ1dµ;£É˜¸ûÔ©S§ª›—Vzø·“ Çå­^؃Ñô"áÏ >ðŸæøÃá(7½è_ÒÚڎ/óÖù¬—0O0ÆxŠ1 ~¯ó¨#b.­H×W¹“+C,X‘Ê\.¡ò'€W¦£”éEgpq±8ƒ~;›ÿjõ è÷Â)‚V±œˆ0J¸„´‹Î¥Gy’â œáno`ÑÁ‹³ãÀ«ÿ¼ÒÊ­7ŸÂö$̱ <ÌwÄooN0öÁÁ6£îŸB̙͘„53¦AèT.#½][,peëFéø8siáS!OÆ(¶nN ¯3&Ž&Єî7Xþ¶cuš:‹"‹ºH«Uƒ™÷ü‡T}ácfÙq-œ|–j#aØ 6iQ1t±ô8V¦VJbŸ½6•nëD‹¥Êi—Ÿ3:Ræuñ9ʧy•X8ÁÆÇqÎg#è÷wÓ)Œi|{Å¡äX–m»°U"rº³À¥[t®pt°Äâа)Ér*΢´ˆÝ…M*ð“A™²̚G"ÙúÕ9«À­±è¼,Ô0PðMŠ’ú7B®ü˖áï‚ ËŒz”ʦ´nÉñ¿¸ÄGŽ=Kÿ r$ZåþÎZ$´Y¸¹|É RqHoÎg—ÐÚ ûx Áa8 ‡!<Š{Ø”†n§ QöʾÔ»ƒ="WÙ i"ô[qÏ›‚4mЅTmø+×աŘo~Uä3ï¸Þ&¾€_„L<ã*”7Ân¡]9‘*“ª(kª\]³?¤Ú5=1ZûáéžÙ‹f°>¹§,7d¢œçU{mb\5=¢ƒC¬ðI-tC†¾¦x`ÖÔ!= fº@zP¸j¾ÍO&Â<„©1$è˜'Ìeö´ÛF!üέ¥<¥’A‘ý¾­}“P€&“Y keŒÀN"ASöŠm«°¥± <žžöʒ¡ T˜œ=SL£°½Û(¶±LÚv]Åùýå댲n¥Äe™;ò¾ªÞ¬ç³‹bütàë÷‡¯×óEg&´±?iy· íî£ÓþÃî_áóïØ õØuÏÈØ -$þn_Ìý ,ôP¹ù‘ïÚñ~ûøãb¹‡£G…3ÏÞ ±QVŽ׋¤]dÍGE±Ïéæà­±˜Óþºo9Ák%Îï–\Åk¥ù‹šãA#–oy6 âáT‹,ã»1U±ô=å Q¡Ù/â&_|ÚÒ°ab•Zd¾a:Fg*¬ÝZië]Ð¥Ùp ÂðXX8 ÚU"ðÐÃÚìKÖ¡O¹®ór5‘ ƒ•g=Ó;JˆÎ–Ò|˜Úû±ìS$)òKRì‘$ґÓk`uÎcÏÃóªrD^š³Ý‘BB[é²]Sþ<¡&© —¹ VB˜îîñ»ÁtãÑ`gƒÇëû/×ð‡V¿8ޕnªÆ¢PA¹!˜ôè+Ãÿ8vF“Q8Oу3˜ú·yëGë Sðêendstream -endobj -1550 0 obj<>/XObject<<>>>>>>endobj -1551 0 obj<>stream -x+ä2T0BCs#c3…ä\.§.}7K#…4 Œ™¹…BHŠ‚žP$YÃÓSO!¤² U!?M!3¯¸$1''±$3?O3$ ¨ÏBÁТO¢¯zs=s3  -!)F #\C¸¹ù&èendstream -endobj -1552 0 obj<>/XObject<<>>>>/Annots 642 0 R>>endobj -1553 0 obj<>stream -x™IsÉ…ïüs’„Ð 6_Zm9$YÒ¡36EXšj4¥Ñ¿÷÷²º«¤,93¡àã«\*3++»øå¬Sþ+¢ ՙ†}XT“j»pqæà>,ëÉÜqîCQÌ'…#=†­ëÉ̱³RpYN–˜\NeҀL:ˆàt9Y8Òc©Êõ$ÕÎW¸¹«©$ H­ƒVSy›Haç…6šØ¨v6ŸÔI­¬vàŠj5Y…Y&çlpVW8)›µHC’ô–hâQfއ²(åQb-cìA#¨5 µîùµâœ8±XÔl(“ÃÖ3ùžE-c$Y[Ì卙t°ÏäNâDiY+Չô–°{Qa—3¹›d©Wü›V–뢴 ²Ø:¬½,†Ì:,Ås9•XS\S.ÊvQÎH^DQqÆ°³‚s¬Ã°è˜96*^,b5”Êam(*ÎXŠkvçX‡¥X»ÎlT<¯­bYՆL±•]Ĉc|ʬÔÙTG1³QñljI/Š•6kÈ;Œâz®ýdÖaX’7u¬íµZXî¬`kRëàP¿™³úpæ -d椥,©¤Ì9ˆ/S A2è1lU*™uva Ϭà -ŸŽ–õv¶â„gÖºJ͉°:C””²à:ŒÙz¥ð%6ŠE¬$–B’¨‘Õj«ÁȈF½ÓX«nÇ:ŒÕقí8ÖaXŠ£ð¬Ãl–öQ96:EOSûXiϕùä j«È¤Ç°Ö™ë°â_S¡™õ¶¬´dÖ㘝Y²5bX;qNÖá}¨°ë5{ [ -T²ë1,vTbíÈU”•®°¢ªä„!˞ð Uf†¥­áTfV0–r*±+ºŒ밂¡“—Ùèòl y>“¨!sÙaD§ Ê2³ÃKÅ"Éz,§tDë0,fæY‡•ƒå‰lt™³î¶ÊPŒrÆıÖâX‡•s9Ë:¬˜Ë™uXÁЛ5{ ËÈD¨’lQlšLÖa̒wbœXµ¡…¶›Y‡µ¡âTÖaØX¹YÖa]–ÛÄÆí׃q4·›1b€&C™uXÛµC™Y‡aíJv²ãr¡¾ÙXpÌàÇ8V È'>ÄGˆÚ©Dz K9’Ì: KL)‹Ì: ;¯NeÆaFçÑ 9å1lÜzÒì1ì¼Ô!ɬð†N“Y‡aéž'²+·Ù³¬…Q=zøTåõÀ…Q]b不—ŽsVŸ3YÎAXWR&=V€Õ4ë0,#܉¬Ã -¿Âàd†Å‹Â±VąU†ÌêŒF‹8c™Õ4áX‡a¹jÏ: Ëûʉf‡aùҘyY‡UêÙ®ÇʺæÛÌÆ q­Y*Ô -C¶!‡1KT‰cf†­Ôfë0,4sÏ: ËP|"ë0,¥‡ËÙ®ÃlÈ:rfu ëõAc¦Ýºh;ß¹™³ïÜQŽ ƒ¦Dr/r™ã+‚} öT„> z¬h"Îl<4V\vúö‰%#“"8ÕST& Ì ’R˖ I4ªµ±fTk «¸Am"µ#Ë'µØ¨– ]ÍLú˜4 µÊ[«¿Dz ËtÍF3ë0¬Í™µê´U¸Jíŀl:ÇSÄ4sæë2~«ÛYµŸ-êéƒòYüYLF¨ãÒZdÊA8”;ÎLÍã—ÿRÁ±Ÿ-( !ĜSeÊA)Ô ]3…öö4>Ój1…ÄœûWñ·J¶ŸEd4>ßh•˜øze¬Š“LF˜Ñ”˜Œ¬%ëcÐFˆCÄsÙH)D„ãžáe%qr\¹oxÒ9Û-'X݇ñˆùY?ÛnRøô –(á˜ý˜ƒpö,œå2„c¼ä‚Í9ˆ“…M#ç ú͂t%¹ç—gO_ë —7<úÏËpymoýüfóäÍ¡ïÚëûM¿mºü7k9¸E\{Ž’’ÕO.Öû«uج¡½kºu߄í!|]wÛöþ.Þ=‡¦ÿÖvŸ“py»=†»uׇM{è×Ûѵ7m·_ËBà~³ýtßmŸÂÑCÚäÂ4œÛè„áæðuÛµ‡}s菓èg3¹§É”U—ë«]ڛð“ZWґƕ£¾zÞ·hÛìÖý}g2M÷µéÂå÷»ÆäøƒH2Ï·Ì$\ôëÃux¶kMˆ‹¥þÜyÉ­3 /Û=» ïšýêò“uUZ'W»v·k:i;5ZÉì /¯Ë.žów›äã -ŠkR!WϺê•ó3 ÿ:â¡6uq»&ÇfC6úïa×|mvݑÄ(óV Ø[\¯•nwZH¢Î_®$Cä¹”¤ ÁøåR‚ñìåEx¼î$ds2júýe¨ÀÛCù9|è¶ûu÷}´˜Ãÿ0.Œ]V7]óå~{Ür&~oÖ×õƒ°03NÂóõæ󧮽?\?b F҉èo©2Ëç£x$J`^t ‹“ôn½¹ÝR¡—Ýý±Ï6ŒõGËòßÛíAK^ì¶:¡oƒ¬Dý·eEÿn}¸_ïõ:·7ÿÅÂœb¿¿ýãpŽó×»ï¿ýJË跜¾?výÜ7×¥‚¹ßãð‡®¥)ìc^u]ÛÙévõʼ7 o×}h±Ð…Ûfwg=îMøÔôy´±E*á(‚úUsÝ~;†ÕOß½z̅ªdÌoloǾ‹ ÷øçð>vÎð¶ýÔÌœRÅh¬UÐýÝã²TH~T/]1Gþ‡re.ýI¹r³ 1ûBylo¶ þS$@Y®‹¥O”Ô—¿µßÂuk*>êöèc€niØR¨×±¥nR«|˜éÁݏ·Í!píÈ䇗/0Û\7׶ø¤>xs!œø°«ßWë ÒU¹Úáo‡£ûá ´äf=¦j8ݱuÞ¸cDºæn·Ýè&•ÓÇýÕÝúxüvn¶»æñ.f£ãoˆ ìu½Û…oÛþ6¼}ùìCôÏß -˱n¸ÖÖ‡`îí~zXL4=»øÞÞwAüÓ×LÐv>Á¿ Y¸‰¿þÁ½Êœð3ù§M¿yú¹»šýJ‹š¡:Z ˦ÝßÝ÷º«b;{쵕чöxÜjhÒ1?I;SsIC[´½qùéÂ'i÷wÒèÒÊWk\©viÑeçk›Zéï|¾”4Kôqh8±·:‰ýÉíòÓ$ð`˜›^¬½Ø££+±h«É4fOKŽ™æ%Ë&¡‡Ó\½à½o¾dîcL*W’|uyöϳÿ×J³Ýendstream -endobj -1554 0 obj<>/XObject<<>>>>/Annots 644 0 R>>endobj -1555 0 obj<>stream -xUQMO!½ó+Þ±ŠÀî{0¦ñ`¢–Äs¥4ÝÆݍ”5é¿wÐÚАy¼yo†™/&!èH…JÃ÷LpA/çëí‘5Š7ÐVs¦æö>±bìakÞ\{HQ]²°ÄÄVòBZbb›š«Â¸ÄĶò¢¥÷PBQßÝçº%&¶2Ü,ýÚhªV[CqÖƀ-[:vý !%Ü6J[·ù“€ó³–+Ž÷ÝÝiG×GH)DŠ×ÁO±KGÜP¿C¼½r{ò³'¿ü[a+(Ež³Õây¹ÀK÷Á'܍~êÐ֩‡,›KMQö܈6ç? )Ž›Éÿ'Ô´£-m•ÈJdͽc¯ìD\qendstream -endobj -1556 0 obj<>/XObject<<>>>>>>endobj -1557 0 obj<>stream -x­WÛnÛ8}ÏW òä|­h·i°š4[»è‹_h‰¶¹‘H/IÙõß÷ ))¶’Ø ’ŽIÍíœ93úû¬O=üôi2 á˜Ò⬗ôht=L®ht5Áçþ¬¤U8è'ÏÞÏϺ·×4èÑ|[ãÉÍ3‚¾I;6b륥QB÷¦:ͅ/aѬh&í'óÃVº‹ù_03¢~?š¹\%êL³Biç­ðÆ:~êN¥Ö8³ò¤¥ßûÈßz©æ -Ö¼!¿‘p°”J¯ñÙJI™ZáLjOÎ؊ ¾Ýö‹Ì/ãdÄîf^茦¹Ñ²Š/F–V‘]¢\4\] Æ:;^ö‡1ôS¥éNK³ýÏÖ>í­ÉsiÛ¡?XU{ ÊíéÅîm“A¿Ÿô†Ã:‡×½VÕq“Å{‘>–ÛÿÛêôföïL^Éd2¡×Pñe˜;ýkºœ\Wª™B‚ɤ*6Ñ~cH9Z‰BåJXÚ+¿aò8I`lሩÀ—öÊá[¦V¡Ö`"Î K%nÎD±¸‘çŒGšºíÓÍУ6{XøçÈt!…AQI­üá“È‘kêOª^Ž"9GI?¡_1ô¸w&ɘk3ßÄL¢ÁqEá¹@rH!Þ¨MtˆÃCÂUÔU·„,ikÍNe’r“ŠœD‰¬´W©ðÊ TL¤©tŽ8•V(”xV+)-.F' +vBåb™Cm¬)Hù„>iZK--ù  : ÏpÝÑé(a ˆXʄKádx¾0V¶ñ2ÝhD £ ó+¸:¶üBvTˆt£ Á™Ià> *< «³ÙÓ¯©0YÛ1*[ßf¿†S`ÙÜ •kNPð´´Êˆ “™´„rz™Q©3NP¹´twP½µ°¤®•äyc‚9OˆÉàŠe\V ÎJ­Kp™QÛ -+ -‰bThÔ͘àPÞГٷL{΁ÿÒõ[rí†khrKá_Èš`qN¬|ÔJ©ªî®øZ=àî>™°MÝnél7ð­ïæjÙÝZµƒŠ<=ÇBãSÓç›é-±êú'^î”4ๆ†]¢g[yÕ¸|øt;ëÎîÞW¼Žcï„0¿›ëƒ¤Þ†^Øë±Ìlm&;faÚeÉ S¢ž+½3ù.ÌÖºê·â8º~×&­,릉Z¹²+ì© Ì9U`¤ÏŸ±šG Žš)^1*šîçÃîŠvü1è•J²Ã` ¼‡ÅE+ÑÈø@Þ -¢~U+OÖXžF9ºQÂd°sW²è`¯E—ÛRk+èÛ#¥ð+h‡7 ikõ®_Þ¡5¬x·è¿æˆº·õ¶v$Q_xn—£¡¹MÝýi.±¼6»Z«ô5§ñŒ“y°E# Q~^ˆ$«3ŠA\=½ 'qýïs£É(™Œ¯â›Æ°Ï&?ÎÏþ<û àÁ©5endstream -endobj -1558 0 obj<>/XObject<<>>>>>>endobj -1559 0 obj<>stream -x…VÛnã6}ÏW òRˆßb;}s6]´@7›Â*ö%@AI”͍DjIʎÿ¾g(ÉqäM‹\­Ë̙3gÎðÇŘFøÓbBÓ9¥åÅ(ÑíÝ¿gKþ=Á•”77FËhþ³ãÛq4é߸/n>Ïi<¦8G’ùrAqFH0Qœ„M·ÊËÔ׈ï¤ÝIK~+<)G®®*c½Ì(9ÐZ”‰ˆ(ÞâF*4%’þ|X=Ñó ·¦¤¯•ÔüùùꚌ¥u­q¤ž -¡¥Ç•ü*þ~1¢áx -„q6x”þ›@Æe‘ÛXĹ¯Iú4â‡o>ώ ‡“y4ãמ -)œ9Ã4@Ê S¯Œ&|ÿnö¸˜« ×0“p$èɪR ̓)…ÒôÉhoMQ ŒÐå€\+{(•ÆR„ðVn„Í”ÞÐÖì9wj¥ð¡³&d)À¤Æ…45µö!æÛMY&ÈÕ D{YŒ þ'éiN©ERȦlîÇ1w¾ƒtß ªdzZt\%.£ky]‡^Nok×öYù–þ;C*¬™átÖÐ?‹¦Ñ9ƒçÝZ@ŸèÖ×FL’RXGU*¥JÚTVÌ©ƒ.hÏb{ßôW#Kp Š¼x‘¡½P(Jã<•çU* -҂…Ÿ¨ë^‚V Ž)±B§[Rµ |R2'X;%÷eGZ&.‡<̞î• X¡¬£jÎÄò¢Í^ÿڐî ×†»ñw㟰G1GÏ!^™Nh8Y†¿¬ûÔÛõqæ·Ìù½H_êªG(d~öàêaýó§†]öE´ -Č·a0Þldðñ8½/dÀ^ðôð‰ªB0†šTɖ"0?‰Æ®¿¬é›Ò™Ù;zŒ§a$ãY‹¯ƒÞZG;ºtê\הԞ´m5K¡uçdÎ>H¾V° -¶009)³¦Õ=ùe‹>ÓKü<T ëY7,1œA9oÏW¸ò]µô"Í@å¢5Z¹ÆOÚ Ýxֈ¨YÓ<½ÄžNæ>BÃÐup¹á4â¥ÑjW$ªPþÀwkø%”Y %; -þ™Ûš¢-߉žreœŒ‰+ä8(úL¬W_àûk™Ö–³¬ZÇû"´ØH :ÄxÊÀÛZ;¢÷|Õ´ÙÑÂçÀÍréQàÐ:•+¬¢›+“ˆ¾©}A-¿¬„s{¬,TŒ‚/COv¢P™Öu”N‹:;Ó4"¶ïú,ª„"®:XµãñwƒÖÖZ½¶Ï¿m­A[]ôšš¨O«CÄ5oŎ;uù®Å%vož«×´SÂ"á€>úÉ»8ÒÐtëóÍ~Ê"úæ‰nZÚ›9à@g×a{0Ý{…E„µ€À;<ãÑ<[לäæO¥ëW蛢ì¶ÂUÖìT†´‚j ÃÝ š£LæX‡Pö[æ|íz<":˜m©¶ãsÏù/k;á-çþÍrÂv^ÃûW¥ìé8–€Žï›çG-w¡y=ö9(êJ¬!,´ÛƒÖÂlpöèÞ$ØMè ®‰c'7%滹ÃKMŒ¼•q6A`n -ôRvÍ K¯P/["hʐÇèï¼9\x½EÙüþY4»É{‰ÛZ½Á‘¡vÌñVm¶(Ud<·«€¾=B¥áӐ…b ¹Æ!¹00&Šp2âú¡\ÅvÃòý0ïiȎÊʝ2µ t!*:‡ƒW8€•Lž`ú¾W®8Þ -ÉõãÓã×~S…CLJà$ mp{‚Ÿn¼÷å‰ô¢çñ-yóyٞ]ÇsߗSºÍ£»»p†Åܯ°@Íwl#¬¸´fe}ؽ2\Œîxû~|èš-fÑb¾Ä M'œù·ø⯋7Îëendstream -endobj -1560 0 obj<>/XObject<<>>>>>>endobj -1561 0 obj<>stream -xWMoÛ8½çW |©ÄNl'vºÀÚí(°ÛÅ"^ô’ -Q6‰TI*®ÿý¾J¶¬øP´I+‹œ7oތ\Íèf´šÓbIYuu7½£åâ=~ß?®ð{Ž¯©óûéüҋùãìòå… ×W·ŸßÓüŽÖœ/W´Î ŽïðI6þc§ê¨==LéIUE*ÐST6Ÿ|(Õô¤ý«ö×ëï°rO³Y²2™?"´u>þb)îL  ³h? úƦX¡ºñµ š\‘ì¿ ÉÖ²µ5櫍7ñpîcL•Ëu 8ðoæÍFçÓtæ=ÍVm‹ûé=Çñ0M鿀DØéӎ¯u†©Ô¯º<7G“ùjºä«èéï8ÌyRÔe$‹¬4ÚFR‘BT>65íwx[‘‰„ü}c­±Û)­w®Ù}Ü;r5£pK"’@F üÏ BxÔpèéõ”¾íL¶cĀ& cCŒk‘×™6¯ MQõí^úgpµð§¢#Õðs4™ŠzàÜÄ ËbJ_"姭à \ÄòÐ: ç1Û°Úz ôÏcÏ×â¯ó›¸Ó‚(–:œ`›^¬Ûã8p2Rþ^ö!ze·ú†6 €ŒT "2–ö&îzݶ¦U]{§:(Œ[)*ìð`·\ cM4H66dÎFïʏaYÏý ×9ËÏ­«LYr00'z¡$À‹zU¦T›åF ÷;ËÌ?R‰þ|¤,ݾÏ[•»p²˜xÛ1÷/¦)îR;àÊœGýC0]CЉ6'¶Ƈˆl  ¦ªKí¨K§Or˜¹(¦yÜÐAƒúCÊf®ª8çSXCØÊ]æJ²zë¸0Â]0¸Ê ”ÄmU•«U{çsižúªj0‚ñÍ2]GrBù<…W’Scƒ·1x«6ƶþ¿ºˆ>âƒø›+ª-t,÷€YG&×J*<ðžxˆ*fcƒ*ƒ%?Ž“´•»¡s‘À£w‘6Š;îF)ÛýeZê:ÉqÚßØ=fÄd¾LDá«o’äCh2”<ƒFüŒÇ£´ð¥ -Ýb ä’=Ðʈ¤â†)¼«Î,͓¥Éüáäÿ‹¨QW”C’ž7Qqši´®ôÏ: •£ JΤ*×°¾BW¶Ïã&p8Šcéµè(z¨®`ÓÒÃêà †Mqkԕ^ÔìèSŠbsÈBm¶;´…pƒ‘ßf”ü(¤‰Aô‡ &îѶZSé~0Ó/N¹eU‡>ò—N«š24èÐ Èý£Ñ!ž-š­.yjgsnoÚÊ @@ƒ ºá…Ábò£œ8YV§Ó4àGHh—Û(õdkŽ±BsSùÀóÀ:÷<†HºôŒçñ7c?}ˆ,æ‰b‰âyÇÑÕuɃJBãÚÉ0á«Ï×ìŠw™Ù%iÓØÿ%ýçåݾ—Ì{³EIê+zyé…T¿ƒ÷„$Fg¥°P+ÙIàŠkVb¨ãH7÷Á‘¾âvìÅÌpè™rù ÿ_ŠL:èùZø~œÞ >4<¿“– -ԑ;yš¸Z#âV¨û‘šè¼»˜LÒ8ÁeiƞB•°nÍu©ÂÛTÚiDÈÚ¡Pi…‰ ä ²²Ã q‹ËÖu º'`˜4hɁöʂ`Ñ ü⎠ƒF´¼€h}dxœ$äqG<Ø´G^˜ÃÇ¥C´A××5Ïö¤÷Z €Û®Žá4 ÁFú O–½#ßÒþ“P%š$0H"NÔXósص!ÛéjØõXA°wBX{ÞN‹„2¿ëñ6ç>€ ·+êq~Ž:ºv’ö7+u">¯û—¶âqHælRÀÄâRÊ"-x÷• ÐÖæ«*M>ÀôX~^1¤;Œ»ï,ØW±?0Zpw< ¿ŠJ„v££wï觭)±[Ä&ý<Ã)Ä8«¯röÌ+:œ‹;&–l7-ÝSöøô–€fF@ES²Z üiÇr¼ËcðñÖŅà$’·ÞLâé÷…j3…ðˆÆ¢Ö§CŒ©!i?ÙK{·ñvàYmyQ“ÁܸŒ6…qÑ0Z`šçÉ4§ß*$^œ‘-ÍÛv_†Ý~~<}«\=ð"óë_IïW÷ÓÕò1í?‹'ñçúêß«ÿ|¡¡endstream -endobj -1562 0 obj<>/XObject<<>>>>>>endobj -1563 0 obj<>stream -x…XÛnÛ8}ÏW ü”±b;Ží,Їô,twÅ}¡%Úf#‘*IÅñ~ýž!)ٖ[mÇ"çræ̙Q~\Œi„cšOèfFyu1ÊF4-²Ms|žàÇJZ_¼[^\º£ñ”–k\™-𡠍h™_Þfãì&£'i_¤¥ù"Kü’7Vùý›åwܝÒxï'sܽü¤´(Ë= \¼Tò¥¹t+£?5~ ö£î ù­$'ª•hŸ[Yëyžå¥’Úã£ð¤ðߑÒÔÀG2¢áø&›p§f3ZÂnwWj*Œt$8@ç”áh|SH8*¤Ë­Zɂ¤°ðfã哠¼xÆuÄÚóʁhQÉëZ8·3¶ˆrRɹ“º€c]ð^Vu̬4¤‘Rt—#DZíŸ.”ސ|¹²ç¾  Hü$ µ1žÖÖT|3ƒ2¬c€©4é¿pžËïYÚ]À° (CùÄátrç(7ZËÜoÆÞ@³ @žHJx5°hééñ]¢Co”‹Ó9C,Kç&³Œ¹|ù¯iÈmMSöÒ‚]3Ø˜ Œ½°žÌšÃ·Ê]Ñîù$HéêeYF§© ;fbKì[ f/T¥¯˜°Áý™µæg®©#×¥Îí¾Ž8¡DxèŠ0t{Ä< Cù-ølÁ,Sõ\‚µg¹œôÁN…4¹b WHº-dèªaml•ƒ¸/€Ã ’U­Ê¶UwpÞóyH¤«Vp-eÀ¥µ¾±ò*kd¼J{ü 'kaŠåªUÁ°_öÈ´èyu~‡‡À»|@õ  ³±¢Þª¬,L Р([%1*éL×ó=Ç©Oßb¢µ—VœVÂF/¬ƒ[àòë”#” < øsßÆv‡é«BCBâ>/S®˜Ä³¤ ãÇkî֞sò¶]Ju7lQÞâ„gôÞèµÚ`2£l±Äh] kY•˜s‡`$XeŸ1…½D/0¶œÉé OÒùøÔ]k9R‰}çóPQ.Ç5Š*Jù4Znä5JY͚~J -æTكñۥȞ3‘´‡Ç—ñ·7„$Di4´‚±-1˜ÉËWtŒçT TÛOmËÓJ8ˆÎ©» i –\mõŸ,zþC‡…áRñð©­ñ&7<$òK³=ø_á͈Ÿé„¬„>á+´N]²’…hdÙUè#Ì¡žï&_cc¤gxµMÔï÷¯<:ë]Œ(dÝ $º/aTߢT+n‹8Ùa¯¡Õ‘ÚÁ‡ډ½ûƒÃÅ:9l'뽦ÇS6¶eö²/Ÿÿ|ÿׇí¯\±X©¿áàY›š;Ž1ôÛHÏÓB9œg Þc1¿Mfsbï–†‡ÝÆ·„ëÎÌcÙ@U|<˜¬(GJÄqƒ8Q £,Þ6©xkðjï¥KÆ¨YùN¯Zf5Ûl¹9ñÏ_˜þJ)-«XA®.!¬P"§ÑÛ­ðՇOPö}P©„: ö4˜¼áUº[i†í…á|tÇ2ö»?fLçÓl>[ęs3e?./þ¹øpÒ+endstream -endobj -1564 0 obj<>/XObject<<>>>>/Annots 649 0 R>>endobj -1565 0 obj<>stream -x­W]oÛ6}ϯ¸è“ÔŠí¸¶3 ÍÒlÖ´›t´DÇl$Ò#)'þ÷;—¤d[õÐ=¬mR[¢îǹçÜ{õ÷ِø;¤éˆ.'”Wgƒl€+í¯?~á+4ϲ1U4¶_JšÇ[—Ól‚[Ó7øo¾4·Æ—ƒlDãٍðc%­Â3ÃÙ‡OܸºÊfÝë׋³‹Û1 ‡´X!ÖÉlJ‹"„8 EÞ[¬aՔ¥yVú‘6ŠJziåBÓRRídAÞг±O$¬©5¾âå\-ɬè‹Ò…yvtõBy©¤öTo6ÒâyÇñ¼Õ°éÎßÎÔ^"§EÑ°³ÎÁn?+ƒì¼ÚUÊ{~N*vÌÎæ¯ v¶0û¼–FùD^JaÉËO¢Æ1íU.¼2:c_·ºŠ9÷GcÀ§ì0z,åV–|¬Go)ñxOi/¥íÚ€-l4 Ñ5±Ç¾?š°…ër%êÒÓ\TKAϪ, ˆ¨¤ÜºIØïeµ‰È6Oõ¦=HJ‡Ï…ðb)\¨Kir2<Ýí¬ÈsÔÑ»Œ®e.à‰îï>üÙºDíÞ2œF‹²Ü‘Ñø…k^ÀÏAœùtÉÁ–×ì½A12­×šãë1´°íYÙÛó¼"+¬„C-e!‹PK<>šÄþ -˜Àƒ×-y‹ñÇìð}åÁ‘J<™£•z‹ÁHImÌÈ~±†·J‚tˆ_xFlDÀÆNÔ"¤Ã®Ä ƃ¦€GËÜ3cE*kbìÈz»F(NbWÕγR ޙ<•xQU]‘®«%Ò­&%x *±T¾Ž5›¤îÐCuYċ m{$ g X‰õŒîŒg¦2l]ms)ùOsŽñ ò.T$ݼŸÊè@1/·»è=œ4rŒA´5€ìUwHX˜EYéXW¨$W»ŸÒNj‡¶²MI9 ¬¬©ÚÚ²ü†yŠÒtàÆzi4zÄðÈÒSèol'Êy-\ö€ô Õ¦Á¹´UíC¯bºtÚ ·ÜݸAz»ã{x'iÉB¥¡Ë•¨„Ï×\º½zÆôÚI:7ÕRéäk%TùpÞÕÔÅYJ°È Á  ÌáŸÙ:>K-–%* -ëY¸*¯M؎;3z8‹3ဧcÁ:ã;Pu'4¿¶Š4z¥kB¤qN-U‰*SöÕøN'Üþ™rÕ¸þˆg-Úì›l˜aØdtÙœ·¥½[p©0ݎ‡Fbl4אÿ ñ¤fáצ½¶¦Ü&Z‹"²º­äÉqÊ4aYTˌ¦•*eŠýû9EéOÊ÷ä·ô×~”¦‰Ôœv2¯­ò;L´¨¾îι¦dFßÒ«;é¯?|šåIýÕ¬¾~¾ùùÕ $Ö¶˜äŸ±ˆ]È[ G"7õ±R8ƒ¡s0ýјÂ^Õɸ+µSAKóX]…­*„Ü\ls*aeÅ}:=Îò’¶ò[VˆéSÏGûY(‚fð¯Äøà†‚.ÚdŸÊŸö/Æ#5©í_b ´àTã&äŽs´´'25*‚QŽ¦F¹´aùØ4N…ë~´øQڒ}x {ß³9Sî–O°ìºÕ½[Sx®Éªc¼0P¼•׊wՐ º#&¯ 灗À&{¯ÕK³_…¢3 Ø13!¥Õ«“oÚµ—’‚ՍE#Å.ÃLáÞÏ™Lú°™Å•;fsq‹.ˆÖÇk~ÿr¸ï‚ãŒnLÅËÛo¼öÒ<‘£ØQîuünÐC™4¹°™"bƒa…:B;JÇöëÂAÇ)‚ƒc‹½Èˆé~ÍbH"õ-10a´ªÆ.ցÈ۠и¹bÖñÌ× -Í"AúpÄj—ZÌÂ.?¸ztA(ӏñ^ã½æq͸#¶Žã¯¿ïI¼Ä,ÿeäŒ1vRz!­J6;Øqå0†šTSêÇàýhô„±·'´3t Ç[ßúßfÎÅí,Ùá/¥³KšLù휙¿ûxýŽ>[úʍÉë -ô úç´úÍýé/eÍpÃKÝ÷´OÇÙt2“qøò Ûx¿8ûýìÖOúlendstream -endobj -1566 0 obj<>/XObject<<>>>>/Annots 654 0 R>>endobj -1567 0 obj<>stream -x}U]sÚF}çWÜáÉÍT Y@gú@Bh=LZäÉKg:‹´À:Ò.Ñ®ÀüûžÝ•p¬¦µŒ´÷ãÜsϽú6ˆhŒßˆ¦1MRÊ«Á8ãÉíòçoƒd… %IŒkEÉ4Óö®¤­µ§$ž‡±=›XCws;ŠæöÙl -³ŸšÓÞùL’i8ë¼Ï£Õ˜æ”í*áKáÀŒ)Ëï¨ýÑ>/XObject<>>>/Annots 657 0 R>>endobj -1569 0 obj<>stream -x¥VMs"7½ó+úè­ -3|:7ĉ+eÇk“J¾­gF³’€åßçµ4ƒ{+ñ¦\ÆFÝ­×ïõ믝”úøIi’Ñ`L²ìô“>>Ù¿<þڙ¦IF£ñ0™RIéh€¿ñ]AOü8F#¼§¼føµŠ¯”Np.DçR HÆIz·éˆ® }î\Î:½›sÊú4[àáñdJ³<äÇ'òìj%j¯,zå\p$*ºŸ ÉXúKWÙ =X] -»û4ûÒéS7"ÀÙµ)…®èÊTޚ¢P–¿åDé$&ê¸<9NÒ!”U_×Úi¯èQ‰\WËxbHiڜÈ&ɘO\ª…ÁwfMñuµV¸r8CÈéWڑŒuÿDu¡„STŠEnc~%|8+ðFš±¼˜Š¶Ú¯8àB/×ùi.œ–Í­ÒA¬v¡ åÈ)»Ñÿ +ç Ÿ,9­Ì–¼!U…ˆü‰ÈK]iÇÖ¹­±9¾–vW{m*pMh¶RýÖ B­¥;ÉËݧ<ÞRQDì µ•<Ÿž?£wªZ,U??îCèØ8ɺòeiͺʏÏs_ôg ¯°^K`f־З½¼^Վ*`ø@@öÏWÑÃõUB·žêõy·E‚€ÒKÃdn±ç{Ój„Ç]¢Å¥b,CˆM‹u%_Qh¿ w†¸ºÙ89$ga–¦r¡L97[^ÓêAýoøó÷¨i¸PF²ÐÈäeƒ|w’LYÇàæs6ž4}i™¾Ü_â¡’+m3žsš;01FæÖ®qE*ÔF š}ÐVïæGò=*oµÚpJAˆHf2°Žsâf£i kJ|fìi…=FçfÈAwÞÃ)’è¸ì¶›ßEªíÒ£Î24€U÷^°ÿ†ù½‚ªìKïiŠ–ô` --õÇvGÉùô<¨`:së´¼gÌÐkRÝd‚^@ë|#* õV±œýh°"Œ‚¨ú0ŸN =”¾SµÀUì r#×,€ÀÊn–%Y?=¬“$/ -³e8¥Bi• -c‹E)0.FçÏ\Ì¡zZ^°V;Ìyo×Îÿ]ä<ñ^n´Bþ“up'*Œ-TMåCiºÙ4I¹oôÿ‹û?f.f£s´j¾{ä OwðdŠ rˆ@|ノžÏt¢’#µ£Ø î~vÒÿKÎ-‡0ûœhÇû*병皿OŠ÷Nµm±¿+;WÖęÁÇ1¦¯µUÒ»{¿šïIó´#Ñ +çÞÜ"ØNÆ0…3åëŒd=àyëàìªDiŽÇšhéÈ΃Àñxo,*ÚÁ¸j…ÆɂÿÚ¸X° Ào¤)ïܺ®±%ì±:ÿÖu~ûkØß ¯†Ý(¨3׋̺ò'Í £–÷§ÇÃúäwõi¤°J =s¥*\lq% -(¾)Ää:ÆÄë²5õñÁªÔÐýîi_4¬,€¨r7¸¨Lû/ˆìärƒéÀ0×ʖhX}tïÆ [»ãU¡É~{h͇î"±B†í*ÜjŽëë¨7]¡”Í­yÜ'ޘ7VÊý†ö:°àYŒs«P vJ~·{ç½#ïK!WXZ˜>°C!%ö©Í(°4Z7F5œ#Þ÷(–¥ÓÍcì°m‰%j -–Þf:Š3ˆqz7Óv™ÈFÔeI:ñBñüí°áLÃÉ0™Œ§–Á„?úeÖùÜùýGÄendstream -endobj -1570 0 obj<>/XObject<<>>>>/Annots 702 0 R>>endobj -1571 0 obj<>stream -x•W[sÚV~çWìK§Ž']@‚f2'Ž“<Ôvcf:8BŒI‡èBÜ_ßo÷HH`’NñXힽ|{;|äã/ $¤(¦¬øžOqá}D&Bìyã)GTR<†EGt¼$?åø…꘱/Jg¢ãg‚83¢ã‰(u…Øó¢){QRDÐí¨Ž9 ;ƒ‘/äåÕK]¦yÅL[ë¢PµSÒ7D¡dŽ3«¼6–†p(«UjY]J­/](¹a·ÕRáHZÁœß¤uZ*‹G{pY“)ÂXJ¤å¬µÀ}cY£ú¾)Øã#uvZ+ÓÈàjDZÍT¦Ì?(A ؄<]$8 ¶úž–›B‘ƒ³Sjç¬UqˆÌ­P0iæÀyNàoíÑY“°ÉÀLJB/ÒâSš€qÂë½J J¥ÏñaY¥aI‡Ã Fʹr€¹gô²q5%±wv{óöæ؃ö4gè¡ÖÛÍé£×®ß_:óò¾÷É0k½-–:×+ça銈³\è,-6j¤¦Eju%u -¢(Ð1EëK<æoÜ M¬›Z­TÍytªZÁG%Àô$Ûÿ%Ö÷ëHÙÉ8ÊÐ*öqŸº?+·(~ {îK¡ïŸ±ÊÃ[‘ÖŸãï'­©*«7Üå›Ô¤j‰‚âù„ýu›×ªT•uÇeöÔZ£ ;ޚm;iÕl7]Û6}…~ÐՉºkîØ\x?Ó»“ÙŠ^5V#ˆƒ!úûSßE1<·ëÖé{¼~¹¾¿o'/¨-óNFá¬q‹¥_ ­u‰šjìcˆ¢,PS¹¹¥…¢Ro+F<µ?ôiYçßö­öNš»WyÎo6Ö÷›i×Ê?õÚm8GªR5úß©3YcÐÉl) -‰è¸âÝаk„,Q˂€£t~~ysw~.Pò¨äÖüˆ©!š?¡oQR?‚ßÙm‘^V.O þ¢7ºE¥8Û †xoôÀêüxêA?õ£­©GÒ¬#ÃkqTä‹QíéÄúY’®ÜvíeOd‡VTäƶ¡ñç誝˜•M—Xýî¡ïÆèQ•½pÀI”\мðJúÈ«mÕÊ°? -‘b“¡ûFX/£Ê6‡Žt=‰°ÒG²ƒQÌ©ùÂFÁ}ÿHªk†ÁÄ v÷¤6ô˜—Ó\Ú؍¡ ‹›Q¯pùÉ++»yÍõÖ§[Çé»—¯#rÏÀÕ@W²mñóc¿nߜ˜t2WёªJ…Zzt…ÍZòèhïcºBS︦—\Ö9®^² 𤍴¹Y½¹~ýáïÛùû›komË¢¹eÍ.âÇH@í-ì>Œ“fƒN ­váwß3ÂÝů.è¶ÖŸ1MèRg[Å[ô§ ;øÿ_µÆÉØKâ)nk8MYç›ùàÏÁ¿òÐÕendstream -endobj -1572 0 obj<>/XObject<<>>>>>>endobj -1573 0 obj<>stream -x­XےÛ6}Ÿ¯èò“\%Q·‰¤ñ›<¶+Ù²“ÙD»›T&µ’I09í×ïi\(‰%W¼›”my†ÐݧOŸnð÷›)MðgJËÍ”•7“dBßÜ-ñy»âÏþIۛ·››ñ‡[šNi³åµ‹Õ’69aýdB›l°ÙK²Ò £tké{Ù´y¢·lSU;¸’µ%,ˆFé -.dE›ËœªÙc£²”+Û•¶î{xÖ3˜ËF¨Â&×0š-’Û/À4š­’鍾™%+^ò“(SAsäZoá6£L—u!±âÿO>ê-íŒnk*E]s)b’²ê û~ãødÿ£R/=ŸÝvK b4Rő~oÌ9»Š±Î=ùRÌü 3ÊÖ"“¯CÌw4·`Äh~ëFÜ ÝãԆýû$²½ª$m Óreº­ïÜß´ªxɽ˲…½àêlâOâܽsöGšÁØl™,º5€ðg@x„¸y\ã£f/~ÞZ›hq~Õ¸`qϵxÜãÀ|í]æñõÉÇHröÑÛñ¼Lè»S2@ðRUÕuzBÁþS¥8‘|u4·\˜äU„ °gƒãka-x›ƒØ¼ŒWd *0ÄzW¶9ä 3²qõ„[È’[¶Ìt,?‡ø¬–îuÕ]Ò$´áRpˆºƒTs¤-ÒËG‚#µ‘Ï\¥€©­TmÔqt´³cE)¹ß~÷ÃOTñ/[£Ë=?Rp A)Xµv`!sɔ–©¿ä¼Œ}I„DÛ䬆4›L^†ôó=½Å^„.ŠžQŸ{GÎí |í ݹw/4¦O8÷[Hâ ¹¦J7 }+«L‘®(e¼¥gõÊŒr8 vÂI¥,Süæ2àHe&5)Vw‰õº¡Z[˸|ÞeF´ÙC÷ L¥{Œé f'*„s¢¶­»ðÞݓm´?yE–ÎkÄäG¹c}=&´ö54š$ -«k"Äjƒ `r½â+ès•HXšH I©ÈžF!ç¢Ácö’)w… £pŠË F*Û¢QÝfñë*ʋ§k å^;þ°8õçQ„È–)ê÷ûQÁ4rHxu6SŠ¶ -¾:ïr¯QéXȒ!0‚‰k™ÎéP”nò³U»z…%=¯uíjÝHÈ;'G·„ñGUµ/dhÁ%׋²‹ëý?ßÿø ¡œÍ-BÉ7”jÅM™+ÍMüKÈAÏZ¬@´/οƒ* -Ö÷ð<°à²dD=£íôqÊáv†”±;¹Ü -$‡‹dÜZ3æ‹1d%ãB¥ãp‰ž_P»ÂE<–Mæ7tìr²™ßù¾r6ÜĬúá&ölŸW$ößUëæÓxÆÉu’é¢gé¬rYƒ€ #N£=ô•ËlèŒ œ{äW*Ë¡ŒÎ„9òú©µµÌÔ6ª{°óªBìÐü—.ËFT;ù*îæRCËr˜ÌB:¢ž™ëât©¿žÊþDùG©üÚyéù˜š&O‘ò>OF vª*¢p™§<2T\÷®óG×C…y)ò§D;_AB7ùªëÐ:þyž\×ÎxÛsÕgøIQ•ÜBÆ]®À“à¿×1¯xêç–Æɓs>®Óég”FXÀâŝ íë×d© ZrÐßƈ\±.ˆ‚¼5ò““*Pڙþ+’t­6 -õæøhŽWu|Lõ3ú¦“W3Pæ›× Æ/ïÀK˜T! d;Ê£|ÆÛØ$¢$¹qG£‡{)äYÂÅ$Jä<ÿãç³}8ÕðùÄÈn¹’itXc{êdÖmÿê1dè×]¡SÔæo<Å9÷õÜ KXý¿œ°X4¨gE.ê«eµ®èã»õŠ‰çæ¨>¸hñlëØ'ý?ÿ2x2ˆ‘Ì’»7ħ¿{ÁÞkÛôâ@C +0æ:)[Sï-”ù¥FG´¿Sì½!¦k,] ʏʇ.Ó÷N¾ƒ ÑFÀÞ®Ps1LõÂñ -å¿d>_-¥+QÄé ÞcòÂtijѐöúÀâð+Ç­ta °õ¶èQMn\ÁK„nH‰B1„³;½/B÷†fð9®æ>ŠêD‡gI\:»K -FÊ=Ç®˜GFçô¾á¬F;ýŠþÀñ^+4̸<ÄÀ$\À4TáâʵÖwàEÜ÷öț5nJðÝÖºÊY(xdŠýÚt¬ÑdùÊ|j%—!ž F/´À|hÝÕÉH÷ªÂ‚u˜¸›<«ðŽÃoºd}ÿË* ›Óù*YÝÍi—Hü.aýéíšï:Üp{>{ÁÁ§Ž¦ ¼WZÍi´œÜñú?q[wȟîç·ËÛd¹Xù—Có;¶ö~só÷›ÿ-•øxendstream -endobj -1574 0 obj<>/XObject<>>>/Annots 705 0 R>>endobj -1575 0 obj<>stream -xWkoÚHýž_q7[ ZÅ„oI³]uµm· UµR¤Õ`0=Cýaýž;36†¤I»JI‰=÷uùvQ?t:¢8;ê‡}:›œ†NÆø>À'—´à8Úüúô»=:èÃe4á?÷GJ×Gß(‡§›¿DÐõ'8½·Ñˆ® }<ºœõÞ )Šh¶`û£É˜f‰µÒ§YÜÕR&TŠs)JI/g_qîÚóݞ,ãÞZÅ&qojM]’ºÌ•,›—ü&€ê`0 -‡Pޝ­$âø”C±-Z2¯”Æ«¼*Jql*]SVÒÖñNèJ¤Î-etH—¦\Q¹’t-²¹ ¡ŠMžËbmt¢ô’>ku_ë³Æ]H Í·´ÂñÐEû؂q8áÔÀߛÁhì#¯ã³/ƒèÀâÀñÀt°H·Ç-—§÷æÑ H$ªÒd¢T±HÓ­Ùzä£(9$v¬OµRe€ºãTeVóÕ2›'~ž@¥$7Ý7&§BÆU®Êí dpÿøL.c“eR'Ëd¹2 2E³ƞÀ0[šÃ ˌä ÎlŠÒí£ÀÖ\ha{Nè±O&atNÁ@ftÁš0 -Égü5›CÆÉ,ðÈqef¹rá¹âòXg -À ˜ÒÌ:Z¨¤*J¹&¥}ÊÀgÐςfÎû<àØA¶<ƒÙžsìŠ'D"§Xh81(‡ª‡‚³ºúèN­7ûÑv À£dN‘$“y…!àÇJXºh“g–pxͬ9pÙ׺–›½¢)Ø-`hÒÔl¸¢à"<”÷"[§ü<~*]ÝÓ\°bÇaxp's[À»ÎÁYñÝ 7¦üõ0²^Uä½b®4¾Èœ# –h_K¨—È»ž®Ò”‚ØÉÍDŽëüißj‘ÉãCÍAA=Ö»ia+«÷f'î¥ÿaÉÁîï:{Ïàš"顇ϛh3×côAÓ«Ëë+*¶ànVøR~À[ٝxÅÆ;T•*EÝÿ$òNšAº§<Ÿ¾šFýŸþtÚÇϓߥ-Ô}€[Ý5ŸÐ7mrç¯0MÁ‹cëµm“'´1ºSbVÜax‘M°É®¿îÖíPè-%²ˆsµ.RaóÅ͇“èFâ ©P†'t‰6„W¾6Ùº*eî'Qm²Qc»)ü]1/L -q èŒw´d6õ^–—o?\;ûF;ó¼ÍàÐãCyQ¦«: dj²±ŠgŒ b×`-ÿ´)íL_jõ¯K3 ´ç†Õ{딣ïÛË{³5ÌÉÖlM+¨œK©ë™Ï} ÷õLm/rüÊo1n0ó„8ˆØÚs[Llt‰­…ç -?Ý h‚[m6“S• -»žÏÑþfØÔá÷f&ksL«çf+íE6wú¦;q‹ênáüØDÔŊ=á½õ'Ûic;j9Oš–ZÇÔ85ïZéÙ°]'YS·û„d·Þñ<`b«nŠz{ÅCÍs¾Æ¶ÙV -ZJÉ[J»Ù·0[ä&³rŸw*¾¿%ú’«± ÂA?óÎÃÉ`Ľà¬®Vßf=ñÝK -;j¢àEºu´à‰&aÿ Í'éºÕ°^ ™Bß!¾[£`«‹Ûzk¬ä·J݉”÷iÀb7 «‡­¶‚¯qÚ+'Â6*è‹Ò‰Ùëýuõº±„j¿¶/°b)óctýB»Ê Û‚–•ÍJÅî2ÓÊG½g{€¬èî G{Ž[ð=€ö„ëÍRÚÇáì†ØÖT¹¿80$wUÊٟc¯ƒ=ly -3¤J°V²F¦-`—S@°Cçç-¦ZÁ³µÝ8Cº°h)Í×%rh¡åôds™5I[áØ~g·J2®ˆl§^*ò%†¬\æR²8oð݇oZÈ"**ì0ÃZû·©Ü|µÍm#r\¦~aµ½7¸4Û«n4†“É÷ã~8˜Xæ^_¼»„÷¹ùŠiŽÛt\ñ¬ivž áö>9¥`Ü·,ý?÷˜áxŽGwöÙ§ßfGþ³Âûhendstream -endobj -1576 0 obj<>/XObject<<>>>>/Annots 708 0 R>>endobj -1577 0 obj<>stream -x­WkoGýί¸r[™HfaaÍCéC¶·®š>bª|¨ûaØÌ$»;dfטßsç ¡VUE–0;÷y闏”øKi2¤Ñ˜òª3H4žÎ’Œ²éï‡ø7’–|€Gw/o쌲)ϧüZáú8‡O%Ývö?ãÆ&û§{Ÿ+ÊÒ,™írÙd–LAé(åãO£»œwú×3J3š/‘Ðx<ÅåyáÐ<,&tò[ÝkV²w]nOèÊHÑ(]“^Ò‘¯T-inZÛÐEžë¶nì‹ù{ØÍ(M½ÝÞp«ÝùJ’•¹® ºë -¼|¨*Y²¸{A±e“¹3_ßSl7ζ¶IY²ªZ—[j4‰²ÔBht+ª…€yó ûP/%Cö‹çœQÉV$,ÕRÂ'mV²v—óRɺaÓï5Ò)Ø4-t%T{CTƒíݪ:—$^ðz4Rd÷±UFZ”kƒ7kd®ØŸµz¤ÏN+Ù¬tAKmH´ \6*Gbۃ4v…áÈömpÜ­mù -Ùv½F2ÅKď¯w1 êKuߚ]ç؈( -\”†lnÔº!½v}Uµo Ki«E¦ü±Ã݄æì-$‚wµn¢ïâŒVz#і—ÏÔ—Ñ~QZM ÚU µKò°—’A¯¢&ù(€ 0‹Ioeñ“hh ü¢êö‘ìÖ6²rúךE|f¾³ݗz!Ê¿£ã£C—ˆ¾¢o“$1’ñP bêZŒ¥±8ùþó+‡ÕýŽú­5}»P5ÞHÃ罂ú…|è×mYRïžR¨EÏRŸŸY¢’zo蛖|½Ÿ˜Ú¡3…£ç(¡ŸZ÷ôÊC9ø•°¿»O|\Ë¢e­BÅýlˆýČç=£€çjVÎzjƒ¼CYôƆʎr Ž½Èšð ƒÁçj½‹Œt°”¥ÌËdäÀœË§¸D`çEËÈ¥Zãy×û:2 ¨(Ð+k7Ú"ªYÎÚ¨UÊ{Ïü³@º<E…ú؆YôúxI‚˜©D&Ìd/Bñ{g}%œîÉ‘Ñ ÇΣ%()7n_À † *¨]’q­ðʤ–`)°ãˆºQ@ÍR¨’Ô’ÁU-Ì֑:2ˆ` -ÙÞ#øš)+wuq5sŠŸ³+ݖG`e㤖 -µ\" -e,'â[uèÌZ+Ñ nßê(%ݾlò¾»îzñ4%ºœ©Ùž¹H0%Z£š-4DX]{X1nL8t+­ßéÆW&”ÿx—C ÚÏ"Qçf뵎o3^d(tË.WPž{_Í£G  ºô$j跛¥ËÉêÃYÕ® W64T5ÐC ØBՀºH®<«7I¦)溛qwÃñ$Ô:’Ï÷ÒìÜOÁȒ_ç¾%Qz{u½y&EÌg…EðRŒ nvM°œcÎÞR5ï4Øüʶ`0ž~}ÊøÃöÖT†q1RkYtºÿ »{×m¶k¿êAð=+ÿ‹P;ö3ÙG%Ök·R'tm¤¼¼}uÐJ¿{ktÔNÃNdà\קM\–…ß Ý´ßå‹[ÊÐ^®Ÿ¶c4óÛëÆ4ÈU:B§f#g^n/Þ\^pÞcÊÓ+·P‹Æé‡CD:Æ/©éˆz“ö4¿ìü¿ß"Ù$K&ã)~áÀL–²õ×óΝ·AH¬endstream -endobj -1578 0 obj<>/XObject<<>>>>>>endobj -1579 0 obj<>stream -xXÛnÛ8}ÏWÌ]Ä]$ò%iìäa¹4€Q4é6.‚ ”DÛl$Q%©ºþû=CR‰ì&‹m€Ö¡ä¹œ9sfØï{CàgHãŸRVî]Îöú7'4ÒlÁG§“1Ír$ƒÁ€fYo¶’T²$eIWņTE./(©±2'§©Ò?•3›C¼›Iæò”£µ6–ji2sÅ&¡{M™‘ÂIogßöŽt4Ÿ?LoogóùŸá¥g>ÃӜþ ~žµ¼î¸i "7h¬Å6d‰¶` :(e™‚(ú\ÝÔøŠpÜ͜½¥¤Šÿá j'_f>Ãǔchæ½Tä¤r)€#?dŒ­™¥´V,eBW+Q-ƒ*0HÞð†šX]Jr-IVî¸DÿæZZb¦—Â9–Ä}HF¦Zã_. SK,¹9VYûhœL†4:Sx£íGÿÂÑðݤå- ØX™ËÐì´ÐKŸh2ï]AóËù[nÃ`ê…ÂL=B¬‡€6 I¶É2à±h -hg -E N¦©¡žA”˜ž•\ãð‡4–c š™Î%EÑXyìtv„úög\Íÿ•Â!}*¤ÉžàcYAÙ¦pœ³‰†vJ"òå·Î§M” -®LY{AI™µàݝe±A_:èÜC*-̳8W¬„R8›¸<¥\8‘r¤ U湔‡.-5ԈTW;Af‚ÛÇS>|ƒíÆR°3Xò׉!пÊû@¡à(Dà鼇ŽL•Ñ$`»ÚÕÖ­¸ü€\‹ xÚ¹7ٙ¡€ÉHŸ²¢ZªJÝGT„³“_L%ƒœWîY5ã17…‘ܦ§Nâ%¢J%ûöãûC‰úœË´Ö®½ètøÅ¡ÔYôÖ8U(§¤}¹ÝŽýô~½ÙÚvœãVå·æ -ė£ábë²n¸MdñI -ü¼bºâ%îRL$4—‚òzW>ðL›z¶|?69åˆÍSgµ²Z© 0Ž¼ÿm§FØëî'ô%;®–Å/ouK‡/žÐ9¥à‚ÆœòycYà -b®5 -=‚õ¥ x ф¦aoaõn,VØcÿFgìÃô8…@ý:þ¬ªÁôö˜ú5 ®_\¹T¶+_˜|ccÝ©ñG^wc§<ýÇEòK'8ú?ú•±:Ù¶÷h¡PÈ°—ì¸ël)mEó<š–¢¡¾¼ÔaûåƆ -GOµïx íŒU×Yö×-ÃsjœQëÂK% -Ág-án¥»œÞݽ {%ù·@£æÀ¼G* ]Úї¶Ñ¿²å7„ùÊ[˜Qò¾ ½âtøBÁ@¥Kk_º¬´*ìeA¾\`¡©¥®‹_òòE2²ÖÆyøxªxöa°±¢Ú&å¬÷•Ë³Ó ˆ³Á/8¼QÔFo7ôêNé|[ĆNh‡7°ŒqÅÝىãs¶Ù[pü²ðžMx÷~UxGÃa؃¢ƙÍ{16pÅó»ö÷‰0WÒ;é?Œ>„Û›Cƒéê0®"¸„-DÊ÷´r³“vK™TræʲJå;*ý˚ð¢ða=¿øˆÉU@Q „Í’Éê1JFɀ9RúMôoá ~6Ä]›àìK‹.yа\gM…€ã( —¾î@ܤCp³ ”ˆRå‡Vçæ°ãKÃ󪊛U™æ `?'æpž‚Ê%J²s|úQ›÷F§lÈûœ¾Ü~¸½{¸¥÷Ÿ?ß}öƒˆ/™þ~Ñé¤ßY¸gßý›í=x|öË<‰Ú?<ž$“³cz7Ž¸û‹—ôÉèo¼º\ë¬)Ѿòlúhx:N“c:ΘtøP¦ý»ê0Ý›}ºâ{}\c?ÆûãÌß/â¼`S'ã“d|:ÁÿGÀÌɈÞÏöþÞû Yendstream -endobj -1580 0 obj<>/XObject<<>>>>/Annots 713 0 R>>endobj -1581 0 obj<>stream -x•W]oÛÈ}÷¯¸/ )€D}Z’÷¥p⸠°I·kAňR“3ܙ¡i£íßsgHI¦w‹6ŽIޏsÏ=÷ò׫Íñ· í’VJ««y2§ëÕu²£õn‹ÏK¼¬¤œ/àèéí—?_-·ÛdM‹ëU²¡ŠV»Õé[IW«ëerM‹õ¿V´Þ¬q*~ã«ï÷W³{ܼ }Ξ7»-í³`Nût|ë)WÖy:H’Ú5Á|‡ŸŽ’'­HSÓhï¨Uþønÿ &á1˜“«µp®Íh*é>þC<Ò{O`H9Âml%Êò…2£å„Mç4]¬’%‚·G©éÅ4”Z)¼$¡©óœðQœ\n$N~Òdl&-ÇÚû„E€YôS[ƒà+R Ö ¥F窹e Nœâï\ bæ{¼5%å¥(`*^FCÖAϤOgµ¨’læDuC;¹ÂQnÊÒ´îÇÞÐ „SZǔ¨ûׅ.üÚ(+³þw¸øg-m¥|âÌk'°²Ú€H Ll…öŒ•• ‘~o…͐TU ¯ªTþ…„™{É3Wšúèºâþ§¨ªò#G¢Œá\@RçTàùC£mvx“Ç8¡ýQ‚/g*I‡¦obNކˆÿ ÊF«ç·c¼YK™qnQ2''¯i϶™ó•ACX™J ø$­S|Ë#»¸žŽ³ûZ ™rF¯®Ž›d“Ð×£ðd`ÊÒQ–5¥ ò'*¤ÿӛÊ-·èWTîœy%ô Òol*»U:ç¶ñ…xª ½‰²r¨|‰¡Î¥Ò•Êy¤õËý® Z"3iS!‘px€8˜BÀ`‡ -,Gjd°gÕ¡ Þ¹'˜OÀä… -c2’Ïu)t°b-¤†\@x>¿½jÓ®Ih€×ƒE3 àJHV¯P§& ž¨)QhԅMzcJ@ÖP3C™WBܙ œ/M¼ @1"y¯b)r¥ßòAV¿SžNqþªe¤H)ÁŽs8]4(D ¢à2tDïeÍâd™'ôÖ·>npš‘©Ý@lï -±¾f¡’š?pÏÖ2Uù µ\³QL¼”O²~h -xsï7:¡Ù1kQ0¡t°øF|ƒu& ü%,˜L-t »$ nC–1pXÕU ´Bà§5-¹=Ž™º™ÌESúÇwíbNã&ßGž,z÷ø.0…³«È­>7XޔTI#Ñ ç1r`›UU82ºaÚ1S8¨ËAV¤)M‹øëivýçaªUe 0Ò²ÉÂÍb«p Tן¥…UÀ¡Åè3mhD%¼¨T‘8FÓ[¨øŒBE:'ôiHÓ|m…÷÷Ìg<ñۗ}”.êÀ¤úP¤à™ghw‰ƒ©Ä÷@›AÙÀ --SæjB?[´›z[NE駙,eÚ¤¯d¦…FÅÔº¦<˜g^\“ç*U,¯cp¶”Âù S³+˲q;ñ -ÒÄ«Á7˜!G‹‘Õ>êš,'ô²‡g –BàÙs9nRÄÍ¥µ -âÜáp±Ìr¼J»ÀÀ‹vß&»žq—ñyæq‰®cϳû~E ¦«›°5ÿó43X{:Œ¾¼f䈧 -Zù}=+>ž¡²=©nž9÷n÷;éNðÓ©Î)ˆ]§J‹Õ.Ùݬh³íž]n?¿¿ÅT4ß.Ý].Ý¡R‹ òw+šnçxòËÆÿÃcÂz»N¶›]T¾õŠÍ|Ü_ýíê7Ë8&‘endstream -endobj -1582 0 obj<>/XObject<<>>>>/Annots 730 0 R>>endobj -1583 0 obj<>stream -xÝXMsÛF½ëWôRRR"HHù²%‰‘£ZËöšÌºRÅ  ‰‰ ŒˆÒeû¾n|¢R‰7Þ=ì–],3Óßïu¾œø4Â?Ÿfcše'#o„7Ýϧ·'~à{4žޜ2OÏožRZžÌÆވÆã)~±8›ò¢<ñ¢?šy3ò/g^ «#oÒ<ñêØa·?ŸzS¬NFï•'9\B­?ó½1¯Bmû$gGü|1½h€$y’Õy€S>öÈÙ`Óë'YÐ\ˆQ“ ^”^»^ o§äû´ÚrD‚ùŒV±dD«èì.·.LSï(W.39á˜ÓûíMù€E§ñ¦T_*]*K!E¦*REfKÖ©Âz´JmMšš=K K~*Iw‚¿_ýz2¢?ñ«øì}­æˆ0Â7½<§}¢£r3Èßk—нŽJcÍÖÑgÇfoٜ¥*UI8vÎ6¾Ús¬fEŸ{àXmiQšHYK61UÓF‘Õ™NÃR¬6.è±ì5|ì0¤Út~1Ց¶½NSPA D¤¼6ð¥ÔDžnˆw,GŽ îmñ}’iñ.×N#oÏôl*­ÕîLx:…µœBº7،Œ¬ŒI‘@èºÚ©ÜrÙÐ.¶¡Øॶ¬å2h¾5½taéh€T8‡\[üycrWš”>†¹JñÜ*åMå£F¨ñò*ŽYÞð6j -qàûÞh2RáËz|1¢z½-Ôf¹«™¥JUäÄÚ?v‹=ŒR=°ƒ§þv*ÁûóÊoD ê"ÖDö…óߨå \NH¯æEßåõ²OTN(ä¬p*þ7õ@f—Áì€Ç+Vª-Fçµþ¡["{ Nԓ¶64‰Å -£œ}·üe¹úñþӇ«ïÖëå38!›Œ×ë\P¾^ÿàýð2µg¨²½áw=N°Õ&½D(S µ²l ÒôüXe–•]¯w<’»ì#¡Ìƒ=,ŸiñîÝ©Œóyf*umæ‘5E=(Gq•炗ZQçs®¾²à5Jɔ1¥KA\MN‰"­ù¶‡þó¬·ºDà…ZŽ¤´H`ë½`¶xoP¾EÔeգƝA>bóÿÒ‡þŸðÝË9w¶ÿÈߛ=lñ,…P»«‹ŽÿÞ_gTó`¾æPÓlús"-€V¨2Ӗ;.ړ•Ò•ÊŽ”„¯(uèꍯDïvJúq¯†q¦s°U‰ÑåQQ©w‰³u¯Ð¡Ÿe•7ð?†íêÐD*dŒv´|ù$"Z54"­ó“´Ú,un 'oGn­ÏÖk±X8S(¡cÏïedÁ@z1ƒa|-Sj"Ä!®Ç¥‘Q\ÂeŒ2BÝMÈÑ0ô–£z¤Y8EçÖ²zÈÃþu‚Ø4C€‡öþºfB™ ™A›è4‘!Ë>­À²‡éPI¥•l)Qi±­RúùÓ»z.©§/ £ö Û§¥Ÿ0ò@¶ ³M(y§Ä¹âÍphùgʝGŸ%!rR¦Ë3O®0Øñˆô–÷çgxQ ÚÆG õ¨RSdÈt½Ô/g_Tñû¶èj›k“,LCA¯óŒ)eŒÊÞ¤*óèSµ9'-"{œÞžA§pIX·é¸6­P†n.@N -dj'ixín;ƒÿÎÈÕ|K…X¢–‘qŽîUYò‰Y¹JQy\×‹ŒÏˆ·F Ãc‹›äì÷{Ï>è¢xöÐk‡Èmõ4´ÙfÙÎx‰ËÒo·õ*u˜æw áî†;W ÓÌ o&aŒhXŠÃg¦–>.nÎi›cºóÁ’áùA©B¸±–€]œÓ~À4@d]um0…<*á@ö”§âÊ «ºi‡aj'ÓВ0bŸÕ )÷ÚF$ø`”ÞÜÝ.ÁÙbé­~[å£;,L&_ë~ÎõS¼MDً6¾‡ëÛðŸéC”sãïoÓz»úXcœuš”g¨åý5ÙBEö m÷øõ²ö¦(úD”Ã¸Ü 9:_eÅ`2öf3\Õ§|½– æãÚþî3oîcdÆå=à?àÈ;Ú¡}1¸žƒÂ¹g’³­¥´Ì@·ð¡€×ù²R^e8ؑ[©b1½åÑ[ÜÌLûŽôÎw¡f>/XObject<<>>>>/Annots 735 0 R>>endobj -1585 0 obj<>stream -x­XÛrÛÈ}×Wtž$§Hˆ‰”ò’’íõF•ÒF‰XÙ¤¢< 9ö`†;3Íýú=Ý0míÖ¦l«`.ݧOŸîögSšàϔ–3š/¨lÎ&ÅoŽ?þöíÙbRÜÐ|º(®¨¡éõõñÉÒÓÙl~UÌi>™3|]/ŠI÷Ä_qÞͱãêfÉ¿ã_ÐTŸ½_]~º¢é”V5ß½¸YÒª’{'´*/îì^"Ö6ºYë@i«~hªô‹¶~§C$…“^¼m]Òxñ烼t>ÑN™Š”«ò[‡]áÝêóلÆS6uU]lZï¥äi|Ֆš6†dÊÖª@µV©Å%¸úÕûd]Н;ÿFÖ8­9_ë˜hÓêÏù¶ñà:¶†mÛPãƒ.xÁ姲Ã`<“ùœf 3¬{ž]O(/éaêVŒç·Å‚—t5Ú%ãí"¸ùÁ×U³Vtð­`ÒF¾˜uŒ Jü*bÒ ™´[çðê§ÖU:ôO·¾µƒµVk{€çp—£´Õ/“¢.٘Èàê@±Y¥w5ÕÆêCiµÊ»Nò»¼Õ8ú×Æâ -ûoÎà×5Ž¥Ç(¶»鷃wïHU•äv¢ÃnDFl'¿N -¡­èI|1Š>üý‰z¼…*iªàláØ©SåV—_p†IäÛ·ìî)ù3Aïy± -à8¢Ø¨/:#üè&n”@6ÈÇu0º‘õ*a½ÛŒQàlI0¦ßi£RÊj¼= ûZ×`iNδÒ7;^‡°­*ú}ôî‰æÍmj,iWú -§7 ¿Ú %ž/:$KåÀ ËA,½-NQòH6Ïô1?j¡"øüîÿæJ0›¼Ó FÚú¨É™:èüþ¼Á{Úzk*èÍ9¾"âBʞ+HÑ(Y*'X1ÁÍß 7ž³Qˆ{ÈV£ Ôa#‰ßðæW?#^£à^Ð÷>|abÁbSnÉDa²ÈPNNHf1k"ÔNò«v;í š¦€”UÉӘôûÖ­,&c—*ßäƒ8%ÆI—[gJe zPÃöà)hÀ Àvb Û‘¸ëX³fµ=AÕ+Á‘˜Í¶25•sþQeÓ9å kº§¥½'p'Ÿ-Žý¥Nڝú}£ùð½±V@PÇ#ø*ŽúŽ²t/;×:%„°ÒÊâ­pH±„ë0’“Nü@¾ìUÈ©îÀçÀùùFЯg¨‰?/ó y–ÝÆl¶‰Œ+m[i¾ôòÓ¢+¹^)›_÷¥â9¿É—ƒ#0«X¥×-èÈE8d^DjZpGEšM -zd}Fí)1(aQ V™ž bÆw¬Á=í|»Ù2Ç6wŽ2"é¯Ð îÔjP²³}e>á*w9”êü^ûêÐãÑE© ¶ç&╌ÑXANhÛn ¤­ôgˆsNþŒ;¹ f f!ñœF*s„vrÙëþU -˜8JV&ÌÔþRŸãÙUq»XÒ±Sú“ßÃ,ºMñuæä+§ºKúüéד0K¬u,>hJý <B©ÿѨƒˆñ¹ÚYæ “hßEsé~šÜ Òì[Áw›Òî——¢ž…„¡ðË¸5%$_:ŽHÁè{c$ò˜!ÙûU»ë£Z<åþ)¿î½½I‡µoíö±OÒ Vh}¸ ¸“S¡Åࢨ5ÐÈ7„Säk€îPmr¥êE¢OÉ\¢È3Pƒ0wø2 ¬èŸ[@ _j(M® ¾Z#PlÕ]t}@Œ›“ÖYþEZL´´%?ÔðûAF.„Ê_EփA¯¾,n¦t;ë;uP-»~KSŒ15ÈsSLo1j€D"ó‹bY _ZŽÓ4o¥@|o\å÷‘n¿^>|ó>iÙ5ú ¯låð*T¨ðe|»“Æ^E¹…LɖG N'éÿ „¼‡ÖwArjWmu@ӆŽ¦CA`U¡t£f· Ý>Ðl™"Ž08€•Âk.Ø­bô¥FH¥d‰b‹Gâ%†î›P.`•*hQÎ0ÌR6úÑ]žíCÙÊ[—Á(:ŒXodx“†«<¢×„}t²<‹çÀf8°I`Jo[G°­¿è÷€'ÂóñŽ “¦}ݞ‰qäÀÊêÃõünu9ûsÔQB@ŧ‡÷œ”œþ¸@ þà,ÖÑ.¸[ô@ú뺗!–Óyt…^âZLSbjoE·±›Ê¥tq/ŽÆ€àà‡þ¤‘[ -úî„T·NÆ8e ºdh{¾‰íÃüØӐão•)! Èàb^‰ÏðÆæ!JÃ›¾vee¸H{rBøcÙ¢¸£št™ 9z/]ñœ̏ËÍi3ž|B±Ù­>â«,Ã܅z0>r‚uÃö}Œ¢¸V -…±\pC¬ç}5q¬$^ggV !H7üÝÀØͪì2ç ½åX4àýÁè‘w ¯?æ5Û<:CšÐA ˜ÆƒPðúÁ×Ût‚2I¦7<*ðdÃ^Öè%D%^¹µè¦«ÓþóæfN‹ÅUÖ³§»‡÷wôügžé>v툄”wŽû ãåä–ÛÜ_¬WË«b¹¸ÁIa×Õ5öÍêì¯g?ïç’endstream -endobj -1586 0 obj<>/XObject<>>>>>endobj -1587 0 obj<>stream -xXkoÛÆýî_1À½@À¢%ٖ䶸€Ÿ­€:qc¥i}Y‘+sc’«p—Vôïï™Y®,Ñ.R4@âcgæ̙33úz0 >þh<¤“¥åA?éÓI”Œèt2Æç!þך–_i0N†áqþ0H&48;Çm¼u<ŒèÚÒï—³ƒãÛS h¶ÄãɘfáÔ~Ÿféáç\W¤*z¸»¤´0ºòdp2[*|X—kGÞRamEÆÓ¢¶*K•ópãk£w´´5^ O8]?ë:¡Y'MÇl¥qÀ»Ù—ƒ>õ'pu–ÖzUlèQãm'¿ØÅÜÈèY&S6 n­”sk[gÔ8S=Ò:ÇœN¥NsUWÊ˪\(RYipÉ×ÊÝ\¹ŽES9¯ŠBg M$·Î™E¡i~¸h<áÜ 9߬L6ǧµ†¹,r àÙÛA¼T å4UYO.WµÎh¡ýZëªc< âŽÈ$:á36„§I/—:õæY ÄùôXÛfEíÈ>y#¡ã•ÒéâÀ(Æ×S³RžaÙIãnº‘gº´ÀàíÜ®I58®Â xŸ“êèkcjfàOÍXÖ¶$F%-,Ìn`ãÙÂzFø¼e‡KÚ(‡£ä”“ú)º -T–¯©apcJÁ°R=iþR·ÍA7$s̈́€‘H|£ -iÀ±̮«$n-¯j-Q§ùÉ´{òv%ρ/µת¦è¥å5ª©Ò<¤ µ“Úji`-È2ì 2 ü‘{¡Üðù:g_ kŸð¶ò!+ôÙTðÍÑù·ã»›¦N¤+]Ãt Ä~äûPŠ^ÌÁ Á¶…¼­TŠ·þMïw -Xe2äÈ.#×,S릩PŠÞkÿ›T~[ì` LÇ/ǬimàË釪T©éúÃÝÅôýσô„89ñv¡6Q(Z‡Ó܂mA‚vÀ½°Ók@²Ö©FáV`‰äxÅ -/GâAÝ®<±§(b®öˆ…sxpŽ?7ÿ¸ù()ïA6#°ƒ„Ø \靜CŽÁ÷¬qLÅ>T¨gÑK­j+ùˆS”+¤!³\Á¢·ˆÔiè͟ 4¤ï#ºqOï¯þ„GM gy˜Æ9[§£Ì_œŽqtqV>?ñŸPt{×Ú×êÞE–åðøØI”Kk³ò¯Ü:ù¾[ûX -k‚[¢³¡>µªSnOÜÖº ~ðÄBhy Ûø.Ïbt+¶Mï5ÜÚUȘÔs=>Oè ×ßT¹*ô‘ˆTHý|¾ÄÌ1Ÿ'[7¦KÆ»·3i1Ö[`y萺‡!Äð©èr ý+üFßÇïÍ -x#¹ Ò´'‘ÝRa¨;|á*üêÃûÛé/Éý‡ßB®lˆËtÅPÇM åŒm„¡ßrÕax#Ψ“ãçñí9 0Ê,ÑOϨwzt~”ŒÈÿÕ^oŸîôö¹Pe¾’æ¸;u÷†ËNr• -£SL¢‡µí®½G¹îšªcvÏ• ]ÿ(Ô¯ZœŒö× ŒÕL.,¨/Ƈ}8õ0›,V4Ù¿æïâÆÔêš~´6# X?1 لþÂÚêrÛܵJ].¸:y¦gà -‚c­aSîÄMç?ƒ7ƒíô²‘ï äs¤Ëƒ2mFiŠ‹.),Vô«kF¸Ýã­°†¸üV³m'8=? -IÐÌ&“!~&£‰hÚÃÅÝåÝ×ö ¦'üZ”6¬JBP~·7á§É õÆ}‘±ÕOǧÉx4 ätÄßÌ~?ø?Æ$endstream -endobj -1588 0 obj<>/XObject<<>>>>>>endobj -1589 0 obj<>stream -xmTÑjã0|ÏW ƒRÕvœÄ=8Ž¦½BáZzÔp/yQl9VK©%7—¿ï®c§%Á`9ÚّٙÞ!ú…˜G˜ÌUƒ@˜Æ¡˜ NæôÑS+ƒE:¸º†H D‘ˆ‚³d*¦³iª ¤ÙèîÒäð¥ÂÝãBàÞִЎP¤³f íA«wU°×NÁ[dÖzÝP.{‘ÕJ‚qÜ æ"}¸Œf"¦n£'»ÇJf.æí\£`‹’6kÈO$ÚÖP+‰Ê洏J˜”4:•5µöüàõPà¡è+»¦áDDÜ´´®¥~bK*;\s„|y\€@HH5)І^rnfñ.·:—^µ}˜¨Q™×֐1orލYŠ!Îú’[…Ì031¡ÀmwºÛx0Î×M›|÷O]dÛµ5ŽQây,æt§Ðe’â9ú•þ >O}Yendstream -endobj -1590 0 obj<>/XObject<<>>>>/Annots 738 0 R>>endobj -1591 0 obj<>stream -x•WÛnÛ8}÷W З°Ûql§@QäÒìö¡—­ x$´DÛÜH¤"Rqý÷{†¤lGIX *‰œË™3g&Oõñ3 ÉÎƔ~ÒǛý¯ŸtgÓdDç“iÒ§‚†£ódŸršñy:O“!¦üˆ•¤•ÿ0¸'ã·>L0Òºp5ïœÞ^аOóbO¦4Ï|(x“ž\oDédE“„f¢X -ºéc]ҍ)„Òtm´«Lžã„3ïçÿtúÔŽ`á$œ~yŒ°³Á$8띍O’AB?*YɧZYå$ý”"SznŒh0ˆ7†¤†WreðÎԔ"¥k üB\n£,¥!ö.•¹VR!%Ù×ÜF8Wà!5l9±Ì%m•Û°Á•Z×ü“ˆI ÎB¤!­7×$,eÒ¦•ZÊ,¸”¢¾öþü¾˜OÞJØ£3I†‰‡r]™Zg¿MsÁ"ñðOô%~*DºQ:fŇ9gHh»Ear³6à<ÕÒ:K«Ê´5Õ£uÂ)£-ßNs¡tf¶–¾Í£ã„©å3ì ªm0ËWÙ_,w3 =¼`dµLßj!û’*Ì(¡3 ühi£ñFÂh“ì_‹Bú¥°>²ýr»2”„9`ª -šã^pÑò{DáJ–¹’6°@8Gf…AÂchMíöžº„/$‰ óoË\¤H†gŽÔRY™•Â e[¾­‰³€S8ºªóœ|nðÜäšÐ%ÞzNƒô‚†~¨–/M&Àf0>¶¦— -´¨gúsOå˯ž Ü²ch º - !pn -·5ôXFàui˜2LŽwO l˜ráغD+«BT»×[ùߟ Wîßû:0hÜÖ¿K÷'W|#ԓې»JJ¡À…°,V©)w7¿š²lß39~§ zŒ„^è5@;.*JÉ©zXÃw¦#JYÇ3ÍüÕÆÐRR†tZÉ¢ Ù!‚F=›bèö-ÍJr^ãzFç»WI‚á¯øµ;RA%¢&0ÅwœlK|¯ÕˆZš -p #ꜲtÆÀ98®ÏBå,3 ݝdZù:…Õ ¬ápfXi¬eÚ)K0Â;>ÉXÒ½.Í´ü¡Ï¥z±6–¼ØÅàÛdŸ)^…¢Y¨ &è0N8³Z©TÁÇâ,1 ôaÜyÐ ¡à)ǐÖíöòw õÐÎvяi^7óë¨åö1îò¿0“ª“¿«µuýဣG@6± dLå«Kœ÷¯ö"Ÿò=P¼ê¶±(E…Ûh /ôlún›¥ÈzÊȹÇV±Å2áÙ3ŒÞ•î[=½íÓE3ƒGA-XÙy~•ô1ÄÖ¸ïc̀šÄbS~¤ÜSäå‰ëþÄéíñÄ÷ó~Æ£GädÌfK¹Â@t·Ažö!Ì ºÓÒyƒd7L4‘[eØ1HσÝOz>/XObject<<>>>>>>endobj -1593 0 obj<>stream +1543 0 obj<>/XObject<>>>>>endobj +1544 0 obj<>stream +xWÛnã6}ÏWLq€H–lù’ }È^è.v».Ðb³((‰²¹‘DG¤6ñß÷ )9¶ã´AÄÈá\Ϝ¡îObŠðÓlDã)eÕIF4ÍÃ)%óžGøk$nc’ðґ$¹x¾qOñ,yü‡sŠ'ø†áM<¥wš>Ÿ¼Yœ ¯#º EÙé9Á(¢E6¨í'ãnòKšÏæïæQœL£éÛwW£‹élv•$ﯯâñd|ývv¶øU0ëuãºãp҇͗Ͽm°ÎƂq„@;‘8¤7­*sU/½\BqÜɍ 1,4¥,Av%i]¶KUŸSÓÖ^|҉¨w’RU×yúwµ1÷ehô¾Î©Ú©ñË(350ºm29<ÎU#3«› 邌¨RA¹2¶Qik•®C–G8£iè"þ(í9ez½¡]Èjõ†J >FÝ҃¨mH7mº^–T;ÓU%ë.+Ê !eÙáŸ?ýþþúæÏa©RÒMg4£¶Èΰ5 ï ](Æ6×±wŽË1 +ém#áTs2saE*ŒÜ›#r‰ÿ ~JÁ†2Q“‘–Ú5{ߐ~@EZJD–“YËL§³P¥ªE% ¾MÝŒD}d©¨ÐÎtÙV®0ÚGäÎޞ!TjôŽÊB´¥õ&CZÀ÷BÁ¸w|[Fù(ªu) #`èà¿Ã¼­ÖûAP§Ú +äºs¤áRäö¾•òqdœ7ïL#ï[x䘐þè¼är:.½©d2)hýzÚ£Ñ5ì¡x°:\ic +vAm5®»¦åó;íë|LÇ/]ãÞ«áZØÕÐêP¯Èé hmº.Ô²mþ¥¹WÊtMM¥Èî ]IZjS®³a]לƒ,‹’p ™•n¸A +í2¾Ó‰WyNÂÃQ—œ¼æ…Ã\sÆò”R˜FïùݞôC4Ê¡]èpﶀ3UGÅÁ¹[v F‰oÂ}kô+}ÕÜ^g5ó­ËÄå°ç +®Ã¶…@g—*GBš¬9<»ïƒK†cOôÊÎ!n䔻vÃÔÃya6*՝<'aÀQXÁO®¥©O-ú\”Kz¸”>i3̋.‚Îq,ò“ßvœVgè%œx +ˆn +g¿' +M®ÐÁ;"F"vmˆ"œîgðôÜ%¤j)]ývpþaÉUQ75°²Ížù‰óµÅì,JÒk~0Žô«¥ú!yj4­ ¿¯¹g nž|]–:å7d¶ ;óu‹€'.A÷6û~‹{öœrO€ŽRO%Ÿ;íbˆ#LŵgÊùà%9f¢c>P°oÙ͘ÿ´ÚÓÍ3ÿKۚ›üØg_ÛxM_N‡ŸUÇ´¸µ€>"͌M´c7غùÀ-Âé1ûý5…£(æI&c7ˆ¿(à۝ﳾs¾Ò.ÉÌ]¸Q`ztÈك“‡3x­Å u÷ç|êÅú»éï¦ FSîXJ׸Hô|ÈY³+aùª£|{áÉ ð‹à ÐÂ~Æ,(ÚnÀ°h~ °U–Ì…z„€ÑÝU'Ø zîƒæ´¹žf“~šC?w Œ¸¤ßnN€pòª¼Ù͚§* üt¨ z% \¨ÆØÛ³itç¥^âFeª×)ß-r_ìíàâö¬ÏÛó`  +\Åk4Ü©ìîe¯ÑÀˆÁøð%ëЕWk`rÏV¢^‡{á¼ZCÕ‡c*^£!Çtu¬*Á4…êæv0šLp¿ ¨­Õ£*Ÿz¹B¹®pQ;®õ¨Þ L/w¦ï¹µ‰ènNã}È]ûã)Þ«æc¼ü$a40ƒ~¹úðæŠ>5ú;x/J;ö/菳ˆ_˜^r’YΦs¼â`käèèýâäóÉ?,Ž2£endstream +endobj +1545 0 obj<>/XObject<<>>>>>>endobj +1546 0 obj<>stream +x¥WmOã8þÞ_1ßR¤6ô¶ðåËö®°¬ZtwR¥“IœÖKgm‡Ò3Niê”Õ5%žgfžyõÏVzøۇɆc¶­žßƒátê`4àóÿ‡È¾ 'þÈõâòҟÖÿ³lÏzp ËUŒ§øÂ÷z° Ú"䉑àê*1i®¶åÈ8Û&PùéÂ+SÁ†©U{pq±:ƒ.<,ßΖ?Z=èö{¨VQ£,Žr†§Á—‘oÞH´3Êa+ší0÷)o@R$”2³iƦ¡¯."±-·BñÀHµ/„Vm¾¾ï+ouÖ¬)–k™€”Hͱ'/n˜ 6‰˜ƒ‘ ²P>ˆ†4FvžÂ®E²ÆwͪS%-Œµö(àՏäÆ¥lFfA` ä:8öÈšÅòzñe>/“ +BfX³†T/Ú0#d¢•8lÿ³*@i³4!{Èãª-<<ÝÝA„,ŽOÅ,K^¹Ã¨Eרs(?höj›%kbR³¸Žêæí·f¬L„Œ² » ³j_Úôµ…a9™ß"(yÊûõ^+™¥ˆÂ§°­˜ÅnËÌ-óÛf*råM°nÔ\æj̒-¦PÊ´#]ý‡'Ú§\ÅD›-ǚnÀ§@:,ÿÐQˆîN §1¸Ð­€áo¹U§M·= ‰QґÌùW žOJ¾,¢¡39‹£Í¼æ]7¯®Ð¡ç•â8Qb™) 1¶ÛZ °Uö«(¥_Ÿ£|êW‰…+Äѧ|©øUÁ:Ÿ ßÏ÷ƒî`Lüë+Γ ûà¾{™Ùf™fcË\µ¯°u°È`#5þ>²9Ãá”ëîà$øM#Mq:偈öötaöÝ,Å>ÏË@ qÝAåv‚Ù7Ô^ Þ°ç˜ûðwa ‹µ|L¤ÙйgŽa‰6vé»;ÊÓ0HÉ­ý†Û´´jHSSþÌ £BŸÞœÏ.¡?*¸öqíB‡>î_>>/XObject<<>>>>>>endobj +1548 0 obj<>stream +xS]o›0}çWœG*ƒ ’·FÛÞ&mÓ^*M›ÄàÔØjûïw5éúP!$K÷Ü{>®ýqdôqT9V%º1ÊX†’¯Y¢®èœÓoúhÛDé×5x¦§–²¦ƒÁ³ M¯XÍ8ÃÖëAêiwÓ<¼ç'x’W›½ž1éES½¶jÆ ÛçqÈá Z=ÍN ƒ’,ÌȐä% TqCå0Ùþ¡†[X?mNDŸ¢£ø«Ðê)]Pl6×Zbb€Û+H"/8(†£Øx6Þv*}Óv”s™@²â'aÁzÎðk;uÝÔ/¾|¨Ãôgý (V9÷‚ÙY¡w{×û$¬d ¯êù`¬ƒNÜR¯úÏ)TR;$GR¢â+–‡ ƒßéi“úÙ¦”m:‹±ylz=¨IŒoÄƸŸö*,{©…!©€ ÂÃ9Ô¦ޝR$}”èýMp~½-=~ԁƇ5“]tÞZ5¹„¸Î;Æï``‘rÎã];dÁ*!_=ô֌“¼œ~6J)ëi¹õrMxIÏ£^×kV†ØÞ}ÛÞá»5t­ðÙt~$‘Âi3Aɹ!©²uÀ¿óbŠª`UYÓó¢z^‡¶/Mô#ú–}endstream +endobj +1549 0 obj<>/XObject<<>>>>>>endobj +1550 0 obj<>stream +x+ä2T0BCs#c3…ä\.§.}7K#…4 Œ™¹…BHŠ‚žP$YÃÓSO!¤² U!?M!3¯¸$1''±$3?O3$ ¨ÏBÁТO¢¯zs=s3  -!)F– #\C¸¹ù&éendstream +endobj +1551 0 obj<>/XObject<<>>>>/Annots 644 0 R>>endobj +1552 0 obj<>stream +x™[oG…ßõ+yX8¢9^ó²ð-/"Ykiᗋ9²¸&9ÊpdGÿ~¿S=ì.ŠI,,<•Q™uXΘ˨Äz,g¨©9Öa9C¹•Ùhr©úW„&5d&;Œèp¦\M¬Ç°Å\¾È¬Ã2J%âX‡açªÚ±+ó#ÙhòHyˆÉ”8¢†¢—3†ë$s¬Ã°339Ë: ;7“3발1Q¬ë1,W%6VPQXY/&â Xe¨í¨ eÒcX¼F|’¨Ç°t|B›X[´\Ì­lñèc†¥»­c»µeéývöÄe ¹e{¶_&±£Ø:N™Y‡e”N&Ç:L±L3ë1,ã•4{ KhIšÄÆÐÒ 4±S۞¡¸¡Œa™¹É™Ì:ŒÉœû•Xaù£2ë0ì̒(³c2=•K¬Çr†¦Ç: K^{YÍe%©¤¹¬´¤1 Í:ÈÌVÊK‰s¹l¨­$ÎA{KÁ˜Äá¡df+ä Ä9ˆo ™ôv¢„s¬Ãx/v‰¤ØcÅe"dÖaØØÖ2ë0,/ Þ*a™:4;ŒwéÒÞfaÐ(ç´nLC΋<+–†, mVŒgج˜Y-4÷CÚ¬‘D#9“)}«g­6B@ÇF&=†¥¯=ë0,#ÀÔ³+jÄY³Ç +€ú¿c†¥iÏ<ëp €·Êý5lµL×+i$BæD‡1Ù,Ç: KÕ 8Ë:̲¼úë±64Óv“¬ÇÚPq,ë0ìlªífY‡É™‘*=³q»DXŬó?ŠÛÍ–žH„2ë°¶«#À±ÃÚÔéX‡1™r¨¤™˜Aî+‘)V5` —!j‡ê—™ô–t$IÔcX;fë0ì´<–uƒy;ôFy ·žÖõvªÃ#¯ë1,ŽYxÖaX*ôHÖaÅVo¥Yst#ŽŠš,ÀÅ̍ÒT +]âä¢eJÙgÎA9XP&=–ƒõÂãX‡ayK9’uXî77$“<†Å +ܐؘÄEkԐ«ÙKÒâ‡Ì:Œb®ȘÌ: ËUþͬÃ2ʚPfVNX7H¬ÇŠº^á²æ¸¡a¼Ò1Fx نfY¼Š3ë0lim&³Ãr4‘Æ™u–9WeÖaXR“3ë0Š8±4›¦«œ´»Ù9pvw“94…dÎA2X­)sb) 1v¤Çò^ú²¨¦4ÓubE Sy¥=@‰%‚öd KÆR;&Wë0,šžuç¡yâXaíÕ2kŽ3@©Ê£…²Á=לH“Á™d£™u8œØÞà^vĬÁf Ç«'²†­0ƒ3Ä$»hÊd´‚¥ŸéæEGR<™Dp¨ ÕLz ËÑH6&Ѩ–$Qrò¾ +g@ö8(µªáLz Ëë%QaçzmˬUxÁPn³Z©ÊˆÈRÉaÙ«±6³f¯]‡õ‡£}–œåbÏ°À$$&#ôÑ7g™r厳¥˜±5øÍe«}6Ç$„ób™)¥PuÄLá´¿)ÐleŸM!‹ðljöYD¼ùL¼ÚÕg1õÍ!ÉXoèµáx.Â2ÙÑÆ}éÁE=Š.ÒÝ~¿\ÔC8ÎoÝÖ¸ )wãÎvËp¦3×ë΄϶ۄä>½8&ÊA8†{'æ œý‘å2„c.×N¿œƒªV¥zâ„cârí g •«µX)Øgۀê¤gâJ¢ÄJ›YN*$栌´ó4qÊH91ɽ¾9{ù#ÃÄ0ÜÜñƒ×t67+û‹o–/ÞﺶY=.»u³ûþæ¿máú¾bËûz‰ï»§°©¿Ö›_¾×òÎÆ©SG¼/oƁè|ZïF_ÂU»ÞVíÓa«¼fÌO×mýëãz¿&_>ÖՊ€Ÿ,†ã^WË/ŸÛæq·:aq‹¤léíµwö±G» Òoښ¤#Ë.ªåýšèÝ´û.¼Z.Y¬Û›OþÙ¬wzäÍf­Ä ]´JÔÿ<2¤›6vQí«M¯^9}÷+œìÇå»»sÖ8ÿqóôÝÿ§·얱ÑöSÓÏ}Vq¦É™Û-_µ ³x׶Mk™ä?åÁÓ¾«·áªÙ¬—ë:>èÝz+åèùÙ |º¯ºÐ`Qîë̓õ‹÷ásÝýýÄóçùÔȲUóm¿½¼xwê|úr·ØNÞïö]›×þ‡p»Pø¹ùÜìN·D3ûsù뺳|y|›j«¼°âñ›~æÔùpñêýåÞ|¸¼ùøáçA÷[~H[¹¼yV-áo1…µ½#]8ð§æ›¢øjÙŠ¹²ÊÀ–“dW÷­Â lóÔDª„Õäîì/–$³åŸ”$G\ç_)õ¥ÅïH’)3ûcÁâï“Qjˆ¥ö»j”Yá“N.õŽ4kŠq[ê2µÊç‰$=˜ûé¾ÞŽ-yõö ËÖ«ze?s±º]-6‘ÛúÏ|L ¬ÿIcTåò“ù`~xOKíqªz½¯{ãó³iëªJ'©ŒÞooªýþÛ*¨¸NwÉÄ O`¯Õf¾­»ûðóÛWWÑ>*P`éT¨Â«·×gní|z^\VZ*&Ô*íe”5ï¶^qš/¿TŸ “jôm}»®lRð' •Ö_’ÿX¯~ªºg ßøT™Ûví>y€ÈQžxù©ylÃ˺[¾üÒÞN$ÇÝÉÃjujþÑ»K?v:cç?ݼÅæªÙï×$êԏ²‡—]ƛšÄLèÏWbÿøpbŬ'åJ ^Ú £'G¤.›.vÔ£õh-.„Gq_¿K.’óùS¸ï fJÔÉόæŽ:-Hýz1sù°/ð~¬âuËÆ*3–;QÁž‘ã7ÇÓ9'óYik½»9û×Ùÿ¿|,endstream +endobj +1553 0 obj<>/XObject<<>>>>/Annots 646 0 R>>endobj +1554 0 obj<>stream +xUQËNÃ0¼û+æX5~$¶s@¨q@j‰sI]5I„ë õïYC©\Y²v<;³ëÝ/&!èHXmÐöLpA/çëí‘ÕŠ×0Îp¶âî>±bìá*Þ\{H¡Ï.YXbbµ¼–˜Øºâª0.1±¼h©Ä=”PÔ÷_÷¹n‰‰Õ–Û‚¥ÃXCÕ*g)ÎÚ°eKÏ® ¤„ßæAgá7¿sðí¬ášã}wDw@ÚÑõR +‘âõ€Ch§Ø¥#n(Œß!Þ^ù=ù¹“_þ­pJ‘çlµx^.ðÇ}hîÆvêÐ֩‡,›KCQö܊&ç? )Ž›©ýO¨h'Ö8Ú*‘Zfͽg¯ìEqendstream +endobj +1555 0 obj<>/XObject<<>>>>>>endobj +1556 0 obj<>stream +x­WÛnÛ8}ÏW ú²ÐÈ×ÆIH›] I³µ‹¾ø…–h›[‰ô’”]ÿýž!)_”´À^Mj®çœýuÖ§~ú4Ðð’ò꬗õht=Ì®ht5ÆßüZI‹p0ô²ËöÁ»éY÷îš=š.`ër|Eӂ`§‡oòÎû•X{ii”у©¤ÎKákX4 šH»ÁÉt·–î|ú'̌¨ßf.Wن:7E¥´óVxc?u¯rkœYxÒÒoýÎßz©æÖ¼!¿’p0—J/ñ·•’ +µÀ™Ôž<œ±|»×ì™_ .³»›x¡ º)–)¾Yž"»gW\4\ .Çtw8¼ècè·¦JÓ½¬æ,fûŸ­½7Ú[S–Ò¶C´ªvGÉíéÅîÝ>ƒ~?ë ‡M¯z­Òñ>‹w"ÿ^¯ÿo«7·“gòb8ÈÆã1½£Ïw±Ó¿¦‹ñu‚Pƒ &•ÐDە!åh!*U*ai«üŠÁã$±•#†_Ú*‡oZ•Z‰87d,Õ¸9Õ\àFYr?z´¯ÛV0Ü }×f +ŽLWRèàÉHŽÖÊ>‹¹¦þ8qa8ŠàeýŒ~†ÐcîŒASÔfºŠ™Dƒ— Ârä"€<!ÞhLtˆÃCÂ)êĖ%­­Ù¨BRirQ’¨‘•ö*^¤‚Š‰<—Îg Ò…Oªc¥3µÅÅèD€°b#T)æ%ÔƚŠ”ÏèwMK©¥…#¿B«NÃÂ3\w0%Œá #– +áÅ\8ž¯Œ•­Îx™¯4"†QnóK¸:¶| !;ªD¾RЃàL$ðŸ•@A£‘élòñæ˪LÑvŒJàÖ×ɇ/á½Üß •ÛŸ àym•ß¦0y åô² Zœ ryí +î zKa H]+É{ȋŒ ®šgè˂›³PËXæ®­…•D1R7šÖ˜àP^ÓÁ솿}ÁÿÔõr+<ö"@ÜØ«l D»¬š—5„ñ!1¯t¡D¥òh@ÉВµÌ= w`  žA1'‰#ü›Ë\0;a´\ ° VÐÍ75b0ÃoeÀöȑ—$73jñÉñºáM¨¯QAŽSmžó/G[ãÃç)\Tq: 3F‡±/;÷¡„£êMWÖÔË UA‚ðìãÍ=Í:e½\ݜÒòÞu)Ýì<ÀL;©ËWx‚“Ðè}HQåø?œH‹«Ok)Ë]hU‘‹‡±,0xÖ¦²eô Ô1uYp}ÑÝ\*XÁÀÄkãÔd«k±j©¿§*šêʑ¤Æ§^~ÕêG÷“Òõr;çe¸£Æ{¡h9›uºÒçÝp­`äÂlgç/TØG#:`Uº»PÀkz<´»{83a` ˆníl7à­ï–jÞ][µÁ€9<ÇB“¦Æ§Û›Gšc*ø.7J°Sz®žðRèؗ÷¿ßMº“ûw©AQ¡Oó«4ȚÁýÌbÓLFë~ë¬A‡µ‹ ˜¥Gé)7a 4tjä6.pQeE“V÷ÒD-ˆX™ï¨ Œþ ,a¬1öXÀZ¸ÛO”‚7À0ˆå_Ì 2Y‘mÁ;….K²ª0}¦OPŽB7slÃɁ¦‡é°;‚¢í~ ¸’´ Ì*SšånvÞJ4">€XÔ¯4‹½å›(G·ÊB˜ ÖÃD”Y+Xnk­yQoï' €Üa›ÇöؕÀ¢mÔ»Ùk߂V¼õ_qDÝ»f±8’¨ÏO|:fGzßxDEP¥ãwt(N@´ä£Ù²P¦iÝl›‚ÇßO×ý ñ¼u5«O÷îêð^5Ç]ò¼—Æ£l|y߆NüÃô쏳¿¥ª‰endstream +endobj +1557 0 obj<>/XObject<<>>>>>>endobj +1558 0 obj<>stream +xV]Oã8}ﯸ⠤ièG¦-ûV†EZiafÕ®öiå$NkHìŒí´äßï¹N%Àh(-±ï=÷Üãsýs4¥ ~¦´œÑ|Ai9šDZÄWъâÕŸgø³’òðâëbŽ˜Mb¬ì¸ÞŽ.ocšNi›#Ébµ¤mFH0™Ð6=W:7¶^ ;a3¥w´7Gò†R+…—$(3¥PšJ‘î•Æ?ÒÔÔÚ¶ž¼”e"-9ixGGYüĪ‹íãhBãé<š!û»¤§9¥I!Éï%9Q&¯¹Ûð= {4€Äë:tBg :OuQ4ƒœÞÖÎˌ’†”øååíMÁÓ2žÇàÐâhÑM[î7£½5E!þSdze´àåß¹VÆÐHaUuR¨”*iSY1§ŽLNǽðƒ˜àZ#)G{PäœԄü¥qžÊÆy•Š‚´ðµ•ñ …×´JpL‰:ݓҨ]à›’9À:(yü,;Ò2èř#7Ü7• XӗšIX9àðI›£þí…;ÖrÇz츛~Àm9z»­W"¶Ìg4ž­Â›XU +Û xê¸çÂÑdñ•Ó\‹ô©®þÇÂõÍæãUã>û2Zbn÷¡ÖËÛEwRÎ闀^ÅpN8?n¾QUˆÆqUYëÎÄ#јÀõ݆þQ:3GG÷Û9ÖexƾϝðÐœ7/SÀJjOÚø>`)´⃸œÁÙÔ Éç +«#B9““2k[ýVҔ /ᆠ~8T ëY7,1œA9o›‡‹\ù¾Zz’M»eºB´F+×úI¤?ž5"jÖ4ŒAÅ=ž^æ³E+©{hºÞ°Œçûb§]‘¨Bù†ß֎=*,Æ´æ*øhٛ¢+VO ¹2NÆÆÄrœoŠ!›õ=œodZ[βîïNh±“<ôˆ±ÊÀ»Z{¢÷pѶ"YŸ§PI2ÌèÐ:•+XÔA‰€Í•I„ó˜·¡/(£åg•pî+CÅ(ø,ôä +•‘é\Gé´¨³wšFÄn¯Ï t¡ÈD…ÿ:XµãxîÐÚZ«çný‰ô»êú _¨ðô±zD\ó^¸SgÿêZœ‘«ó\=  8%,žèὡ¿‘¼ï€# Mw>ßΧ,¢?`žè¦¥£±™tv¦Ó}TD ,+ÆGÓäƒÄœäòO¥ëgè“¢ì§ÂUÖT†´‚j ÃÝ!š£Læ‡Pœ5%\^Á†9_7]×çnŒfCmoß{ί¬í„w¶œëWË ‡°÷ž¿*eO×҃Ž'o&ÏÏZ:ïBó$pPԕ(XC Yhw­…Ù…ûA»“í&ô†ÖK'w%Îwû†‡šÙèD0#n + RöÍ C¯POS"hː/Ñß"xu¸°½CÙüv-ƒÙŠäƒÄ]­ÞàÊP»çx¯v{”*2>·ë€¾=©,€ÒðíÈB1\ëìü` LáfÄõC¹Ší†åûiÞӐ„·UV”©]  QÑ9ÜDÂ5¬dòÐõ´ælØ’·êÇ·ûï[è° +—*˜”H=kƒÛ<øtâ}:/O¤=L¿2‘—·«nRN¸¡®æ_ÅÑô*\p®× æÓ#.­Y/¾YÞn/'WýÅáãI/ãh¹Xᆆ!=Ÿsæß·£¿Fÿ»ŽIendstream +endobj +1559 0 obj<>/XObject<<>>>>>>endobj +1560 0 obj<>stream +x•XMo7½ûW t‰ ز-;¶[ ‡¤©’¢°Š €/Ô.%1Þ%7$׊þ}ß ÷K”{(š––;oÞ¼êÇÉ5]á¿kº_ÐÍõÉÇåÉåã/´¸¢åOîîhYÒÕüê +ߧ¿oUµ§÷szRõJ‘ +ô•-/>TÎj +Ú¿âñóéßøëlùýäŠ.·0qŠ3ô´UžÏ­7qO•~ÕÕó»|¼¥ëëäóbñ0_ð+èéËÇÞdÔU(n5•Ñ6’Š¢ò±mh·Å‡Ù¡Ý™H&o­5v3§åVÃ9wŽ\³oILʬ øú&ùçg-I‘ÎæômkŠ-¹5Ç’¡ID^Ú¼ê@j½ÖELÑîÔ~5Ž[ŠÞàTt¤ZþM¡¢Îœ›tµžÓçH¥Ãiëð‡‹Xí;€™mØ=m¼úg„±ç3ñ×ûMeêê"–zœ`›^¬Ûá8p2! D¯ìFŸÓª‘ÖˆˆŒ¥‰ÛIF—iÕ4Þ©„ÊãVʇû=<Ø WÃX ’-vI…³Ñ»ªÂÇÕ>s?âz.gùsçªP–œ ̉I(‰ð¢^•©ÔªB¹áe·ÕxÙãoRWQUåvºœw^wsaéçw°XêPx³Ò4Ö~$íÚørÁÔM¥½dûÖé1 àÓA# Å\ # üÍyW¸ºæÀ'åæžc[À8ºÂUdõÆ1’0ÂÔFF ¦2 ´’¸­ªSú +aç|)00Ã[£¬ RQè&’óäõw ^Á,N ^öÆà­^Ûùÿê"š⟰ ¹á¯†šm˜udJ­¤L™÷ԅ9ZàŽ-J…R{üï8I+Q¹s +0 dxi¥¸án–¸LÑÏÀԽ㟓 §ý•ÝCð.úºó«GIò¡ ¨”¯<½žÆNj^ø¥”7>ɞ¿èÔI +R3ë×ÞÕ–ÉÒÅâýèÿ³HJ_”Cҏ£¨8MHÈèJÿl’Ú8g…ö@ªv-‹$Ä!aû|ÚGq,På>‰YôQ'\Á¦ôƒ[Ü¡ë ›õ^^£¾ô"IƒO):ˆÍ!¨­ÙlÑÂuFrÈ<g”üÈô…3Ëúã¨KEÙU4Ä¾eU>ò—N«Û*4hnäþÑêKz‡f'.^‡Æْۛ6¢æ(Ë Ÿ@˜¦œ1/‘'Ë3J:78ú@B{»ROvæXÖjt0w1õ‘gž3ëÜóP}Ñeé;VýçÓoÆ~ú$*g1K-Ž®i*ž6×N&¿šæ0ëN +ÿ|9GÇî$úɐ°i|‹æ½õ`ÊÍI¼˜ai¦ÁB£<†Úš«¦yjˆ¡¾Î=71û¦ªÙ3âíÀdDòò‡AŠLºàùL8;ŒQ ¤I3{‚&‚«k4"îÄvÚä©;„ !ä®HÃn UÂ:Ï[꓁ך´\ˆuÂ^kUÙ¹XKá¢þBܦ²þ AO”Ób=ØÓNY$ºÌ/Þd V–ç4È2E†µ|”El|#…‡“öÈ«šlg„-Šˆ¸¾.yÈ&ÍÆàIdnû:†q @‚p9O–²oiI¨ +D ’ µÖüÌ;/[]睋] Z›W€cÅO(󳱋uÉ})ívÅaÎzºöó…Õ653ysҏ42jwhø·RyØû¯ev6_UeÊ Ó¡ü¼­aÐö÷{:GìŒÜ ‡áWQe‚Ðn6hiÿ<ÈÊ{0m2· ˆMxòIÂ8‹H«’=»ä\Ü1±dCé螲ǷoLz43Z·«Eæ˔L{’ã¥Ë7'.'$¹É\á/é·…z5‡x®ñÜ¢–§GŒ©!i?ÅK÷nëmæYmxْö¿¦º‚¤G´Œ®1‘ËdšÓ…²¥™Ùí\9ñrñ6„ù(÷¬tmZ$IòäÑð„ÝRêaÎ5΋(ȳ.Q™Ôࣕ¥}ؓóK@‘=Zp9©~«.!øW8,ÍË<¨¨^RGg^9Ãý3ß·¸5xþ¢ö1êºI™Unƒ4„y\£n*ŒÞ —iSVoŒI¹Y!‰Ì7PEph~€†)¬á²âMPD¸Áñ¼Ã:u¸pï¿°¬ÜBºÌõ°@ÛIßxzКq{cLáMn7bñ°è@QÀkZ…Çëuæ˜ js„XÎÇ\ ármØyƒÝéE@_þÒ5]¹®™pÎw2¾ˆsý]®÷2Ôú]#]À“ng¡{>è̑-JÚ&q]ÛÂïåâ/%£nýaMNç@̔{×2˜á*\¦5~º:‹µ½‡L.‘ÊðŠ¤ ›I¯ñ©/¤(}”zVωAܪWÀÁ÷›º1ØÖR­Ù9§{ùø0þ:rs=çßdþßO1B´§ÿüùåöþv~÷n:7·ìóåÉ_'ÿ!,endstream +endobj +1561 0 obj<>/XObject<<>>>>>>endobj +1562 0 obj<>stream +x…TËnÛ0¼ë+>%@¬H¶c¹‡’¶zhÑÂ*zɅ–(‹©D*|Äõßw(Û-b¤(¹Ü™Õs’#㗣˜a¾DÕ'Yšá¦ÈÒ%«‚û—•h’û2¹~X ÏQ6|²\(k0<ËPVRWv?xe4¤›NÖð. ƒ±¾U>Xy¡kìM@+^dŒê…Òž N +/áúÍ œÛÕhT'±S¾Åúóýeù”d˜æótFø ç÷¼°ò9Hw€ÚDU^%>ÐLQFsÄ`e™ZÐu­bѱ¡VôÒǗ§Þž²àvr(t0ôÒX!ñ˜•9Îhý…¥.ÿ@E&lÁ‰ù¨àÛØÆþ Æ¥k³søRÛpí€h1 Ma^$½P‰!Îu|ü§©[|ý°:Î\¾ä<®æÈg§“-_ß}¾¿ÃWkždåñÁT!ºjÔ>òœžL‹ì]Œߊ!²¸IvkÏaœÞuFÓ¬£mðxñ»qH×íh⓳:Iò—1ù¢X¤ÅrÅÏoâÑÇ2ù–üí oendstream +endobj +1563 0 obj<>/XObject<<>>>>/Annots 649 0 R>>endobj +1564 0 obj<>stream +x¥VËrã6¼ë+樭²h½%çæG6ÙJÙ묕J¾@ (aM\”VŸ€ÔËÞªxS.Ë%Ì zzºç[g@}ü h6¤Ñ”dÑé'}<Ù¿|ù­3$CšLÇɜ +LFøßåôÄ_§Éd‚×ñ|†×!~­¢,|0ãäÙó›Eçòã û´Èy:›Ó" ñDvo×¢òÊÒ4¡'Q, G¢¤‡Å˜Œ¥¿u9|¡G« aw_;}ê Çн3…Ð%ݚÒ[“çÊò§œh0‹‰z#.ߜ&ƒ!”Ußjí´WôE‰T—«xbLƒAsb8K¦|âFewڙš$âë²V¸c8CÈé×ڑŒu_P•+áâE‘«q̯…gÞHS –Ë\ÑVû5Ìôª¶ÈOKá´ln5Åj3+GNٍ–øé\±Lø`Iim¶ä ©2Dä'"-t©cX ç¶Æ¦øXÚ]åµ)9@À5¡ÅZ9Dô[ƒ•–î,s,wœÒxKE!Ð% Ôm+yîNž?œ¢×e%V*‰ÏOû:6M† Ýù²²¦.ÓÓóÜ×ýÃ+¬×˜™Úçºä²×€×«ÊQ©ŒȞày =ÞÝ&ôÉB¾àÖb£HPzi€Ì-öñ/0Âf£SÈÙrwäO×÷P÷ + A1ƒL£_¹£ç®NTrÂé Ç{Z?,Î|ÚCRXØ +ãD+¢?Éßk(Oš¿O +Yy£Ú¶Ø?”]*kâdòqˆá¶JzcwoWó#îŸwä1Ú`ià¯Á[[ý Z÷»)J(k<uðOU 4Çâ!Z:²¾Ãw‹hcÁ6ŽD¡µãÆ/‚ËÙhß<`€7Òäw®®*xñ««ï͐žÊ5›»aÍ÷*ßQª³ –Xú³fAã-å’ãaIñ»Jµ…7 íY*Uâb$@äˆÙbò câuÑZçôh!iüäþi_4 #€¨Rýžª‡ušúՑ=€\@j h UÊh}rïÆrZSaCn²:6Àc —XÔÂnµÄõuœ7]¢”-¡°itíW‰Åm¿ ÎÀ8÷°pâasã÷x»÷·[0"ð¾rÕ€éÓRb«ð‘ÚŒFëy¨†sÄûž$ÀJrž 1Æ;Xq ©`œm¦“8£§7œp[¬Aœ ÌÙ-ÁlÐîTy¡s¬xµ\ó솘­û\œÆ)/“$AÓ·0l{ÁA÷ÚÙi—·ëqk®RRƒrì´ÇMCÊ¢IP»ɪ\xÐ_mÇ.V*ìŠaOâ-Kªj¿—̝Lx+yÇÿZKÈñlœÌ¦óØõєýºèüÙù¹Úendstream +endobj +1565 0 obj<>/XObject<<>>>>/Annots 694 0 R>>endobj +1566 0 obj<>stream +x•WYoÛF~÷¯˜—¢ŠQQ<$Jn>â$µÝX@QÄyX‘+‹)e¹²âþú~3KŠ”¬¤¨ ˜ÎÎõ͵úz¿€¦!E1%ʼnïùx³û÷ñÝI8Ž½ ÅљRAazӆÊéþ¤Où±ô¸}ÜpêÍúÜ î$ð¢7 ¼˜&q ‘‚f±7n±*¼IìùàM}x6¢ã…¤ ŠÇŸÑñ‚Ptþ ò¡:¦ŠÒ³€…ØñÆxɈ3Žèx“™(ƒc!:^ÈÞžc¡vÌèlÜtDNj9ND8Á#¢ã….!³â‘/˜‰A''Ďâå.Gt¼È?Žp$¢ã!,'h‡Bt¼Àïì…BìxA<9Ñ鈎‡¤10¢3¢ã9h€ÍñBt¼ˆÓZЫ„`^Äõ;X‚pq!˜u1?]ŸQ0¥ùÏš§Rç>͓AìE]Vå2{ܘ¬|$»Òt¯Š…¢«ªPYÉLkª<×æÕü t‘M§kˆ*Ž¡m0‡Ì23µ¥Úê5A(1ZYV§h[™¿ù›SzwuIYM¶¢M™jˆ¨2›keT¡-^Q©]×Ê<³¦ºXx üóè½6š]ðiˆr +ÙðV“²VkËõ·uÎs=uv¥,)£)©ž "e­|¤ÕL…*qþQ{v)Shgƒì,Øú›*Ö¹&Ò" ZûÈ hYR‰ò„¨mEÏZðƨXùô˜W •nŒ£†füšðyMªÎªµçxXVYóI™Ãöp©í"«€ dî€Þ4®*{ƒ»Ûw·‡´Òœ¡GSmÖÇEoÎ?Þ|8ß:óòç+’Q¯ªMžr褐d€œº"â,çU¢r€1´0Õa±ÖýPE®ŸtÞúùç¼fmôRΣSÕ|ÖLïdcû¿Žõý:Pv4ÎZ'hû¼Ë= Š Šƒ€ð²á¾úá«Ü±=Òc9þ~Ԛ.ó¼¶w­ê©JQP¨KEFÝdFº´®à¸Ì^Zktâ­Ù°£VëÍz]Û¦/¯«òHÝ5wl.¼éÝ®¸§Ð«µ­ðE[›j™åºþí¥ï¢žÛUëô>?Ý<<´B 6Ì;…³Æ,–~®iU¨I –Àþ3:;%w¨©ÜÌÒBSQmJF\Ùïú”šìi×j凉{•çüfc}¿™v­üC¯ëµN²%œ£G]jƒþwêêÄdt2[ò\":¬x74ì +!KÔFçÃOšNO¯nïOOJ†Ÿ[ó¦†hþŒ¾EI}~g· D$¼¤H þº7ºE¥8Û †xoôÀêüxéA?õ£MmFÒ¬£šÔ(Ï£6íéÄúI©*óçÖí—Óa‹֔gµmÏðstÝNÌÒª´ÈJ÷Òwcô Ê^;à$J.h^s{%ÍÂ=¯>µU+Ã~(ìEŠM†îa½ŒJÛèzaYœŒbVõßÌáÖôcß?8Õ5ÃÞÁ©;Ø­û6ôváó’1”`q`3VKZWYie·c#¯°¹þÁút»V-°{±€Ý=5Y•²mqõ¶ëöí‘I's©KµÈuêÑ56kÁ£#ÕVey$£©·\Ó)—uVÿ‚Áˆ7m¤ÍeáíÍåÇ¿îæno¼•-r±?ºNš]>Ä =À•Ê],ÂxÚlÐö¾#ü³s¾@¸µ,>˜2_Ôá¥a¿Þ;„]º…«Z:ø®O­Ó‡>·Þ +vk°]¼œìàÄóäϬL±)É3Þ&“û íÁòM˜XèêÑ«Kîr­j½Ã\$ž”ɪMM7Úò݂.xÙss¤U²á}%’|“bÎn3»’Üa4×Öd‹ {ÆÁhÃíá1k’Dø-r†ßR1_õÙýùïçtgª/˜ø¸Ñö̳ê!_ËýYDé{Rú¿¯Ããé؛Æ3\¬!MYçÛùÉ'ÿ0 þ÷endstream +endobj +1567 0 obj<>/XObject<<>>>>>>endobj +1568 0 obj<>stream +x­Xے9}ï¯ÈðŽ€âÖ ´ßpÛ3öLï {™˜ÞØPU ]HŒ¤jšýú=)• +¨¥c.»á¶Ý€*/'OžLñË͘Fø3¦ù„¦3*v7£lD³é,›ÑíbŽß'øk%­oÞ¯n†·4ÓjÍgg‹9­JÂùшVE¯”^¨ÊeoW_nø|0™e·8ÑûQìrASØ1ëµ´Žf·¯¤—¤øÿÔ^xe4ÐƚzO;±ß+½¡\úƒ”šþ®tiŽ¾[Å0¢Kú«V/ìnDƒñ4›°³ð¸£§žß*Gø±RTՑ~©Ü¿ª^–ä ɗ}%”&ür[c=¹½(äÓېÅðáŽÆHr „Óۘ ’ÊèV=Ç÷Y[¥%­lí<-‹ÂÔÚÇàþl”æ#÷•B~þšP'£hÉo%}0;Àœ°…³Éø#›%€ˆ|p ¢ÎKPÄ5½å·Âóûµ‹¹‰öµÉ2â!ŠÖÜSÏ +|n qòxÊ>½=Řàä£x–6£oOÅðÒî”6•Ùû0ñþªÍ9À7÷(sS ˜ìM‚ ¡Æ +æ÷¹ƒ±%_´^æ+ +â¼Û +‹,¬ô´6–­AQwWkN˜©tP~Ο >£É½ÑޚªâŒVMä RþHk”—M‚#{+Ÿ#øFµfPUÿ†ÿT˜Ö;IßIÿþÛï$Í/ÖÖì:ôüҐ‚)Cí‘7 sŔŽ©’>äº cK4…vÙY3ôi2½ôéôhÍÏ"uQuœÆÚj´a_àëú”×¾µ{÷BCú,ñì~cI²PÒÆgôÔ…ì£\©/ù‘Ž×+˜ŸpZ<‰$íä.Ç«PùŽ\Y“òÀ@â¼ñ´7Î1.¯Ð£ßñÌÒà·µ£-(£M‡1mÁ‡Å‰ +$\Ë6½Ç÷ä¼±ˆG¢!¯£È2ÂuM˜ü 7Êy{Ìh{h0%6$*gBh­"¤nƒ `r½ã5˜¾‹ÔŽrAy%)ÅׁDÊ¥ð 0GÉûCãÂ)‚âöƒs˜¯+¯ º̒:*6³.ªº-ßñÙáÃì¤ý­¶»]Žþ=”ñDš=$¢º +W(Ek…XCteÔ¨ü,-dÉÁÄuL„tӔáÔg­65ô +G:Q›}èu+!ï\FÂð“Òõ ¹£órÇ=Å¢òúø·?üDhg{ĈPòå@±ˆp§…^äM :ÞRb¤épÖ£-ŽñDJ¿ׇt¯JÚ츼ÄÀ%BÀ6¤qqå^ëð{³=ñf‰›bw{£y» +SšŸÐ¦ãC–¯Ì§Qr™â¹`tRËÌC®NVV=åÀ:ìG˜îøüÿð­B`Èé’{;¿Íæ³¾²€Ù邽}\Ýüåæ?«ú§1endstream +endobj +1569 0 obj<>/XObject<>>>/Annots 697 0 R>>endobj +1570 0 obj<>stream +xWkoÛ6ýž_q—°[D²å8¶ãoI³ Övm\ ´DÛl$Ò¡¤8ޯ߹¤$Ën’uCâÀ‘x_çžûàýQD}üD4Ðéˆâì¨öit: +G4œŒñ}€•´à8Úüùü«;:õÃ!e4b ÿOJ7G÷Ã×Í_¢pBÑ(ÂQ˜è½‹Fteè“7vžÚºœõ®‡E4[°_£É˜f‰³Þ§YÜ}/t)RŠ­…2:¤KS¬¨XIºÙ\Ð ÅÆZ™¯N”^Ò­Iı)uA9Y™Ð|K+_ϾÁf\Ù Æᄡ™%ÝÛÁhLþmí‘{D§ Ž?ꦃEº=n¹4k¼ÉD¼RZRaËÆ+'TN¢,L†b‘¦Û¶GU‡Ä¦ûÔX+TMЧJ"¨ùf =¡Â¸ç T*@rÛ½6–r—VÛ¼ÃQü²¬•±É2©ˆe²X™$¼}MðøÀØ fbKóŒû¡ÀpæR”nŸv0ö±=§ &atNÁ@æ#8F!U[eœÌ<¬3녇5ßÏ€0uºˆÊÿ¼kRºq°J8"ðì™LÛ: *O>ßqìÀ&Ùº¢j͑ºÛ“EÜ[‹<ß$û.wC$yŠ…f€æ”98ìÕ +èA­7¢àQ ÒRG$ Ĥí 2ø~¬„£‹66s„Ãkf́˾0HËÍ^Ñäì04ij6\QpÊG‘­S~nßïJ—4¬ØsQuP;ØmòU•V ·ÛNÙA}í¥‹[ñÅÜ<È//šÚ}Z-Ü­Û¡Ð[Jd[µ.RáòÅ͇“èGâ ©P†'t‰6„W¼5Ùº,¤­&Qm²Qc»)ü]1ÏM +q èŒÇ7Z2›ú ‹Ëwo¼} £yžÃ8ôôPžA”iŪ™šlõ(Á"ö ÖñO›ÂÍô¥Vû4“@{nX½·y88ñU þ`6p³ÁÅðÝDk–TÎ¥Ôõ¢Â} õLÅnaÚÓ±Úbª}I:ˆ¸…Ylt­…ç +?Ý h‚;m6“Z +»^•£ƒ%ª®Ãçf&kóL«çf+íy6wòÉmwrûÚÛ%¾›ˆ:_±'«²©?Å[(>9È ÜQƒÌ›hZjSkàÔæ[Š7l×KÖÔí¾ Ù­w¼ +°N¾ÇU?Å?¿»â ÊçoSkk2Ñ¾”“·n9ia¶°&sr_v*žß«’«± ÂA?óÎÃÉ`Ľà7¬®N]µÍîí°¤°£& +^¤Ûýì°C“°†æ“T—zf +=C|¿FÁâó[o•¼/ՃHyŸ,þZÁzØj+ø§9h4 ~U:1`=£?®Þ6–Pí7nâV,¥=Fׯ!t«¼p} hYÙ¬Tì/3Íöˆm_·®9¸œèî`…÷¿àûK€¿áz³”îñA8uñœÐ֔›&_’‡2åìϱ×!!Øò&f™`­d Œp[À-§€`‡:ÏÏ[Lµœgk»§…táÐRš9® äÐu*NO6—6¯IÚ +Çõ;·U’)q›b;môRa—²ri¥dqÞ á?ºß´+D”—Øc†µöOSúùêšÛFX\¦~bµ½k\Zݶ ‡ád2 Ñ`'Ž¹7ï/á½5ß0Íq›Kž5ÍÎD#ܞ'§ŒûŽ¥ÿç3ÃñhâçìÓ/³£OGÿ»‹Òendstream +endobj +1571 0 obj<>/XObject<<>>>>/Annots 700 0 R>>endobj +1572 0 obj<>stream +x­WkoGýί¸r[™HޅÌCéC¶·®š>bª|¨ûaØÌ$»;dfטßsç ¡VUE–°3÷y闏ŒúøËh2 á˜òªÓOûøf÷òöÇÎp4Mû4îÓU85NÇáSI·ýÏx:¤“ý§{Ÿ+e£t¶÷nh4;çWœëÓÿFҒƒ l4†Ãƒ—óNïz†g4_"îño +nŸæywœŽÒAJ'¿ÕI³’Éu¹=¡+#E£tMzIoD¾Rµ¤¹imCy®Ûº±/æïauDYæ­&ƒ ¬vç+IVæº.è®+ðjð¡ªd]ÈâîmĖMæÎ|}OU°Ý8Û"Ø&eɪj]n©Ñ$ÊRo¡Ñ­¨æ̓4ì¿OIƆ_œsF%¬HXª¥„OÚ¬dí.祒uæßk¤S°i6ZèJ¨: ö¨Û»Uu.I"¼àõh¤Èîc«Œ´$(×oÖÈ\!±?kõH!Ÿ3<­d³Ò-µ!Ñ6pÙ¨‰mÒ؆#Û·Áq·¶å+dÛõÉ/?¾Þŀª/Õ}kvc#¢(pQ²¹Që†ôÚõUÕ¾€Ll`,¥­)›òb‡»)ÍÙ[HïjÝDßÅ­ôF¢-/Ÿ©.£ý¢´š2´«8(@%j—äa?.%ƒ^EMòQ€<“ÞÊâ'ÑãþU·d·¶‘•3лîÓ,âsä;û×}©¢ü;:î§Sn8}Eߦij$ã¡@ÅÔµ0KcñäûϯV÷;êµÖôìBÕx# ?O +êò¡W·eIÉ=eЊÄRÏ,Q IÉú¦%_ï'ž&Ct¦pô¦ô3@ËÀâž^y(¿rö·c·à቏k£sY´,¨£Ÿ ±Ÿ˜ñ< að¼QÍÊùBOm‚w(‹ÞØPÙq@0‰¬ 'hÐï÷?(Pë]d¤ƒ¥,eÞX&#æ\>Å%;Ï(ZF.Õç]ïëÈ0 ¢@¯¬Ýhsˆ¨ft8k£T)ï=ówÎýé"ð\êcfÑèã% b¦R™2“½Åïõ•pr¸'GFƒ;– ¤Ü¸}ƒV,¨ tIĵÂ+“Z‚¥ÀŽ#êF5K¡JRK?Tµ0[GêÈ ‚1(d{àk¦¬ÜÕÅÕÌ)F÷8ÉFç~ +F–ü:÷-‰rìÕõæ™1ŸmfÁK12ðè½)Ð>µÄàrȼ.î!ð”U©¡¢g´hÚ Ž|%ó®Ö ýH'nßÛè +ônÁ†¸gPÐ/ré Ýp,x.,,~KWFîòñFá&dÇ ÿìN>·<[6X…€ý[ÿ¿PõXã¾PÙ 8`#?ôˍ Yx2-4„ áÅò¾SÄ­n½¹µóý(EÙ£0.Q‚ÜzæEÄ0[àŸMýŒÞ#Æ$öÍ%äbšf3Ø=8NÏSFQÐþnô¢”ëAA¯Ñ&¬­‘>nvM°šcÎÞR5ï4Øüʶ`0ž~}ÊøÃöÖT†q1RkYtºÐݽë6Ûµ_õ øž•ÿE(„ˆû™ì£ëµ[©Sº6R^Þ¾:h¥ß½5:jOÃNdà\קM\–…ß Ý´ßå‹[ÊÐ^®Ÿ¶c8óÛëÆ4ÈU6D§fCóo ,Ño./¸ ï1ãé•Î[hEãÔÃá!ãÌtHɤ-ͯ:ÿï—Èh2J'ã)~ÝÀÌÈí¯ç?:ÿ,Bendstream +endobj +1573 0 obj<>/XObject<<>>>>>>endobj +1574 0 obj<>stream +xXmOÛHþߘC=‘ž‚ó%w¢PîPÕÀA*tR¤ÓÚÞ$.¶×·»&Í¿¿gv×à¸pºV*©½™—gæyf–öF4ÄßMÆttBI±÷q¾7¸:¦ÑˆæK~t2Ð<¥a4ižôækI•Vq. Ê ©2ßRV’õWZT™’UTˆGé^ÈÒêmg‰‡©ìSfi£ô£¡Jê¥Ll¾è^Q¢¥°’Äûù·½Ã!ŽŽ¢1¼÷`QÓ&³kU[gñà݉2eW|vpõ!DÜ£§¬ÚøgM=F¦ðÉQ†`Dšfåª1эn¼ó¡ÍZåá¨óûlµT¶¤­ª)Ï‘ËÕÔZºg‹ÕeöO-é+}I?ù¨NB¤-K×´’Nå)íÿ“"é–Öâ‰í$ª,Q¦³r_ªBde„?û¤4í_ˆ²T–¾)T"uïúîðL‘o&rÃÎ[.M]Uy†:Áø2ÏÔðS’ß3c#-Û߬eé¡á‡™&ë¬Daum,‰$Qui£]Äáh|séæktÉZT•, ÈÐ œISí×MÒR«ÂeÑx̬‘ùÒÕ}!vÞn—`‹žŒV< €”R=ÉÅ{v.ȬʵèÀëۋwxÌ£ø÷¢ˆÝ^^D4Ç—*ÏՆ“OTQp×m²<ïà©e¡¸XyN¥´ÜÛÞY«xæ̃º9rµ@º8[,®g³ùbñ«?ôÒÏ0ÇmN¿Ð õn¸ª5"× Ör2ƒD°²ˆÑ +(:®´ª«|EXf3goD!©ä„ઓ/w>ÃÇ-ÇÐ,z±H)K¥Žü’1òmÍ PHcÄJFt±åÊ«ƒäü{o¨‰Q…´h®ÉÜÈ~Ç%ø›*iˆ;½Ö²$ î>i+…Ÿ\n-±brx¬’öá$šŽhtüÁ Êb|2!¢á£;p8ú0múPl…Ì%`;ÍÕÊ¥†6Yô. ‡ÃÑéÇÅ{¦¡7õJa®B¬‡€Ö#I¦N౬shg EKN¦® ž^”¸=K¹ÁÃ'© c ¾5•J +¢±vØbv€ºOûs®æÿJ¡O·¹h21~¬+à‘©sËIë`©S‘¨¿±ZX¥ƒVpiŠÊIj +Д/3tGT’ÔÚxiÁs­40ІG¶áL¯ƒ1"7wŸ¿»ùzáø.ú=îäÄõYÑòßEQå?4·ià-»_f|ô·öB@SÄâõHÔ2k³„ß!cª¡hPôùv­Â1ˆ7u,’GפK¶vŒ¡J +nh £IŸæ³ß}c#Â?>_R¬E™¬QôÀ¢Ç}©% “,S™¢f¹±¼,³?‰Ò8ïGakŽ£RZ:Ô]Ÿ)­²RäMËrMd ­ÐË †HiŸµºã,bbjÉRñ:+Ü›“ k¹¡›a°3~ ÑqsÝUQÕÌ&‰q†ϊáÆç€C 8˜ay›¼<ú®)€›®­>}&`£nžqM€a2þwh¼8°·ݏè‚wÊhU®~ _ÞáT«¤‰ÀØH)F7Œ3—7v +îEŒ¿:³鿎hD×~½á® VØãàJ¼ °fAÃ6ÅC +*‘謲þ\#‡=„ÕÍí„ÍÌ÷kƒ0ޘJž,¦ŽyU+„Áµ¦QsN×W䀴?KùlNA:]ÏÕNé-¡#êô ,ó% ·b`t¹ۜ¦wüºðžNyESxÇ£‘_—‚†ÉÎë3Æ:pÅò»t×?Íæǃ‡ñgɳ ˜*ûacÁ Â/ƒ$b¾ÎÛNڍpƒ ˜f†U*í¨ôËī‡-þü FOEÖ+f¯Ç8â‹a‰¦t/ Hô§p‚ߍ0Á±îg¶XmTÁƒ†å +}V—/£Äß)øV aáöEÀÈß0‚T¹¡Õº`t|I­y^•aÿÂö3âNc´rÁŸ¢ä Ÿþ¨-zã“)Vpä}F_gŸg73útwwsçä„ï¢îÒbÒÏ,Ü?³ïÁÕîº<9ýa[žíM£éé}˜„{Þýù—çt«Õ7Þ..URc#ñ•gӇ£“I4œÑádxÊM‡¯eÚ¿)óáU¾Ý§ ¾þ‡m÷K¸fÎÝ5ó<Ì 6u<9Ž&'SüÚfŽGüèÓ|ïϽD\endstream +endobj +1575 0 obj<>/XObject<<>>>>/Annots 703 0 R>>endobj +1576 0 obj<>stream +x•X]sÛ¶}÷¯Ø—ŽÔ;6m}Xy¹ã4É­§MšÖêdîÎ܁HPBM,@FÖ¿ïY€”!:É´¶åpwqöìÙ¥þ¼˜Ð ~'´œÒlAYuq“ÜÐíì6YÑ|µÄû)^VRÁ Øzú÷Û.KÞu»L¦TÑd6MfÝUIñ5VëóÕè«ð´Žï®+šNo“Ûh5¾ÆêlqŠ‚ýÆ×X]M’e|otÕõ:™Ä«ÑuE³Ém²ˆV_o.®ßÍi2¡MÁ`-VKÚä’Úd㻆 +e]C[IR»¨5ïĶĻ½¤ÖI+²Ì´ºqtPÍþûÍ0yۙ“«¶µpîÓ•¤ïxûwaKïu| CÊþ´±•(Ë#åFËKÞvuCW“’±ÉLJ½Ôt4-eVŠF’ÐÔyNx+vNɜwÞk26—–c=ûHÂ"À<ø©­Að) € —”]¨?Û^†àÄ)þÎÅ f¾§±¦¤¢;˜ +Ë 2 +úZ6Ùu-ª$¿v¢ÚŠ¡BHá¨0eiîUohÍ á#ÍѨûéÂ}ÿl••yÿ9\ü¿–¶RMâ̹Xñ|b` +àA膱±²€a+²Çƒ°9UÕ¢Q[UªæÈ|È\.ÉgšúèÂ1ÇßpŠ¬ªfäH”!œ’Ú8§<ÌWòí‹sŒÚì%(ðr¦’´mwàM8Sc}Ä_‰²Õêé¥AÄnÖRæ|¶(Jæäå9íÙ6s¾2(+3 ?Kë”ߊÀ.Χ§ãõ»5MPL£W—ÇE²Hèáè0ð£)U¦$@7?ZÃ÷º¹›.Q±ÈÝû6Û7„+¸Tö¬ˆs"_U5¸Í}ÉÇoæ³Ò;úExòÇu è¡çf„@n<;P—|hPÁµÙ h‚±trÅ&±àø= +GCVØê'¥sš>lhÉ ú/jØíM[æ@Q¼^Òa+T 0šîû#±Ÿ¥Yœ \‰ÏB•^¤ +k*z¯2kœ)š¡RüxÆ'‘çŠ1%岁…¾Ï +y™O „Øš¶‰ûœé- ûï—Éìjcz’›‡¥¥› JImÊs+c_ÂU ö„¾҂ŠR½{¯ ±ÃûJäS's' fÄA/åéq@é¬lsÈ K;ç±ó³m›UÌâÝð†OÐ[×xjâîË„çh,p3¨ÃŽÐ ¼‹(ת&ä ù&J ÃxXÛ×֋Þµdµ—P¦Üí=»{ú¬o‘eè2[VˆÒ8a ,}àzpìë€ `+KŒoC=ˆÈC(ü­ÌDŸD+wʱŠ=J(ÈÅ¡ÇýÏ˞D+æeTÁ[‰ú@;t ýh$à~Šá†Å„<ûùò9u>$ÛjڋºVh¶R{8¾E唄ze…r4¢7Ѫ2:y5€Ü—jø¬ïãƒÒºùÂބî}îÁýÏR+Ö1t¡œà34ßÙ¢øþÅ6º£B^²Wiê=¥)sVÏxPŸE€l•fõ•Æö¥0Yá ý[ŀï +x=™‹àž@#?y¿Zì¤ù„Žºªÿ#~~"g ì1{@0òý˜3Ôa'jï ½6‡KÚǎµ3群¨äF~`ŽÏ ¾wUüªS„É ¬g´˜óW8èÃÝû×w<Ÿÿ~GoLÖòcÈi¼šà›•›ÕŒ®–7x¶ÍÇëAh¾œ'ËÅ +¸c>åßn.~½ø f#mÚendstream +endobj +1577 0 obj<>/XObject<<>>>>/Annots 712 0 R>>endobj +1578 0 obj<>stream +x¥WÛrÛ6}×W웜‰ºP7÷¥“Äv›;i#¥igü‘ …˜T´ìiûï= ’­´3½ŒÇ´yÁb÷ìÙ³‹_{ãgBË)Å JÊÞ8ãÉñòñ»ÞtGSš¯ÆьJš-VѸ¹+hݛÌWъæ³1®xÇÇ;~ C4'¸ÎVK\§øµ’²Þt¹„¹ÉŒ—¯âã/‹çÓhN“x-–3ü­ïøí›MotƒÅÚdìõbµ¤MœÓ&¹è¯¥}”–´ýo_m¾ô†cNØe“^Ü©Äg2O©rÞªmå¥#AXä”Ñd2ò;é$yc +G‰( +™’–O•£ÌXRÚy<>|¬é³Ò©98ºœ“{v^–.â-±c€;nv­1'=Ö'E•JÇÁÿ£_/ýæ·£›¤‰s8ŠqŒdÁÜýt>¦ú}‹Cóú¸ã'wB 8}eJÇÿŸÕëG©=ý¤äAÚgi8E—‹å ’·…Jh'Aoø鈔'a“zä™*@¿ÿf4Â5*Û¼E‰)Gk$°PÛÑÝúöæÝíõzôþúçOëèúçkö¬“n¿MÑû ÍÀÁ—™¦þß¡Õ'¡S:'„“Bb[Èf·6ՙ5%ö¨G@áñ?eýñ§Í‡·ÇhF7—4Ë32aâYMäE´ŒèóNx2ÀÍÍbºjzG¹ô÷§JaD–(¤šŽ~K¡ŸÉ™Ê&¨ð^i¼¬™}ŒOC^ø"JçT z܀>Þ¼í£|Tj’ªCÂúˆü8øÀÁF%”ßËN”[qªF®«ÄÀ6Fªž)7&%ù´/PÒ\uÁ×\jiáî (´W0íªdG"¼S}[‹ê„á*G7ВV:Ž¥@d@û•*‘kã<›¬5à]€µ +š@©ÜVyð; EE…ÉáñÞ X#qÄ®S‘AÎp@¶Ê¿HO£O´l4ˆ¶Ò±Jµî4Þ°'rNö KGÊÑ:©¼“EÑ/¦:ù*¦döŒß™;lo +‘+·iȤæP—n/•=ӁsÖ¯/ä£,POðÆg¶Ò­%J»€S´‡ò"I:Xðv,ÀmëLì‡ZÖYP¨Òÿ.±üeí¸ ¬j2 Z¡s(—Þä,¶û ö)•™¨ +ÿŠ½Œéþb‚>w†£pî`lêî_µúÝvŒ×úT`YUP)ýŒD-œú° ^ïYµjFWL;…Ý §æ]Pž$4Ì맭„_PVˆœ„©ƒ*Š¶QœETg¡ TSŸ[¥…UÜÊ-”9Ð3¯„÷™ÊÓ-ß1 ȘfßBÆG2Ò8¢wç*—¯ !Ña}Ë|ÆÏ ²ÀñM’¹6€Œ[°Švî¼b‹¥x´9 ¬Ð2áõý`QVìlâm1…¦² +†8sÃo¸´¡5E¹5O\®Ê2•(î[÷àl!…ó¦f“–/kG½‚0p_`:¸\[¬ÉS«oNý['®uUnl…®Ÿ6¶(j¥È¼´ƒóÏÂäžÌ2Ç9CmÊ {Màƒ¼´Àp ÄØrì/±oŠ «ÊšwÂó~ÝÒã¸vm¼ï‰gy TAØ‹G\÷*SqŬ̀;ÀVúƒ„ƒûn6@3èSÈFí®H|ÅöÎâôÏ{öfà€…<Ô¥68³L25–rVYý•®d(Äîì¶f}†sÖ5†Šƒâ¤(°ÃÐL•ƒ{:ÿ†ÝèŽXôü^XQÒïÄzÃïÿû´’"PkxK£ÑoZú­2Ž´€“Ì`h_ü»M¾š”^ëÐâ¤æi#}1»$û´*÷LóS³*¸óaj:‘çö‘±ù(¢ë@'Qp²‚¤å)4Ú½H@ §U–¡ì¹ª?iõèˆA*žÒ͝Ÿ*¶ÃOl,ÁÍ¡“ ¯(xb;ÕØõV$5Uq  :ãÓinÐ{²BwF+µ`úƒˆ0—ûÒhðô +Yߧ±ìŠ{êÍ­¾½ê#"Þý´'ZZ8I4?½½jKYã¶_÷£3;ÓeíÌByÜNíYØAR^º>Pp…xw,5Îsh*8£X‡˜UTEG¶05 JF#€Y‘6 wTžJå’ÊàSšT¢Áñpv¢R-sÐí¯f½áøº"b4£n0€ž“ÁރðíîH+«.& /š®S¦¸?°8sc4iE>æ>|r¨«¶°ÑÈށ§´€gËåz8<°ÅƒUçwPÃ,;ÀG‰úXÖ)÷e´šàð9Å!4œªp>áO#bø`_†©ù{ôÓÔ`¶néÐÿ’‘}î*( Ä÷ùÔÿˆ›â‘T—O{3ûwaŸæhwtbÕL “§ä˘Ëàæúõݛ×è‰æ  ¥«îÈò4YऽŠi¸_rXÿà0[΢åbU.g1›¹Þô~ìý –>§endstream +endobj +1579 0 obj<>/XObject<<>>>>/Annots 729 0 R>>endobj +1580 0 obj<>stream +xÝXMsÛF½ëWôRRR"HIù²%‰‘£ZËöšÈºRÅ  ‰‰ ŒˆÒeû¾n|¢R‰7Þ=ì–],3Óßïu¾œø4Â?ŸæcšÌ(ÊNFÞoºŸOoOü™ï]Ðx>ó”Ñx2óüæ)¥ÕÉ|ìh<žâ‹ó)/Ê/ú£¹7'ÿrîÍduäMš'^û#ìöSoŠÕÉhÆ{åIÎÎ.¡ÖŸûޘW¡¶}’³£ ~¾XˆÞ 4@’<Éêb†S>öÈÙÙ¦×O²:žAãìBŒš\ð¢<ðÚup2¼’ïS°åˆÌs +b Ȉ‚èì.·.LSï(W.39á˜Óû€ö¦|À¢ÓxSª/•.•¥"S©"³%ëTa= +E[“¦fÏR’ŸJҝàïƒ_OF4ð'0>ˆÏÞ×jþ#|ÓËsÚ':J 7ƒü½v Ýë¨4Öl}Öylö–ÍY©òQ•„cçlã«=ÇjúÜsÇjK‹ÒDÊZ²‰©Ò˜6Š¬Ît–bµq t@e¯ácπ!Õ¦{ô‹©Ž´íuš"€ +!‚ 嵁/ &òt³D¼c9rdpo‹×è“L#ˆw¹vy{¦gS!h­vgÚÀÓ)¬åÒ½Áfd$0&E¡ëj§rwÊQdC»Ø"@†bƒ—Ú²>”Ë UøÖ@ôʅ¥£RármñçÉ]iRúæ*Ås«”7•¡ÆË«8fyÃÛ¨)āï{£ÉH…/ëñňêõ¶P›å®fV*U‘kÿØ-ö0JuôÀž~øÛ©ïÏ+¿Y,¨‹XÙΣ”ƒBp9!½š;}—WÔË>Q9¡³Â©øßÔ;™]Îæ<^±Rm©0:¯õ7ÝêÙkp¢ž´u°¡I(Våì»Õ/«àÇûO>߭׫gpB6¯×¹ |½þÁûáejÏPe{Ãïzœ`«M z‰P¦:ke!Ø@¥éù±Ê",*»^ îx$w!ØGB™+{X>ÓòÝ»S+çóÌTêÚÌ#kŠ0zPŽâ*+Î/µ¢Îç(,\2|eÁk”’)cJ–‚¸šEZómýçXou‰À µIi‘ÀÖ zÁlñÞ |‹:©ËªG‡ ;ƒ|Äæÿ ¤7ý?ỗsîlÿ5¿7{4ØâY +¡vWÿ3¼¿Ϩæ#À|Í¡¦ÙôæDZ­Pe¦-w\´'+¥+•) 0^QêÐÕ_‰Þí”ôã^ ãLç`«£Ë£¢Rïg;êСŸe•7ð?†mph¢ 2F;Z¾|-„‘V‹ùIZmÈ –º·„Ž“7Ë#·ÖgëµX,œ)”бç÷2²` =‡˜Á°¾ƒ–)5â×ãҁÈ(.á2F¡î&ähzËQ=Ò,œ¢s kY=äa‚:Alš!ÀC{]3¡L†Ì MtšHˆ‰eŸ°ìa:GRi%[JTZl«”~þô®žKêé Ãèƒ}ÃÆöié'Œ‡<­ÂlJÞ)q®x3Z~ã™rçÑgEIˆœ‡”é²Ä̓+ v<"ý…åýù^Ôfm㣥zT©)2dº^j‡—3„/ªø}[tµÍµI¦¡ ‰×yƔ2FeoR•yt‡©Úœ“‘=NoÏ S¸$¬Ût\€V(C7 '2µ“4¼v·Ágäj¾•B,Q «È8G÷ª,yÈĬ\¥¨<®Çëå ÆgÄ[#Ðá±ÅMröû½gtQ<{èµCä¶zÚl3€lg¼Äeé·Ûz•:Ló»„pwÝ+‰„ifÐ7“0F4,Åá3SKH—7約Í1]‡yŽ`Éðü T!ÜXKÀ.Îi¿Ž ` ²®º6˜B•‡p {ÊSqå…U]´Ã0µ“ihI±Ïê?”{m#|0JoînWà쀏1ŒôÖ¿­òÑ–&“Š¯u?çú© Þ¦ ¢ìEßÃõmøÏô!J‡¹‹ñ÷·i½ >Ög&åjuM¶P‘}C[Á=~½¬½)Šþå0.wCŽÎWY1˜Œ½ùWõ)_¯åB‚ù¸¶¿…ûÜ[ø™qyŸñŽŸ päíо˜Æ\ÏAáÜ3ÉÙ¿ÖRZf [xPÀë|Y)¯² ìÈ­T ±˜^ˆòè-nf¦}Gz燻ŽP 3ž²‚Æ~ù6|È-í"ïÕâËC=ÎÓª* +S¾b´?>'´ü›–¿ŒÁÙq·½E†¿T0Yú¿HàøÁ՚6ƒ÷o§žëB)¬nàòóþîélÏøS¤!~”¯û^lòS L½áÆT®Ö8`P8q +r|ç@ëÍs$¯Ç>€¶¹ÉˆLô¾rìË0¹4-% ŸNB‹w!Ñq莻JǼ1ÓHì1¸T ó‘\»ŗ ɝ?Yx‹Ë ]àÃ֔‹tuu}EKó+ߝ—MO’.Í)ø³¹7ZLh0]ò~|®BåîR÷a©ëGÊ\JyŠïaóÙ¢¾·O§,æÇàäï'ÿ¤xÍ.endstream +endobj +1581 0 obj<>/XObject<>>>/Annots 734 0 R>>endobj +1582 0 obj<>stream +x­XÛrãÆ}çWtžÄM‘ï’ò’Ò^£iå%“­T”‡0$gÌpgâÒ_ŸÓ=€L1‘Ë.§lË$0—îÓ§Owó{oL#ü3¦‹ MTÔ½Q6“ç?_>õ£ì’¦ãE6£šÆóù󷊖½Ét–Mi:šf¼ÌÙ¨ýÆoqžM±cvyÁŸñŸ×´î}§ñvÈÝüaŒ%ã«9^Äó›ñœÞ;ú©÷vÕ;ÿ8£ñ˜Vk6qqyA«RÌѪè_W{u8²Öu®=Å­Šø£©ÔOºr;í)\øäªÆF¯~}‡ÖEÚ)S’²ezj±Ë¿Y}ëh8fVeÓ(¯x/EG;ïʦФ°ÑGS4•ò´Ö*6¸W¿xM­3º¶âOT«“5g¹‘6áŒo]ǶÀ°­±ª×/8ÿX´ Çãl4Ò„£ë&ó¥%LíŠáô*[ð’£ZÛhœ¥=C7qk +ªÎ\#˜4/f#d#¨"? +‡uM&íÆZ<:Á©±¥öý…­kª’ÁÊU^à9Üå¨x]é'€IAlL`pµ§PçYáìšÖ¦Ò†²Ò*í:EÈíÒVcé_› +WTÿÆá þzcéþý; +Ínç|üãàÝXRei9ğh±ÛÉåQ!´%-É'£èÝ?–Ôá-lTQPmç +Ž:Uluñˆ3L$×¼fwGÉ_ zNj•ÇÅZ=ê„ðwÐMÜ(€¬——¹7z= Ê!¨Dåìf@ˆgK„1ݖ@‘R•Æӓ°çz –¦ôáL+\½ãu»×ª¤?!‘íÍ!šÛXW¤máJœ^ƒþjƒ”xè·Hʂ±phqŠ’C²9¦ùY ùÀ‡7ÿ‡0§P‚Ùä¬f0âÖMÖ¬ãÎnÎj<§­«L ½9Ã[$@ø%¤ì¹‚ àå©r‚Ülðrã8Ë…°‡lÕÊ@6’(áo~Gðâ…w!î}uþ‘‰‹M±%„É"C)9!m ˜Å¬ P;Éÿ­Úí´…hš RVr$OcÒíË!ZIL†6–®NqJ £.¶ÖªÊèVAwځ#¤ Oۊ1lG@âæ¡ð&gµ=AÕ+Á‘˜Í¶25•µîPeÓ9å kº£Ž#p'-}^GmO} ®Ö|øÞT•€ žà«8ê'dé^$væ:F„°ÔªÂSàb ×~ 'ø|Ù+ŸR݂Ϟóó• Ï'¨‹¿.ó y–ÝÚl¶‘Œ-ª¦Ô|éùÇE[6ú©^©*=îJE9¿É—½#0«X©ótä" +/Õ ¸£MFݳ>£Îv”8*aA V™ bÆwäàž¶®Ùl™cŽ;G õh'6xÏaj…áL~G"<ôï‘5èá ݤß*Ü­žuŠ¬Ž5SÐ+Ôõ‡>­=¸ËÆ öq™ëlۙ“òÈ·7§üA )‰X‹ÀŸ³w×÷0ã¶×Uõǝj‘2â6¯×Mµm…XŨ +éEW4\†RZ“f™Éèê®A­%Pà ;ÛUæ®r—@©Öïܕ‡6J­°=5/dŒ6À +rBÛf!m¤?CœSò`ÜÉ]05 ‰g5R™#´“Ë^ö¨úXhPÀÄQ*Á°":øk¢öoh”º¤NfÙÕ₞;¥¿¹=̢ѷNœ|áT{I—? ýsÁu$Ìk-‹šR÷O„Pê@4h!büE®vsI´o£Æ¹‚ô?Mj +ŽÒì“ໍq÷—ósQÏL9Ïe¼2$_:HÁè{m$Ҙ!Ù»U »ù³Z,Sÿ”wÞöEÒaíkûŽûØ¥4C ZnCŽ +ÜÉ©ÐbpQ{Ôè?äÂ)òu„î±Ú¤JՉD—’©‘g anñ$@YÑ¿5€@Þ¬¡4©^0ø*G Øª#tÑõ1nN[ñi1ÑÒüe °dä’A¨üY–%=8êÕ/²Ë1]MºNTK®_aøáf8¹ÌÆW5@"‘yü/C¿´,§iô®’ñÕØÒí]ý8¿ýð¾É$›ŒÆ8ê +s ,+x´vUåöœÜm§-J‹c[oõÖy³1VUôþóíõÍ]!Å܀£u×OÆ5ºÒÖ ¨m' IQÔ¹.´Gֈ·78=FŽ +Q2¥—NI‰{LžtéاåN¼õCj¸ôw™F䖗^÷üý˜où¾ µáºÄß]œ†Ïð  žk¤¸ÌI PÇýãÆ»f'ãþ¦N?§dÄXt´¯¥KF½à=”{D', †Ö}_ËuV‰M1s 'FHŒW@¨TxÌ»U8pÞH?ÁB΄ (w—(ª°JBGÑÙÖ0LœUp‚ϝ;ûPÜÓD~ içj…ŒØȈ+mixhFGûèÇdy*1G6Á ÓIš…„',‚#Øýß3ôCÿnÕ¾ ‘æ¨)hòË¢v~ƒ Í'Jgéxvî¦Â$.«»Oh¢÷mÿ¤œËÛ·¬n¬£0 X¡#Š\Úøoq,¼×?Àº˜¢ 9ο ðÀ}Œ¥â ç9¾vÛñ–ÜI;|„3/ ¬þGXq|E£‡ÜÀçŒîN(DëÆÊ<¬*ƒq™”LdûÀŽ¡ˆ +þ-k¤“;º˜Wâ5¼©—¤Mo¿|þº¼¹ûÄyÑ æ¦4˜#àèOuÉ¿…ÓŽÉÂ\Q‚aƒÇ„x"YÚC5~¯‘_eÆ ü°s9¥Å|–ÍsîV—×·o¯éÞ»o<ʽo»q^Ò¶Û2¼]ñúß,{³‹Yv±¸ÄÏFØ5›óaV½Ÿzÿ¹Åã«endstream +endobj +1583 0 obj<>/XObject<>>>>>endobj +1584 0 obj<>stream +xXÛnÛF}÷WÌCº€EK²,ÉiQÀNâV@¸±ÒäÁ/+rimLrîҎþ¾gf—²D;HÑA$^vfΜ3}=ÑG4ÓɔÒò`˜ i|z’Ìi2Ÿñgük4å_i4KÆáqþ0Â#£áŸðÖñb4¥7–þ>¸X_Nh4¢eŽ‡§ó-3©Ã!-ÓÅs­v8±P^gä-ùµ&gª»B +{g+ª´´Í=•6Ó)όK[çð¼©ð¼qätꍭºQåJ‘këÚ6ÞQfKeª_–_†4À¹ev(Ǻ£íÁÁŒKS{\VUF­Ó ՍÍMïrÛÐÕ }2UfÃWöè®±míäù»gŸ¯Þö,¦…ÑÜy\›tM¦(h¥%ÒÜ"²ù~ñõñ4™°ÃŸÖº‚º¹º p®bt8Ï­á%° ‘O«Æª,UÎÙ¯¶9Ÿ@tºIh ¬sÓà1[ÁÛs»Ñu±¡;·9+_ì* ó  +“!_Ž nÕÊ9ÀÁ !mˆwp:•:]«Ê¸R^‰QYipÉ7Êݵr=‹¦r^…ÎZxBbkëœYšnW­'œ»!çÛÚd·¿pÄi£an‹µAØ[I!¼T+å4UYOn þdß?jÝçE@ 0‰NøŒ°Mç9³ëA‹mÚÁ8†ÙÏðŸ7:^).Œb\p=5µò ËNÂwӏ<Ó¥Eðo¯í#©ÇU8ïCàkkjfàOƒ;”7¶$F%-,Ìn`ãÁÂzFøud‡Kzdúع +Tr€×60¸±-¥`X©î5i"Ï#nò £ašÈž£vR€ø5¼Ú½iÁÏ^nWʃü¬(p„€c£ì;¥³¡´ª‰£åºÑuª‘ŸL»{okQøÒxp­jû^hP^S¡Ú*]‡D;©­rs×kA–ao¥~pî…vȳ_C­ðµ°öo+²²­gß óS/ÒZ70]‚±W|åtÐ z ~F!o•ê@ñèßâzGÀ*ː¡X#PÛ`Šnš +*PôNû¿¤TF±‚2=¿³&ÚÀ;‹÷7T©Rӛ÷Wç‹w¿Òß q"1|¤Ü.Ô¦+ÑátmÁ¶PBí€{5¸«{րd£S áÖPù¼G=/w&Ä©€ 6Wü@)ö"5\¢pÞâÏÍÛÿ¼ý ) ·tÀŽb/pepr–L¹xî`À*‚ô,õÒ£VEkGl(WHCfYÁRo©Ó¨7ŸhÐò…#úq/®_ÿ + Ž +51œåaçlîúÑøÉé.Ž¾ÓÁ#Îʧ{0þ#ÚËxp£}cP}»Èr9üÙ€{‰ +ï™['?vkKaMpKêlЧVMÊí‰ûôj†Ñä‘Á¹mñ•/qùASD=ώz¢öu…gõ7¶]?xb!´<” Ûú>Ϻ.èjÆ¦÷ní˜0y}1wÑã× ]‚áú›*ëBI‘ +©¿½Í1sÜÞ&[79ã=ØIë-°<âŠ.„Äa1|*ºHÿ ¿éñ{Q/$—ƒAš:±<õŠž¬{|áþúý»ËÅÉõû¿‚k[`bù£—b¨‹ƒ.# ý–U/)|)ήNÎBœÇ—g4Â\œ£ŸžÒ`2 u~šÌ”ÿ×{½}±ÓÛ_±Py€# Fšãîj2ój"ý‚—†í yÅyy¿~óZüT;sÀ~×x»ÃWbå¯Ýປ™u•6›º›ðX–ÜÃ!•Lôõ]3B‚ãË4.VƒY2çÕ þߎ§3i‚O±ÉÍíúÓ­1» oJ2 ó¼ÍÓF©xfBhZl*MQ§}˜%ÿ«ÕÁ 9Ûz0Ä¡²`‰ˆ{£)ې*œ…Xbq=y¸mŒù4Æ<'ã!ýø,™¥Õc lã7²*JšJ¬@(@²!Æ^ÊE€ódxzóݱöæâG”Ç’õ&s‚ŒÅ ¶î/XR ŠKMŽ ȏ)…{,T8{ (ƒYƒK+¦UL¾š,&éžlXõ†`žj0ã{’ˆ  {ÏÖ:J雀ôFV[æ»o,V¦†¥=PãøÄ絝–/_bӗ½üð#æ©p©[ÕÃvh+ì{§ÆQNÒÆ|EeˆaÁÊWac)Àbå0òÚÒ3uóçùُŸøy( ëûÙYíT¿u6L«=w%Ý}S2$öäßžB’Ù+熾ÓéA5&,˜yã–V`¨*¶oE&âo„4ŸizŠŸ?æBśó«‹sºnì4=ü’¶L&9WâMñcÊü„³¡°ïU¯Él’̦ó ûɔ~»<øûà_¯$Ápendstream +endobj +1585 0 obj<>/XObject<>>>>>endobj +1586 0 obj<>stream +xWioÛFýî_1uaT$Z¤eIP>âÖ@íVQ¬È¥¸1ÉU¸K+ú÷}³KJ2“¢EØѱ;Ǜ7o†_Bâ_H“ˆNÇÃ`H£ÉYpJ£é¯#üV’Òƒ/N‚Èça0¥Q4 B¾urŽéZÓw?šLññÿ¸F§päïŸíî‡ÃGñÜÿåìàäfDaH³”¢(ˆ†!§gÁÙxJ³„÷pH³¸wÛZäù¦O6S†”1µÄ_¹ÑçÚÈ|CVɄ¬ÆI‰\+I—´Î$>¨HWTjK¢X*jci!ýQ]UR!Œ•ÕñìóÁá)À˜%½E¥×—SÜVÖÐZWËJ×+6[’^ÉJXU.I º¾ +è}¦r„faÉ8+Ȗ³·•6F-ð5‚Œu™ªe*ˆŽOø{‚KX4uœÑ¼'R†Tó>¹xœ¿2¡Äžë¥.á¦ìZS¢ "Š-\&*Me%KKiOŽÍû c0º®—Z'¤)8B£ú[×d2]ç øRÈb@l&¬îúÊãXÉ%|ºo$]¿º»¸½ÿ9\н´—·¯¨… h†ºq¢ƒ=t׊PmP¼Å†Þ«2æ(ªBà8 )×1ג:„;'írñy/ke2`m×õÁ•®O-€3vwÐ *ë8UIatÙ¢ƒ +lh­L§V|Í3ˆíøð¯a¦)a4FL›{½¦…ˆ[6z¾êt[uW%$‰üÁ B' -¼8˜K:42®+e7ô+Ÿ¨ºMqÎÅÐáM¦Ái@ºe–kgµf“w—Ô° Y#Ð^W ;Óô$r•0Î쇍”ÒQ…ÿRKc ÷0U¶ã—ېR3)À £QMï¯q¦Jׅ \‰ª Àh~w¸Æà}҄t8?¦Ç’K_h®­f·¥Üc¯gÐùù^¶kU!™ðQ´¸ˆ¶a›­tžË* ®Ô> +¾£ÑÀesº“¬+P[‡nEáV¢™¹Z…1¸xMrçúk+YN۶ظ¶>ю‰LU©X:š^3mPqó{pX%l ‰ã†oèÓf§""_‹ÍG]ɶ QFSmE×'ízìäæœB´XJƒfZ N£`zêÄzLƒ( «FY!̈ú¶4¶ª½ø½ i\CÀßjQ0$ï˜î¯+B·BÜŒŸ¤A4 FÞÅý«Ù˟8ëÝÔêm-­#ÐíÕJW®÷$à êç9ýÁ«û™Ki—†o„A˜ô.}á hq‰ 3Ðà îÍШšè[Ÿ­n¡yÓ:ç³FJw­ã³ÖNéT±Ê!ðè!HQ*…Åp2]eóÖZq6R*XéÅߥ½-SÝ +FKûFqҒ{-Ê +ó‹¡6v/ð(V@资ôºÆêDˆ`V`íZú镉'I•ÖECa#¹ý `ߦTÉ<écà5aAÆZe2ŒN? ¨£”› ãÝç½5ÌÃÙJÅÖ/ Éu‚ltÍ'ª‚êjó(ÑýßBùpq÷'tzûúªÅ²}âÀ°XV ‘¢Üø¬ Ë÷y°²7 ¸”™N&Ÿ›¨Üu +ò [Fs‡oA€ ü7½]ǺõÒ͍Ä÷b[jf9€xÖ¶ó®Åøf3Yg vÓ]¸»ÃApÐXæz!òÂ/¤hŠEÀ­ƒÏ<S¨¿^3`ó§$¿ +æÿüø…w<¤sÖö;ò»% òn3Lâ9~Zܲ¶{Ë\Ú¾ããóùÑ»ùœGZsƒ?üNz Ë ¥àŠ:ÇÆÆZÊ»®^9Ã+v{tï 6Æúny©ù;ë­ï¶ùœKÊgŒSdwîþˆmŒêIÅnAڛªðcâ0«Em±aÚvõó{Æ0¼î¶ÛGXß¹#j§Uà Û±}$M"»¦ôãàÏÇOjâѯy®%ɬd¬@c¬¤¾¶{Eð‹¹àIÃFÚaMÚað!ŒsŠÆ¢^ži@k¨!닪†Äp~LeX(x™Gø-ۖŒ±vð£wƒAíJ-Cu¢ß"ÃàÛ-a£e=þϹ%3…­5Óó¥s)»øx,9Þ=k0];mçFtÞæìÛ +#°ÍÃæGÚ +× |±\˜ˆÊ5Ø¡¯Ó`oß še–×,qÈ«bª¾"<¡¹­âû_2Ø<ñ†øïQ¼Y Vü¬Ãkº²Zcˑx@3x"üK  iP8Æ£îô”Æã(ñ? ÒzyÁÃþ3ď¦qÍ#Ï- +|wÐ^L†€V§žcøÅh2 +&x¢Å£lÒMØÕËÙÁ›ƒ2€6endstream +endobj +1587 0 obj<>/XObject<>>>>>endobj +1588 0 obj<>stream +x¥WaoÓHýÞ_1é7qÓ$EâC¡W 8Rq'‚ÐÆ^'KloØ]7DâÇߛ];n]N:݁*Jìݙyóޛɷ“1ðwL³˜Î¦”'£hDç“i4¥É|†ßcüIÙÉ7Ï¢8¼Î¿Œ£9Mâ^Ä©ÓWãsºÒôޟŸŒGÑy÷ü‹ÅÉéõ„ÆcZd¸e:ŸÑ"%„h‘C‹ôɋÊÑ^(÷ -6”%Abëc&¢Dn2¢W™ÿ¿•Îߝé<×{Ž]û´ÎõJäŸÉ"ŽBÚ0d‹U”è2#ÎíG?½ÑE@bO¢ §q¯êç´ÄŸ__ãçv¹ŒšªÂÉÄa<僀¬äÌL B’+Y:K{•ç”VNeUž)Î[j^@ނlµ:"sÌØcß~œˆ<—i¶cZ´D +•¥Blë´Qi*ËåÓëxŠ¼ÑŽt‰lÜF¸­S¿ ø”ƒöCÖ"·šöÚlñŠLžrj‚2)\Å-*C­hŠ! +}‡ž‹ò@mÎÖUYÖIYg™o,S¾¹Ö©¸9Iĵþ-ÐèNÿÀn˜„;m¸Å(#3 åÀ[½µ”«­ävtb۝LT¦ÀÚ¶·”iC½¶ñ=×éõÅQ'Ãx€›Fó(ŽÎ¢ºÇœ"(³ — –ZWFp>?aH8þÄÃD¶ÕŽSo…¬´Û<º·!Éê>ù÷´û){PŠwÂmz­‚mD×&¿‹b÷¿eÀòÁ‚Žºá`Ôꦑ +è!(qÅ£1 ãY49óúEq'©5“L¶hў»Ú“jf¦l€¬úž%÷˜ƒ W`c§‘Ã&êÙY4áé“ÐЉohª÷–`_ï‚}ÑéªÝôQp£¡\09 ÅX&ÞÚ[’)êÛž¹l9þÕèêrÁ֖€áð΁OL†¥ÒXê}pÄx#˪7èt²w%íÖé]o@=丆'Û^hüt­Ó+AB¦•$,:8Ž.]ëI+I…4kÆY¡k̨\Ãc:Q¡8 NX¸6^†è“gË%,—+\.Û3%æw~få· +ÑUBšîhLThÀ…9À3£ ’"ÙDyt‚{ó,%ÂbÈ°ÿp–G‡×;V@Ûa±7@\xç9¤eì&ˆìñÀšÛÊÒ*§pøy'x©{\­6è Ç/„*~e§œÈ)‡"¹iøȇJ*ø=þÃX[NÓß®£[--ƒë‡ßF¹ëV+6B^á›áJò¸|‚ÍǛ3^4Í£m jyý®l½ ¯¤0È¢ å^œü‘¢Â•¥S Oõ{øBau,—#—º”Qˆ ¬½LÃûÐ5ñÂ\¯˜5nùtà'D(cpZ>/XObject<<>>>>>>endobj +1590 0 obj<>stream +x•W]oI|ϯhù%A²;NÂË)„p‡. ˜CˆEh¼;kÞÝ13³qüï¯z>֎tïLwWWWõþ<ÓÆtqB§ÊëƒÑpD—'Ã:»¼ÀÇü3’ʃWӃã7g4ӴĉÉåM ÂÓ£Mó£JÏç² ÝÐL–ÚÈCMAÂ.-mtKªô?ÖÊ.Èi²âQ’[Hj­4‡–VF–ÒÈ&—ö7ú(+™;:ÜH{8|1ýq0¢ÁÉdx†xGïðˆ?øY5…^[º:§¼R²q”ëZZjW´VApy!íÒéU߇¶ ÝV²#1«p‡&ù$jՄërÝ8\bI—|4FŸD-”AFÚlÈ®d®J…JUãcôP8Š^ ·èqõ׊z&•=JãaÀOUnðpáÐëY¯O½NG÷²i{ý½°½÷Fύ¨mÏßÒ{n¡uÑ£RW…4– ãLʆr#…“Å>\Ӆ´h^||­ªŠÈE¾@•ÎEUmRÖƾÕ® +¾ŽÖ ÜÍ%qŸp`Ε”Å~rÍ¡£Zû˜áT æˆb ™qù¸ìå {1¤/ „ϦD.¸± ª±T¶ÿgº´!´Ñ¸AÞ:ÛçøPH}=-͵>ÆùÒò©QO ZIS+k•n¬O]ƨ,ԊŒš/x£ck÷"o¨ÐOv§ú¿š„‹!0µ 3É ðÃぶ܈\4€íöÙG ÈEÕ +Sê¡UÖ¬«•^§ÀI™>‡U>žPßèF>¹0«ªñ½ß„¾cò”ڐ€²£¥sNzփpû|JeÀV§jÙóá «Æ:L åÎѶ ù³_9‘>ÑÚµ6EŸ +] Õ|£B À7¨Û’´¹XIûž)ŽÆCâvà×AªÏ´¡[FÂ]”Ê'Ï%VÅ T•ÖKäþ2ö1ùÄÞ~ù~÷îæúîûýõÍon³,ZF–Ý´^ãþ/@“,{¦üNY·wM73^§Ð33›>ل Å‹xÇ{øÀ˜òÌþD¢`+èÒRn ž•ZJh"Æfæ©?€Ã¥Šó—Y¶æ–e‰4YƁQËìEç.£ð¥;ñ}vaö~¶p®Âs#1'!ôõö #›£r˜#¬Í·®)W'ÁtOB_ŽßL¢ýûÎ‡îÚçëo~gä¶ Â P/pa$š„ð9 ø²sÖ +9 Õh«»ådGnèðw·ÿ–®·fáÁÏM°OÖU³È,AN-`@.A)”I‹¡ëª‰IýÂMxÂz¯áâÃPð¯ú¿[îóë`‚f"_b…A†œWt!ŸÔ^XÝFJ¸ü”¿c¥ÞN/¯õÞ6¸É²,y©Â¬È©Ar²£­Q/TQÀ-ìí¨=ً@ ××ÓØeö²‰<ݶÓëÖZb߀Upü¨ōŸ&n3ø¸E/n:¸/.>Ñé:N^\…•ìt«‰¦V +M"ƃÕrøþó]§F^}¸v¿ +D®íLܳàwqÈ <â$TgÛà‰6€v˜8¾ÛÝôùéóŸÞÙþ€$dyÁ„rX)éÙÊ @s£f`«˜éG/lÔ;êÀ8 ¹wÚwmWküW÷׎]àú0Y¿½ìRÒÈ ']9©øI¨hprNƒÓ« Ø[°]’¬xª‚ñ©†;üî­½)䬝³P%ñdPD·æöÔ»÷xdþ˜gÍ@ —ù’}Ó¼ +D¢ìÑѶà/_m½â³`[­ößàŠ»]ƒÁ*`}u;ô»€‰o(>MxÁÃ4îøQ‘ƒk²§c‚æ—‹yZ|Â.â«@&¨˜×“¸‰t÷¤È Ö{±ÄÛʳ‚±Àyv^\øó +kí.*ü>…ï6Û.@(9´Ž;Àp…‚L„÷0¿t‹1wþQTüžö ¿OøøÍe²… Þ/Oi2öÆðñúþÕ5ÓVž×:o¡N8xn˜¦øøàbtÅF2^a57º)Õ¼5þAz‹uô9²/ñj輕ààO wr?Ë÷ž]œ /&—a¥8»âÿºüuðÜIæ*endstream +endobj +1591 0 obj<>/XObject<>>>>>endobj +1592 0 obj<>stream +xWïOÛHýÎ_1ŠtºVJÜ$@œú–V‡T8ZrªªRE‹½ILl¯»»&Íofm'*]+Ú{çǛ7ofŒhˆ¿#šŽépBq~ð“FÓh¾å£è„&£Ã舾¹Ӆ¡Ï/¾v8œD§O_F0~4ŽŽéèdŠÏcüXM‹~0E‡ÝïßÍÞ|<¥Ñˆf 19™Ò,!¼=Ò,~5‰N"X‹èkZ$fãèzF_];¯|j +:Š†¯g0qԚŒ'~–¼úºÒ)ªœ¶´H­ó”™¥£´ oðýËûäWšJki¦áOGç3JÅV+¯“ˆf»WØûlÌ>3‡ÀbUн¦Âlȕ:N©N`ښj¹=ƒJåW=ükU®=\±½ñ8G4O£“C1û=[Ǎ†ªZžNi@)y˝ö>-–!fXâÌîðÇ©ü^ ú£¶ww+“kwwW'Õ'U$”¤.6xªö8ØKÁ¯”‡Aä»PiæE¬€»Wñz‰ p¶bíå*-<~œ„›¢Ð±0ßÅ÷Jn¥@ŠÍ*W”íh^?§83ðƒ2\¤{í7”ú,8‰hk*Z©G͉òÿÃÏsÿãÓ^⛑ÇÇÆ @ßԖÖäû‘“ÄúCê2x^0aLíjˆã@ßqñÕ#@T÷àÒÂXvG›uoÇÜÕTHlú¨{Ì.œu+Se S5æl{«³^'[TŖ ±$§Cmwgá/a,Q˜‡ª•ÿœ{¡7k®R—… DÓIȒtáíV’ೈ­×ö‰0OR‹ê»#uH¸‡B·àý•ÎJbÆ×yS“èa.ðR d}¼“&ϜiK$ (Šn.nIÿòºp°Üp9ûL,à ʀ3K¤ß§¼B÷ o66õèomóÔñ9†6ôµT}QeYÇ}¯t*ݽâæa&K{‹æÓpî^Óóž]HëÔýUSŽC0 ±È:¾[H¤uê»Ra?l°*WE¥²,TH+4V³MN:ËÈÅ6-}$pö!"¥Õ®ÊuŸî«OÇ=WÑkÍcYY@
)bEÐSï-Z Ùp±•F`êoNû”TÒ¹Œ.€Ètßm;î•÷:/…ý=ñ&1‚ +)"-bÍx +¬­ ~^šTû«©óÓ¯Ckï‘ýœ@|MÙÛô™ô!èžá©&þtŠ!uéÛzçe™¥õ0¸P^õDv¥WÊèhÃQ®“sïB»µ7e¯O½kíWÆ$üñÖ+ëéJU°Óƒz,13œèÅ.ÚÔ;-X|14èýY&b¶§ø׈Š;E•¥VùѝÖÃ!ôÞÂÛΨ¬lɪ qe-p«b í+?Œ|ƒxó\dd›·[,§÷Òb2ºQ…΄ئ܂³ypd®†fåù›•#Úd.þ 3-K‹uSÛfñÁhX^4cû G a¬D†E }«›ƒ‡§Ó"]V6lNÐå +o£C¶˜|5•‚þtQUk읔æÌåõ<¤ËÎ9Z‰(äÂo9Ë ²CMö¨“gjT|Ün^jÁ‡ “t qDø ŽƒÈ$¬>ÈX|¡X•‚d+á‘TmÞ +j]à® + KX{¡©\ ´q?ïu û«"ã¬ç4:/õ[z+nk@,v ñ,•sc‡Ç[ízuÓ ššÂÝ×ï¿|»™]þsù_S EÛw¯vјnzKi©$XÕÌ"B‡ØëY{Æv]%lÓ0¢M˜‚S†µ`“²@fÌ8®#êŒ<Ú͟"–”>‘…Ê1w?_s†û«-úG-áªÆ¸6)@’y’ÌA6'åCÓ±ÌȒ‚…Ææ2_­þYaQÁj¶í†Qè`gԁǖ²óô;Š7˽ÌŒ- ‡ÛS¬±&¤î9: Ðps¡ro5D#óÀm7ä®l'°9Ïì9 ›Áúž¬P¬oûzS[æÈØD©Çîò¶ÛŽO›kK¸½MžÜÞnEº9œ/m3PA”†Ëˆ:c”•²ù‡›ÔV” ‹¯ r‘5¾dé:,ٌJ+â`ìþlaŶ¢Wq°ƒL,{wí ðÕ[O-/äa0bq{:ŽDáv ùíÕ»º1DÌ2ƒd jbÏ:nC“«ÊÒX”ýŠŠä¾ùxRßtG\°Oirˆ[ø!_>oϯޝó½âç؅‰±ÛávÆÝÄÞ͉ÁtxÊï‡òðüݓßËÂy[ÉUW“Ûú‚‰ùń¡õ/Bm//l÷hzM''¸½Ãæ±ÜÇ?Ì>ü¡ßbÚendstream +endobj +1593 0 obj<>/XObject<>>>>>endobj +1594 0 obj<>stream +x}WkSãÊýίè¢* [……%ãTå{½7!¹<.˜âCœÚK#<iF;3Â8¿>§G²0‚»û*¯‘¦»Ï9}ºçÇALCüŽišÐhBiyðƒâi”4ßò‡8šÑd<Š†üÓËxBsC¿úØé(‰âö±qóØïf“è”NgS|Nð×JÊ?}4ä€ïÂ|]œüzFqL‹9MfSZd„S‡CZ¤G“h%Ñ4¢ûµ°J?Ñ­5¹*¤£•ô)5=žI茮ôhì³óÂ+£é4~Yü³ÇíÙI%ØÉY4K8ÈÑ­ñR{%ŠbK¦ö™ð2#cIéÔX+SO%¾²x€rSfãšO»lñ,ŽÏø°Kòk¥Ÿù_GøƒSiežjwL«ÚÓZ¼HÒÆS& Éq”hyt§Rԕ…ê*¹üÂ]¦Óh6JøðÅZâÅ\ԅ§Â<¡¼Jø5‡Yâ×_®ñ÷!ê#°QHAx/Ëʓ7”Z‰rHP¦¸8c·mHƒxRås¢\‰“öEÚå²Æ-JÝÎïIå´55¹J¦*ߢT¹Ÿpô“i£2¿s½è~@ºZŒÆókãüû”,ãqËJhÔÐÄNzª+j½ ØîÁž+Ž“•°ÜQÜ$ÑübÑÚP÷ßƧ”~£µUb/¹®°ÕÇîo8IÆ '>Za½8­(çjø!C*)à3¡Ó2³Ñ…›¦ÉÙÚèp$|Z‰U#ÒÌp:ƒw ÁªJy–HpÔ²rHØä¦Fñ~-<Îìj%ZÂ2€Xë£Mٛ=K9Ü´W;ûA®,Xã€Í±Ê3é©TÓôüLaRØðþim5d‚Wyj´·‚5´AËôÂn„ô=3Ò}'<«]ŽôOÚ:°ÞøoD†ÆGŽIÒN”Ñxçӓè,¢ùÍÕÅåõ÷_n®w7¿EþÕÓ9A€ Ä1 sS +dø ghŠ6±dØxÃ_éž ˜¿ý8ºFq4L&l!·Æ9ÅÞìæÖU;ªš7w#*ÐÚͨÏ&QURgêփ6²êIé0EíÑÉ@|µ¥™µ¦ÒBÚÊÖ“R÷¢ RH§Eá%Ƴ‡1;t…fÃõÛ í“_'íèì°Kºw}³øFçïÓ?âaW±%¾‡­ö0$¤„ò ÔFHÅø•`ÞhÈ7L+•R)ñ,|N\*Oþ4¬ +½´ƒ²S¡a,™´€ﯾRh½ïèCZQ¨ñöX¾”Fؗ6Ü®èÌí ÖW/hjÊJh…6æUf%já)oÕ ê æâ°Ö„6g*~»¸ÞML¬\1Ë՛ÔÑ~Š–Õ©Ìzá®Tj3¹tèlÄrÈÑN`\aeaßàHÜâ=Ä-.8I¬eR¶‚BߛÊ|Z/ìÚlZ 1¾pOP °ÉÀÃ4/^í†ò†6¶¼a@bÞ¼£®K„\º–%à3Hù£Ç —²OÏÅUìÿ´!³\qr°À¢%è‰-†¡ªà.fœ*Lr`Å&¸F7Öð¿qaSK )ÐÁЈP¶ò7Ô»ÝO³¢€€ýy:6ye°¡'n¦m§ÒÛîk†‚¦Ð§ÜûÌz¯e2éR´c¨BT|]Qÿk®8Jƒ\QøºÃ1ªœ‚JqÖòˆ«‘?j8HŒ÷ƒ†íυ,a$Ð\¯aŒ,´ŒzÑßÐFŽ/Ê]â¨^¢šŸÖÂû ® UU´V Üs¿áÍ¥À°L^¥zQ³-®xƒïe¼Á`Sá­zea-Jœ+p•<Ê0±Žè ˆÔóÞ ÿ<¯ªí…nÖN¥x‚ìl„Kh KŘ½¿¸úzÁWÎ?ø687iÍõwSc°{a0†K`s[åў«§Ë!Ss û°Ð=Û÷9ÚÇkE÷Ý” a?€´î^ËXœNO£éd†ë0rÇüÕ·ÅÁïÿ)n(endstream +endobj +1595 0 obj<>/XObject<<>>>>>>endobj +1596 0 obj<>stream +xWÁnÛ8½û+æ²ØpœÄIœ4‡’4r¨ÛMTt¡$*f#Š*IÙÕßïR²UmEǒ(Î̛÷'?ggtŠŸ3ºZÒùŠr=;]àòüŸ×Wø\â×J*gwÉìä㝝QRâ•Õõ%aùé)%ù‘ÜJÛùª_Èo„'Q÷WZtTKY7ôZ›ÿUµ—VäžvÊo°^"„ódÊðÝuÎK½x—ü˜Òñrµ¸@¤£$¬zQÎێJUIG¹¨)“T™\x05G¥oª.ÌÎÑ:!-rd$)ëÈ4²æäåFkQÔX£N©u žÝpē¨¿¯qûþ&M¿=®×Išþ @Q¡,ýõR~2Æÿ•¦ñâ|™¦¹©KõòF!²Þ*kj-kO[a•È*ùÛ.¸[µr¨Ðd^ Ž‚ ùã\§™Ê|c~‹ñF^è‰ÚJj„õnh‡•=衯ikG;ÔÑJà_ +­*%lì¦[¸£C‹ªJ7TÈR´•ŸSl}v¾Xrs)ýoâ¹Ð¡%Næ­U¾›ÒàM¦ÂhàA#çôIåÖð>cô Ño 2±.Ô¦rՀ2à!ˆ×T +üQ`OÏ¿çÛO“ô˜#Ï÷_Ÿ“ï}aÎô<¯*0ê°=3Û2}ð¢`ªüt«ŽT®#$¿×€˜%IÐtZ'Óý͒"€¤A mî[ ^ôQ °‘6…¬bŠNthö;FzRª“v«rˆK·P¤hQHÈhá«v²Úâa&KûÜŽF‚R#­VÎ1–%ÔP8d$jñ"-“¦0´ƒILBcÿÀÚ@­Â¼ÊHÞ_‘,‹L8@\¡'ðàë@°%nEþ.(Ù5æöÐéáQè Å0Ij±íßn’ܾŒØ¾RI;§Ñh³²2÷Ævsz±¦mHKiÕ¸9ˆï^½iØmXóHn³š÷À:&oßéôhgì«ó‘£µIp¹UÒ¦ïP,nš)–íŽY=Ô<‚ë9¬ŸTÍ ŒDñ!êë¹×à@ðò ïƶmX÷ >»+Ú $ÛgÇÝ^N&xr–¼Z™YT¶(cÈü$ª.‹WŸãý¾ $¦¦bCè+œ"› ©¿s<€áL¡á<¥GûjosðßѧÈW໯—}¯‚ A \Ø2©m¤–¨e᥃¦zÓ Çá1S$ž¼ž©…\°ldí v¤Œó•‰Ê€V§Ñáá5d†–9`ú³ÅùŠ¤™ÿ¬QÏ#«ªîõŽÍ£Ú‚³/Ò¥ïÞÂôYèL—°ìÀ>P´9vFl#Áã´â\ùœ.Z݄¤Ç„î¨ÝÓY#œÛTµð7(mZÖÃúþéû—äñózá,€_ÕøÄòc=څûtÒ´Ù N“Lœ4» àô²˜FÀU˜[L_+k±všà¬ –Ñ[G)òXUäøJ¬ +åÕÆóI(…SpøÀ”¥tSÉpÆ3ÃÆ' ÆèQãnŠîWÉ\Æ7î¿¿ŒF2\cÖùŸ$z1ô'ú“R{½ï=®wžÐ<–Êp¾…d“ ÈgjX(IÉ`فD€øˆ*NüÛJô ŒÃIyð±Ïëúb•pÄ>¹û! ­~ùpJÒ£gFÃb• TȃOÓñŽ“Zãqì©B³p`:¼ù+lû­8w!N¿ÃxEÁɱ ¸\ýgsÅÁJ†ù!d; Yt’ô¾°ÉJò—`P’˜cpß%…UaaU–ZpòñºŸoÏV˜ï¯ÏérÕaØàî°›hàÈ[æn§s<¼p|uúž‡¶Õâz±\ƒ!·µQ‡uK IwCöž§n¤ùd0&âk0b ó!ï{qu±¸Z]ã +ìy¹ä[ÉìßÙê:zendstream +endobj +1597 0 obj<>/XObject<<>>>>/Annots 737 0 R>>endobj +1598 0 obj<>stream +xW]oÚJ}çWŒÔ—TR©ªòÑÜö¡InAʕ’<,ö{c{ï:”Ïì®Á8éUUµª÷kfΜ93¼tÔǟM†t2¦8ëô£>Vvÿüü«38™F#:L£>e4FÓð•ÒŒÏÓéx i4àÿCü-%-ÝÆàlßۘðHëÂżs|}FÃ>͗ði<™Òº\‹Âʒ&}Ó²šÎcK  ?W]éL¨üãüßNŸzÃn]êܖ:MqOå8yW•2ÝÒLd A»Í¤q•]L¼ ½“âÂ3“hÑ])KùR)£¬¤ŸR$*_±±ãë áÆp‚€qãB.5`ØêŠbø òJw‡=±ke(öu©H¥0’2ñ,ÉÀCl ëî +|Ä:Ã[V,RIe×üàR­ªöI„p'ÞSÙÝÕ%#“H—j!oRú¸{Øí}»½ŸßFÞýÀn“h9XW¥®òä·aÞ³£E÷˜–_è{ØÊD¼VyˆŠs$ȟÈ͉IõJç祒ÆZ–:£.ŸVé̵ܸ¼Wy¢7†næÁpD÷k™ËW¼'¨2þY¾Êv¨qü~ÿr8Òý#›ËNð­–IÏ®F€ð?Ê젅 +¯%^+ݓl?™t' +a l$»²Û§„9 Ë#šÃ•×ݱ´FEª¤ñ,Β^"FÐ#sXZ]ٝ¥.a‡ä/‘anµHEŒá¨ÿfO ¥^*œP¦³± qâqòG—Uš’‹ –>^Žè«ŽÓMgž ¦²ÅÇ)`3ï6º ”¨c*·|vþÔ‹y BU$8ÎEa7šžAüM+v˜qõÀ†)ç}¢s”²ÊD¹}{±ÿãjåñ£Ë£ƒfÆe} 8 Jz<ºà>Ÿ\†\ýP%P +`e°„źز߼Ԉ²|Çä°OkÔ2 ½ÈW­™T¤’uÍÁê÷™ŽHi`CÌ4sW뇒„Ó +EÈá4òùÛ}µ”4«®Q8ëéÛ ïØ’ò*4)¾å`[ªàj­‚ÐÒX@€=‘瘥38ÎÎå¨ +ñ*TÊ2ѕ×IF¡¯U¨Ð¼†Õ!\Î +´1L›†²ÔýæIƒöèu l&Рeu.Õ«÷µ~ɉ]p¾Mö™ÊQ«P4D_†¶¥—K+ØØ¢YZ”Þµ>$‘Y3ÑDj4”aË@"|k4v×éñ‰Ñ/qFš Ôu ¡éCàÖM‘f{””L6N¢óɄDn 8jÖb §ëéINtŒüæöÿæ‚®4ý—J¤jÉÝèÞ_WBå$|ñzgLú +¶¾5 ¼æ!iŽkµž•r¥œ°2D7Ò^|¿‘Ï<3³…–»úa{ˆùÊý÷› /á v °HG©EuA“õʘjô) +1íÞå¯vÁGË`•+Ì6;Ç\÷ N,Þu¿íÎñ¬@ ¯lhó\ö¥tÎ&5(-{‡¼F‡*&a–d; +HÀ4åBJt˜)ò­_Ô ‘Å̂9h¯º¨Å.-€ñCÅ¥6zi[Ö¯¼)ž9˜L~0q“3ünjG(¼à`(耵áñ©æ·?¤‰;;¾žî¸/ÿðçA£[óXò'? F“Q4Oñ›¢qzÂ.|wþîü™ôB’endstream +endobj +1599 0 obj<>/XObject<<>>>>>>endobj +1600 0 obj<>stream xWËnÛH¼û+ØCÀ¢õ²$çø‘ >¬“…µðeDŽ$ÆäŒÂYÖ~ýV͐2MÛ»À"0"i†ý¨®®nþ:Hÿ2Êh"iyÔOúr:ë'CϦø<Ä_¥eÆg§ÉøµƒáÙøåó£“/g2Ë| '“>dý¾ÌÓ÷Ód” ùjw’YíDÉ[Ý;¯|n,s“IîÎJ•I­ñ•- ]}ú0ÿ Ãc ¢áÞp ÃïÏåf.»– <å׺1p{þûÅ9~P^vÊÀ°’¦ª­Ó•x+ -j‹ŒÏSåu&kåø{ˆäɽ÷¥7!ax}ŠK–¶’à%‘ksòëÜÉb/¹YÁãö×ßnŨR˯­®öá)Z_Uv»‰ÁÈoƒ”v:î”sÛ`…<´J×b—!ËŸsƒ“ÜËJ#½…JïeYÙ2ÓWÎSæýRQ;Uÿ»Ð(ìʚŽçJÆó.‘¹c½Ø6âtº­r¿—µ-`~aý:økׁƙ¡Ó…N ìÝûù·«oCéÏ®.%][§Í݇ŽßW‚mUI"0Q%r¾ô,%KL›í`9‹žXîwNÒJg,µ*âa™X“ŽoF¾䰔Ý} h÷EDÇ¢Ü= L¨Í¦²ªHh«ÍÿÞh€æeHüa"?@5փ&¿#£Qö»y[? = 9ŒˆÒµ2+-Ì  õ6ñµæ/xY£MU» %<оù@7÷6zu¾Áޚ® Âvˆà¿¦¤°=þbª¥r¬Rj7ûÚ5“avêÇ6S)h]§p©VnýVÅþYç6ó^ƒGƒ0!O•nP™z£qS™q"—èƒ[U.TP¹@¡1¯¢ ]dˆlÀ͛yÅ°mÎ×j˜LXú9úUt”¸a2 $Të½—Þol@£=¾¤ÜL^m‡†­Üfu¿ F³dv6’É$¬Áam”ï•ý sدR¼Ø`É£eÆÕLðþ9IoÚ?kÖæÿý¾8žŽ“éd†e¸Ïèàóü菣®Ö¾Ùendstream +Z”¶Øæá1̸çí gÈh8-ÑÆnWë—ï8«o‡ÀTšbœ„÷’ðÚp("ßPXÌ ÿÌr ßVÍ®ñœ2§ÃdÆmàMÊL²@¾D9,2mÄ3HÐA ÊE]î'Jý{y;É> $Të½—Þol@£=¾¤ÜL^m‡†­Üfu¿ F³dv6’É$¬Áam”ï•ý sدR¼Ø`É£eÆÕLðþ9IoÚ?kÖæÿý¾8žŽ“éd†e¸ŸŽéàóü菣®¯¾Õendstream endobj -1594 0 obj<>/XObject<<>>>>>>endobj -1595 0 obj<>stream +1601 0 obj<>/XObject<<>>>>>>endobj +1602 0 obj<>stream x•V]oã6|÷¯X Éb¥8¶óp(ò‰hÓ´6PMQPeñN"’Šëûõ7KINâó(‚ Nø±³³3Ã<bšà+¦yB§3ÊêÑ$šÐYG š.æøœàÛJ*ÂÂé,Ư’ù,Jö.W£·SŠcZ|ûl1§UN¨0™Ð*;¾Ð[ÒÒWfm4¹R L)yC©DͦR™ð2§Âšš|)éáúŠWùãåõUD«R9ʄæý¹Ñ’j¡[QUÛw«O£ ãS€ZåǛRjù,-¡”B©ÌªÆ;â‚Y)ôZæ'd,)ÿæ2ÑzS ¸u×…-m”/W§pn“ïUs[•Öhõ‡ŽxùÃmÖó0žG‹˜’Y4edÉlN݆¨q²ˆâsŸ%˜¶Ü*ÍN†¶_qT˜Vç”ÙûÙùPÒ »œô^éuWnBç<°”L;,|Áښ¶¡äDŠ¡¯I$`¯΃†¤Íá až¶Ò½m‹Í¸'\ÐÿZW&Õßc'3¦ŠL10eFÃï/îÅg …t £1+×* â¿jQKZ^üryñCœ ð ƒûãî~ 2,ÑiC5i%kb îßEØ"è^úË»_—ÔÑŠùRx^¬¥Ð*Ù+”Ü„’1„Ú@u8„fƒ`³RiÉ0$5Â>“{ô-×GT›½j^.·k¯nÏAJ›Re%·$¨Õ꩕»&| ·2pŸÁÜøƒUµ°[ºî~e´·¦ªÀV7ÎsŠ!Þ Ó¸ÓÎ<:‹âˆ~2‘î^Ü.Ü9… UÉ»[½³(8ŽïÿVÅÂA¦ÙIí”WÏ ìο²B°ÿÎ睫C”pC #˜½¹ =¼Ê†¨`K-(8r˜üllÞÇ ÷z}Û ˜ï``½Î¨å¾"†`ƒCŽ)¼Ô\]KŒÜaì!8.:î!‚i<<ŠF*¶ª—ÿú—žäS«žE%µw'œuuë¤Îì¶áÌ5—ÌÝFÙo8c±¦§7‚ƒ‘ƒ…/`v=ÂÓßIoîGA|(ÓzU)7szFÝNã=Yóvçz={+´kŒõQø›òNVÅá=&”Y&Oï9-Þ÷7‡£EŸæ¦õ,رÃLXŒÎo¹‡@ìýo7$]ÁäwìÏïB¼{;~¾¾xøž˜Y§ê¦’P—ÛNþy³ŒhɉÌÍÓª\4”™{ۆ p”*ôèwpq¥>èN‚Z7 - Dåö5YÀÞ°®• Äb=l¶’/ 4Uûª`é„ÇTK™‡r(£jmrUð“Ífòp*^¤ÂÁ­Ç÷ÆÖg„;ê!­Ð†tB®ç,àe‰š,k-žØâñ]Oü¢QãþOYœÒ4 }H>d˜ù„G–µ5ÄPñ(ÇÃöñ|‚0?þßÑ5O£ùl§§Ï&|éÍjôÛè+ÛÙòIendstream -endobj -1596 0 obj<>/XObject<<>>>>>>endobj -1597 0 obj<>stream -x•VÛn7|÷Wø¥Jà¬u³$(PÇV ‰ÝÚ + Dåö5YÀÞ°®• Äb=l¶’/ 4Uûª`é„ÇTK™‡r(£jmrUð“Ífòp*^¤ÂÁ­Ç÷ÆÖg„;ê!­Ð†tB®ç,àe‰š,k-žØâñ]Oü¢QãþOYœÒ4 }H>d˜ù„G–µ5ÄPñ(ÇÃöñ|‚0?þßÑ5O£ùl§§ÏÎøқÕè·ÑWÜ òNendstream +endobj +1603 0 obj<>/XObject<<>>>>>>endobj +1604 0 obj<>stream +x•U]OãF}ϯ¸R¤fˆ'1•ö!¬Á–mH[­„Tã±==“õ)ÿ¾çŽm4¬Z +±ï܏sÎ=ómàÑ?Í}šÌh[ ÆbLSß„süïã¯T”¸ˆÙ©þ$ÁÛ—›ÁùÇ òÇ´IPd6i +Œñd;¼Êä¾V%…‚îeI’IZ,ï)¶…Ô† +UDª<Ûü…4y^›fä‡ÂG¢á&ÓáWRi›4£´Ñ±¢ÚR¥êZ›”š}—x‚ºÎh§Jd´8Óԙ2µÞÊZ[C2E½ªFª?´‰í¡ò¹Ç›å•àêcù3Œ‡š_´ÚªŠžlCF©˜"•X Ãß#•jó3Ç{"˜ø83!>qê9-°@ÞJ•ªt©GÈíÍÄx6å¸ÊÁÀÝڒ2f]Ô« 4NŸ¯7ÇYbõ¨r»/0å:*e©ÑâÃPabÀ˃É<§¤´ñaÙGE•mJ•š +i/·;™ª‡3ADeJ±Ìy×ä¤ýXࠑÔؚ¶Üõ8gáJw{en—‹/t²Ew†â͙ÙQÛdÚà +OÐuÛ>óÉ)Kõ­Ñ%ïÚ­ÐREZš+eµ×;ÓE‰ƒLz`8mbóܸHŸ÷4“WFÓê”qœØ½–b¿7—ÿçZ«ø“¬¿7Wh°…’¦Õf•Ù&)“ ZBJVõé\ÓÌ DâVáaȀî´ÑõÃÙéë‹ãrmšºíz/ܑøHm%K—Ebi¶¶Øk$H[i¶‚l“ôZ8®ì@Ʊv-‚;æ ›X–ñ+u)ó¨KkxzMö»û‹­aðÀi–ça# ÐN?j¸Ž ùÔ®<ª§Êå(È& ]-ý7JƺN‚Ö/B1tåU­½KæuÂu}ïQÇUãN´kFÏíæ¶s/Œc°­]²)‡Ð֚D§ NÛ=#×ÓÙíòhĦ8b |X^¯ßâµH؝™­²1`«ÏUÈÀç¬Lm¶y«ó6@d¤kdT)kØ žÖì­¬|Í5βXÏ?Žé¢wõ±b• ”>-~_ýy³¾œ’×·=| _E8{q¯ï·÷€ÍÄVUæGÇØË1b;úQÍ1 äÄ …¼!y,÷Çǂn­Ý1ÝÀ¹…3Yjî[í¶ ì1{r"Jôßèæ-Èæ®Ý(ô®ô|%6U#sA_ÁCÑàŽrnÝí´cùè]“Žg\‹†ª"Üâ»H4#ó‚>Ð×»ßÖâfµ¾\­ïîÅzµ¸ýÜÊ4|qëú"`£ŽÿϽÌ1Ÿ…¸üqn:㤫Íà×Á?>»•¸endstream +endobj +1605 0 obj<>/XObject<<>>>>>>endobj +1606 0 obj<>stream +x…Vmo"7þž_1âK¹SØ°¼ßI•J.œ]óÒÀ©:5ý`v 8ìÚ{¶7Uýï}Æ»B¸–ˆhYÛ3ó<3󌿟ÅÔÆ_LÃu”ägí¨Mý~õ¨7⹃¯•´ n?O,ÄÃîé…Ñ(긜]|nÓš-à{0ÂCJðÛnÓ,i9™”Vù-ýLã«é»ÙÓY›Zq;a–¥Nì¶ðTç6Ʀû¶Òñ¾‹Ï=ŠãÊn«3àýךá$9‘ÏõOžjY“)=mMiIÀ†“öYZ*ÒËꭕ"ËI‹\žãµ$¿’•~í£ypðµ÷&™Â+£Iéj`¹|%F/ŽN~ܨéiuzÈE~&#ðh-í\Zã¢*úצ@ZEÁ7SRjè½6þ=i)Sdd(tJ&KÁ@’)©½£Ê2šK%€k¯áù¤#µ ÆAŠR“ ¥çìœóTÙ_™r¹"åic˜u„ ô–VÂæÁÈ2³q „¼ÁëgI™IDÆd[Gˆô1ë8É."º&ùW!—‚ÿ!¸¹yY9ðlå÷RYÄZå F’¬„^¢ ²² ÚHZJ„ÞµH¼B)&ÞØ-\{¹´‚³U¼~ xX—V·ÎÉ(êE4•¾,ª’¹>¹XÛyÿDf9Ã(Ôä ‘çJ«`¹¸ƒ'ZKûó¤Ü«áPîÏëûî úv÷õ!ú2y¸œ<ÜM£‡Éø×tÈß'v>ë4áþùA51­¦ÿ©˜xÓd3éêVªàÐ|‹¤q' j¬ÔÓ×éäáv|3ù%Ԑ ¬-Éq3†”rû¾|¤%‘ên|]\0ÏÙÿ]é«Æ—«O!GLñ ê–Û»Ùä#1ÑUç%"D5—E!- Âñn‘9Ca§Ô¯‚bÝõ kP ˆÁÕíÕjÖÈ< +Šƒ¹¾‡¤V:GfQ•ÇEc=;XJŽ€Ô… ¤;õÑ\ŽÛ¢ŠFÁåðّ–~® æØ¿ƒ'zl*…_+ã|XÝà ©n #ßÂ{‘¬dúøŽPuHƒDÛJ«QŒÏ2۞ô¸0Ü·h¯: ßc6gˆI +§¸.6Ù2í@)·;÷_1hµ\¡ËR‡j Äñ;ðèCQp‘0ÊÓÃø2…Ó‡,A9BFÀ ё{XÖA…‚âñ"Š¶R"i­±J/8pPžPÚ! “Øá ÒVY:ÀÛé4J½(Œ ®¤–-UpÜZ企8s^ÔG7~î2aF#=¬åozòÌ¡nØõ¿¬/p ¦¡÷¥çJ§éé[?¢O@é«ÒKL^”•\&¦Ôžy=sk…£uƒŽ¤z…±±ÁH—„î˕s<뾙†Á\XõÌ^^ø±YºDnÉãQ¤¶Ôµ¾ `d9 aÎH Tã’/­.ßb09GQ?Š#º7ð;ÏP˜œÕú¾0x̨{ÚlàʱOÏ ÆŒ™b"4^ãŅi?î*;•Á©eç›VæSµÔG wðp +xcmþ± 9ĦL†6ÌàÏyàç æeÂþ[¬Éµîó›©9‡Á•âx†¤Öä.Á£k bÚ£. b\¸Òæt|s9¦{kžx´^™¤ÌÑzañ÷@lo Û|Sÿ7ôzÃ^4ŒlïÙÊdvöÛÙ¿ùË:xendstream +endobj +1607 0 obj<>/XObject<<>>>>>>endobj +1608 0 obj<>stream +x}”_oÚ0Åßùçml¤OU[:ií6‘iš4 ™Ä!.ÁÎü§Œo¿ë: ÓˆPÅ÷ÞsÏïÚ¿ÆtEH'˜&(¶ƒ1#‰6Aœ¥ô<¡¿¨º³8¢×|ˆ§W,¾üp›>|¼B”"¯¨H’EÈKPñy1ÌX ë°×ÞÀ +ó,ÂÍùömþD¡1"Š¡£IÊ +~Vàø.U©w“¨h¤PÎìû Ù!h%¼x‡ŸôëÓÓ½æFœç2üж־)±hôz-JH…t56¬„Ѷ{ÓޅhÒMÉ$Ò¤„(¥ZÃil”Þ‘À–[»Ó¦døTÁÕҢⲱô(ŒW—J7$œ,6ÂÙWÚæ² aMýðÃ*Tڄt×®1×ÂB^J«ù³WªÐ½Æ}+ +ÌۻÑÃ|†ë¾â_P£iL0©³Œ¥=¡Ð^g…Ý®zÃÏUžêp.øvŏP‰N°‡|%Oé¡cØá;P§n^Gy꾔¤FÊ,8ð@Ÿ¬´DÞóæ=VÞÁ¶¢) ¿FèÖIÝÉ(j­)î…/÷qàaEWât€O|ɵ°NlµõDµ¨¹Z„r+Q6ÜQ¯Çwh§eZ´¨r´æw4yÖñ†ä“W…܉N¼‘ëڝÃ섺Il7Ù ¤YPo¨o!¶–Ç^Ùҗmçè²)y˖®hÃÀ“Ò ÷³˜?.úÉðÀ÷´5*ù»ÛöŒ’:hy±±‡Ê;1Jèɦ˜Ì2–…±ZÜ<ÜÞà‹ÑO¢p4¹…ß’ëç!íè0JÇWýþ÷ ˆÓ˜¥IFÇåže!Å}>ø:ø€yFendstream +endobj +1609 0 obj<>/XObject<<>>>>/Annots 748 0 R>>endobj +1610 0 obj<>stream +x­WaoÛ6ýî_qÀ0ÀÕ²e;°iÓ Ðt«½ò´DÛl%Ñ%©¸þ÷{GR±"·X šRäßݽ{Ç~¤4Ÿ”æcšÌ(¯£d„/½ûy¦‹ä’¦“Ë$£ŠÒſê¤å`‘ñ2'#ޜL“I\ñfwÝ,cGþ,ïÎÓdJY6 ¦ãi²ˆ+oÚYÇYww +ˆ@<ƒCì^.’4®¼mg]ÑØ_ÎúÝ4cÛñ<³í,c[¿ò»5vódÞÝí¬áyÄ>N¶/Wƒ7 |¦ÕYÍ/iUødâK>|µ{' -ZŠj-HXt·ÊHz¯êñG*t%Týlõa0¢‹qóa%«µ4ü‰}§óàûb’ájl#ò„~ѪVõ–D wtíÐA¹]¼h’Œ‚ƒŒÒ4:@Ä3vpemSI:ê†vâAQ²Ò<°÷¤Ò½¼}»¤Zà¼ÞPp öx—Ãåëw¤O¯QAÂHúpBøì݊O#Ðtb ÑS.ÊR}÷×oßôœ?§ÃNå;Àæ<þzýêÂ÷œy¤î i-òÍ>V‚r];£ÇØXŸ”nJ쿼~õŔ„ËSD89îCJâ•ãz ¥ºQƺòøÜ«j¬#Y(Ç+Ó¿ÛVëØ7÷Ãéý³¾ß*%9MN– ¼§"Ü؝nʂj} ÆÊ6VæQîØÇ2×[I÷C”SÅý3#Ü$ZJ€@Áš~êc(U-IÕäv’þږz-Ê¿ù¸Sºfrù Ú(¬‘¢ø1x™vXSsº¨ÓC/nZ¾ÑbOm‡lÀW·{¾{YÜTÀ£6'SLÙ¶cMSû¦»fô͵2@¯Í‘ïéÚH»ç°ʳÞÉώòHä!<%ï ÍÇ­Ñ ãËÞ¿&«ã˜Îڊ…'&}åv?\¦¶ïùß±UЋSw÷9ò'4ÅÓT”VuaÛ½0P(a?`Yçæ¸w8`-0žÅJÇTvÝs”gÕ±`éڀžžJ ´AšD µS¹pܽj1>H(*ÝæFÕÐ%4Øh_éBmŽ`¾èÒÐ +èÿ\¿3÷\E&gБ4þîéI§°«D‡så|=Œª„9züªúE8(H†pNV¨²Éú(rǝÞËp/½¾ +íøó¾.îø‘‚Žö. óŒÞŸx„rR%Žtµ‡a0Ƌ‘'k© ‹­Aïz\d÷,$¤Ø¢Ö6°ð”{¢Òhûv@ŸW%8\ î~æD‚¡yX®"’ ØÉêPÁ¤¯Xøøj¡Æqݙ4lÉ òöx +7äÂ7·ª—U˜¯%}],ÏùóC`p+—O¨¯è֝.@ý²Ô©AÊϨ?‚ã,¿ *ɒ¦l…OÂq7ZڄVŒ/x"‰· ºsmï\X×®èZ$€ÇúûÛ»%‰µ@FÚºr†6 +o‹ó*Å´Ÿz\lñ¤²®_½Û.cs×ø +ñ3ÅGüv&-Ôˆ ×U…WMÌn+BŒ­Ýw!ŸiTxϧxb†×0ËŲíڋßÃéu;6¯ +46óäû¶ZOKt|vµú©wÂà‹Âû5b`Uôʼné»rõt2VhÀÀPԎ_VLôIžKËúÉ(lûdc»èdyõæ±PE¤*¨Wþl¶}KˆÃvð”z‹²øñÃïÉ6!_ꏚ‘êÊpz2ÆZ2~V¹½Qxÿàí±–Ljýp8…“Ð-«¢Àm|ø›¦ -Î"h¥ª—‹ŠoÙÊȎËÎC% ÏíoþOZ¥}øgó,™Ï.¦ .ÁëÕà·Á?5¢…endstream +endobj +1611 0 obj<>/XObject<<>>>>/Annots 755 0 R>>endobj +1612 0 obj<>stream +xWÛn7}÷WLŸìöêjI.P¹¹HQ§®­6-àj—²˜ì.7$׊þ¾g†\Y^;EÄÐ^È9sæÌáì×£ ñoDó1Mf”WGÃlˆ;û?7¿¦³lN³ó‹lFæçû«’nù}šÎÎùïbŽ¿cüwšÖò`2ŸaQïÁx8ÉÆ4^L³öO‡Ø/^ñ~‡×üô¢÷ôñOçÙä`-.G4ž0³iºâ¯ñt:ÏΞ¾Y .AĈ–k2[ÌiYCZæ'¿ZSë‚ +[)Sӻ߯²WËÏX1M+NÈ:Š·ºMº5Ç·ïoþS°àE•_ýsóþõoWÇO·ÒÙxÄËâ!v¶u´«L­Jښº°ÛŒnµ¦°ÑTëpw²¸{E•ª©Q÷àñ+ â ”)½à;Ør¹1žgsí=}F6^6òÚ=h²|•²Ûš°±m z0õ=?Ë<ÄȕÊ7 ‚‚k} •ç¶­ÙZv»~÷–sBØ—™¬4€éª‹å¶BÝ[Íxœmï7²S¦ Ð(ï·Ö”c/¤‹L‚ÍmyÊo×´u&ÈL͖îNvµÕÝ«œïnËô¦èVU+E‰S#yEkSjBM˜y¯*plœÎƒu;¾»Ý˜|C¨ƒ¯V³½È[ۖ­°ÖAIgT[W©²ÜяQnŠ6h½”6WåqWjÐ8ó€J ¼FI‚ÏB±Š‹;,–ŠGè>U°Ì‚ì–¥¼Ú‘³%Ää]ã'ª\¨rÅ3UïÈ"aG-ÈÈèCෘ/z—ô’Úá¬Ôºìå „-Š²aŠ˜ýÎ]J@E:‚H À€Q9½n™\ ÍCÝ©òœJ_D—ÜåîÐ}P.Ķ‰5,”®,d.úÒ1»'/®²±(È=JØzz’‡ü‡Èì/zÂÙdÛó"£E(¼ù'iNOã!œó8„^•9Œ qÅÄ6Ú6  ¦‘ëTÃé{å +i7Yàv³ëä9¬LÉdqƒ4Mn~ÐÕKá;šº.ŒX'°EÔP*̺ÎQ|&ºÒÕ +uNšGÔޞ‰Ûh§CDØÊ|j4M[È¢²Å¾8]Ô¥d¢i9Ó¦Am™t‹>.§RšCö÷àòEÊ'}Ú áX„ø³ÒîˆßÜxÖ~JIüü]ú߶Ρö,™^¹9«$˜Q}híඐ.~Øê¹J_ҟµù&-"rrº€;¥×ÜG "qPñÕØbÁI¿VZ‰3+´ÛºƒÈ+û‡ Ž »; ,ž¦z’°ÚØ ½<{¨bʱöb¦8Bj­‹ÔÐB/O¦¥àÍs\ Ù"„î×Øó)7#]qp8àäّ7•)Uw‘- $Û¡JÂêz^åSX¯Üør4Xv @Ø$½lU x5úªÅ™åô×ÆÁÙÞÚºO;ˆ*TxÄSQËñÀy„xB‚Ы0£G~a k`pȈj{¨6ÂK7×oeô¨uÉF¡¿Á=ÙÌØâ:yÀ‹ø8…³uŠš,,™ð¤¿;yóìÕoŠZμ'Ÿ:8Ž\N—¢ ¿1pÖïaÙcðÈóÉtv*f–¡*ŠØ5½œ£ ð®Ò°2L¡9æ8ö²JäÌâ´øáVJd◸¥‚ºŸ.Æl(Ò­{1» /ÅÀk}|À†;-á”w\žïGïgþ_èf¢‚ná4‘õ8ðĺó68‘ð­ÜÌm]cºã¤päAÒ }ÔF‚1'm‹½J‹[¼' "Å+•Ç¼MžKP8þ`"âuœqWɕɝõvzÁ÷ŕNϬ +c ®h´âûÎ} Ÿþ›¿X…§´±[æPˆ•Ó [)V"PÍÁ^L‚gìvеàŸ# +µa½=R?5øD‰ã"hbÆlÄõÈx̎ѵ#1ôáHåA…5÷ø|/Éøq4¸\$føp]Lh6â“CÚíë«7¯éÚÙÏœ2oÙפí8úY·àl>¼à÷ÿç@8O³ùlÏK¬™ y«÷Ë£?Žþ`‘öËendstream +endobj +1613 0 obj<>/XObject<<>>>>/Annots 760 0 R>>endobj +1614 0 obj<>stream +x]RËnÛ0¼ë+æè1­W)¹7§NŠ›Ö|¦%Êf ’®MÚ¯ï®-B €Ð>fgvÈßA„¾YŒD¢´A(BÊ܎_߂DJB&‰ˆa‘ƉˆÆ¨Á–û!c>-âL|.MBÂ%"›Ô&¡E‰å¤6 -¢(rR¼/‚ÅcJi5)—y†¢: Q”³•«P§šæïTÙw€q菝²V9§[¨ÊaS ÓíŽêp½)ÕÑ{(¼¬¿Âjå:B«ž!'Õöð5OûT¼!æ›RT³)Þ;´úÄü̺Uv¯®4Ýó4xa*¦¬Ï¤2®ö­%ôß å‘o½Û§õe^c:ÖðŸ69´~8M{Ýxw „¿ƒîKÁˆÅ£¼97¥HYûæGñðåR½ú:Ã3 ¸¬Š^¿k›•/KºñFòjӒšÓ°'UG]]Þé=}PÿŒÓønÜð¾ómS]"MÙ|´píù®xáÍÓvA eç£ìHf"Ìä9+ß®žïWxiý«.{¬GegyŸùµ{ž…Kî_ŠXŒ¢èìŒ«ü[‡8¤'¿öV×1.ÍR‘Éœ^adÄ©‡"øüþ§è•endstream +endobj +1615 0 obj<>/XObject<<>>>>>>endobj +1616 0 obj<>stream +x+ä2T0BCs#c3…ä\.§.}7K#…4 Œ™¹…BHŠ‚žP$YÃÓÓSOÁ¿ $3?/1G!9?/-3½´(Ä× ÉjµP04„hՅè%¤ÅÄÜDÏÜÌhWHŠ†™È×®@.0B)¢endstream +endobj +1617 0 obj<>/XObject<<>>>>/Annots 805 0 R>>endobj +1618 0 obj<>stream +xZKsÛȼëWÌ!ç`šx$~¬³®²µÊJ§*•DB"b`вþ}º¿0 Š»ÙÚ*¹Zïý˜´ÿ½ŠÜÿEn»$s›ÃÕ|6ÇoÆ¿þí*Jf+·Xg³¹;¸Œÿx°w·Wn•ÌRá\g³…ŠÁfë‰ZÅ`×óÙRe\OÍ.VTµŠáôÁ­Sºd€îzÆ2p«Œœra2Éf±ŠÁ¦K3Š*»X0a v¹b0Œ`’ùl-¬b°‹õÄåh¾`¬ BÍшPϦ "l4GÔ CÂÂË­—ÔlHØ(³,2ňÈYŸÆy"i4@Χ±ç¢ÄGR1Œ¦Ù,q‹À +‹¡L‡×,A`3،iYÅ`3-¬àƒK¢xjwNœ¢ç,Éq»Y¢Ógö¢°‚és„4 ++^Å1ò)¬·»\Zù"oǐØØeL¯+vWkäYX¯9K}éLjÈ4 †ì"¥Ïõ²‹¹5F³ÕSCÞ«€™ ËU`½l²´¾‰ÐlK—òv¦,›:°ÖriÌqÆäš^”A¸„r¤bª]1 vEׄŒÍ9¹UÌò±©„ vOYÁ`A¤²‚ѐóùÄgÅ`±`W1XÌ5cŒWñÁ~¯vù܀Áb¯¨f_‚(²~\.X,@¤1ZÑèH* µ0XÁ`1(_`#QXbªY1Ø$bùFYÅ`Ó;AXÁ,Á’ÁYÁH#Š©vƒÅa¡)‹©Dˍš³«‰W‘ÍH²æL"Ø ŠHäç+`° w °‚ÁâÔ˔Ì<¯¯È +fž#øXÅ`1bê•b°¨Xª²‚™IÖ(hîã]qË0^p‰!oÀ`3‹>°‚Á.¹¡EV0¼ÂðÂî(«˜ñ®QaƒÅ)6‘ vÁcWdƒÅ ¹ +v#ègäydƒÅ5C½R ÷+õªÏ$.¼ÜD)/9‰!ˤ`°èØ ¬`°ð½XÁˆÈgrdƒ]¦ô9°‚á3.,ÈÆÈÚJIðӎÖÈHCæ2[’rsNðäö—¼ÀÁ[ôA/E)#5dJ#RTXÁ`—sXÁ̯˜Â +F0#ªY1Xtî„ w(tÔh×g)á ‚`¹”ŒG \µéIÅ`q{TQÅ`W+f8È +†K¸7Âá‘U £¦vûpT3Ã0[ÂR1jVÌà©ì*‹cgÐÄdøDáôá.±[Ab€œ@$ÑJ7r™DÞa‚ b°p=1Š*ëXÁLqÂÙ¬`°ðI ¬`$G³z¥¬]'‚¬O†«À·ˆÐ1=áåጤb¸„¶D~GÖÔÆð‹ãjj=ÕœWHÅP‹wÁ›‘z(ª˜FyïV°ÏÃBY;/ã%e¨9ÆÍ#¯9`°ö”°^ÖÞaÁbÛ®0™œ=“ »sî‘ÀúT ívlÍ)Ä"¬¼¨`ïNl² âÀ +¦Ë܍ +†SXWw”õNá`'ÀœÿƆ,Á4Ë^XÁ`íWXÁ`ñ>§‚fÁ¬û8°ŠÁÂYµ«,îJhÔ¬ãŽ7Ô~d}¸h&;=|x†$܁õáVðn`}¸ƒ¬/°‚ÇpG¶·—ñ2µFJè#½RÌpyV0ÂÅ¥}2ÊÚw˜?ÙéX,H£êˆÉäÜN Bµ{h ƒÅò?ªU Íw+˜‰˜º¤¬½ YÅ u=±ë+‹÷;ñø^`¨öñÇC¸„ª#¿#©¬Ÿ¥‘5µŽZܽÖèe"kÁ>ÖTX/ºì?yð-?2@IûÐå!S&)ŠÁÚ,¬`$iÑ¥Q12½BMü—\+“ШÀ¾¡âþAã„I¬ïHHÅtˆïAT1X«°°‚á.ziðfƒÅˆ©SŠÁâvƒZl&+,ì¨WÞIL¥-y¤™0DQñ’ásï"k9´QBž8<‘r15œ6á̃yÿ­Âî‘!$i÷LäÇ"‚7¸m˜«)oÿŒ rvçœFøaï}hÜÌ0¹Y6Ià¤N¾î.@ä‹$ œ@p{$ș/öå:±oññ×ïËÁ¡Ù#᤟Œ=È{˜5|nt +¤ŸÜA _ 9_ù´ãÁ[8ßà‘8ïçá äø†>p‚Ã'~¸é§}8àpñ½¾—#ÌÏ# 8üJ1pbžúâ/(ýë«ŽÀÇ7BƗ¢ß 8\ä±?G¹Ÿ]>îÝÝ՛\§îîȖ+w·µ?à7›WŸª®©·§MWÖÕ_ïþƒg1Á‘ö5 ÄxúÕm~¸ÏÝ.o][|/š|;5Eëº]Þ¹çúäåã®sOyÕ¹ºéQU÷¿éjwj‹™»Ûn³Ë]Ñ´®¬ ]¶î˜7+òÍÎmjh§s÷ÚN$Ø®«ÂµÇbS>”›ÁìÌ{ºOyãé»ü~_¸úÁ½¯«®¨ºÖ?‰5Ä4èE·:_<6yWVîË­ûZVÛú©uUÑ=ÕÍ·Ö=•ÝÎYðTƒ¿¥Œ^A:š¹·EµÍÏÏÜu~(ܯE[ïOL-ƒÍÝ)s¿Uå7ŸËêôÃÁÊ~{A5.[3ç=Çj3Ï_½)ºÍ›]ÝþqH¸Û_–D­êý÷Ù¦®¼âË)ÁEî²<-ÿ éô²tÕ¶ÈåfwAÃ보¾åÎö¹Cß¡{¶Väñe¥P¿ YÄ +÷w]tï>ýrëõ¾G£|Zz %Ã!âþüåç_nïnÝC¹¿øü›>ðú\rðáúÖ}®ëo§ã%K‹™ûúiòÄy âçúÉÝ7hG6çé² m]^mÝ&j[÷õ³k;ëyø ’#0ŠžLÁØÄSgá‰d³-6§¦ìž]}dÏNŒ±qÊGö¯_ò¶(û¢å$÷säwÈYEq ÍÜom¡¦®ïªšc(NÝsZn0…“¶húp–V|€¯ù·Á~îÅá¾h8ëP#Q@õȶ>ä¥íµó¸QF¬ˆIHÿÏ¡³°2Ó°Ù#ÁÈë<­"ƒ¾þôOwS4‡²åCî]Ùù¤›¾¾Ýl˜B޻Ïe?ákøSÂÌý£,žØ ¬4–hõH`&Ž£ N +¤ºI"Ê|_?š—š Üh|§¡¾C½u}H\Îûz·»¼y1¸½·80®~ª°Úw¥õý¤„ø€|þlã¶eSlººyv‹Q¦(âÿH!›‚Á‰Ùuž={^6½-žmÂÌû?ðè,TŸ§G“Û\ú“‚IÇ4b›mŸ¶Mƒƒ²p‡¼ýÆs‡¾ó¥€ËџSg9λ®)ïO¦öx„ó/{iº›Áݼýâ8°[4—Ý:(pLNóý3¬òG¬Øé8¾¨„L~° ¡÷<;€>ˆ·“ù8:ˆî îú5€-ßîÇÓbZ9n`œF ,w_ÊMS·õC‡º‡à¬UnŸÛ®8¸®)ЗÕïœãvH|ª êï@V›Éìñ tßuÝF¾ÆÿVîhê›ûÞܞŽÇºé^dͺÝ2¹héZßN2pA‡åþ=û‰¶þu¤Õ¿üû<¡T…êߝ=ö¡)±O[«þO?!kŠ^hCÊ"¹}Hî>o W†Ek6G‰x»ÝRý5öˆå„†¿—¹-#Ýx7_/yq”Îò.ºäÓ²þæ#^äì&dù·¿)á¾wžÕo$Ël…‹.È,¡Ÿî®þ~õ?î‘ +>endstream +endobj +1619 0 obj<>/XObject<<>>>>/Annots 857 0 R>>endobj +1620 0 obj<>stream +x…YÛrÛÈ|×WÌc¶*Ââò)%K±£de+]Î+DBvI€ €RåïÓ}€9¤¸›r•­vϹ_fHý~¹"WÄ.ÉÝzw!þgþëáËE¶B—/rü½sEÄ#ØºÇ w.ŠŠ 1¤Å`³8H-ÆTUÄÁz£x1#*¶l² f9+¬Á` tV5gË §æ4 "— YƒÁ œ2¬Á;GaPÖb°Yv,«vÓqBs™ËiDƒÍ=Ö`°ËˆyY՜$ÈѬYÑ<±EÆzyÖ`ø¦ôyfµ¸1 +NÅaÆ Åj6̵D9Oå‚<›-Ms–K§HXƒ¡yÁ¾1¬Áp* eÅn¶ÇD²5i¸CsžÁ;à ¶`Ö`zŦ6¬Á,>iXõ*g$MXüLxe0Øt‰†5¬Á´{Â̱%½¬ÅÌUŒ–4¬Á`áϑ]õ9Kµ¾¨,j$H3é1}æ Ö`°Yq,k0#ZÐ+¯Yí¦¡vŽÚdìN¬Úñ¬ÁЌŠÁgÏÌq@ «vãB{2f³g‚Ô®ÇԜ0^ÏÌ*ÔìYÕ¥Ú“éÿf‚D³ÁÌFÁžô¬Ê†Ñ8¾ûYzå1½¢Ãr·¥H/™ G@IwK05œPŠ]deêSX’Õ‹>‡ AÔª$ö·' '.@0áÎ-™ÏH‹â÷,h1XŒCdD-‹q€C^Ö`–œÅõ¬º+ù¯§TݕëI!Ô¢¢RH¯IZ ó‹H=k0Ø|ÉÀgVâWæH€ÏÑÈE×c:“CmƕjXƒg£^V5Dzˆ¬4YÇÒ)Q" ’` †f$¥ó¬Ál}Þ̞Õ`±•Ø-¨2<@½B-:‚3i±‹TxÁN˜ÁF˜sà v²:^Ö`¶D~ÄZ 6I4[ ´â¬Y‚M–\î0‹Û2rŠ´e4¬Á (?ÑL7¤c±·–L”úd ¦‡;Ùs2.5OZLwó#µƒE…•5î¢ÇÌì’ÅÌ?Ÿ†5,®¾#YƒÁ.Y­N¦Ïg—D¡\:>e'‚<ë+iIä d–ŽI‹™¥ŒÝ2‹F2Ý Ê%í‚áHœ"*Ž †,Dáä¬w)ÔgèBº_€¸ä!]âõ‘̤ÅTË^5¬¸c@äšòöT$. Y\l™e fáXt/k1 ÇWŠg5q1¾oՎ cwbñÁ Äèñ¬°C3^ͬÅ`ó%ðìh7_Îh.x%H4Œxå=kXƒÁ¢Ù ÙËj&±Y¥¸ø7FÔD¢Ù`x…‹yžY‹5W©aGŸ“ñõ‹­Vh6^¥\Ÿ†5,.›È²3"ö‘‘5^áˆ*x»¯ dQ}È +ÒLzL»‘•áãRAbVˆFS±”ȳÓe> T“ÈŠS,Ü!ò±I‘a1ÁR"”3CS¶ŸŠ4…ãDẦB$Ò°ƒ•ž•p9Ð2ce)ãŠb%ñžÔ\)H­â¿#\A '‹3&8ܕ“S0‹§µ,zÁ̲êQÄ IÃ]A“â S1Ÿ†5¬|Pñ¬*Æ']ù¡HQ<±x4%–5˜Šù~1²ƒÅuƒxfÍbv©3ܹ“ŸiÓ#Há#è)¢‘ªˆ«¼§‡­:Ïy•Òž“æD×IoÆì\¢ÓCºÂJ{ÎCêL81¢x—òû N9¾|Ù{ÎCpPÂob&9Á!™FNÒ"wÞ£J$?K.g'‘{~¾Cf4a3‡^4b2ðÁy98+8s∼¬GGäçّ‘QGfÊ@(DÓàbçc]œôžÀ¸›gÎCrò¤òÜ ™en«YNœÄ~æÜK¶äçÙɑQ¯fÊÀÉIω““œxå9'' G'G9~»‚[€nѕO«‹Ÿ?cš"·zÆà ßnµ‘/"C·Zÿ#nõZ¹Ûݾ«›¡w«¶ÝöÕðÓê× \¢¢1Dôd¸¯åàê~>ÿ7¼ OƁ»îªr¨›wO½Uçnºú ÿܗëßʗª§Ü©Ø©/}ÕAäÜÉtôºé‡r»…¡¶q×ÛºjÄñËÏqú¦._š¶¯ÅîÝ6C×nkªúh«:ª§ÃË c’\!˜}×>m«Ý™`$±’¬ñlï6­»u¯å[u.gØ4{¬IÙa¯ÖåޕÍFÓlœµ•îŸíN4Ã_]Óºö0욊ãcØ£ýЕÍKeΟ/÷P¾»û¶×]½ÆØ7çr´ÜÕæ­lÖÕFˎ\;·„Ҫ͔ܺPºÄ—å¾ÝÑõ÷ûÇY{<ì÷m÷±/Ñï^<\I£®K÷põC5¢ç»öðòêîÚM%ÖmàøÎBûK\ø\oٿׯeÝ|È>¾ÚµžŽ]ÞKÙnª·z­~Ôq”ÓŸÝð*M„aWõCµÇý‹§Là~©wµ‚ˆk»'¶ÏnÏQr´FïÖe£Å9M9–¿- JÙk)e4iù¹kwîîÑý¨›Mû~&H´ÁÕah/oªm%Ãےœ~}ážë­Æyì9Ì~oêçíðKûÒ6½{ª†÷ªj&CîëJ2õýëí] Oð‚1% ×|xbÇ®?vvÎ"ÿÙ㫌qyÐí[½9S…­UÙ½Tƒûޟ eÿGû>¹ë~´Ýo’·§¥Òwõºkûöy@ÛïÚ¡¢mÌÈ¡«Ü5֗ÖÜ6 >0 /w…½ôVa‹uÕzh»ÿbUtssJ"ү定θÇ÷zX¿žvm ˆû-vZ‰-Æ¿bÔk]§˜ŒÃXÕSèG¤¥“Ò}ÁíÝ퍻Ún[=g ­ðPõ‡í€ˆ×¯ã^8íè½µ»ïºmžë—C'NéŠÿ;ÿø6ƒ¹|¨~? {;Dø¡¿y„_õ2b+ú×»oã=©("‘a‡Î¨Â¨Àçõí¬7Éq” y׶oŠ§ÃƦ¯ח»§òC|øL¸o¸ßêê?‰œæ ÷iÒ×ë²<Òk‹ˆ_g òzy¹®êÛíáܽ‡IFiÉ&î]xj*ÍáQfxÎr(6-–’==»íÞ1'N/ÀißÜ¥ûqûõq¼ó>‹"˜ÃsÜÈ#¿=üëË÷ï÷Őü?»ùvwuû•2?Æ3y2ñƒS¸ào_åôxu÷éŠyûSènÚõí4wæe„ßñøe.ùh:]Hüm@‘/ð«ayJ[_]üûâu»×Ïendstream +endobj +1621 0 obj<>/XObject<<>>>>/Annots 901 0 R>>endobj +1622 0 obj<>stream +x}XÉrÛF½ó+搪$AؗSʖ#ÇUñ“Žs…HBL jÉ×ç½Ó$—«Tõøºßô6=¤ÿYÆÇ¿Àd¡‰RSm¾çã“ùÏ緋$÷|“æ)þnL‘záÖf¹Ppc‚0ó2Ej 6*fºj 6 ½@û* 6ͽH³ +oLèGÊ6à,ôr{±IHÀ2à6ŽÔlRvvÕl–û*ŒßK”o&…—"¤<£®†¤ dƒ˜²3©1Ø4€‚bf¤þ³¯=4NQ¸ú‚ )¿Â`キslÄ(¢ÍÞ¢øè© r‘ÒϜ‚ }Ö~&m_ð!)¤ö‚$…ÁF käX…ÁË0³VØO3^pBPWAÊæLs&?„qRDÒÎk:!["asfA_ê'‚›fR£ ¦U"ˆ¬„”$±äš±¸S²AÁw¤Æ`SN±bfà Œ•bm:……Ð(„$H,I2ö!$,;ž`ú˜kœ°,È)ˆŽ§TzKTŽ]ÿlv}w{ˆHw—†hÞ¦{höCÓ{͓ôïL -|‹X¾{óR pH*ô}ÿò¯OçVœ¢¦Ú÷,• çYj’˜Þ´ÐÁJN_*ÜwXQ¼@5SÙçöÌÚÏKê»æÈҚ—æ¶í›Çr}6’!ö`ôîÓÕf¸/±Òëfû|~>Æ÷Ëî®/룬gˆ1nÛª«›Ë+H Õ£®ã±B‰ïK¬eœUMf²#1™ôýåôpÙ"v È*Uҗ×x6ååáKåçøŠ¯71‘å«÷¯_ ñß(©yÓUû .ϼ/üž§ÃEæ´?m>/XObject<<>>>>>>endobj +1624 0 obj<>stream +x­VÁrÛ6½û+öèÌD”Hєì›ê&ÓÌ4nÚ¨“‹/ ‰hH€%@Ûúû¼Hš’Òi;m<™Iàa÷½Ý·øó*¦þbZ%´Ì(¯¯тÒÅm´¦t½Âïÿ[I{ÿ!YǗ~Ø^ÍßßR² íXÙjMۂ€³À›üú¾“-ŋˆ>h'­pJèãgú¢taž-iéžMûÕÒ³rå›íW š%)P®?‹z'ø Ÿ¯Â ³e%üqD›ƒÔE¿(¥8î%«(ãE[CªÚ©ý‘\)é«<Ò¾Ó¹SF‹Šj™—B+[[2ûïÅ¡:CR‹]%=@!›Êk@òŽ1BÄ/C\’°ÐS¾8È8BsӂΦùÛyŒ9Ä£MeÇh`"‹<_$ø©*’/¢VZÞñgh6KúÀ¶¦ê87RQ4Äû]«—ùÏJw/´½ÿ4ÿð é<©ÖhN‚af` bÑˆøc2ç°H®³²ðZáˆK‘Ø fr‰ù“y¦] 附A ¦ *ñ |’É:O;À֙U·v`”`Lcyyä$N+ó®UîH¦a¢NÎ͍ޫ“æQi½¬”u%­£}ù}’azyÜ}ƒZ‡C°²m8I]ÌDe´ÄYí“lú"Z®Ó ‹èO¯Fm6'ü?li½ÌStì˜baj•jYïØ^êÝeЀzU#ê'»"S'üp‘¦kMU ؓó€?[fQgt“À9Pa7áõk?ϒšÁj†ŽF¹ø’ûío*ŽQLÔüý÷º¾ïôAÏ Ã^AGÊ (FƒW*Ëdy•DšjþŽèmdÚ^séòyi¬³áм_3[EëžÒÇ$[ùþyEðG½<†oѧˆ#ûHÍÿ£­…óæå?ƂÒöðžußÒl‹‚!'lÉ!¯¸_u}N݉^\\F(S¶M4ƒS9UÊz{…WmŠ”YÇ6 ár6"yðÄD߆Ÿ† ¨ÿc` +Eqÿ\™\TL¿"ÿ+ôÇ̾u:¢Ü"£ iö8;uؙ—P…l«ÃÊðžÐ@JØKÓTÃ8Ba”c%ÛBX5ÔÛ_2uM¨SôcӚ'L3ðÄvÂp¦Fä_¥CŒVAÛðD+ù©Ø”G«ÀÊ0Ìɵ˜iA·8b˜ª;%Núž”89—vŸE“9Š›B‰Áåyv”vmòœÝ¸÷ž!ò·«þ¸¹žqÛ8©D Ûotu¤eB;…d`•Ô‡ñÖ1NpTçèŽ '… j{A#àÞt-=^§o0–rUsÚ;ì =@Ø°;B¯*<^#ÄF¶Êo| “/-.±(îÅÆ9§òZú²´‡Éë¤Eܧ±â‚1—+*ÔA9*qw8 ø¬$¬œDã¢C³áNx·–w q'wËôî&; ÷ +á8ŠÏ“²Ý·"—Twè¸R`žð0™ê³±ÖäÊSÄ?4ùÌEjq¤:£Ñø±8)Ú`ÁIéÒÖoB¯<ü‚樼ëÛR5ÀpÏRb¾éɎ@ÝôÔ·èߊl—#kÕÁߐzÃ_ŸÜ-ý0û·wÛ×ÛbºJ£U¶Ó=ód¾Û^ýzõ f}endstream +endobj +1625 0 obj<>/XObject<<>>>>>>endobj +1626 0 obj<>stream +xWÛnÛ8}ÏW ڇuX¾Ä°ÝîSÚlÛn¶u±/y¡%Êb#‘.IÅñßïR’eÅÅn/h*‘s;gΌ~^ÍhŠß3ZÍéfIiu5M¦´˜Í“9-Ö+ü<Ç_+)/æ«E²¼ôb6_¿|ñ~s5ù¸ ÙŒ69œ,×+ÚdÓ)mґ€Ya·Ê {$c)S.µÒ+£ùÒ¤…¯­Lè֓/$UÆyÚ +§R*å“,I”%iéÆ>RjªªÖ*|ߑÒѾ©¤Ú)½{³ùq5¥ñì‰m²ÑçÛ$²ÌJÇ/ú¦4NöžâvU³?I»ÒláêH°ÿ³–×$tF;©¥ O­¬„‚Ë\=ˌr$"ôqàn/¬Wi] +‹¼¼´9âºI °Ó•ÔžLŽ›ôé¾ Œª„“Ú¡þÖT$ºt+¡ÅN†k{iÝ^¦^=Édàö³A‰}«F˾叐YtŽ¨a£Ÿ|Bá|SŸ®ŒÁÞªŠÑ9EÉi(7p¬€N·‚§ƒ\p +ˆk«áó¡Û¯÷x¶/môóe²`Œþ)¤FʵCp\U87)£ƒÐLt ó¾@ý LZT.-Rˆ!oRS’ªöe(Y࡬`×0ò*_{ÕÚТ’¯8€W0þ â®)Ÿ9Ç ‰ „ ÁD€Ôq:5Ú[S–8¿=r\ƒŠm>ÜOPTËÕ®¶1Äæ¨UJ—ÐañÄw'Ѷ¡³FéÓ ’9µÜˆ3ò®N‹pób‰9ÛžLC~’Iç:ítâ,ÂCà’IиB³L,qŠŽÀ@:ùʸÂ?àã ÒU¯òP‰>óZïЄDáÚfÀœóh=tÀ¸ÍK_…:Dyo#бAáZ œn­Y*¢± +þX%}a£„H}¿»§‡ÑwæܝðbgEE­á‡7Œ5ú‘s¶ZSŒ>ˆÝEÊ¿€oiP›®}Ü…Þ ÒÊÍ6f¿¹~-ú҈[Ï8‹&ú€ãªBa™‡{ƒ¤pò¹¢]gw +uЍ umʺÆзm›çïÎÿD +†f¥½HPÔ%Íð \· +}ÏL†Jó½˜Ð8ÑåK] (Kôñ©´Cön+;ý_­¤ÈM­³@kàр÷]«çɟJ×ÏÔô!Ý’pDbÄñðuUWQ˚œisØA-øæ9ô–½ž`™A«éP(ÔV–’5Çb§ô¯<·òÇpqÆ,…,÷A3¹Ò0Ö՞XÃäg“ÀD‹ÝÅ#C>«0рCýÂÌ£F{cK]0±•˜Òœë“P¥Ø–q^M>¾¥ŸW„ñÍ,jÿlš`Ixǵ¨tQx–ʈþiÅÏyŝÒö²,ã,æSª­÷Ž`÷·s‡iN·JhxÀ3W:,Ú +C K£wî¦ Wɚ÷*Dò0_®š$Ú(ÃËni=Œä¹YðÈqW˜ºÄÔ@_Ö/°H€™G萰i 8ðœôöˆE†ƒlæšûg-J•+™ ˆÒͱ@P rp±¦ç¹´kÓ/ÓyY»¾ÉW :ÝÅz~a‚}“ö ûKÌ´ǐ¦{ŒÊ†­L«"/FH«RÞ +íb§¢ÕÌc½¿DžZލ±¼ÎÞÒxÁË-@ 仹L>®]zí u#õºYÜ;Ô"æ1ÊÝmQ•DègMT=Æî¢GÁTì ]¬OžcݓYBŸÂj1s©U#ƒe‚e ¯Ír»ÃØ ¯“›a³°ç°}eÁôã¸gˆå¼­SÞÙ1øC[±2¿mZ{¾ˆ­Mͯè2¬-×[¥;’N“5ƒÐ«êÒ+ÌÔH˶”\ï€ʉUÊÓN-èË©cÚ]3¡ûR +¬ÑV演±èგ¶ÇFMlø_^[œÀ7‰ÄØ*]˜<¿ªÅe®hç Ôiq +_NRu†‡@y_ˆp\‹ú«`ô€W³¦÷1Ý·?Àâ(@ûU$†ÛnŽÔþ«×‘Œ/Bh–3¼^G ÖΖøˆ\ßÐrÕlõßn?¿¿å•*xgҚ7¡0hù渽0^MÁœ¦1 †ÝÀ‡ø]-×Qj—+~ôÇæêï«/¹Aendstream +endobj +1627 0 obj<>/XObject<<>>>>>>endobj +1628 0 obj<>stream +xW]o7|÷¯X(uP[_v%%H Øiœl7RuGIŒOä…äYÖ¿ï,y”äkÔ6µaXº#wggwgɯG=êâ·GÃ> ([uÛ]:ëuÛ}: ñ¹?+i~t9=ê\uéMçØ1áCNXÝíÒ4;¦úç݈•¤‰´*Ãÿµòْ2£çjQYá•Ñ4W…l¿œ~9êÒ)<`h·¿~ÞïµûÏKáÜ:ÜÀâªþº(¼´î%Ií­’ŽæÆR0clN¢òK¼PY„$¬|}ÐØsßÑs‘VŽŠ\”´Vz¦t~À†[ŠÜ¬ÿ#ú…5U¹[û<Ô&/Kã¼Û[ÌÜFX¹vм8H[#Í ´Ò™¢ +éúGnžûÞá9r~¤% ©œòYǖ®Cè´ôkc¶A1Å[»uDM$’i·;(x{0PZãMfŠ´eëãÀz[f{ÿ»}Ë?™Ž§suN½^l£Ó~¨òÛ9Ø©¬“'$úÅÌ 9I+™-Э2òµRH ÞϯI”ˆ£´Jxô§ÈT¡<×¹Ðy¥ž0òëÖÊÌ›àm—Sæ©!ûƒö9¿¹ö䖦*ršIÒÆË<:®4 + N¨ÎSÀ%ï¬ðX,¹B aC{Ðôí]çú.-Æ>€q¨Qíۨ¢§^[UºîMìq®‚uøD°:S¥(˜!WJñ ô‚Œ.6´F;ÃMÆ(ì¦ÍÄ ëy-ôhI(¢~›Õ͉ÕLÐR8ú tõD®*Kc}Ð ùä¥æµ ÝÒCwÔܒ‹ò¦ôÜ +çm•ùÊÊFLŽ÷!cE0ž +±;à( +fIÌ +ɦÍÌ ¥÷ÛŽ'ô¢b֎n¤¿¼¾„æ X@êEž£œtmšš†×[óKîJgÜÇ屡IVK™+@Àz†„ä‘šýšvÞmûJ<„õ+”Ý«¨™«ŸvõÜ« +,ÕÐlÖÿN¡føü'DÒµ]€ºk‚ãû—ÀrF,U’„åILˆZ×Ìv{Q0Ô›$Ž™gRì¦cv¥;¦-“ycŒ–<µS sÁBõ03PB;jDžsÙÇÄ·¢Ôµ8‘Œ%TCôY'EÝææjâaUBås#7¥QړÚαš¼T¥qNÕRrõ +½Ù/Š´‚ÁÌ6°ñîHÒs®ÕB†7#\ˆé­Ú*ðÖ-@ŸXÃâè×KMštËNì—d¥¦õ›°$û ­Ø¹zE½a­ygçQb0ûÏÚñ¼°?nU®.G Ùõ@¹~7î®õ´<燊þ0v{“1‰Ì»•9Ë Üˆ™©¢œ†Îò›bÃÊNšëŸÃüÐf­éQXe*÷7I½?fJ S å PÝû—‘}I-n·*’Ó:¡VrÆÖùû.®à°~4S&àï“ñeMFj·°9(*Á6¦ÅJŠ˜Id ƒ¼ÖÚÇ”O™,Ãl‡È°Ãõ:ÙvC + «¢`Ûi_ÃqœT´«Lv‘›+ãŠÝaµ¶ [¡![q¾`.X‰îÞÐ SbÅþÙBÃgÐðX”ì*ˆÌ`R˜Œça¹x®šìC> ƒÔÃaw‰¦Ï€Ëq7c$-ü2bí ü²ás»˜ËՊÏN0%ñ=Ô+8rH:÷$¦ò£(*f]çÒ`†ÇGYà9Î¥«ú`Ék¸Þ¢¶Å\\¨cDº‰ +&+aŸ¹Mëã\ãSFšb~SF Ç0€Æ£b„Ä0×q|uBø¶9d§X07Ea ©x…e]lñ1®°™ïÁmÄ/.Á÷.§ýZ)Ò±ÿ“V_Ahbäæâ¦oÜ$ҞñÅÛß®oÞÝ\Œß½év¡ŸÃåJ?©ï(œÐJkƌ3ÁÞòDGãŠòMÃglø½ÔÒªŒÆµ.3>ÌÉ—£¿ùVûî¡ÇhG† Ô)iÿõçۏ¿¿ÿxûéîMoƘ:ÆùÖ/-ÒÖ›Çì÷|3 ‚R5ªgoo€»âèŒÃQTçÉÅøò‚î¬ù‚ñ 'Y8I„2gã§iÃé°ËÉãïœ{zÎæ·çíá`„{)L FüèÝô菣¿$ŐTendstream +endobj +1629 0 obj<>/XObject<<>>>>>>endobj +1630 0 obj<>stream +x•XÛrÛ8}÷WtùəŠdÉòÊÎÔìTى3«ZßÆR*ûˆEÄ$Á dýýžÆE’éªÌLbË* +@wŸ>}º¡Gcáÿ˜.Îh2¥¬> Gt6¹Àëù%¿žá×H*ü“Éð¼ÿüzqtúyDhQà¤é%Þä„SF#Zd'Ôû÷õáé¿<=|yüm4ùþMÈF•Ñ½¨%쬔uÒȜ–[UEµ¬—ÒXÒív¾[|?Ñ`<^ÂÔO,Œ3¶ðI×B5ôQ7ÎèªâÓNé^ºJ¯tCsiÖxô÷ÏÌùÌ[‰Šî;K×Foì?:Cò³›éBèOÒê*yrúùœÆãèàlÊQÎÙRw‘Ôhˆ\)œ Á\ÏæT‹¬T´;±D*CzÓP|- K-<ÆcK½–CZ”Êÿ4´F8 ‡ÉðŒ­f “Ó´øøx:{ÄBëá”n,mJd‹°&Wülýév hjy­¤Ô§ m2šK„§’M²#§Òe§¥¶Y6=ûqɧû9剥°&v ¶…µ:S‚Ù(W’?Ežií0žx6sÑ aC­Vcje•0ªP™ªó{ï%Ã4i9Ù;>Hù:¡BUpªáôHbǍ̴É-åšóF­Ñk•Ë^ ¼8¥‘c#·m¡B›:xå³}7§¯ªÉÁ7ø¬dÌrÙJX•‘£ +¼t،Óüˆ Ì\«ŒŸ‰~vk±õl’2—ù®’/¢ná?ö¹H w)ZXñén½ñƒ6‚Ù» /×]/ÎPtì“4C© „l%Gvû²;Â⹋ôGA[ÇJN3PªYa]¥õs×Ò·“µ$zöÆK£EžÙßÞ¶’lºZ‚¥à°·ÆғªÉ#_Šõ+}bˆ÷‰úå7h „qˆJϦ‘?:‰B•aWƒ@À: ÕcªÏ/2Òu†<Hò O*Ôû·ÇFÚ!}-8/iÏr  ì3²g¢àŒ%Àdä8¢}z@™7µ³H1o´y^ݵǨY:©>†/•‚xå£ñâ(Q¾H¶…EDV­_z¼B½@_•8Ãó0@³Î(‡a xNf,’Vrêʞ²Ê¡ ;tèy<Ü#ò¦6ØÃÖ¨Z˜-ò|x~<”Y+£›š³éý/=Q[)ÍÀéÿEyr„ :êfßÂX¶{¡îè& +”«…¼ª%j‘é o¢Ž§Ðß{Yq÷ô˜ÛH²?•ª jKSØáÙ÷$èD ýF9êå¹áF1ÿÏÕÓ Ý=|ºÙø흡†L#e®Kòϊû*ވN"Lï›kl*›R37¸¶‹ßw « C[Ò­¯ϙFAÐø¼€ ÔVÛbõK¿Ìož¼ÿ=Œ÷ø¼ÎÆA*Yí;®Á2EOðJžJ@·Û%û­æ@$PñT…SNj…»,¥‚ í3äzU¯|¾¬Ñú“4õ¢Cƒ·bÚ"¥ð+°õít¤á>}'âÝÜK0ÝÅ=×èÏàÀüîŠ$‹ù‡“›B5ƒŒ=Ë÷qÙûv‚G\zt-,¦»YÓvŽ:Çæ~6`F¥}Q0d“‰Öv˜-v¶no?«[½‚ ô+æV5Ïi¬ƒÓ;ã΍×D(|è†(¨®r>[ =ìÆ͗ ½öúæÅA&eދö ÁOo…Èd?QYÍêg:tH2´ú89M{ +»ñ(²gÌ~7/Y)šNÙû +ôÉZn{†ïqè'¿B$‚ Fôv㠖ð°ôϹ^ôLƒ‰ŒÒ" Cü–N_0÷òï*Q¡n2͌zvÌÐ%ßF‘ ]u¾ÿ֒1Q¶Fk›ûαÁ>¨bÐcUõq˜d>/XObject<<>>>>>>endobj +1632 0 obj<>stream +xXkoÛÊýî_1¿8€­HŽáGpQ@¶åV€­¸oƒ (VäRÚkr—w—´¬þúžÙ%-Ùí&½M;"—ó8sÎÌPŒi„¿cº8¥/ç”U×ÉÁç»+ŸQRàÎù%þ“Óh8(Ɏƣá—á鐒µ¤û‡¿}[$ *T)?%¿ã¹3Ãs'§xî(Y+çï~·®e¹¥Òd¢‘9)M ú®tn6Žæ  Gd,²/Ü 6·ytó5M¿Ïæó$M¿-’é×Ó4½}šýcú´HÓiró>†#:çK#:#f'3ºJ;jþì‘&yn¥s|Ò_ªD¶VZ’•ä*ÑdkDZ e]HúCP]3$TK[[!5Ù\Ͼ-¼Ù5†ã]•¨k¥WAI ˆ†ÝéÓó!—áhÖP³­UÖÁhž•êY~탺êÁ? ç©ûsH7¦ÞZµZ7”eé'_]]҃ʬq¦hpÛÖ½3”ø’½=܇üñ:H€ªâŸ 'ªï3årË­vç åvtSr~¥C&êÁ¼HKÉÍãçÙ#‚vÈž ˜ö¤¹ºŒ=»böåyG†yG¦Ø+ˆS 333UÝ6Ò21\Ôö[>ˆÕŸMA)B²vKnmڐHz–uCFƒw`Y®^Te ”ZF‹à·G•±ºYP³ºSÄ[¶•Tei6oeˆž Ô±€}ûÉÒ÷üìuÂ':4¢6w:Y ë6ˆ†J)¢Î\ÐYòXOƒÃekÏ`?jœ[I-­×çʔKméé¢Xx(ÀL„Z®9nÊ× ð+£ã…\JÀ–~Š#Ø»~Ç(‰F-!ŒjÖ{r»ŸÌéAh±»O‡¯é¬ÖÆ5ñ°˜¶¡Y™¢6´±Pc®›|m¤vœ˜oÜ÷>J6¸ûáãÓô''n¿=|ý%7ºè_~rt6¿¹ÿõvJ¿pØ,‡Ÿ=p=ýëlþÏÉ}2}šO’ŸE2ßþ¯gÓtôª5ڍ6ú¤¶J7žæ=Íȵuml“~Še»Nw^`lMèm's̍ ľîüéÓŽ ó”(KÊصΆÖz£mÔ¼¹;®ðm?©2ô9¤ë-4Pˆ¶lŽýcŠÉbãæ!—ÉcZ¶ Ç°³Ü¹Æ¨dHùnTœ¡Q ¹°~¨ªt^$û uùy}p>ƒÃ}† ÐV)áœÉº§E, õf-mFfªP¡öìå~ó JÊGk³ù¡å¥Å’,¸–f…ìñéEeÀx)×âÅï aR!§eæ¾Ã[ƒéQŽ†Í™³ôÂo©æ¡o0$§cR \-á× ÌÐ@”?òœDÔ>3Ž²?eü4é‘ð#¼Üˆ­ëR¢l0®Vköè© +¶D탛h÷M›µ ìßñ’­¿(‰)ô癲ð…Û²¾‡ÿÙO:a!Àáܞînޖ- ãë$.iâ½gÃ|. ÏÞÀŽ)»®åKîEÁXl<…Eþ@Z¼â–ýÖÇ(ìF– _ç7'KÁ:c¤Ž7&Žï#Q3&·(Õ¿ðP7)ÂjPnɼÜâ.ožžÒF1'쒈irÿ}ò6Ó}BÕÖ`#‘°Ñr1¾{û†+®Dƒeq@-h¶üh`^_ÁNy½ñªñѽÏÔ\YhR½ü`š!Å<÷]ˆsèåhu»,U6à՝¯Ê×°–úqNÞ€ +7£‘ß Ñ¼ñ—Š7•‚ó¶,ÐÚނ}9ïÄØI2:YØh»^£‚à¨X)‹ǻzº6cyp¹í°z–[®V«á/j8M;÷i궮‘Ušf-;ÝðªkMédƒ[]ÛJÓRèJèP©4å­’h÷.M5\»­G6¾’tH[¹Rá.Þ08ЏÞÊÑÕ߃Y$ÁÕ±ñêF3LPÔð&xU¾[°Vo7( š:« /ů%=ñ¢v±/.n×\heM[CIYIŽuHÌwÂÜ®>àRV¶y\»!ï éͲ oâÿéˆwJóÒ{Lÿ}•qØ(4' «¥ÌæЫƒjE ¼68Ѕë͈´ÿâʺù£5@Š7Ìc¾¯!Ûî(þ|wÙ½«Ï/†£Ë/øö_äG‹ÉÃõ„­ù²¦[“µŒµ7ÄϝôÇO.FxƒÍø%ÃÙÅÙðâü_MààňŸŸ&?ø7Nå#endstream +endobj +1633 0 obj<>/XObject<<>>>>>>endobj +1634 0 obj<>stream +x•WÛnÛ8}ÏW ’‡MÄ÷ÚI}ÈÅÝ5¸ÙXÝ¢€€-Ñ1‰TEÉNþ~ϐ’oˆvÓ lŠΜ9sfôó¨KüviÔ£þ¢ô¨ÓêРßiõhp1ÂçþrI ÷ ßï½ý {9h O\GíϺ¤`;†øìw:D§TýœPv^´&m +Q(£©0d3©Å+ ZÊZ‰¤„ &Çwmôy–+](ýDÑRä"*dÞúü8êÐy·ÓºÀ-[ãMë,Ùb’˜5’/"ÍI*IJ[䢐–D’YP±”VbC!µ…wöS“ɦuêvz­ƒ º¹ ó¥Ò¦ŽŸNÇtrûåþ“–ÅÚäÏìà =å¦Ì~³t{ó㸆m‹,Ó"•äpíŽ7í|8q‹„°™¬ÌW2Ï ½>ÛÈLV&"ß1çcØ[°¦Ì#ù ¶»›ÄD"±ùjǖÃgç;C#c;B ;¤t””±l + iN®ÇL¦ÿ\ÝãÇéU0nÞ8™ÞÜ}½Ñ0¬= ìœ'*ÂJº4¶°ï;îrÿ gÇÓÛÿ÷°ñê ª ‰¹Y1‡ÉÏÜRM“ã*E]¥Á{_}"i´º);@Oª°Ä|«ÌVä8&¡c:®ÁÚÜÂ;qEޘ-Êr™üž9ìþ±mÏ)[‰„¬ MsI¥•q£ëЖ՝ÓISA‘Ô(ù$y¥00Y%•ŠeÁÉÀN8öí«-dÊޕZ¬„JÄ<‘¿®NSSH¤I.W륁ÞK™ÈaÅz§‚&M‚%h§ђcžËì¬ÙICÏRf|–áÕe:"к¨¶˜¥J«´Li U$•f9“(“9„8:j‹Å5—Øä +ÆÒN"^)Ëh8}‡9à-â 9 + ûÖ‚»œ8Ã:ã n¾¤îÀ·›ó~—B¿ôç—Y0s;Ùdûó€ºxÎ}é¼7âÁ²²ärgKǦoá°¦û}S:6kKӀèŠhG=îe¨o}ÔÙ<½ù†ß&Ói†³ï³`|ßï…áíãäïñã, ǁSó­§Lô:Ò>,ÜÙT#'hò@WqœK‹ÊAÜÕ‹Žz8Š"ZÂÑL¨Ü¶h²W 4õyæ®+&)¹Ïܨô"è}eT”œ8½òÅ2ä̐liÖÎ`póІoR¯Tn4sÁƒë õq DØA&%ÍëÁÅkáݓ?K…NÏV|Û¥¯Z½´ï”._nË"joTwÊ&2´À‹ŠƒÝNgtçªÄ§îm:D"s•¨âu?.‡“PÅoeQf¬i¢~P5ò ~®YˆÈC~k!FBà ÈS՝|A¨–uÇÎøÑçÙHf¤0¤háRôÖKPÖ§M0¤‹•žLeq=ù2;¸xjb„ôšÁ¦ªT²Jۢ+ÚîÃEJ¥@ӀèRe–æ9ô;—(<…däôõöáà®Í–ðƒ‹¬-œp×Rëˆí.pŒ¶œÿ‘£†@f²W9>Îò²0%J£JLí ï;¸9‚@J—g}‰vhæÄY¥\ew÷^3W̙2zf>#qÈ6+Ø… ×ù4óm\Áâ0˜Ø¼äƒ·Ìx/w՘ÑÌÍc¼dæ܍`¹ŠuîEuëéYíæFì+ý€8m0®O)îoIåNu|ly/þ³<®üžð´Öĉ]4 ™rj|GKåËIô%¾Sáù"êv:Ý6þõvúùôzzÈÎð´NêÞ LHšbÉè:ž1œ|/˜Ð(tÖO÷UÀIÍå“B³†N±@ŠZÞù’(§k~Ø«ø¥°˜7¤¦'µÂ˜M$³Þh¹—È­|;è¹å =àÙH@é\pÖ1ÃÀfBC·}WÙV'ÏÁˆÕŸˆy$ÆgÞÌ1ð«WՏl:o±*ûåZëN];t¯3;¯i罁÷­ž¸ñ~„Q«Ì2“ô;}—nÐÝJ® ÇuÐ7ƒaaxW4n*¤j´¯ê¸v|×Ӌ*ªî¯§}?ú–9»º¿¾¢‡Ü8¸5QÉÉI/~^8uøM´a4Œ­Ñð†-£.ŸGý Á?r°endstream +endobj +1635 0 obj<>/XObject<<>>>>>>endobj +1636 0 obj<>stream +xXËnÛ8Ýç+.f•Žl'®0‹dÒ ¦=è&J¢-6©ŠTÿýœKR²¢S`$ ÌÇ}sîežÍi†ï9­.éjIYu6Kf´\̓-®Wøû?¤­_øÀŸŒ>¿ÝœMïgô6[Ü´¼Æ9á–ÙŒ6Ù9ů½Ò–l[צqô}1ï6?Îft1Ÿ%×80Ú'›gÙ`ÛËËK2øá3ÓûÍçÁØÅå’Ïî ÙÈ°&âÚù='eÉ’¾‘ÈóFZKfë?ùþðeMÖ;„;?Ð|í]-X„׋„>™=¥Ù[¥w´muæ”A”BçT`ÉÊe]šY'ÒRòBŒúçù¬KûÅþ¢Ö_·U*ÞÆ»J|Ä7È¥Næ$Ró,'ôyMߕÎá U"+”–UÛ)ëGªú"ÝíÃ×5iQaññ\%2ù݇Oøښ†$®ˆžÎ¯’Kö”3¢2IîPKRšL-Áñ>¾#£ÙÔµ­º)­™;Èɖ/"sTIW˜œÒí •ðµ`§¢Ãáڑy'žàt] +¸€í¹D\¢Œ÷àJÄ Ïµq>¤A>²RIí¦¡¤TÀ³TJM;õŒß‚õٌÀ˜ÀÏW÷ÿõùÓ×õfM¥1OmÍîHÍ%Ì'ìÚÒÄifÁYS¶œ±W'¤Ë<Ì@…ËeŃö!dÂJ6 òqt>nm†þ’(Ë·™-í%–ð¯ÏkpŸã’ÜhɹÿçîÛ(\Pä0êÚpIüÄúÚôî×\ÍÒd¢¥S-݄Z]2‰ºÜà|kQì-ÂÞÓÀŽ‡±í˜jiBô¶,¬r­˜%Ϫó¬rø#!ž $É2_"oCԕ8 Ò\ˆL¥åa­Ò?dÆR:Æ㠈°Ø]h@Å*ãäZˆtoš''”Óð[Ü&´6ùÕ¢šÐÇwãÒ~÷…|:F§jr·´W¨$6pŐeÅâ´öìÞ+Ç$’Cdtv;ö®9£µÈž¤³” ͉iLëjåŠÖ†ã@kH¤ã°ä¾‘ȃJÇã1%¶³Øø®mXÙ/¯ -£îµKií’’kU(úïC®,ëµ-Á—ç2gfÈï'jã·CÃ.õ”–'í¤MƒÞ%Þû£!Þ»xYI³°Ðï\^¸%ƒCzƒýï?LNν¤n›&3ä G4ÉyÛø&m]ç¢òÒÒ(¡QN G‚®n(3¥PšJYN¥}3ù†0}êtb˜wÝQÒE Ö$WŽð'ȚzžÓ¼V™$oÈIS]5{èe©|N iÑ`Oís©½J…WF“˜#Ÿóõ‡Ò™Yº.×øéæ:‰Ù/©3l²÷úIŸ³’ê–IV¦¶ì4¶\9MR£gûÕö?ššÊ9k'Ix*¤ÀTE3SfÉ ôÈT\ÚÔ´Žø>†lÓ另"ÂøDQÒÏôx÷õ>ù4¾ÿ0¾¿{HîÇWŸ¿ð¦6½ë´B‹RZ[åWxï-KÚUå©Î-Íž[I·ßNh棦T æ˜ -ý“§™š×à“©}H †“ö¯w`‹%kQʳ€ˆ9.š·h³q;{«AàÄÐ{͑N/rd ÚÎÎ#n²qǘl²&M«ßL»/óÌ ½ÕÆ¿%-e2!{À/:#Sd@ -èçÀÊ¢ )°á#ïÄÀgtújDQ§gœœÇØ´' -Ÿî+OK裡W” [†t‚¹ä¸VF.ž%&ƒm¡ZæÓ.¦Hè#É¿+™2AK^Só¦ò*³•ßkeQ뚡¡“4zhj ÑRÒ\ztèYé"õ -dؘzcWHíåÜ SZ÷˜ÒÎ¥OÏvzq\o4R*­JôÎÂdvFñό¥—ý0”’ãÏ@V÷×z/Z¢CŠ}þ9ð$ág‘¥Gȵ%S¢@¸‰„_ ÅvhºÂ YX‚NèÔÓׇñýí՗ñ/ÁN!Jµ99Öf˜p±–yðÓ4•0æl]|Ã5„g2À ·Ì1 ZâíÝdüžè¨ê`o w]UÒ²?„¿ÚðVŠÂ™h„RoGсΈӀ»ÜÜ>€¼fË¿¸˜¿Á2+#3‹`°iÓ‚ž…'ØYvix“c¸ ZŠÊ±JBÝç(‹ò9‘–~ªpnp8NÅß!=µ”L§Ü8VÃA£M£§ÜÂ{‘æ2{zC`FÄMBÅÒjñY«ƒ㑵5Cøî¢9AM8Dób)0-C ¤¬~–¡çÓªyчNØÄõ;lð%€¨˜$Üåaˆ|§3…ݯQ‚‘„‰ö¥ôˆ¬ƒ)ÛàE6“´ÖØÓh\8„V¾Ú¡ ƒ½#œ.F:´·¶mP½ªŒ >CŽÎˑb<·P9oE€ɜ—]À—pþ¿Ç€ñ°µïinÍ¥.9õ^^ö$Ò°œëS\1²cv×Kè]úH½Ô”UÝ35µöŒûö}¨¹Q\ñUˆmÍÁ¹sœ"Kœð’ ¾R9ǝF7ñ¾UYõÌY6~üÔª] W¸R’ÚZ7v¸91åp&óDb1£ÍÁÛF/ø—»þ°Ÿ #Üq1¹èpÈñää÷“ÿ¦Jendstream -endobj -1598 0 obj<>/XObject<<>>>>>>endobj -1599 0 obj<>stream -xuT]oÚ@|çW¬úRZÕWŒ!OQZ©iS…ªª„„Žó_°ïÜû(Í¿ïÞÙ4¦ „ávvggvïç(… ½S˜O!+@´£ ›@‘^°ä‹9=Oécªx0ËR–¿tÏ -6}é ›å¬8?¸^Þ¼€4‡UEՋ=”@•'X‰ñ‚e,ep§­•ÛÑƾY=ª€4íQÉtN¨ñ««å=XßuÚ8PځÐm',AªW=&0Ô`’fē`÷¼Ýrh½u°EjPhUɝ7„[ ¶úR¦ð\Ô¸~\•1pH¿·|OA r¼i¨žuô"+‡\¡~2yªºG³E£-4rkcÂy‰†žIã!–¬çM -Q‹$x–“òD|Ár+$ޏÚ°h~Q-‹Îw§ÝRÙ霴'Ì"ߥ*õÁÂ4¨,‰Ê3=h6H4…¼Ex kzõéé»&‚§ùÇ ~h¶Ö¾)ƒˆÞí¢ìp®†¿½†_Ú»€~&…B,¥ÚÓ°Wú@;níA›’Á§ŠÄ“*.tT`¼:gºo$©à¤Ø£¦ãè4q[Ê2(;ê‡QPéhË Ú%,5ZçÔjN擩¨„î9>vº‚å‡ûäæú&¹]Îಧsôˆ:{rhÖ;ڋRØvÛ ~ªà©CÑÎ~,Sɝ é*UxˆFû†êæ_”·¡îߒqʎ^ÄÁzfÂ72úY¤%ç=oÞÁÖ;° -Yƒ!كîœÔ‘†¨µ&Ü1'p"xˆ8›Ý] -ŸµÃ3³žÉ*¹Ú‘ e+¹l¸£^Üm™¯•  ¸m˛ãþ¼ Z ƒÜa$oä®v§fF¡nÑ/Õaº‡’fA½¦¾Û³ ›c¯lãË.*ºiJÞ±• e¤+îgaù™®¤°‘ nù#­F%ÇÍ8ہ`£¤:.öv¨Å°‰iA·ï"ƒ,Ïú%¾¿º½¾‚;£P8š\á[R=jÒ&G@2Ÿ\ôÅÿnÑ|ž³y± ›—î†Ù4 ?¬F_G¼óÔÑendstream -endobj -1600 0 obj<>/XObject<<>>>>/Annots 749 0 R>>endobj -1601 0 obj<>stream -x­WaoÛ6ýî_qÀ0ÀÕ²åØ°iÓ Ðt«½ò´DÛl%Ñ%©¸þ÷{GR±¢¤X ’Ðäßݽ{Ç|¤4ÂWJ³1M.(¯£d„O~¼ÿy¦‹dNÓÉ<ɨ¢t1Æï°*i9Xd¼LÇɈ7'ÓdW¼Ù]c7Ëؑ?Ë»³4™R6]$c6O“E\yÓÎ:8κ»S@¤Éœbw¾HÒ¸ò¶uEcm8ëwӌm³Qˆç"c[¿ò»5¦ÕY½˜ÍiUødâ“|øz'öNZ$´ÕZ°$èv•‘6ôAÕãOTèJ¨úÅêã`Dçã æÃJVkiø#öÎ‚ïóI†«±ÈúE«ZÕ[5ÜѕwBåvñ¢I2 -2JÓè`¾fD #éã áC°·+>@ÓIˆ%DO¹(KYôÝ_½{Ûs~F‡Êw€Íyüõêõ7…'î9óHÝAÓZ䟚}¬åºvF±=°>)ݔØg¿ºzýlJÂå©"œ÷!%ñÊñ¨ŠR]+c]y<óŪëHÊñÊôï¶Õ:öÍÝpz÷¢ïw£JIN““%(ï©7v§›² Z¨±²M€•yc”;ö±€ÌõVÒÝåEq÷ÂÃ7‰– P°¦ŸúJUKR5¹¤¿¶¥^‹òo>™\>¨6 -k¤(~ ^¦ÇԜ.êôÐËë.ßãÉ[ùÅQÐãò>âƒ6Ÿ¶Fƒÿ ò¿"ì8¦'\ænø@f·S–ð͹i›ÿŽýq@“žZª_˜?ÑȞ¢´:´4Ûî…AÛB~úË:7ǽÃk±ð9ˆjÂz±'|ýÀ#ƒ04‰j§rá˜yì«Ó÷Œº…¦ìs­jˆŠ®UºP›#è&ú´´ªõ?×ï‰{®"‹NhÞ4þî5q§°«D[qå|=Œª„9zÙùªäÄæ<(ô©pNV¨²É¢$rÇíÞËp/½¾ -íÌñ¾.îø‘*Šž. ¢Fïg¡œT‰#Dí! ñ -àÉZ*ˆQkлÙ=w/鶨u‡ Üí¥Æž¨4X;NªÛgÄe ש{ɼP^),¨EɆ Èdu¨`ÒW¬6|µŠPãŒìÈ;[²î¼½Íê‹\øÆàVõZ󵤯+ÔSþüüŒF­Ø+ºu§ P¿,õÁF*Dò êà8$Ë㸒,iÊVøH8î¦BK›PÇI<Нkƒ|çºþDC×"Ó8ðMñ Ãà¬!afŸûW/ÛÎ=ÿ=X¬ÛyuY€( ²N›ïۊ=.ÓyðÛÕëÇ‚Ü …/ - ԉµ‚•Ñ(¦ðnÈÔ5JY¡ KQ?~Ò0vÑ+y.-k(£èift²¼|ûP,#Ò”‰«ÿd¾}KˆÃvø”z‹ÒøĹ6!ÏõHÍHuu8=Ê8¶Z2~Vº½Q÷xxàѱžÇˆý€à£!œ„nX‰¾mãÃß4¥W /^Vú z¹¨ø–­Œ ™Ÿ^“þé¾ùõ^j_ÜÙ,Kfó@¢é„Kðf5ømðHë>/XObject<>>>/Annots 760 0 R>>endobj -1603 0 obj<>stream -xWÛrÛ6}×WlŸìÌØÔý֙NljãŽ;qêØJÝÎø"! (hYýúžH‰¦“>t2‘ Ø=»{öÂo>õð¯OÓ '”^ÒÛÃÏÝoþh’Li2ž'*¨?V9ÝóyMÆü;›âw€ÿVÒª3è òoAƒQ×⊯5×¼;oí×؝Γaã.–}zɈñ„¿qł›k쎦ɸ:˻߀x‚ÍüÐOfÝ3¶¼{ÝÓ¥¡Oáx8c6ª Q¿‡ý°` éˆï sìã™wŽ«‚æ@<ìW@4Á˜ÃVc‰½ {ð°÷vÑé^!8}Z¬y2›Ò" ±éÑ"=ýÝ(-3ÊL!”¦Ë?n’7‹/¸1ªnœ’±_ÕBê;'÷ïïþ쟐7ˆ•È :¹ùûîýқ“—"zt>˜À͋ì*ö¦´ä¥-”9í”ÎÌ.¡{)Éo$iéOgo¨š¶b @a@†Lz¡rð5D.6ÊÑ֚T:G_` ‚œ´OŠ ¯*ëvÊoLéi#ž”^ó^ -à>j.Dº+ÈÛÒyijJíÉè íöòÛµ}f",YJ“¡³ïJM 2ZÉx¬)כ ©VS+Ø -çvÆf”B̅%Þ¤&?ãӚvVù ]³£ÇS ©¦x|ӂóC±ì>Ï.ºÅRPå¥a¼ •Ê%!&ìy' -øXY™zc÷üv·Qé†W,Ì,\hiޙ2Ïh ¸&“6¶y¾§Ÿ#jÞ4‚Ö-íæ&yz—¢»µê ‘è:‰x—øl/×üˆS¼NÍ@ú¬ÕsˆW°ÍÊ-ܶVx8¨p÷!C’Ç …zP O!E(±_Õùf»Ò¡>>aöÒÔÓJg¦‰¡iÙÙBMŽÉ2õLK™U¡)Zv²[2Þ´pÈ*cƒS˜<‘€•mʵt£ îÉ©B墮‡dò ÆÖ¨*B&C·£|†: 7ŽÙÎԅïU­¥Q”ˆ‹ö*^¡€Zù­‹ÙA¡à;ú¸8Ö"c¬?;QåH}l>æþsXͪK-…U;…ns)œ„ö38ô´äÞ/¹6*ß"VdgÈæ¶ôèŠlFL]§Öš>¼þ‹J…È…ôãoZpj¸°ñ2öՊ•Üà´­«b•²Ç‘f⠝-(„6ã¢c¶ó{‰rŸn@3£¹z£òÞYKém§òœKqažjöD'ä8ctÛQ x_dOB{î·ðTär¬~GB„šPAhE˜QC¿s‡¹0¨x¡Ï´P7áÐÝí»ÐµÌ¹PÈg‘¢ˆ¼¤j×ö"'3CÊ¿ÈïšÞ<´“B‡l\µå à`AÕÿ­Ì'ÜFmݱHì`š³JdrŠY -„"ËbÖ´lŽe€¥†Œ@)ÃH”¢ùF®0¯0¡Ä©¤áN¥Ê™x -ÕRp{xqƒJ ®né¬ÇJŽµYp+ÎX¤<&%–нæÀW•!¨ô)·¨4Ñë±Gñøt˜96h~0ø«”[¼LÖ5Ø(³Å ´ºQHÐÇ¢ãBÚBVnðŠe2!*}¹pb‘çd–§Z./ }µÏ8«€äF¥Ö8³ò-å‡à†LOr c ¶h¤›Y52÷¨þÛ1 --ÿÑÆì؇¡A|—9uç¯tUN#D³ûE‚‹ZÃ;ÈZø³±@l˜oG—F†qiŠ³ mxÌlÙa-g­ct%fL h©<^0çŽûJ¾šÔ/@ìU=× ³ùnÇÃ'fª ð/Ò»¸šÚEPÙh⸲å! y ½yGC幄9Ñ,´ÆØÞÆ›q[Õ-¬Ù%\ÉSqãìýõe”—+t9³j¹<ŠEÿ(}‰¯×œg$}Rq0H½>>•¦Él>1nXQ4 LϕyhfÒ2´‡`¬”…Öm¹„v|éÔ}K8t-þáošJ—ÏÆb2À[á;•b<¾ÄçF&¸æãõ}Àƒ‡¼îÕ¬ªýÑ(™Í4™L’ÁpÈóÞýÅÍÛ ºµæ RR"¼P@YÓyø$ é|ڛóùÿ1gŽ¦£d:™á ÷Ç#û~ÑùÔùè‹=+endstream -endobj -1604 0 obj<>/XObject<<>>>>>>endobj -1605 0 obj<>stream -x+ä2T0BCs#c3…ä\.§.}7K#…4 Œ™¹…BHŠ‚žP$YÃÓÓSOÁ1¥,1/95EÁ9?/-3½´(±$3?O3$ ¨ÕBÁТU¢—s=s3  ]!)¦¦ S\C¸¹[)endstream -endobj -1606 0 obj<>/XObject<<>>>>/Annots 805 0 R>>endobj -1607 0 obj<>stream -xY]oãÆ}÷¯˜‡>¤@—!EŠ’žg7›¸ènܵR(ú@K´Ä®Hª$e×ÿ¾çÜKÍ\ÊζøèÌýþ˜‘òï«ÄÅø'q‹™Ks·©¯â(Æ'þ__~¾JÒhéæ«<Š]ÿF«Üݕµ[M9k—äó(7‚×n6‹§j—06_Î`jÓh1š4jgóhfH‹Á®2¯‡¢I¾‚'µËf”@Î@˜Ì¢ÌpBi’E©!-›¦Ñܲƒ]ä̂7j1ÝeÀ†5˜9šO4[ 6ŸMYƒÁ.Y½ y.ùçˆÁæ´*@ò ƒÍ£ÄƒEù­¨Å`—KfØ+¶.e’(ÏZ vOìZ¬áXÍ ïŒk—Æ’ -¯Ùb°šÛxe1؅ô“—ÕDÁÕµL˜bL”H¢”Îs2‰s¦É“ƒMgì‰À VXƒ™â”sXƒÁ /°#‰³lâ•Å`ç3¦ÉËj"RæîÜ1Bnj\‚!C8ž´.¡-Q)ϪZ4™ ºtž€ väF5ž´jgÒ¦5˜FW4Xƒ5(k`Ñ>83 jžqû¢Sƒ]ˆæÀŠl¶Še°’l¸‰¬Á°sVR‘-ÒjÍU$¢«SP,gÏN1ØtNŁ5˜./áœa †SXW êS9×(DcnÎL:0Í&4XƒÁ"ö¹e »\Ñ© k0+Ä>¬Å`Ñ©Ö®Å`‘ä5[ŒqG#Z¯4Üy,í8†+Ȅ{f5¼Àìà ¬†{–Õðk°׳c¸£ì,]bä³ÀÌpW (°#\\³èÏÊ}˜¥ éôŒ›O£5›/§V9HÎ@„:[2ÿžT¥X.¼[°­À   Ø"|Î@(Mzã-›',j` ‹Ž†·5˜Ùºd1سøÃsžÖ`øŒg|ö¬7ևu‚ÙB‰³ î[)QÎSŠ ‹Ž–4cÕ®N"a f‰ø°4¬Áp -33‘•pØÓD²5‰fi Ïb“--k0ËË&0²Ó+6µa fñ™HêWxJéü±ø|WŽi–Í­š3î*ÃL»¬Á,[2ÈZÌ\ña ›s«-É]!7•üΡH3)y?³2†5>Ϲ# k0#âF1¬æJ|`Õ® c÷̪À YT vk0kÄ5¬ÚõM™à!…L -R»S3ouÃÌ*ðånXÑ,?Å@W^¦?ӈÞÁ¡µ—†9|Y×Éå+W€úã!Ýá›5pÜi¹>Xÿ¦T@ãKN‘‘×(“`I!™s\2Èã”*Óçʈ3ÿ}¼‘Á{/Ó3ÇëÏú3e Å{7p2Q|U.@֕ôœn)}©é•Ã¿éb@Pˆ’a§ž)ÁÉ#7p‚“/äžûq}õýG\¼±[?âÇÉ|±të­ü&‰O6ßÝ4C×nO›¡j›?®ÿ…³n>=ûNVÓzûÝ]Q?n_ô®/ŸÊ®8¸Ç²N]Ù»a_ î¥=¹ºÚí÷\4ƒk»5íøÉкS_Fn½/Ýf_‡²ë]Õ@ºêݱèW›½Û´ÐN/b÷Nv:l·Méúc¹©«ÍÙl¤ž¢¡½§¼¥pz]<J×>º÷m3”ÍÐëIŒÍùäY/FÍ]oŸŠfSnÝçrxn»¯îSÑÍ®¬!énšÇ¶«‹sbðƒ®÷ ²I侔u;”î®ìà5tÕUSõCç%ÞMD ðÛ盿»Û²««¾GºÝÕл¢ÙºûªÙ¶Ï½û¼vכMÙ÷â~×Ü_ Qb¸Ðm«ÊçªÙ‰ä´Ùˆ‰£7Ñ#íüx@Þ¡¼/7§®^ܶ*íN›Tó;Sä~iŸêõõî±B6½\.œöB¿/ºò¢ROƒ["Ú>7¨ô¾:ò軩©ìòl·ºr3´Ý‹3!Pô"z¼`#÷‘¾…l¾ ‘ûàu^œ½,Ïõnݶ‡¾|+÷Ò&÷¼Np'œÏÿ@&³F•HœOðÓ ºÛbóMùj¦(véK/›ûuŒø’;zÝ`~m¯÷‡ -M.þ\t N¨Š]Óö•Ø}E£!¾ÝVº©Ê‡ÓN¶øX?Ô±ÅuV¿Œ$V’5žíݶu7¸£ŸÊ·r†ÇXh6,‘ÚG¹=`Íó{ÓJþçö'šáO®i]{Ž'MÅt<ð µGyâ:5ç/cÑ})Іm?Ümºê8Œ½»}]¼ö̍};ó[çV¼›ñHٞ*EÃÿ” 8"zÿÛíÝÿÞ øaéÛÅÛwÔõÎ}¹¾Wxè`ßîö¼Q䚜´0~ÐþpaÈÝû}Q5’ýï?â >/XObject<<>>>>/Annots 857 0 R>>endobj -1609 0 obj<>stream -xYËrÛÆÝë+f™»…7É¥m]'ª²d]“.{KQ„„$”ì¿Ï9ݺ!²|S©JåäL¿3 þ>‹C„â0MBZ„õö,šDø?ÿ¾ü~–Ï&Q(fþ½ ³Ù$íÀ&,Á‹ãtR8Òãmˆshõ¬Ã`‹ù ‰Š=ކ$*&3/%<=Mð!›Š¬ ‘uìt:ɺ³Â:Lͦ‰¬›ÏÈ6Ì%rä„Ú8£ é1X‡Të0Ø"žÌ=ë0ØyÄ›¬Ãp8.F¬Ç`Ól¤Ùc°Ð;ÍlV ?0e$Ižf@ñ$÷¬Ãê22Y¸Ücºœ±ë1]–dë0Ø©4°êrš"÷0›H[—›Î±ƒ-ftÊX‡PÎf5ÖaT¼ÑÌîLØßې͙(ôÉALOÆ®8LJ‡Òcº[ŒÔz v–L¦^Öa¸‹G0ƒf™ÿhd×c°ùt,ë0Øù˜ÕêÈ°öÓ#€‰.ŸsEÀá8GÊ9£'’¥(äÈ!K=d– ‘ô˜YÊÑw&ËtçÅTÛÑE"ë0dá`îXõ7§9¸ÄîψKéRŒ˜Œô˜jåXu)‹tueSæA¸ä0dg)Íë0 Ç¢ë1 7±]*’©æ_írv{vÊŗë04£QáÕÀz ¶HX‚íìÊ -@Dh6ø,HK`,ʇlë0X44«™Œb-.6lrA¢ÙaxKžÖcÍj4°ês†Ëµç–É‚"Ñì0Ø,GFë0X\6±gfDì#'ë0¼BÝ#ÏJ¼¢^z ei& Ó®!²ÒÌ®>1+HDcÕéYUÌ ²X„³ «Ne\¦-ÄeAŽMs-Ê —96áv¢]Þә µk˜EL¤±ƒÍ1ÙÆj¸ÑL3ó2ÊQ±)âÐ\T¤V!“b}2œŒëZ9a×cR‹ý9QÁf|¸˜bÁb‚F²ƒEWz§4y=aåÆHC*€>9Á„“‘Úäi®ïºÁÅA‘„ã0]âÝäX‡9\bV4QÖco“õ,¶ûÔ³oCŠz£:ƒæÎgI¼R9Ÿ{V}4ÖáÁçí|îd;ÕzvÊë?5Öaøñùf¬Ç`ñºñ²ƒÍy™l/*'½ªñ -rñö¬Æg¬ÃC¼ÛÅÛÉ& G%5ÖaÈNã1ë0Ø9;ÈÉ:ÌxùL6Ÿ0„÷“Ì—£ƃ;©‡(nÄKÛHíó¨{ø!ÇèeA’ ‡!*=ÏòŸàM*{ :ífÑ0;»PÏ -ë0bÅê/<+Û/Aýe%«fANsÏb7®±SsŽ”8V5£†RyyÖ'‚D³Ãð݉øŒu,FìY‡a7gF¬ÚÅå)û\#ä"êYÀX‡aWžz‰±3^>€«vqÈÃ^í -rv{Vkb¬ÃÐK¼ë1XdX°D^•ðYí -rv{V¾õ¬°Ó.ï+ÇjD¸|úoTÄ+HdñÚcؕoRÇ:LÍk4Èz ;ë0Xù~r¬ÃœÎ)»}õ,&Ù³š+>ÃtqnY®VjâX‡/®¨™—•\ÅØýÖuŠœæžEÖ t5Ïj&© -+‰ƒ¯$üš!€œƒxÃó3ÎA8„ÁÎ鱺ëÕÒýƒÅb™zY‡Qù¬3³²Çø­!Ÿ܃ -è."ë!Ô¦¬º‘ƒÅ²„âGsd,zI1Öa°xÎÃac†ÃxÿÍë1»m>ø(v#>txK—#ó=r,î+Œ3{ò7NtÊÇ/8ÜÈü „³¢Ó 8ÜVøè8‘“_ðÀáVÄs?ï©/'Å8‘Ãë·GR€Ú å8e÷~yvñ]‡å-fÓ°¼—_@£°\ÿ†‡|6 ¾Þ.ÂmSíÚpÙT/e³«Ý}¸,_ªu¹ÿÏòÏ3ˆžãq“@XeâIøxhÚ§² ϬvaߖÏrúüÍñ|>UÛJA$ìÛ;ÖáyõXîÃaO“ëÕNuÑ`4²WL»û—Õn]އÛzßî×Mõܪ˴üÐÔÛp½ߪÝ}ý*>ŒL¡àÐÖç—å¦l«zGÛõþ¹®7á¡ÚhœcÏaöë®z¨`õSýXïöá®l_Ër× -7KÉÔכ«ïˆ‚®À…;xq”4<ªáÃݾmVë–ì¹÷Ëp®vmSßÖtðm0͓ðíiÕö|ýRݟ(ÂÖrÕ<–møº?ÊþGý:hûV7W½DU×Õº©÷õC¾”Ûº-i¥84eø°Úl´æãpðfórïÔK.«¦\·uó3,Êfh®·’ˆôfµ-û3añZµë§ãŒàŽœ„ÛÍáñqu·)Yঢ়¸^I…¯‘Ê®ªo  ‘–FJ÷{SžÃÕex·ÙÔ*zÊZáK¹?lZD¼~B¡¥„£>ÇËî[¤D]à}¨wÕ㡑ÿC¡#$øוÇA됽-"<êoZFҖå^FlIÿöáóAûìAD"Ã(P…QÏë ÚYÛp< oëMµþ®W;L/ -çì%]ߞ~÷>}&añ b«ÒՉ¾å!ûДp “Ä쉍n¬8ÙaþãâýG:£9¢$ë×:n–YX´?Ñ2]$ûñ÷BUHêiU¶kðûsôcìþÚdËr†|55ŒKØQàQ׫-cíΧ‘§p®Ûr\>GÝå#àq$£?>ÿþÿsÉT;œdòñ_ÿƆЙèƒ]”íáùí$Ñ# IÚeï´:.ø1ú”Ö.$ÝÜesê0Úsñ´Âdi´¥­ÍÃÐТéâûmxåêSŽÆ£‚f?d§¬Îíü‹ •§ÎG€3óò‘›Þ¹ÚáR¡{î),VÛ»ÅGs‹?mu[k¨ÞdÅU»° -Ï\ø¦~\|ªv‡ gs|ýP¨÷â#Þò øí¢l×O¼P•è_ -¾‹(‰.:%ÙЕ—É+î×òh«Sò´ü/¤Ñ`§¤wû½\ '4ŒWX]îÄaÍÝJž÷’säñ¸(­¾©BÂ,.ñ†¹)Û÷WŸzSñN(yzœ8<{õð§ë?>/– ygœ:†üŒŒ–ýG.ox†Ôp¬®F'.>â“BêÌ?ïÍø‡my¿-Þ]¿Ç%ó'îâpY¯Üá2‚ôí<Æ”xü|ÍùÞ{{9ñWùi1ÃÖAæSÊüwyö¿³.pjendstream -endobj -1610 0 obj<>/XObject<<>>>>/Annots 893 0 R>>endobj -1611 0 obj<>stream -x}XËrÛF¼ó+öCrŒ÷㔲­(Q¥d9¦ŸA²h‘„‚‡Tþûtς؁H»\eW«wz{gf+ÿ· -Œ?ÉB¥¦Ú¯|ÏÇOæ¿>ý¹ -"/7ižz¾Ù›$÷² ìÌz¥àÞ~èŊÔ,tt¨Æ`ãÄ T,„}“f!¶¶Âń¸+…˜Â±jVa°I6¯C8)¼Ô RÂG6*¼hZ+¬Âö¡a•„Ulò<³²=Oœ"A{SäŒÀHˆÃàLÚÀ(ÂAڃ R~l3ÿŽU±™OGŽ…Ò¢ÖTVY(+LSRvÇ*L嘕u¬Â{ú)÷YÁÆÅb_ÁB ™r± -ƒEŽµg›*lǞ)ÖN€äØAö¥ÙfRc°hTª1Sð°.Va¦"dõfV,%E$Ý&–,˜-9kÁ‘C½åÅ* 6åá«0ÙÂK¬ÃÌ¿ã¸Xk8÷mŸŠ®gxâ&ƒ3©ñlرÖð1Öt¬Â³aŊá)6 X»df­á4“ûQ¤ø' †„l˜ñ¤3©1XÜmdر -ó8¼ÍŠU˜†sæßÅ*Œ ûÁBÙNbü]Ê›ÃÒ0¯¤#5³Ó«0Ø,[Æ* KÏ–˜·M#Bt/NžQW-)YŒVXšIÁ¢Œ©ff$ÿs¬ÝE±ƒX,⮁ï0ÏZ°tŽå)ÓDšT#Ç1o -ç De8Rc°¶L³¬Æ`³œs¬ÂLo0û㶃$Ks¬Æ`ñDG8Va°ØřYk &™[‰ ›Cø8g,Gÿ ËƘ§¬9òM`ÊÓ¢ؾv!9!ŠÉ+RüÄRv¸©ØBì¨0ý$Ôu¬Â` ö…c­0¾:òù,x.Ô-¤,¿TŽä‹!.)’²H,Y6äUb,?± Åú¹ä(@ç⬂Ȋ¥¨H¤36¨ä„lP óŽÔlʏ˜bFÁ}Î>Ŋá>&"@Ýbc‘3aàËaQq¯:"aYñ(™ÞqômÆATœãLql ãEžbRD‹$PÈÐ>§dVDÈ)¯H²0“ƒEêqNÇ* 6¬M}`SvnӉ ¿h&5†l–.X+‹ÉÃìYYNvâPt$hæäIÂ)¢aa_Y"jÁ,zäDÅq -B4äw¤Æ`å*(Važ’ÝíXkG—r¢¿@ -¢£@a -ó­£XvPˆÁ͑ ƒÅieñ™gc¢^P çt¢P±"5æ–ü -¹PÁ¦Ì£bæe‰ÐbŽµ–¢éiÀwN(€–P#¤¥‚g™Ii‰·Ì±bƒÃÀÖ–ºÆܯÞÝ­Þ\¥¸ïæî¿T¥yfîjù]Ê7wÕ¯˜•æzÿÔµÏMm6]ûÒo_Íö`úr¿)»û¶Âo`â!¸:ðÌísÓ=o›ÓÞÏ!\é/†žywÔëǧ§¶ºËՑg>víf×ìa»owã°m§¢±-«®í{ӏ›C3ôg¬Æ4ûWûbê¶é^=Û6/m÷h~gðÅ«ƒ&žY7ÃÀtŒO¦4_®?¬M“7Ý©¯t±x>7òˆÀÛOÿùéöóÇÓ°ì'a—·7o¯?œÆ䞹j»Š¾¤Ffhͦ1ÃCcöe?œsWxæ¦|TX[·ûö~‚ǘùЍ)7í80_e]Aޔuõ$übYD<1Ì͸¶O»µ†—û²šV.²+ué%·¥¹Ù²4íý`.·ýÐm7ã€^¼ÚBcýڛ¡kÓÌúlO,óõ¡cÅ®9m®ÀžÇÚÆ,¸žF£®‡²z,Ñ}æß«µÙ·õ¸³+®ñÜæFC^v2å¡6U{¸ß~»ò\Çâ;ϐj7Ö8ӏ…EºëíðºàT€F×Tß«]sŽÅÕÁ(‡r÷HzÙǘûž>”)ŸËíNŽÚìúæå¡éDôÕA1³>/XObject<<>>>>/Annots 898 0 R>>endobj -1613 0 obj<>stream -xTMoÛ0 ½ûWð–häÏZv/C—&[€$Åb·ëaÅV­¶ÔYJ²þûQŽÝ¤Å0tƒa'&ÅÇÇGÒ?<¼| „1µã-/ågǧ”…I n½î­‚ÌIB!LCä?†A„ÑgS¹VM͌PÒÚ-¾OøÃ0B~x}K^+Ã!ãÍ“\•µB›æ$4ßïBJbúEí¡T0…n`p«1Ò2yà͘,aÐÁõƇè(F(Xâ”J HŽ¥«í3ÂÀ"ïi®Aªý9lNóš °f¸V5RΡõˆtÚø¶3˜µ§õ±×¬c3E£´Z(­bµ5\TF£’ ÖTsä¨* «*$,ù¯­nsc^ƒ¶V;Àó߄,Õ^CzúY^k9²nÃßpÒ¨$ŠQmK®/­Gpô2ºÓñ¶^wRtj)Iìäb]߃˜ÂÁÛkÝ:‡}᧝:UëÿÇ;=¸|ϛA ñÓc…£J°á¸8¨š¬Ãa@µXSlÄ…^‹ -÷Å<]º.>IÝw‹ªv3l[%Vî<›M¦³qæ.Æ÷·ߏ--»–¶}cpÂ"\Ã×ýýËPýq¸‘ ’Ü1Q±•%بºKÙË~œ«`¶‚öÐûKɖwùÍÍì¥w’W)L»}~ï‡Þ|"'‡ºH-÷qî|u~¨özlendstream -endobj -1614 0 obj<>/XObject<<>>>>>>endobj -1615 0 obj<>stream -x•WÛRã8}ç+ºxÊTAáºûÆP°;[S0;d.¼(¶‚µcKÉ!›¿ßÓ-ùSµEA…XîëéÓG?÷Ži†Ÿcº˜ÓÉ9eÕÞl:£³ÙåtN§—ø<ǯ״’'g'ÓËñƒ÷‹½£Ûßh>£Å -¶Î/.i‘ìÌðM6¹.TÝhOÇÇSúr÷á;}Ò¾2!gé½i)›Ó7cs· t·x·øgoF‡óS™\e™®m¼+é£ Màìïø"ú;<9E°8 pñÕ荱Ob5+”}âÄoÝù ´üuSèÇÙT|­½i¶”Uº§äïñ'ó‹é9ûëc¦¬4Ú"•LY˜ÖlØx²ª1Ϛ:ƒA7 ܆d™–î_j=#b ·r¹Ym%ªµÍµ/·8êq|“g2mëu£¿s »W þÔviJÎ3åõj]’uxæ(sUí!ÑöAº• ~ -zPÕR±¿¶–«æ쁄S–£ðÜRoáµ,ÅÈʔšú²ÃB©CŒN%»*¯ŒE[½jœ—ú¡J’Ô¸ÇÒôx>¥?ݦ+œøèJ Lµ–C„#X^iÞ-rGhÿéÑH=úþ)uñ€¥>DS³´1M!ÉxóT4T9îïrÝ4pÅÞì–$DŸ¯3¤rwaŒêƒ×m£sÊ=#£ 0xõËÝ5Õª)¦ô­ÐVüUÚ®©vu8\ׂC@+&už9¡OޡȍÑ#¬N D4ítE±Áã¸àlJ †ÌÒ F×µD[Ø9@wJ׃˜¨QËq\i’â÷m&ž­[£´ÀIÐ @¿±¨á`× ¸ Å~OãDGïLèjžµ‘kî®ý Ýo¬ö¡0õè0×ãE­ß0Ü"BRÊcD8h.0¦½G‹+0™zÒt:ý¹Ö0`‡ƒüj€ƒ3hi¡Ëœ–‘"Å0ìU]kåÉÄA…+|Žçဦ«áL0¼TÛ·Ma²ÇGž @ ÆÉÅ|Yb¼öŽy’ç¤Ra% à(ïqTq FQ@Ÿ`–…@·mSw¼$FæYÙÃÕÚf ¶…*ã0î x7òoL¥ÑÞèÅÙrËDÌ|auÐÎYOå}ҋ£Û¤iÄ¥¡Ü ,\aìÆ¢´ÅÓĐ,™ëµý%{ô*ÒÆëà㠘֌LYäݗ9Lh¿ƒïþ¿-&ûî` ›G—%›•I,¹Å{5Yé¦L?Ð~«*çI§•±r¾¢ßcƒÏÓfÚ¸ùüõæó㣠öqòÑÁ9Ûy|7Šœ“O/ [WßECãl 0ݼÿpÿ –ÛÈâ -C›žµOTÑ[ãpÞ°%‘JªÃ­(ßn -7*IW?îë€hzO;9¿á2×!ó¦ŽÂ¡a*&“wü™3Lõ³(7 ˆõƒ’óÊá‡Ü\ß?Œ"[æ‘a +˜1F`^–H>SÁGÇäŽÜF`Y#;ä?¬B¼àv¨Ž§#87 L]”Øž«+_Pń¾Â¤ìHÄX?¾¡=ïÒá] +ˆ=†šDn*É{íI`ÉUqg¯å¬6ðzŒT ŒjA¬Ì!wÀgþòÌhט’ñxE„ÃIË#›^؂£¸@2vù2H-[õñŸÌäãù€õ*ìïõRÝÚ6¦ê˜ y?¶­Nò%+„Þñ™!kØ,¤$ö²%úøa”¹Pt¬h0¼,dRÇùð»ªK0çH²EÛw7WTŠ1Ê"úèMÎçó÷„¿†øVÈÒKSßFb+bbda+c Ü‚qáZv%Œ=º3TX6J ~4Y[¨]!Aé¶vªB'Gþahd½2Øa¥VXœÉLIˆÓ‚Cþ0’töвX50syïz€Æ“ˆ“÷Oß2ÑE”í ë<È4rÚ²2ù°‘V–Î ¥-³ÒúáÃMWñ,T)RU2è=F›"0 +ô„ð°I4Ϛãy8±M]#Þ҉ύ>0¶j׆iiZRHÅÓ[q¾§ÈkOZth—U'€Û(”ýÀ6<:d‚C†S˜_°:ò¿pL¯‘Hžg;¬}³é2€=ñž¹¾yaÄz#¥¡ýÅٙÛßÉp ŠÍmìAg…ÑÊúÖÉygOj7<ñõv]o‹wðåƒöÆc ÇViÂÙ¦­*eä¾ÏR×¹Yԃ"ùý§Ôh”Fpºï¿]Óå±75ògË|Ä¢nú°£r» ˜Ä¤Êwôï.ß,™ABFÆ­äÎå„áÛ\ã% ÇéØxl„°‡>¦(J1¿åo:)€Æ2;2yro ’ñ ÓB° Aè%¸Óû͙ÿE}ú‰i«‘a—cæè‚Õ>¡sZáY:‚ç&*Ð=˜ŽíÄ¿|ü˜r;ñãoÀZGf½Cs¦8#^P-Ä ë˜Ð"†ÌP¨Ë“`"䎤lÅYŠqç'[ôqgÖeõ +™}Bì%¿eÃûò|Šá|Z@zmXèžçxß K8£½tNïO¿ß'Ãé±oùR?z(vjÕ ÷@ ÜçDŽ•²ò#6äI¤éýuôw¾ÄëüúŠ–ïýq}óùö†¾5†]º3Y[!^8œ‹nûÅjÆOöÿÿ¦åWî¯^±‹Õ"Y-¯ñ°´ºd>nÎþ>û4߇òendstream +endobj +1637 0 obj<>/XObject<<>>>>/Annots 908 0 R>>endobj +1638 0 obj<>stream +xXQsÛ6~ׯØé“2cђ,KòÍô!¾Ä×ÎÄIï¬N®3~HÈBM,ZÖýúûvAB +ã»vš:& ì.öûöÛEþÍhŠÿf´šÓՒòj4ͦx“~üë£ÙtžMéz¾Ê–TÑl±Ìnº§’FçÏøz³Æª¸–¿Â͗ײs=KéÓõ"[ÃèŠWÌå¡ÿ´Xe Z¬W¼ÿ7šv£ÛÍèònA³mvˆz¹^Ѧ`§´ÉÇ÷ôÕØÂ<å¥Ñ6xªÔ‘Z¯IÛ¼9ÖAT+ï®)<)‡&Û‘¢|¯ÊR[ý¤/íkg±Iµa+&WÁ8K•+tùnóûhJ“ÙU6‡ïñãXeϙÊèóæÓýËìñ¹†T鬾àßòR«†‚~ äCc쓧^{SÕ¥N¡ÐVyDö­»Œ~Ʀ½k˂¶çW¥ù.þÃ^:˜°'„J÷·T7.¸Ü•ò¢?,>«g/îE#",¶: Ϥ±¯Œ¥ºTø)Ñ"Ȕ² Ú¶¬ ß[·¼Ƽª¾ËW£ÿhuðY·m¾ HÙWäôd<%xc`…D¤—°óíÔVË® ,ØÅ)#nfŒ£98:¨£ÿ»¥'½ß÷–î?,Ø؞!ç¨ýüóß¿|øØ?¦lE¬2Úìaž­;Xæ oú¼r¬Ë»¼cãd•­¹–˜óåŠØû‰«ò1‘f+ÉÌçÎ&gpÔÖ5N•ƒ¤,^qºjUŒkZÐ1.-‰ }hŒšãå=°ÌZ¶!d¹ŽùàŸýô‰ÙߨÉ +ðéëÒd­$£×KÚâՇô¬ðàú¬“bO“³šø¡RO&ÿÖâ„^TÙj‘IìÛ2  h{º”Â¥OÊÞ+û¿3Û£øFr'óu6»¡ÉõZ‚üÿæÚ¾p½c¶;òéc®iª ì öO_¾n¾hA.EÏåZ90³ÐA™Ò6q¼ÆZÝ rÌåÄ5Þ½îC>“¥›kÔ§ž€·/&gäÏ4» ³`¸à›§«ìUàè^Ð:øÝö+ ZeI$/Ö5«ãœ7”™÷eyr‰…gÁHõí wàCCSlÖTîé»xð×ATÏ´¤÷Œ">"; EáÌi/Ý{õI#˜xˆ«h\]3wzáªÀi‘ÔN$°\TÂÐVÆm6¥Êؖi†§nï¸pQ#TÄD… «}ƒ ÇåìuS4Pª¶cÆ·Ò$ÑéâB¶Ä#€îíƒÚ–Æ#y²°é3k­ç£¡©|o¹«CYêCïy%¡ß›¼qÞíSxˆ`ôY>Î,Ø€çëz¤8Sì•ý#Í× ¼AÐ=”âTZ¦’ˆËïmô“á»ASâ‚ÄõÁ9ɊER$åÂÌSÛéíCu‡Ý†QPÐ' Ãu›’xUéH#èÆFC€L̈́M©Ú¡ÉÄ£6ºrøômQ NÍå +(ˆ„6˜2—:dÊs/Åg‰Sè +ho¬ º<ŠEOÎd +­ø@LIÉÀñ ‡ä!9G«óm¾ï'!96€"V.㚰PYÌ`·´TãÚØj«oE/úIêæµsqêLl‘ËÅß!­¹}ô(Âȅ*j@“ÊQ~p-%*2Ï+]rÉXgCÓ·°È/ï¦tç¿É|G +v(C•ú%Îhcú±ëÁ*.0݉fŸÛ˜Mc×èô—MœæPŒÜwn“ºÑƒª¶*’ ÚÙõs)ä¦ËMGUN)’R:÷ÜÖia?]½ŠgD®–Òåj(÷þè¡[¤ò8bâ¢[+xâçß'¨Xo^x uÃ.ôÅâÞ¡±YØMq¦i@ƒ9yy§º9gœÌ ¸š2šzÆ'Þq 4ðàYh¸Æ02$íOˆ•vqbº­œ!ž:¾ Ø]©ç¤•ye½ä줸ß*C‹P –;YÎ&…»J÷‡ëJ'Ó ê íXû'„}3©:ÞÈØYLUëª×2‰±´VêÕTmE¶­¶ðîT’´Eïjè°7ù>B¶L¥ÜቂÊÀœæmÜcX EÑñN(wçþòÀ4\݅‰œ’ù°ŸVžÜ¹Ǐï$ÈïKÿ/c>à:Q¹èALw5ëúsoPnwžï »ÆU Vº'M¸ªy–_KÙzœðׂ¼ñÔ«™/ύªÆ„!%‹Á½jƒ\™©ñ]?tvÓ¹ŒôèŽ"ƒ¸&òLÄ¡nє0uäžëœçüÇ1ö» /wÕÖØÎ7´ÇwÃjڀ2[ äje™¾~gëø=vœÔO¸.Þhh ®\\´M—ìF ™èñE=ÌʾÑ2ÛìÌSÛÄ»sí¼7[ƒk…ANÙW?~ Oo¸•ÛÛåݺ£ðl‰X_ÑòºSë‡÷÷·ïé—ÆýŽiŒ>¸¼­ l⋣™ô&«)šE1†Ê/2‚¾Ð¶Á¿°ÜîZ+#~¼òìyÄuèÓu鎸¬Ë€Â`á .Nò˜¶Æ²Z°·Åj‘­–ëxû[]ñ«›Ñ?GÿÒ°oendstream +endobj +1639 0 obj<>/XObject<<>>>>/Annots 913 0 R>>endobj +1640 0 obj<>stream +xÅWMoÛF½ûW |rƒŠ%YR +ä`ÇIk ¶ÒJFP €±"—’«ì.%ëß÷ÍîRiŠE“8ÌÝùxóæÍðûYL}üi2 á˜’ò¬õituh4àó?ZRÆpôðߟ¿ž†1ŽÅƒ1Ž”4š ¢qøVÐÜŠãA4ågC>è¾õ‡ì©íãfqvùù=Å#Zdk<ŇÔ9íÓ"¹ˆûÑUGôh$ÝÏék^¥jgèaA¨HÔv-+›'Âæª"#õVêŸÏ0Êî½ÑÞ`£‹un¨”v­RÊ«­*¶Ò®“HӜ¯R™ûE¦ŠBíòjE¡®HmpÅ=3å2JT•Q–òïªOïO#¤ _þÈ*Ñû…cvJ§†>Ð_Òðµ>õÝôô´‘I­s»Ç¡c&oœk¬…S8~þ íÍÝlþT!Ü'•=}¹ýxþ‡±ÇA¢¼?v§h'ö.ïZ +Ã|™‹r)h—žÁ7®t2î–JÐR­jÓF´ùåá0ç‘{.jY*+›Jg"/™Bƒ>KšÃÚ§ãùu©:ÿ +ºBž[yÈ>”¿i$àáŠz§}+@29Br°7!wœ*ùFªFE2øDj+ÐBU].™Yè¤Âuow°°V–Ëè£Y-M]Xî?xÔĦaÙt«û‰pý{RӎñT•Z~¯s&¿ËP.]Fx Òc•¿HUW¾èLv̌ƒéð¨“oXagÉÁ!)XÝh¹EG!Ü3e¹'OV©:•²¤ÈqÌgsª„='µè'ƒˆîÅ7' c ŒmkÆISUqôߊ¡BȨƒäoËàÿ ‚ÇÞPAè鷕Võ†õÏ©âþ’S¿7n5„m:ê½{ Q£“\øówçÍU]rUQàóŽ¥sÏÖDðㄧ@^aù¸Xg¬² 2( õû™D%˜5P à›8âÉþ¥ +òºËÁōÝ~¸Cu +/¬\ŽºaöÁ(Cç,{óÆ*)1 ðøYÁ8;nÜ³"ZpCä‡iDÞE9÷ô1nFbÓè52<{ËökpjÃrÏQÌÝTGTb…|ÀRÀVŠ uۭځò4?Ðåç$ì½I4)Aÿ=O¨M÷üõƒ|±?šƒ#ú=¯ê2{±"ù‚±`›]à*˜¿ l +Ž")õ4a?=\ߢÞ3ÝÎî¯ïÜWﱟôâxzƒi¿?âø_ ÓÓ3Ȫ¬Øfò“·æ¹_%žàM)Ö(þRò¬9j;DÈ؅Ö¬r·šÛ^J;\X½[Pɐ©“5ïFZË܂tbt»‹YKÌpÏz_¬ÈÍúØpäRÚäҗԟiVÌ ‚&è}·¯Û£åqcߏw·®ÕxÂ`cL=gƒÂ‡ÖDŸa `Ç°24'®.±wšaÞærGÉZlxöºÓ¸ÿÛìëbõò$¼í†v8îÞí‰3Œèc؈cçWî°`°wõT–¹<è±]ɘ ¡Áx +_¶ºl‰ñ pÜx6v_;_thǵDQßcº +-ôy'ƒAßÉm +ºMƒáʝÁm©ªÂ +‹x;¸‡MçsÁm/È µMçùý ùyÚÇZLçâ1ÞæC¼ 9-˜_ßß\Ó­ÜÊw«7ƒÜjÆAôšã½Iï!acø‘—¦ÑdMÆS¼‡ÁÊdÄÆ?-Îþ8û¤Dƒúendstream +endobj +1641 0 obj<>/XObject<<>>>>>>endobj +1642 0 obj<>stream +xV[SÛF~çWœ>ЙH²%ãKÚt†„$}6-Êd:¡ÓYKk¤DÚu´+ÿû~{‘± î%0€iÏí»œývÒ§¾û4Š)RVŸô &I8¦Áx„Ï1~N û Œž'ƒ0~îÄhòôÀëô$z7 ~ŸÒ’Ç#JsBâ^Òì<-JE5ׅ̩+Y­¸"–ç¥.¥ ¹ ] YUr]Š{Z²†ámÞ(ÒÒ>Sõ<̤XТ¬øËÓ/H×£‰Ëăp€|çgg´¬8Sí-xÓ¾eõœÑÍÕúuö)QV°%‚SÅÌïR‰×£ ßCc.Œ6g(ˆg¶Ä…l¨–ZÎ5++upâó}%ç¬úóàß俸ȚÍR£/¥Ö²É½¢?øaîmų¶)õ/µŠ7Gbæ²f(½’÷Rüs¼Ÿˆ šÝRÅW¼2ÃNêÚA— Ïd]s‘óüH*©üÙW8ê߉ûáÐÌêóômúaö~6=Öû’éDJÖ|]°†G¥ˆ Š‘Ú(Íë#9Îr’¢2SظQí,ˆmv ㈋™'hƒA%FEù@.±,“­Ð$8xgÎ)C&Ís³¬°3ALњW•ùkb›']¥ dÎ¯oéS)r¹V4M£Ø0½Æ[¥à!¥{tVºi3݂=vÜßÚ²áyhÂEï&[Íñر4¼“°ÒGÀoYrк{ïҖºmJL£‚ -¹*sŽÞ ̜rdË´l6¤ +ÙVùNӇ…~(E»–aù–¥¾m Hz³,3f¹d„‹„ÏMfTv FÅ`¸ïõ©`;ʟÙV`(Šæ`Ȝ©‚‚œ"ÓCtj„Pæ§ÔÔ}îàð¢} eU–ÿÛ{Do…‘ÿ×äKúy¹þÅíØýäãìûCàmhäюCÚ#];.Ñ¥ãìq€k0<KõœnÖ䬴ÃsCfFÞ8঺1ׄôû· à–sK`ڍÚS`׿ګP°Á6ç«H´PÙ©WÎ_¾zw÷C—ñ¸Áÿ9³‡aÐ^6“ÊₕevWØ]\†!½‘"«Z…-õ #gnÆ^uf‹Š?”óŠcã1x3|F.y—ah'†Å ët|«!´€URpÑW e@SIjɳ:cn Fã\RBvÆð 1Dw¶ç*¤ Ý4=~.…h:K·~!¸¶žiWŠ­£Ì¸za»0zöc-]»«œíúª]D“.0ûÔçCó QýÈ=—aÞj,_ì8};rÍZ¾¿ìX% c¨¤±´Ž94·sÈt£43 >/XObject<<>>>>>>endobj +1644 0 obj<>stream +x•WMoÛ8½çW rrÄu7Îî- ’ÝEÚmÜv¹Ðq+‘*)Çë¿o†”%ËNEÀ±¨ù|óæñçÉMðsAó)]^QVLÆz7¹Oiv=Çç)~½¦•<¸œMÆWÃï'oï£é„+غš_Ó"'ؙà›lt[¨ºÑž..ÆôõáÃßôYûʄ`œ¥÷¦ ¤lNߍÍÝ&ÐÃâÍ⟓ Og02ºÉ2Ý:ÛxWÒGšÀØßÅ<ú;¿œ!X†¸øfôÆØg±šÊ>ó?â·Þù ´üuSèžÇÉX|­½i¶”Uºçäo†ø“¿é5€¿½!cÅÈ£ª–ŠK^—ZM&È#µ4%[[9ß˒²Òh‹ä‡X4Ÿ4ž¬j̋¦]A7 â”P“‹Ë˜h Œ–î_~ý K¶•ËÍj+N×6×¾ÜK}Üø*¦ûàv¯üAÈm¸ø˜)¯W뒬Ã3G™«jïÐ9‰¶ Ò­Ä¥”¸p¡¡X ðkk9gÏ$ÀИ²LîÛ\ÜRoáµ,ÅÈʔšº>ÁB©¹ŒˆN%»*¯Œ¼jPÑLYDÒHRCPH7Šé˜þt›]©ÄÇ®Äak9H8¢ëH·ï‘;²^h†‘ˆý;#ÆQ©Ïñoöƒ6¦)$ož‹†*Ç­]®›^ؑ 8Cž¯3d°eµàÛè|P¢Ü3(J`S„W¿>ÜR­šbLß ñWi»¦ÚÕá|]Ÿqlª˜ÏUBïˆ>{‡ú6Fp="ÀÑ´CÐ¥Þ²ù7m㌖¥gxÒº–¬­ó•*cŠ€Jò“æˆázÆňUêOŒolP¡©" D7j X¸8¥ƒŠ4®¦Jù±Toï»ôÓðî·q4¦Û®&ˆ[Œƒv¶npà8hFµÇßØ®pvP¸Ž=ÆŽÞ¬sÃs;<ÇC04ûicµ…©‡Ë}ÐÊWÜ´€“¼2ÅÔÀ%°ôj +¤ªž5݀¬~®uæ¨ʀM|‹úðȺÌiù$¢#ÄQö˜HÕµVžL¤¸Âçøv¤VºéOë£WµxØ&+ø¸æÁW9O(ˆ£Š@÷^”'ùp.T*³$qJ#¡ªÁATàòg8á9ŒÌŒIÞó2&ÁtbWÉÞ¯Ö6k°ªÔ¸dÖÛÁꈳƒ÷Si0^ôâl¹eŠg&Ø:ëæòÝn.obzoï[êíõ‘‚µä‘"Ì¥*Q ČšÂm€oGK^%Úþ’/»©é8y#§µ'“iýX"§;DŸ Ý&ԑÆ ²ÊtY²Y™É‘ÛØXÁgП•–r‡Àžâ g«*'I'ÖÂÆ­è÷D[hÎ#-¾ÓÇ»/ßî¾<= lŸF™kØÎӛA佗À¸íŽP»ÞECÃl¬/tóþçG±ÜFÉmzÑ>±GgÃyŖD*©ö—®|»)†³¹«÷Up´ÚyÚËù—¹™7uÔ% Ó=™(„ÒàϜaª_d s…-–·Ê菻ÛOl»Ç+ÃÔÒO¡V!lœÏ)W f¨§§7{”¸¯íâtîBúò``€|Ã&‘Åç¹åÓ¶û"eÕÊ£ãX¬ÃÚX(Ž {a]×Î7GŠÕÁ3Ÿ@A‹:­TyŠ×t7a;¬†}j¹ŒÔu¿M¶W¸Ó;fë¬t4ÌckŒh¡~hút|º¹&2 "rUŸÌ¯«Ø>`\rÂ!œõA—+z‰þH a¤v½d-å&Ô¥‘µË€ €f© îWIˆ¸8h³îÈžeÊI‘±"d²\Jz~• +ÔøP‹€5¹`Dfw¶¹—k»S U»U Cä@´ÃdK`çž[õ¢L©–,úxÄpco:Õâ;€'>¦ÈpV.©šl”²ÚùÆÄFÄaUGÎ—ž#ÝRìµYÛ8N5­–8Ê©¶XËÃڊ{i —›$oä3éXZG‰þáaTЙ  ¯øò'ú^̘ÄÓvÙ dëîmí®ƒü2g-$vÒéö¯h‘yyê¸ò¿‚8)°f€ .ÐúÒeP¸‹ûG~ØB;A&×ó®UIÏÇóÀZ¬“èù$6¸";„ ðotÆô$¶¥YÆo;ÎCûww<ö +~ƒë+$Ä[<}Ø ͟¾‹·¾ÿy)§×.â³ùl<¿ºÆµâùû»[œüuò"Ÿendstream +endobj +1645 0 obj<>/XObject<<>>>>>>endobj +1646 0 obj<>stream +xXMSÛH½ó+º|Á©2&^ö²¶ØJ¼É¸Œ¥šEÒhgFï¯ß×3’-Éä£R¤lfÔ¯_¿nñïÁŒŽñoFËz· (?8žÓb¹˜žÐüt‰Ï'ø1’0ŸŸL¯ÌÎΦóáÁÅêàíõœf3Z%p²8]Ò*&88>¦U4þC™oè<˔Õé„\*é^äkA+)ò ‰g¡2±ÎàÞèÜçB͝ĕd•“Ó7«àèŒf°ÏŽŽÞÍÌ*ÏfÓù”¾(Y«â‘CÚP¬ŒŒœ6*¥É•µJ6ØØ{t²D¦°±BL.U&¦uåâT– ÷i’ÓèngkÔ76nžœÒe¦¢'f`ÓÒÚà›¥ª$°D¦i­_p&ÙT׸¡]ÚúCf³w( ¢êDN¢ˆùýõéæoÒu!M‹å^ÆSât¸•-3±‘1T6‘h“Ó¯ýÜàõdðÝ_}þrõùᡲpò0þ ‘K!rùðfs硯)êLŠ-\ÁЧ-}’îâæöÞ[nS ´€Ûgi&CkÎ7lùH9Ä֐GÉÿ¶N5?ÔAÀøâzª€~E<ôÔËù.ci#£J§ž%YÇ&Ë©dßç¿p‹,Û÷ +ElŠðûÕåíý ²DÉ,î¥P +kk ZƉµ°¨o„ò7¡£Ja¿k!Ú¡p$¢ŒlU–Ú¸W²±Ò‘ÓN ¾‘ljÈlSж_ƜUC!ßež…µÊ2Z0¹  ý´òÙ›mÿtj0ºB…7ºF·<ïrÏ̏®+ø½Ô…3: AáèZÈöš!VIÎÎWÆx6Xユ%턬¦›Cx +õFž\ÙZ š AÇÇ –rºë¼DëvÝ +éÚJØlJ×lón§1ýjqÑY\½ZYâ +0cKõ·FWå[Ð$#KØjU#ÒÆH[ê"frŽŒñhB£Ú@Yùƒ|‘Q…ßI(XBH,e =Yo‘V$‘’d&sÀJ(ÒùåªUÐ6:4‡:¬ñGuørHkålk˛¶ûÃdñ s>ÿtç¬fkš3½æ¡ú&;[röáOÐÁY¦ë9ó3Íq¿ö7W ²¡6>¶N¬A˜ƒmÎè™êq­% +ß{Üi´]£ªÇ]¼úD¦#À°õ¾ßcò2U0,áÞ­(Åã¾ éfԴڅٟ@pYe/?/A'+[yÙgv)Y4DÌÒÈD½ìÈÄ:¿ŸÅ=*Î£HZ»'—Í4ØxNὨÕ¼n¤Ü¸* ¯a)ˆUè^ˆˆÛӜ9,£Å©¨ÊDCh?×|yÑ +­‡¢@]Ðö„~£,}&Æ&ÁÁviÔ÷6â Å9›kh³0@®]5æE¦E܎—½:®ÄÓP;ny>ÙT•{¨±. Eö'±âÔ©‡ r) +?Î OLJ7>(#y|¢™!Õ mýdéÚT<· Á~ïŽn÷bƒ(2íY00¯jXˆRmt&ҕ±AÝð$ 73­ŸPr|ôŸ4zBmøümM‡…Sú¨Y]¤ÃòmêÊ_#ŋ2ʑ*T¯¯-_¡|‚þ`’Léývý¾ûá8kïbÞr ^²ÐÞ×÷aÆڍu2g‘y­AôfpuèËoÐY?nùx(ÎÊ7XGn¹9™ þnØmÚñ¿¾VfÉ$À€b´½›ëíFÍã}ë²€]‹tšó°îqöó×Aõ;¡£­Ûd²áÁw2¢ãÜõÇ1ÉñfÃùY^ŒyeñÎËèO,/“íƃ!²Fû…±Ý[¡šìZûCÕY±o Œ[hvÐv¨Øö²È¶ìmLûÑѽԆU ‰9¤_)éÒªÀû vxø¸'{þŒÇ×ÅV^`|8>÷ö­²ÖÖ¬Æî0óæ=fãi ˜žíuÔª›«,ʍmÊHW/>(Uè&'q€‹äPïBøTȺŸÀvMCsùŽ¶)/q!ä#ÑØMGŸ6ëÿl¿ +œ¾ã¿ðÂyþñâœîŒþk½×QÅžp +†ú¨½~´<>Ûî³?ÿJ>_ΧËÅ)^êák¹d“W«ƒ?þLÙ@»endstream +endobj +1647 0 obj<>/XObject<<>>>>/Annots 918 0 R>>endobj +1648 0 obj<>stream +x•WÁrÛ6½û+vt‰2cӒ-KroJÝ´™4vk«Ó|HPBL @šÖß÷-Jé:kX¼Ý}ûvñãlJü›Ò⊮ççg“hBóåm4£Ùrç+üI©ûpu³ˆ–ï|€h~=›M—Ñ5ÍØTN³›ÛèÊÿ'£'of+9]ͱ +?KâŸÖg—Ÿoiº u +Hóù >¬gyBëx<F7}ӉJ÷ªØRª2IÚP¢ŒŒ+möTJ“+k•.ìÇõw˜›ÑtêÍ]\-¢9̍{ûE‘¼o€”%aɪ¼Ä1xŠw¢Øò¹ÕNb‹-3±—I÷LREø(2½¥~;gº˜^#8œO‹3¿;åM@9¦‡¯§¸Ç´©«Jý¦ù*Í9€tüe*W•¨Ø[¼ ª­4TH™à¦ Ö5¼R§çÄG‹Ìê"UT҈Ø[iTµsØ +˅IèIäÑñ‘ra_ËEY²:¥»‡'UeÐʆQ0>HzÇVâEˆ/ˆc]UV€3՗Ô!)…¹FqUãŒl]–ÚTþk›î1'ÏʊÏ÷_@qG„q +<̑c>¨€O{vBæ¥ÛÇÛ­Œk£ªbQ£²ŒR¡2Ò혩içÁƒ(u‡YT†žWè¤MN»ûP™UœØyom°x;ÈXÌÃìíèÂ×áâ;͓Ez²w):2Ći Óµo[<†'%å§æÁxÓ££¹l.ß(40Ýߐ$ôxž`Âã/6På.D.¹–ëµn•¾ypÙx%=MÖøÛ”6cÇ荏Ԉh…ÁÛu%Ï+f‘»k¹Â×¼àaѕ«¦Óþxž;Úہ¿É«3tÈVïØr.Ó9.µËk\q§þJö´úöiEý]‹ît\çhîZÅ;/Ú ‹É-Éÿ¾…γh1_âJ‹Ý‹%ýe}öçÙ¿"'à0endstream +endobj +1649 0 obj<>/XObject<<>>>>/Annots 927 0 R>>endobj +1650 0 obj<>stream +xÅWßoÛ6~÷_qoqT‘Çvì!Ś¡¶Å}¡%*f+‰®HÕõþú}Gê­hI»b8 È;Þ}w÷Ýñó,¡ ­t½¢´œÅQŒ/ýϟ¿Î›$ZÒjTÒurƒÿ~UÐÃ,\cw¹Œ®ÃÝåmtC7«u´`Ùõ²~ådƒuIËds¶®±»ÜôšXÖ[µÜ° 4Ǜè–üÊiÖlÕ²Án°f«®£$Øe?‹¥Ó»^D«vÁjßlgW÷KJÚæ€mµYÓ6shÅ´MçY—Ê¥+½Ú~œÅôz±vÛlþÖYY%ŠâtIÉZÓNYCª"»—|öê^´zçddÚÔʞ¨æ“ßì.»oø9ÑN’­¥°2#aH@ʒν^(¥ÆȚ”ñò«^y¥íX%¬ÒG¨±šw`urxÁêt/ªGyI¢ÊHWÒë5.Þkÿý-4è /5Fà]N¸ÚY)¿ +•*[œ B:ˆZ”Ò:sÝ«nƒ¯ôEd'€Jÿ“0 :¡ìPë/*s8‡Þéò ¬Ú©‚±>*»§Qî-¢Q;î¥ó” ìÛ:G¹H[1X¦*[ë¬IeÑV{(€'˜–:Sù‰õø]=Öº9\u]dÁ]˜CM® +„€£; ŽÅk”P´.Õ~“_mëHº—é'‡\k÷¹ú\×­~BU†¯h£Ì÷Mg'¤R {ºÕØ°0úê£Ñ]…”圷{aéÈØúDAÞñ—T×µ4Tƒcî¤óYÓEráM9KNCgŠ?ÏÙ1gU׫ü—n̓<}¹þ„½ä ªF壯ªÇÀ È}Aí¹¢‹£8x"éBWcÿ‹ªòîjëIxC~´¶dîÿSiù¯4!ûl­RËôíQ?ç&.·8`ûô *õô;Ðý‹ Ž´@ދÔ¶+X_Gpàs|­ ¢tÉzlォùLÕ2µº>µDqT #°L)JG½_@Œò1“&­ÕŽÛÍNqÅ×±‡üšÊƒáqb·<mÏcÏ3:™hyÌLR åcω¹¶5ðXOÝû$ϧ¶ÿdÊ7Dq‹‰Ü™²l‘Qڝ˜\4âޓóȋÍs¸jjÌèo`(xh#Ž,߁kÍ?`ýè‘• Ùvª§Þ#î/íD€®óM3ÀK<5º>ڝ®9¿ãµ·¥'+çŠïÒÁ qFG®C +LY©*ž(^Jñ…{¤ë ~t1{ðwU7ç¡3–«Ü j\§<žàVMíDÂIÜïÚ%E®]‚NƒÆ‰Œ.tÒ œª0AhgSs98kà0¤Ýµ¦½4o`Hªyl*˜®†®8eÜÃgU»ITä4p¬Ëd%Ý.eZšêÂúñçOܹ­J›BÔí â*cÇMõ’õ{(ùþ\ó<Ìõ)s>©ãÁÔ¾úAǔ»åæ7^q̇qhîìîYÙcb2U¹J•ë8ô“꺼ëRæŒãèg7ó²j‚{øàèTӉ/Ï©œAiuÊ'{ï‚VqÉn‡Cµ‹o7î›g¼îƏ–üýÞÙn¿/ôM”ÍxƒGèjmøóp÷þÍý^돀š~ÑiSâ)æúôºx½Žoù|’D7½wc:'Ïßè¥4`1T‰{]-×Ëh½ÚàAéõ-+}»ý1ûùÄ endstream +endobj +1651 0 obj<>/XObject<<>>>>>>endobj +1652 0 obj<>stream +x•OoÛ0 ÅïùDO)иv’%é±ûS`¶n˜‡íЋ"+µV[Ê$¹A¾ý%;KÒ]6’˜"|” +ÊñWÐrJ³Év”g9-¦³lNóÕŸ§øwŠ6ñÁl5Íç^—£ë;AEA幫%•!OžS)ǕvJëöÔ +ÿtYþå4™.P ¬Æ뤢£[)¹¾›‚w +B:¯*ÒÆ%*² +µ¢­p¢UA9T^vžcjDg)× ÐÄâ&³y*\Ù2£÷‡„ ÚÚéPÇl>S WÑWÑ®mt£H„àôº QëÏSšVl·Ú<¾”¼'ô—R ʓ·­¿½ÿú'%­uðô0ö¬Ixºp±5Óì/.Ñj°QÖ·OïÐV¹V{½žs%u•µö=Ùb–M¹r«b@̤0´F$­Ù4Z| ;¥L¢wș”xèY‹ÄBÉÎé°WÑØG™¿9«ÍÖûxJˆ¼â\ŽlpoíŸÐ>ªõµÝQ·%|ÕC›TŽ±ADFBJå=ÁD±–ÝåHŒ²ihHqJ<ÏIJ#?• ~b½†—R÷}3¨:#‚jzµ=‰àC²è&Ô"0î àÕô¨GyV^#%D¬åaqÅs:ß9× –¹Ä +€ÃeSç²æQ¥jÇFDÓ(B[¯šgÄóë<,ÌϤùÓá_‘„wž¢Ñ®ï^õû9¦‹û|òÏΎ %ÙB>ñgÖx`|Ø%(ëžíÕ`-óU°µLáLvšÈ5ô©ìÝ5¬"øÎ ‘L,–›Ë$ºžv‰ýÑ €MÑ_ð+æö[ªÿp™Ö’†EÄ Å× a;?VÁ{é.“æ{„µ÷äÞvgh°]SÁ X6OµŽèNfùF©šót}ò–‰¸>'Gþ>~e|‡«'r„Gƒ;~…×É>+çtU)ý~}·êU,ðÞYÍhV¼ê/Ñۏ¯oé³³?ñ"¡·Vv­Âbñ­ÍýM†“e~ÃWßÿÞíÃíÄIçËy¶\¬ðÊ@ÂUÎ?½+G_F¿‚BÂendstream +endobj +1653 0 obj<>/XObject<<>>>>>>endobj +1654 0 obj<>stream +x•W]oÛ6}ϯ¸@6ÌZù#i’ØCÛµO+Ð!Þ[€Œ–h›«DºüˆãþúKŠ–¬¨[¦ICñ~œÃs量Íi†sº^ÐÅ•ÍÙûåÙôÓZÌh¹Æ›«ëZV4+f3¬”“[±óÒÒ|QУ×j¬Òúòî3­¥J9oÕ*xY~¾Xþ}6£W‹K8™”R{+êú@Ðbƒ"ø-U)¼2š7sìùuŠýêâ²X°!‚Í ºÍJÐK{/i>o÷.®‹+ÞûŽthVÈЬéO­Éœ—£»‰Ü¼¥Û éÖÔÂ*w÷â% G{Y×ü™Ð#ž÷·¿ÑZ4 +ir¬ß•/I›=¯jõ]òÎ×ü"%ø¥›XՒޝ ¢Ï¦ +µäàÈùî—ðáä í¬yP•$02 yÁ±ê{ä%æa¥3Á–ÃÈ¥§¦&'íƒ*¥+è‹U8øg@ŠßV¡dz™dçTÉR9^Â¶à‚F8Vx˜Œs´Î퍭˜+áÅJÀøn’2Š‡1™J_N£U´™~ÊÇ4{ꊬü”T&b6H°—†‹‚bvÀÔÆ +œ¡ß +äÍÉÚó‡A^·¡Ül¹5`¦ ¬ôƒ©1’?àƒ +÷6|Rm6ª•ëÛËá¦QžìBvûQW(›,/ðY´(WE¬%®·V@Yn…V®I¡ +! -KuCÊdu°ÖÖðnIAWÒÖTñ€ÉÓꜞjR鵨uh+X Ù!!åacO@qKïPâ֚°Ù’Ñ’Ö +%’xª¥)Ø4½Ëœö(¸›ôªú^HVÊsëQºR(¤ êè¿U‰€ºjƒÆ‚L”þaСB‡³"G¢ÜYObW8¦°ûoÛ$<ÔQûpލPõSËç¤Üž9èÓ³©^hCêei‚öm¸H›S^öÂ{Õȑð'vã {réqí ^|ù;ªqËsˆ¡o;FVŽˆszšðùqŠ¦ÀcaK‹’­k§èíá׋ay?#ùëÝ ‹xQ↍²3{¯˜½VîjQÆ&Ò¤{ 7(Ã÷ƒ¨ ¾u‚\êíý@鲕l‡äÓBü‰¦+¥§(ð)ÐMó$z‚­¹‡¸·?ßÚ³j3Ü´V«Fù¼)öõÞñ²‘.w÷¬ÏhÉ ¼;]ÃäêByéŸFÌeƒ1Öφ=׸íÆF“Aԕm‹ÈãÍ×{ñÜDK#^*©»÷l¡œ \™^k µ]ñ²“̵VlÑoIlsIõöc/Ç^’-:Í'£˜Ë×­i0ŸmŒ6–Kê坅Ûâ~<ՔKÀõ½9âEê‡î=Ç­+Ñ?¢ˆ¨1¾êvx±¢R!‡Ž¼4+®´£¯q.¬ÏÄ߈—ýVJn”Rg‘uØ!ºO÷Blñ‚˸S.³»Vg¯y-æÒ6£ÖÍH}ó”ën.ùŽÁßh<àŽÓœ/Ömåã;…_ñºÿ—3äÙÚ^ìV¯9vA'”í· +Wgxˆ®’ùM÷‘vq•>ÒþçW$=çËñòú²¸¾ºÁ7+†ü͜c\žýqö5ÿ“Wendstream +endobj +1655 0 obj<>/XObject<<>>>>/Annots 930 0 R>>endobj +1656 0 obj<>stream +xÕXÛnÛF}÷W PQ‹ºX¶œ}pà¦Pi­¾hWäR܄ä2»KÉê×÷Ì.)Q”¨) +´ Øârv.gæœÑ—‹ ñwBó)]ÝP\\Œ#ü:yÍhv;ÇÏSü3’R~€£»ÿ~ýébvMèz†M®ÇÑUø%§Ç‹7‹‹ÑÛ Ñ"…ý›Û9-ÿö˜ñÀn­“UÂڍ6 %‰¥°’>^.>áUö_Œ¤‹Gþ\ž´F—ôÜQ›‰DoÎ:º2º®z'?¾¤r¹LR¡“:—‡—Œi8¹Š¦fP‰âw[,Ù·ÈêžÚd*Ψ¶Òz[¢XŠ}˜ái¬K'TN<¨Øh«SG÷3’el¶•“É.G|AçöLØLڈ™²{»øÙ:mðš*I"iŽ²T[3Êu,ò‘e§F•Qká䨉es”ç“ðµ FN¾LÚ°/‡6BUý›QrúbJd%ËD•+Òå>½L¨¢Êe!‘J§p,Ņ[]ú­TO£ŸUY?Q€'Kö=ùzi­Œ^«‰]n)s-Å…=o¦ÑMräÔDôÎQ,JZJŠuQ©Ôij¡C5[Ú¨(&àw¾#„QZ@ÃP&ó*­áÇ^7#óM°Ðòf;¼jD儕?Ý·úc÷î€ Bõ»5v2HXW;ÙM2´Qȁ‘"WB(]Àå6— ],KU6*=ý[‹Íeðf¿r@‚ÁVr´û1 ží4‚±Û2>Œk€ ž…æ\õz4ò'"O“‘6«‘_¯ՎËH¢÷—¹²wŽŸP-Vó-jV +Øå^ÖdmÂ÷ß#xÀñâÕ-ÎùݍqÅ­ýq W¯CãÂ)±X{âE¯yEUå ‰7k6Gډ^Ãôêýæ›2±f +o*ܯРJ$kàX¿â&ð:cœ‹ÈbÓf¿ýßÅNÁÐ}»æ„üÞ6ËáäßÉÜ^á •qØeïÞÜÑ£?a+¢ûî®ÅoÛ†ó1Ö dpLgóY4¿¹ºñÂí”íü¸¸øåâ/¬ +¶¬endstream +endobj +1657 0 obj<>/XObject<<>>>>/Annots 935 0 R>>endobj +1658 0 obj<>stream +x•TMs›0¼ûW¼[™š˜i§§i{J'­™É%„Q*$Wqýﻜ`§—ŽÇ‹÷±ûö­ø= i‰OHYDqJe;[KJ³4ˆ(É3üð5œj@êËÏÏo³0ƒ„Ò(AJK!ÒÓñ$i=›ž[Š–×A<‰Nψ¦ËàzMÓ £«$ rtŽ—p†“ï<=#zœEç“èäŒh–tö¹I½þ¦˜]~M( ©¨¡WšgTT½K*Êùš›gQrzœ¯n׏$YM53Ä,Ô«ºÒ ­H×´'f8#ÅÝ^›_Ä:×påDÉúgX]‹2¸(žyM!<ä"N@µ¨æaÄݯîè³VµØvf(ô˜í&(ñp¨}¥»ˆüjP[4»–Èìz¼I•LJ^‘ÞðíX æÖÑs·¡˜j-¥Þ µõMj£[yÒj!…âÔp¹CŠÁCa= Ðc¨ èW¸õêø8F£têКµÃE¾¹ŸÃÇÉiâŠm$Ýn§ƒÔ"à £ÂÁýfæ‹Å^¸fò§Ì/Þ÷¬0—a-wÜ`Rzg´<#»o8æ2„Q”v#1ÛèNŽê@þwP±,u§Ô¬ÈrkýŽ[¦Ø–·Ø(UÂpˆ÷ÌGñ*^³N:Úð†= mÎ@14Fíì0§—±”rü N]¢•<ô°¨[¥!Sx2Bí[>}×r6̝!Â3¹g;¶³½ØžÄ2üâW^2ð„Ÿ¹*Íaç «µ°seéŽÃæ’øÁނz·ºê$Dz™ò:wÛ4ތjË/áV€;cÒò²aJØW‰WðíHm‡ÐòôÎç¼»y!zdŽõw V=šñvØÓ_}ùõêè­ß Ì«ô™™aŠgSö—n½º»YѽÑOpÝê²óîè/­¯[ÓÙòú?.x’%A–æx5àvå±oõ¥˜ý˜ýP¦¹þendstream +endobj +1659 0 obj<>/XObject<<>>>>/Annots 942 0 R>>endobj +1660 0 obj<>stream +x­VMÛ6½ûW ÐCÀÖús½ v“ºÉ!(Úuu”D[L$Ò%);þ÷}CJ²£dQh$9œ™7œ÷fþLi‚¿SZÍh~KY5˜$üÒýóû/ü -—Óä–*Z̓EóQÒÓàê³¢étš,¯g«I2§Åj†+Íîɬùâ«×ßÍg·ðmÃéÝ2¹§Åòwp:½cOá‹O¯¿qºqºÓÇÍàf}O³ mvÀv»º£M á—løº/-Mç ½5Î+½'AïUf3;Oo”óV¥µ—9­U)_l>&4ž-àeøtv^V䭔d4=‰*lÀ§«pS%²BiIÛ!ÆÁXœ’ÌJ…P07”ZTEâ9k0½ôBK}•Œ!©EZJzzÿ8N…Co¾Y?…ʆ #ʌީ}ÍåðtR¾à×`ß7kÑôېÆc>W.ßõzqHæÀO›Ð¯:“”Öªô# ì:üª]Ð(GT6šR À9:%”¢9HÏh#ßuä¾4x9J)ѳý”B%¿™·u%™ª*¶V¼ µ -aã<öo«€ìÒyŒ®íâTïÂh™NZ|aøÁûL$GÞ±.ùÙªVÇҋúÚ؆T†m°®kç›WŠYÀ4Ÿ@±Š›¬Tù2.Ô!£Ÿ°«¡@ŸZšWöÝo“òþ ³uV:g·hEkdB õC¿¹ZÚÒuì9…G9Šl²LfwSl0.9áÎú Ë=ND$†0R»Aâ"7¡.¨«ÝL¬Kõ%¸J"AÀÅq@< 8¯ãqxf˜¡ri!Aò2=.¿‚J†j|¨€†ˆ‘Y…ÇN ³Í\Ûu1IÝ^ˆ!t ªa xg*ã>/XObject<<>>>>>>endobj -1617 0 obj<>stream -xWMSÛH½ó+º|Á©26`“½l-ª6 Þd\ÆÒM5ڙQ„÷×ïë-Éä£((›õÇëׯ[ÿLè?šOédFÉúàx|L³ówãS:=Ÿãó¿FÒÊœžÏ_;˜N¦ãÙk'gû–.ooÞÑdN‹œÏflt‘\Ó"N&ãÓ1}V²VÅ­T.IJ•‘‰ÓfC¥4ke­Ò…}³ø -c§4™cGÓ9Y¤ÃE&Éeʤ´¬œÓ)‹ï2Ü?kîip¿³5è6OŽé*WÉ3‡3°iiiðÍRU’@X"×O´Ô/8Žl¦kÜÐ.‹þŽéhr2žrT­ÈI)ß ¿?ÞþCº.¤!½òÿÙËxLœN¸÷©²e.62%Å¡:Ú¬é·nnð:|x<\ú|ýéñ±²pò8üS#—B¬åã›^έ‡¾dÒ4p‰-\ÁP§-}”îòöîÁ[Ž©<ˆõRÜ~“fžÛYãp¾cËGÊ!FC%ÿß:ÓüP Uã‹ë©2b`ûž:9Çe*mbTéÔ7IÖq…I¥²pjµáόsƒ_¸Ežo€{…"6Eøãúêî¡ÙJÉ<í¤P -kk Z¦Â‰¥°¨Á¸y(–ë6° ù»Ñ¶Â‘Hr²UYjã^ÉÆJGNS8AwûÞ®Dn›‚Æ~rV …|—yÖ*Ïi Àä‚D€öãÂglÆþiÕ`p -ot!{ŒnyÞæþž ˜ÜTð{¥ gt>èƒÂ жí4CªV+p¶p¾2ƳÁz÷Q:”´#²šná)Ôyrekj2-MYbï -Èà®óVÊXçƒôZ†>c-;:tqËy ›Œé†mÞï4¦[-n7¨`P+ë@\fl©þöÉèª| º€D`d [Q5mŒ´¥.R&çÀH‘F4¨r’?È™Tøøƒ„‚E „ÄÖ¢,¡'Ë …ŽU$‘’d.׀•P¤‹«?©VAÛèÐŽè°ÆŽêð吖ÊÙh˛¶=»Ãd ñ s>ÿtë¬f4MO¹^ŠœóP}—‘œ]ø‡#tpžë:dÎ<ȕuܯÇͨl¨­kfÆ`E«3:¦:Bk‰Áwömר*Áða¯>‘ë0l½ï&âüƒL OH›ïWsîÕ©v FiËP‘wÛï× æA± Ww¶0 -ÀT‡ŽyíϽ^#;T‘ßBْ ºÓ‡%¼_½[I&Š§}Òͨ‰Ú…Ù¿‚àô²Ê^~z^‚NV¶ò²ÏìR²hˆ ˜¥‘+õ²#ëü~¨vºHiíž\6Ó`4bã9ه÷²rTóº‘qãbü©ÖꐁX…¸=͙Â0ZœJª\4„ös͗‘­Ðz( -ÔmßCèwº-p+Å&ÁÁviÐõ6à Å9»ÖÐf`€\Ñ(ŒÆ¼ÈµHãxÙ«ãB<÷µãŽç“ÍT¹‡ë’pP4l{+N)p¨b-EáÇyáéøøÆe$O´ ó/¤¤­›L/}@›‰oq!ØïÝÁÝ^lE¦= æU I¦-€€Î$º2#H£ž%áf®õ3JŽ/‚þ“F(†ÏßzÑ´X8¦šÕE:¡rVUþš(^”QŽL¡~}|}‚ð Jø“I6Óûíú}ÿÓqïbÞr ^²ÐÞ7aÆڍurÍ8"óZƒèÍàêЕߠ³~Üòq_œ•o°–Ürs2üÝ°ÛÄñ¿¾Væ«Q€ň½›ëq£æñ¾õ‡ YÀ®E:ÍyX÷8ûéK¯ú­ÀÐÑÖmrÙðàQ‚qîºã˜ä‹Hx³áü,/Ƽ²øFçeô–—ÑvãÁY¢ýÂØî¬PMvÑ~_uì[B#ÓÍÚcß!‹|ËÞÆ´í»AmX%А˜S@ú•’î!­ -¼Ÿ`×I{€;²çßÈx ùÝ.ÂÊ ŒÇçß*k]aÍjìö3oÞc6žŠ‰àù¯£VíœXeQnlSFºÊxñA©B09¹ˆ=$X$ûz§BÖݶkšËw´Íx‰  ‰Æn:ú¼Yÿ'3¼ÍŸŸàm{ê߶‡./èÞè¯X è½N*Þñ„ƒX0ØGñ£ùñ»íFûë/å§óÓñ|vŽëílÂ&¯üÀ`'4endstream -endobj -1618 0 obj<>/XObject<<>>>>/Annots 903 0 R>>endobj -1619 0 obj<>stream -x•WMsÛ6½ûWìèeƖ-Y–œÞ”ºi3ùp«Ó|HPBL @šÖ¿ï[”(ҝi'#™ÅÛÝ·o?Φt…SZÎèzAIqv5¹¢ÙòßóÛ%?ãc%eüK_ß~=›Oo'×ts3™QAó›wøëÿ“Óƒ73ç½ÍXåŸùÅûõÙå‡w4]Ò:ÃɋÛ)­So÷ŠÖÉx:ÜLè‹IU¶WzK™Ê%K©²2©ŒÝS)m¡œSF»·ëï06§)l°±‹Ùr²€¹qo¿ÐéëH9Žœ*Jƒ§d'ô–Ï­v[\™‹½L»g’Òñ¥È͖6æåœaàðé5€Ãù´$WÉS´PÞD”cºÿtŠ{L›ºªŒžÐo¦‘ÏҞóˆ¹À'W…ªDÅÞâWQ‘ ÚIKZÊ¿Ú`]Ã+MvN|´Èé!Rº’V$ÁJ£ª÷ÀUX.lJ¢ØˆŽT÷„ÀÀX!ʒÝ0ÝÝ?¨*«€VF0Œ‚Að™@Ò;¶OR#^¼ IL­«I\JÌ9T3¤VC`Ä!Tþ&9¹º,­ÂÛ6ÝcNž“ŸހǞã x<˜#9Æ|†O{vB¥ßÇ۝Lj«ªbQ£òœ2¡r̝™©-w0Px•59Èv˜&ÿ ŠŽÖ¶›þ‚ÞÎzPv(<èSׇ80‚ՐÖã -“¶yjwŠ´³ª‹;¯­“cÙ=ëzÀ=3c$;´|¥²ž@Zö>[G²¸8’aÄŒ'2}R]atL:=fÚËæò…béÃ5Ô@»ç1ö Aávî‚@Dᒿfù¶ëGRúWPÕÓd±íAi3vŒÞø˜þ ­0}ûåg܆ï8þÂå» ßmðύ¾r ½™¾ ÇóÒ^­HfX£Y¶ÒÇôÀt¼Œ…u/Ón¶·×´Xò÷‡Õ—÷+úݚïèmtg’º@Óð×.6zÑn¸X^½ãõÿû–:_Î'ËÅ-î¨Ø½˜±Ñ_ÖgœýùÔç?endstream -endobj -1620 0 obj<>/XObject<<>>>>/Annots 912 0 R>>endobj -1621 0 obj<>stream -xµWÁnÛF½ë+¹Xlš”dI.ЃƒÄ…MÚZzðeE.­MH®Â]FV¿¾ovIŠ¢˜¸uQ@.wvæ͛7³_G…ø‹h1¡éœâ|!Þ´?ü2š,£`FóÙ¿9M£ë ¬Ÿ2zuŸ±:›Óîêì&¸¦y8–¼w±à½îÉíí<ç4‹–G«Ýg¬Î–­%Þ뽺ž,‚9[—Á ù'g¹óÌ^M°·³Úyf¯¦AÔYEð4¹áß°À¼`³ü2ZÌðn¶äP&ø/%¥£·«ÑÕ݌¢ˆV)ðœ/´JŒ!­âñ{cda•È²ýý%KMke ©‚ìFž¯>c³¨7Éȸ*•ÝS.Ì¿ØX»wøÙÓZ’-¥°2!aH`—%z»0J•‘%)ã÷Ï[ㅶ}“ðJï`Æj^ é2š¸?Ž7¢x’$Š„t!½mxíFþmO¡ƒ ò»‚ÚքY[÷)áhç¥|Þf*V6ÛÄ2´¥È¥uv¶ ÞÒ7‘U’#*vñÂÔÚ h¥½wÀÈarf®•îù£6¤«§RWÛ«.³„¶²Ì•1J0ÀLª2 Â€÷ü‡ãáœîÅþA>[zùZqÁÔ8›OuYÛ'ñ$Taøˆx>o˜0ØKøÓÐF'5§ÚtrÚ涋˜†v#,í$ës*ð›X—¥4[ì#0÷¥‹YÓYtæ]9Ê3ùâ¿glŠ£BhM¾2¬q‡:/—„°´ÛÈ¢GrŸ}U<ì$¹åø†‹,ۉ½ñ‰ ’Îtq֏ðÿ ºOpC÷“ôvpèÒ½hM~zÝi§ì µ3¶T±uÕðÃ>(«©rPö¾«Š/’¼ƒR.Š-tÆéš+"ÏmðµB ž¿`¹.Yöý½su˜¨RÆV—ûºxw -5€+¹3éJãðx€#‰4q©Ö¬ÊkýÍDSÑò9–[ b²Õr6T™ýÈnJ| 3°ZH¥Nû~´Í©{ƒÇzèÜî l¿çÊ?Èb?Üòl‘Vëh½GbRQeÈ{[À\Û/ö˜ÃQCݸ=ì@Á³Îð)‡&‰9ÁµÃæÿà}/‘=/¡½FÑ9µŸ†{žU$°.Y8󾛚ä±D¸N"Ð5“\ -Ú!PP㠋‡SZßÍ5Ë -­2ãF”œÆr幃k‡• §êFÊ8‘ó][a½rm%ÞѬ“¨RÚë -Aè´ÚùTmQ°ÎŒÝîXSšVp$օ-uÆrèCN <¼V¥› J^Õ:5TPÒ­R¢¥)άo£ø~ÏΪ¸ÊDY÷j×x;n>lßCÉ秚G9†¨%æñ‰éµžPÛ!Ïä륏ãëÇs/ÍØ0v~·Jé11[«TÅÜ.Yõè§cõ@tÍÌw 7Š“~v³QMÁæ“=à{_50íùÐÃlü#“C[@÷ÆøÕÝ y?¬_Ng~F¢`Ð}QTøØ\×cdEòD™ÔÔç „E'\WÖÕ‡z39rpŒ%¯óU£°ç;¾‚iŒ¸˜Úùˆw&}²ǦŠ7<ý¾Á¨ËCx¶óxŽŒ€«¼çӇû?;ÔÇ|šÖ݃ªµÆ±ès)0Ãb#z(AŒ0I‘|ÌãOv'Á&6Ü/'&Ü7%ÜZ›ƒýä®{zg³È0xŒæw‡W¿4?âÆÁbãTÇ ÆFïÕ RM˜ÄsÆ„ÃHı4†+ȝ¥w_,0ß²„˜ÚÄ1¢À³ç,{Ù¦üØ]à'ÖÜß}ô}b´U«Xs£©£ÎßcøþTOՅåÉÞ/Õtö\YÖÕÍq·\âK9óåö×··ô[©?£â蝎«—I7rð¾ËæóËExÃß¿–ÆM"Øè —ÜÅ|‰«, ΧüêýjôûèoŽ? -endstream -endobj -1622 0 obj<>/XObject<<>>>>>>endobj -1623 0 obj<>stream -xSMoÛ0 ½ûW=¥Àâ؉k»Çv[€aØj`—^YŽÕÊR&É5òïGÚI–v=tƒaY)ò齧_Q - =)KXå º(‰¸º.hÌJ—ô: Mt[E‹ui -UC[ò²€ªJO¨ÄL™Æ‚2€Æ†V:¸‰/«‡(ù23ʝýl1@h•:Iͯª†¾ì`h«hÑl%G$ì¤ë”÷Êú·€Zہ—ú‰rœÄPé=ô^™-}ÓU¼ä¾^ŠÞ©°‡Z¡¶Ûw ´ž³ë«Ã‰fpñíóÅ´v<åŒ[ne€ ŠGž3"ÐÔè¨kNmúÀHqs*NQÎ3ÿÐÅځáì#Ú±Ø× -¥5xBÃ(¥Ÿ“s„È„Ì­Ñ{¸Ÿá‘]ÃĽ"g‘B;Ê2ávœÜp":ÜídEyI– -æ÷ùXE?¢ß%ý6>endstream -endobj -1624 0 obj<>/XObject<<>>>>>>endobj -1625 0 obj<>stream -x•WÛnÛF}÷WLó"h‰¾Æ/EÇmÑ4iA¿¬È•¸6Éew—–õ÷=³—˜"\7…aÃ"wvfÎ9sÑßGKZàgI—9^PÑ-2|\,²œÎ®.ñŽ_#isôãêèäö-å Zm`rqyE«’p|'Åô]%:' -óŒ~2ºï¨]§Ú-ýüéËêÓñêæg´\óy~«rúÙ ãøØN¹Š>‹f-è>EÝU‚ò j厶Wnú¶pJ·¤,‰G¡j±®eF«JRÑ#[Gt•.énZ«YïÉiaAóåip\T¢ÝÊ»c¼A¨­ØJr°÷Ž¬¿Ø;.tƒ·%¢®eÒ8iLÉ6ko KåSœfÑ_~‘q¢ÜFëH5 Î '¬°Èôvàþ+tx'è÷›w3ŽÇUÂqˆãJÝ…ƒeƒ¿>šQ$¤7á ˜Mð'@Vè6HüLÙ_«»n=®øØ #*(Þ Ëñ–÷V=†Àkeá¹±TkÀ#2j[9Kœf%•‰¨$ÿ;m¬L¦Íèç/·º‘À`« -²®ßlBêV5ˆd 8Z÷ŽJU¶GÎ$=Jƒ—²®i£ ¶®–Od¥ë;;æâƒd|êj†®B¦ -®9ôãêäKþëŒó«„Ïù‡x6¢”$vbŸÑ—JB€-¢¯kp°b{1J’ƒén„¢ €ìŒÞT* '-ù¼‚,¹ Ō>j}CÂ0žüÀ4k#œ6v¡Jø<¸°#×HÁëÆßtF=ªZnákÃ_+ÖªVŽ«„B]ø§%k”ov -hU¼~P@X´{¾Ö¢ÂîZ³€µ¾;`ú¶etÿQ(*”5Niâ%ꯑÍ0iÀøÜaê®êǙOT[I£Üäc$‘°€ø6(¶É½–Ï!bJÁZ‚FÀá ¢e{HÏWv­êF>‰ÂE.-ê‰byàÕÈv¬Y/7‘Tdœî5 ôÅ((ô‚•½aÐ=õè£Vé½¹ ½âEEœG¡ûx2Ê2øøw&Oƒ’Îè½/Ëj+2ùr#ÏA²‡4¦fòš"hDžYëív »aPÑOjÌéžF÷»nKˆÐqO€Ü -ñu‰Ø÷º7Ö0¢–P©/ç6Êe ø÷˜UÂM,O€rÀØ{Â1„ç)° >(®oÕS(tT[o{o‚¾ÅNNnSWŸžHWœ¼4îŽgTKvÇSŒ[ë¤lØ~Ž‘€^N—™¿¿ŽHQzY¹ -* l0û!m/­¦Ç8[K:L/£[´([0)ú:†2Škv¯+tH4•F˜ýl„“Gã­üä‡ÝiÕZ?øŽvpyË»Æ3?? 38¤}ýt}¾È¯S03$˜¤ùÇ œ^fŒ ö~ɸœ/Â5¿‰¥PÂ} nµ¯Ngߢž· i4\ï)uIÆ7n1‹´kpq“.4/è ªíš÷~ŸÝqRéŠÓÔ>/XObject<>>>>>endobj -1627 0 obj<>stream -x•WÛn7}×W âU€xuµäèCn4@«o\j—’XsI…äZV¾¾gÈ]i¥J®»l‹"gΜ93ÃýÑP?ši4¡¼ìü Á4¦Uþg]Óxô6ó—½/ƒ+údé{çìӻyKÃ>ÍØ<™^Ó¬ ~Öïc%ï~\‰uŽ£Œ>Z³PËÊ)³¤oï¿ÒÂ:*”NÍ« Âï׳¿;}ºŽa¤›KœÐzK¥0b‰¢ -+,ª\e of߃iò}9'ÂÙ £[QÎ S°³´wLƒA½w8Í&¼÷=™ªœ¡]ПF=‘ßú KOw]¹|G·•¡[«…Sþîõž6Rkþ $ô„çÃí'ZˆR&ûúC™êé »¡*(­~JÞYÇ`à7]-—b®%½?ˆˆ¾Ú¢Ò’óÝkÎa#l)XZ;û¨ -I`äˆà‚ëÔÏÈKÄᤷ•Ë=çœZM^ºG•KŸÑ7§Øç€[T9ÓˌŒS!såy Û*(V0NÌÑZx¿±®8Š¹AÌßuS2 ¶˜ŒnO†¼OÅ3½›&M]0°±•.ÈÉ•r‘ÊÄCD€-> -ŠÙSK'Ã°aǛ—9´¶G¸öLÜVù -Áæ+ fjÇÊoá%¡Ôù&ºÀåª,®ÎЋòÜV&Ôî#½^قT)Ÿspþ4)-ùÈGQp“nžS)~ÞÂÄÕ¶qŠTŠüžäbwK@NÁÈZ::¬ ûÁm!¶¹Ø½ ¨£,í¯tàjïÝq4r#õñF‰!ääZ‹<6­Ô‘ÑVf+Ë×ÍG¨'~JùÔoëë¦2¹® -Yß¹Îþ/ԛ+ÓCcéϯ dÍBFÜÛÀ ^X®‚&ü´¦U©B³)NÊ3ÖL¾¾gG lÍ!¶à×0’ö.Ÿ³ÖÎZĶĭ©Ž=h¼\ÅÁAŸÍjy¿ou¤ÎÚ`öÁ²µÀÍ}·ôŒµBšý>>©¼¯¸Üæx­nõÒ3ÖÖҁáú4Ÿl·F>±¥zþok»^֜Ü×P:±=¬l‰ë¢‹^[ïæºõê8É£+ÿóí–^òF;žŽ³éäïÒp0™°÷ϳÎ÷Î?j­Jendstream -endobj -1628 0 obj<>/XObject<>>>>>endobj -1629 0 obj<>stream -xÝXßoÛ6~Ï_qÀ04jÙrÜ8{ØCÚ®@hQï­@G‹”ÅVURŠãÿ~ߑ¢,;qšaÅ0¬y¨@S÷ó»»ïôí,¥þRZÎé⒲êì¥ËdNù!M®(§É‚œ¾K_ÒCÎ^­Î¦ogô ­rܽ¼Âƒ¤Y2›Íh•Sÿ¯Õçf+׉3á„\¡ÊÒ GÄg]­ïö'ÏW_Îf4Igн’ÒT}»¿Ço–R4ûòÒ*ÓÊýÙ#Ò¬º‹¦xÛªu#\< ÒضÏ"ËZ/òiÛB©2ê^}][ô‡Ãëز‰H뜲CäøÍ­°u”ÎѤ9åœ6ü‹›¾]Pš†¼Læ—ÀU¡(7ei¶ºÞºUSò‰¥¿”f£kj¬ÙXQ‘UM)2åüO°Lîƒh@ŋ>gå}f•žSedñÛBgA‚½¤`‘Û¹VUpq0V’­X hût~¤hªÚlâu¤è=tÕBší“®n¬éš£›ŸžÓV·…w98r¨„aÙûÀ!p^Žä¹OEµ{7Cp2S·B×!Ö7:³Æ™¼¥›7 RufwM«ä#V0Ò^ԑKhUh·—‹g׋אRG”½¥ÎÙii2QN5m¬¾­šö¾lå‘+/NFÀç&9ù2e°åPÆùþÍDžVLR5ª– ZSû”ø0EB3š+…P¶¨ëé,ýºþ®ëîŽÜ8XêؒdzØcaE}Üj‰À®w}2o•å²;²fžÌ“”.S›Ð»–2QÓZQfªF—A‚kT¦ó{†…༌µE“ cp22-܈…}N¦a_P¦j²]]³$œg.܍•:‚ à–ëMg{}{i.³ºiz ³+  Cs¨B<ûÈJõõßçüض³ä”ò9“&ëö鏰Ñ!s™BÁµu,^j«2`|;“w›Â‹$µk­^wž$ÚÜO©É|16(?ýüþúf’&3¾øÀÀùÉw»ºbHãÐ>ÿôýóܵ·:ó±}HÔ <úaéÿ³ê[e<‚{m¤*Å,3]ÝÆwÑËÿ°~ªüaC£ïÅ=ݲïŽ3Ô&EdI ‡ÚVg]),ÝoRå¢+Q¦­Æ·Z;Ã(·ý‡'ß¿„7ßpÞr0-õzêTÖYÝî|ùEÞVw _#ò(ÌWbõ}>Q‡—Uœ:Âã¥>^,#H>Q^ïz%_pÄŠr<ë]R÷©T¢ãó¼ LnŒôíJHtHÃÉCx˜¡ûy®nq‰ȑÎȧ>Ƨ§!ÜA0ütæ{SB;Ð.P¨-¡”$Jt !¯32¿@«ê'jI[»-:‡W@c³‘½™1„¨@/<+D½Aïê\?Øy‡ äòÿU }þV[~"ÒþÛõpßqÈ_y]§‡Õ2Cš¥(™e²¸ðË·n6&¯"ûêù^Ž36UŠá¥]Ò R…¶ï1Ý,?kÌc@ñxÈ]Ö̯•g´#3»1u=Ék ìP㫱VwmÜeiñ3Æ[˜ÐûRñºbU†Ý¿q@tØéÉH'ל§¥£YÔoAX©`xé #¬'ÀÜBkDÈD#ֺĴÂv…#èmÔ~nÔb_ÖÖÔÌ¿ÐL¥úÈ:RC(®÷>ä,´@÷87÷–Ìaßk ÑÆ4"›v©Ø/"!õëŠ nÈdc­()Í:ÍÙOY£ÚÂHßd» –>Ð¥¾cJukx³ -},>nÜd™MÀ=ø‰C®5ò,d¥@çé%]ƒ€ó²wG×!ÈB©sîçŒ%¿:Q€~â:ôæJ|åõŸ!ÔÄä¹i6Œ´ém¨/ë@°Ï gùc~2ä6,á«J“wÇq1ù¾ûâsŽ_áÓÅ"¹ºšÓåò"¹ -…øñúæÕ5½·æ 6¾óŒx»‡sz¹LfW4YÎø{ÏùëB`EµjD¯û\rñ²¡¶ŒóÒӁa…Ä–;øW ž‡5ÎJËE²¼¼ÂG%(¸\òÑo«³gª‡°yendstream -endobj -1630 0 obj<>/XObject<<>>>>/Annots 917 0 R>>endobj -1631 0 obj<>stream -x…UMoã6½ûWÌ­+þPd{‹œ¦ÛKSlk{ PŒ$Úâ®Dª$¯ûëûF’»Š 0,ˆ"ùæ͛7äߓÍñ[ÐzI«„²j2æ”l¶QLñf÷%þNѱ¸_ÇQòÎ0¢yÿøó×É"Yaÿýr‰gE à$ý¨¤ýd8®h9ßF«ÁìpŒÙdm‡³«|âx-¼L¶Ñ¦ òp\Ñj±r·Vf‡cÌ.ׯgcÌÆq´ìUV›ùÛä“»[Z¬ép„IrF‡¼ÕcN‡lºÕˆµN§MP9íšP(tÆA[ssø„˜‹a ¦‡Bû€-Äy¥ p°ŽÎº,Q.õ?¨‹³…B{<8à¡(³UªM NöH]Ô¸ 0­¹úËWiÍÞGÞ¾Ž>½íÆ÷×ňe€•çãuÄ&'–¯sšIŠÂ8$)øyJ)g_•ÉoÉ7Yt¨Ì¹¾íR಴疱òÓRû¢‚.™)ÛÊ Ulø¤1€n¼rwñl]N9½êÉØ—ÞRªërJ/—ôi÷DÏSuú@¿iÓ|{¾!>3Œ^;{r\ù.ú.û:ùˆy™csR-o‰Tð Ø¡ºMÉôk$)Î_Ø$â¥>X&gŠ6𒬟t欷Ç@»,h=j§2”ü2ŠºWîEg -üw{0׆à‘( äÛ­ȳÎa˜…Œ -Pç+ñ+÷D>uI„¡‘gh´XŠŠâ®¢V­Ÿ­9êS -¸Ä¬Ò(ÃÇnïû†¢ð&”±õxe¨d°©‚L\¹4I˽Uî¶âmNÒ[R™Y©¢B•5–8hø¦0ßÃí?ï?ö.“.©Ïh@Ús•²K’¸KÊÀ‹ªÍØ7um]€Î:RѸ“f3)à Ì_ 0}¾¹m)‰¸RAõ=‹8Áْ΅BŸºžÓµ{‡±¡gå ۔½4pê0Ël#FBãyå½Ô kÖ|yk˜¦W.WGnÊ×ÒØrBXé€QXéÑ0+üÔ7„xmk`c ‹ýúd,JÊ_zBØû–OD¿Ã÷]¶:¢ryæ‹ïá|+¶E†ÇÚMšfV&s—:@Ö®Ó=ýD—kÂð¸[ö!Ò…¬lޔÒ~lDçkmۅ8}| ÖÖ ÜˆI¥²‚qWè#•Ã(=µ@«¥·z…¼½2GÍÚFÙyuâcW§²óîã÷ƒ÷ݦ@¾¦?²7ý½HpIoV¸ìúkc¿{zØÑ'g¿àè G›5âÿ®šÙuÃl=ßöýý¿÷SŒklp¿á@H6Âõ—ÃäÉ¿ª„Ùendstream -endobj -1632 0 obj<>/XObject<>>>/Annots 924 0 R>>endobj -1633 0 obj<>stream -x•WÛRÛH}÷WôUkª°d ãKÞ »ì!±SyXça,ð$’Æh${¯ßÓ£c³—\XõåôéÓ­§ND}üD4Šé|HIÑé}\Ù}|úµ3Š‚]ô'Á -ŠûãàÜ}ËiډC\ŒÏƒ˜ï'Aä¾ñ]Ø¡x2|g&îÛîÞxlŸñ9üU’²ÎE#X³qñ?Q0¦8žàá…7ѐÞiúhmÃ4»{ñøÛY'¼†£>Í2ŽÆ4KmF¸’t¯–bUˊ¢A@•*kU>Ò´Y­tUŸÎ¾Ùg£Qûlï|ÿ³´‹ÃQ@7e]é´Ij¥Ëö耢ȍGÈGßÊGU–lt£ê%ÕK‰ÌÚÜr)Œ<£©(‚LëÒØ¥¨ÕZÒU¦zcè~F+Z!“¥(•) ©b•ËB–µLÙ}Ÿzçk%ènÚûôpEó® -d`­N>|¸N©…Li¥Vr~ÊI˵ҍ¡µ¬ 21¤3“.ó­ O܊òN”»P|&"ÏMà.ÆCԁ̐®HSʼnœ²¦´h‰\Õ[Òk•ÂðbÛf-7äctp*“¼I¥yÆÁȞ·ìJD™® •¹)£lB=Ó -V”©\S½ÃrrNÆáý,Œû v’+àg¨Yé’RYˆ2µ)„׉+eoŒ¹)Ì<Žˆã¯}¡íÍìŸW> -@ø2À‹špõ÷Šz™¦-çèõCT)Êuùðe~JȊßÖ g s2ÒRr¯Ðón%3<—u½z† SÅF7U"Ï£ JY£Ômè/óŒy5·cxsdŽ¢ŽeÖ'ÃoYÎ$K†¦µ¨êw:yàduFï˦ø]/̼;?=#Y'A 穔œ®#énúîµMæ8:%µÏ³0i*©´ÑY$º- - ÑP%ò.ÚGð”ƒý<~»—7óÓcðøì_…çœeÜا#Úõ2I¤1t¥Y"rºU$Cm¯n¹¶®‡P7½ø&“Úsýß(ÇÑkôoî[ Xjd# ¤V«&oѨ—•n[jŒä^GKÛêpƒ¦¢ ¨’±XšX÷“¸|Ӌ}€Åî+x¶^ žPÏ7[Jl ²,¤,Éè‚ËÁ@4‰.³†5‰ÄB75m–¨?dU† -) VèX\—(1Ь¨Ô5)üâ¦ÇS£*«œÎ»8wÙf€Qžë wñݔþx «µJrDZ `®Øò,e¾"•ÑV7Ös*¡ç~ÀyyۗW+ÞáõÐIj—~Ó¤tٞšvXÞkúl€8­¬„\†}lãYŽ¡Œ>!'‡®RJᮆß¡K҄£ñ$ŒÂþEp9}hÍN°yÿ+§6ãçTv»p:¨R™L0–Ã;€Ä²´Íß@À89GÒý¶âåt'Z2CËû–‹ƒ1f<úÇv)6ô+&1{ô=ø2L– 4xÚ½9¢ídóúB×êï™Á¢Á|ÈT…OY¬ LiÞ=ôæÉW¿%û19ƒ+ €-Jۖÿ ±SØäf‡ðÙ7…_°ø³b\㠅©}ÇAÚ-¿àÝEÄy×¢|ÂãÓq½Ý‚0vìçx­[àþímh0£á¸Ý‡‡¶ô~ÖùØùZ›qLendstream -endobj -1634 0 obj<>/XObject<>>>/Annots 935 0 R>>endobj -1635 0 obj<>stream -xWkoÛFý®_q[°Dõ–Ö(PDZ»6®b©h‹z±‘c‘ ÉafH+úã{î̐bT%X%H4Þ×¹ç>ô©7¤†4ÑxFQÞ ƒOÚî çÁ&C<£œ&ã`â­{cNÓe°ìÜ-Ã`Nãå,X@n8™áҝX°{Æíl̺·3n—#xp”]ؗç!<Áåp -c{²Š;g܎C=ÞvÎ|» wçöxÆítÆNµ·ŸHŒ^üeÈvG|lƒûá”Þ*zߛŒ–Á˜Fž2^Ó^s' XçŒÛÙoG#hÔ1‹²yw°’Ç# ž²œ}‘ï:ǜæss¼ëSÈP/ÏÆ´€ç.¤™ éͦ7¸›jÚ<#þÙbN›Ø’$¤MtYÓö@¿¥E¬ö†6Tê´¨ÈHý"µ¡JázIcI¦.K¥+zVÚ½$5Å:ÅkÙ"S"~z¼Ú|è…ÔÍÉ&¾üCÕdUg1å*NŸT%Peµ_2ù6ˆTñLÏi&٘ˆcûÆ.S[‘Q)´Èeވ7Š"-E…W¡åYe™Ú§ÅÎJ{ÃÃ1òÃ&ZÒÓ¥z¦HÕÚÈ×dT. g–mӋÈjip[G C¥¨’ bi¡·i¥…>Xã>Œ­$-ËLD@nŸVɉ]Q/`ÈN:Õ°| “VòéÕ¿XbpÒÒå¤"Z¬þtAÿ·Ñ‚~ˆ„ð¹¢\æ[†Áû_T"ÎӂvZÕeƒ0\ÛLž•÷غ„94¬ÚD²ÓRW©4g¥µR¥†Ò¼ÌÒ(­2@¤˜*H¿uåâŒà/Џô“wÛ¿:¢LáŸö½ÎÎɀà 6z©Hd#ò­xÍç¼Ý!©;œ g«AuÉH}õ,&U ̯)¹B6‹ˆ‰XÙð…¹œîj n€J­–×̹‚ö’ -)ã3@]1œ{ ~P–šê" ºIdôÑñœkÃL%sB’òԘT¶6sññ|º |p¾‰üGEG¢€{åÁ‹¶•Èek÷\é98¯8ï  -hÆ¢B}K¯Øǖ¢g¸:™Q$?#Œó‚|ÿuŽ`  o^³aÖÚíiè5L¢Mb‘Ü ßí.é¨ãK™Kɶ>Žˆ›ˆ£0\Ö¢BG£L¾ÈŒ_¹~±DàÎiÅciP)ã5hªË˜«ž[Y ¤ïFª°™´< h-]kºßÓåôéåHP)vÜ×4š%ò—øšÃ#ˆãoC®¦ã9ڙӖ À¼Ouªe.‘xèpáO[`þY"G@/)–¥,b TÂhpÚæŸ5^È8`Ö0F0ËígW£a£'€ÿ•jÒï1°à!Ɔ“5×3̘Ê3ÉV 9ªìµ´!îšxֆC ™e°pÉ¿®«Di ”Uy4C¯i4\áíÖ²Ä2تåpªD ³=3 \œQèbãIðE\¨€A€›Fȸ \L6”“¨Ý¨Ã jæ‹À´Ìxã:ºŸ…n¼A&°¥]‚þ!2î ØCóÀ0I™_­µ·V͉¹UTsŒìR3S;†[Yv"D2Ê0”<öŽ ·  ªÐ²˜é˜‚ýÒÓ³°%h¯ôG7dñ’jUXúí A!úP£/ïAvÄÏ*þj{¹¥ªÆ JëS\lùhÀ¬[³yôTjk’—#£óàChùy¬8[QÝÐÂ^rŒcìm1­[Ø?Øؑk—¨Kî|';m?Ò̉_‘c'Ôp Æ|3ÒÙI[ÆÈê^fY@ïй±sxhê=ÄTΞ ikรÄêe+Q×\a¨Ð|Áÿz—ÔïÐ"ÖÖÉI±¡E ‡4èLv”ÜJtbÖûrq^a™ëølێ[!¹  `AEÓo2äõ5‹ìƒüÜ:m1ñ^c¡Õhç[ÉS„/šeÆ/ ´õ²kߖÃ>5Iißãά…ˆ>š(;»!ï‡õ~_Ìø»ÿ\Ñ÷Bÿ¼˜}ÿuÙû‡IØÈñÿÙåt°\|Ct<ºþÏêß×­tG­ì:+ñ¿ëßWßÔðî~µntCÃã$ ÃoJ¯V7Gáé•ÚK½º±òǚnëbLüüØln6÷¿<|G·ï½¼}K«ÛÇw÷ë5®¹ÁÝÂÏÏád,#šÍfÁxbW÷õõ»7×´Òꨌ_^QͽÏNn–ígó \Œ©?íºIDɛóp@ -[4—ÖÚýÀbÉ¿.g übÃ̚‡üèvÓ{ßû…'ºDendstream -endobj -1636 0 obj<>/XObject<<>>>>/Annots 938 0 R>>endobj -1637 0 obj<>stream +ìº*Muü¹%Õ0t|[À¶Óþ457j¯…çl]Áo"˜Hü†_#ôp<-åQ>›vÈ8Üë‡ïÒNèáâ¼%ߙͯjيHè(ìK¥?¹3wv`ù¹JM©2Š§±£´ç†jhžÅEbÈÏ¢:”’ŸÐ5W{‘ÙÅ仒~¬uªñO߈‰Óí6”dÚÇÚ2tÀU¾¦ˆðÐØC@&2HKtÔ: ±ï3ñ#Zƒ(‡lõ£•+p1$ +Bg Î¨Wˆ-þôn_´Ôêã`ÙBXA¬s‘j:Ú£ºzÏjôôƒÒ9‹áý’ÓœM&“~„·ÒÊYª¡6áñ¢ºG"Շ¦UÛÑÓPLc2_7ë Ý·ƒeeìÚpEªn¼lñOžŒÃ¿"AÿîýLÍzªŒ# 2Ò+zzxÿøðŒé…˸ûŠÎÝ ™ñöÀ¡ò{.ÎA@³^Ñ ¤ÖXKfå3‘.ô»Ä¹Y·€îšßFpï¢tô¼v³ðL'TG‚üÂ#DmÖ£U¾qb\ðË(ogýC<6§óe²ZbA²ü[/ŽÆÑvܶÝxÃ8ÒQ½z¿Lï{½V&§Õrù¦Zj;úBVóX‰BћMª­é÷%ý…ÿÀ‰ÇÎý(’äu÷C—ƵMÓÇ#æ.ó¶AX[ÒVÊñR—*ÔkS¡Ð>a%ºê,¨`Ø-/:ƌ«3žÍظŒ.û㠛Qy³ñÍ¬ÄÔa€•‡֞\íÎAì"ÂTÀÀ)!m`@ùƒÊ3u±ÚE0ِ+Æ~%ÂØÓ¤eqL ÐÉRU*îE#,ÄÀ€¥G±€ðÊKâhô֞B¨׆ïc©R…)*„K{ Xù¼Ë¥Q«» yæs&Ç÷®æí†Üjb·¬,V‹du{)w·`°?o¿ þdžõœendstream +endobj +1661 0 obj<>/XObject<<>>>>>>endobj +1662 0 obj<>stream +xu”AoÛ0 …ïù¼-j7vÒØ=¶ërÛ°¡vÉE‘˜Zm,y’Ãÿ~O¶Ó­A— €a‰äãÇÇüže´À7£"§åšd=[¤ ZçËtE«²ÀsŽŸc: ·Yžæ—ÛÙÍfEYFÛr­Ë‚¶Šg± ­œo´ÇcOžµ …ŠÉ÷õÞµ¤£6¯ž‚¥ÆjâC<6:ë^ÉW±§Þ¶Ô ®IE>èIÔ{‘^m_f Jò5ÔnÕü§gçÉz<øDt&yÔl‚') ÛÑÞÙÎóP—(8æ«)¡ÒØ‘´ÃÇÇ2»:ø”î¥dïµyUOµ³%€ vìDuÃážvó®Ò²"Ñ4,Î“ÒŽe°N££©ÏQÜxÅÛv?Þ¯é28Û8-¸@FÁ&h“›Íe@Ǒ,³‘”føÒ7ØÇà¿CÃä“ÜÓwg_°>ôhe[cL"Îd0R¶Æ¿T¹¤¤XÜÅûÈýÞæ«b•ë«€Óò6}ÙÎ~Ìþ±[‹endstream +endobj +1663 0 obj<>/XObject<>>>/Annots 949 0 R>>endobj +1664 0 obj<>stream +x•WMSÛH½ûWôª5UX²Ørn„„]vØ©Ö9Œ¥žDҍd/ùõûz4cŒcö£–FýñúõëÖc/¢!~"Çt:¢´ì ƒ!®l?>ýÚGÁ˜Î‡“`D%ÅÃ$8uß +šö¢³®Ÿ%§AÌwG“ rßø.ìP‡¿ZRÞ{¤h k6.þ' +Šã >^xè¦Ö6L³»¿õÂ+8Ò,‡‘Ñ8¡Yf3•´¹«F֝t_«ªQÕMÛÕJ×Íñì›}6wÏNÏà–õq8 +èºjjµi£tÕ=£(rGã12ÁÑ·òAUݨfIÍR"³.·B +#Oh*ʅ Ó¹4öD%µ–ôEU™Þº›ÑʇVÊt)*eJCª\²”U#3v?¤AÄ°ÃéZ º>Ý_Ò¼¯X«Óûn¦SªD)3Z©•œsÒr­tkh-kƒL éÜŤ«âɆ'nDu+ªm({>SQ&pãjŒ@fHWd™bˆDAy[Y´D¡š'Òk•Áðâ©ËZnÈÇèà U¥E›Ió† ƒ‘oٕˆr]@ª +-2FÙ…zf5¬)W…¦z‹åä<œ$áÝ,Œ‡ vZ(àg¨]éŠ2YŠ*³)„W©+å`$ÜHfÆÄq„W¾ÐöæöÏ+ |àEM¸ú;E½È²Žsô‹ú!ê 庸ÿ2?&dŇ¯Kk†3Ði)¹Sèy¿–9žF‚˦Y½ C‚©b£Û:•€çA•lPê.ô—‰yƼšÛ!¼92GQÇ2ë“á·,gÒ% CÓFÔÍ;ÞsH²>¡÷U[þ®fޟŸlÒ óTJNבÇÇt;}w‡Ú¦-s‰ÆçYš¬ +J•ÖÚè¼ R]†– ¥†h¨ +y—Ý#xÊÁ~¿Æ݋ûëùñ!x|ö¯ÂsÊ2nìÒíz‘¦ÒºÔ,Ý(’¡¶—7\[×C¨›^|“ic¹þo”c‚è5zÈ7 ÷ƒ­¬?¶²•R«U[th4ËZ·µFr¯£¥mu¸A3шTÉX,Í +¬ûI\¾éÅ.À‡b÷<Û †FOhà›-% +¶YRVdtÉåƒ` šTWy˚Db¡Û†6KÔ2ƒ‚*C¥+t,®K”hÖTé†~qÓã±UµUHNg]¤N(¬F,صià€²W§ƒKm`²‚ý¬ë5ö–öy­Ëmg;Q 肣0¸=×r«û™Ø5WYàÓG¢z¢€a5ù‡™\KH‘ç&z°ƒbK&@7֟07Ð|ÁÅw4˜e*xÆîw‰ë†#̘z­RIi- &‘Ç{ò×v^¢ã¸=|±yDìžö·Ù&–‹=—¢³ Z›ÎÖÔs›¥Âq;‚A3‹l`Ñi+ÏÓ +m!ŒÙ 1õ';´ÀºµÈÇãv¿6ü´µ€žŸØÁáÅh»m¹IĽ|Xo½¨3 +]mŖï{Ž î0Çï}îr´„`Ÿ³Z´‚õ®ÒPh§ÍJ¦*ï¶'o”Ûõ}¹$*[P·†BI]TÐ)èôs¯>ÿ+§.ãçT¶»p:¨2™L0–ÃۃIJ´Ëß@À89GÒÝvâåt'Z2GËû–‹ƒ3ýc»ú%“˜=ú|&Ë<ë_Ðv²}}¡ëô÷Ċ`Ùb>äªÆ',V¦4ïžzóè«ß’ý˜œÁ•À–¥íʌÐØlr³Cøì›Â/XüY1®qÐÂÔ=Œã í¿àÝEÄyߢ|ÄãÓq½Ý8v„S¼V%¸{:ŸãQÒíÃɈ-½Ÿõ>öþZ“qKendstream +endobj +1665 0 obj<>/XObject<>>>/Annots 960 0 R>>endobj +1666 0 obj<>stream +xWkoÛFý®_q[°Dõ¢¨5 +Ôq쮁«X*Ú¢^,FäXdBr˜Ҋ€þøž;CRŒª«‰†Ãû:÷܇> ÆäãϘšåßóñ¤ûçñçÁxái6Æ3Êi6õfÍ!£õ wÌi¾ô–½»¥ï-hº ¼rãY€KwbÁþ·AèýÛÞ·Ë <8ʆöå…Op9žÃÀԞ¬âÞ·SŸE·½3ß.=ÄÝ»=žq;Ø©îö‰‰Ã‹¿ŒÙîd†o€mt?žÓ[Eï³ÉқÒÂsÆk>Ákîdëq̀Ññv2¶ @²(›w+y<ê9ËÙù®wÌi±0Ç»Þ1ù åñòlL!XãM[IZ–™ˆ€Ü>­’»¢^Àtª-`ø@&­äÓ«±ÄèΧ¥ËÉD´Xýé‚þo«Ñý ásE¹Ì· CãQ‰8O ÚiU—-ÂpMl3yV¾ÁÖ%Ì¡idÕ%’–ºJ¥9+­•ª(5”æe–Fi• ÅTAú­+g¿x~¤Ÿ·›W'c” "üÓ¾÷ùÀ9ÕF2‰ldD¾£Fó9owHgEê#ÄgÃÙjP]2R_}$‹IókJ®Í"b"G6|a.§»Zƒ R§å5s® ½¤BÊø PW ç^ƒ”¥¦ºðˆn}t<çÚ0Sɜ¤<5&U…­Í\|<Ÿnœo"ÿQё(à^y°Åb…m%r™ÀÚ=—EzÎ+Î;¨š1‡¨PÅÐÒ¡QÜĖ¢g¸:™Q$?#Œó‚|ÿuŽ` -o^³aÖÚïiè5L¢Mb‘݉¦Û]ÒQǗ2—’m}7Ga¸¬E…ŽF™|‘¿r;ü,b‰ÀÓŠÇÒ  +R:ÆkÐT—1W=·²Ȧ©ÂfÒòÄ£µt ¬í~O—ó§W”#A¥Øq_Óh–È_Zàk Ž¿-¹ÚŽçhgN[.€ó>Õ©–¹Dâ¡Ã…?ï€ùg‰½¤X–²ˆP £ ÀéšãÖz!cYÃ4Â,#´Ÿ]†žþWªMƒ1¶„l0Ys=Ì©&ي‚!G5½–6ÄÑ]ÏZŒ!³ôB—üëºJ”Æ@yPUCƒvè 1Æ¡çÏÑn-K,ƒ­Z§J:Û3ÓÀÅÙ….6ž_ÄŁ +¸i„ŒÛ ÊÅdC9‰Ú: ¢v¾LË\€7®£7³Ð7èÀ¶´KÐ?DÆä{h&)ó«³öÖª91w£ŠJc.‚‘}jfjÇp+ËÂ^„H¦Q†Rƒ½#FËm¨*´,f:¦ G¿tÃôÄ,l Ú+ýÑÍ#Y¼¤Z–~ûD@Pˆ>ÔèË{Ѓifµ½ÜÎRUã¥õ).¶|4`ց­Ù<6Têj’—#£óЄÐñóXq¶¢ú¡y„½äÇØÛb:·°°±#×.Q—ÜùNvÚ~¤7˜¿"ÇN¨åŒ+øv¤³“¶Œ‘Õ½Ì2Þ¡scçh © ôSq8{&¤­ãŽ«t”­D]Kp…¡Bóÿë]âÑpøA@‹XW' /œÚ­è¾mWÜcÄ×Ö>NJ»í1¯ÛõŽMaÿh–>ÛçxyÌë¬JK̨(KQ'H %˜kQ…X±fÁ՜yÐìq¦ÞÆhTQ¥4vK‚ºf)°’bÒî“ZzHƒÎd·A)ðÈ­D'fÿQ.Î+,s=?ЃmÛq+$w´,¨húm†}í"û ?wN[L¯±Ðj´ó­ä)Âí2Ó, ´õ²oߖÃ>5Ié¦ÇY  †üi£ì톼þ5üm:ù= ø{ó¹¢ï{…þ9 ¾ÿºìýÃÌoåøÿžìr>Z†ßN®ÿ³ú÷u'ÝE+»ÎÊDüïú÷Õ75¼»_­;}ãÐð8ó}ÿ›Ò«ÕÍQøDz¥öR¯n¬ü±¦»ºXz³f~l6·›û_¾£ÇÛ÷¿Þ?Þ¾¥Õíã»ûõ׌Üè.læçx6óÂpBAxә]Ý××ïÞ\ÓJ« 2~yE5÷>;¹Yv8žNi¸ðíºIDɛóxæA +[4—ÖÚýÀbÙ¿.ƒ¿Ø0³Â?ºÝ Þþ…xºLendstream +endobj +1667 0 obj<>/XObject<<>>>>/Annots 963 0 R>>endobj +1668 0 obj<>stream xW]oÛF|ׯX¢-ɲ$÷¥°ã¤;n¤ (ê>œÈ“t1ÉSx¤õ×wvïHS²S´A`Çä‘û1;;»üÚÒÿ†4Ñلâ¬3ˆ¸Óüúôkçl:‰Îi2>”Ñx8ˆfá*¥y§}ÓñÙÁ) Ñù`Mi<›âï~ M+vC³Itq|ÿjÑ9}7¦á+¢Ñ`H“Ùyt>™Ñ"‘À´ˆ{ïs²E¢ *-ÅUQè¼L÷¤’„åzGIaýéÞV4WÙRÑƺò„l®É®¨ÜáE›'¦46w”U®ÄiBeQéŸ_/¾t€G4‰ÆðÛ[l4©8¶U^Rå4ž’·s—üg‰ã'Á˜zÄ;T™„Ý è¾g"áNamY»͞NßÅ!ãþ4šqIàò~4™’?­ñÃþð,ý`LKŽ(ÓÙÐ0í¨à¾GÛÂä%NU’™üÐû€שqeôRäul/ßÍ¢áõÏ.¢ ‡ÿqü«Â遵`4m³”Ä•&MikÓÎñÿĹÒ+“j¹`ø]µLL ¶0Úql­x—:תÜП’ÞOEôIʍB5àƒ­‘Û¨6ñ‹œ–Ò¾*´BótÿŠ–{JôJU©O¾/ü%(̙ÔäckbÆm¸ú1ÞåŒ8¾B­_ÒÄÅ£Áã*GÎÎÙØÈljœ3ÙÔNíQ´¹v”#›Cá*gòuͲûž-|™þS…{÷¯ôW…Í`æw“'vçèvAãhp:z 85h¶ˆ>nuNÝ[F*Žb¹Õf½Y¢ºk“.:•º7{ ÏÒ]ªPÆ®$¾,`‚€G›°LmÜ`éS=9rš«G³Æ3uCvï<—]E]xH!ýâ¸­ÐéN3ødrh€J‰IÍØ¡1B€\̎L•ñ†™†2Öýá‰rÈar”Øǽ¢% ¡Y.h9a5èŸ ½² ÇT.¢¹.Åûµ—DÞ~ !ՙøZÖr+£i­ÿ–…ɏÀ}å¨6€¡÷™°6· +ð¨S R @@ -3339,10 +3492,10 @@ j OYŸD™øûGð÷–‡zþÖ´|¿ %r(ÈS÷­ãû¸”´›Û;´ž#Ë`#:¨h·5)¾Í&ݓ'äZ'G­‡¬R“9f.£K¥ZÖªPGÑ"±§V­u—ÎUØTÖâÍÝf‘®î[­¨Tê,7¡Zbîg61«}Èç箊7G)@>.ß|À®®'G-WßKûíYè´ãÔÊĎm–¡E<àò¦m°›žAË;ف Ç ÂÌe W¶ ®…õ"rpÂ/ô_æZòÀÐ߅ÙÌF^~XfdÄAšüb›Xè(ßÎÔŽ…S¦“ѕìF2…8f6/âTr„ïeØ[‡5µcÇüSbQ×áX6±FyØÐ È^œðñ"ß -=—-#,‘+»ž‘½g¨#&­¬¹ÚO|gIY3Î2ò[dÇ+é×´ß\5Ò#1ԄРl”°¯’_Q¹£!]ù¾±À5 µ\óKXènæýOwo”x~uæ½±ÂòAÃóKN¹;Bû™‡\5ïѪ±ø®aƒ…U+tf±D‰oYQyxã~(dU~ &(Bf°àêÈu3F±4·Râ¼kS´Æ7Ça*vÛö"9z‹µv¯¶.ítšö0˜rZ¶ÚJmOß͆|bÎÎh2F£É9oFó˛«KðÜ~a ¾¶1ÐÊKˆ˜•úôëWúÓÁ?ÿ¿·±ñtMñm*ª;2oß:ÿªðÀendstream +=—-#,‘+»ž‘½g¨#&­¬¹ÚO|gIY3Î2ò[dÇ+é×´ß\5Ò#1ԄРl”°¯’_Q¹£!]ù¾±À5 µ\óKXènæýOwo”x~uæ½±ÂòAÃóKN¹;Bû™‡\5ïѪ±ø®aƒ…U+tf±D‰oYQyxã~(dU~ &(Bf°àêÈu3F±4·Râ¼kS´Æ7Ça*vÛö"9z‹µv¯¶.ítšö0˜rZ¶ÚJmOß͆|bÎÎh2F£É9oFó˛«KðÜ~a ¾¶1ÐÊKˆ˜•úôëWúÓÁ?ÿ¿·±ñtMñm*ª;›1oß:ÿûðÈendstream endobj -1638 0 obj<>/XObject<<>>>>/Annots 949 0 R>>endobj -1639 0 obj<>stream +1669 0 obj<>/XObject<<>>>>/Annots 974 0 R>>endobj +1670 0 obj<>stream xµXmOÛHþί¡;5•ˆ±¤ž” zåÔGÒö¤¤{CÜÚ^Ÿ×!p¿þžÙõ&K ºžÔ‚@lvwæ™g^—¿÷" @@ -3350,98 +3503,96 @@ z išt`Eôš¬ªJÕ ÊE}+©\7²&µ ªÎÊFÖúåô $õá<+©!©sYJÊ´^Ij–¢¡¥Ð$êL˒ÒnÞâcI©¼“¹ª Y6TáˆdÁQÜDVŒûæT)eJ"ÝbIëìRµ.s%Rƒ ¤® sh^¨š¢0|¡}”}ÐN맬Ä]MS_}b-ZrÍ0ÅúëZÔV›x0ÚóL7/¨PˆtS’*%[íélɀ‰’VEZ°Ñ =`Y–*Dš¡ªCu•$yãU˦µ+QE!Êô1¯J ø†¥·dÈÆÀk/ ­U’‰Fš{²uÖ, W³R7"ÏqÙÞh ,Tž«5ä½(ªÜø`©ÖŽÏµÊSÖ+àª@ÆR¦'[HÇÎåî þâÎÆ.ªÔ­¢îª•j~Õ2©º›Ð¾DYzŸ¯0àY§ªYùjv1¾¾8¦Ëɫه2»ÿLYÃï¯f› ®È7½Ï­Œ˜ëdÌ<ߏnÛ©¸²¡K§6Î˅¢Èåá þjO\À‘'4{{Eï¤õ°5"dD™Ôt5q€¡!Fÿ\ ýIvˆŸ÷=aÁÿr¥«?җÎYÆ‹\Üê“Yx?íaèè~t¦d'Íæøººüýr>_V]ƒëÉéÔIUM¦Ê“™=¿{ïàâ’N¯Ï?ž]ÓøãøüÝøõ»3zsyMӷ纺>¿˜ž]<)Si}2s»..¾‹Õù|'%~³ie2g['œ}4Ÿï?™Øü^™¬’Dj½Xåù×.Ú A¡¶™Mσ -Ø@¿ýt{(‰©í:ý€ÆiÊ5éB®©Í$Mw™0ÏKmTo+è›îóú½e!VysÐöµX YJ ë\¤—(ךf%êbVšß`º²Z7A¢ÊÅc%>ÉÝkßa ‚`ŸKi*k`ϵB)E×0eµt¾äŽMUµg]ó-JSg1}ÊþáV”-ÖܬÖ @9Ö\¡U ò3£`7Ø*̅—J™ pèY“¸Ai7]Ô󜼗ɪAu/鲒ekÐÙý¼Ãy„›(¸ó—ÐÊM$-²fÕ¢Aÿe³º^ŸAªÝe¹¼¡óNÈÀÔ|Rµ%O8N7ìq;ÌÎ_¶‘‘´Ç»Ã`„9­ån†­œ<³¿±Ü°"À!Ððpà†ÃWô w•`²Û0yF3f¡´ã©uÖ15o)?ÇPPÃýL07˖kpo"…=·K=àØm¤ZÖ½ÁÙځ ¶¦=9&x)VšÇ®; Ù„øÈWð HU«ÛZ´Tê+™³ÚOiÖÄô8"—úA7²h=lç²ÅS}(›äÐÜLDµãbðD¢‚vìc\¡‚F#Ä0ñ|wú-±ê#ê/PíbÿÓævcâµ*À´/Æî[2M)ÀD‰è-UcÓ÷À"ߎk(ßLe&]!{ç‘Çø#Çè“þƒ‹ÁC-+QsèXÒ­LÇs繪Ä!ÔÀ;CE¹J˜^vZ‰2ê´CÍ8kÜÉÐ À êÊP&¢­\ d]ÃwÐ÷Ǧ‚Щ,3™îó}Ìu«š‹h ْЅ20Y?ÍÍWŽÖT—e¨´»Ã}K5ÊZiÒ æ¡Ô5ò¾adlÓãÊw`üéÂ%C½¶0ñ<»*›Ýø™.¥eÃó®ä>Ž8³À¶~Me.aš£õgòS¤–…ºãVAfZ4ñÈHŸì­\<Ïã!açô]HÿY:dg¸/4µ¯+?ÄFYá.æ¼ð}”ÛG™‰›í  k‚W‹æ凈0O«µB$Ê´Íu1hK”£û²ó^œâ]õ‡³dÉ1ŇQàЂÁÜ´åh€ÿ<Œð_‰aÛ&ã÷¯Çh›ê :ªdeœÆ³ßìº ÝaˆK;e|÷Û¶gøp0ÂW‡1K<›îý¹÷/÷ñ!&endstream +Ø@¿ýt{(‰©í:ý€ÆiÊ5éB®©Í$Mw™0ÏKmTo+è›îóú½e!VysÐöµX YJ ë\¤—(ךf%êbVšß`º²Z7A¢ÊÅc%>ÉÝkßa ‚`ŸKi*k`ϵB)E×0eµt¾äŽMUµg]ó-JSg1}ÊþáV”-ÖܬÖ @9Ö\¡U ò3£`7Ø*̅—J™ pèY“¸Ai7]Ô󜼗ɪAu/鲒ekÐÙý¼Ãy„›(¸ó—ÐÊM$-²fÕ¢Aÿe³º^ŸAªÝe¹¼¡óNÈÀÔ|Rµ%O8N7ìq;ÌÎ_¶‘‘´Ç»Ã`„9­ån†­œ<³¿±Ü°"À!Ððpà†ÃWô w•`²Û0yF3f¡´ã©uÖ15o)?ÇPPÃýL07˖kpo"…=·K=àØm¤ZÖ½ÁÙځ ¶¦=9&x)VšÇ®; Ù„øÈWð HU«ÛZ´Tê+™³ÚOiÖÄô8"—úA7²h=lç²ÅS}(›äÐÜLDµãbðD¢‚vìc\¡‚F#Ä0ñ|wú-±ê#ê/PíbÿÓævcâµ*À´/Æî[2M)ÀD‰è-UcÓ÷À"ߎk(ßLe&]!{ç‘Çø#Çè“þƒ‹ÁC-+QsèXÒ­LÇs繪Ä!ÔÀ;CE¹J˜^vZ‰2ê´CÍ8kÜÉÐ À êÊP&¢­\ d]ÃwÐ÷Ǧ‚Щ,3™îó}Ìu«š‹h ْЅ20Y?ÍÍWŽÖT—e¨´»Ã}K5ÊZiÒ æ¡Ô5ò¾adlÓãÊw`üéÂ%C½¶0ñ<»*›Ýø™.¥eÃó®ä>Ž8³À¶~Me.aš£õgòS¤–…ºãVAfZ4ñÈHŸì­\<Ïã!açô]HÿY:dg¸/4µ¯+?ÄFYá.æ¼ð}”ÛG™‰›í  k‚W‹æ凈0O«µB$Ê´Íu1hK”£û²ó^œâ]õ‡³dÉ1ŇQàЂÁÜ´åh€ÿ<Œð_‰aÛ&ã÷¯Çh›ê :ªdeœÆ³ßìº ÝaˆK;e|÷Û¶gøp0ÂWGÇ,ñlº÷çÞ¿øB!.endstream endobj -1640 0 obj<>/XObject<<>>>>>>endobj -1641 0 obj<>stream +1671 0 obj<>/XObject<<>>>>>>endobj +1672 0 obj<>stream x­VkOã8ýÞ_q·¤#VÛ&Mú©He Z`»i5Ò~7v©g;c;¤ýñ{í$¥Ãc‡-6ö½Çç>ê{¾·BèãO“cH²VßÇÇÑÈÂp:ÁÏþ)«ÖqÜ Î††¯Ðe<@LÍû}ˆ“}³f°Y˔A®d´#a#Õ7ÿ×ø+zöá tìECéþÞ/Á’‹@¯­AzQèÝ:Ü$ŠçÆp¡™2@@° sa˜&ŒzÀ-ÜwK ÉýT&$­€Â¾?u@ÍgðÂîEŒu¡ÐŒA²HŸ2íæw ìî®{Ô½&˜Ž]皜݁•TpÁEq¿ 1@CúñÃ.P…ç«göG]°‘.EÅÝU’¿ã žÌ±rå–*J»Æ]Øpqp¿ÅªL¶Øq¹$ßè#ß0›3‡_3ÁbàšÑOø†›ÚÅï*²Í6e+Ý@]\Ÿ_Åç‹YÀL¼Xɓy|:ûB‰að[çs'ëÐ^çSç²só¥y±˜¥ycíúô&ž_dz6¶’ËQšSlimˆ2íÊv9üÎXŽý–Èü¡“äà՜?ùž%×0݃9¥Ok`{yëÜ0fÉZB» ÿõutô ¤ýㅇãëíூj: îˆ t.e`6/zñ˜·€f÷³þa–â?½~¬NÓ[@Ó|Z®M²%qÌ]³ÞÈϕ8|LÎ ëÆ0²HÖÐ~­ ˜,/šPê{DGÂFÕ±èÞÅâÿ­Yfß(W°Sœ£3Ia‚÷öë–5É×,÷\{¡ ÿ Yj0ª¼£wyÞå=|—÷è]ÞãŸóöª›íç¼÷àJšòNçv^p ø+£Œ6ÊS6ÿNï§|èlé'R¬{Ígø, noBÅL¡Þ²w$-p/ ç@25£(Ü@ƈÐNA @xn®—艬¾ÎkKv}Ë%8;€e‡•.½jºýÈùpc¯ ‚¢ ÐnZ=<½È žý¿¸ r£á*"+}ÜUv´0¥QIh™p;§H9æ7ܬ¼;œ!S>Äk†TH•‘4}cG«à8É3;º/qxØ­8ð#{ìÇ?.qÎÎ/Nñ ¦ï×̳B£BJµÄbæN[X4,JÂPD! ]{BâðGRH° ׇãÔ>+R¤¦ R¤ÛÁW‰­mV׉ í2sO³ÖFn÷\ãqÒÖW?hòš(•( l‰s‘W)⤢(yŒlívA HÙvÀ%èý½àŠe(mtuA’”ãʶY¢q©2±Émz±J¶[Ï$«ýŽL¹¸m[¡É”pŒ&®,aùmÙ¬™ 3•·ü‰ü¬ÒV¥×‘Öšß -TšØü¦™çV'WeA€ºô©$–$%"Á£1-°"<‰½UÉèi%ÀÃ1Šóéex¿Œóf~y<Ç–_YbàD&…MSŠ6«½Ú¡7é£S÷'C2žâ7í' s·þlý ð™†Lendstream -endobj -1642 0 obj<>/XObject<<>>>>/Annots 954 0 R>>endobj -1643 0 obj<>stream -x¥WËrÛ8¼ë+æ(×F´ÔÃ{ÙÊˉkóð&Le¾@$$!!†­(_¿=@S²]®ÚT6Ù `Ý==à ñgBË)Í”ƒq4ƓîŸOo³å"ZÐbµˆÆTP<›DKÿ+§Ïƒþo¼]Í°Ê­å·8ˆ ~¯–øwŠ¿•¤Í`:G+š_,qtÐó(ö¿Â¶ùb‚g'Ûø¼xÆ'=ðb6ŸFӇ^Lçñý/’ÁùeL“ %@°X-)Éڛ)I‡W:˜Éþh2¶;a©hr«Ê\Ri*[ÓZR&7Jˌ6¦¢ÚëEmô3:K¾áx Û?¬‹u”½qCÔ!ªkÉÿ‘p¯DØAR7…‹“š¢:;Þ;¦Ñd†[%Ùp¿SéŽR¡9£¦F:ÖøÌåO++-r*+³­DáZVÂrdÊUm•Þ’Ùø›§õ¡¶²ˆ\Ø šj4‹Á ÂNâhQ²“tU”•Ò@$1&¯¥½—é”iƖ£Å‹ «9¯[•µ™|ùpõ/1ä·"—ÚrF¾*™}MzžetÍÑd…Ç¿D•Et ô˜±’c÷°QÔÂ*& DÍm°ñÑ]î{¹¦ZYI zgmùçù¹ò÷ŠjÓT©ÄI[iiÏIÔ´—yÎÿÇ!'13“6²o£’ÒiÞd e¯ì® Ž…bøXÊ¥Ö 'ɀª°¤ü {Äèü@/ëJÉVHG×´•É·Éßl#…m*À -Ã-ïØ…ŽM®²Àæ$¢¯,tdvüõ™¼>¼çµèç¹O™)c¸šhJÖ0‹‹Áށ¦Ív3š.\ðëV¼ -G¹ -j­$ŠCYSaG"oÁ9/í‰ÕAóó‹`rÒÈ*u ’K‘~[Y»K¤¾¸FËhÅƇkÜLK_¬¡*ۗ]qÝ¥Æp7Ó2EÑ -d†¼(EÍw7ì`y$OÀïe‚¢Vº¶"ϝÄÒ\q±8p’Y[¡PÄÀů߽»ÙC>È@Ý -•sb -%Œc½Æ¹lFo?~M>F¥‡(8ÏÐÕËýºWaòñ­<(Ë!ô·ä©”65Ó¶7,@șè÷H(³۝1µiIײ•Vª´¿Ñä Ëäï?ˆË/#̈%&JH¿m¥ŏG¡Ëÿ:4ƒ>8Ñx3kƒ¡©äæ,Ì@>/XObject<<>>>>>>endobj -1645 0 obj<>stream -x…WÛn7}×W üäÖêbْ…ãčѸqk)õÚ¥$ÚÜåšäJŠþ{ϐ»¶´VÑ\ ËrngÎŽž:êãï€ÆC:=§4ïô“>ލ“ &c¼⿕´è|˜vz×}º éç¼É§û}š¦Ç¿›>túÔôa9͎‰ÿ "[¦©V²ðïééɯ$‰²´¦´JxIU©È(SV¦ÞØ-òþLl­Ì ̜´ki"¦ËçMÌoÑ?‡Í¬‚ -”–îåé~¶7ÎUґ(è2Ëî¬*¼´ƒ‹ÙñìÝÞwÿ¸»jùù§þ<$çŒÂè€Ë}Ÿžw¼‘7$R_ ­·-Ï Aj%CƵ=·õ®G4Ä®t‡!ì×B’YÔÍ\Ëܑ,RS±Ìh³’©¼Ä4FËpô&^²0{Ú|@´B䀼©$Q™K¿‘²h’$“#œ½x½8£p:RÞÚQ® ÝÓ[‡GuÈáy2âú¦ù(€ •ÙpÇ ¼nVÂ7ÕF¢á¹XKš¦šå¨dÊEÓ½„.QªóšŠÖf(d£´nÕ ÆË|ŽgžCp;v«yIw(i½v™Ú,1/zû -hlG7àF͞¦~¹´â>U*}$mÌ#ܴ㎠ -në¼Ì‘ùR9Éž=°FìÐ1÷ù×/·³Ù}0˜Í®*kÁ»+Sxkô½ôø*¾ŸÍBA³Ù§b­¬)˜žÑéÇ£SÆ -Ñ×RèˆÍ.BoÄÖQåCrÕ㋝®Ð?üCqàø[C+Q>¸·€A´DÛژì±ë ÈVÂ! -Jè³Ù m{B÷"Ÿƒë -ã#an+` ƒV€ï DB £•è)†ˆ©˜Bª¶¦â¢ÔLj8‹r9”Ð̸m¤§*œ‡K™ý\GÞ%<€äq -ƒéeYF¹@9ZåÊ Ï…O„:πhzQ”á $b‰¢ë§¹ñ+ιUø ŠÕ{ÝÁd_œõ.&- -³Lg1îk§‘ÔKaP}ë|Âþ{×4×zy:Š\à5¡J, ãT¸Â9Œ=ßvÝÓ~ôp×2³&«R®>:Ý%(¼³Xp¬en1$À—ZU¼€g-™œWËX ‹‹1ÊõF‘@î3ÜDó9@Ûµl¶oPg¯ kräqû¡‘(¾hjöÅ«ô$°‚G­`!Bׅō‘E¹æ'«IT*^ObÕ 9\㥠R¸Fʁ”|ŽZ@G½VÐÔäÈ4;Jè;_àúË됪JFY·»4EüÍÊ v suR™á˜@hž4Þº<_Ä6åÐY©åš;Ü›oV*]…ø‹Jgá†i¥Ž”ê+§ñI z ÍÀæ%¬|Ï;ÛhwXÏ1¯ID?–Ú̅þ«q»»“âñ>lЧÑ:–ÃÈBWb :¼bÂ@—OÔ`ÉØÅS°¢§JVˆcupÓÄq]Ú|ßCh僠3?˜ú9XþŸ• ¨ÆOÔÃ"Ö ©ôt™õß2±]• -«"7ya´6î& ¥BaÍ#ÂZ#æ¦òÿƒ6ÅzKÁ„z˜zS¢š:iÂò‘ðÄ|&õ®0À/Žþä?+êUòþòöÃ%¯5Øé£I+¾þÂmÖÝÆ ;îó‘ã>’ñùòçã36û4íüÞù*{!êendstream -endobj -1646 0 obj<>/XObject<<>>>>>>endobj -1647 0 obj<>stream -x¥WmOÜFþߘ’Ð)ç{ GhA""QS© --WUðamïl¯Ù]s9Uýï}f×6‡mÔr/Ø·;óÌË33뻝1ðÓ|BÓJŠQ4¢ÙhMhv8Çõ#i¹ón±3ü0¢·´XBâà)a÷hD‹dŸš¿»ZÖÒH[’]¢L‰d0ŽUF•NÒ&\’ßÿjqÝ3ƒòÁäÊ÷ßE•Ë£°ÜA&³hÆë-¦WÚ¡Ó°¶f«r˜W†xŸïU´gY͈ãQt¸-Ww,Ñ#é;Fø7iS<ˆ?’ÆB+}ó ¶÷¾µ}V£Âû“o®þ· -d Dò‹@_ˆ"d3]ç)Yépau)â\R*—¢Î¥%ræ2 SSYÉ2UåŠtI]²ëdAnSÉ×׎Þ¶üÎQ’ eîõF”.¢ü+•ÚÛÁ©˜‚fHd]2U Ìe±FÊĽ$§É­¥¸m`ـ\'"G¼ï”.mD‹¬‹m]ùZllP²¬ó|ÓÆ®Á³•LÔRɔ*á²RÒ¾&a‡l‘ÆTˆ ›Ù˜áŒ‘‰£óÓŏt/òZÚ¨Q:9lü=“> 8/èFÇìAˆ-.bÙ°?}ÍáY«<έÄVÄ®ÒF˜ <«6¤—>~[1°Æڃժì9Ä/›Ú²×° áèDÄÕ¬&³l4J§ -AÌ–KQ"ºFn8ŽM½èŠ¥AÐÓ"ó>+ ÑÙك÷VC»‘…¾‡B±ä÷ö€%ßÓÇewCK¡ré¬B­2GKCs¹t7¸Ë¥%Åþƒ.]"ïNükœ I@™¥>¦Û%Ì¤æª„ƒpr—WÖE,Í.HaՊcätÖó>tˆ7^ØVZçÒô¹ÁÁÝ;É¥Ð$ÐOw ‘mw!ʯPséDl2cd•‹°kå2Ue4 „“ ÷hÍdƒµ¯ŒóìÙ¸gY³E^¶Õ±“Ìyæ_{›}Ѓ1!X z€C8æ¼ -ôŸuõ°Y¦ad ×ÞÍs -E|©$㎠-ì¥Ñh*PÄ K+•a†ÞÒ#€Ñ`:õ7ÆTˆ&É¸^­¸;5ðø¯ÑÉ -?™9wŸOH<úkʲ\m¹ka5 1d:ē!`ÜVïöÙ²™DeÛĨª­T°6>Œ½ ³Â ,±¯ 3Z›ó?4É ãŠˆè”¬âH2 Ɛ@ØvËåã`“¥PSñœ®¨†­7 nOÍÉ8ò3™'â‹oütí6¶Nm Ö´–¡»Ùl÷$Ç/Ì|ΧñUښ'd»ñ­RTt2d«ð‰¼UOx0S‡~Ù:8 l¡Ç“Æ`x€RV¬äSmøí­ŸO¶Wƒ"ÛUÈ£hkð=aSçDwy9¦—šœœ|û¥CYé½hÇIȅêi‚Yà;-P¡uÿÉËwÑ®Y9 RÊÔSMšÏZ ú+H‰vË̖²õ¡‘ìuë]ú»zÞ³ç²lvDÎ&ÑÉ$Ӕ©&‰™jQª„SÞi‹8ɨOáŸò™¶n˜¯g=‘¦ÞxtÒ%Z$©ê':~Í(N„uííäÍ* aoqµŸQOÝ9:üq8¢Þ™.„*/O/§¿.®éÓÅñåo¥ú|MÒ`J_†>‰óq4¿î Ù#ºº: ­„|¿pÝÌq +TšØü¦™çV'WeA€ºô©$–$%"Á£1-°"<‰½UÉèi%ÀÃ1Šóéex¿Œóf~y<Ç–_YbàD&…MSŠ6«½Ú¡7é£S÷'C2žâ7íÜ×è4nýÙúð‘†Kendstream +endobj +1673 0 obj<>/XObject<<>>>>/Annots 979 0 R>>endobj +1674 0 obj<>stream +x¥WMsÛ6½ëWìQžF´¾%÷ÒÉw=m7a&=ø‘„„´£üú¾%š’íñL3iÒ `ï½}»ü>˜Ð&´šÒlIY9'c<éþùøv0[-“%-×ËdL%Íg“d~ôiÐÿ·ëVùµüÑrÉÏæëþâo-i;˜Nɚ+]"ô"™‡_qÛb9Á³“m|Þ|Æ'=ðb¶˜&Ӈ^Lóû/^¤ƒó7sšL(Ý‚åzEiÞÞ|Li6¼ÜÒÁ4Hö{£±Û GeS8U’*S;KI¹Ü*-sښš¬)%Ö kô3:K¿âx Û?´å&ɌÞúÇ1êY+ù?þ•ˆ;Hê¦ôq2S–BçÇ{Ç4šÌp«4ÞîU¶§LhΨ±HǙá¡üád­EAUmvµ(ý]vRËZ8ŽL…²Né™m¸™ÑxjÖÉ2ña/h|¨Ñl^v2Of ¥{I—eU+ DRc ++ݽL§L3¶-vXLXÍyݨ¼Íäóûˉ!¿…ÔŽ3rðEéÜÜZzŸÒó<§+Ž&k<þ)ê<¡7@ '9v¥AM)œbR°@Xæh‹ÍÀˆîr¿•²ÊIÑ{çªßÏÏU¸WbMSg'íd¢¥;'aéVÿ‡œÄÌM֔ȾJJgE“ƒ”[åömÈx,ÃÇRøkµi8ITYÀ’ñ/ìA£‹C ¼lj%[!]ÓÕ&oü¦p³­®©+@Œ·¼cz6¹Ê"›“„¾°Ð‘AÜñÇdòúøž× + _!e¦Œeàk¢©XÃ,.{g^˜6{ØÍhºôÁ¯Zð*äj¨µ–(åL}„‰x¼ç¼´' +T],Î/րÉK#¯Õ H®DöMì¤õ—ÈBqVɚ׸ž.W¡XcU¶/»âºK/ào¦e†¢È yQ†šïnØÁòH"€_ËE­´u¢(¼Ä²Bq±xð’Ù8¡PÄÀ%¬÷>ÐZÇ4¡—ºXѯm<­€k^ê/z§®€-ÔÇæîZv£†6'-{ZxꐚõÑ&äB[jjå”íeö­€”›BæO(e…¾Ä^¶®õˆZޝTŠ¾Ïwïnö2P7BœX€ÂG‰ãX¯qƃF>›ÑŸ¾¤’*@gèëå~Ý«8ù„V•Äû[úTʍši»5,@șè÷H(³۝1µiIW²Æ•Õªr¿Ðä Ëô¯ßˆË/'̈&JH¿m¥[%ŒG¡«ÿ:6ƒ>8Ñx=ƒ¡©äú,Î@Oü áëäNöa(8s·¶®²×ÓE˜,§á;ØK83¬õÓ`› w˜1 ¶†+h‡Mè®Ï|"ëád‰O¾õ i ÿÉóéù»Ïñ`¾â zÕ¸yç(n­ÆHç©o•ùjž¬–k?^Lø„×éàŸÁØV¼Šendstream +endobj +1675 0 obj<>/XObject<<>>>>>>endobj +1676 0 obj<>stream +x…WkoÛ6ýž_q‘O)ˏ¸±S`Ò´Yƒ5k¶¸è€zh‰¶™P¢BRVŒaÿ}ç’Rb«ÖüïëÜs¯ŸŽ†4Àß!MFtvNi~4Hx7I¦4žNð~„ÿVÒòèýì¨=  š-aq>śŒpz0 Yzò÷›ÙÃрzÃ,gÙ ñŸaBdË4ÕJþý"=ùµ$Q–Ö”V /©*µeÊÊÔ»¥C~ؗ)‚­•¹™“v#í¡³#Ätù¢ù5ú簙U°¡¥ÒÒ²<ÛÏöƹJ:]fٝU…—öCp1?™¿¡ÛûÞwW?ÿ4ŸGÃäœQp¹ïñãóŽ7ò†Dê+¡õ¶ã™!H­dȸ Çùð¡þõ˜†ÃؕÞ(„ýRH2Ëæ Yh™;’Ej*¶‘ÕkYÊK<@cT± +GoòàÕ! £°§Zà¢"ä¥H%©ˆÊBúZÊ¢Mò,q¹a•©¹ª,õˆÛ@¦kåÑáÊJ—е±$Ÿ'pJßT‘™ÚÑo3REª«ŒAo›Å‘3:¾,q´ì³ ¾Y¸µtsó?ióv˜Lpöâõâ-¥€Ó‘òŽÐ~§@¤€rmèž~tx܄'c®o€Z›š;öXàµ^ ßV‰†çb#i˜–£’%*m÷ºD©ÎWh*Z›¡ZiÝ©Œ—ùÏ<‡àvì Öð’î0PÒzì2%´Ya^ôöÐØ<ŽnÀ†=mý 2réÄ}ªTúHژG¸éÆCÜÖy™#ó•r“+<{`Ø¡cîÓ¯Ÿoçóû`0Ÿ_UւwW¦ðÖè{éñU|?Ÿ‡‚æóÅFYS0=£Ó=ŽG§Œ¢o¤Ð›\„®ÅÖQåCr5㋝­Ñ?üCqàø†V¢|p58îƒ.h‰¶u1Ùc× #X ‡((¡O¦FÚö”îE¾× ÆG ÝNÀ&­ß ˆ„@G+ÑS S1…TmMÅE¨™Ô2pår(¡™qÛHOU8—2û¹‰¼KxÉãÓ˲Œrr´Ê•ž +Ÿ0Mž3Ðô¢(ÂAIÅ +E7O ãלs§ð«÷ºƒÉ¾xÛ¿˜v(Ì2Å¸¯FR/…Aõ­ó ûï__ÐpÒèåÙ8riˆ×„>(±*ŒSázç0ö|ÛõÎQÐÃ9\kÈ̚¬J¹úèt— ðÎbÁ °–¹5Đ_jUðžxdrQ­b5 ,.Æ(×µ"Üg¸‰æ €¶kÙlß< Î^—ÖäÈãþö}+Q|Ñ4ì‹Wéi` +ZÁB„® ‹#‹rÍOxÖ,Èåd X'v#è®ÿöåR¸ŖV_Oə@ÖZ€ÔÈ&ñ›ý´bê`µ¥»«ÀøØIôš cºº +C¤Šì<p±Xvì [{ÑbüÀžíkpSH½<ōAÆY¦‘Y®² w&欹ÿ8ά…•ƒóWÈ_ õüêßU‹(IÓ¬>«IT*^ObÕ 9\㥠R¸Vʁ”|ŽZ@ǽNÐÔäÈ4;Nè_àæË됪JFYw»4CüzmN;9: ©€ÌpL 4Oo] ž/c›rè¬ÔrÃnÍOêµJ×!>Æ¢ÒY¸a:©#¥æÊi}ƒ^B3°y +ß±ÁÎ6Ú5sÌkÑ÷•6 ¡ÿjÝîî¤x¼ôÀi´N„å0²Ð•Ø‚¯˜0ÐåµX²v±ÂƬ詒ÆâXÜ4q\—6ß÷ÐZ¹ÁÆ èÁ,¦þ=d–ÿgeªñõ±ˆõC*}]f}Ç·LDlW¥ÂªÈM^­MÍÝ´T(¬y`DXkÄÂTþЦXo)˜P¯ SoJTÓ$MX>"òž˜Ï´Ù†øÅ1˜žágE³JÞ_Þ¾¿äµæ[#}0iÅ×_¸mز×ô&þ!rr@ÀǓq29ŸB¾ñübÄfgG¿ý *s!éendstream +endobj +1677 0 obj<>/XObject<<>>>>>>endobj +1678 0 obj<>stream +x¥WmOÜFþߘ’Ð)ç{ ´ %QS© +-WUðamïl¯Ù]s9Uýï}f×6‡mÔr/Ø·;óÌË33뻝1ðÓ|BÓJŠQ4¢ÙhMhv8Çõ#i¹óv±3ü0¢#Z,!qpˆ‹”°{4¢E²OÍß]-ki¤­ I‰. +Q¦D²NG‚*£J' i.ÉﵸîÇAù`råûï?‹¢ÊåqXî “Y4ãõÓ+íÐNhX[3ŒU9Ì+C¼Ï÷*Ú³¬fDƒñ(:ܖΫ»N–è‘ô#ü›´)ÄIc¡•¾yÛ{_‰Ú>«QaƒýI€·NWÿ[2"ùE /D ²™®ó”¬tH¸°ºq.)•KQçÎÒ9s™„©©¬d™ªrEº¤® ٍu² ·©äkŠkG +o[~ç(Ʌ2÷z#JÑGþ•JííàTLA3$².™*Pæ2áX#eâ^’ÓäÖRÜ6°l@®‘#ހwJ—6¢EÖÅζ.ˆ|-66(YÖy¾ic×àÙJ&j©dJ•pY) +i_“°ŒC¶Hc*ĆÍlÌðÆÈÄÑùÙâGºy-mÔ(6þžI œt£cö ıl؟¾æð¬UžçVb+bWi#ÌžUÒK?‚­XcíÁjUö⍗MmÙkXpt"âêV“Y¶@¥S… æË¥(]#7Ǧ^tÅÒ èi‘yŸ†èììÁ{«¡ÝÈBßC¡Xr{{À’ïéã²»¡¥P¹tV¡V™£¥‚¡¹\:ˆÜåҒbÿA—.H‘w§þ5΅$ ÌRÓí’GfR s UÂA8¹Ë‰+ë"–f¤°jÅ1rºëy: Ä/l+­siúÜààîæÒè觻…HŒ¶»åW¨¹t"6™1²ÊEصr‰ª2PÂɆ{´f²ÁڍWƎù ölܳ¬Ù"/ÛêØIæ<󌯽Í>èÁ˜¬=À! sޅúϺzØ,Ó02kïæ9"¾ÎT’qGöÒh4(℁¥ˆÊ0ÃG4ÆàA4˜ŽCý1¢IDïd\¯Vܝxü×èd…Ç̜»Ï'$ý‚‹5eÙ®¶‚ܵ°†2âÉ0n«wûlÙL¢²mbTÕÖ*XÆ^„YaP–Ø׆­Íùšä†qEDtFVñ@$cH l»åòñ°ÉR¨©ø? NWTC‹ÖP·§ædù™ÌñÅ7~ºv[§¶ë ZËÐÝl ¶{’ãf>çÓøªmͲÝøV) *:²UøDÞª'<˜©C¿lP¶ÐãIc0<@)+Vò©ƒÀ‹¶FüöV‡Ï'Û«A‘í*äQ´5øž°©s¢;ƒ¼ÓË MNO¿ýҡǬô^´ã$äB„õ4Á,𝖠¨ÐºÿÀÀä‰å»h׬ƒœ?aP)eê)Œ&Íg‰ +­ý¤D»efKÙúЌHö:Ȃõ® ý݇=ïÙsY6;¦?g“¿hd’iÊT“ÄLµ( UÂÎ)ï´Eœä +Ô§áÐOùL[7Ì׳žˆHSo<:é-’Tu‚¿f'ºövòæ •…°·'¸ŠÚϨ§î~8Soá.„*O.Ï.g¿.®éÓÅÉåo¥ú|MÒ`J\†>‰óq4¿î Ùcºº: ­„|¿pÝÌq ¹¸Û-| -ÉÔ`<3ÑÕ>Æo㡽z…Ù€¾|æn~|Õ'®·8ÍÞrñÒÔ7_-Vosg"ÊDæĽ-ï}I…õœÝà)èAŽÐ½S˜Ùø -?µ*µ2}NÇSvò³jNº‡Í#Åø2‡S<µ4§?¿;¥s£oøTw¦߆Ÿ{rÐ - æ#~ÎÙÿºá2›Ï¢ùÁ!¦Dæ¬éýb痝¿US#7endstream -endobj -1648 0 obj<>/XObject<<>>>>>>endobj -1649 0 obj<>stream -xWkoÛFüî_±ßèõ´äŠ­ š6*ŠŠy”Î&yôiEE~|g÷Hêa»MÛ$ÅÛ۝›™]=ži„ÿcZLh:§¤8Å#šOçñœfW \Oðã4eòÁìò2¾zéƒé(žœ>ÿ°<ÞÌh<¦e†=æW Z¦„ø£-“óåFS”ØTÓ("S¦&QµöToT_šî튶ÊcóÂ>é4&^Ø¢ÐeM«¼ã‹U’~`<)Z™š -ãs­RS®É–xÉøøÍòþlDƒñ9.Óó¿lC‰*É®¼vOZq\U¦d›ºjjâKäPÊEníµI ë¢âŸ¸r»f&ÇzK^kÚv‰;훼F>N¿¶õcc’‡|‡õaO2™¤Q9»ÊuÁÕlM½¡mÉV\ßùZ1ýšÕH­Ò¶Âî…Úuí*dnÜIÑC]'C‰”¨*ämZ;àå-=£õ¤œ±;Òc£ÐÞ¼¥ñ,œã`:Žq™žgñ,žÆô'.¡µó”Zº•¤~à  0˜0zø pêuåJqk§ -F4Ùè䡃¶G˜kG¥*4CÃSãætb×¥ùG§ÌŽ/ªX©SøoP²þª -àv!˜Èã:¤:¢·m‰”ƹþuéu%ҔϋœóBÙ^X¶Ö 'ØÐcoÊ̺B՝2g ðVh„ÜÚÛ†˜:¦Ö.Ð=³yn·\oË9œôÉ9‡ØdŸô×Ú©¤$»~_µõzÁÓd ‡8Eè`Môm¸2åšî+VGLâ£YL_t]smMÕ/ý r´êüs¼{RjG¥F­NÍq¼S:ä=œ ©pyqù§}æöÝ ¤ÝG$Úáނ~íîy>×~s |¡Q ÀÊâIñNZSYnð·ÜE„ñ½ñÿ½ë2ÄL.÷wΡR‘öþDܳ ŠÌ8…¯•CÀfÒ" õATkÜì9}âX¢Ó’K9P7iÑ*¦^Ø7°gLm|õ ¢Ö A¨-s,´6 mRA¿|þ@·Ž.œçý¢¼J`äá3ñ·È-ɵs"3¯È×ö…4%ÁvXº ŒY1~5lg’Œgœ -<Tߏ\¯d~‚¡Ô!ãjd‘ÌÀ2 ¾žùï»Ìy–(ah~c›>/XObject<<>>>>>>endobj -1651 0 obj<>stream -x…W]OÛJ}çWŒÔ¨L!¡¼ÑR¤^µ” T½•Ð•6öo±½fwM‰ÏÌÚĵÚÞ~HŽ³;gΜ™<îÌhŠ¿3ZÒтÒjgšLñtœÌi~²Äó!þ;MùÎÛ۝ƒ‹74›ÓmŽ+‹¨:ÕýQ¿ñ`À(/•U¦ÆA4"âã¸òOF¯ÅÊKå…È´ÔpÒ7§PÃOÏÝØÑsUaºv¸rø#×ìlmÛ2#ý£ÑiL™ôUV«J$ÙF—›óþrùáÚåxv© LÝp™Ú!£^@hä¸CP¥¡àŒÿM‰ÒŒž”;~:(›ì '-Ñ«Øe”‡ ¬Û¼¨˜Ö;ž&'‘ô ½§ßþy©Ä5¤qßS–ŸM§³jS@GùÌÏr+MÃ%ò… ;’ÀÞ:èÛ’X–Ñ0Ÿ¯ñ““‘5ô3O -è¡©A¯²DåUg§¶»±Ã*Š^d[Ò0©­!ÞQ³%TLõ^!ÌÎ⦠-Rõè½CZúe8öfQGd-†ƒˆ¹\߃õšFŸ¹/˜€2_úFohρdrÃ#O½¶Îm¤£WÜë@•? Ýc¶µIu¹7ö-¨*ӎ§Œ­qւÕ ZÞAÏÔ½öLšî)­T]£0ñ=*±*UýÐ}ìƦÔØÏ`>ôÃdh¨F¬™#:pî’Aª²M0ˆ²W*ÄѽA¼(^nî1ŲQ¹ÁŽÑÔ¡‹Eí¶'‘b0ÄO}Aw{Ì>§½§B«Œ¹aúw¯;ï±û#›G¾_ʗ۲´k©ˆ(ô Å;êüjżµ;¥$I8¤ßôÒ0!é“F“%.ÎÉ_ãŽdqY+sŒI åm‡uÇ¡Qr÷Lˆ ÌT2A˜³ª #À¤¬^CpƵí)ÐmUFf<ëjG/µßî0ýÆ$ëZë£@:ýØBà|·{ ®ae -X¬¼Í6/4ãnS'^Ô¥äMmqîy†:cßjs–_·u܏Âl ‰ ?h’mtLJEÜ0‚²#Áö­å!5¢]"¤2@&™Ù.Q[hG˜_ARoRgš >Ì¥h|OHU¶44ˆXïë–9U#¼æ?™ÔÙàA)R¯CBp­¨ªá['Î~5õ›ã‘g\î™ùõ‡¡tÅÕÎ?wt©*ý|·w-›ã»Ò¤w¯¯ §P[£q YyÉêù,{bþeÏ¿!»ðIJk/ dÓÂZŒ]À§è]påþ¹‹4’‘ÁóWBýš¯xMß y¡æ¶äál'„Á!z(ÃïG ÄiÃ5ä=`ÈsL tý{ΖhÞÕK¢‹«¯)/\pµ­&G)nË`P6ƒMkä>/XObject<<>>>>>>endobj -1653 0 obj<>stream -x…TÑn›@|÷W¬*UI¥˜‚M?:J#õ¡UÚЇ>žam“À喤ôë;wà¸r“V¶%ÃÞÍÌÎìݏYD!>¥ Z&T4³0)ÉVALq–âÿ¿Ži;Â8H^*\†É˅xy €¨«|öþfEQLùìI’å%; )/Σ8ˆƒ4 ¯ê‰n•»¢«Z¡¶«´pù.¿Çþ˜¢hÜ?_¤Ø}žï+Kø*¬3›š’½÷¦·½ªë -Õ[.i3W²ç x%ÛSWzGv°‚­m/â+½5]£¤2šæ6XQÙ:!Í£e°pôG¬{³©õÀöHâ +ýà߸E^¬ðO¡mUó™ŽÓwSŸÙªi!»4@ÑFÈömk:9!>ÐwÓS£Ҍ>Åk'èl݋q]tãÛ¡k.\Wg„Îþd F{ñ̗¦úT²€Öå£Òn]pé•@>áÑàÃ|NȚÆyÎ"”î Hö€°.•Þ:˽˜ÊÕôèûÂòž½ñ@…i¥Ë7dZ×Á‰¨Œ$vÏuM֏Ž èÚ8ðA…é½t—+;8úVY/À%ùöۄî\t…NÄä‘OhGž1€×%ñ#k´øà<8ŒÙ$Jo¿/ÈÐ2¦‰L/:rò+±ÈþûËþ×ñW¯-FÚŒö¹ûO|+*V5lú~-»[/NmÌ#‹IªÖ"A}&gÛ ·À58lØeöJp9eKZ$Óñ»[ºZc"Í=Ö#ì¢oX‹ G3?l˜§áêy˜ÿyÅÄ)î $Ã…ÙOWåC>û2û @ž·endstream -endobj -1654 0 obj<>/XObject<<>>>>>>endobj -1655 0 obj<>stream -xWMoÛF½ûWLuhœÀ¢,ّ”-à¤5â¢IÔXiuKr)mJr™Ý¥ýû¾™%e™-Š ‚(äî|¼yóføådJçø3¥ÅŒ.æ”U'çÉ9]^\$Kº\.ð{†¿NSqòj}2¹~A³sZ¸2_,iŽŸãIvúz«š MŸ'ôúãê–VÎÔÁÔºm›ÆºðtýY LÑÀøâ2™ÁÄ)nLº©ƒ³y›cëxô’¦Óîèl‘Ìùèz«éµ­*[ÓÇÚ|>èvèî”ýÞ=¥­ò”êÌVšîµÛSc›¶TîŒÒ6P°T©zO&ñ¤â‰ -L¦J¼µeÂîÏi<½ˆñÁ)Ã§U \ã¤-¨­3í‚Bš{@´Q.çt%yUç´µ;ö²³î/Ÿ‡î´oKñëµ®ÉÔðÀ6šê¶Jž-¾‹À` ðªJâ7%?,žô×v=?(\ëƒS !í¶ððö–>™:·;O —C;¤Ü4Z9ª­`ÁÑÑ΄íÀ±Šy¤*ûˍu'4i”S?ÞMŸw'góä2ÖÐDt¬Í)À d8ã  dªF]¨õ:'h·˜@(·ÉØ©,Ð[œýŒl€D>Ï7(§ìcíLJz¢ìM©ƒîæj«®4¢éÃx 9g´—äéÍz½’˜nV+Ü´Áf¶DP7BÛ#2t9D£9*ZÙ Ë=Ý…Pw:¥ÔnԒ3Dr|A2@Þð6„&¾kš#OP#‰Ê’+03æW¬ûpõ©Ï̓óF¿¤wï©0%šÔº -©µ/åºÍ°ÓeÉÿÞ¾½ú°\+Ž¹ ,f¶F'yŽfœþÒ‡"ŸвãÖÝSnãØ^;µGä[ÔscîaMìzSð}à2SJÁèÀÕ@²Lô!qÁŠÚ ÷%Oè}"¶Îë32ímK +ÉÔ`<3ÑÕ>Æo㡽z…Ù€¾|æn~|Õ'®·8͎¸xi꿛¯«·¹³?e"sbáޖ÷¾¤ÂzÎnðô ÇèÞ)Ìì |…ΟZZ™>§ã);ùY5'ÝÃæ‘b|€G™Ã)žZšG‡‹³ŸßžÑ¹Ñ7|ª{§߆Ÿ{rÐ + æ#~ÎÙÿºá2›Ï¢ùÁ!¦DŽ¦¬éýb痝¿UK#6endstream +endobj +1679 0 obj<>/XObject<<>>>>>>endobj +1680 0 obj<>stream +xWkoÛFüî_±ßèõ´äŠ­› ê6*ŠŠy”Î&yÌiYE~|g÷Hêa»MÛ$ÅÛ۝›™]}=ÓÿÇ´˜ÐtNIq6ŠG4ŸÎã9Í®¸žàÇiÊäƒÙåe|õÒÓQ<9}þay6¼™ÑxLË {̯´L ñG#Z&çˍ¦(±©¦QD¦LM¢jí©Þ¨¿4ÝÛm•Çæ…}ÔiL¼ ±E¡ËšV;yÇ«$7üÀxR´25ÆçZ¥¦\“-ñ’ññ›åýوã)r\¦çنU’]yíµ⸪LÉ6uÕÔėȡ”‹ÜÚj“ÖEÅ?qå vÍLŽõ–¼Ö´íwÚ7y|œ~m믍Iòև=Éd’Fåì*×W³5õ†v¶q$[q=~çk]ÄôkV#µJÛ +»oJh×µ«¹q'Eu %R¢ª·Eh퀗7¶ôŒÖ£rÆ6>ìH_Ýè€Þðæ-gáÓqŒËô|<‹gñ4¦?¹p ­§ÔÒ'IêÎàƒ  ‡¿ñú§^W®ô—±vª`D“N:h{t€¹vTªB34Œ05ž¡`N'v]štÊìø¢Š•:…ÿ%ë'U· À4@×!Õ½mKœ 4Εð¯K¯+‘Ž |^äœÊö²µ9Á†{SfÖªè”9[€·B#äÖÞ¶0ÄÔ1µvî™Ís»åz[Îá¤OÎ9Ä&ø¤Ÿj§’ìú}ÕÔëCL“1⡃5Ñ·áʔChº¯< +X1‰Cf1}Ñu͵5U¿Dô'ÈAbЪóÏñîIU¨•µ +85ÇñLé÷p‚¤Âñ=ñëà@LŸÄE|íl¹†6™Ol6)GdŠƒq'`wÎTbrSØÎîÑð’Ö¡Úä+ks0wŸY×¾>VåÁu̝ÌCÂNÃ8`/¤aׯe1ïՓêÜ­¾ô£Ð0RÈ¥Cåð#è– øeNýmXßTn”‡?“8Ž¯mÅ÷¨òF_ãÁó£±(U^XÛÍó×ÞíüEkŒAúoQÑà해ƒÊz mKœH¯òj£Ê¦ÐÎ$ŒIƒãs>±0Šèo!àA#H6JÔá<ÈÇL „€sçÞr2vK›]…>àéî<DwomužÇố+–ÎÃ×p¦ª†‹?1×e¨G» >êúÀ|BñzE¾R‰ÆyÀ/8*ؕò~ŠÛ¤´½ˆÔ +ê0nh‹ýavòèQÁŽ£pˆ»;´°“ý9=ð›qËMɽ×ÂÑ[¤ùí‚Ç:šáv#/ž²ó£¾lÆ¢·ÖaÑQ²} ¶8/˜1èh]9ºç£”ü[gç$0$Àbâ{Üöí»rcG‹DHæÑòɋË?ïè–Ûw'vc‘h‡{ úQ@´»çù\ûÍ5ð…F+‹$Å;iLe¹ÁÜJpÆ÷bÄÿ ÷R¬Ëk0¹ÜCÜ9‡JEÚû9pÌ.(2ãp¾V v˜I‹,ÔtQ­Ap³çô‰c‰NK.å@aܤE«˜ +xaßÀž1A¶ñ 8Ô€B +ˆ"X'¡¶Ì±ÐÚ0<´Iürû;€n]8ÏûEy•ÀÈÂgâo'>[’kçDf^7(¯#ì iJ‚í°tA³bü~2lg’Œgœ +<Tߏ\¯d~‚¡Ô!ãjd‘ÌÀ2 ¾žùï»Ìy–(ah~c›>/XObject<<>>>>>>endobj +1682 0 obj<>stream +x…W]OÛJ}çWŒÔ¨L!¡¼ÑR¤^µ” T½•Ð•6öo±½fwM‰ÏÌÚĵÚÞ~HŽ3»3sæ̙ÉãΌ¦ø;£å!-(­v¦ÉOÇɜæ'K<â¿Ó”ï¼½Ý9¸xC³9Ýæ8²8ÁCF0ŸNé6ݛ͓yrœÐ_vE^×aBµ%ۆ¦ ¯o¿ãèœf³xtÿp‰£{·…ñ„¡ÐTY(w­NSßS£\ ›SãLÍ/úf[ªÔ† +õ¤ÅƒünWzÒÎäFgx£BÿšÖÊSnÝZ¹LgbJû³£ä{¨mHÑÚ©¦ÑŽ”³mÍ7hJmU)~¶ì'¾ËM©'´jåzàÁ—¿$ˆÈm%G%\í’ÎÛá8Âۅqˆ¤…NøÚJ= ‡÷üñõû³¿1&÷: °åˆœ¹/BĂ[Ýê„>ä´" +w´žSôö本%úñêšádÉ7֖ÚMädªj +ºj¬SΔòÁ6ÛøFÀx½ÔÔÛû`ʒVûª2!ד ­ñÝÈym[GT²„¾x}Ê&SzӓÄaŒˆÊ&¥ý«B‰'Ú™³`ÓK»î"@Ö15JR³B×DÓnقbbYC?󤀚ô*KT^õqvj»; ¡¢èE¾K&µ5Ä;j¶$‚Š©Þ+„ÙYœTAª½wHK¿ çÑþÑ,êˆ ¢Åp1—ë{°þOÓè3÷PæKßHâ í9Lnx䉠×Ö¹tôŠ{¨ò´{̶6©.7ãƾUeÚñ”±5l-X]±à åôLÝkϤ‰ážÒJÕ5 +ߣ«RÕÝÇnÜaJý æC?L†õÈ5sDÎ]2HUC¶ QöJ…8º7ˆÅËÍ=¦X6*7XÃÃ1úƒ:t±²`ãîI¤.b§¾ »=fŸÓÞS¡UÆÎÜ0ý»×÷Øý‘Í#ß/åËmYÚµTDú…âu~5bÞڝR’$Òozi˜ôI +£Éçä¯qG²°@Ö +f΂1i!¢¼í°Žã0%w¯Á„¸ ášJ&sVµÁb˜”Õkθ¶=º­ŠÃȌg]ãè¥öۦߘd]k}H§[œïvÁ1¬L‹•·yÀ慦cÜmª3ðċº”¼©­ Î=ÏPgì[mÎò붎ûQ؁ 41áM²í‘ŽI©ˆFPÖb$ؾµ<¤#P´K„TȄ#3Û%j íó+HêMêLDÀ'¹Ï㠩ʖ†‘ÛûºeÎ@Õ¯9ÇO&uöxPŠÔëÐ\ëªjx§ÄÖ Û¯¦~s<òŒÃ=S"¿þ0”®¸¢Úùçî.U¥Ÿïö®es|Wšôáîõäjk4̐•—¬žÏ²'æ_öü² /A,»ö"@6-¬ÅØ|ŠÞWîŸ ¡±H#ü°¸ê×|ÅkúíÌ 5·%g;! ÑC¦x?!N®!ïCžc¡Ûèßs¾‰æ]}°!º¸zñ +òÂWÛjrdâ¶ uàk°iœ§Š· °®°QØZ•"¼[êubrÒý¸™-ð›éäˆËEð7gŸÞž€ÿ΄9·i[hU[³¯ýþÀþrŠ…8û¿ŸQóå>/XObject<<>>>>>>endobj +1684 0 obj<>stream +x…TÑn›@|÷W¬*UI¥˜‚M0~t”FêC«´¡}<`m“À喤ôë;wà¸r“V¶%ÃÞÍÌÎìݏYD!>­´L¨hfaR’®ƒ˜ât…ÿ ü:¦íXã y©p&/âå%N ®²Ùû›5E1e[°'I¤”•î0¤¬8â V}UOtk¬Ü]Õ +µ]¥…ËwÙ=öÇEãþùb…ÝçÙ¾²„¯Â:“×ܐ앸7½íU]T¨ÞrIù@\ɞ;,à”lkL]éÙÁ +¶¶½ˆ{¬ôÖt’Êh˜Û`EuBfëd„4–ÁÂѱîM>R7êí‘ÄVúÁ¿q‹¼XáŸBÛªæ 2 ¦ï¦>;²UÓBvi€¢íÛÖtrB|4( ï¦§F ¤}Š!Ö +NÐÙ¦ãº(èÆ·C×,\¸®ÎýÉŒöã™/#L:ô©¤mÊG¥ ܺ<àÒ+|6£À‡ù5óœE(ÝA‘ìa]*½u–{1•«éÑ÷'„å={〠+Ó4J—oÈ´®ƒ;PIìžëš¬еqà#‚* +Ó{é.Vvpô­²^€Kòí· Ý¹è& +ˆÉ#ŸÐŽ‚³í…[àrv™=Ï\¯ÜÁñ`¡]¯íÅá`I§ +Ôºc>±0›J‚á·#›²ê0§¦¦¾ÒéÔG .§tI‹d:~w›OWL¤¹Çz„]ô kñähæ‡ óU¸~æ^1ñ +wP’â‚Â쯇ò!›}™ý?ÿž¶endstream +endobj +1685 0 obj<>/XObject<<>>>>>>endobj +1686 0 obj<>stream +xWMoÛF½ûWLuh”À¢,ّœ-à¤5â¢IÔXiuKr)mJr™Ý¥ýû¾™%e™-Š ‚(äî|¼yóføådFgø3£åœÎ”U'gÉ]œŸ'—tq¹Äï9þ:MÅÉ«õÉôúÍÏh]àÊbyIëœpü O²ñë­j‚v4{žÐ돫[Z9SSoè¶mëÂÓõg10[F“ó‹dcܘ%tSgó6 ÆÖñèÍfÝÑù2YðÑõVÓk[U¶¦µù}ÐíÞ]ÑݘýÞ=¥­ò”êÌVšîµÛSc›¶Tî”Ò6P°T©zO&ñ¤â‰ +L¦J¼µeÂîÏh2;ñÁ)Ã§U \ã¤-¨­3í‚Bš{@´Q.çt%yUç´µ;ö²³î/Ÿ‡î´oKñëµ®ÉÔðÀ6šê¶Jž-¾‹À` ðªJâ7%?,žô×v=?(\ëƒS !í¶ððö–>™:·;O —C;¤Ü4Z9ª­`ÁÑÑ΄íÀ±Šy¤*ûËMt'4m”S?Þ͞w'ç‹ä"ÖÐDt¬Í)À d8ã  dªF]¨õ:'h·˜@(·ÉØ©,Ð[œýŒl€D>Ï7(§ìcí'‡z¢ìM©ƒîæj«®4¢éÃx 9g´—äéÍz½’˜nV+Ü´Áf¶DP7BÛ#2t9D£9*ZÙ Ë=Ý…Pw:¥ÔnԒ3Dr|A2@Þð6„&¾kš#OP#‰Ê’+03æW¬ûpõ©Ï̓óF¿¤wï©0%šÔº +©µ/åºÍ°ÓeÉÿÞ¾½ú°\+Ž¹ ,f¶F'yŽfœþÒ‡"ŸвãÖÝSnãØ^;µGä[ÔscîaMìzSð}à2SJÁèÀÕ@²Lô!qÁŠÚ ÷%Oè}"¶ÎëS2ímK Ì鈫ò{›©€wübgÛ2¸U× -сz©h‘ï8 –ˆL±m ¥C¿ìĽ–V´Üu%•Émk¤qÞօٴx*ٝKéÀBeœ÷Ü?ÓÌJ¢z¡Ó-7»ˆëî±lJßA6g]׌…+îp茳í¦m®Ùýäú_tô‹ƒٕ²€° ÄÒ˜6Ñ +сz©h‘ï8 –ˆL±m ¥C¿ìĽ–V´Üu%•Émk¤qÞօٴx*ٝKéÀBeœ÷Ü?ÓÌJ¢z¡Ó-7»ˆëî±lJßA6ç]×L„+îp茳í¦m®Ùýôú_tô‹ƒٕ²€° ÄÒ˜6 Ñ FÉ6ºÓ˜¨¡\/(Pcko¤Ž{¦)ž²—|(fÈu.ڍã .è6Ûä³MAkæ3È+ÙÓZä“oMPi¤;å bƒ\‚fÐúŽ?]ZÌÇAÂI®lÌgÐïÞ¯!BRóÃq7qŸÅ²Ÿòח3åрµFs ˆ]fˆD=xÄ Ã¨ -ŽèqRd%xK†‰,£#yÜ;šèM²¶ñ“ -›„}£}<u§Ç‹dÉóƒòn6_Ðc[òò0ÔÖ8Éo²Ö“i<[&Óѽ² 3¬ð8$PØI33«8Ë~ ÉeŽØ(·Ἃÿ”±‰z7§ªå†è_çka…Ð:EóH(n¶Âي"ÿ˜h…eçüÂ6,«:]Ñ„»fÝpä«4á®à¨Ž¦€ðãMiSUú?QZY[¤xÇ%“ -³›„l1µÿ®VŸøãj‰!èäÿ04,”´>@@ð@¯0*y)@÷ûFg¦0\žC3Æö$=èÏ£©Â/d/1Áë²@×JS¥Ãþ7›Š™ój¦°t—ältƒ&éRG}”ZöâcÂÙ^Jlj2 1§7ÈàèÒÝéÕêŒÉÛAÉJ‹:ð ”PãŠä5‹e„õXü•&u -RrwŠ_Üp0èã =)º¸ÙëFʛ\oeàóÁfwŸ‘íց8 > Þm±¿ÓÕúû5[ϑ‹jˆ‰üy薱uªk¡ž6§£¨6Xl¼âäFÅu±vØS¯‘r<ÍuænÆ2–·Sx\Cl;E‘°ê^¹CÃK7»TŠì6XÂg!be‚€Ë.HÏ°œ>#•óš¸§»†*–ÌÓ]Zk6"ÉEÖڜF€b”лÓ0sض -»´*ïX;¬Ã÷\~UîF”ˆ?—Œb|gÝǏGÌ ‰®QÉY\íxü!ÆÎ~ñŠ÷?5p<º¶ì­V?AÈ`yõ˯´ÕÚ±}i5>€ì¨yç{Æu˜>Ž!`„ÙÄå3ÿxí#ÃReǍ®yªw0­ðÙq›9Ó`²ª€ÍLŒuÅw¯M#áވw=ܓªÕOŠ"+’$$Øéäzyô7ŸTßô±x¹¸LóehËs6öóú䷓¿¥hº=endstream -endobj -1656 0 obj<>/XObject<>>>>>endobj -1657 0 obj<>stream +ŽèqRd%xK†‰,£#yÒ;šêM³¶ñÓ +›„}£}<u§'Ëä’ç9åÝ|±¤Ç¶äåa¨ ¬q’ßd­'Ód~™Ì^@@ð@¯0*y)@÷ûFg¦0\žC3Æö$=èÏ£©Â/d/1Áë²@×JS¥Ãþ7›Š™ój¦°t—ältƒ&éRG}”ZöâcÂÙ^Jlj2 1§7ÈàèÒÝøjuƒ&äí d¥ExJ¨qE„ò€ÆÅ2Âz,þJ“:)¹ã7 ú¸ÃBOŠ.n¶Àº‘ò&×[ø|°ÙÝgd»u ΈCÁ€w[ìïtµþ~ͱcä¢bG"ºebêZ¨§Í¸cô Õ‹Í€W\€Ü¨¸.vÀ{ê5RŽ§¹ÎÜÍXƲãvjkˆm§È V= Ã+·`hx ãf—J1‚Ý+ðOùÌ D¬LpÙé–Óg¤r^÷T`÷ÁPŒY`ºKëa­ÀF$¹ÈZ›ÓPŒzcwfÁVab—Vå«sÇc‚uxàž+ЯÊ݈Ñàç’QŒï´Ûâøñˆ¹ Ñ#ê 9«?ÄØyÃ/^âþ§ŽG×6‚=¢Õê',¯~ù•¶A;¢/­ÆGðƒU"ï|ÏØ £ÓÇq#¬€°"›¸|à¯}dXªŒà¸Ñ5Oõ¦>;n3gLV°Ù‚‰±®øáµi$Üñ®‡{RµúI@QdE’ä‘;^_}Ç-â'Õ7},^,/’åâ2´K6öóú䷓¿¥¹ºEendstream +endobj +1687 0 obj<>/XObject<>>>>>endobj +1688 0 obj<>stream x•XÑrÛ8|÷W̲*uŽË¤DJ–d×ÞV9Þ8•½x£•»{ð LBb `Ҋî믠dšöíÖU$‹ 0Ó=ÓÓÈ÷£”†ø—Ò4£Ñ„òÍÑwJ§I~å/i2£ÉÙ(òÃÁÇôŒ~5ôǫ˲ñ09ÿëeéø,ñG=íönq4¸SšÒb‰£'³)- &ÃáùñZŠBZº J8'ÕkIKUJŠ„#å"ª ©ÚQe•®±47›M£U.je4݋üAê"y»øv”eI6L)ΦÉl”á˜ãß?/Þ_,T­ôŠ”ö›Gµ‘Inô#6çƒùÄðc½«$~ôÇÁhSӉÔKcsyB‘Û(‚ýN]îøìxHq:¨8õD”¥Ùº<÷qÅ/›s2þNXÔ$¬UHܚ ÝÜÒ¿”.°Åá,húÞÈF’Û¹Zn|¨¡8›$cÎðË­¤–VÔ²à`æWŸ¨à,¢¨…²2çgHn~õ=}ü²=$BÂq ƒkTj["EU•-σ½êØqț𾦎úª´ÙêÀ¸ÚàLO%‰Ò™þ‰[U¯:P«Åʧ6¸ÎÛÓc”NJ{"ï²É”žŸæŸÿ‚æÆÕ.·ªª[@^àñl;®™á.…¬P×̖Ñ=*¹^ýJæÔc¼Á‘äU‹{ðxóñæ½Ïà^ð»]êN¨ kuˆ5¤yÀ!M“áh„†ÛwÙÙ°Cûø@Õó]ѐyS¹øÿÛ>eÉt:¥³ ÂäÏ}œÍ’ôœâéyhµèõd¸…- Yq×kۄ¯\mªÐ߬$wÇÛµêŒg%VÒÒh¯\À"?üY‹éË´ÓOU)ry÷–ûO’ijȒ¤­*KºÇßË Ïb|š(삃ôph(s44‡Ñ@{ü+Ö#Ô8ëŸ N`>ÿÕ¯WÚI ¹Ä{6F£?ªMh*^ =ÕPS¿Ä߆"eµKèǼÎ×¹<åe½ƒCp؎_a´J¨¶qNݗ;Z è—ÐÔ譀P4ÿíy÷Mìöòñ ‘§‰øA@[qôÍ*(JÀÛ)>„ò’itÍr©~±¬_ùºÀë ²mäkazÄöR’„ÞòdEo~ŠxŸèçáø—7џÆûƒ!pFŵ±ÉZ´‚Úž}ºüýÃ×Ëïÿ>ÿ|»¸½úòq¾ˆP„æElj£JaéQXåYƦ¬Y…Z.Q¯Ðë\TèõRýÇ?¾{»—îPõgiE®¥;õá5°OÄ̸†G€tتOsn @@ -3450,778 +3601,611 @@ x ¾7Çx䝃h‹tsakYhL6ɸ¸ìèÃúà¾öÖyª%0c_\Œ%µUî õ^ηÆ>У bÉúè--xp!wÇ+c0óû¢p/ŠŸ°Á÷“ƒÓÞóï !Ü_‡SPÜ*¸wùšƒ~”h”ÒD«åMLiõ”F^¾ª¡ÌK¥±–œ/:Bz¸jx*ŸÃZ‡àÊ"Í&§,w¸¢l»äwu±wd،¶Þ›<(P¢tBOÙ÷¸½h>‰+ŒÅƒ*´`SÁgyÚ}_z{å£[t¿‚¬ŒCïLdˆËwYЌ–_\’P´°”Ð'6( ³ù^æ -ëO„Ò´zÉùt{Ž?Ç7,úñ¡+b¶{®’¹Z*L>_¡ÎÃ%;ÎÆážFD'œûµ×  úËÃÿ„Uı ®gíÝ(“Ù,£Ét”œOüM÷öòæÝ%Í­ù†{þ÷ oø:éåÃç‘N¦Ép6‚_"´âøj-*¶·éY‹Èœ‡kãmSUÆz OÇÉt2 wYʽ_ýqô_‡g!endstream -endobj -1658 0 obj<>/XObject<<>>>>>>endobj -1659 0 obj<>stream -x­WÛn7}÷W ”9Ю.–%§@ÜÔj؍[«- -¨]®Äx—ܐ\)úñ=C®UÎ¥ j#Ž´"çvΜ½;Ò¿CšŽèlBYu2H4OÓ3_Lù5þYIÅÉó“þlLÃ!Í ÒÑ`H“‹óô|rAóœpo0 y֝¯”£RiIµ´®¹tôò÷»{ò†VBçäW0§Jɲ¦v¦^e=2:“¤<9rM–I犦,·”½–Ö˜?Å%8¿=P2‘ÔÞ*À¦,Q×ï8µþl@/˜m@z4Nnj4"üX|°û9<°§€‚!Jv5¤ÌÛcƒû󇖿lðCgp¬6h‹P[.´'¢Ýí©šƒ\(SàY¨=ôе‚ Þc¦l#C—L|ÛEKêh4HD¬³Ë«m‰\3˜ -|ë$‡Ó=ó£Á €Ó8‰& œG‹Ö軔® ښ†6a£å„™É%.£_trpáȹÐĘnÅ͖Ñåç~Þ¾ÃÿSõ™ç±ø²(dæ՚[ÁI<~ž·ÅjB ‘=òG\,Óx*ø^[Ã2lB¯l#o„ó嶊3 Ç­–ÂŒg¨Áçýhjÿ™yÕöÍÝ«›7U×ð÷&2!¶ÎN©÷|ü‹á R'A $¾±ÊC¨ó ;Ðpš ·’eEôá,žjaږ“fZß…e‰9¢ƒ••Y·͜B½edÄI·aA™¡ÀG„,&E#j©R%¸Ûƒle¨E«… aùE|¢’Lè³5Þ÷è­Y$*ï1ùíþ‰Wž%135¤¨×2ÞÔY( öì¦é£”uäJËBϔx×È÷!|G¹NLÀV{ŽbŽÚ“SSãF%4뛕¥Ng‹­<‘Áf!¼±-0ꎾkˆÆ:‹``KŒ;0ØA'ç dÀÏØ\‚%ž¯9žÎ]î‰Bnö^K 2„€ü™‚V˜Væá5Ó/4…¸P"[aÚÙÓæ(W¾A6»ØA>rdaN„å'Ùçp¹Ë–}yÌë]£”FÄe -¹¡ èFþ¶ …D I²ÖЅ#çœÆ0®k5§Åqõ¤ã¶D©+a¥gãUˆ£ç°Ñ-±0ø,åÙbö‚†Óv<Ÿµãyxžž1*2u½\¡g]¼t¨KÓ´”‡¢™+±DÛ:Ä´–Àne6ÑX$dÛʈ6Ž§[³ÿëgWºvYxvü¾íGº´À%K°íîy~è.¥YKHf+dXªÀχîËË»ëùåÍ‹¥ôA±x§œ]ß\%³×¿Ý^Îï Xìû72>ÕjlŸ*TºÃŠóŒ¼E'2˜ØD’aŠßs&1¿cÓÇv͛p sè–»«û;ºã}àΚ‡Ó0Åm>‰›ôg"nlÝû×·WóŸù)>mê&œPÌçÉý0ñÿþªÇ|ôtt¹ „{e‰]°ß(»ÞÔOËô­!ôgí÷¢áߙ.Îh2·'ç¼Þ_Þþp‰Jš·ÜÚ?š¬a± K2Gšì®$Ó–ݼû¥OÇéß¹ðe+ï^ŒØÆÕüäד -3IØendstream -endobj -1660 0 obj<>/XObject<<>>>>>>endobj -1661 0 obj<>stream -xÅVÝoÚ0ç¯8ÁKª-iR°J} i`‘ZȈÇ/nbš´$ÎlS„Ô?~ç¶Â@¬êǜÈJξ;ßï¾ü³æ€3h¶!Êj—¤vÚ·á+.´»øƒmÙ¶ $2Ð ‚kßí4< F! ݱr_³Átl«‹ûq[9ž^DžìÝ]HÅ ¹w ^+ÿ¹-“á•åþBó£ŒT*&§P 2I‹‚Å°LUúŸ!ÍcV0œr3Á3 ù - —JFi¡@R!_Î !Ï©Jyøª„\¡Þì ÷Ô¸€z±Q‚ð…`8ק'¸ö“ÿöç^¼Ç½xãý"^ë` C…³âZÃiŸV‘mHž1•¤ù]E^¼05f³`f…4fé­—ÑÜ2(拻;ôTšCÂ; -ª.±\û9éã[`Žn<òÍÌ+o⻞žë÷}÷ý¼¥ÑÆᮂcÿà…”‚C¢ƒA–'4Àú‹>/XObject<<>>>>>>endobj -1663 0 obj<>stream -xµW]sâ6}çWÜq^H4Ð̤3,¬gpÁÍ/ÆXÛr%±lvòã{%CþÈWSg†Ø²ttuîѹò?µ6´ð¯ ½3蜃×¾ºµæ¸€»Âç}¼  eµZ-pýú èë1û÷–ßÇS÷{­f»eõêwåwo™]÷ñ7©`±'©_†” -ɸ'$á¯.ê>K„ä_ -ðYœFÔ÷$ Êp¥EýŒ” )|šJ  N“r‚¿Æâôp¾ëPwâªÇ^D4!•À‡c_¸— ""A†V4"°¬@|;™)g>‚°|¯ßÀqnìáÀµ§“æÝäÊþíÌÍÙ`îŽfea¦¸ÝÙÃÑ¥BjŽ½LxuaÉÐʚvZ¬…¹4àÛ¥è{QdYÖâô¿A…¦ßNb9B¦BÉrT°˜È&ëc:ÊØÌÚ*ö‹&Jëq§ö€ÓÏ:übV]_>À×# -ړ°eüÉ·ÊWð"wÕ9.fb>½¹ßìɵ™ ˜;£¡=¶‡O„ýVµPó#+}‚Õ7Åx²æã^/=U ¼ÈÏ1^)ÂÒóïIÀŸ•‹?xQÅC…ʛKeè~3³'hùQ¯=ÄIÒ@+C5=;:÷4H¼TÚäRŽ«Î[)GGãËã‚QêQÎtî·3Ç5@HoMòƒ¢¿  ÊC9۬ÜòVírä'ΘxQÄ–“xKr´ (–ô ,D,i }¦ž¸¯Ëƒ|.K†²nµ˜EçâdÅ8x‘`ÇY ÙÖ6³­- -±ï²£¡I‘ ¡ÙÍFÓ_hþšã€râËè°Ììi(̹Sîýü«üóaZ©€„Iˆ=ä Í]e„D,%\X`cA"–Õ€¤¨n’È"&K$§Ë"]Å©¢Xß!Å8¨ñ4OJXŠerÅY\@º¡Éæç~¸ÅøÚŒ‚JQÉ¥L/šÍívk)uª÷Muc†$J­PÆQ±ð¦˜LÝÑ\Ó85¥dÍ?ž]0•zèðÀt<.̱–„À"zOÀÝð%ÓCðX‘Uâ™KKDCŽæèÞGF¢ÍÚ¤ l•¸à] -QücšHðjnO>éÚQvÖÕgÉO=É'"ÿ 4,ÂhB¶U~ *šµØTҁ®Õ¹(`\¾ÿÊcäŸA5<Ÿš²Ú7¹ÎZ÷'slߌÆÓÙíÀ-ŒÏªÓ»šK}=ˆ’ləE²´èIŸ¡¥ïœÜvþÇå*wþÈZšã>´ÛêÛª}Þ³Zý~aµ­3%æùàöëw%ûŽž -WÌß(kÒÅBåÇÜ0{-õMVoÿnu,pwÕ2C€aèa™Qº½®Õ;ïãGvîwUÓÈ­ýUûA“D,endstream -endobj -1664 0 obj<>/XObject<<>>>>>>endobj -1665 0 obj<>stream -x½Vßs¢0~÷¯Ø±/tn@¨­zéƒµè1Ó*'œO¾ ¤B‹„#ñgúÇß&ô‡EhéÔ6: ɗì·ÙýöoÃtO ÝÕ¸t­¡?Á½Å¾ kº®ƒë+G Ûìؽkè ºÖÃï8Ü·íkkÐw­É¸5_iƒ?¶£ÚÇuSËv÷æK˜‡ ïo*@–,‹Ò -€¹r͔2Îü(å%œdiFðٜW¬*Þß½ÔäißqÍi9Ä!ÌÍ<†‡çTìÐz¹ŸFW„‡Q²Ì‡ݧûo5¢Á(Z¥ª¡ùpÅÀ`åmaA ×Ë% IF*IA¦%—ùþdÑ¿CpèLnL÷—5©Wæ̘ªc›kh ¾ŽÁ…çߓ$(nPìÃxâšç»ÌyI‚h ©‚v¨¶—ñ­:|¤t®ÄÑ=w-¨${~ ¹§^…Š¼ú ¤éØ gÛ•îPÑá ø˜³# å$Њ¦ûGj¸'§2ô¨xÚbÜ-ÅH7Ðô×)úÄã‘ß„ ]ÇøÂExÓ™xÇ7_q|¾xñÉV|¯bÂKðæ10å£O±«­ks8™Þô¿.y¾>GEá4eE‹ò+üÙ|¶›@¿A*Rö=¦”Ȩ…ö£‚ÑœØ:Ï*òë¬Íçì+šŸÕFx‰½2k¤0×Ě+>MÏÖ>g"€Ó8ò=Lee¸ïèúPŠ?Ö\¯0ãÆQB*w×¾ñŽÙ%&P„ TÒrÄúd¦õ c(ŋ-x{h»±ò|Áòb£ì˜M•å‚z!^r Óx(õá¹ÆSš{{I@$¹fó½8Ö4í­Ò¡&Rŝ®O"H„Ö°†! -X£ÓÕô^ËXC;*åôo.û(·ôŽø®¨¿^‘„£|ÐDР>-P»º(|ãLkk¨8$×ë\éazQ"“âi÷TëvzX)ãäޙÀ0ÝÆïÆ{äŠÂendstream -endobj -1666 0 obj<>/XObject<<>>>>>>endobj -1667 0 obj<>stream -x½W_S£0ï§ØїzN¬¶=g¼DZ™Ñ–+¹>ù‚µ„ ©›é‡¿@´RH¸Ñ N²Ùýí.dÿäwǝ? Ž¡×‡`Ù¹À£‘ßßóþO kº®ºûÀõ3RFð#çõo7#ːEqò ȯÝ\@>æ9£Èе!W"°6œû¶{{B ,hüҽہrˆTãP'7€S70ŽHƲ€Æ)ŸÁšÐ'ØÈÑæJ¨Mµ[Gó¦76¾r&ctiÏËFžk[Îȱ¶ßTŽ¢ñt [Lêöò.×G+‡ïgOŠpçOa²€JçKª÷ ÿtR}Òcˆ¯lpgÎÛ³*Xu “)¶Ï`/SäÒ8áLj۟G…zt\Ÿ²?h?óÀÉøñ~ŽŸBÀ+zG -~¸E8Õì_®W@ڞ ·K ¤Ï«'°æ–g.´ª+Õõþ'WÜã“"Ì? t¿jmu &ÿ<#eÀYC,Â;ƒ{BÅk½§d †ÆŸÓ³šøy«Q¯®!'¼gKþ“± ¾%K4r®íÑtvc⚼ÐVdéÑ®¢Hی¤Y+]£ËtÝkÇ2±3¹S{ÖÌq¿ÐÝ4û?¾Ì'—Z«èÝ©"U)’Ôn.¬­¯³Ì'©„/¥ä(™60e· –Õ©æ ,ݔ*« -f—Þô¶»ŽY´+øáªêÊDE>Vi¶í;ÔÀPÕâòV E»”}LÞÆðҔ†ü¿j~+X¹eujÐ/9«uKT]›„³Lª;PNRÛÀž™ï¶­‰"šê`…*Yž¢ÛtØõ–AÙA·Jèu˔-kŽ{4‚aä·£?Ðôaß í8¯øžysaòօ<†ƒK¬–aÂ|“$—Doh ç·®qªõ4ÀQ(Š´èšÀŠü8)jÒÉàDô‡üz™‡ýÃƝŸ¿4¤¤>/XObject<<>>>>>>endobj -1669 0 obj<>stream -x½W[sÚ8~çWœq–6±$ lw²34,3 Ðàæ‰a‹X‰±\IN†™üø=’ t›®™Áº~ç|:7ùG­Müµ } -g,j_üZ£ß„?ÁŸãÄE!4½f³ ~P?ó¼~ðkMp[M¯ƒó{†ïß\=#ÁMÂòܾ> G~ï3H–ž©Œ'Ðòð÷ ®¾'àðLIž‰€†¨ˆB*D** < R‚âe1–ÜD\*–*n†ß‹Pê½0CP¢‚ˆ†º‘$Œ©UjÔôGÆ]ÐDý½Éx 9"ˆ1 ³ŒÅŠ%  É"éI¬ó ÁœZ2â/¥@À ²T:ÒgP¯x(#ÁU¤3 q̒” $ÅÓJ#Š‚%¯{÷ƒ«Þ¥Æö<ρ€/š;K=‡°êPµù I)xaq h¡4Sࠈ˜D¡ ÏIè!²k-åœÀKĂȬ¯Ð­0g *¼\Ùí1["}{àÖä¡`è%àX\køFŸX¯K¾ xðɃ–±öûºS!rÈñ04ÍçTPíƒÈÜ7_ ‘`Kqø˜põ1§[©uÍIŸ ùªoX­}›Ï­ –¨9‹é JÂ¥õà -P‰^¦÷שð@ÛÍ* $–Ú^T&(Ȥåd¦Ѻ҂‡XRô]«4GÈ b"%Z5ÎÝOïÑþ║Ëý<²oØ"uÇZiô´…€#g"tÇD¨¥ÛÇ(ÁЇi=fOüL̸Ù2ý€´w€mp¯Ð:úÌê±àÆك‹”^P…Ÿò0Á¤h¸—ÚÑ;=9³Ós“tß ô¨|^å>tñÐLzBÂ:Ç0Œc.ž$̹°Á6|‘gaŒ\¦¢¢·aªŽ³†Ÿw€/ßé)—û 6Q?Ýöü†7v4/vu·?øÚëîn»þÎþw«zۊT¤ÅSù{TèŽÇ_W]06Æ£‰?¹ºŒ#]]{ÿ.÷ÃkÏdÒ )W?Çoc^í«^כâòc¿õ÷¼ÕÛé Êk1±®¤á=ds)bCOçS½àM_ {V˜àaê4a긫²¾ž;5(l„-<%W÷Tdòd¡Ê®Äb£©¹Ü`¦/É[¡­Þ¡®Þ[$ -ã¦yè´njTXmˆª«³™Ö7uØNX—µÁþ¯k»Ö/ÁI×`,ôXdSAñß)ªz˜×­a7_ÕuЕcð€ Û¨·n½®[¦q€i¶7Ø]Ûc» Å\¼Î_w݉߻ƒ¿óôq¼ä-QÛ{vz»šüWF¿­–þRl]´½fç ¿[Þ©¾œLº·_ºxËâ4Pp̓Lù˜«¾Î îjƒÛnê/Ìzë“w恏Wk:ö‚Wa‰)…çís¯}ÑÁOR\ÜikŒž_ûVûª£u«endstream -endobj -1670 0 obj<>/XObject<<>>>>/Annots 961 0 R>>endobj -1671 0 obj<>stream -x­WÛnÛF}÷W ˜+©Iê.ÙEZ¸¶ä¨hbµRR0¬È•Ä˜ä²»K+*òñ=³¤|Qì\ÐÊ°-r9³3gΜYþ}Т&~Z4hS§OQvÐ šÔkõƒ>u‡|oãWKZº…ΠtY€ YÿùãÂ=چu›2j÷‚UW)ͪµæ^3jxŸ¶»Ú­µz=g×î ƒcª®xí—ùA8nÒ1͗¸?ėØíÚ¤yÔxFîó®ú÷?=Ÿ8h’ßjCx«ha¬ÔVñb8Վ £2i×I¾ªnׁ4¾´Óãîél®/É«6¢X'7R{Wϟðõ7OXz79ù³éèl2žœÑOþŸžð‰Ûïu²ѵÌãýµ¯]ӛËùè„.’¬ð§:É-‰<&.8)»–š::ö§BÛ­?NRpà~ir-i^ê…r&¨^ŘÏèDtöv:s.G³)¹§§ZQ‘–+?Éiƒ$}éC¹²2¾–Ú³ÿëÃ…côã ê?¿ÓåŽiA‚*Á -¹sGfãÒ=—7I$MeÚ¥V«6mÐô0v¸˜uRÚ$vM+¥{YJ[Z*M¯¦ô›0Rÿ*-Ùm!©àêÿ€þR%E"§$7V¤)¡Nu#‘00NSµ1'¼5TÍo÷¡ZØ1-Dœs¿ ”¶‹:òo¨ŽdzÆò&L rD~vû`PŽYá8ªSñÁåŽ¯Úý=LÔoƒÖñÝÞW9bôüÌ#ƒt£5’FàZZÈé2ðvQñf-µÊÜ}ä˜ÇBÇxºP&±Jo@ ¿•4r(HÐtznŽ8æaBŠà6ë»9´b!Í-8‘øÕac¸ú4ÂÒèЬ…–aT&ÌT,Ӈ©5:å>ȅ…t¥Û#Ú¢™ØRi8Åé^¡X•–V†Ë$•f }ÍÂBØuhUèørŸÉ01!áM;®ž;†;⡀,ü~§UÕÒQ¯иԮI7 ÏÈL‘Ž¡8M7b v¦FQ¤rS¦`SGX±#Hå”&yùqç-Pzå f’i©,ƒÂ o“X¨Ò¢ÞJÅ ¹Æ2·:T—-­Yì؉„vä\[[œ„áf³ > !¬mÞ§‰±A´Jj„w¶ DÄÈTF–‹¡É•Íµa”&Ñ5'æÍÖjã¹Þ9D6Bs¯’€Üü+‰Äe9Õ*4¦Ò×|Ï5(;Þ+­Û& jGhQA¼ôBåòEŜþŽ]wVø„ã04¢„'PsÖð-ti’W9E\¡«†w_º4Eczî³ÁÞ˒ñù.À °z_£Î€ÿŒâçeörÐk5»Ÿ£?¯{\ðR–`>±´†0 f×5F…cCiÁtOîL­RßmU3lõõ¥óyÕêíÅ{™W¤wZ}h\õ]3`Ëã",êQK+и¸/UÍzÀÃipÃÛ58TóŸyMá„n„NTé:ñž‰¸‹l-”JˆùJæR NdÀµ«–£—»ƒ–E$Üy”÷x< §xêځͪ`„ -1G [ÄÎj=º¥½Õ"7˜ 2·ÐÌ]©´&ßgR2b*ÇZ.‰ÖJ¹×%PZÖ?ˆÆÀ.`m’$Iw"¿‘ Ÿ5(&HLI Å­þ;RœˆT­èâíäÁ"kƈ%ƒ`w"Ø Ã㥮‚¼«D€û—þk([äqFðæ ¯k‚h -­VZdÍöef/[>=U¢ã]ì*êê ¡þ\K×ÏdIJ{¢($È™9M&dåGðôÅ*?tjJ^TÚÃü°Àé܃ ™ /Ó}Å„4ɂg\¤´. Ë=°ó;€:ˆbo ´€|»‘5¬„øy<™@´Ð8BHþàz m~{ -»—¯òY±h*wÓëþ ãÅjÈe[?™ôÁ#ßw곞]†ãa-“­>Þ¼†¼åt«7“Ùéë_NqvTXàÏUT"&ëÆ[ú;Ðä÷¢o>—uÝ`ÐV‡˜á}æ¿ü ž;jendstream -endobj -1672 0 obj<>/XObject<>>>/Annots 970 0 R>>endobj -1673 0 obj<>stream +ëO„Ò´zÉùt{Ž?Ç7,úñ¡+b¶{®’¹Z*L>_¡ÎÃ%;ÎÆážFD'œûµ×  úËÃÿ„Uı ®gíÝ(“Ù,£Ét”œOüM÷öòæÝ%Í­ù†{þ÷ oø:éåÃç‘N¦Ép6‚_"´âøj-*¶·éY‹Èœ‡kãmSUÆz OÇÉt2 wóoô~qôÇчàg)endstream +endobj +1689 0 obj<>/XObject<<>>>>>>endobj +1690 0 obj<>stream +x­WkoGýî_qE¾`‹]Æ`Wê75­#»¡5mUÉR4ìÎÂÄËÌff‚ÔßsgBqMT[q`™¹¯sw'}êá·O㝏([ôÒ †ãôœ†—c~VRqòÃì¤;R¿O³‚ƒtÐëÓèò"½]Ò,'Üëõh–µgKå¨TZR%­«E.½ü}ú@ÞÐRèœüæT)ùAVWά„WY‡ŒÎ$)CŽ\eÒ¹¢.Ë-eF¯¥õ2çOq NgoOz”ôÏÓœ·ïoïoÈo+I-QU¥Ê`ÑèîZç){H*ã¼Ë¬ª|+¥`´épŠ6ª,Iv\URSa,½2sGÂZµVzA…5«#*›£ÍReKœ”$joŽ!ÿw&óÒ'Î[)V­¼ùe(È2cs6Ÿ¡, TIé#'­®ôY—3è®ÔJ¦lݵpŽªRd2åãIE2§—ç¡¡Úa£rËW¨EmÅ5gŠR¾WxÓ!¹F¾V.D DyÇÈxi9¬•äÀ”[¥tò,¥¥±OšFž %9åëP{x7u™Ó<À¼k@«é Ií­B|aÊuýŽSëNztÅl҃a:d¤‰èáÀâƒÝÏá=¬Ø Q²«q/eÞܟ?´üeƒ:ƒc±á@³X„Êr¡= mº§bhd r¡Lg¡ö ÐcÛ +.x‡™² ]0ñm¸³Vu.©¥Ñ ±Ö.¯¦%r Ì`*𭕴O÷Ìg\Œ3Ní$š,p-Zx ïRº-hkjÚ„– Nd&—¸Œ~ÑÉÁ…#çBcº=@7>D—ŸCø¬{¶ÃÿSõ™ç±ø²(dæ՚[ÁI<> gMñ£šÐ\dOüËԞŠÚ¾WÖ° ›ÐkÛÈÃ;á|¹í„"ÅÌÇq«¡0ãjð¹D?šÚfÞjûfúêî ¤EUü½‰Lˆ­³Sê=ÿb8ƒÔIЉo¬òj}ÂN 4܃&È-eYF}< …§JX‡¶å¤™ÖAaYbŽè`åʬ›ƒµfN!„Þ02⤛° ÌPàG„,&E#j¡ÒJ(p·ÙÊ$P ŠV Â8ò‹øÄJ2¡wÌÖxß¡·fž¨¼Ãä·û'^y–ÄÌT¢NÃxSñ 2ÀÅA6·!_D%ù*·Õ­T;òŽîRÚy° ÙBÚ žh<ù^fµZŒ^3ÄÚÙn©æQçc¶®Û +.^°“E#óm,‰*xJ tB»’8rý5ó°¹:Eb‡šgh`žÕ­Ä„z-M™'p§Êï1úd¡4س›¦ORV‘(- =Sâ]-k܇Xð]å:1í9Š9jONu…+¡Y߬,¥p’8[lä‰ 6 ámøƒQ'pô]­@4ÖY[je܁Á:9¯!æxÆæ,ñ|Íñt†èrOr³÷âؘX`!äçÈ´Ä ´2¯™Fx¡)ŒÀ¹ÂèÙÐΞ6G¹ò â°yØÅn ò‘#ƒ s",?)È>ƒË]¶ìËc^ï¥4".SÈ A7òß°Í%ZH’­µ†.9ç4úq]«8-†Œ«'·%J½öIz0^…ø8zÝ ƒÏRPž-v'WÔ7ãù¼Ïý‹ôœQ‘‘¨“0Ðèå=ëâ¥C]§Í¤<Í\‰ÚÖ!¦µvK³‰Æ"!›V@4q<ß^ü_?»Ò5Ë‹ã÷M?êЭ 6(Y‚hwÏ{ðc{!5ÈZB2!ÃR~>¶_^Oog×wÏ,–ÒÅârr{w“L^ÿv={ `±ïkTÜÈøT£°|ªPiè>@+Î òÈ`bIú)~/˜ÄünˆMÛ5o̡ÿYîn¦4å}`jÍãi˜b‡6ŸÅͺ7¶öÃëû›ÙÏ¿üŸ6µN(æóì~˜øÕã?>z:ºÜÂ=‰²Ä.Øo”moªçeúÖº“Ëæ{Q„ïL—ç4ƒÛ£ Þ®ï¸F%Í[níMV³Ø„%™#MvW’qËnÞþR ÇÃtŒï\ø²•·¯®ØÆÍìäד +„Iàendstream +endobj +1691 0 obj<>/XObject<<>>>>>>endobj +1692 0 obj<>stream +xÅVÝoÚ0ç¯8ÁKª-i-e•ú@ÓÀ"Ȉ×'^ÜÄ4iIœÙ¦iüÎ l…êǜÈJξ;ßï¾ü£æ€Mhµ!ÊjפvÚ³á ).´;øƒmÙ¶ $2Ð ‚[ßí4< F! ݱòX³Átl«ƒûq[9~E¾Û¹»Šrç¼VþK[î†7–û=͏2JP©˜@œ@%È$- +Ã"U ès|†4YÁpÊLπæKè'\*¥…ÚI…|97P„Tt6£*å9à«r‰z³½Üã +êÅZ JÀC‚á\ŸœìáÚMþ۟;ñwCâw‹x­ƒ5 Ίk §=ZE¶!yÆT’æyðÀĘẐ~šf Ð|˜¦3´^BF—pÏ ˜ÍÐSi l/(¨ºÄråçX¤Ïoa8xä«?ì›7ޝïzfx®ßóÝ÷CðžFO‡Û +ýƒPB‰rXžÐ1 sqÏK&'»\æj™ó˜áñ&j:ØLŒ´…µ#C9•sÅ⃦5Þh¬ lž•-à„6:†$h)¾ _@=šè,xQ]G Õ\qLZº¼Ü–Wÿ:¶9·ÿAþ—*G‡ýŠº®-fÏ¿õz£ñ û~író{ŠÜÇ4Ôè£ÿñnæÖøTAßÇÑW'§}aٝ^ «©ó!ì®»Xù#‹Üðhžac/;³æ4× æ…­¯\†snµ, Ø°uAƒª¦€›Pìéšá¬Ý±ÚçM¼£éͶ­i©}«ý{ïaÅendstream +endobj +1693 0 obj<>/XObject<<>>>>>>endobj +1694 0 obj<>stream +xµWQSê8~çWœ©/¸—–"^dqg¸ÞÎ(t¡ë/¥ 4׶é&árÝñÇïI + +´UtÝ:ƒmš|9ùΗï¤×Z`ã_ .Π݁ ©}ójÍ¡ ¿ƒ·À.ބ`[¶mƒÔO@_Où¿c~ŸN½5̖muê÷å÷ÇÌ®û«L°Ä—4(CʄdÜ’ð·gõ€¥BòU ,Ébø’„e¸ÈÒ¬~FƄÍ$ЧÉ8Á_cvº;ßM¤;qÕ ? cš’Jàݱ¯ÜK1‘ # ˜W OfÆY@„ !ÌÁ/Ä×sÝ[§ßóœñ¨y?º¶ú¹SsқzƒIY˜†)®÷Np¥šC?^]X2²ò¦ëFa. x¼?Ž-˚þW ¨Ðôñ$–#ä*”ì€ +–Ñt¹OG›y[Å~ÑDi=nÔrúóE‡_̪ëËøz‚]Aû֌? ùVùÊ^å®:ÇÅLLÇwï»3º1sa™SwÐw†Nÿ™°ßªj~d¥Ï°ú¦OÞ¼ß뵧 +„WùÙÇ+E˜ûÁICø£rñ;/ªx¨Bys© ½ïp'ÎíàpÔ[Ï0b’4ÐÊPM/ŽÆ S?†6¹Œ£Åj§óÊÑÑøqÁ(õ(w<õ¦ý‰ë ¤¿$€ !ùIÑßP塜­–QNy«v9ò gLý¸âËI²¦!ÙÛKz"–6Ð>3_Ü×åA¾”%CY·Z̬Žsq²`üX°}„<†|k›ùÖ…XwYŒÑÐ$DȄÐìæ£é?hþšãrÈø°Ìli(̹QîýÃW‡Ï»i¥R&!ñ‘C,4[t•³ŒpaƒU`ˆXVC’¡ºI*‹˜,•œÎWŠt§Vˆb}ƒ”à Æó<a–ÉgI閦«_ÛáãK 3"*E%#’2»l6×ëµ¥Ô©Þ7Ս‘8³"™ÄÅÂS˜b4ö—pC“Ìt•’5ÿxv!ÀTê¡ÍCÓõ¹|4‡Z#ˆéoÅçLÁcE^AŠg.- 9˜º {»‰WK“¦°Vâ‚w)Dñi"᛹=ù¤kCÙÙ¹>K~èÉa"Ÿ¡‡f€E@@ÄÖÊTE 6ã›J:pnµ/ Wï¿1ŸA5¼œšòÚ7ºÉ[·'sè܆ãÉ]Ï+ŒÏ«Ó»šK}ý %ْ3‹dYѓ>%„]Kß8¹ãþËUîü‘µ4‡]hµÔ·U«saÙÝ6~aµ¬3%æiïî[w%ûž +×,X)kÒÅBåÇÜ0/lõMVo}µÚx›ê¹!@?ò±Ì¨睮Õùz†qª³ÝRm¯ögí_„ãDMendstream +endobj +1695 0 obj<>/XObject<<>>>>>>endobj +1696 0 obj<>stream +x½Vßs¢0~÷¯Ø±/tn@ÐÖzéƒµè1Ó*'œO¾ ¤B‹„#ñgúÇß&ô‡EhéÔ6: ɗì·ÙýöoÃœµ¡ÓÕ¸t­¡?Á½Åݾ kº®ƒë+G Ûìؽkè ºÖÃï8Ü·íkkÐw­É¸5_iƒ?¶£ÚÇuSËv÷æK˜‡ ïo*@–,‹Ò +€¹r͔2Îü(å%œdiFðٜW¬*Þß½ÔäißqÍi9Ä!ÌÍ<†‡çTìÐz¹ŸFW„‡Q²Ì‡ݧûo5¢Á(Z¥ª¡ùpÅÀ`åmaA ×Ë% IF*IA¦%—ùþdÑ¿CpèLnL÷—5©Wæ̘ªc›kh ¾ŽÁ…çߓ$(nPìÃxâšç»ÌyI‚h ©‚N¨¶—ñ­:|¤t®ÄÑ=w-¨${~ ¹§^…Š¼ú ¤éØ gÛ•îPÑá ø˜³# å$Њ¦ûGj¸í™zTß¼ød+¾×1á%xóòѧØU‡Öµ9œLoú_—<_Ÿ£"‰pš²¢Eùþl>ÛM ß )ûSJäÔBûQÁhNlgùuÖæsöMŽÏj#¼Ä^™5R˜kbÍŸ&ŒgkŸ3Àiù¦²2\€‡wt}wÓQ(Åk.€W˜qã(!•À»kßxÇì(BP *i9b}2ӌú„1”âż=´ÝXy¾`y±Qv̦ÊrA½H/¹†i<”úð\ã)ͽ½$ ’\³ù^kšöVéP©âN×'$BkØìÑ=Óô^ËXCk •rú7—}”[zG|WÔ_¯HÂQ>h"hPŸ¨gº(|ãTëh¨8$×ë\éazQ"“âI·§uOÛX)‹Éz[€˜nãwã?؊ãendstream +endobj +1697 0 obj<>/XObject<<>>>>>>endobj +1698 0 obj<>stream +x½W_S£0ï§ØїzNZ­=g¼DZ™Ñ–+¹>ù‚µ„ ©›é‡¿@´RH¸Ñ N²Ùýí.dÿäwǝ?œö ?€`Ù¹À£‘ßßóÁO kº®ºûÀõ3RFð#çõo7#ːEqò ȯÝ\@>æ9£Èе!W"°6œû¶{{B ,hüҽہrˆTãP'7€S70ŽHƲ€Æ)ŸÁšÐ'ØÈÑæJ¨Mµ[Gó¦76¾r&ctiÏËFžk[Îȱ¶ßTŽ¢ñt [Lêöò.×G+‡ïgOŠpçOa²€JçKª÷ ÿtR}Òcˆ¯lpgÎÛ³*Xu “)¶Ï`/SäÒ8áLj۟G…út\Ÿ²?h?óÀÉøñ~ŽŸBÀ+zG +~¸E8Õì_®W@ڞ ·K ¤Ï«'°æ–g.´ª+Õõþ'WÜÞq柺_µ¶º“ž‘2࿈¬!áÁ=¡âµÞS²CãÏÉYMü¼Õ¨ŠWאÞ³¥ÿÉXPߒ%9×öh:»1qM^h+²ôhW Q¤mFÒ¬•®ÆÑeºîµc™Ø™NŽÜ©‡=kæ¸_ènšý_æ“K-UôîT‘ªIj7ÖVŠ×Yæ“T—Rr”L˜²[ËêTó–nJ•U³KozÛ]Ç,ÚüpÕue¢"Ÿ«4ÛöjàF¨jqùN+Т]J‹>&ocx +iJCþ_5¿¬Ü²:µ藜պ%ª®MÂY&Õ('©m`ÏL÷ÛÖDMu°B•‚,OÑm:ìzË ì [%ôºeʖ5Ç= Á0ò[ƒ18ÕôaŸß ­—W|ϼ¹0yëBÀÁ% VË0a>‹I’K¢7tªç·®q¢õ5ÀQ(Š´èšÀŠü8)jÒñ`¨ Nzüz’3ëýÄƝŸ¿Ø¤]endstream +endobj +1699 0 obj<>/XObject<<>>>>>>endobj +1700 0 obj<>stream +x½W[oâ8~çW¥ËL›4ôÊΪ+1-t‘¦”-™>õÅ$¦qâŒí´Bêßc;Áît6HÄ×ïœÏçæühuÀÇ_Ώàø ÂyëkÐ:øð;3œ8ëb#ßó}‚°½æyû<µ|p;¾×Åù-Ã÷ﮞ’ð™¦Q}n[F·Aÿ H–†^¨Œ§Ðñðw +—ßÇpx®$ÏEH#TL!“Š " R)AñºË ®c.• ˔×£ïÕH)ô^˜"(QaL#݋I%T‹j5j ú#g‚Îiªþ€þd¼†虄iÎÅR†)t!‘ô Öy”àÆÎJ-óWÈ3 à„y&ˆè ©W=”‘â*Ҁ’$aé#Ê’áie‚EÁˆ’WýûáeÿBc{žç@Èçs͝¥ÈžCÔt¨ÚO|Š¤¼²$´P–+pPDÂB¢Ð„‡/iä!²k-åÀkÌÂجoЭ0c)*¼(íŠö˜.¾=pkòH0ôp,®5üá€XoK>§xð飖±ôû¶Ó rÄñ04ˆÍfTPíƒÈÜ7Ÿ#‘pMqøœrõ¹ Û©u-H ùªoX-}›Ï¬ –ªKèJ¢…õÃP‰^¦÷שð@ÛÍ* $‘Ú^T¦¿)È¥åd¦ѺҜGXZõ]«4G( "%Z5)ÜOïÑþâՑëý"²¯Ùè)˜˜¤ûA {õóª÷¡‡‡fÒÖ9†asñ,aƅ ¶™àó" cä2W½ Su’G4ú²|ñAO¸Þ=°ŠúÉíM?øktmG‹b×vÃoýÁíÝM/ØØÿaUo]‘†ô£x& +½ñøÛð² oG‡ãÛI0¹¼Ž!]]{ÿ.÷£+ÏdÒ)W?ûïcQí›^ כêò}¿ö÷²ÖÛèì Ê[5±–Ò𲺔±¡§ó©^°ƒ¦o•=%&x˜:M˜:nY֗s;¢•m€°•§æ꞊Mž¬TÙrñN,VššË fúš¼­|ï„Z.®¼×HTÆMs'Ї¶©5Raµ!"2ª–góÐ^Õa;aEì\×û?¯íô¡}N¶¼c¡Ç"› ŠÿNUÕݼn »jü¬®Ûƒ®ƒ;ÝJ½eëmÙ2L³¾ÁîZÛ©æâeþºëM‚þüY¤ým ï‰Zß³ÑÛÔ係ºÐéè/ÅÎÙ¹çwñ{±ãéËɤw󵇷,þDCW<Ìõ—¹êë¼à–Üs_a¶;§Þ±^­MèØ \Ƅ¥¦žœu½³Ó#ü$Ջý ÒZ·þ~uÌendstream +endobj +1701 0 obj<>/XObject<<>>>>/Annots 986 0 R>>endobj +1702 0 obj<>stream +x­WÛnÛF}÷W ”+©IŠºÛEZ¸¶ä¨hbµRR0¬È•Ä˜ä²»K+*òñ=³¤|Qì\ÐÊ°-r9³3gΜYþ}R ?! ÚÔéS”´üõ¾ߧîp€ïmüjIK·Ðôüî# ðá·ê?\¸GÛ°nSFáqÏïPu•Ò¬Zk á5£ö€÷i»«ÝZØë9»voèSuÅk¿Ì‚q‹Ži¾DÀý!¾Än×Í£æ3rŸwÕ¿oüûéùüÃA‹¼°åá­v¢…±R[ŋÁXT;6Ê¤]'ùªº]ÒüÒN»§O°¹j¾¤FµÅ:¹‘ºqõü __pó„Å#·Ÿpò_ñš]¾Í_MÞ\xç£w“³‘7›ŽÎ&ãÉýä=ñùáQÐ鉟¸ýîQ' ]Ë<Þ_ûÚ5½¹œNè"É +oª“Ü’Ècₓ²k©©£co*´Ýzã$7 ê—&גæ¥^(g‚êUŒùŒNDgo§3çr4›’{zªi¹ò’œ6ØAÒ÷‘.1”++cÿk©=û¿>¼Q0F?ªþó:]î˜ràW Vȝ;2—î¹¼I"i*Ó.…amÚ éaìp1ë¤0´IìšVJö²(”¶´Tš^Mé7a¤þUZ²ÛBRÁÕþ>ý¥JŠDNIn¬HSBêF"a`œ¦jcNxk¨š×îCµ°cZˆ8æ^A);þ mu0äÝP!4Éô$ˆåM(䈼ìöA¿(³‚qT§â ü!Ë'_µûz˜¨×úáñÝÞWÍ9blxYƒ ҍÖHkiu"o¤Ë ±‹Š7kÐR«ÌÝGŽy,tŒ§ e«ôÖx[iA#‡‚M§çæˆav ¤n³N°›C(&Òܒi€_6f€«O3(ÌZhDea‚LÅ2}˜ZÓ§Sîƒ\XHWº=¢-ʑ‰-•†Sœîˆ…Qiie°LRi¶Ð×,(„]VŽÿ÷™  Þ´Càê¹c¸# +ÈÂïuª–Žz¡OãR»&u܀>#3Y߸VïkÔðŸQü¼Ì^za«û9ú÷óºÇ…FÊÌ'–Ö&ÁìºÆ¨p¬s¨3-˜‚îɝ©Uêû£­j悭¾¾t>¯ÂÞ^¼—yEz§Õ‡ÆUßõ0¶L0ü0 +!¢…±´‹ÛùRÕ¬<œ7¼]ƒC5ÿ™'ÐNèFèD•®¸+±HÁÖB©ô˜¯d.µ°à$A\Û±j9z¹;hYD‡@yÇzŠ§®ج +öG¸Ñs²Eì¬VÑ£[Ú[-rƒÉ s Íܕ +Ikò<&%#¦r¬åøh­”‘{]¥eýƒhìÖ&ùG’´‘'ò¹ðXƒb‚Ä”ZÜê¿ã!ʼnHՊ.ÞN,²&a<€XÒ÷w'‚0<^ê*È»úA´¸w齆²E ÎÞäuMM¡ÕJ‹Ì§Ù¾Ììe˧§Jt»Šºz‚Ch…?×Òõ3±¬Æž( + ²@fNgg“ Yù<}D±ÊšR#*ía~Xàtހ ™ /Ó}Å„4ɂg\¤´. Ë=°ó;€:ˆbo ´€|»‘5¬„ø5x$2h¡q„ýÁõ@Úü öv/ßFÀgÅj ©ÜM¯ûƒŽ«!—m½\dҏ<|ß© ÏzvŒ‡µL†}¼y ;xËéVo&³Ó׿œâì¨>°ÀŸ«¨DL֍!¶ôvÞ ÅïEß|.ëö‡~¿×®1aË Åh~ðûÁ¿¸Å‹endstream +endobj +1703 0 obj<>/XObject<>>>/Annots 995 0 R>>endobj +1704 0 obj<>stream x•WÉnÛH½û+ -:²cn²6É8 ‚$e¬9 àK‹lŠm“l¦»)YóõóªI-#g±A\º–W¯^•~\$ã?¡Ùˆn¦”VqãÎáãÏO|‡&·S|V”Ìãð¶¿*éÞ?OâpŽgãÙ8œQwÅÏ~P2 G}þ’à­›évà&úœLèNÓwob4½ 6ïÝtW{ó£$oðlt{Ž©»âgï—ÑÇ1% -s8™Îg´Ì|ä1-ÓᲐ5©Ú:Q–ä -IQµ“æÍåòcºíΣ1Ì.³!áoP6"«TMAC¥°ÒP° ÈêJFpE¤ëh§[媔vg¬üÃm!Œª]P‹J¹6¾÷ñ„M“ º˜ŽÉ£)‡ô‡vòÁ G8DûLµ®„Si°XÜÙåFWôUÕí³·©êu¨Íúš -ÎXMµ” ²L•(iðû_‹{BŒ€c@SÆ Ÿäu‚ãAÚ6Ȋ} Bú$G°NZGi¬Ò5éœNßóaxtah4í@-œkÞDÑv» Ë󣣓ÞýþÔ²PÖmÉiZIJu£.öÕëÊ>ŒZk¢R­¼-†)Ù=’dH¢ÎØ\%2I[mʌä³L['V¥ ‰ÝžÑY¤>œ.#Є%‘:j ÁôêÁ-w$ëTgxu_%D_U²vöšdµ’?Åœd²\ŸùÝ*-ü[­©II­í¼§œ6-\? µ-a~™"(9Æ¿n.ýW¸oJ•¢x­ mMjœ‹Ó@aä™{& Þî-š}ïD™Q¨>Ÿ\é°?³/Úß`[*j*ÄF‚l¥ÖOâîI«ÒXo“üô2„lÛ4Úp¬«§spî!ç“%7åYÀ}`8²Öà?3…_µ2e¯4øàËÌ_3é„*íàK~Œ·½› -E+ê×¾ïiL t>@dR øÄïêúÌõà¾Ð۞G§:>ÑVAVО5¸‚ @¥­\ALÖò—š¥#*„éZýÖåûÖCñªW’·³I_…¶]Uʽå°^N½îó>+Ú !4Y+ ‘CtzÉa3Þ |óI2iZÃt és΃˜x"hÕ®!(Ï][@w«ÆèdÖ«£@8:ƒîÔC'W-QnÅÎÒº— -”Ýûõ éèWÿ5—µF†ÛåH‚\—¥Þr2ì:ܜ7v&¹ Ѝ$VˆÔ“y4 -Gqñš…ó¯ƒK.ÞQ5„°tBû t0âIÞëÜqò™'ˆ/ŸS‰ù€”õŠ<6ŽZS.·ÔHÝpØÀLlñy†ÎC°ï^“ʽr£áI9¨¬“õ5á$—ÁJp±P ¯1ȢȜ¦g°hà -ϔ¸ô)?É ˆôJÎÄ^Cμ¬ŸÖ¬£‘Zߋ¾g!õÖaÎ0qɪ$žÃP҈­§!øÍâu–Ýޔr>®“ñŸâñL[&JÃþR“ðD 2†…«Ê3ªÓ~? ɵN†ªÎ5ŽçB®[†÷W½>5¹Ty)#?ƒ¿è˜Z;ŠãQ´ìÝDgÁœLö+(ä•çéa`tD¶PfP7ƒä¼œî  -‰K®Eêû–©>€±À©J‚$ëÂï'c½n1 î ^|Ðâ£æzôšçGSë¸7tÐ聾ÀSõF—¾>ókÿßk~ìÔøœ ÷mU ³£€xšðòåOÂ1úñ¤/ßÑ ïw ×ŒlôQô‹àåÆëXw¿S „e‰I¾ÁˆÖíºà)á ‘vù­èa¸jÑÖ¾³¯t-¯XË0ښ)nÕîá²/g‚­x:áiÉàô†ßE¨ŸµÅ4%f èÃÒí7ן®0Öó帹\ă/6űWP!ã~S#ÓÖ/â:© (³’©èuH¤ 7];ÑÄ%f(3 h,RÝÈçèAœÙ{XvØ¥¯ß{ðLz¹0Dç}â ~ -L' M§HìXdÃûwßÞ¿£…яÌøuÐ ×3ï%™ÎÂx~CÁ,Æöž “I8»º-x»§;¿Ÿ` !¥;¹Q©ô\ô¿L¦süJÀ¡ù-Ûú°¼ø~ñ/;ƒ.,endstream -endobj -1674 0 obj<>/XObject<>>>/Annots 973 0 R>>endobj -1675 0 obj<>stream -xW]oÛÊ}ׯð%r*R–d9@páÄr*4¶•HnPÀ@±"WÒÚ$—á.¥¸÷·÷Ì.eSº½-БDrwçÌ̙3ß­>õðק‹)ÎZ?© ü]þя&4ê£?ìÎú#ºÖô­Õ‹zØøúñýKk2ÂÊá`]RFƒáßþ*¥/§þpõi8¹Àïþ—’Ö­OËV÷fHý>-×°5<Ð'ÆZ&Î@–qûËVkâR–Þg•±ï;”ÈBæ‰Ê7¤s²[II©v²ìf:‘i‡b[¡r2UQèÒÒZ—$(–¥»$r§bÐc[2[½ÏiõBÁƜ-ŸZaÂþ9¼_&íp<ž¹›^8FÀÄ£™· #I¯†`[¨'ÔX:ô¢+Ê¥L`ºép¥óí·*ÞÒ·Od:ßKÊ•GŽÍ¬ƒÖ@瀗0¢(Æ_ÖZgª8èÀþN¤*¡M#’±Î2‘'©Ê%íu•&´’H‹pAMÕ³„KÊ|`ç»7=ºäÁþ` Ù}òÿÂO -“OWËÏÅ÷üêûÕÝýìzqu3ýŽëo³éßw÷ó«‡Å”Bs=ýûìóô#®x|dìZ$z;Ú?ÍìÉ,d‰ }táõ€„Ԟ‹\¨É#˜m¼®ŠTþúx¼Úßä{0ñr0G0xˤ99á\xXþ'Ëc3ߥÑie‘ããC;óŇ[™(1×Fñãx³¼¨ì"Õöx¼A Œ¼¯,Ü\Óÿ -Y½P¥òcH¡?íPgƒA4èõ‘È WppÿN[ÙA¶…¥½²[úü0_¨Ñàô™h>‡ýv‘V†æ²Lݸ*Œ'Ûã™c}¢ówÖqŸ7hk58–Él%Kǯˆþ"‰ENñVk”×²Ø •ŠU*©(UnI,ƒgeŵô0«Ô&쉩`“­KÑt1g -Y&ËX‰4}iÔלmÌKMF¯í^”ˆÔâo×Sl žY¢ˆpóËÝý-nÿÁ}fSXÀèUîÅIyð«(  ‡G.²{¹Â+˵ˆ%픠m…J ¹öœÓI©‹0(±¦™Ê˜CA™Ì+¹ç|NjeZ»TˆfϛÚã$/5š*€ôp¿Ì¿vN½S Ä28æ…u,IªØ&ˆ¤LÅy‡8øᄘ ìteƒËrœ*DË8ÛáâuPÉ:AiÁÂLãÀD¢tR07‘àó†OVùZs%i-__õæ+W”_`ǒۺŸ½éìJw¹VÝGa’Zûů>v á!2†¹ŠúšQù$QÞîîDÙMõÆ+ËR—ÿÄåÉ©®Z,¾ÝÀã+f¥+° EøJªCêRÁ_Ì8ðхš‰ðŸù¶ç´$Zr,ŠÊêоØ€¼¨#^~«2U/ºÝN ‹0(úZ Ÿ á±(1m²U'rŽažx ¾©Øͤ²S¯,b*`>ƒµJÑ ‚F×ãi•‡/zEàYñßO ²J%OŸrí¤ÜÞ²™©Lr2wXñ'çwo.1ÿóœwàß9ÆzßSúË#úª2Ì-ð›]Î+×řæÐÃ"‹ÖÀ­Üåâ8½€ŽâsÕ.±w-…­êjØ£Œ8¨o]³顔i-¦Z™ceÆx‡®„"Zˆl%Ч &#'&݋¤§ŒXâà„MŒ›% -1â×ìÕiÂᓁjz¯Ë÷蒇kôpJ4‰ã9iV7XqYrîrT^Qž -ôýÍ¡*ùMTÃOLÛÁVÄÏŸ€™ß^x_ømÄ¿íøß½™^‘Æè“súÑEßÍʋ«ÛOWܤŸ0àí,®0X”„Ÿ=Á8¿%¼èa‚OÚÿ_‡ÃèoenZ¾ìqP§ËÖ·Ö¿̓kendstream -endobj -1676 0 obj<>/XObject<<>>>>>>endobj -1677 0 obj<>stream -x•WmOÜFþߘúKaß ÇA"¥RAÊ[EÄEm%¤hÏÞ»Û`{ï:æò¡¿½ÏÌÚ5!UC${vgæ™gžݛÐ?:ÒñœÒbï|±7ºœÑdB‹ÞÌÏNi‘Ñ8Ç´H÷ÏO~£kMÆÑ«OW×t³ÿÊ…-éSiîèª6¥7嚮·Îëâæ V®©*[{GÑ×Æz墄>Ê?(U%-5-•Óág¾kw°ø²7¦xrœLá~ß®è‹]:²5[À?•M±Ôøߊ*µÖòfiýæˆT™‘Bx®ReɁ¨rKÞš*]›ÑÖ6ÔªÒ'é<™±Åá/ÂÑwª¨rM)ãû6¶¥ÚZO­mòŒœö¤¨âLI²!SJ–ðî\S¯¸Å8B,l© - 2 ptÑs~;ºÓ³€~<…àˆòJe¸™â*øì/-CKqHñÅ|<;C¹ºW·qn -ã_LÆÓYÿŒAÛ=¯÷E§ó"!e¹ô7]oQ r p‡”¼íp˜Àß®âéÝ9W'S^"íƤ>Θ¢\+S;s@­ñ$…Špɕó„<NÄéԖ™Ã=ô\mµ¾±º}ý.A!$bJmƒÚ¤¶®uêóí‘PF[„^jÛ8vÔKÞÉÁ¨rÞV.Bt¹×õPºnÙ=ç rP”5E±á‡È7š€Ù×È1àÂîe¶üÕg¸èf_¯Ÿ“)Pö¤pX†¶b$,Ü1 ë:ÒeXýAåVmbªP¹³ThUº#x¶ÈU{…beµêèpßàáôíÙS7¡Iº®Js£¸¢j€7C& Ž®U±T|C9pì*ksf<Þ!ò°BŸ×ª«ItB¹Vß:›‚Pۀ Ù•è©vÿöæà¤Ès–¢À·Mb†¡vCཱུ¿ ˆðœ+Ìv \Éë´6œÕ¶B¦L) 8 ¶ nlZkԇáÛìr t£Ê`Z˜@T*qsB¨;’³=ä,1H¼Œx+l¦ó#‘¦>òUVfVŽ£ÉÙõ ¬ÎaÑ)S\k•m9ðB!ï–?0i‡wkë[›Ó½S2ÿžˆögfµ`G—ÈÀ³¤ò9-­üc#¢÷ÕóѨmÛ´iîä6xMl½uWќIº6ìãá4ê„é\#D-ðē?s†Žgⵕ7 s Ö t­À÷2³`ÔÈ/¤1úqò‡)3Û:êhÁÀ É6MÁšÉBO‡óì†Y¬rt¦“gæmêFÜ$¥wDžíZʙL‡©%\cìqç\öÐwÃNÕÀ]!ÔÙ!_„ä7¨4Æ®¼Æ ˆcÊt…àšv ]]]Dè-~h²`e2jkã¡;¿ÑÕÛ÷Q¼“ ÜÐi´ ˆãü!¢¢ñTÀv§ÃîÖT‚CPV‘“µ¥Ì°.c, µ‡>Ù¶†üë:"çÑõ?Ðznc±/¿-[U‡ÙÎûD_õH:èqÕå¾ä¿/FÓw£?¯úڋhÇa É€…i…ÖnËÜ*Ù5#ò€×iS9¡3+—(â'±c íN ÃÉú{¤·!EzÃNéµ>@ò°1ö³»Ñ‡×}¸ ñJf¼¬“dv<¥xzšœá7–šß@‡u£jì;ƒ€3•ºb—„òvÕí=Γñü„O>:ˆ]²Ìª"eì:$À5¡íÐ ¼äìP -MÒɤG˜ØÔÚ2 *vó’÷”O Çã„Ö–éúzJ×ÉÿNI¶ 0ºï»Š &:ľ%ÆG¨ò„aš K‘ZB¤ÖX›j§Øv–¦T¢Hs°QÊDg -1T–¹bÉ´ýªjÌQt¯F} -Ý,l6%š"Ïy|Š}§Ô`±’ø¸k2¡y·àÑïE·ÂçvÕ7,Ö÷O°!­|‡üS¼üd[…ÐãÏaøèVß>™qrÆ &lô‰7Iæ͓o1üÞ\<ùzÁë=¢êgɓ†R[äÐ}>üÔîþ #µ•¹ÿ$y¾¢%:ƒ)jÊVƒ5WS‘ÊoØÏèò¬û¨šÌO“ñÙ1ÍO§Éô›~¶ýòÃùK€e¿@é¦M -mø,Z$‰OÇb?9INzÏk}h>#A :–@ìoÌRA…¯™Î’Óù¾êàòل½^ì}ÜûIˆuœendstream -endobj -1678 0 obj<>/XObject<<>>>>/Annots 976 0 R>>endobj -1679 0 obj<>stream -xµW]oÛ6}ϯ¸Ðšf‘,Ɏäeh×nË°vYã¢Ö¡ %Úb#‘*IÅuýÎ¥$'MŠmÀÐ$Nb™¼ŸçœK~8È(ÅwF‹œ¦s*šƒ4IñdÿëՏÙb–d”Í“954fI>¼«éêàéò`ò̲Œ–kXšŸ.hY)-‹ÃŸ¤•¤ Mò£·¢ðdÖÔìèûחW䤽‘ö‘£Vlä»Úlh­jIސªëÎa½Ç»JÒÚØFxX)Ié¢îJ‰¼lÜùãå{ÒYï?ÎgÉ Òð¥ôÚxY¼»¸ÊÓ|Aםõ4KéÏ<Ÿ¼47“ùj–ç-ßEiœÏ¹“Ë -ÈÜ -G?›]<£h–FÇÔZ¥=ðe4EŸ£'¢ÕŽ:€–"ÆÖ -šÇŒ]z ãF¥á½0­’Œû’V³,GMAøÆ£[ˆEI’ òyà7¿®Å֑±ä*c}aÀFÁ)°ÂÊïxO–̦9Åù"9Å_6  çZ4ÈC¬Ìä…1ƒxž¤ó^h¥¨ë‚í´wi!däh%ጎZk -éœcÆirfí·ðDo7†øÊvagôêâ2zû˜@ZĆGà<þÛ{o«S…¨‘’”p꺂í¯;¤–â¦7*ûrò›RÞ¨BR“Z³ÅAQè½hh[±`„ʏûN|ÕÛ&Ó±Ú uÍÿ`xÚÂeâlYV¨.D{ùißH{ÞD¡¿¡BmÑJr>ü®Ì6,X«M‡ kÁ4¤ -Ñ;Ø]jӇÎx`nh"94‰õø3—CiµAëåGè(  mÔM/…+㰙*µá*cì/ԚŠZÚkôû]׶Èê~ùÙÓƚ®uûOöÑaW#…   -È):k¥ö´µÐhlDµŒ»6"Ý5+D‚üÇe!¨‡¹÷Ô©úóvêZ:;ÐpÈèN¡Wý駂“ S*tUÈ0¨Ò¡ÛC½?G¹èöX.¥VLˆÐö•,‚ฏPé îK#~äi#1tBQ€.@”¤µH¾`™õkkš0ÉÆdŒFiߕ¨¨J‡±6>nÑ@…„¢Àøø}Ÿ†¢•øá⯤óävãnlà6ÔºÞ%ôa‡¨^U‡ÀTÚÞÈžuºD4`‘¬MˏÂÐ|à÷ç̤Ѐ ±8Œh%ŠkÔßEÀ' t^Ô×T*+ îëò„6#Ø/g$±Ò!Ùéâ^Õ¶ -ÌåE8%tˆ=« b@ïÀz°‹×Ý2=8‚x kœ7-;Ù{DFoîöx˜6e Q PcPƞ~õŽ7})D³ ƒT`á¸{à[ rOc„¢ô‡õá@8#Š^i#N”7L¦QýûÎ@3S³˜ ®ŒÆ &O(íChýŠ8n•yÄÊÅ`¸^a.ÜË1]Pi˜ ׊'ônðÌ -±‹½‰™Ea°íL7æ4ÐI×%Z¯ïº?LGô«4[]n!¢(-ôΆã ëiVyߞO&Ûí6) ^‰±›É8’Ê7uB@k£“­GǐÝófïÅR]14GC½C¿ØlX)EaQ–à{No”F”Ž^.'ùõä÷Kº gKφp¡ WO^<}Â6Ù|:¾ç2;Ë¡ÏQBK$ɇ]žÑ Ú}öÈ âc †•@ÙsÒ[þ×-Î%à°ñ¤ÓŸT·LWå{ Z°Ôy˜+ûúÇÓò­ÏDi ¢®ÇÐoϽwÖÔÉÚí+úÅ5Œæߖ4ÃéäóöO.Lª/ßX„0OX#¥Æ%"t»D%!y~u ­öbüç¨áüBÑóËCŽÆ„ƒf%VrLö ©c4;ˆ+ÆŽ/|(¬jýñýЗ^µŒé·‡=%ÐS(ō’uPBà]e6¶¨uÌì0×:èµÂ dñA¼Y9¾ãŒ—¬x<ËL:g'®BŒ.ؤg›ôÆ[Ù!3ãŽIžÓ>½áút:˜Îæ‹$=Ò|Á:ã›ÜaçKkÞCåé™):ž Â+£Ù ”ý–x‘â -Vf'ÉIB¿¨FñÕ)pùö€À#ó(r˜òAáÙÌ wÌÅüH˜8ËùÑóåÁoì쇉endstream -endobj -1680 0 obj<>/XObject<>>>>>endobj -1681 0 obj<>stream -xWkO#Çýί(®´áñ C¤{Å®!Y% Dö½D -ùÐ3ÓÆÆÓNwŽÿý=ÕÝcÆfÙDHfzêqꜪê?úÔÃOŸÎ4S¾:ú“úçé <å?úé„ÆÃ!~ãe÷sDSM¿|õØht–öÿþØp4„Ý¿µ6ì÷þ‰ÓÁhôOœ^ Ӌ}ŸçGݛ]Ð|lÇüQP/íõz4Ϗ‰(¯×¶0/&-ÊòdþÇQ:>¤yѼ­ÕûïÒe¹æ¯º7gÔﳓÁ ôúÔœ§gü_Íç×·óÏw·—TԒœ&AYýDº’ôé¿÷32²”ÂJZ×Β[J -Q0oñ˜C|ëè˜T[g»µ5]»Fv £^¤±Ýýø8?® S•uR¤ß°ÂÎß1uœÒ\ÓF›gF×Uà•=¥\¯·Ý•~A®Hf¡JIbá¤!SW•ªžø1ÕiŒ¤]öÔ±b•‰”#e™ÍZ;Z‰ªÆÿ[mõ´t´.E./b‰;ƒ³ôŒ³Cm¹¼kú -$ ¢íwßHq&édÍ0_’r´–2)+*ä‹,õ6Ê-=FKY®¹´Œ×•mõÂÑԓ‚¦ñ¼¡Ÿ`æñx:ýéñ„DU0š-Ÿ¹^­Q¿höÕÌÿ”EAhæêBi§ôÙq`•v”ƒÌ¦)TĤ ÏXR>¢-V”¥ÞÀ¸Ón eQÀ+Ph³ÔàPÌ¥Ò¿a@gHm‹)ýƒ`ý)§½eI¥z–(E£2Æ#)Ôb‘@@~Û¶ÁgP–Oÿpÿó) -x¶™.Ø* °›Ë -²E\ûpF¼¤Á†D3IJl“>¢K mh©VÝ%ä*ËE£Œ“ï*0e«k”š‚ˆ|TQ#DÙíZ[«2d»S 됅‰¤Ö'A“oPOZJÙSCòxâ¥WŠƒŒ@rDvè[¡ÍX¼,ý¶6èMÿú|#½6K•/”UWb V<éJ—w½úwÝ&aBB"•HÚ:+jÂ%÷Exø|{Ö󧆃_'cʌ¨ò¥´p†š‡†Ãx¶q÷Hˆ¢°«,AtæD‰'@Í„æÆ·è~ŠŸ1ëò·©®>@ÇÚ¡™]Ò½¨déŸì,qËö{]Þóg¬ÇaÙ;d@t˜‰üù)l æ&¿Ò`üÓ½AäÆ)i“”®¼€ -%J­Ùï›óœl2 ‹2ê%²ïá—!8H¸ÄBÒþ&‚ÆøoDåç@(zY1e2lÀ:ãt•‚ ~…ô¥çÅ0t¾°q£öœoí`¼-@l —J‰M.ÌTð‚iz®¸ÊëËWŒ®Óñó¤é•;Z‚ )‹6òà¶-µh¥éV»B5%zx<‰P½vÓý}ÅÖy.­]ÔÌÀÖdaèýl}#z֐ˆ<õ)ä˜ËØ~,XŒìÈá DÞ-&߯ &??eÁYB…ä+E1ÉÒʍïwM†~}¡ïæwôI—L(ôkÐBS¾ÕÓ!)D4wŽð/°„ýÄP i]'áBøÀåâ™Ëd²’ …‹_}àã;¨|­_aEÂuK:ÌñíM^q/=@'Óþ‡wo&ñjÙŸ§½ÉÆçãt8™ðõfvõåãëçÖÓTçõ -óÜ÷Tþ¶Ó|Ò9ïñ]ú¸?JG)ý¬VʧÎ)Uõ*ƒ±¯Åè Žbñçz`ØÌÙùYz>žàJC~t=?úåèÿ+Hendstream -endobj -1682 0 obj<>/XObject<<>>>>>>endobj -1683 0 obj<>stream -x­Xïo¹ýî¿b*àÙðʖäHvû¡ˆc·ÍÕΩ°‚ÞµKIŒwÉÍrײú×÷͐+¯ûŠŠÃ%ˆDΏ7oÞ õýhHçøoHӍ'”GçƒsÇøóârŠ?Gø¿Ò´:ºžý傆Cš¯øìärJóŒpþüœæiß:Ú(ïsM[So¨Þhú˜¹¥¦Û¯wçßp;·“éà’ϳþb4™Rø¶µ-_&Ãñ`ÄÞ0û½Ñ¾6ÎRo»Ñˆ-sô™Öº>o~¹¾=œPV™']ÑÊäÚÓªrş{¿?Š—l‚YO‹~¦Km3cׄPø@Y[ÃålvC@Â¥FÕ:ÛÃQ,ŽÉ­jm©ljR4ûùŽ6Ze¸a,‡–œÓ>mlkéC–3ç뇴2eM¥ªö߉SÉ!՛ÆË Îš|s>ø¹«Xþðú5èýŸ’áh|ñá×¹Š¿êÄrxWûT•úÝûÆúiqð½Ÿþ0{è-Ž4ßO9>F|NBüôuö@™ÒÐSMíê]ÉX2ªBíøœÆA0Ê:I:©`n'gNɺ4ýÞÔ`Í'Pت1Ø+}íJßãÃ\! åȗZ=RÁØÖ:ÝX“ªü”LMˆæØo·"•^«*C=¹ÖVW&¥ûÏ÷·„à5õTYæ°ÂÜ<+Q./åêÒ’ ®‰?¸9ò—»I¾²”6¥<Ù,é˜\ŸÒvcRé³J¯8 •{÷âR­ñqšºÆÖ K Y·²gOª:ËÝúŒœñùá_½gªC8]ý¬ÒšŠ¦X?”–Ïú?Ád(6ɚ¢ØÉdåÜAVLˆaá…54¨<³Ôf@–¼®›rq̗¥âj4¸ømµ8ÿ0˜ð Ž#ÈNìhR¨±+¹.B¿^a|’:»2ë¦Ò=)g§½¤²ÒºËóaÑÏÍ#ÚI×E¡FEcU©A¯ç;fwï¸*Ì¿¡š®¢‡Rë h‘b^˜¹ªVK“›z‡c¡ª(YžI1aðFiœ¥æ‚6V-ÑèðYV.Õ ¼©ßFp4ù/Ž¯^@"”®©Y¹¼†2™›¹­§47øD€eôå²×‹ïÖä9a¬U)h#jÒé6¾çþO¸‡¤»þ—ÎbÅêÜî Ⱦã%Š¶íŒ"Ú Ã=MPÙJƒã»{Ž3K9¯¶9¤¨¦b3ßWCsš --ªý[ þàW‚Ž  -aö¬He™anCPÂ4h©Ž"qä(}™ŸÏ~ql]ðcñNÉ7ôŠUE H¨d۞Ke!x¡ïÑ`6ÛN(k ¨=ll„¶ø|ÇUgÆ«<×Ùþ*Ljôˆf”#»À%›;•±´5±˜‘M=Æ>ÉÕRçOÒÇpÛQÑ7·L¸«ÐA„r¸kr¸>Ýè¬AHÔzÄ8ãE¿·ÜVò.č׫&§Ï³;&Uו¾‡²¿RhÕÔÐŒÀ·Xña4¸üM]›ìE흞|Å cÓÐa VN×ê-õNXÛv˹IuÝϋB6Ôá­¥^k –š`¢#²T&™;A¡Peà!JÎþB²¡CÐùle;KŒÊ•‘‰§Ÿ±qˆÒ%¸â8g2†fð%2Â>3ht»#‡uFn˜°hÀ ;a^³~ƒÕê ˈ³…¼)JHˆY[ž¢, oÖªÈw7Ö¶˜ Ä;Õjõ`õ{ÙâÀ(„°1y.Êm&XèNÁ3ªíAm[3WQ‹JcÅâzx<}L…%&º"wvíkऩ|Mךoˆ q;ŒÞ ÝÈ;\я€%£ËÁðŠ’‹i"CLãæð“²)¢a…]ˆf¼#s»ñFN÷í ÝÑ>À‹Q4u÷úvÚ|ŠÓ´ãúe)Ž2 2Ëê_:Ð%úÅÇ ºWÅ2®™Q‹þ7hɈ¯¾3¶yÆJL_­y¦àœ¶"s²oq X2 Ì\q'.ÂDæœâ¾WX'ø{1ºW ß,ýëTÁ×ó$^6TŸ‹ obïD¯;1p›¶Óø ‹Ýô)>T¸ä$ ö9Þ -ü„’`tÅ%X5ûtGfE;×à…‡ëÊÒßfíÉ’ûâ¶íiÅ[éªR€lDm°û³‚y¡a*h½¢“¿†…ú¤‹g,*ïQŒWœVÁovöp9zàfÖÏg7 ÿ…bä鐛Siu<&K<]`¬R;J7ΤQh89+ûÉ&à¼ÛÝ -„š2ÎVT“NFfÛ¾#†TÁ PB_s-1ìcv†¢ÿcÂ÷†ƒ‹ñHˆ~‰¿±»~Â•‹ ïtaUj?Ú}é\Ν8"ú)“|28Ÿ|àû×XÎÜ -£åãd@ûa Ön¥œõÔÃ+UÞC+u˜c%”ôÉêÊ傺„ç.žÒ?¼;Üã´­³Iç£L?e Â6ˆ¶&?äsvƒs ÍÖUœêK6³VZl7Ž‡O\÷»ååÏŽ´á1ȪõÕ®ÐÊÆôwlLüzmE'¾JïJ“‚ W34½©XK8zã ·28p¾‡,‰ ´{ ­D,úh¿ä”n>ÍV¢—°ü¢9څÞôñ¬3Aº£:ŸC o±ˆs¨rœC謏aP‹&ðÊàå¸_’9ŸÎ⋻a3µÛ+ñʱ…Ñùìl‰Ÿnbã¡>Kìp܍àÊ߆—–ÉýºŒ?X 'ø1êrŒ_Æƒé˜Ùþðñþú#æ‰ûÆKûKÞjäñÍ$ídz~ÅçßLº˜^ ¦“ËðcÕÕ[¾ýãè?€1endstream -endobj -1684 0 obj<>/XObject<>>>>>endobj -1685 0 obj<>stream -xWkoÛFü®_±` Ô,êiÉ6Pv\#.šD±e¤EÝ'òh2:ò˜»£ýûÎޑ‰Â&ER$ê»3³³Ë÷ƒ ñoBË)Í””ƒ÷4YÆÓð”?LâSZÌÎð?~ÝLt¥éÍ`i~¶Œ—4?]âóFR6¸\F×sšLhá”Åé’Ö)aùxLëäè&£½nh'*GNS)¶’\.)5œ4–R½«”©Ø(œ¦ÿ1Q…¬œåÏEIS[‘¦¶ÜDTX>ÎPf°"éÆÑ®PŠ¬tMýlýn0¦ád†4Öé_óWmŠÊýø7Ù\ \]ùóïD¹”këcÚHd"Ò=Çg¥y -v1pL‚¢ZãUJþĨM€ŠÊ:¡”p…®b`:§ã §Ëøtæãx› GÖ!GK…pN$¹LáõÃnà ÈObz´Î%¯ÂŸÕ¥Œé²qÇô¼Bô6—ÒÐóÕ=Õz‡OŒo"*Ú4{ªôXîí1çiexŽ¼u‚³H -[¨}L¸¢‡VàyûxºˆçË[©Ô1™ÇíùýênÀ³E*ô¹`ÄtÀ%p\íÃ7&˜Eæ`O|Clqmô¤ïÃ!•”i/ φ£¦üV&Ð{v =íò"É}r©&Ñ8]‚€„XH´JT _¹+\îãÎ -ªu%©V H T> \2ÊD¡†ŒOïúR&¹¨ -[><‹é¹®°Âñ¡¬ª¢˜üe Ý%¦¨½ÓdA%ÒÔFòڈ—^Օ®†‹½†ŠÞ¥¢Ô¾ö÷ì´ÙrŒÐßíÍ*Bâ·Ââ|º)Å£¤•Ñ‰´V›‡g¨£Šã‚b2·ƒt˜b‹‘ï›ÂHK¥†œX3pïÒۋ—¸ êʯdùEFìÈÖZ«‰°ÛPzIc ªd ä¸ ­VÌ°/F”°­Q›¶+6ñ$ Gûï‹k)¶A(Œ¥'ÑmY¶¹nèÄNöÈ1¦Jú*]ŸÁ·‚å gó ÕÉI¼Œér^I -Pî@U2¡¬PÒrú‡–Å¥º`­e{nÂJª…e2 ¹¦ÈÁÒ¢‰Ó° Ókàþ™&º_÷,y$Žöä>@äã9¨ê±ÀgDµ€b¦ ùËF–­ª»ÀóÒ`l¬ Á´©F0É¥’E¬Ú»P5 ÈÃÊ\~Œ}ß»8yc½uóG[ʶÙØ=äVÆt ô0Ž¯´)Áôž¢ƒHÙ¦GÑ1 ®yÇIó­ü4õ!µW#‡ÞÕÑ-D*­»ÕÚ¦Î[#Ï6L½ó£%î‡üƒrFÀÚïèà9´•²É{⑇Ñ%öÀÙ‚¬ØÃÚ|F%÷Ul%’â°=_½8ka\?†×{pxA0·RÀ×ږ:l£œ7ÖÑõ˜ÎZÕN[ÕQî\}>)Å]é|1›0óqîJõà -õËmé7½¹fýVÒ}Êýž3^ÚÝÿŸS^Šâ äËgý±m1"Ð{ :¼´pÈ ê€ýŋ̣• -Yꪣ0ñŮЇ¹Òa¯5 -{`«m-2é‰#{´¤\ê2í3ÀÖ¥ü§´ ‡­.¸¹":‡³Ê¼ƒsyyÉþË,ÐrÐkÐY%ŸÄ%“él~õÝ;<_D$]·Q·åzàA@¡½ ^nad‹²PÂø|QAŒ Vé06GmˆË»«áï««^ò—3(k¯o®yïúlÊ(Aù”q ·¼L@‡ÿ…S×ç(q$ŸHÀ·ÒJõ~RéWòÏ¿©8Ž¿”Û+±Ûp„AQ_É°•-ŒÇž~ǝ1ÐÀŽÚb*Ň¢l`1M¹A£ídþˆémq+Ñë‘z ñ R¯«Äû—Þv̗ø -LÃ&Z†á{=µ#¶7Ùº1ÜE2ö.ÞL9LZÛ¾™U]#¯äŽ§tfÌP1²á¶˜« w?d:ž ¹gsæqý$LÁ¡×ð1,?iûiùZΧ’ëî»PòþŽGhp ¬-÷pÎÙeMå–P… £h§ÍÎ4¸ÇŒûB}8˜‹…²(š4-¸ñ ?þ³áÌ£–ï•4÷0Nhu|ðpůxîUÕòÖµös‰QoHyØÓäg0. ªÂl–È48<¬üs˜~s&ýÛúüiûF4YàmétF‹ìþdænj‹——<¼1Šx»Jšó”ƒàh†Ý–árŒ^‘}ÇX3_ÎãåâcßÙ ÷ëzðfðꃮendstream -endobj -1686 0 obj<>/XObject<>>>>>endobj -1687 0 obj<>stream -xuUmoÛ6þî_qÐ4,Y’ßWìCÚ,@mMïã(%Ò6‰TDʞ‡ýø='Ùµël‹ywÏ˝_z ÅøKh–ÒhJyÙ{¡d¥Ý.?$ќ¦É<ŠùåðC2¡{KŸz16F³E”Ðx>ÃsŠO­hÝ{·ì Ɣ$´\ãòx”Òt>‰&Ó9-%áZÓ2¿ô$ÊL„®Ì$í·:ߒv”Û²Ò…’$6Bç)(t–7• huû~«òg²†~Õ¦ù‹²Ս1ÚlpJJúÒEá€_‚U¿¿üڋ)L¦Q< õeÆ(·fMNyϷ횂ªÖ¦]üLmº×·õ[UŸ«þŸ¹¨è"FG³é‚Ât¥]¿[¯ä·Â“6øfÔÂ)EA]ŠR˜«H§ÂÂZƒP„ҁB?«cé§í`pª|í€:(ª—óK0UÕå÷ëJ4H ­ÛCÊ5åywÕ'uõÆØZÉ«¨8êÝÚ¦„3e[ÿVìVÀ¹.er¡… ÕTBɃmêo#Ž¦i”Æ ›Esx>¬ùí…ñä-Iˬ™£Q8¯*⣌×Z²S.Μ "ZnÕ1ÿ) ó}íÙ¥8ÐÞÖÏ`Q™7(E9փ\õÄ,ˆ+5à„¢¢PÒÍ#ݸ·êo`eL#»Êi”’-po:ÆLÁŸÀ¿¶õƶ ” -^{ŒöýO6o ØÈÔ8Ðё7©eë¤#iME‘T.¯u†ú[*æ’*±QîÚ@HÒejû•\emAk4©;é)„+Ȉè#Ž×{ CißâÄKAYƒr>^ì´D°ª9ò¢}m‹+]¦À¶f“|W³ÈìN]st„Ûš®„Má+›ªtª,F dz¯ÏÕÙõî'Î=|ˆiÁS‹‰wÄÑæ¢pGŸ ¡òùçCûOv#àŸó‰Ob MÈö·O½!†ÔëËtŽ|~t%&ikŽ¹ºRT ÂoÓÂ~QrÕo-}‰œ0Úë¿»®èc“æL>̇*+ B¨Éﺧ½öÛ’ãáF€ë˜ËÚî´ä¹É#ža¢ã(…·a'Áä¹GËZ•†óÓÂ?ó’EOÀ¶¼}ºûíÝ=Öö«Â•{›cð/Øá\&xw%œÅíùdÍ"ºk¼ ïÙvl|Ú6…;ùîx6ÆøCPäYLyë—eïSï_?-“endstream -endobj -1688 0 obj<>/XObject<<>>>>>>endobj -1689 0 obj<>stream -x¥WMoÛF½ûW zrP[±dErzK‚0Ð8n­ =ä²"—âÖä.Ã%Ũ¿¾ïí’M-ÚÂ6l“»óñæ͛Ñ׳¹\ák.ë…\¯$)Ï®fWòjþj¶”åÍ/ðSkÉ‹ÅÕb¶š¾x»9{ùþµ,®d“ÁÖj}#›T`ç -O’ów¹ª]Ë|5“OÖdF§ò‹Û9ëe«›Nk+ŸM]çånóbóÇٕ\.–0q®l*Ÿîn—Ö»ã©-òýÍ×Ñßåõr¶àq8˜ÏäÍÖ7µJšxl)óyl±Fè8vk½«Ucœ—EôôÁ$µó.kFáH“×®Ý墤íC/ºäŠÑ#ôy˜T×HJɹ+ã¦ø¡Ïd~ƒ3¸£ƒÛi«]ëq±¬Ú†yi»7µ³¥¶—ÌÕ0T8éÇÅåzvÃY&Y¬Öߢ^õk,Ĩëěÿï†ïû:J’+»#gçÿ±¹¸™Í_Ÿ0ºM5å‘C8ú -T5¬#•Úz2Ì{Ä¥sm‘öZpà\ ¥T[ Ǒê!úMîÚ0ŽG¢Ÿ¶U1Œ.pr¬q Í±Ã•'Ç{KQ.B ¡“∐Fy(>ñáÝHF"?r©ÒӅët ]€u„³n`IlAú Ür£;8ÍQG3¬6(‡ºÊûG“ïåd´+D¸HäT‚Ñ·þv„]cÃà07¸óÉ}?*ŸÒv4ˆƒÑU?Йûˆ]½îRàÕ.,*² uv]?jðÖ}£„D… -Y[àK]n"²SØY%®3ùh±˜4Üðb;•F;FyÔ·- >Õ2jXé0Z1.H܉ßіrº -®sbÄúOL‚‘rȕ-×%R‰kTœqøßÝ>üȈyrâÅ]ú½tSl¼«NdÒÈÛ*g0,óä%G²=]Ü59ùËX 1I@x>{Š‡ -úŽ})Èï±ã ñÃJ¿A"ˆtºV0ÚÙLÞêD!¸#esDV¶¸G?K -ÈsÑï0´öº/ç{£Bìwa[ˆa‡e|’0¶.®Æ,+#x'…ÙÖª>|yÿ;†#dXþˆϜh1ÊG٬ٵ…ŽX_aÂÚ¦ï͛ӧ§å«?Öý»Osà=i zߤÌf¹^ÎÖ«›8‘^¯ùèçÍÙ¯gìÇÍendstream -endobj -1690 0 obj<>/XObject<<>>>>>>endobj -1691 0 obj<>stream -x…WÁrÓH½ç+º8…ªÄ±㘣!K-‡„,q -¹´¤±4Dš13’µÞ¯ß×3’ì(ÙÚȚéî×ï½nÿ>™Ñ¿ft}IW J«“édJ®fø9_^ãç%þ8E›ðÁÕr:¹|ëƒËŇÉü­–Ë×>­O.¾Ìi6£õÁËkZg„ÀÓ)­ÓÓG¯œ'k¨.=Þ}ýI§…6ŠR 5^ÑÝZþrÄ&£ÜÙfK†+剽ÜSk›2 o¾3\ëz/ oMÞ¯Lé|v…ôÖÙéZNÈõia[C]â&oq×ñ:øHe”ì%vf+Ö!I֑Ú)C¥Íñ¬–s£Ô%KטQXŽ)ý<ÿ¡Mf[òÊ{ÊQGèÓ½\å˜.*÷d“¶'×)ª ¨!eܗàiO‰Ò&ÂÿBAoâVó³ -yo¬«FyÞ|»]}½{zöðZ„ßF¥¨€Ý^*Ð5qYÚÖ٘LÕÊUÒ̐‰S™v*‰[âQÜäԚÚÙ²D·¤eS£¤ ¶ìj6%;€oŸÁAº-tZPí/ov· X8µQN™Tec\WY¦%ä½?ÒÞ:»Ó™P iÐZƒlp§Ó®˜ H+ºþߗMžsR*Z½84ªñÖf°íéô~uûôžüIWB¢.î8æN3 -?Po²ÙN“2/#ÞnË.E»3 -šò–]êz–—;„Æ" ŽWd7Ȥ…³Fÿ#ìÙ²÷­u™°©n˜³„F4p”>½#RñµEoÆ«žâDLJÛAøtÚIýU³ŸÞ‡þ\|ùH3Ð^¼âÎ0[L®&3ÔÆ.W5=B9RⱯœ_Š¯œI¡/ >5$›3ª m”êñ¨àJ1¤þÖ¾–²qÂ"œžAfã؃ViÝ ÆÐéŽjðÄ­ö  ºØ =q1øìë. È+܁ÓMžµ0ÉH7`q£E=ÛÒîÃuãhǗ·º.,¢ )IˆWÕâWŒ°Ð ר4Mmcj”q\U'æÜ)®a0^W ÒFG†Œ‚r%+\%‹r -řð'f*Ñ_×p Žè—ùJ‘Æ èšw*¶¥å½+"ß*ôk `D¹‰ /Xi -É:Ž:t~sŠÁƒT$ö}è~&¬DDá“H^Ž2‚Ël² -m„€C–nuꬷ›ºãZ¤1Z‹¬‚àEéQ¾#Xû@^qg–¢rJAö"Õ!íÈByIz Ø%3$3ŸÐŸ3½$~Hn|$›É¢2m7G:S‚…Âu.c1saµLi©ïE¤3cV×è2¡t`òp!†úÐMþS ¦Tö2…SÊXU(µµ” j|ЍÍN•Þ¦Ï°€–a݈%sÁ©ß ÈzÂ΁œBk‘Ôð‰˜T®Œ)„™.Þ=<„ÎÂKG=‰EÊÈÄ&eÌᘗ8˜2/zúÏhàP+[øžgBQ”ªp¬¯˜¡{ʧN'xÔƔd]‚ÆŸ‡†¾ásñÀë¾7(û^ÌÄ¢>#³·:,ýý¹.•ð4Ú¨–öŠ?#µ†/øa"nF+'²Ãî³cVŽ®¦58J•ªÙÙP\¦R›©þ¥ˆìE¨X—"‡ÿ'oLÄۇï÷Ÿ‡™ØYӁ‹QéweQA'¶QL§ÊÐa»•VCA‡`éòbó݆)RKË&¹ˆeņóЮ3é vŽÃ\1ŠØÙÂÖÚ÷@¥¸q^àn0T¨ÔeúÀZHÊÊ:„)®Á°p È ø{§+ÙªnâÒùy؇F¡±CÜ^›Æ„ŠÃ„¡B³Îd%+ÄK¬¶{­Ê tcJl†MrC¡sÑUeîMTŽ&¼mÜÖbҎ©Þû ðñ}ë)ô;5(Å)ÓTAlý00£žÂÿ‰mU”@¨£j9‘!'«/Ö³ö¯DºñÆ }œîE&Dž ä‡f†o¥r«í(hZ°ÉÃxq‡•gBŸö7YtžàöB!§ C[‚1ÉÅÁCâ7ŒÞ¾¶³Á *ގ=/xÓúxb÷Çð5e„;ºûð=çâ˲³ÜÙ_é–W´˜MÅV·ŸVâ¿d~ÞØ-š *‘ªÏû×ϯ§åýÿXºæ×óÉõb‰õ ï|\ÊÑ?Ö'ü bènjendstream -endobj -1692 0 obj<>/XObject<<>>>>>>endobj -1693 0 obj<>stream -x•X]oÛ6}ϯ¸ÈK3 QlÇu’¾¥Í -[¼lv±½ ´DÙl(Q%©xޯ߹$åÈrŠv($’x?Î=÷ÜË~=ÓÿÆt=¡«åÕÉ(Ñl4Ëf4½¹ÆïüXIex1ž½Í¦Ãï—'—oi<¥e [³üRìŒF´ÌÏƳlšM2zP¹5Ğîr¯ž%Ý++soìŽÒ>«\ºŸ–_`jJãq4u1¹†©³…ªsIZxI“Ñh|N Q­m„£µPµ,Èo$‰•ÒÊïÈRµ—V䞶ÊozŽÿTua¶Ž­Œ¨uª^“òŽÞÌÄÞGt1¾Ê&ìõÁò 5Öx“íÎÉ +:²cn²;@0HƱ$(cÍa_ZdSl›d3ÝMɚ¯ŸWMj9sˆ âÒµ¼zõªôã,¡ÿ ÍFt5¥´:‹ÃwöÞóšÜLñYQr‡7ýUIþÙx‡×x6žÃuWüì%³pÔÙç/ ÞºšN`n¢ÏɄn5}÷&FÓ«0aóÞMwµ3?Jâð +ÏF77ᘺ+~öqqݍ)Ih‘ÃÉôzF‹ÌGÓ". +Y“ª­eI®ÔU;iޝ/žp0¦›î\0Ãì"þe#²JÕ4T ++͓tã¦l-kj„-Y¾‹2¹ŽÊ&¦àsŠ¬®dÔWDºŽ¶º5Q®Ji·ÖÉÊ?ÜÒȨÚµ¨dkà{OØ4Ù ‹éL0šrHh'/¼p„C´Ëdp§u%œJƒùüÖ(7º¢¯ªn_¼MU¯BmV—„PpÆjª¥ÌHmdªDIƒßÿš?bâ˜2ù$W¨Ò¶AVìcÒ½tÁR8i­¥±Jפs:~χáх¡Ñ´µp®yE›Í&,OŒNz÷»S‹BY´%§i))ՍB +¸ØU¯+û0j­‰Jµô¶v¤tb÷@’!‰:cs•È$m´)3’/2mX–2$v{Dg‘úpºŒ@–Dê¨m€Ó«·Ü’¬SáÕ]•}UÉÚÙK’ÕRfü Ûs’ÉryâwS¨´ðoµ¦&a$µ¶óžjpÚ´pý8tFÔ´„qøeŠ äLÿºy<÷_á¾)UŠâe´*´u65ªq>,N…‘'î™0x»·hv½eF¡ú|r©ÃþÌ®hƒm©¨©k ²•Z?ˆ»#­nHc½Mðþu$Ù¶i´áX—[NgïÜCÎ'Knʓ€ûÀpd¥Áf +¿jeÊ^iðɗ™¿fÒ UÚÁ%–üo{7ŠVÔ¯}ßӘæè|€È ¥@ð™ßÕõ‰ëÁC¡7=Žt|¢‚þ,¡=+pAJ¹„˜¬ä/5KGT8ӕú­Ë÷½‡âM¯$ïg“$¿ m»¬”{Ïa½ÝŸzÛç}R´@Bh²V"‡è&"ô’Ãf½@øæ³dÒ´†éÒçœ1ñDв]AP^º¶€îVÑkɬ'VG/€ptݱ‡N®>/XObject<>>>/Annots 998 0 R>>endobj +1706 0 obj<>stream +xWïoÛ8ýž¿b /uº–ü#¶ã(iãôŒk·v®X À‚–h›‰$ª"e×ûaÿö{Cʉ콽®AmK"9ofÞ¼ý8ëQ=ºìÓňâììõ.£¾¿Ë?zј†½A4䇝ioHך¾žu£.6¾||û|6bå ?ŒÞQFýAßþ*¥9/§Þ`õh0¾Äï>þ—’Vgg›õz´XÁÖà¢O#œ4i‘8]ZÄ­Ïm¬‰KUXz›UƾmS" ™'*_“ÎÉn$%¥Úʲ“éD¦mŠun…ÊÉTE¡KK+]’ X–înÈ­Še@-aÈlô.§åž‚µ9_<…] +{ð~‘´ÂMðxînzxápõ¦Þn,Œ$½r‚M¡žLPciÓ^W”K™ÀtÓà4JçmÚmT¼¡ 0nŸÈt¾6–”*›=X­ Î/`D'P<Œ_VZgª8hÃþV¤*¡u#’±Î2‘'©Ê%ít•&´”H‹pAMÕ³„Kʼgç;7]zÇ9‚ýþ °ûäÿ1„&¯ŸþïÙÕ·«»ûéõüêfò ×_¦“¾ïîgWó …æzò¯é§É8\ñøÈ6ص.Hôz´šé“™ËAûàÂë ¨5k9WÈ#˜-¼®ŠTþüp¼Úßä{}0ñ] `ð–Isr¸ð°üo0–Çf¾I£ÓÊ"ÇLJ¶gó÷·2Qb¦âÇ'ð¦yQÙyªíñ6xƒ<y_Y,¸¹¦ÿ²z¡J凐BÚ¡Îúý¨ßí!‘—®ààþ¶²l K;e7ôéa6'P£ÁéW2Ñlû­"­ Íd™º…qUO¶ÇsÇúDço¬ã>oÐÖjp,“ÙR–Ž_ý†"‰ENñFk”×²Ø +•Še*©(UnI,ƒgeŵô0­Ô&쉩`­JÑd>{c +Y&ËX‰4Ý7êkÆ6f¥&£Wv'JÄjñÏë ¶Ï,QD¸ùùîþ·ÿbÈ>³),`ô*÷â$<øYPÃ#ٝ\b•åJĒ¶JЦB%†\{Îé¤ÔE˜@”ØNSŒLeÌ¡ L敉ÜóF>ǵ2­\*D3€çMíq’—M@z¸Ÿg_Ú§Þªbœ³§y B`’*¶† ")Ï/Ö;v¥}ƜêÚ øµÅûNg·ÛȆH—ëÎ!ÌÑÆfNªÃ RÍÂìí³hžLuámXbU?]Z ÿ|â㹗Z¤ŽÖ•(‚‹£@µØr>ˆCá࣑PUX¦ü²Z‡+õS&m’ùFä1v1ïå<œ˜­U›}tSJٌ+4ؚ΋v»®óçze-á¬øi6T¤Ü¶"Wi +Bß=4;1Œ–9D—g¹SüÙïv]âY‹G^‹§>áu±ðJ Qwd³ɶ¯ŽÂ1ÙaÀÊgl¹ç¸ù“ä GNQx¯§('NŠ ÕýBғ^Ò0s$°$ƒp¤îžÐœš£ŸPñܽ¥ÏQ&`^¡:2o@Ž_qEÝѐuû + g‡^÷|¯o•Q¬2/ø~Tr¨wîc«¦gªc‘rk|?ºèuϝ¥ÎͨžL\ ¾½e©ŒÇ +­îqmÑw–ÑgÀ`¢8ï?œ”®Lcp9@ŽS…hg;üK¼*Y'h--X˜i˜H”N +æ&|^óÉ*_i®d#­åëà‹^áŠòk,àXr[÷³W#iãתûH"LR+¿øÅÇ6$3¿¼ð¾ðۈÛñ¾s3>¼"Ð Æ4ö¢Ëž›•çW·¯¸I?a2ÀÛY\a4°( ?{‚q~KxÙÅŸ´þ¿<Fãh4äC>¢{ÉQ,ξžý8(k@endstream +endobj +1707 0 obj<>/XObject<<>>>>>>endobj +1708 0 obj<>stream +x•WmOÜFþߘúKaß p\"¥RAÊ[EÄEm%¤hÏÞ»Û`{ï:æò¡¿½ÏÌÚ5!UC${vgæ™gžݛÐ?:›ÒñŒÒbï|±7º<¡É„+¼™ÍÏh‘Ñ8Ç´H÷ÏO~£kMÆÑ«OW×t³ÿÊ…-éSiîèª6¥7嚮·Îëâæ V®©*[{GÑ×Æz墄>Ê?(U%-5-•Óág¾kw°ø²7¦xrœLá~ß®è‹]:²5[À?•M±Ôøߊ*µÖòfiýæˆT™‘Bx®ReɁ¨rKÞš*]›ÑÖ6ÔªÒ'é,9a‹ 2Â_„£ïTQåšR$Æ÷mlKµµžZÛä9íIQř’dC¦”,áݹ¦^q‹q…X"ØR:dàè,¢çüvt9¦gýxz‚#Ê+•áfŠ«à³¿4¶ M,qÄ!ųñÉåê^Ýƹ)Œ1OOúg Úîñ8x½/z<í )Ë ¤¿éz‹•k€Ó8¤äm‡Ãþv•Oïι:™ò +i7&ÝðqÆåZ™Úù›jß )Tt€K®œ'ä‘p"N§¶Ìî¡àj«õ-ˆÕèëw r!SjÔ&µu­SŸo„2‚ØÊ ôRkÜƱ£^òNF•ó¶r¢Ë½®„ÒukÈî9_ƒ¢¬)Šm478D¾Ñ̾FŽvç(³å¯>8ÃE7ûzýœL°'í€Ã2´#aᎠ\X‡Ð‘.Ãè*·j›Su€Ê¥B«ÒÁ³E®Ú++« Pà@‡û× oϞº MÒuUš-ÀU¸2ut­Š¥âʁcWY›3ãñ‘‡„ú¼Vm„\M¢ʵúÖÙ„ÒØlȎ¨DO°û·7G Ež³$¨¾m3 µï­ýe@„¿Ðà\a.°ÓHà +H^§µ©à¬¶…à2eJI€Àµ}`pcÓZ£> ßf—¥U¦ÓÀ¢R‰›Bݑü›•xì!g‰AâeüÀ[a3‰4õ‘稒°2³rMÎþШ§h°`=p‹N™âZ«lˁ +yÿ°üI;¼[[ßrØlœ6蝒 ø÷D´?3«°;ºDž%Ïiiå‹m¼¯žFmÛ& Ms'·Ákbëõ¨»úsåLÒµa§Q'Lç!j'ž$ø™1t<¯­¼[°h k¾—™£@~!Ñ“?L™ÙÖQG f¨H¶ñh +Ö4Hz:œg7Ìb•£3ô83oS7âv )½;.l×RÎd:L-ác;ಇ¾vªîâ¡Îù"$¿A¥!0vå5ES¦+4×´kðèêê"Boñ#@“+“Q[Ýø®Þ¾â ˜å†N£}@@獧¶;v·¦‚²Šœ¬-e†ucY¨=ôɶ5ä_×9®ÿÖs3ˆ}ùmÙª:ÌvÞ'úªGÒA«Î(÷%ÿ}1š¾ýyÕ×^D 8k€HÖ,L+´v[æVÉ®¡‘¼N›Ê Y¹¸D?‰KhpNÖß#&½ )ÒvJ‡¨õᒇ‰°ŸÝ>¼îÃMˆW2ãeu˜$'ÇSŠ§gÉ¿±Ôü:¬UcßÑDœ©Ô»$”·«nïq–Œg§|òÑAì2eV)c·Ðø ® m‡fà%g‡RhN&=ÂĦ֖aP±Ë˜—¼§|9'´¶L×ÿÓSº†HþwJ²…Ñ}ßU\0Ñ!ö-1>B•' ÓLÀ(XŠÔò µÆrØT;•À¶³4¥EꘃR&:sPˆ¡²ÌK¦èWUcŽ¢Ëx5êSèÖ`a³)ÑyÎãSì;¥‹EÄÇ]³ Í»çˆ~/º>·k¬¾a±Ž8¸Ïx‚5þkå;äw‡œœâ…ä'Û*„Ãç@·úöɌ“9,˜°Ñ'Þ$™7OZ¼Åð{sñäë¯÷ˆªŸ%OJm‘C÷ùðS»û/ŒÔVæþ“äQøŠ–è ¦¨)WX9<> Ö\MD*¿9`?£Ëy÷Q5™%ãù1ÍΦÉô›~¶ýòÃùK€e¿@é¦M +mø,Z$‰ÏÆb?9MNzÏk}h>#A :–@ìoÌRA…¯9™Í“Ùé_up9ÏùÙëÅÞǽ¾£uÆendstream +endobj +1709 0 obj<>/XObject<<>>>>/Annots 1001 0 R>>endobj +1710 0 obj<>stream +xµW]oÛ6}ϯ¸Ðšf‘,Ɏóñ2´k·eX»¬qÑ ËPÐm1‘H•¤âº¿~çR’“&Å6`h'±LÞÏsÎ%?ìe”â;£ãœ¦s*š½4Iñd÷ë͏{Ùñ,É(;'sjh:͒|xWÓåÞóÅÞä‡e-V°4?9¦E ¤´(ö’V’r$4ɏފ“YQ³¥ïß^\’“öVÚ'ŽZ±–ïk³¦•ª%yCª®;‡õï*I+cáa¥$¥‹º+%þñ²qgO× ¥Óޜϒ"اáKé•ñ²x~™§ù1ÝtÖÓ,¥?ó|òÚÜNò4ÍϲéYvr–NéÛ4KÓ¿PŽœè›FØé•^³‹”â,MNþ¯åü«Yž~5˳¯fùè«Yž?¶|¥q>çN.* s#ýl–tþ‚¢YRk•öÀ—Ñ}Žžˆ–[êZŠGX+h3véƍJÃ{aZ%÷%-fYŽ(š‚>ð ŒGw‹’$äóÀï*~U‹#cÉUÆúÂ4€#Œ‚S`…•ßñž,™MsŠóãäÙ4c4œkÑ ±4·’Æ ây’ΏxU  •¢®·¶ÓÞ¦…D‘£¥„3:h­)¤sŽ§É™•ßÀÿ]í¯ /ð•íÂÎèÍùEtõ”@ZĆGà<þÛyo«­S…¨‘’”p꺂í¯:¤–â¶7*ûrò›RÞªBR“Z±ÅAQèZ4´©X0BåÇ}G¾êm“éXm†ºfƒ0< má2q¶¬NKT ¢½ü´o¤= o¢ÐßP¡ˆ6h%9~Wf¬ÔºCHµ`R…Çèl®wEGµéCg<074‘šÄúFüƒË¡´Ú õò£t”GP†Ö궗¥qØL•Zs•ƒ1öjME-í z€ý®k[dõ°üìimM׺Ý'»è°«‘B†€ P䂝µR{ZŠZh´6"„ZÆ]‘îš%"Aþã²ÔãÜ{êT}‡y;u-žŽ@è 8dt¯ÐK‰þôSÁIЉ):„*dTéÐí¡ÞŸ£\ôN{,—R+&DhûRAp܂Ç(Št÷¥‘N?ñ´–:¡(@ JÒZ$ß°Ìú•5M˜dc²Æ £´ïJTÔ +¥‹ÃÆX·h BBQ`|üˆ¾ÏCсJüpñ—Òyr[‡q76pj]oz†‚°CÔ ¯ªC`ªmoeώ:]"°HÖ¦åGah>ò{‡sfRhÀƒX F´Å êï"àP:/ê*••…w‡uyB›‚ l€‰—3’Xi‚luñ jæò"œ:ĎՃ± w`=ØÅëî˜Aˆ7ë/Àwœñ’g™IçìÄUˆq›ô¬q“~Ãx+ÛgfÜ3ÉSbÚ§7\ŸNÓÙü8IO¦4?Æ`ñMn¿‡ó…5×PyzaŠŽ'ˆðÊhö‚e¿%>Nq+÷³£ä(¡_T£øê¸|w@àƒy9Lù ðlf6?IæG9.l"=åg/{¿íý t‡³endstream +endobj +1711 0 obj<>/XObject<>>>>>endobj +1712 0 obj<>stream +xXkoã¶ýž_1.°I˯ØqRà^d×I»h7IaߛM?P³‘E—¤âúßß3$åÈÎf[X$"53ç̌öÏ£>õðÓ§ó ǔ¯Žþ¤þy:Où—~:¡ñpˆqØýÜÑTÓ/_½6¥ý¿¿6 a÷o­ û½ât0ý§ÃôbßçÇùQ÷¦G4_ Ûñ¿ÔK{½Íóc"Êëµ-̋I‹²<™ÿqÔ£Ži^4§µzÿ,]–k~«{sFý>; ÒA¯OÁyz6ÀÛñÕ|~};ÿ|w{IE-Éi”ÕO¤+IŸþ{?##K)¬¤uí,¹¥¤`ó9Ä·ŽŽIU°up·[[ÓµKad·0êEÛݏóãÊ 0UY'EAzñ +ìüSÇ)Í5m´y&at]^ÙSÊõzÛ]éäŠdª”$N2uU©ê‰sPV,IÚeO+V™H92Q– Ùܨµ£•¨jü½eðئQOKGëRäò² –¸38KÏ8;Ԗ˻¦¯@Ò Ú>ûF¢ˆs0I'ã۝#Gªä&Ôî^[7 A¼ §ymŒ¬âÍT%̶£«r{Š¢;Z)©Òdumr ¨ +Éo¬~Q…,èñx+Ý㠐 µ 2 ‰®ø6Ã|IÊÑRXʤ¬¨/²ÔkØ(·ô-e¹æÒ2^_Tn´Õ GSO +šÆû†~‚™Çãéô§ÇUÁh¶|æzµFý¢ÙW3ÿS¡™« ¥iœÒgǁUÚQ2›¦P“&¬xҕ.ïzõïºM„„D*', µuV(ԄKî‹ððùö¬ço= ¿NƔQåKi9à 5 ‡ñlãî‘EaWY‚è,̉N€šÍÆ·è~ŠŸ1ëò·©®>@ÇÚ^—~î°òEéږ[Ç>؏mpÙêb˜ +UhWìº Ž9ý󾮝]¯v^*Ni9–â}¹X.s§ÍÖÏ?mX–`¬÷ÕpòÀ—ïy¢vzw¹Ÿš%J0¶¤uÜøü|†‘'Dс< qÌÄ%\‚¨Þ©êð’f;þ_áHƒÐ²–X28 †ïÀ‹Ô¿<¦…F'y3M-'×æÙ.òؐ"SÛ<õ(7Ó⃚å2‚ì–vôeô]U’€äYv;bo~{²ÒõF/ÚH…ÎÉÄ'æ[! úsXîö”鋘…ôŸ%v¨±@ ‘”B\„ÆCÁ߇q'bÓvë7 Íâæí‰;–Q~á{Å|/ì|ŸV +ÿäÀorÏ Ó +£EõéíFϋ”Ìœ0Ž:ÓL:%YÿÇ'4s£Kº•,ý“%nÙ~¯ëÀ{þŒõ8,{‡ ˆ3‘??…­“!Â܄bàWŒº7ˆÜ8%m’Ò•P¡D©±u##û}sŸ“M¦aQF½Dö=ü2 —XHÚïDÐÿ¨üE#+&à±L¦‘ Xgœ®R0Á¯¾ô¼†Îö"nԞ󭌷Eˆ ¢áR)±É…™ +^0­@Ï5Wy]bùŠÑu:~ž4½rGKp¡1eÑAÃFܶ¥­4ÝjW¨¦äA'ª×nº¿¯Ø:Ï¥µ‹šؚ, ½Ÿ­oDÏ‘ƒ§>…sÛ¯‚‹]9”(‚ûÁáï+ˆÉÏOYp–P`!ù“"ƒ˜diåÆ÷»&C¿¾Ðwó;ú¤K&ú5h¡)_Šê鐢š; GøXÂ~b(aд>'áƒðËÅ3—!Èd% +~qôï òµ~… ŸXÒaŽ÷hoòŠ{é:¡˜ö?ü¸{3‰Ÿ–ýñyڛ i|>N‡“ ÞÌ®¾|¼býüÁzšê¼^ažûžÊïvšW:ç=þ–>îÒQJ?«•ò©sJU½Ê AìÅkñz‚£Xü¹†6s6ž¤ãÿ›è÷øÙõü藣ÿrÃH1endstream +endobj +1713 0 obj<>/XObject<<>>>>>>endobj +1714 0 obj<>stream +x­Xïo¹ýî¿b*àÙðJ–dËvû¡ˆc·Í5Ω°‚ÞµKIŒwÉÍrײú×÷͐+¯ûŠŠÃ%ˆDΏ7oÞ õýhDgøoD—cšL)-ŽÎg4™LðçùÕ%þãÿJÓêèf~4üË9F4_ñÙéÕ%Í3Âù³3š§}ëh£¼Ï5mM½¡z£éC斚î¾~þp<ÿ†Ûi¼\®Øñ<ë/ÆÓK +߶¶åËd4ŒùÀf¿7Ú×ÆYêm7±eŽ>ÑZ×Áçí/7w'ƒÊ*ó¤+Z™\{ZU®øsï÷Gñ’M0ëiÑÏt©mfìš +(+ck¸œÍn H¸Ô¨Zg{8ŠÅ1¹U­-•MMŠf?¦VnË¡%g´OÛÇÅpêåÌùú!­LYS©ªýwâT²DHõ¦ñrƒ³&_ãœþcî*V ?ºy zÿ§d4žœ_üÚ#WñWXïjŸªR¿{ßX_#-¾÷Óf½Åñ€æã)ÇLjÏIˆ¿Î(Sºzª©]½+KRU¨ÿƒÓ8Fy@'I'ÌíäÌ)YWƒ¦ßƒ¬ù +[U#{¥¯]é{|˜+¤ùR«G*ÛZ§kR•Ÿ’© ‘ÂûíV¤ÒkUe¨'"à ×ÚêʤtÿéþŽ¼¦ž*ËV˜›ÃåòR®Þ)-¹àášøƒk#¹{ä+KiSúÁ“Í’ŽÉÅñ)m7&•>«ôŠ“P¹w¯!.Õ§©klÍ°šu+;|RÕ0wë!;òùá_½gªC8]ý¬ÒšŠ¦X?”–Ïú?Ád(6ɚ¢ØÉdåÜAVLˆQá…54¨<³Ôf@–¼®›rq̗¥âz<8ÿmµ8»LùÇd'ö?4)Ôؕ\¡_¯0>I]™uS鞔³Ó^RYiÝåŽù°èçæí¤ë€¢P£ƒ¢±*ƒÔ ×ó³»÷ \æßPMWÑC©u´H1 +¯Ì\U«¥ÉM½Ã±PU”,Ϥ˜0x£4ÎRsA«–htø,+—jPÞÔo#8žþ'×/Š‡ J×Ô¬\^C™€Ì?ÍÜÖSš|"À2úrÙëŠÅwkòœ0֍ª´5ét ßsÿ'ÜCÒ]ÿKg±âunwdßñEÛöF턈áž&¨l¥ÁñÀÝ=Ǚ¥œWÛRÔNS±™ï«¡9M…Õþ-ÿ?ð÷MY‚+AGP…0{V¤²Ì0·!(a´TG‘8rŠ¾Ì‡ãÇá¯3Ž­ ~,Þ)ùb‚^±ªh •lÛs©,/ô=ZÌfÛie-0µ‡ÐŸï¸êÌx•ç:;À_…Iьrd¸ds§2–¶&3²©ÇØ'¹ZêãIúÎb;*úæ– w:ˆPŽwíAק5‰Zï‚g¼èï÷–à‚Û*Bޅ¸ñzÕäôi6cǤêº2Ð÷PöWª ­šƒø+.ƃ«ßÔµé^ÔÞéÉWœ06Í*`åt­ÞRýg·œ›ôQ×=ð¼(¤aCÐZêµ±Ö`© &:2 K`’¹ +U¢äì/$:ïÁV¶³Ä¨\™xú ‡(]ҁ+îPs&Óah_"#<á3ã&@·;rpXQgä† ‹ ²æ5ë7X­²Œ0[ț¢„„˜µå)Êúf­Z|wcm‹É@¼S­VùV¿—-ŒB+“ç¢Üf‚…î<£ÚäѶ5sµ¨4V,®‡wÀsÑÇTXbB +rg×°NšÊ×t£¡Yñ†¸·£Áøڍ¼À5ðXQ2¾Œ®)9¿ Cd„i<À~R6E4Ì¡° ьwdn7ÞÈéþ¡"¡;Ú'x1Ž¦>ǽ¾6ã´íx‡~YŠ£ŒˆLç²ú—t‰~ñ1ƒîU±Œë#DfÔ¢ÿ F2âÁ«€?ÛœM/øþ –3$·BÆhù8Ð~X¤µ[ég=õðJ•÷PàJ†Gæd åý@²ºr¹ .aǹ‹§ôïÃ÷8mëlÒù(ÓO@ˆp‡ ¢­É¹ÁœÝâH³uÕ#§ú’ ä¬U€–ۍãá×ý®Gyù3…#mx ²ƒƒjýp¥+´²1ý¿^[ÑI…¯Ò»Ò¤`ˆÁUçÆ Mo*ÖŽžÁxí œïaãÄ# EbíÞCE+‹>Ú/9¥»‡ÃYÂJôv‚_"§@»Ð›>>ƒu&HwTçShá-qUŽsõ1 jÑ^¹À¼÷K2çÓY|q7lÆ¡v{%>@9¶0:Ÿ-ñÓMl<Ôg‰Ž»q\ùÛðrÃ2¹AWñ‹Ñ?F]Mð«Ódp9a¶?|¸¿ù€yâ¾ñÒ~ë҆·y|sI{#¹<»æó¿o&O¯Ӌqø±j4±é»ùÑ?Žþ°Ò1±endstream +endobj +1715 0 obj<>/XObject<>>>>>endobj +1716 0 obj<>stream +xWkoÛFü®_±` Ô,êeK¶¢°“uÑ$Š-#-ê~8‘G“Ñ‘ÇÜ­ðßwöŽL6)š"p Q÷؝™]¾ÍhŠ3ZÍi±¤¤½§Ù*ž‡§üaŸÑrqŽÿñãäf¶¤šÞŒ¦ñ”NÎWñŠNÎVø<ǟ‘”®6£Éõ Íf´ÉpÊòlE›”°|:¥Mrt“Q«ڋʑÓTŠ$—KJMñ$¥Tï+¥E*¶ +§iãLT!+gùsEQÒÔV¤©-·–3”¬Hcºq´/”"+]S?Û¼Mi<[ MzÄ×üY›¢rßÿE6WWþü;QnåÚú˜¶™ˆ´åø¬4O!À>ŽIPTkœC¢Jɟu PQY'”®ÐUÌÌçñ|:£ñ|Ÿ-|osáÈ:òh‰£Ή$—éO¼~ÜoXù9PL6¹äUø³º”1]5WˆÞæRz¾¾§Zïñ‰ñMDEÛ¦¥Jïek9O+Ãsä ¬œERØBµ1áŠZ]€Ýãù2>áXÞJ¥Ž©È‡oË/N‚Vg§ñ*¦KÈaüB*P€rz¬Ú e…’–Ó?´,.Õ%k=(ÛsVR-,»iÈí5E”>Mœ†٘^÷Ï4ÑÿÚ²ä‘8RhÉ} ÉÇ P5`ÏˆjÅþH@6ñ—M,[U%,€9æ¥ÁØ !X‚éR`’1J%‹Xµw¡j@‘‡•¹ü{;¸8yc½uó{WʶÙÚr+cº† z njWڔ`º¥è R¶éItL‚kÞqÒ|+?M}HÝÕÈaput ‘Jënµv‡©óÖȳ Sïýè†D‰û!¿Æ œƒ°öûzøAí¤¬Còžxäat‰=ðc¶ +ZX›Ï¨ä^ ŠDR¶çkg-Œ†ÃÀðz/æV +øZ×ò@‡m”óÆ:¹žÒy§Úy§Z"ʝ«/&¥¡¸+],3f>Î]©¾[£~¹-ýª·×¬ßÃJš¢OC¹ßrÆ/……vÛÿsÊKñA|¡€|ùl>¶-F`D‡—¹E°¿x‘y´R!K]õ&¾Øú0W:ìµFclµ«E&}+q䀖”K]¦Cf¢Øú”ÿ6¢ñ¸Ó7WDçÐ`V™wp.//Ù`™Zz : «ä“˜¢d6_œœFC÷ϗI—Ä]Ô]¹xP/Ph/¨—[Ù¢,”0>_T#¨U:΄ÍQÛâêîÅø·õ‹Aò—3(k¯o®yïúlÊ(Aù”q ·¼L@‡ÿ†S×ç(q$ŸHÀ·ÒJõþ'¤Ò¯ åŸÿg¤â8þRn¯tÄnÃE}%ÃN¶t:zúwÆ@;j‡a8¨Š²Å4卶—ú#¦?´ÅD¯Gê%Äk0H½®ïÿ^Û1_bà 7(0 ›è†ï ԎØ>N4ÞdëÆpÉØ»xW0å0ií†fj4Võ¼’{žzЙ1C@ÅȆØaJ¬‚Üýéx‚æžÍm˜Ç]ô“0‡^ÃÇ°ü¤í§åwh9ŸJ®¸ïBÉû;z¡Á)°¶ÜÃ9d—5•oXB.Œ¢½6{Óà3 +õá`.Ê¢hÒ´àÆ'üø̆3:¾×ÒÜÃ8¡ÔñÁÃ5¿à¹WUÇ[ß^ØÏ%F½‘ò°§ÉÏ`\@U…Ù,‘ipxXùç0ýæ>/XObject<>>>>>endobj +1718 0 obj<>stream +xuU]ÚF}çW\¹]eWÂÆ6` Q6Ù®©m6ZúP E{˜¬=ãõŒ—RõÇ÷\a[!Àóq?ιç^?ŠñIh–Ò8£¢}H¦tgéÓ ÆÆx¶ˆšÌgxNñm­Ñý„’„–kOÆ)eói4Í洔³8¦eq-èQT¹]•KÚmu±%í¨°U­K%Il„6ÎSPê¼hkÐêúýVOd ýªMûå{jZc´Ùà–”ô¥÷¿«››å×ALa’Eq6EèóˆQa͚œòž­íš‚ºÑ¦[üL]¸×ÖÆú­jNYÿBÔtæ#£Y¶ 0]DiŸÆïÖ«!ù­ð¤ þµpŠDYR¢¦ÅjÏ Ò1±°Q¥ð`á‚t ¤ÔOêúq;3£v@”õóéLÕMõýº-ÂÜd›î’rmuÚ]ݐ@uõÆØFɋÈ8òÝÚ¶”„;U—ÿV¼(¬€s]¶Ê +…>t6T/ •ÜÛ¶ù1b¿ašFiœ€±Y4‡váÚïÑNOޒ´ÌšÙ8:5„òêRÀ?Òx]KVÊys'ƒˆ–[uˆtÃ|_@ûFv%ö´³ÍXgTæ RQŽëÁ\Ý ‰YՀʚBIWtåÞ¨¿‚”ÙP0Œì"¦QJvT@½iM˜‚?m›í¨´ +öíû? l:ހ³7(Së@ODÞ¤–’¤µ5 GR¹¢Ñ9òïD¨˜KªÅF¹K!H©ëWrµµ%­Ñ¤îXï\Á]©@FDq½ÙiJû'å-Òùx–°ÓMÀU-Ýè[^ðÀèr¶5‹ä»œEn_Ô%G¸è*Ⱥ²y©*7¤Úb”°?ÛúºõÜñXTï~âØ£û˜<µ˜øIO<m . +_èó4R¾ñ|è~d?þ9Ýøñ!ÆÐDÙþÃÚñÔaH½6¦“§àóÛ Oé8I;1°ÏÕµ¢Æ`~ë˜֋’«›NÒg˜È £½þ»ïŠ¾b,҂ À—ùPUí÷TjƒjòYÿ´Ó~{Dr#ÜPsÙØ-yn²ƒÀˆ'ˆè0J¡mÈIð0©EáѲû®J£ûùñ…áe1Ó8YDñlËëÇÛßÞÝÒCc¿*˜ÜÙƒÇxÁ +ç$0Á{“pw÷“i4‹è¶õ6¼cÙ±ðQЮÎÔɶ“leS~™!N’Œyï—åàÓà_k¼-´endstream +endobj +1719 0 obj<>/XObject<<>>>>>>endobj +1720 0 obj<>stream +x¥WMoÛF½ûW rrP[±dYvzK‚0Ð8n­ =ä²"—âÖä.Ã%Å(¿¾ïí’M-ÚÂ6l“»óñæ͛Ñד¹\àk.× ¹\IRž\Ì.äj~5[Êòæ/ðSkÉ‹ÅÅb¶š¾x»>yõþµ,.dÁÖêúFÖ©ÀΞ$§ïrU5º–ùj&Ÿ¬ÉŒNåW·uÖËF7ÖV>›ºÎËÝúåúϓ 9_,aâTÙT>ÝÝþ!­7vËSäú›_Gç—ËقÇá`>“7ßÔ*iâ±¥Ìçý±Å5BDZ[Ûèm­㬸,: §&©wY3 +Gš¼ví6%mzÁÐ%WŒ¡'ÈäºFRJ^ä®Ø Œ›âEŸÉü2gpG·ÕV»ÖãbYµ óÒvgjgKm/™«a¨pxޘRÏ䳖ªÖ/cF«>£SéÆx ‰žžá:m;‹+L°Éµ<¨r£&ùÖ4š*U«Ò rRâ]°bãÂÕ§yãì¦Ð%ŠÎQÍ[¡L¦¬ðnp'ÿ~ÿNUþLî‹v»U0*oZ„j“Äë\Ú'X&q§Jd¢ëIð»3M’3H˜qݨf§©+ÀGœµÇ«J+` £®ÒàfÞ=Íx©÷ù”*ɍE Ö¹ñR)—Tû¤6$͐F%k‡Zû½oty&ú[UÀ7kÌÃYk"« +ÓìÅ4~î ÅༀO™Ù¶àSL¼Ó¹úыukÜ/ö³H†§]š]°˜ H^¿à/Âî:!xìtQÈ£uJž«æ"W;-©É2Pü*]ª‹ÈÚZ÷éÇÅùõ솳Lþ²X]K|;ˆBxyЯ±£®oþ¿¾ïë(I®ì–œ!œÿÇþùâf6}Äè6ՔGAàè+PÕ@°ThëÉ0ï—εEÚkÁžs%”Rm,Fª‡è7¹kÃ8‰~ÚVÅ0ºÀɱƁ6‡?Tžï-E¹-„NŠ#Bå¡øćw#‰üÈ¥JKL®;Ð-tÖκ%±é'p#ȍFìàX4G=Ì°þÙ ê>(ïdM¾U”“Ñ®á"‘GPFÿÃnøÛv‰ ƒÃÜàÎ'÷ý¨|JÛÑ,FWý@gî#võºKWÛ°¨È&ÔÙuü¨Á÷ +(dmQL€/u¹ŠÈNag•¸bÌä£ÅbÒpWÀwŠìXví åP߶€øXȨ `í¥ÃhŸ q'~G[Êñ*¸Î ˆëC<1 +DÊ!W¶\—H%®QqÆá`|wûð#æɉCwé÷ÜYL±ñ®:U@’I##l«œÁ°̓—ÈvOvq×ääc,c1Ä$áù4îeL(ò”™Î=buÀŽ6‰äêÇ{L|m5&y@|ɦî81Pnÿø*è;ö¥ ¿‡ŽƒvÄ+ý‰ ÒéZÁhcd3y«…à”ÍqXÙâý,) ÏE¿ÃÐÚéB¾œîŒ +±ß=<„m!†–ñIÂغ¸³¬ŒàfS«zÿå%þaù#v>/XObject<<>>>>>>endobj +1722 0 obj<>stream +x…WMsÓH½çWtq2U‰cçÃ1GC–Z Yb +¹´¤±4Dš3’µÞ_¿¯g$ÛQ²µ5Óݯß{Ýþ}2§~Íéæ‚.”V'³éŒ®/çøyµ¼ÁÏ üqŠ6áƒËålzñÖ‹ëéÕ[,—¯|\Ÿœ¾¢ùœÖ_,ohÏf´N'ß½rž¬¡¦PôýþËOª8-´Q”rxh¨õŠî×ò—#6åζ5®”'örpGmË,¼ùÎp£·ê]¼,¼5}¿þu2£³ù%Ò[g“µœëÓÂv†6ºÄMÞâ&nâu ð‘Ê(ÙIìÌV¬C&’¬#µU†J›ãY#çF©K–®5£°SúyöC›Ìvä•÷•£>Ž0¤{±Ê1]TîÈ&[m[O8®STPCʸ/Á3Ҟ¥M.8„ÿ…‚ÞÄ­ágòÞXWò¼ýz·úrÿô´?8<ÀOi] ~•¢v;©@7Äei;¿ÏÀdªQ®’f†LœÊ´SiL܏âö §Ö4Ζ%º ›Å M€T³ktږì¾} é®ÐiAk½¼Ù߲ǩrʤ*ãºÊ2-¹ ïÝé>íÚ٭΄ZèL‹Ö„Œ`ƒ€[öÅH@ZÑ÷ÿ¡lóœ“RÑêÅ¡Qw6k…mO“‡ÕÝÓ{ò;$] ‰ú¸ã˜[Í(ü@A¼ÉfG8MÊH¼Œ¸®Ë>E»3 +šr͉.u³ËË- cÇ+²daÒÂY£ÿöÔì}g]&lj:¦Ç,¡ ¥ÏGïˆT|cÑ[€ñª§8‘“Òö>Mz©¿jöÓûПóÏhڋWœÁ™‚æ‹éåtŽÚØ媡ïPŽ”xì+gâ+“#)4áeÁ§dsFu¡R=¼E)†ÔßÚ7R60NX„30Èl{Ð*mZÔ:ÝS þ1‚¸ÓD[¤'.Ÿ}Óy…;pºéžgŒA2Ò XÜ(GQO]Ú]¸níøòN7…EX$e ñªFüŠšá•¦©mMƒ2Ž«êŜ;Å Æë +TÚèȐQPΠd`…ëà¯dQN¡8þÄL%úëÚnÁÝã2_)ÒX`ÝCóNŶt¼bEä;…~Õ°=Œ(7Q{à VšB²Ž…£ßĜbð ‰ýz˜ +Qø$Òc£ ‡à2µCV¡°pÈҝNõvÓô¼1P‹4†Bk‘U°¼#=ÊwëÈ+®à ÁRT. C)È^¤ºO;²PE’$öGÉ\í%s5¥?1fIüÜ$øH6ÓÅ0dº~Žô¦ …ê\Æ cæÂj™ÒRÞóHg<ƬnÐ(dJ+èÀä3àB uÝOþ P S*{™Â„2VJ-A-eB‚G£ôc³W¥·é3, cX7bÉ\pêw ²„ž°s §ÐZ$µÿDL*WF‰ÂLïCgᥣžÄ"edb“2æpÌKL™}Žg4p(Œ•­ü@Ï3!‰(JU86ÔÌÐ=åS§¼jcJ².AcŒÏCCßðÀ+ñÀë¾7(ûAÌÄ¢>!³·:,ýý +¹.•ð4Ú¨ŽvŠ?%µ†/øa"nF+'²Ãî³eVŽG®¦58J•ªÙÙP\¦R›©á¥ˆìE¨X—"‡ÿ'oLÄ»ÇoŸö3±·¦¢ÒïÊ¢‚^l£˜N•¡Ã¶–VCA‡`éòbóý†)RKË6¹ˆeņóЮSé vŽÃ\1ŠØÛBmm‰{ RÜ8/p7*Tê²Ç@}`-$eeÂ×àX¸'È^ñNW²UÝÆ¥óÓ~…Æq+xmZv*„ +Í:••¬C,±Úî´*3Ѝ)±6É …ÎEW•Ux0Q8špݺÚbҎ©>ø ðñCë)ô;5(Å)ÓVAlÃ00£žÂÿ‰mU”@¨£j9‘!'«/Ö³ö¯DºñÆ)}œîE&Dž ä‡f†o½¥rkì(hZ°ÉÃxq‡•gJw7YtžàvB!§ C[‚1ÉÅÁCâ7ŒÞ¡¶Ó½T\=/xÓúxbÇð5e„;ºûð=çüó²·Üù_閗´˜ÏÄWwWâ¿d~ÞÚ-š *‘ªÏ†×ÏnfäýÿXº®Ëéâú뙼3¿–³¬Oþ:ù)¢Ç­endstream +endobj +1723 0 obj<>/XObject<<>>>>>>endobj +1724 0 obj<>stream +x•X]oÛ6}ϯ¸ÈK3 QlÇqÒ¾¥Í +[¼lv±½ ´DÙl(Q%©xޯ߹$åÈrŠv($’x?Î=÷ÜË~=ÓÿÆt3¡«åÕÉ(Ñl4Ëf4½½ÁïüXIex1ž]gÓá‹÷˓ˏoi<¥e [³[üRìŒF´ÌÏƳlšM2zP¹5Ğîr¯ž%Ý++soìŽÒ>«\ºŸ–_`jJãq4u1¹©³…ªsIZxI“Ñh|N Q­m„£µPµ,Èo$‰•ÒÊïÈRµ—V䞶ÊozŽÿTua¶Ž­Œ¨uª^“òŽÞÌÄÞGt1¾Ê&ìõÁò 5Öx“íÎÉ ¸±ð%êàp¾œÒÈ¥è3úLþz÷H¢.èiW9Ÿ“ ÂT•*YáÙ¶®á}àq«ê"¤dÝVÈ)·°ï‚½µ5mãÉF®ÈۉJÒVìpBŠ“'ʵ’5Ò7­.à6qÈDqì>«øQÕæª ª-ËRåÁŸÅ_(—¬‹PU–\8Sg±n/¸¸ƒ&À0Ôþ*£9ǘªL T%ß|£ÖKdôÊ×çd,Í‹sRœe)…o'jáùIc¥ã„aQïèóüÓ_d‹ìvÎËÊeôɓÐ ?ÀñÒØ*äDŽÁ¤ã|ðQETPã¼NƂpi{+‰vqF?ƒ–¥5 ðYD7ôiZ Îgô©¡  )3Åy`.´©eLckìž1Ј`×YOI¸þ`AZ…MI%šfà¶TïúÂ$SH›\h oRÝQ-={ÆGÃJepô€´ñÜn)ßW"úfŠcbLñ›/;Ü¢>,XÄ@ œZ'µÜB3˜¤œ”ÈsÓ¢Å:aêú¾§˜Qþ"mÓÒje$>ØGƒÕ‡òÆü;’8ðRÄó•È7øï(&«”“¡RÇÆ `Õ²“àF·Ü½OÛBŠî9zÝoL»ÞpKìh‹žM\ á ÐeQ_ãUcU²6µ·&¶V )$ŒõŠ]~ÄÜ ƒîìRúü²v.c†V(ãÝ$<˜2 “>c+ñÄb6}m%ÚқA …Á[mÌSۄ^ÿ@]Iøa˜&ÿ7š Œr]¶ÅCC@ÑC1â8$¿k$Ôðxà¤P%&wn’¾Üi#€Bqzh€¡"ƀ‹Áà €O©cB© ‹UÛd´ä>aÕp†]#1Û\ -ýp”Õ S¥KÁº`Y÷PÕ¢¦[ž<ÆÒbª”!ø{rДB¹wê·½ '©Q<ü.Šp‡IüºcAO»‚drç¼Ts«4óŒ¥Y81ɋVs»i¸‡E .ñÖý„?s9/ëתógWqӈ õڟÍu&SQruŽÂ.v¨#4Xc¥ ÁKt=‹RĈ~U1õÑè=þ˜#éùOcó ­±®` „ýíÏHuF qzÔ[ü6q2£ßxÕì=ánÝÏs~¾GüÈ;ÇÆžeì -õÚõX+`>hÂ~Ø$ýåž~–T -1ÂÜç^éÆ,oн< ¢á®ƒ :"×R¬ìƒxAè‚ÕÀFÓú!C9ÒÊw\I8 ˆüèH{Æ dEA§ÉÔi ;~÷㈍cB×È-oʍÆX|•`!¦LÁnm Š²×ó()ßYi§=êv½+4Ø]Ëæ}·C<„¶ûÖ]æ{Ç0Õ5õ§Úlš£Ç»‡´ó¦•i VÎóý†—qèy PâŒUÿÆ ÇË|SmÖP@^/p?ì¤S ÷iãœâÜ@ —åîeº¬$€bˆlàz¿úv«a¯bsðn#ž9¸Â}ÐT T& ¿ÿ9G”`kÀ5+[èݑ˽œl¨…iµ°Ô¬y± 9^Àà Êb T 4vå°y›ú™í O^^ ¢fX!aábVí÷ì¤Aqõ RÑ´žV@àÅpÚ^öŠ“v·þN<ð Øà–›Ñ@/‚à¤Õ=qø& ›ñ ×ù›+š½½ŽÜÅÝÃû;z´æ nwtorÜ8ӍŽ}\t.®G·ûË܏_ä§×ÓìzvƒÿÀ²}{Ë&^žü~ò›jendstream -endobj -1694 0 obj<>/XObject<<>>>>/Annots 979 0 R>>endobj -1695 0 obj<>stream -xXQS7~çWì[È ¶CÞJ Ii›„&ÎЇÌtä“l î$GºÃøß÷Û՝¹2í08øNÒî~ûí·«|ßÓ?c:›Ðñ”ÊzoTŒèôxŒÏ“ó3|Nð -äÅñéqqþҋÉxZL^xÃ‹Q÷ñùýÞxrZ¼¡ñô‡Ö49>/ÆÝ·Š¾ˆ…ñø¤˜æ½í½;¡ñ˜f x;=?£™–“G4+÷o­›[§©&R³2¤Z|ºÆ–ª±ÞQ­œZšOHaÙZŸñAŸß\| ëª4Ôxù² ª1¯gw{#:#¾™f[Úo"}œ±¹y¡'E_?^ÿMqS4[ÙHªªxá³ X^ù%ö±™nc­Ê•upîÍs“ƒhŒ&µTÖEDB±µšW†n‚­UØҕ¯ñŽ.½k‚¯*ØMçi©œŠžÊ•rKD¹26ìЀÃNgÁ®Ô/C0ýuoÈ,¦lHۀª-aýç^t§N¦Å C(XãHïvÙÄ4ßÒ:ø«­[òsvŸ¶B:&žŒyɇ½e… ûG¦)Öª.ôQzÓÓdŸ>°ärÒõ`K¡ˆj²HƒùÞ"žŒ9݂G&{Ž‚øÞ$ÈÔJ€­×UÏ9A¤*=^wA\fF+;œ·ÊûûHíºƒz?SDвfvlVª¡Ú떁)-+¼Ä7à ³¾\™ò^ó¼5³Ž -H AOÔ¯‘aPAK*9³Écï`xûÊ{0è¸=`ÚÃ8êŒÑâæ3Bk``U–1P)s»œ"ÿlRMѧ—OiMðþÒ¯-Ø$²Ž€ìQ4el³}Æ .²§ô ÉÆd S™áؑG%íZCIJTyуUÔ@_Œ”1íµ/[Ö¡¤KLÐڇ¼Þ‘pe«X¤  —¨–½C¨²´ö¤8-è+œ’¿ì¹¾¢ hN½QÃæ kæ~â³ÁúR62”ÁHD­)†šÅä€Ø¤sY~È!‚šW¨‚ -@"¬fµ]Xlý¶ÿùúêÛ뤁˜8+Vv¹bÑÐ*X’‘>ÏÍÊ¢VW -ì£ …º…±9«¬PE  ÷Îä6ih×%5ªÚ¤í¹q.¶{»Í,èZJ¹KÙ«Hw~Îë E`vCI˜,~Z½óŠ²¤VE•Ô"3۝™èº<@ -0–ÀÎA€a¡“(1À}.R\s/bêù¢.sý*ër»}¬±ÆMm‹ÝE¿€…ÛûLôÕðf¢rÅ,l€è5¶6Ì -3£O4áÕÎ<6)µf|-gHj¥1‘ä -ÂMFÒY.›®iÍðh«&¦d6Ä‹y)0c¶,†Ç‡î¢+ ,û…P 5WhÈ+SiyMžSÿø'ec\D—ìj@¨È»(ûêa†²=ælçmÔö?DdZÐg Š.eY2¸ÃQ«“ œ\J©§‡x–XgxB‚ÑÊ …ʳÈq-rskר±™€ºåñJÈÑ`»‡»`Tb̅°ÛÚK)—:‹C™\¥ˆ ¨î‡/ÙÈÍÙÁNÌIB-30¶i™’2uCf&xú• ðI(Y'Ŧiƒƒ9nøtsu)u Ò£ž‹ªò ÅÆ6+¬ÊÜÉ Ë@6<–ÁÁÁI@óÍlÎ:ˆ57‘ds@ñ †Ãu¢\ÒÅ]™Q;‰yì¡Æè¤ÐAVÆgÚ:ë±y\c6Ò’¸,œ¤2 aÏ®Ê!³[új‡uýËÁævR8ôB{amD2Ɂ{HO¹ÿd\Ìͦ€²¨µ¥Â o …<}aÖb:gëºYëvï0̧ -CƒMmúdצѤ¯1¬CŠØÒe7÷Êö4«7\Ш?pÑõ&C8ö»_9š‹©èó1ÿñKtj̓ æ8@+Òù4G3^¿}º}êä‰ÆHÄ"qùmû´T›X;G­ü† /M³«?6%4ÀâHBëë–uõ•HbŽ·ƒq´»diÁŒºõm ?­kiîQàrï+ig2õnDÉïPW(ô·¸œòOñåAé´s€¤‡ƒqÆ[®l9 ¡ô'- ý‘™oˆIbª·ÐTý&à3Ün»+a:ŠVn¬À½Tk¹ÄöO¹{F™êûÛÁ Mv÷>V_î˜é–‡;jf6í™ü!ÊōöU0˶Rᨑr{¹Ä„ªÁ’uݬ1bEÚ4Uޘàï7u8ï.eã)þãàü˜¦ÓóT iõMðw|q¼Áìáa¿áðlô†“ñܘžN0ó¦Ñˆûu¶÷×޿ύ|Üendstream -endobj -1696 0 obj<>/XObject<<>>>>/Annots 982 0 R>>endobj -1697 0 obj<>stream -x…XMsÛ8½ûWôž¢TIԗ-Ùµ‡-'ï¤RŽ½‰¶rñ$!cФ¹ú÷ûºAÒãÌT*¶eîׯ_7üçŒø·¤íŠÖJŠ‹E´ «Åe´¡Ëë-~^á©iÏ ØÚùöï‹íM´¤õz­¨ åbÝ´Ÿrú~1üŒÕË«h;\|Æêf]WŸ±z³ˆÖƒUöpµ¾Âן=¤›mt9þý‡ÝÅüKÚíìæzK»TBYÐ.™ì2ãé÷‡»ʔ§XkKMiª -ß÷¥+HÑ»o:ý]U³DÛª4É;:êÒuR™=%ïÈìéäjR@ªöÆHYWeº¤ÔxœˆëÊ8;}¿ûãbA³åˆíÒ Ÿ(Ô ·¾hª.5ûá‹c5ì;ëa¿ÐM¦*Þ³7ø† ÎáüùÔ¸òÙG|ÍünÓŒ´ÎV ‚d'ò™«ó”>³µ -¡ÿ+lŧß-À¨¿RÎÇ\³}¾0„ðȒKôƒàC˜ gJñƒõ4Ù+S"‡Zy“ŸžÞƒ}•>0t¤ÿ‡L³ÕäRÂ?Μ³Â¥ñ]C`§ˆ>B ç#Ú1±½2é”T'ó뎰úx{ëQh•TXW,{×Ո>±Fµ–|ŠcÀO\ð‰S l$ÐL{T™ò}œ'9äpâˆ Ælu-oh&Ê,7ÑU´Šè›þ³6¥Àî)†%Ä3iS$lT²ˆ%ÎîÍ¡º\ œ! 8>–¤.Kdé!‰¢Q9OèÃíÇ/ôyGÿ}üÇù½“–¯”É™…§X(Ï芽êĄb•„°£Þ FÖ¸-¡5€î© 0 aæË­À8¦/–Ï A™†´°µÃô2ʌgû’‹®wµ¬ˆ³f.áÜÄ¥* *ˆuööÝ¡[Ft‡ôA™xcÞÚ>êÑï¶ÑrÚçWÙD3E… ­0pq8ó»¾äpÿlm/g«UXék.\3àVWzbÆiÈt~Ü×¹´¤œÇEŒwHžgª_tîŽÜ¾ÁÓäTõ\˜o8![åJØßu-p`½ CŸ4¬5” nr9a¬ãr~¨«óhXE¥m}Ðà>R]©’´!qÒcäpb=„àö{¦¶„ȅy:ÐU+V[Ë÷¶ùªbÒ¢/íqöb@Y ~]u’G¾ˆÛ¾Ó#ß6‹×=ö=\=c[˜œÇ>áèP>Ü0@ð|xŽ5ZÚ&3 F̝ÜKñ50ã³£xxw˜ðQíÀÔ¦ªL¥ðÚló²–¢ÔšÌ$ùúˆÁEÜÑc.Œ»qÊ ‡÷|¤ø‘å„°üpmµUؾ^‚X0çUÃI§,˜ÂÀÔ]䬡K(6í«f^ûrŽÁw tŸ“nçÀ79S(Ú×'ۄPRûŒnon ×&g]UGÑ¢§µ±Í¤dººB ¨ƒÔi'ÔݛLÞ<]bú~ÄÖ2ŒRP2cyh(A'k¯€)N\xaLg’r‡ÌL©8µy‘¤ñåý AcÉÆßV A„<ïþ+© o÷,1¢A-ó;(Gû@æ‰Wž‹­r,#úØN­a>éb´ÏóË"Ò>6wí|Úe¦„³aúí>/XObject<<>>>>/Annots 989 0 R>>endobj -1699 0 obj<>stream -xW[oÛ6~÷¯8@â¢1uñ%j± H×µÈCÚmñÛ: ”DÙl(Ñ¥¸öãw/¶lÇëšql‘üÎwnß¡ÿ%ãoW)LPÔ£˜Å0Ïæø:Ë®ð5Å¿V@e’,yr1Xì_~ÿ0J§36…$MY5¤¯6óŸ܍R‚»µ$Épý°[š&,ÅcÙOÙ÷´òv9ŠÞÇð–ò]dø¦´FcXãVëîÅËåܓ¸=ÓOãZ9æ}§ ÝTnÙCLìú$‰Ñ:îù¯ó5¿P(Á›ç"´5¹b/Öâ¹0,r(}ûlòå¹æmdc:®”ÃÀ¤&”ÌtA¡\®¥­TêòG(EÅ{Õ]‚?w×·o¯ñbõ¦”.¸Š ¯s~haÌàNèÖjŽ‡J©‹¾MÇ;©<êžÎÅ0I¦XCÈf˛:}dÞèZl×ËZ(#Üt–1pe4ä½T¥5µ•M.›²ñU}Çs%€7%(™·¼•Â0ÇòµÚM3,;´›,؜!?ÛÌcμljߒ+¶ )ȕVJ#ä -Ìck% Œdsÿæûh«&ÆÒ9Ãòô1KÏ2¿nJj[‡7tw˜J£–žy7Ûc2?%®ýžZbÉa¦ ΆøÊië“ù³ C“°w׎çÍìæ÷Ø|:KX§ß2¿‡;©Ë,Àœ2;2>Cõö¸Š)Ï®ED‰•v´q$ºbWю:¦‚DaÕ[èhmÿ¯°7€úFRã{ïAI2Tµº>mëAÿír<öf\3¸}ü~Š•DËJë{lœ‰)=¯:¤K.cÿìªÒéI:sâþgÃQôÊ7ö¡Ñ¤°K4‰½ŸÇa¿YóRo‡ûÏl´±rûà8zü·ÒpV-q^ 5×K!Í2’=ºGÔ¨i8¢Ô#¥çŠJƒ‰{B_Ué†õqüí ÀšiÄ×.xã§U'kA¥Ô¢™NÔxñʱºPCó¾#ý€WWZø<¦IDeWê悔Í˽=ñù¥‡¸JçjÞôD{— ÿ§Ä‘ÁùW`òÿÀª›a֎‚†2%}5ÇUv؎ÇÑá\*;g1ª¡„m3ˆb­ 伸x‰Âÿ¸ýÿæ žg°©ó'ºo01îăh¹‚ oy-0ÒXâ8»ý<õ‚Pl©Ìu×jeóš‹5ºEÅvîí'[ðèÈíA·2˜”á"L…åZàp Š¥0E+s[“Pkû¤Ãp†)ŒgXXèã -/?§JpΖíÿ-7Äa 5µ.eåo²)T_º›Ú~¬ óáûc¥tÎ՟`DAw„]UËFØ ÕáÆØOO-¼@XÊ^‡!Á†E›Ô)¤ª f«ª[ÃÅ«‹K'bï>Ý^ß||– 0½Ú ‘Z€Ôöš3†áíœ ·ZÍzA† —%6*ItãUHjßTXžY´‘bs@ødÈ"Lìqz½Ïü5*™áw®l -‹«…ûã.Å¿¶ú †Þ /ǖl²À/^x`rÓ·§pG…¥0$ÞXJøjàSoei¶ÈØbîmÛ9øËrôÛè_Oö\endstream -endobj -1700 0 obj<>/XObject<<>>>>/Annots 1000 0 R>>endobj -1701 0 obj<>stream -x­VkoÛ6ýž_q×¢ˆ‹Å²,?↤IŠ hÓ-.ŠýBK´­T"UR²g`?~璔í*m¢ËðDò>Î=÷ð~>RŒß!'4šRZžÄQŒ7û¿^Ÿ$çQLÓóó(¡’fÓh -ºk“I4ÅÚ0cÏÔ=Çãhæ_`ÓÔ=“‘³:ŽØ¬{:,¼„Ù8á“î‰Mã>Ç3-Á¿‘´t cxŸu.ç'ƒ›˜^Ð|‰d§3|É\Ž1ÍÓñÏSj¬¤UžYZÍNñCµ¦Ä}YjC™.E®hetSÙçó$Oýa wó¬·ÍÕ"W[à¥ýæMôÝy~Õ?Þ|Š¢Ð[’ª)¥u®é%µ¦±$Øèw]òqŽÞ¸ ØóNº¯ñãðÜރ¹£Í_ o•od7@- -²kYô±§U±#%e&3ʗT¯åŽÖ§jY(Y“HSiíÇç]¸jYV…¨%­u)³Ü´˜ øyT=xv5xöžŽò؟sìOúÁBØ5¿ܼ áKíRJ\y†Óhcý¡QCÄI÷o./°m¤áBó»wW¯B™½¥q°„&> -}­jޏÍKÍÕËՊR]–\'X)Å'$ß5ÿÐ:=88£íZéýˆà§GWwo.nß~é½G¹u6•(Ý„á€/;Ýúòé­mIŠhº–/²2W¹­A4íðÜ´é9¢=ËTBp…ý§˜ •É7y!WҒ‡‘½…ã{$ò¾¡+®Gè­ë§~u²ÏyÐX3(t*ŠåB ¸œÌ[ÿޕ¥ÿž¾“Á‘‹9À¯Œ®„‘¶Ò -}ÊÛÖÉ®uSd´/é óäå’ù໸}µ"O~°z\£TÞ.qM^-o9™™g[àí$¢ûZ˜ššÊE$"£LȪáÈ'mMyý‹¿-í0ש꒳;cΠ±ÑÂ[¡jÇ[å˝ç’-dÙ¼ÙÔä•Û!šXç(z>W˜Þ ¦“&XîûMbCÌZV¹Ð~ìæŒ ‡Î4¯´µù¢ð%ãŒ4–|á -WØeœZ.scëˆæÚÇ xºÞƒ,s›ç¢3ˆí·û|g‚¾ôþ}[P¾Y>²ŒR¡Há…Õdōuš¡NmqKÉS$¹<®fNcoFÈ ÓeVZÞabTüV¡ìVv™‡¢5>7€7ÜvŒm*Òµ<̍ec]kûê£)-r`‡ÂAïÉ×ÔÕTëùÞäÑÉd§ ðjvØ%|A}¨,4®ÆÞ!.“;5ÅJ2YjÎ݉ ΢Iw|Å4Ð4éš@ð ü[7ç µT‚éÕ˜°”eœõiÿò´£4âÿdõ/¿IŒÛÓ\؊šA¡tž¹ÔŠœû-Ü0¶A¢Œu`Ã÷2¤PÈ"Š~P„+K}!é_ ²j-\"_ÇƎž‚†Y“¢`M]¡k}À¨ÜY ŽƒõQ†ú´wë(N&ô;ÅñK÷÷EGBöVo‘^K0—8æ ©™[šV¸;, ´XȢŹ`)aÌü`…WîæĕìkñsýŽ;k©©ï(w¸Y¢vˆ…›G¦¸^"ýD0±Ê-;QAÜ}þ(ֈnÐXò -ízë’å¬öãH‡ôm»ìùÆà>¦u7Ѽº¾ûõÑՊÀÛі×É0ñµ¦ÃÐË+¯YF<€³p£§Ëg# ÚafòZÿÎè™Öt¥SÌ»èm. Ÿì·úç1æ½pëѦ¹#ZYºkœ£ñtM' &yޏØÄõüäϓÿIÈÓÚendstream -endobj -1702 0 obj<>/XObject<<>>>>>>endobj -1703 0 obj<>stream -x½V[oâF~çW¥H°Z°¹…•VUÂnÔM ‹ÛªÒ¾Œí1LbÏ°3ã°¨¾gfl æ¢JU„=gÎíûÎå{­ ütáªý!DY­ãu ßxCŒ®ðwÿ%…¤vÔüI®!HðÆp„?b@éN‚¨yw?}ÿ¬Û$~<×:Ðîv¼ -Ø÷/2Ô }ä P\SÉ©þMQiüɺ]g¢Ý Óð•‰\¥›<À’¼Rà$£1dˆEF‡oáæSB -%MX32Ú ‰øküJ´o4¶í­7É»œÜÄ㪈jŒâÜ$üÌñ§œ*}æüNd«¡;+µiz\èŽb2gy˜2µ<.1–4#p2{C•dŠž–ùdљ‰”E¸“Ô¦k^X<¶ÑNrY(ˆ0åºa©ÀÅB -¹Bîàçœ% 1­ 5B¡—`¡³tDy©ì“¥Šò Ï›¾×3¨'˜*l]@$² ɼåÎ^=çrKtç*¬ˆRk[„•àv¼VK‘§±e/±®£7D£ÛâEáó …È%”Dsæ›>ՑL{Óépþc2B]Y›.ü5ü`ÌL§ëJä9‹U ö{)°Ðb&i„H1êӄä©dJšªj©Äl}ºº4U‹0ł#ˆ¶Ë:öçA™Ý·ÑaÃ*+¯2’ku¹›×{mjärÛz—^ßz0a?l`œi{&Rc—P‘d+WUþäºì¤Ûž°½ßõà ãùgé !bÀîdç_Ñå*¸7!&4ÖÄ)•!­õÐ’`ñ”,ô';M* ´ «ù1g !Ãq!sΑËHv$BF¯L¡£A¶íï5Q/-Ã8ë¥q21K‰*™3%f¹©6JÓ µ/éÆÚ35§‘|Ècç*Î4;Fo>÷6§Øþ¹ycVáÏWF-fšœÓdó¡.ӐîP›hH—œ³0þ*°ÄL&Jxp„amÀJŠ•›‚{î(ú=§<¢2½œÈ‘Ëd—•Ž£ÜÖ|º±˜BÃßØuâ"E®‚ö[•Éã¶S»É¶¢¬–oÍoïà/ãÂÞZÅß/OãóÇۋ4ZâÔåP¿˜›*6ý¹n.áB!_YDÕ8uµ(¾£ãܔÔÑîx: ¦Oóæ¿Þ¿ß|ùXÿùĹqïđ íéÍ êh÷…Öû±ýáv»Sùÿ Û/ˆ#Œrˆõ‹°üɨhDÝ!nÓ£>.ÎÅf<¿y¼½™Ï8ì`,¢<Ã]ÃîÑvy¡}Õ1«v³àffh˜5TÁ4·›õ`8ò†—=·Av;£â>¨ýZû6õc;endstream -endobj -1704 0 obj<>/XObject<<>>>>>>endobj -1705 0 obj<>stream -x½VmoÓHþž_ñD4=Õ¯I݀ZA¥Šîht÷¡á„coðR{7x× Õ•ÿÎìÚ.i®.!åÅ»óòÌìÌ3û±À§w€£ãIÑó]a4v'˜LÌú” «Þɼçúx‚ùŠ4¢)ýIAÒ¾y2BóbI&÷çz>œÀw§$s»uá›çó¿ÿ€Ã>’ 'nÂÿ­Œ›•·xüZVIï*.½\&—žª–êZyªXâæ‹E‡?BTû›%ÓU)Z;BŸÍ³w:AÔ!;adÂ9[áZVØÈ*O‘óKFøPV.–\¤)¸@ZÅ9ҘR ); ®ó8!጑–`µõÛ|:á„R¾•­FÙ«”:Î=ËØ#^ë©!ù7^ا¸Xç ñR^1B§³§?Ã)œ“¿®Y§s £:”9ØSZ®÷°ªD¢9%#‹b$²,™ZK‘rñLèòÚdQe•F*75~ÅÊ+ž0’”h)/U“ÎHŒ»Åh±ÿ0»UøâìÕ³YÿüåI¿CÀT0ªŠþ9ÁÑ …44šhA=E—þ%Ïóu)P}¦>šºþÞ±ÿ@Õø_ýüâ[øÃُðOÝ,]Iüi‡°Ý*÷pR}ãî@~˜´ÊÎê^ÒzàÌÑïJÈ÷PՓ–œ¦ -"÷л‘º8—y\re|ßÃi¯T-p`ÉM0–š†$êâ+jMjäZ“F…eÑÇtâqÁµ›ÖÄäšÎ`å]#(—ºZC%%_kg•"r̯!}Ù} ˜ÎØ šÎ±]oJK"•YºrSk|%[-%Y­99‹‰è,M“å<§0¸¸ }ËÏ}äºÀ ~ʼnG !‘BÇdV0z¨‡ÀC¬4³[õ7Ô8·²vg·×ξÂÁIa!Ó ÀÛ‹tF¢ÂÛ¿«!5f%4ëâ$ö‰ë›+¾ƒ£å¶šaïº1{6Y".(톙R‹S‹ý»­âš§³wmDÞZÑÐÇM‡¬Õ¹•}OãÎÃà;A"ë{ÊûøÍóöš'¸æá]‡Ó ô‡²G3jMØۈÓ¬ïtÚtDÑmi:Ft4­§ßùñ˓cüYÊ,Ñx&“ª A›)h4VÁ9òÍUjÔt+æLÙ¡37µ¥ðº²§2‰¦ntҵɈú‡ÆÄóyï¯Þêþ•ãendstream -endobj -1706 0 obj<>/XObject<<>>>>>>endobj -1707 0 obj<>stream -xV]oÛ6}÷¯¸HÔlʲÙm†dn€=díÀ-Ñ6c‰TIÉF°õ¿÷”lÇζtœ8"ï×¹çܫϝ˜ø‰i2¤QBiÑ° Ç#üO'î;>FÐÒē Ÿ\Ï;Ñ̀ÞÒ| WÉ_2‚›Á€æi÷˛ùCg@ýaÌt_Ñ]ÅMÙJ—T -k…EˆÏµ4"£¥6dy±àd…Ù -sbžr+èâ»ø‚¤:9zmã×÷ošçñ€M}ÄÓÿéC&+ªÖ®r©½Òdk<{Ôµc8Ês^I­è¾[òjm{´Óf³2º.{´Ö¶úÏ("]ëPªT+º»½ž¤ADQmM”ë”ç‘/9ZHÙb‘QF}K÷÷ç60{ÆF,ÕjÙÜoÁ~šÄÏ/OBµIäߐĖ»jV.ó³Ê^”àïRŒf\ºmoÛÆçÊvxí‚QvÕû÷'p€!º<'Œ%RÜÔmº˜Äñˆ ]wŽ§,qx¤L ¢XCµúvO 5Àɏ+ªAEÖbzàÓ4ô½uÂèGÌ$¹ªaÙj¥Ò§«Ûg0¶ ÊkŽ¦<äG5 -]rÊÜ(½C9 ÅÈá×Д#”ÕnèVz%Ð%èqºãÊcì]ü#,O(Œ­D\^ÃVU2 ‹Àí%í¼ù½$±¶z´¢„x†hŒæàlÉ rsØÕÜØÉ F ¬68_œæy\3,ÐN[‰’aëÌdæ{jDÓ ¢\ðtS—–´g#r2r%„Å.÷êîúétXìVö]ZºŒ~p˜( ædŸÀ„Ù~> “Й?ÜtÀœ Åp_+Æ@¨LýpjuŒÃ³§˜9”ÐËÆÌ{]S]”HªAa?Nö¼jËXd±¡S)k#]?¥Q—2¼C¤•6´x¦[ˆ€Î F±—Y‹’{/iª3ZW¯‚»ƒ=âm¬hþÙ…YîN¼ã/KÓ^â ®»«Ûë+údôƒàL§u6yN8Ë~kП Ü S·Ñ Í1^y“ZYúXûތ“)K.‡x¿rW‰sñaÞù¥óE²Þÿendstream -endobj -1708 0 obj<>/XObject<<>>>>>>endobj -1709 0 obj<>stream -x­X]o9}ϯ¸Ò¾P) IIºRZu«´U»+UfÆ7›ÚžRþýžka˜LË~@”(‚ñý:çÜ{Í׳)Mð3¥›KºšQYŸMŠ Í.¯Škº¾½Áÿ—øu’–goægãw×4Ò|‰#³ÛšW„Ç'š—£¥³5…•¤ó/x6ャ¢{Û¸R¦÷³UÊÉ2X·-hþüØZԟ7Ê,”© -oûg—JKò+Û芒J»V²¢`cږ"(kÈ.i ×d–cº˜^—ˆ{ûäeÙ8¶TÛªÑÒôÁP½¥¿dõ»ä·>Èú6•§ðCٍµZŒ³~” aøÁjá”g{’à¾P6’ƒAѽª$)Ó¯è¸ñîg~‹GFI_Î'’vֆ_Ò§/3>T®‰1õB´H÷ÊÕøðúŠ^%>ìœLgÅË⪸)¦ý¡Ló}üÎIùæáí…_ËR-UI_¿ff©¡:¬\Œ˜ãàÅX†’Ã*ªòáÉEfTVz26‘‰̑•0²*螾4>–ː å#@Wù×\¼]Zשv¢ +ÂËɯ ˜[ñÿü:¨I,˜¢|iÁ/÷M•ò.é‚-°ufᤸåEYÚƄíJPäêEêç@˜Áàõ=S 8¤Ò­í&r²ñ’%ÓªŽPaˆƒ–&¨VRmJ´‘è Ldc]-tN«—¶ -ÈOho!×O#ëHP®VFhå=Túé!µ‘€„A ÂT´ ë6 ƒ1WIÇ -—F,` –nŽ?ïÙS-¶`ƒԙ‰1(¤äH2 .&Øw…xª¢JdØ÷¬˜Cz3Ëk™žgN÷Ž|zQä~Ejì{±Æ*Ê eŸäƒkÊÐ8yÎáÅîS -$ËI ¤¢áûh"ãTâ^p\éÃl:2敃oš @Ò?ÏM?è ¦ê9<¶“wh?˜ì{H+¶ÝÙm*׻߁M’€Û–6Ö=ÑÚÙµtz{ ¶QZ“ÐPc.T¨¸£•øÆ͵RßTՀŽ¹Y3+–°Í°T¶€ ¹>jB;)ª-¼‡PpKv&¤tç kÛp¢•­a,Ï;н^k@b AÄð@L…2ß1¬ÐxyWIÝKË»X=ä1Ťsw¾A-d”-§šI;àÙ7KÌXŤšN‡KÕ°‰#Áÿ›·ë˜Ñ•ÔÚ·»^7¬vDþŸÌö&ŽñÏGw;¾Ö1¬•k ¹ý\IqNö´˜Ÿž–Œh„Yû –í{ DL|¦´?)§ã+CØ€¸§Á èyÄDcÔw^¿ šÏqø¼~׿Ÿ ætœÈ;âqNA¨Ôž«GÒü±÷&N——ã•×ÞÓ=†: £cÔ®ùˆéƯçM¸ÝL[dxßY¿Î±7‹ªâ¥yÕÞe÷ƒ2ßÁ빯C´ö¾F ïo˜7 ‰Á¥oф´±üÀçÚ.Ú;(ø¢Ö×_׉XX^wvm‹Mħ­ŸïƒíÖMø<-=Ø|yâ‹RܛR"õ›}ÊûlÓ'·í…r:÷·Wø~ ^9^¿óš>:û—}zk˦ÆdÚ]ú.òã7,Õ¨½=Ò\úÀ›Ì|…¿ž>4Ý\Ïn‹ÙËK|ýÀNnø½ßægžý H€;pendstream -endobj -1710 0 obj<>/XObject<<>>>>>>endobj -1711 0 obj<>stream -xµWێâF}ç+JKiðoa“¬„¢Q& Š iÔ´Û¸Wv··/;ë|}ªmÀ°fÃ2 ›îS§N]\ý¹B€!LG0Ž€æ½À ŠÆxÌ¦xá¿bôÞ¯{þ‡CX'¸%šMa.XӁŸñ­¯µŠ›Ò/Hþlÿêi V³ç„+mž ¢õÝúâLjœd\0 ‰a -LÊö¿6VðÂŖ‹a.î3v̀â1Ȉ²äb±´Û¬Â -`Ž½2Jæ…ѐHŽÈ‹T±öö°s˜ï½Ž"oâV‡‘÷à½©7ò`%3¢¸ê‚Qžp -TŠ„ï¬"†KqJ Ž"°NøÌP'…ç6€`,ր”· hJĎÅ,›¯è=Grïq‚øŸ¡jëf}¦A¹+AlöüO N`~(a¥SWÛWdq+Í+bc+Æ~X#~œÀüP ú° TZLÔ·×~½ñÈÍJÍ7f|Ûj¸Ê]Í «À.µ”C0dÆô¾X;©yT1×¢ªÏ9ÇôüÌo¦ûmthÓþ–:\½±m²ÞF‡.ÜMòá"èuèÊáüÙÕ¥ÔÐÒõÆ£R¿Yšöá©p¯çÕoˆ5³1ÎníÍ1;¯7äó=×qôîõrŒM£Úér Ö+•‘´E!•©Î¿3µe8¯Á_՛âh^Ú ¬ 2wS®›9ÝÛ¬ÞÜ9#þ‡Y}¸ #<@ÍÆxTªg¼Õâñýž”üĨÁٞZӞ"†Í†á4ÀóH{5ÓÆÍîë¯þ°ÆšD3/záYÌ- fîÙoëޟ½à0K¶endstream -endobj -1712 0 obj<>/XObject<<>>>>>>endobj -1713 0 obj<>stream -xµVÛnã6|÷W`û±,_âKß²IØiì¢}(ÐesW"µ$e¯ÿ~çPRœh] 6¹Ú&y.sf†úÚRŒï!ÍF4žRRôâ(¦«Ñ4Ñd>Ãë~­¤,,Œã«h~naO~<ñqÝÜÅ´ u†Ó9^¤„øqLëäâïëϽ˜úÃ!×éÅ››­Ò$*¿#Sze´È‰hP9;ÈÕfàdRY參_–«ëA)Šç/vs9 ÉÛãs¦¬óÏ¥p®¹ü‘SßÄF¡øz‡ÚßIû.‘»µ'‰©´?Aÿ_€ï"ÝVûc9é¸ðSêbrŒMÿ_°3ìÜMh8¬‰ÝM™¿K¹3$ÒT¦$:g(WZ’È,ˆp–7gj[Yô}rù_ğ†¬ƒ» g ãI8¦}R…ò!ZÐä[ÔfQÀí¯ -Ú ØtUl€@ÈOg9­Bÿп• ¨•¹åì¥ Ü¥$íL) X,$¦|0«Ì°®»­F½dˏd4þˆ½P¹àq` …OJWß.iera±Ÿ±]>-ÿ¹¤EÓÀ֝—…»5ü. \ë_ü©"TþÃA°ÞDZ/—PHDt‡\•ìðâqËÔPxù’…•_+…Ó<®›N÷pS+À ÌË “¯›£ºªä aۃ +i÷*ÁÿƒòHÏ=?æÕvËÀt²\ÃÈ1­–N÷&­réZL"Zï~6£b´ -Ãݚ¢ù@†‡ÕªŽ}O[ÐÓI#°}K>ø½Ô©±µwI£Ðþ,šq§Õ×Ì?£éŒ8ĉŒa½? l\*@=ŽñRs@1kzZÞ¤C*•†Úµñ؞BÚùÖàrÚh7g¶˜T–(a‚h:eÅÀstuØ)YiÎ -JWœ&Œw Y–`0qRjÚ_\ƒ–œõÈ3OU–©¤Ê1"ƒ™'Ì|žV'Ûë–Ød°¹i£í–TM†LáÐ6S®¶ž’ç‹Úð61ÖV¥Gµ¨3…ËXs”icoaouõ¯°µ ÜÔÚtLÉÆé³/qà… ãíÅ6ZÍ5Óê‚àí_àyÁ¾x¸œ|Utñ`k´ -h4fÊF×à¹a¨ÔÀ"5ü0–Kl­9«4„-0­’¡äŠooø¥d¤y‹a£÷WX´ÎÙÍ£á‚ú“ÆaŸ³ˆnŒNòŠî-añÔ4j62_[°j·á"kGç²Pw+ó3ú½<‰—ÎËÖ¥Ó™@TkJ«„—t¯kœÉ<==ÞsßÁÉ÷,ˆÜŸØ+ÈÄIQÀ˜Q^nÙ%1Èìæ„y'kj -6FpˆšÁuÓì&ìyŽ•€ ÈGbª¸³ª0eVã!RXÂð‘U&ÆÁø2²•lT¨o²Ûp -ó . ¥g–5ž73œâYy>¦É"ܾ«ëû×ôhÍg\²tk’ª€†n¹«~»½?‹ù¡øâìm9™Î£éՏμ#^ðÉß×½?zß~²ÄNendstream -endobj -1714 0 obj<>/XObject<<>>>>/Annots 1005 0 R>>endobj -1715 0 obj<>stream -x•WßoÛ6~Ï_qØK] ‘#DZ—]Ú´Ãæ´k<úš¢m.’è‰T\ÿ÷ûî(ɊŠ+ŠÆ¦IÞÏï¾;þ{–Ò%þ¥4ŸÐՌtqv™\â—îϧwg“é<™ÑUšâoÏI’6«œÎúkìNožïöÖ؝͓yÿno]Ðôò:¹êíö×ØMg¬·¿Æî,M®ûw{kìÎÉMoîÑäf‘LáOz•,š‹•­«kü6]ÌùþW†6g?¯ÎÆw74¹¤Õ›Í´Ê$PøEnwjLEé<¡.·úHKUª­)Lè‚Þ»ƒ'Ufôywô/Wÿˆ°t…]\M“ čp;Mèáèƒ)¢kšÓSJÓæô„óÓ”4.è³-3–¿ÏUظªðç´WU°ºÎU•)윇.ÏÝÁ–[¬ œÊÂ¯nӗp¿šŠ•Ë¶ñ’.±¬Uqsýå%Ù@ڜ÷v -ŽteT0¤(÷"scyc§\g´6l6ÙRôß¿]ýöá݇{ò;…à E™+”-šµ+CÓM•Ðk/wun9ª¹Ûz®“K®zÄwØ&êñ ³2qˆ]fI¸ça‚ –íÕ;Un „F•ÙZªãÀØ&×£ÖBé-MB«N‘âÀú¾4¸[¨LBƒÏù€±QR«b µÙ¨ö¦òçÕÛÊÕ{¹·ÉU,ø¤9;™ȀÃöz`¸ù:^r -Úhµœ k‘¾<¾Cé ªF·®ÜØmòñÃoq£…ÛH¢W¨#_ݚÒTˆ[cGH·sy#ñ¹ÀtöúlHÌW3}¡«æ±t‡’TÌnS>oqÇ!ç+d"¸¢X œ<àà¾rO6ƒ%.©Ãç‚uô´ÛÒx¬‚ÅÉÛ7PYʬ÷j¿7@à±èè`ÃNÒlnY­åÂóê@<¿Œ–ñ+m][©_^&tW¹b X»‚kXÄ^?1-PUVˆÀ›‚Se[*Ñ°ˆ IŸym´*¸ÂI-¾[¦°ô“ñ®®´¡_ûƶ*=˜pÅ?˜ê Y@LÙo®×ŒÞ]“±Y “gÜt”¸jUª…—ºË-ÆzIypââÕÇÊm+Uø‹W¯O±°O†V€Õ€÷F„hֈ’)îçPoY Y†‘äzOåÿ-„ûÕwKaÅ{sø_°™\¢¥2h™E–VWλMè÷¨ô¨®îåò¶¡NûS¨e–Q²b…85\j8{Âe\•9ڌ×*òðI]aÀDà%Å©5á µ6^ºÔ@­7º®l8&ôšŽ¢ÿ$¸ ŒÞ•¼|$oL!ÄêÖìȖ-whUƒr¹‚vÛj§Œ@©—4>T8´Ó>7_…oâÝÆÄʝbú$Œ’F)Á×z»;!_Þ¢µ°N)yV 2S„.»xŠàT•E–°³ bS—B*GØ–â¦-·=ԍÕfŽŸ d2ÅZUœ–†¨Ð„@´5Šž ©}øêcçºCçoíÎnwèâ*{²^5 W[Sb½€eN×Ì:QºzR6—‘ƒZè!L³&bŠìô G—ﱡ¨JnŸ1ÌBÆbJٍ÷«AÔ¦’¾§‹Álnò -ج¶Hu]¬X8ßÚ˜#¡r‚¤\-®dä Êͳf•{If×ç…{C‘1"8ÃDÄÒaÅA¥1–ă8ҁŠñ2:ùq@<0PšÝ@“6[Ú¹³ó“Á‡ÁC b¦ÅŀVÓáDšË[+ýxªÐnÿ­HX)—ùiGo“YÝÓë½)µ9ç„Gt/zã¼ÝAc?ü ŸÎÉìzVÅí4½dÉoWg¿Ÿý$þw£endstream -endobj -1716 0 obj<>/XObject<<>>>>>>endobj -1717 0 obj<>stream -x¥X]SÛÈ}çWô[œ[ @ŒÙ7–À&µ|݋·²{KU[cilÏ"Íx5#Œÿýžî‘,£§­$@diºûôéÓGü}4¦þŒé|B§SÊÊ£Q2¢éx”LèlvŽŸ'øWiZʧS¾ôΓOÉYÿƒŸçGÛ3i¾Déìœæ9!ÀhDól°5EA.˔7Ϊ¢Ø‘uÁdšÂÚؕ§l­ì -?ÑBeÏ®kr•Á5U×!ðmÉÇù_G#:™L‘À<|µ>à0¹yU¹zCW˜lG8-/tEKWÑ7c/^ùȍÁѸçàN£}B·Î=“³r -ß<£«Ïd,ÇÞ¯¦¤“ñ)€BÔ4 Î>M+íŸMHS«ƒÊKcÓáunB|´EcP›èÛÐT5ùe…Ñ6ÐbG¹«…>Á…ìEÿ0 9 c—ß¼u+rË%‰²R†ceÀ¨°K -¦Ô^>öZ“YJ3ÁÈ¿ð-¿Y j«‚F+ÑCOVëÜ3Ì ,‚XÒ/ºÚŇwšJ•¡ÛÜs¨öˆÿiïðæ‚Æè.³èät=>OÆÉ$¡«J+f‚$~§¬Πi¹ÛzºŸŸÑSØ¡ÀÇHƒShÿfSs0w”ñiL3â¦Ñ[¤6dÎ.Í*ÆoÏÐÎÕTÖ^ªÞÜÏéIW(· }]uüԐhÀüäX‰~Õý3·k“­ H›u®s¾áó­ ëXb ´¨žM÷§c¦p}sÕ3#`ÔzAš¯5&QÔÛL#Áƒ§ 1Èp{q´¯MPàf/12rÏÖ.£Ï®dæI?0lߥsSW˜ôê˜TÖ®^­Û)”†^|ê%™)Ëü2qîuä¶eTz91Œ9æBD†¸”- ÂÿQŠ³%øâ¶LÙcIbÉä¡eåÊ^‡åª¶P™ÍÆ»^hm¥žmÉìо€ýñàô¹w@“c mY:›@bzðÉÄk­LAh­ ïÜ ’>‚Ó/ڊְ$¢¿¬´aëè?üŪ£úoêEÊ~JS‰–¦ß+å¦Ò&`G{^o…z|ҪΟðR(X}™Bø ¤Út–‘½Å•jk¼NèÞaNUá]kQùÒŲV¥,™k“çÚ~èã>Gj´[ƒ'‰ðp Ô~#O8of/­G^R§”X^ hH•~lwM£Dt–ŒÚ¨­j^¿†Jeñˆsí÷3Ói„Q6bU©iøÚë;¨œ®ûC3RÝÓ÷áÌo¦ -w¼¾ó¨dÙ Ž@S%¢ðƒžnမ½¬„Œ’òÞe¨ät¹a|Z¥!Àòv´³¬#(¸YyÚê¢h™*=Ø8ï $Œèµ8ÛÂ)è¤0yñâïd^=,—èÙŹä·ÒAÖàf'KÙ6ÆÞ't uíp9îE-\&ºÊ$ùà‚ÿ¯+G—ìŒG‡YwéW¨zQ¦`ÁÔۄ£¤Ü™¬rÞ-ƒD–^ë3&³7KoœÐÿôŠOÞÑ\xžŒòJk Ñ·vGxYƒUûÜByàԔ*^K{h.¸[­4Ùº\ d¸‚Öh‘Â’`Tu€‚éÉ8U¬Ž|Z…Â{Ø`£Wg¸98„ž°Çx×ëîT™Ô­, h·îçWqÇ>>Ü -GÀD†®Â¡±Ñ6Þ¨±½¨ûy%? &Äg×æEÓ³Þї_¯ÿøóöáêòöϻ˫/_ﯥȍ†TX¶^µ ¦:3'HµÚçý1ž³ÝÁßg +ýp”Õ S¥KÁº`Y÷PÕ¢¦[ž<ÆÒbª”!ø{rДB¹wêëކ“Ô(~E¸Ã$~ݱ §]A2¹s^ª¹UšyÆÒ¬@œ˜äE«¹Ý´FÜÃ"ƒ—øëþŸ¹Àœ—õë ÕáY‰³«¸iDƒ‡†zíÏæ:“©¨ÇF¹:Ga;Ô¬±Ò„à%ºžE)bD¿ª˜úhô̑ôü§1„yÐÖXW0PÂþ‡ög¤:#8=ê-~›8™Ño¼jöžp·îç9?ß#~äcc Ï2v…¿zíz¬04a?l’þrO?K*…ƒaîs¯tã–7è^ÑÇp×Á‘k) VöA¼ tÁjŒ`£iý!‰iå;®$œD~t¤=cP²¢ Ódê4†¿ûq ÄÆ1H!k ä–7åFc,¾J°S¦`·¶EÙëy””הּӌu»^‹ì®eó¾Û!BÛ}ë.ó½c˜ê‹úSm¶@ÍÑãÝCÚyӎÊ4+çù~Ã˃8ôŽ<(ñƪã†ãe¾©6k( ¯¸ vÒ©…Šû´qNqn FËr÷²Ç]V@1D6p½_}»Õ°× +±9 x·Ϝ\á>hª *“ßÿˆ#J°5àƒš•-ôîÈå^Î6ԋ´ZXj Ö¼ØF/àae±*»rؼM }‰Ìv'/¯Q3¬€°p1«ö{vÒ ¸ú©ÇèZO+ ðb8m/{ÅI»['ølpËÍh ApÒêž8|›†Íx†ëüíÍ®oâwq÷ðþŽ­ù‚Ûݛ7Ît£c݁‹›ÑÛýeîÇ/òÓÙm6»žàø"8ž±ÍŸ—'¿Ÿüê¹j!endstream +endobj +1725 0 obj<>/XObject<<>>>>/Annots 1004 0 R>>endobj +1726 0 obj<>stream +xXQS7~çWì[È ؀!o%Ф´MBgèCf:òI¶w’#Ýaüïûíêξ2í08øNÒî~ûí·«|ßÑ1~Ft>¦“ •õÞqqLg'#|ž^œãsŒß`h./NÎNŠ‹—^ŒG“bü ^wŸßïÆgÅMNqhM㓋bÔ}«è‹XN‹I~ÐÛéÞÑ»Sh:‡·“‹sšj9ù˜¦åþu3ë4µÑDj–†T‹O×ØR5Ö;ª•S Sã ),[©×>èáóÛËd]cÂ\•†/_A5æõô~ï˜G'ˆoªÙ–öëH§l.D^èIÑ׏7SÜÄÆÔM—6’ª*^øl–W~}l¦ÛX«ri‡{³Üä £I-”u‘Plm£f•¡Û`k6tík¼£+ïšà«ÊöÄDÓyZ*§¢§r©ÜQ. [4à°ÓY°KõÈËL¿E=2ó¹)Ò6àŸjC@˜Aÿ¹Ý©ãIqÊ +Ö8Ò»¹]´1Í6´ +þÑjëüœÝ§¹­N† ‡'cAòaGï@Y!Ãþ‘iÊ£•ª }”Þô4Ù§¹d,ù¹œt=ÚR(¢š,Ò`¾·ˆ'cNAwà€Éž£ ¾·I2µÒ†àE«UÕsN©J×]W™ÑÊÎç­òþ!R»ê ÄÏÑ´¬™ë¥j¨öºe`„FJË +/ñ x¬/—¦|FÁúb¤Ôˆi¯}Ù²%]b‚Ö>äõŽ„+[Å"¹DÕ°ìB•¥€ µ§ÅYA_á”$ø}ð`ÏÍ5]Bs’èýˆ6Y3÷ŸEÖ²‘¡ F"jH1Ô,&Ä&ËòCмBTa5«íÜbë·ýÏ7×ß^' ÌÀÄY±²‹%‹†¶P‘À’Œô‰x®—µºT`(Ô-ŒÍXe…*}L¸w&7IÛ@».©QÕ&mύs°ØÛn–øcA7RÊ]Ê^Eº÷3^)³BHÂdñÓê­Wl”%…°*ª¤™ÙîÌD×­àR€±v D‰î+p‘âŠ{ÛPÏu™ëWY—Ûíc 6Ìhj[|ì6ú9,ÜýØØØ¿`¢¯7•+fnD¯±µ9`VؘÝфW;óÔ¤Ô"˜yðµœ!©•ÆD’+?4Igñ„ô°­/½Ÿq²œÙì^[4¬G1Sñ}pPö–wÜÒÿú‚Щú¸lº¦5E@À£­š˜’|Øw,æ¥ÀŒÙD°sº‹®€²ìB5ÔL¡!/M¥å55zFý㟔q]²«¡"ì¢ì«‡Êö˜³´V›ÿ‘IAŸ%(º’ dÁàG­N6.qr)¥žFâYbaœá F+/(·Ì"ǵÈÍ­]¡Æ¦ê–Ç+!Gƒìî‚Q‰ý1Ânk/¥\ê,er•": 0 ºB¾@d#7g;I<0' µdÌÀئeJÊXÔ ˜™àéW.À::P²NŠLÓsÜðéöúJêþ¤G=UåA‹µm–X•¹“–lx,ƒƒƒ“€æ›Ùœukn"Éæ€âk +†ëD¹¤‹Û 2£vóØCÑI¡ƒ¬Œ/Ά4uÖcó´Âl¤$qY8I'džm•34 Bf·ô5Ôëú!–ƒÍì¤pè…8öÂڈd’÷žr)þɸ˜›MeQkK…Þ@ yú¬ÅtÎÖu³Öm'Þa˜» +CƒMmútۦѤo0¬CŠØÒU7÷Êö4«7\Ш?pÑõ&C8ö»_:š‹©èó1ÿñKtjŃ æ8@+Ò¹›£¯ß>ÝM?uòDc$⠑¸üƒ¶á]ZªM,ƒ¡Î–~͆¦ÙÖ›’`q$¡uŽõ˺úJ$1ÇÛÁ8ÚÝ@²´`FÝø6ПֵO4óO(p9Ž÷•´5™z7¢äw¨+úÛK\Nù'øò tVŒ8@ ÒÃÁ¿€8ã-W¶†Pú“†þÈÌ7Ä$ƒ1Õhªþ ð9n·Ý•0 E+7Và^ª•\â@û]î^†Q¦úþv0h“ݽÕ—»fº„Ç᎚™M{ƈrq£}Ì¢­Txj¤Ü@.1$¡êA0‡äcàC]7+ŒX‘ÖM•7&øûM].ºKÙh‚ÿ8¸8¡Éä"UBZ}ü=_¯‡C0{xØo8>/XObject<<>>>>/Annots 1007 0 R>>endobj +1728 0 obj<>stream +x…XMsÛ6½ûWlOQf$ê˖äé¡ã¤q›É8vurñ$!5 ¨iUÿ¾o$M1N;™Ø–,vß¾}»ðßsšáßœÖ Z®().fь®f—ÑŠ.7kü¼ÀÿRӎ°µûò巋õu4§år-¨ ùl]7ŸrúzÑÿŒÕË«hÝ_í}Æêjmú«½ÏX½žEËÞ*{¸X^áë÷Òõ:ºþþÝöbz{Ió9mwvµYÓ6•Pf´MFÛÌxúýþÛöž2å)ÖÚÒ±4U…ï»Ò¤è͝þ®ªI¢mUšä té:©Ì³“wdvtr5) U{c÷¤¬«2]RjY­¸®7Ö@E¥L†$u\þë@BÞ¯½Ù[Ęø“¯4XØÇ ||¡œ)¹fû|aà+%—è{Á‡0AϔŽÆg Öãh§L‰jåM~z| öUzÏБþ™f«È¥.„œ9g…KûúÀŽ]„ÎG´eb{eÒ1(© +Næç-aõáæ×£Ð*©°¶Xv®«}bj-ùǀŸ¸<à§ØH ™ö¨2å»9OrÈa/Å×-ŒÉbͯi"ÊÌWÑU´ˆè‹þ»6¥Àî)ú%Ä3jR$lT²ˆ%Îî̾º\ œ! 8>–¤.Kdé!‰¢A9èÝÍûOôqK>üt~ï¨áÄ erfáiŠÆ3º"G/:1¢X%OT¤ƒåES£©®’éAQZqAàJè +O$³ò?ðJŠÒ¾©H¯ })Šbç*–ɧïü¹»ùôaàûýçôùþÛà +ð»U¸;íE¦¹¡&púÌ=% +‚¢ž µdC1ÿQF§cN KÊ…À?1Ï •dÆêÀ×7žŽÙVNàQYQiÔ¿jÌHx‚,ª*ؽbŒÍ³³¸…Œõç@ïR{ ªƒÀÀÑ£¥}}—‰–t!}¸p!càJ³7Våä+.jüêDG à@Ó¹öºB³«EÖ¡;|RHˆ|{‡#úyòø¶¹ª~‹{rX÷AG=“Ê$àqÔþj‰®‹ÑEn³0øøvŒº?$¯¡},]µ•î‡U8ccT}J©Ò…³R=I{ÈQô,¸;`ØD,ý"\~Ô1H°gÆhî"' Qá´R’;”CÕ8Z˜²dÅ5@‰ê¬ ;;@7uG›»Væ5út]&¨`¤±õ±CZč”~ ­,4.΍ŠMnªV­ÀÞÆŸA €èÀ"ánjÛQç9?8®4“è¼°—ѾL¢E‰zØJ÷lR$4nƅ€ICÀ±ˆìãè×û½vÐ{ÁÈw£% ÐÃ=f!Ì|¹ÀtÅò$(ӐVâ v˜^BF™ñl_rÑöΠ–qVìÃ%œ›¸T¥"@¡Î^¿;tˈn‘>(o Ã[ÓG=úÝ:š»ü*›h& ¨p¡.gzەîŸÌ¢õåd±+]ͅkb&ܪó +¡@OÌ0 ™Î»:—–”ó¸ˆñɓâLõ³Î݁Û7xš<ªž ó'dë\ ûÛ®,ça蓆µ„rÁM.'Œu\Î÷uu «¨´­wÜGª+Uò&$Nz ’œ@NŒ£'ƒÜnÇԖP¹0BÚjEÂjkùÞ&_BULZô©9Î^ô( cÁ¯«VòÈqÓw:ä›fñ²Ç¾²‡«gh«“óØGʇ[c žâ‚ïϱFKÛdƃÁˆ¹•{é#¾f|vï>ª˜ÚT•©^“mÀ@ÖÀR”Ú13IF¾>`pwô ÃnÜ¡ÒëÆáýŸ©¾Ad9!,?\[M6¯— Ìyu䁤ULa`j‰.rVÐ%H› +ˆvU3­}9Åà;ºËI»³ç›œ)”í˓mD¨ ©}Æ ·G„7·Šk“³.‰ª£hÑӚØ&R2m]!aPÔ^ê´êöM&ož61]?bkF)(™ˆ±<4Š •µÀ'.<€0¦³I¹CfÆTœš<HÒÌøòþ„ ±dã¯+ ?@žwÿ—TЗ‡;–Ñ ‚é-”£y óÄ+ÏÅF9æ½o¦Ö0Ÿ´1 Úçùei›[€v>í2SÂÙ0ývž<‡IÄëïJ³Ï*dìKQx°²3¥´‚Rs郗g3^ØÈüH É÷^aMõA[y‚ÕHÏ1ÓÈ¢¼ø`W•¸÷Ù¸Ú³® ™8×_eTäåG¦·› ù +Ù,iµÚ„wa ÝCéþÂ$ŒÞz"{7iLÖ³k~üèq ƒ««þDÁ›æ>üa{ñÇÅ¿ qìendstream +endobj +1729 0 obj<>/XObject<<>>>>/Annots 1014 0 R>>endobj +1730 0 obj<>stream +xW]oÛ6}÷¯¸@ê¢1eɎ£ۀt]‹>´Ý¿­Ã@I”͆=RŠ`?~÷òÖíx]“ Ž-’çžûu.ý÷(…)þ¦p•Ále3š²)\æ—ø:ϯð5Ã?# v iž>º€l^~7Êfs6ƒ4ËX d×)›‡O +nGÁ^úµ4Íqû°[š¥,ÃcùO¹÷´òz9JÞNá–5ò]äø¦rF§°,ÇFëîًåܓú=³ OãZ5æ}§KÝÖ~9@LÜú$¢uÜó_ç~' T‚·OE0 ¹b%/×â©0,ñ(½y2ùòTó.²µWÊc`RSÊGf¶ P.×ÒÂV*uÅT¢æ½ê. „Û›¯oðDbœôÖ$J—\%–7?´0fp+tk ÇÃ¥Òe߈¶ãÔ-ÈtOç¦0IgXCÈfËÛ:}dÞêFl×ËZ(+¼ïcàÊj(z©*gj+ÛB¶Uâ«(ûŽJo+P²0ÜHa™gyâ€v³Ëí¦ vɐƒŸ]æ1gÁã4l·ÖneW®Ù¾8#Ðؙ!o…½ÉøEjw±ß­•@/4˜¾%gü¹Ëh<W‡xc¨¸h0˜ÝÚè~µ†HÒ\½ 7Òc#®4°1z#  O©¤´Ø °ÚA™qå2 =è»=µrŒù*H¬îM)’H#ÁÐãû¿BX¦‹:1ÀïSZëÓ&;ô¢Öró@®¸‚¦ ×Z)+°M¡•,1’íݫZ˜XGç ËÓÇ,;Ëü¦­¨i\–Ü +Ð5Üb*­VXzöiÜ\Éâ”øö{l‰¥‡a˜¥8¦W^[͟ šÄ½»v®ðòsªçl¹þßrKRÓèJÖáF ÛRõ•¿©íÇjÔ°¾?VJ\ý V”tGØUå±lčÑàP~`ŒýôØÂ3„¥ìulX´IBªÚbF±ªº5<ùü‹؛OnÞ|— 0»Ú QZ„Ôîš3†á%íœ ·:ÍzF† —6*It:ŪÌ½©±,)²è"9Ĉæ€ðɐC˜¸ãô(y›‡kT:Çï\ù W ÿ%Æ_Š5ú †Þ /ǎlºÀ/^x`r5¥oOñŽ +KaI¼±”ðÕ§ÞÉÒ|‘³Åe´izM¿,G¿þPGdendstream +endobj +1731 0 obj<>/XObject<<>>>>/Annots 1025 0 R>>endobj +1732 0 obj<>stream +x­VkoÛ6ýž_q×¢ˆ‹Å²¬ØŽ`’&)2 M·¸(ô -ѶR‰TI)žýøKR¶«$Š.ÃÉû8÷ÜÃûõ`H1~‡t’Ðñ„Òò Žb¼Ù~üõö 9‰bšœœD •4D£ðPÐ]X£ ֆÉ{&îi·8ES·xŠM÷´[LŽÕáð˜Íº§Ýâ0ÁK˜>éžxÁÑ$>ÆçhÊ¡%ø7’naïÓîÂÅì`pÓ)ÍHv2ŗÌåÓ,íÿ¼¤ÆJZ晥…Ñì?TkJܗ…6”éR䊖F7•}=»GòÔÆp7Ëzë\Ís•±^êÑoÞDߝçWýýíÁ§( +½&©šRQçZ‘^Pk +K‚~×%çè Š=o¤û?ÏíݙÛÛüTxËüAvÃÔ¢ »’EAŸ{ZRRf2£|AõJnh%pª–…’5‰4•Ö~~݅«–eUˆZÒJ—2ËM‹Ù€Ÿ@@ՃW—ƒWya/í9Àö ̅]ñ‹Áõ) ‡\j—RâÊ3œDã‹è"Nº;wqN€íA.4¿ûpù&”Ù[Kˆ aâ£ÐWªæýؼÐ\½\-)ÕeÉu‚•R|Aò]ó÷­Óƒ#Z¯¤‘ޏ~ztyûîüæý·Þ{”[gS‰Ò`@¸qø²Ñ¡O Ÿ^ۖ¤ˆ¦kù<+s•ÛDÓïÁu›žs Ú³L%§QHÐowŠÉP™ü!/äRZò0²—½p|DÞ7tÅÕa=£uýÒ¯Ž·9k…NE1°¢œ‹—“Ùã`ëß¹²ô?Òw2Øs1ø•Ñ’0ÒVZ¡¯CyÛ:ٕnŠŒæòŒ^0@^.™¾‹Û“yñƒÕãu òv‰kðjyËÉL=ÛoÇÝÕÂÔÔT.Ò eB–P G>ikÊë_|ümi÷€¹zªn 9›#æ -¼ªv¼ÕY¾Øx.ÙrN–ÝÁ›MM^¹¢©!€uŽ2¡çsõ Ó;ÁtÒË}¿i@l¨‚YË*ڏÝѼáЙ敶6Ÿ¾dœ‘ÆÒ}ƒ/\¡à +»ŒSËEnlÑLûxO×{enóRt±}¾Áw&虇ð§èۂòl5>ùÈ2J…"…[@V“i7Öa†:µÅ-u&‘ä +ð¸š9\¼!'Lw–Yiy„‰Qñ[…²kÙe +ˆÖøÚÞpÛ1¶©HWò07–UŒu­í¨¦´È ½'_STSe¬ç[KG'“‚À«Ù`—ðõ¡²Ð¸{‡¸L"4û¨)–’ÉRsîNqnHºá+¦¦Iׂàߺé8g¨¥L¯.À4‡¥,ã¬û‡Å( ÿ'+¨ñ,1nKpa-6ha„ÒyæR+rî·pÃ؉2ÖA€ ßËhLB!‹(úA®,õ…¤1lȪm´p‰>/XObject<<>>>>>>endobj +1734 0 obj<>stream +x½VmoâFþί¥Hp:°1BN:UIwQ/n«J÷e±×°‰½Ëí®Ã¡þùÎîÚ@À JU„½³óö<óò½@?\u¡7€(«u¼ôº}oýáþî⿤ÔnÚ?îÀ5„ Þ ñG (Ýé@5ïî'ïŸu›ÄïÂçZÚAÇ¢€}ÿ"çz¡+BõÀ5•œêß•FÀ÷!œ‰vw`4Læ¯Lä*Ý´à–ä•'!Û@,2Â84Ðx7ïœR(išñ9ÃEWD-¬4)h¼ox…w݁×7Fÿ9D„£ÐK -ÒL²P—wÔZ!*à0®†·uÖë¿k 8<¬Ñ֞ —Z•ÝÀtÔ_ÅW,úàò˜h]"­ ½Yօ´E‚‘p¯Ž«…)LâQ•BoÿÖwÁuqË!W”ãkǼwíÖéìÖÝÓ^;'£Ñë–;³RŒV§³pg; D„€ÎlÜÚ1÷íܨ -â‡\ññFgCÌ=e’ºb£ÅzÄÃÕ1ÒAÃÞõòžÈ°¬ÔL{f« ÄÞ'ŽM.¦ ®aȚ¡a½Ž «³½Ð€eDCúý±µ²PZµÃz¯·\Qw -És{eÀ -•ËëŒ6aÛ¤‡||3Ûo4–½*£àÒÀi Šºziej ÂÐ3l`Re¬+^ê•÷¢‡Å ó·ØE?Ä/= ¿ŒecÁ®’G!7KDÇATd ûô-5«Žñ0¼a±t‰ÛÙÊ·g”ŒvÔ¦ýȵPÍÁbX·KtϔqN¡µíh2ÛΎŠ4&tÞ¬§ž €|¿-Ãß{hþ"/œqï<,þ‚Ýñ°¿<>€eq§ÆYkü”_-ȎWNº†T¹ -˜,* ¾·ê ËȯÓÐQô-+¡Â!ņî2H(Ç;lp$ÓDG~’qØoºH£Å3p·£Ï.«¹“ßA N:سô#ÈW<grÃǛL2ŠÞÕ°éºäå -o%× -t‰Ëâ)¨*`jmÍø^Ú^?Tû&¿]YYâÝ®ÀNÖÀìKõŒÿïw3¦û­Æ*$ÞÇ[^}­fÉ"Š_Þm»{{ÁMÆ{zGqjäuÖ¼ù×)³SšNgɌ_@Ÿ.ï~¾¤ÇÊ1sö8îßÚNÚNÎG|ÿ¿}>Càé§ ^«ù°ñ˜+¸žý÷è¦sӇendstream -endobj -1718 0 obj<>/XObject<>>>>>endobj -1719 0 obj<>stream -xµXÛnI}ÏW”xJ${âKp H!@„–8v‘òҙiÛMf¦‡îï×ï©êñmí®VZ¡'}©ªS§NUûçQŸzøקó G”G½¤GgÃq2¢³ñ9>ðã4͎~Rÿ<Äíü¡ŸŒ©?áN~쿤w–>ËùW½äeûøÛéÑé‡3ê÷i:Ã%£ñ9M3‚µ^¦éñ]èâA»×4™žQes“®hfríIÁ|© -ÑÉô.»rÉñdzi˙™'·7ŸâÒúþcRe&}°'MIa¡ÉYÈÎäóäýôÓÍṎ́üø|ºý!â™fÇ6îÏl¡p4µep6ϵó ]Ðï¦Ììҋ§µ×Žt°DŠø7vµƒÏ•ò~i܀+^ç: ^ 7—ò¾–Õ`i¹0éB¶åv/–&ÏI… ‹*փzÔTå*Õ ½«)ç;›+gSí£•47p‹ -•.L‰ÈµÊd¡erCÁ›fÎÏD $ªe0© -lÿÒ®C…ÍÌÌ [ snS•ÃäÜøàV-‹¿T^sVÓàˆÿˆ -‡¼|£¹2^¼IšÃƒQrÆyYC?ø®no"7`TÑ*Ô Š| Mz%éŸÜLiŸûiïS0î-'ÌP-o7{½§]ZÜ¿ø" 旦wÆ!Ó.™€¬Ï$ýŸÝÚÙ;«"3º?SZ杮P *èìþ„~Ù¼.4Û”æ;ï¾ß}»ùD3›gÚqØ ›üÂþUN{æ2‡#tà`$bËâק°!Ȅ… -ÿ>dØÞqrîl]­±ãëQR@üþøêöòþ¤Ó²ÏÕ¡ýÙ-(ºµ± X,íAG6îÙçBʁgË*;3½?9¤[XH™ÇjŠ÷íˆC•%IÖO:­‘)ª+ nË„ (€²˜ãÏ\Ĉ¯Ôêð˜Ðõ]˗CÊq]± -5®* hP$„¡Ÿ¨»-ƒ¦øa_´¯qøs –øª×UËèýñZ)|¥S”r*ëø¶%J^¼¹Cþ íòÞŒŠ¾$ô±ü‡h}XåH}TÿB•jŽ¶ †káЩuÒB­èÚQ?ü@Õ±@ªrEeÍ­Bß -äK!eàÔ°S©z€=)¼µ—ˆ¸±AòÂÒf–jŠ»'Se…)Yì*_¼È½eEk9€†&ÂB³äà֔h_Bã,럵Rrð©ªÔƒÉMX‘~‚¦ÐÐr/é–ÂàÓ¯6¶;GéD÷î'CüÐÅÖ[ÃLqGƒ¢Þ2îà;½Û«»kõýXúÀlljگ[O°6_Wà Œ»vñ¶½Ï 0yÑaÊR4ÀšÆÞtœXAœ“nÜ+9-| Á.ÈƖø)*ËŽ‰9ƒ÷]›ÔYog®·lº´¥Ç]°|} "_ªªkʖM”.¤”SüšW0mp¸B Ç*Þ«ÕSúã–À׺=¨ÜqÉußÜ:;wªðÝ7’o˜/Ü3¦€°…ºL0-â!¼ãk·7ØèûW4gT`¹„\@šœÁWž~HztϓqS\zî£óÆõõ %뛸ïdŠš!l·n®Jó'"±%º~]JNo¾Xé+[ƒ°CmÒÓáJ´êùBÔ)}ä5[EiÍ C?aa\g\]܊¬Ô{§™«Ä#è_¥]`­4à_Sÿ1҉]R®Aˆ'ÜkfŸ+édR&+LbM ‡'zÉëèÈ« -ê ãkã<+ÿ²#˜ÍãnD -:2úÿˆ€«‘=cÀ¹ u™jA%[y¸¦3T/JQÉ­g]Áܞ?ÃVœþ«mµ\ ¢&B$ózÍ´gá©ø¿ØÚ8Í2bs÷Ìó8£ß°Ú4Çwd–ËfÝË1”Cw°S°…íBa§¢g!ŸA—6;ô€qŒ'M~m Ò—Nâüå ¤z«—Ü~v©e؅¸4°ÉµÏ™åý Ÿ†ŸéB•síF±ŗ×å®- ‚x6q|ÊÙ¬Æ0Ï%ƒ†>5.àÚ¸Û -UÂãüez†v$ošê X†8 öA¯,<àîåSTÃx~ÌlŠ)Sšœô&&ƒð™¨3V±–í-m•ò咳(u(^™—fÚñ› wñ†­D¯Ñø¢½­þ då’GaÄ Ý¤u®\Ë4RÂ9å®ï֐ -cƒdÐ냉±¡¼ëÀ“M4à×çž9æ!‚ÊðoÛØæ``—&zç a4«%`i{pGpØ¢È²Ã—²Œyeí1;ó„7O@\r`}{ÿå;ôÝéY3þywç™ÊŠÁ%"‰«@OÇÙµ„ns­°„³Y0«V9w9G›™­ö˜¹Z›[ -áC#xù˼v–ŒÇõð=ÀpȂpwqýö‚Ðêd {·K&ñ¾?· -ã!uÏ{¯x3–Ð% Ï\Ò¬ù—mB#<·;#ÊÙßR¼äo$øšþ€¯?=ú|ôk4mMendstream -endobj -1720 0 obj<>/XObject<>>>>>endobj -1721 0 obj<>stream -x•WaoÛ6ýî_q ÔlŒÛ°K×­ÅZ¯m\l@=´DY\$Ò©¸ù÷{GJ¶ãtk— €,É»wï½c>÷bá7¦YBã)¥Uï3ų( où!Žæ4Í#ÿåÅ«xJ?z×E#šL§Ñ%Mæ3<'ø«%å_]?Æú˜7ÇúËÃúd>®N×óÆÓ8Ÿ¾¿^ö.~¹¢dDËÙMgsZf„èÞ¤ýç…Ø:YS<èmmrUJz#´ØÈJj÷lù·_ÏÂêáx‚Ò–YáqD”Þt mŸRsx’DÉ(¦arÆ~Õâ÷å‹'!hÒõ÷›lÃé–l³ÝšÚ‘²”©<—5¡ÜÔô‡ÒW’Ð?-–ï4ìNðçfýk‰`‰µ6m¬åü -³#g(5:W›ßÕmâݙRþ¼Æʼ)9ÖJ闝œIi©Ž¯tDÃxàPÕ¶ô€‘+¤E;¥p8Çú—L£ §vk÷À(EÐBºVÖ¿J÷JçløÜHë8 l† úýÁ§ÄK¼A’õSK]îTšT8etD/ÍN"xÀa ÎQ†Hfk4Rˌ´¤£BÜ1¦òØ -´µpòñƔ+Yf2º¼?Π0ò+D-#ZhW%…¶ˆž8G§‡º÷cÊ´®V©“׶–Ü'¥mŸ©Z¦ÎÔ÷_r±ìÚqåÍOo^›ÑôþíóËí -•L'R¬„¾UY´^§e“ñùG ø’™¹àdòã|»ò±g4“¸‹ú>z³tcP‡¥;Å=‹¼ø ? š™%à𼥶'ÂC…1ý ߬¿«[iaåxß~¾ac¾ê`c篃ŸD<Ғ}×[ ӜiwéÆÿN•%eS¸rÀ$€^ÕcXºQ³ÞÏ@¦³ßÈgqxÍ.#³¶elû´`Ô®hxèÝr'pFE…Ê2©WÏN§êƒvÌ ðeœž‚l °g×SòY‹TdŽ!D¦‚ɇÔDwïáÌ}ýÜkY™;Žgî!gëš>/XObject<>>>>>endobj -1723 0 obj<>stream -xWkoÛ8üž_±0pp -تí8¯Å¡½\âúD]ôuQÐe³‘H•¤â菿YR´¥=—Àˆ#‰ÜÝÙÙáèëє&øÒùŒNÎ(¯¾Òô<›Å«üeš]Ðéùi6ᛟOOéÊÐÛ£ .œžÍ³Kš_œãû +©Š‰Nè2å9ϸÜãýÖô˜–øùí>ï—Ë,åœÂLïn;Xžå¥w!™Í²ÙdJÀ%›Ÿ„<ŸÓFÜHÒÆS¾‘ùµ,h»ž†Zzj¤‡\è -¼P6 ßn¤¾‹‚r  Gbendƒ¦fŽSԓ³ìb†Ö±›óÐÍÂl¡¥obSèôms7kÀù# NËR©¬óÀ)͙Ý^#â>q‹Ã£ÙՓ!ÅÜJáe1 -y2çLU 34xçXñRêv0Jøvm\IwíM3Ñ®ÑN×uý•ôcŠAF‹P…²2÷Æ*ÅüDÊRn´TÚªª¢•¤ZÚ5ƒ¬Ð2N³2¹¨zQoè T±Fù£år+\.÷ f(4(Ƹvåä×Ñ¥p×Ì]ŽSÀ… ùviMMR䛌0½à!Q-֛À^ýq]™•¨>‘ixÐZcQ´urâÓ­t ’ÛÄ »3ÎJxÚIí”WXü¸\›Ah§Eg8~-”öø J£¼¨¨Â8rÓp)„Ê[Œ)þú–L*íÐIý ld -Å[ †-Ð"„{„hZÄÕòí¡ƒNÈRZ©s‰ñ}^Ò-td«úfHjˆG.ÁFf>"<<Ρ)ØKÙ^…wCGˆmöòÉ+ð¬)$ -Áºš¶VyìŸ#ºãˆ~s¾¡ ˆî®¢×:d½€SÀ–o”–#Zca‘ôÖTôFhYÑwüunkl‰êdâ†-Þ£ð4‰*Væ‘ïöŠ`,¸ÊhÉ vֈšévE†Ý8ÿ׍hÕzÈ}†Ö|f¨Í6ÄÌMÝ´è)'jåÊ -Cē˜N3âpåÿ׌qEÉרþ îAü_ªÜgJOÝmGß9Òø@ÉQÀž ¾0k9¤ A¼2LÓa=5\ yñ,£ Ô«jao k°Mî3軟¶ÝCu[x…™ÿ% ígÃñì”Ƨ³xz¼×ý0½JÐð4t4î-h¥p8®Yb"# 8¹D5wf&z’©(4Â]ã¬HU¤.²•‰é)qìivŸ:Ì8HãÊ| ÇP¸¬?#“¨# Éäý u^Š‚súÒºþÀ÷–}×oÉÂË]w¢^±2îÐ͸% \Ãöqƃ6ݺ֠Oü¦œÒ°’ÂbÃx”ƒ9ùD‹-µW9Ÿêøb<º x\v\êSF!.°cŸï…JÞg_>…"È18->/:PûM{nœBúؤ•„‘qmÐö²­ª[º•*¢=aD/wZËV|ìÔá$ -‰xx·-”õ~ ì60@+‰•0rœ/¸åÂ×Ò¡æØ -røTÐ^ú~ïâ þ´Âƒ¼£‡ój¢¶Aþã)¢¥… pˆ·UÁ#-Vðk|ŠÄ@¿°›º2y[Cvï¥ã´d|>Ák_÷ô+o´ó³ ÄàWk^53 .ŽÞý à#jendstream -endobj -1724 0 obj<>/XObject<<>>>>>>endobj -1725 0 obj<>stream -x•WÑnÛH|÷W4ô²6 ђlËvޜ8¹5.öú6Ú5QŒÈ‘8ÉÑΐ’õ÷WÝáde¸Ã" YšawWUW7ÿ:ÑÿèzLJ˓a2¤ñø:¹¤Ë›kþŒNÓâäýôäüÓ%F4]àÊä暦áøpHÓôôaA;ÛP®6šJ•iªsܲE¦§sZ˜B{G4ׅÝÆÀ‘¥f¶ÎA„èJ¿ÖÌ8ª„û ïsðÝฒ°;R .9ISQoaä³0Îãˆ)uOBÁƒXª©| µ‘]^m*èQî~åbú´VÞo­Ëú”ÙR™êeF!~Aݞ´OÕZËӐ>¤žŽb\ñg§B×=;½Ô™©ý*ZZ:UQ¤]!÷wG„üúϏÿþþù·wŸ¿?Þ}øõáéãlöbªÌnýlö¡qÔþ ]@&³Ùsçgãë£Ç0U‚ÝwpÍAº ”?‚:² öϪÎzbÉ3±QD|BXZéÍN ³ÒèU´Í\sÄÁAߥïf³mÌ´)rfT+UêÙYÛΙ.t…z_² ½÷W=g’eTNäñëÇW´p8¶Då<#lÝ·Ž”ÛqP÷8ðrþiÒº”04¼J&ÌÚËÝïOOÿà:ö>vJÔ˜4ôŒDYa?‚»~+R… ùÜa9³S?ÆíÿƒMyñŠ’1vÁSÙkLÉ&£ªºµSKp -㺖ë¦j%;O _+Wë& ÿÿ‡å¾-°T+FHÑ\¥«fÍr^¢¸={üQXnÝJëLg³³@ÀˆÜNÙD·26P½XÀØø‰ìțÈG°œÙé~€ä&Ëà)~:J =; º¿›¶ôw”M«Ó=â[[iƒQÁñC ^kn½>õ*]çÖfüq^Ošº‡çq‹û^œt&¯oÃxºØ{E”©×Ê¡%£‰µ¦š<¿|îÜhÀ¦Êµ3¤Qk÷¦t|Ûd0.¸3ªË}ð(XÀay1º½¢´0°Œ··¯~¾½do£œ¨ Îá^kê!¤ÉßôXš©3s¨UÍíFìmñÀ‡„¹³ÂÚ¡×ÈOwOŽCàú²?IÒéà']9±øI¨h0¾¢ÁÅm°ŒDŒy҅‡€•)0øLÅ#Ë(ÅÀËô¼Yò¡Bop28b½Õà…(a4 6Žì‰‡BÝéŠç¦Si7 Žäè者—®³¦\ó]¨­´Ϗƒ¹Áw»ƒ]ÀKuÍt8ÛUšòð‚qcDÅsԍ7@ŠM ”ÎÚ¶;Àp™M`6¢JYäºØ˜ß¨Zäø%áóO·4ÂÄËëàbFÆè&%z;s9…ëVhô#—.“!GÞÏ Æ›÷ÞSYhTØf ‹7ý¿¼™ðÄ~Úï/²út9¹I&Wãö-d$¯Â§'ÿ:ù ï$gendstream -endobj -1726 0 obj<>/XObject<>>>>>endobj -1727 0 obj<>stream -x¥WßOÛH~ç¯ñ*'! ¼Q(*ª ô’ªW‰—½N\l¯»»&ä¿¿oÆv¾r=Ý ]Ï|óÍ7?üó ¤¾Bši4¡(?:‚gS|âÛjJä`|v†?q0<; Æ݃ŸNƒaí€?Œ¦°ŽÆ8ê߄§teèËÁûÅAÿzLaH‹·'³)-bÁ€Ñѝñë´X‘*K­¬#oh©ÉycuLiA~­)¸¿šSœZáßÛcRŽ¼£²²¥qšRGQe­.|¶¥ªx,̦Þ-~ èd8ôE|ôÝT©‚*Üg›ó­ó:§KSxk2ºW…ÎØydÊ-)ÊL¤2*­IÒL.üÓ©|‰ŸÚ>iKGNkº[ÐG•¸Ñ^vçÀÖ8G ÎPeÆU©–l/¡$µvU -šÈ~äÅ­Oa¬‰ü—(cikª‡w-I A²›Žó¼À$¨]+l*gÏw Paƒ«‹‡Ýüu{qG¾²¸¬ÚxE‚ÏÁºbþ«î²Ë8"j³Û‡À]º*Ò$÷¾Æ+8óÊyN4Xΐè=0ÆG¨èÅccî¸Ù hÁÓ¿>£Éf™ŒÂ:ïá,ƒI@ßÒ"6Oýá`ðLsÉ"ÜWçɐÕy„pP_4êdÉ´“+u”&[m±¥RùuM-fé#Ê ð™‘d¬0Ù®×ㄠ-«qS³ÕNd‘©²¸õT[ߧõ¥B •×º<&渀*ß¾o‹²q@Ä¥ÖHg·´]U–Æ¢ÀtÙm鑠R9·16v¿azÐ|­DÚ÷uñ8¤Ùo´.èÛÙsÿVKõÞ-ƒ†þŸ÷³Î Qî|´&Ác¬Ý#g¢‘Äžõ&Á¨M'rGúî>/ øÈ䨁XÇ]uŸVȳ*:4è'“=q~˵. že–Ñsv>9Á™òàwç Ðnç;•EYŠªCÅ1%Z¡¤tCz®¶\QÚ&XÇï&…”Ðñðï,z—h&[QZ¡=‰WD¬sU#þ<}~N¸ tý"LHcµâ˜M’ Ø. .ì½øXŒ&‹Täh+8nØAEx<‡j@ÐƦ¾jZÔr¯“¾´Ô¬MÀ3P¡7/ "WežÑ¡/fƹ}û¦ß´áˆÄ.×]'\D -HéJÁœÎñ¼vù*Þn»»I¤à)<Æƨd_Œ ̯¬§[]TÔßÉN|Õe UçYÇ(0¶P74+ÖtU¹ë&¬>Üʱn«._yP °Fq­yî¶b—”)é_Oš±|ÄÙ#ÜËê“v`±ð}yÊè\~ƒ§µzbfxhÏ#¯wf97Ma!AýâœÑ{-íRf×ÝÞtàááÚé(D7,0´ývâôöd˜íO¿Ž‡×™_Y­¾*€Œ13ùhg*iú”zàI  €s –!Sg4º¼|lƋ¢ŸU=ÒªJc}Îα¦íV–ϳcÅâ•ÉY¬Íº’i I›®ÖžÐi`¹ëÝnqœ—2ߌèÌx«`¼^-ѲPe>/XObject<>>>>>endobj -1729 0 obj<>stream -x¥W]oÚJ}ϯõ…T Ò7š¤·(!Mƒ{s+Yª{ml¯ë]Jù÷÷Ìú‚UjU¥qìõ|œ9gfüã¤G]üëÑȧþ¢ô¤ëui8z> Æ#\ûø)$-݃óqÏ¿ø ×ùÁ`pþò|î ŽMý Þž]H|ÑáåûDdgÓÞ9]iú|ò>89û0 ^‚%Ç# -bBäÝ.Ñé$zKv-I,ôO¯ ’?e±£¼ÐK•HÚé eRÆd5¥jU+½·Áw˜½hÌvü1" âÓÞØCø¡¹Š%-DAwÚJS¾°£ã˾ºYëM“^X¡2Ë|zEzÉ®ñ~0 X§x䟎DF#ɤ‹\³uÅï)ãу¸tRËŪŒµKÃGe×4éBtúWP$ùZP¤.§ÊæUšëÂâIâní# Ez“YƒT¶rŽ2iɈÔ첈Ri×:vðÀ% -í3("£­Ø5ö é2uéÕ0i-L8+á¿« -η0¿EÝ÷h&²XX½/ßëÈMÍ˨]æ ɾ¤Q!QjÆñÈ"Â2Ú£@´ TP´*ô&o(£2pEì_åêàѤ œ“%:bG\´»à 2õ®&9îUtˆt®Tý"‚Î2‘JR–iY½6›Üý£¾G)x΀zò—|•—ŒÎ£ã|Jc”ÎD§ŒŒ$=Áï:4õÜ0Ek‘­¤qim -ewÌiѤ±,tz„ŒÎþ'%2 H -Íôô¶´Vq°-}µñJ|ý2’œ 9ˆšç¿ÅfàÑ? 3Ä÷*,µ!î̪åÎùbµ.v•$`3¶Ä º*‹9ú»€æ²ehá=ÔhÞ([K¦n oðQJWX2[’C•¡a¥Â¢>T‘¥+e,°Ébxb0–®Ë±`ŸäîÝæo®¿~»ýt9¹ý6›\~œÞ]‡áüӇàqò€«™Š -mô҆á>¦0¼Ü` ý²„ë0¼/›å-n’[‘9á1ÿÛÎð‘ë*r7Nöfëœ8²±*2¼ð-M3Ã3£ÊUä3/·&sËTµ]u¨‰±r(íQ?E²‘–ðÓãà^Øõ^˜Y<;ýÞÁøºð¨.µ1yöß=Û>œ¢Ÿ§è)‹!Ý -ü_wÃCˆD eƒ;ª%jõÖµà"¢4³yã{«‹'cKj‹ãҖŒ6ŽËXFšév«WÌ´&¶æXMÏ Å©ÊX<$*¢jŒw°AðŽƒÌB8¢çY»‡ÍH{P«52NTôäøg­ÙŽ.+Ƶh -4Údd"#K-T Ç PÒ´J«âóò™7TUִȊş[ž—aα\hp?æÂÓ&aôE2|ûçNŸ¥³ØX‹ºµ.u¾Ãdý ”¦%‘ÞÜË"U֖³zC ý«}T²K7¤ZTºÿ >ròè™órUä²m×**{h-2'V´ZLPžé‹¤Ü}ßó»=ˆﻍ•íB¨_´Zæ¹âùëÒ3q€Xs®Wïпœè@üŒI/Ju„=›^]O‚aXhmÛXO±¾ê"~G鮾>®A+*–÷óç—¡½*ÍáØÏݾ‰E]<•Uz$r|¹».$OBP"æ©-²oµR¯y÷Ǎ¿``YŽO7¼¹`~9mUµ*AŒ—ãD_l>ãª5õúH¯-|c•IÎ'³÷nßì+mR d×.]zC|’ûÔu/”êˤi¯ØE|p܆çü!Ňz#¾wœ|>ù#e9Ëendstream -endobj -1730 0 obj<>/XObject<>>>>>endobj -1731 0 obj<>stream -x­WÛnÛF}÷W ôˆh‘Ö…ÎKáka¤v›A[@/kr%nLî2Ü¥ý}Ï,ÉXQ•"° -۰ĝÛ™™3üzÒ?!Í":žRZ|¥pDíSþ1M£ià®Ã ]ú´Slƒu¼ˆ(ŸÆÁ ã>Gø«%-Βƒ£«1…!% ¶<g”dùш’ôðÖ¬(-TúDF“Ë%½ùøô†çø»¡´–ÂIRÕf¡ -Iª¬„ËimÒ¦TBYð6ùkigm8 b;ÉçÑtFíiïË0Šƒð„†yÌ"FˀþöúV”‹gI‚z“.ŽR¡éQ’Ì”ƒ1j¬ÒKï˜å£œ„ï¦ðEQB‚;Ç›ú¬3YÓmr}ð÷+É,¨:3ÎÔë% S§º—Nèæ.¿¥¹ÐKIÂÿý]UP&œð&G4 )l%ìù“”•¥LÚ'gªí…ô7€Ìpã餽¤,áW•iS+·¦4—ÀH˃ò§‚§+KÝÑüÐÔð|Ä]¬7¬¬ŸU*©¸Îßtíƒ ﺔfÊ{’ѳ0º¬M7 ÊbÍhŸ¦NŽ U˔óP‚„ôçö}§´GrpnʪqHñ¹Ñ µljá”Ñóùi†BQÖñwèKdY¨;Ÿ?¬­“å|þ>Ó][gxŒÐÀû؁ƒPo…`VZÖ6WÃpoL,{te -@m|gˆ¸{ƒ ؤÙÜ4EÆue¥ãÜ.5£’ 4`‡=§ýz[ñõ֕迳³åŸÐ¢0ËFþF׸iÞq1iß7@í²56ìí¿äÕå@a™C\Y_"›þCwàãüðÍ Ì¼jÞË_6W˜T¨D(EšoQâ‘âþì ¯„öÉrhv°3“ß* SfÅ8Ìoƒ3Ü¢Ìè7èiÃ8ÚÃÉ75ߦ•*Š¢¾qV¦~êG B‘´Bº÷DfJø6"^Ïßú"ܞ=áxÒváŽùã‡Ó0œÄíøùØ5t¶Î—,9öa¥0ê0}6 -Aˆ45vœmË?›zÕn8œóà}Oƒ'j7xGƒûFûZ}ºd]Ih+Ët%½O?ì¡ä”nTZkŽnÐKYJT æ5¨ö®éDUIQ+°’wšeG÷²4-ZTC¥ÑæœUì˅iСÃ>/¿ûáxç‡ãZ{uW<söò¼0Vþ÷îºmŒð©{cÜõÏ|³³Å~­Ð/¿U˜·¨Í?xÌ :‚èÒÈÑ÷~àŒÁ; ¯ëÀ¾›n8Ù-áð§(gôo•ÉNê¢ÿ"«×GºÉr¯ËՃ,@íÀ§'¿×;Óö^Uè[ÁSÉ*çy‘¶ÕØ®‡ &=-±2mò¦È XЁs,HǓJ- láÓNÅw)pcÂJ’cõ%uË-÷7)Ó¬_F۝/õ+7=ký”húÍã^>¢¥v©Ø[£Ã/'Mx=‰y?|8½9;å%ç Pڒ6<^=e±æa8Å;@|LÃÙè„åC¬ÚA|_o³ào Ó ¿„°Pó³ËäàÓÁ?Հ "endstream -endobj -1732 0 obj<>/XObject<>>>>>endobj -1733 0 obj<>stream -x­WßoÚH~Ï_1D - poihtHùÑr=xYìöbvé®MÂßìÚ»©Ô;]+T×ÌîÌ|óÍÌÇ÷³˜ºøÓ°Gý+J¶gß)F½ð–âhD——=<áËÎ4¾¤‰¡¯š p²_7ëF]êÇ£hLƒÑÏ=|¬¤Õ»?~ñi~Ö¹S¯K󢸎hžÌ»x“´n6b—K‹³Mu.×VäJ¯é~FߔNÍ«#-óWc_½ª|s>ÿû¬KíÞ·´fb»ü¦s; 8Ú½’÷óräd’+£)•" 7ЃÌ?Mgdöð;¿ùҙ~!-¶’rCxij¥sH˙¬àÈlESðǞF–dJêܕ1ÅýàW‡Ç9%F¯Ôº°2å› ‡·xÎ7RS^ ÕH$mr»]và³Þ¯Ò.YxÞ#² ק6¤ôÞd{ÜÅ®Íê½oŁ62Ûù„áÛð—UP›†Ï5ËLn]Äï{ V7F}†Ñ¨ï«ðQÎáÜp¡á"5¾´>ÀÏÏÓ¨z Ô¯vüάU"2ºSú¥ōѹ5-Zww7‹óˆ5mM*­®"w¤r¾q£ÖÀ*Ò½r¡4\,[è£[è³ a˜\âÉÔïP)+n9ÂGrE²á"dÆ!#¿Ú|šä›r¹Ô‰/‡?$ðå&Aä¸J€3Û]&Ù­N©ÈÑì° ÆWìÚ*×1¬oSÁüˆûL±öª™´}œ´V»0À²3Î)’ Â`œXéЀœ· )<%­€Ôêš+Ô³Ùq ¥£çÉÚ›SÜÒÊØc¹}?¾w`€ƒOàʆÇòü¸v¦ ÚßîU"]D߸Ï>ˆŽqO•H=%œ8ÉÛ£ƒB4¢18ÊÞg„5΁Q-$3\¨,£¥dR}-U®îÑ<9zþ'Mäƒ/W šŠ>8 V‹æ‚ÔÇ}îy:?&zÂfv„<)úèylÔ¢^´*üx\ζ¡E^´yÕL¾´ -’'º}èô™æØú6}˜-Î/ê\?LÞ_0¤‹3D$y°R *ø³à7åV¬V*Aãs&íÛá—ÊÏ¡—Ãrò0cf€F˜ðJ`܇ùq2„9UŒ…’<·Hž.™Ü¤®ì$»F?b¬N”ņ2öPÁ‰4¯'@#"üƒéû½€…£É-¡⸸ +ó†»',­Â¢ñŸdblêpÛìézzZœ{´üÑ©N¬Ü"/àø—Ñ’æVh·’–ͧÞÂ8¢ç°4&¿ƒÕþ‡£š»Á›-®J™å<ÀV…Š–¶WòÖÙ -ÔænŸN±ý°öà’_ñ¹ßnÕÄ>nаó8U–ñ°\ôýAäe´CŒ!ÜäüÃÒF©Î뗞µzë`goì%óý\W Ãè*(I/òP÷ë©æðrYâÚڶƶÿ-Dä%tW»wBëÈ<élÀ\ç6)mÚ؏,Õ S½«!Õoð_'¾¿ÃÏÂ}Ě"Øþç›8šÿãíx‘l~ù.TåZœQ©ÝOʇ†¼âҪՄîTái‹W>ˆÅ¬ƒ2ÊÑÖ+s*î:¨8t ôï¹>–j\‰Å’CTþ‰¡\ N£¸üf 82:>Eþ)5ÌlŽ™—sª!o÷¢ø -i–÷,ÕziÞ"\E"€Ø6X†÷„ ª„À$`pšê‘˜ 2v´—ÁªâÛO‘jñÃ:‡ÄØ«ã2È\O%/lÑ¥ÉFhå¶T‰L'ìCãõ§–à{nªKyË£c»D‹¿ke`[U¼Ç¢à†¦H^d^NJÆÅñ˜³û>/XObject<<>>>>>>endobj -1735 0 obj<>stream -xWÛnÛ8}ÏW ú²)P˖í:Ž÷)½(°m³­‹}É -Q6‰tI*Žÿ¾gHÑ%6MÐD&çvΜýºÈi„9]i2£¢¹e#šä×ٜ¦ó+ü>Ə•T…òù8¿ôÁdöüù»åÅðvJyNË ->fó+Z–û£-‹K¡K°ì÷[UˆºÞÓÖJ'µ—xî¨2­¥ûËéýk*e¡Q“n›•´ŽüFøpÕÉ­°‚/¬ö$¨47Œ¥­´Ê”÷¯3’ëå³y–_³<Ë_/^Œh0žeSÄrùùæ=ݔ%Ü:é¨u©ÑJyÍÌ`ÖK‡žÇjåY´~g¨Tkåi#ŸD/àÎk>Aàõ,êÂÔF»èt´˜ËÅH,òñb2]¼õÂýø(ힴ„3û@ -•²•…¤¦up,%%NJĤ2ºqÎ*”h§üE:ù…” {ZI2?¶kcpàÓ]2(é2\RŽ¾|1jáب-lø”šc8ވ¥;õú†6¹¶@4Ωµn€¹ëùeb (2¢¥r…•ìŠ(MZøÖJ$è9 j *°NTËGY©R…išVƒd!Tòâhok®\ë”^÷|ŸTfô]iœ4"y±ÄœíO¦!?)¥ó -ÈqDâ^Ú@µW,¥„25¨1„œ‰%fÇ@:üƸÂ?àãõÒU%¨«ªP‰Sæ%ïЄµDá‚þÁ1DæœGëñØ°IÒé£Ð†(ïº(bƒÂµè9]Y#ÊBDcUBôƒø%DêèLJ; †̹‹µ %ÃÀýÈ9[ -€)FÄ>DÊßÚ 6‡öurz7HS(7ÛÈÿr§µÈèËÙ@:å渚PXæáÖ $‚¡ÑKù\ь®÷³;…ŽÚiŠ‚vhSÖ5†>µmU-οÃ`ˆÍJ[Q<¡¨Kšáé¹N -}Ïô‡Jó'1)e—Ïu% ,ÑÇÇÒöÙ»ÄEvú¿ZéÏ|ÄΡË@kàс÷C«§á?J·OÔõ!Ý’pEgÄñðmÓ6ÀÕåÔK›³ `µà›çЈrÒsŒkWûT–´Úžv…À*¶`ÿ 8;¥ÿä9ÉÃÅsæYoƒf²ƒNÛfK¬ «ÖÙd…pQãbwñȐOŠG°Döõ 3:í-õ‚‰•„`s®BÕbÕÉÑðöšr¬j¼?&yÜÚ°œæÙ8ëàÍ»Qé¢ðf,•ýãþ9óþyyLÛ˺Ž³¨ŸO­VV@܂`/>lŒL«p:)¡áÏ\9`‘*ŒZ`µ[wº[t‚<¸Êæ¼s#’ûñìªK"E>¤E19»¿ä¹eðÈqC–ÜÆ´5¦ú²õø‹˜¹‡ [l ;ž“Þî±ÈpÝ\BsÿjE­*%ËQs,Ԃ@¬éy.)Ú?¦“fvJ‡çåÑdÈ+Nb=¿0Á¾K‹…·Ë´[R…{ˆÊ†­Lk"ÏFHR)o…v±SÑjæ¡Ý¾Ç )$Þ Æüò@ƒé4›1h|“—Éǵ;¡^šÁü¨w˜Å'‡òa£Üµk$B?kr ê1v×= -¦NÈ҅%^TÖ=Yfô)¬ý1WX8Ò[&Âü?Q–/l$±;Œ-1ñrÓoöŒ©SÈ“˜1î^èzÄrÞ¶ïìÚÐV¬Ì×]k§±µ©ûŠ.ÃÚòf¥ô¤#¼–„t¬ik¯0S#-S)à C9±ÊByÒԂ¾;&íšÝÕR`¶²â¥ŒE_Š4ÆØË5Øz6üUµ'ðN"1¶j&ÏðvÞ5x>Ã[ó|B³YxÙû~óùÝ o ? è]´<ÜÃìà¨éøàj„btü‚¸õæÃS¼ÈÎގ£zäã?û¸¼ø÷â7mÀ&endstream -endobj -1736 0 obj<>/XObject<<>>>>>>endobj -1737 0 obj<>stream -xWÛnã6}ÏW ܇zÑD¾$ëd÷-i»ÀÝKa} PÐmq#‘*IÙñß÷ IɎ6î6Ab[Μ9œ9Cþs1£)~gt;§ëåõÅ4›Ò|öÿoînù=þ¬¤ÍÅÃêbòáÍnhµÁ’ÅÞóé”VùKfÙMFoVß`7Kvã‰ôùD;·W>/³ÜèM4¸¡Ù,:ºšßÂÑxU*GUI‚‘·¦räKI"÷­¨H‹Z†3Uë•Ñä…ÝJï2ZÁ&¬ò‡F墪T -MwҒY“¹'×È\m`À« Ç(¦t5»Îæ}cªÊìÝûnJï:l7§9¦ô󽞻šfw/L»Ãçô™“YJ»S9^3œôFm[†Œ²sëÓóù,[œÆkX.ÞwHá±n„?ç„î+/­F¸$ •ýÆRpclA¢ÿÚ'ÎHXØy-Ó¸¨#‡$ilkUˆ†öJ¯•.Îr¥(Ìþ¢ßZÓ6Gۗ©y)óîĘ«%Â*t_ßíÑ9zØÛwÕøŸÜ¼Œ£#r äüB%ÊZT¬S=]çÐié÷Æ>õI1Žß3Õ!±™¶_A!zXsf?k¼Éх‰¹>Æ{Ûä'ÿØ¿‹åß¹‰gòáTB•ـÖ:yIRä%™ ˃“T˼@WsÓÿÓ*ˆ¾>ªGƒ<«„‡Jˆ\UÊs ]LPê®mx·JQº“2t)‹®!狨 !+¥i«‚Ö’´ñ²ˆ[CJûpIç'5‹- ·¨!¬qh¯KZýúuòñkgŒuãP£ÚghÒj'Y£ÅêVŸè™ká1‘¬ÎUÉCP=ñ¤ô–Œ†.îÑΓ3 -{f³„¤z¶…•ét¬³óŒõ߉z-‚®þ¡tûL®mc}Ð ùì¥f[ÐnéA«·…Ÿ”ÞXá¼m!çVrr¼;Vçy¥»Žªb–Ä3®ÍÚ ¥O‡2ü´¤¿ *nú,ýÃÇ/ËМ H½/ -ԃ“<(Ì ê–½ù0uZó\(-C²ZÊ"xÖ3lH©'5…)ÞmʽOÁ¾F‰ÑãXE͜|x{wÝÈ ¦ÝdœTj÷C$]æÔcŒßÄA‡\Ú*lÌ-6±+@Vjæ -«=f  †ÜdšÆða؎9 Óp⛠-´Lî œ1fxð4bL#H¼ÅØÂÌ@ ©EÁe7~¥nÄÉXB5ÄpG?8Œãì£{n`èZc”ö¤ú9–º²+ŽÆ8§R4\½BN‹¢†V0˜õ>~>I÷œkõ’P€•áÅØG.Äî[Õ+p b^¬ÀaqöûRA“֝S¿t^­¯Â’7´b8[á$Äg««ëtìÀ¡jžÅóÂÉá0[—ÊhŽ=vn>•ô´¼Üs˜ßÆÃÃqm'@L"óneÁò‚0bmÚ(§¡³ƒüv¹Ár‹„æúÄû`€×'möšvÂ*Óºï$õq̔@§ ÊA> ºo"û’FÜnm(4lÎè’F]0öϏy…€éÑZ™€?/?= Ê8,ŠJðiQKwêÁ¾&íã”ϹlÂI"ÏÞÓfçX )€®ŠŠì¨}ƒÀqRѱ^0y8DajV Æ»;Âõ†£Ð£h‡˜ V†î7 S¢æøìa3hx,JÕˆÁ!Ñä<‹ÈÅKÕäògn¸á:P¢ésàrÜÍI[_F¬³…/1{c.T+<Á”ÄçP¯àÈAh éHܓ˜Ê;QµÌ>º:*Îuƒw²ÂsœKët0Žä BŸ&‘|1„-ê™öÓ¡£‚Ic` ÇJøgn;û8×ø”ÑM1\."ÈA`8Àc§X!1Ìu_“¾Ù âU#h¢¦kKq…Å|7a#®x1è.(wIÐg \Ñî®qK-¿¼ÿôpO_­ ·žßLÆSàŽ¡_u ®n§¸âý­íõ[ÍÍâ.[¼C‘Øt>c¿¯.þ¼ø•…kWendstream -endobj -1738 0 obj<>/XObject<<>>>>>>endobj -1739 0 obj<>stream -x¥X]S;}çWtå‰l]Ûp ÙÊn’ëZ \l*ûÀ‹<#Û -3ÒDÒ`ø÷{ºgd›IÕ½Im>ÀØRœ>}º‡ïCàïNGt<¦¬<ôñãxØ?¡“³S¼á¿×´<¸˜}К/qc|†9áô`@óìÚ?Ö|¯5Ýèx1¹Ñ*uøçûù·ƒõ†ƒþ.mϦ;ÓóË?&7W7çÓ«ƒÁ¿é_4ÓþY{ùf2M&¯­5vEÎÒÞñ_1|̆¿h«½Éhª²µ±ˆñÑãa -×âÇÇ÷¿`u$á^+;U6Eüÿõ×Ûûÿ|¹¿}¸û8\p̟\© ÒV!“ ï6ðÐÆ8öÇû~ñ®®~õ›Áh¯W†Ý霯¤Š‚J].´䖴½ù7@mÏ}f{‰\:½+ -¶vÄL)Ü -emj~ÞfÎ6¯]¦Š6¿`C³‰E¦Vdž ÷:¸ì+GŸOh8l(ß ԓHaíêÈh².¢¸VQ@J<*z¶-Ž8¢'·±Ä ¤U¨&Þ&µpϺOó5hÎÿ,=£Ô ‡ãþˆ œ1hx›¢£ùåÝÑäCDeT4ÎÚ¬Q-™ÜðøàU¬‡WÔ±$•—Æ¢¤^EçicPÑ\#m¼‹þ²rôHÇìhíBD•Á†­ÿöȧ›å*ª… -.‘v›|«\f²1qM âTyîuýDÙ1´ÝÂñ²ö@ÀS匍L­¬PÞ,M&IuqþM¢d3,DMYwA7¤zÒÒÊry4qà^gÎçrÇu£Ê»g“ëÐ|8•‘s£øZ1BKçË&*©ötF_ÍыˆÙh Ìr]ix•Q£¼Œ¸ kb¹%]àû§¥z6ië¼Oç–ô‹*+ď{±%†À½V¼H¹-’£⠍â`v!(äËÒqÙ4Ǥ}Ÿ@ê%Òi|¥@v»r8Jî¢ü-ˆ md¥§(Vj ÜÔèñðÙ(Rÿ ã…w*ÏÀìÇ÷„«¤m]j°o,=©›ùµzÖÛ¾’æCn õÖ ç•ŽO¯1›ÐCè2Æ"°Hu˜Š‘kCž$ņw -ôÇ·ÃF‡>}]p^Ҏç6€ìqÏë -œiƒg¦IFŽI³+Fɽ3Ç ÉùÝÆù§‹þ;ô,½kJýD20*ñXցMã æ) }Hö…EFÁ¬¬´ŸpËN ‡t%l`V{1"<jÔkI«÷¹ uåHYåà²Cû‘·Æ‘zƒ#¬¼)•EÎûö[£ Ì³ñΖ\M‰ Õ¢VZû^t=þŽöä AuôÍn„±lwRÝÒM!(Wy5 ô"ÓÑ´:žRÿM4fŋ…`jP }Èñ¦2è-G5`Gdßj Ûôåè—'˃#böÇùýMo?]m->¾—JÈ4Jë$ÿ¬¸oòmÑI„‚ëf¤ñ"֊úfí˜<÷Ûæ/S"èÐ+¹J:E8cÝ6ÔÈZ©V.4P!W9ú0»º—ø;ïðy[½R²Ú×܃ßkã9‹<Å/|CV(}ˆ¼Í­(AØ5{"¹‡ŠP*l9in«”¶o\y¤)ª^H½½.1ú“4u²Ã€jÚ¢¤ˆ«a=ú;º H#|( -æ,âÕ¬Ùu§í LŽ'p`6½€"6ŒÃü“—šn;žoÚ½{ëLv[n=ºP‹ïÄVu¤Û:ò·™į̀t¯ m3U…»ÅÖ×õõ%¢ºv+È@·c®}¢v­CÐ[ç=΍h"¾™†h¨ºˆR­È ãêaGxµõÕK„L꼓íA¶·¥Ê°¸¿ÍCÁ±úáс°aáäÝa9m{lžÃ¸SÙv¿«—l­ì -Vvñ£¥X‹×ŽãØäWˆD£€-z[‡í¢–ðôë€\Ì;®ÁDFiÞ,Cü’Ÿ³$¿ÆÝ_ÛÙÈ -}“9fÔ ´Ûcÿ€.ÉHA\QËü-5cbB‰Ñ6“ɱÁ=¨b£Ç¦èâ1Éx•n7À6Y`r4 Öv²£ä{²(`WIìGŸ?Ð+"?föŽùIÛâðCÔ6”’¾á©‰å@ºàíª~ʗÎQ£½Þߦ¯‘·Ã̲ÌO<Ø8Œ–E½\‚#[Â"€U©ðJ.9ஜÜu -Ó®¹bI-4X뱉'•à½”/I_ÖàêP֖ÇkNÊ)ƒWþá 7ü°TՑ—ŒIw{D¨HA“^bsæ]”G[D,}œãnEi"KáÐÒ»R²ãeµ{$GXšAêhåð֋ÕZôïGÁáÕ¬0ôó¿bO Õ¨]ý'¼E&0„ÀF¡AȜw‘¼Ù„Å8-4ïlkön^lt#*rp­ø‘ GôKeP·>(Ú²¨Ã¡n3ãÒJ•ŠxVj&nõ€#m¥YžjÞTO&$$&ԋoØ}€;;=ú|Ö> ÇøÊÙ1OOÏΧçtçÿä2,»6Ê ç›½t¡w:à߯üíOÆgýñï#ô -ØÌÕüàσÿµM½Vendstream -endobj -1740 0 obj<>/XObject<<>>>>>>endobj -1741 0 obj<>stream -x•XkoÛ6ýž_qá|IØµ,MŠa@Îf q³X[Q@À@KTÌE"U’JâýúKʎãAíÚ @+‰÷qιæëވ†øч1PVí C: Žéøôþ=Æ_+©Ø»HöÞ_ÓhDI#'§(É Ÿ‡”d^U²oO¹,ÅÊ H äà#M½#-*IʑÒ䗒2‘-å!9C"¾²Ò™²ñÊh*yljzVeI®É2)óCZÀ*¬pPi6 ß%ï ©?:ŒŁ6AºÚè|@ɾð -¶mœ·Â+ý@…±Ô8iõƒIå9(AÙRX‘yi•ó*#Sgµ5Þd¦´®Æ'€®r;§ÏJçæÙÂ.•_áˆð$ʒŸÉQ) §H¨µ6“þbúió °ï dN=½ðÎ ßãØ%ÍEµ; ʯz¥Ô>Zd4·ÎW‹\/DûþúŒF–iêbÜ£³Á?ÁÃÍíoŸæɜ -UJv´Ík̼"MØç÷ì§q "]Lx "· ˜%t ‘Ý1k/£MÈ*håàòcš~žÎfIšÎ¿Ì“ÉíÑ8M¯î§Nîçi:I.ßÆp@Bç;ùgF{¡´ ÔLïè<ÏÁ7ØÓùiD©iHÅCd9ÕBYh‘aÝ ªÅ`×uH¹–b©mÓ¶‘7„8DG%êš5f¬G2ßUÍ -^Պ gÍ££R=ʏë ÎZ¶ÆǑ-jÿìÓ¥©WV=,=¥YúŽFgg§t«2kœ)<^Ûzíl4œ2w›ÃëwŸÇ±‚œ¨j¼­.’œ¬iH}㠊wtYr~¥E¦Óƒy’–’Ë»÷Ó; ug¡Ûº9;í:Ùõ<Æèy#†yÇuñJˆ„R A™™©êµÍÂp¶7ù Öðå€h‚nCHÖ®È-MSI²Fjè:ÏՓÊQ RËN‚ø^#Û2V—"‹ÕÄHPªG¼eSi@Å­dCCgà™±mßcõm'E¿ÖçºNø‹N›¯Ù:Y£5rÅC èo¥Ñ »¡sÉ{±ˆžzû½×NÚiš{ZÚPAg )—èß2È B±¡Å¡-›ªŠZs2¾”/àGWí&r![ú®“ŒÎÀÞô;F í{ÂxV~¹U7ç3ºZ<@ÝãÁK«p*«¥q¾;,–mlV¦(xÂÇ̛|ñR;N,4l»%Ûx(öý»ûÉw¾¸útûñçÜT袿|çÓéìò揫 ýÌas9|ïÀÅä×éì¯ó›dr?;O¾Édvõ¿MÓá‹Öh7Úè~m•ƒ|3°±"Ôµ±>}וQ×sºÞ€/ôª-óv? =&ðÎ,mœ9ê1̽¸œdêí´Îc뀼Ñ6j ]Š<;žðë0©Â&0 ‹j MéÃ1Åb±ÝæyÝ٘Œû>Ç°³Ü¹ÆŒʜòÜ`§ ζ֬B¨Òýx‘lƒÖæ·Á©·¿­°ÃCDJ8g2….Âiw"ÑÚX‹BE›‘™*Tl@kõr¿áمJÊ°].Íó7-/,v2`Á-°4hÞøߓʀñB.Å6½®c©Ÿ”5šûo frgØÌ$—~Dx“jûCq:¤¸mj ¿N`¦@¢ä8Ïi³ííV=±âøSö¦L˜&k$ÂþZ>cÝ^ -¤Dé1®–ì1ìÑPKgüÐ&Úý³¦ç¥ŒÛù«.Ùú“’˜B?®”y nÅÍ­·ÿß~Ò–,LÎíþúr³la_$Ý%‹CáŸYïÀ£á1xUÊk× -”‡¢`,Væ"€"¿QZ¼â–ƒ­ÖÇ(¼Ž,AÌ.û ÁuÆHƝŸóì&1cq‹RýƒCí¤ˆ«5ܒy¹Å[Þ,‚<¥íÄW*Žéüæóù\(¶…; 6 ë}”ï<ŒïÖþo$Šàâ@µ ÙòѨ¼5ƒm孍W¸[ñ²<¥æÊ¢&ÕÓ7¶¡)RÌóp7âÀ._’zu³(UÖãRä§|ƒâµ4Œs -~T|ÙùÐÍó‰Ë¯„½YS–sÔ¦ëœ}¹àÄØI2:YÜhÛ»%¯‚à¨X)âÅ㠟áÆê\—««G¹b¶ †Ó´uŸ¦n弬Ò4k°ØiÏ«®5¥“¯Ú¶•¦¥Ð•Ð‘©4å­’h÷.M5\»˜m@¶{%i‘¶òHY„;W€ƒýhCG˳0H‚Ù±‘Ý÷קíot‚_œáW? Nø2?¿½8§;kþ†èÊd wÔp!f úëýC\|òƒoÝMON'?q•åÇGl`’ìý¾÷/å!îÝendstream -endobj -1742 0 obj<>/XObject<<>>>>>>endobj -1743 0 obj<>stream -x•WmOÛHþίÁ‡£äý$ÜE‚”#îU'Yª6ö†l±wÍ® äßß3k;oª{´”¬wggžyæ™ñËA—:øéÒyúCŠÒƒN«Cý³AkHƒ‹s|îá×JZø½³áÏt»—Ø·wâ:8hßv蒂î^àCL°ßéPSõïèSðã C§ÝNë6ë,%]ÿœL¿“Ð1§£ïWwÁøqzŒéY®ÞŒ‰$1o”I®²G&ӛ»¯£q£]—‹\¦RçŽrCsIOÖ™ŒñíIæKi[t¥Wä”~‚9WD‘tnQ$¤t”±l4ü¦’„"Q8I0Sšå+¼ ·š6­Ó­ÒnuBÚèÓÌ*Ã'Š–Š(—Öá2ÍÈt.ã(M©È2ìr4_5Ú](ër¸e¸ŽÙ&û;•ùõäˌ´H%[z) RF»~®©`Høc£á0ì¼k w˃>øLFj±"AKùN¯")À&cñýçAý>J|_&»'ßEÊ4@. -—[¤Ú3„Ì‚=Gjä{.µã°>7ÅÑ´NÝN¯…â¸ÄÿsÏ_»TÚÔT¦£‡Ç1¾ÜÖ29ŸÙ!:—’ 8Ý|À8®a›‡H¥O1®ÝÁáú¢­GŽ a39i_¥ýÈ ½>ÛÈLV$Ân™+cØYp¦° -áö»›ÄD"qöu˖Çgë;C#™·Ldçÿ*¬1°J&Öâм± †µ‡a˜óDEXI—ÆåîcÇ}îãìŽ|5]Ñ´NísóÊö$÷u¹¦Éa•"ŠŒÎ…Òà=Uäh´ºÖ.xEd¾Uf+rzñ=¬ÁZßÂ;q…mVƒÌÊÄä÷ěàzÐvlr¥› &87j]ƒ’ƍ®CXT·] > ê–%2µÄ/LVI¥…bYð2@›pí»•C›`ï --^…JÄ<‘¿¯NS“s;¹OßÛÒÀ‰ÒG™°ˆ°b=kEdÒ²1MRDKJŒy.²“f' ú dÁ÷æuN`Yë֖“ Ti•)ù¥ÒÌ2‰2iQw©ÐQsX܄­Ä6 —3vñ«rŒ†×w˜Þ"Þš3¡@pÑ°o!H´v/ΰÎÀxˆÛ·—Ô”“Ãi¿ËƒFŒ^«ß¢¿¾Ì‚™ßÉ&Û·êâ9§½sÞ,+K>w®ð|`úækºŸÑ7¥cóæhЃ Ô§Çc j ´‰‘ÈÛ<¾ù†ß&Ói†³gÁø¾ß ÃÑãäŸñã, ǁWóÇLô:Ò~«Ç‘ù?y «8¶(Ö%%ºë¦"–p4hÒ-šìšz™gnÑ°b’‚ôލJ/¬@ï+¢¼àÄ魐O(– gƀdKLNìWpóІ#R¿*k4sÁƒë õq DØB&%Íz¨B}¥{ò¥Pèôl¥l»ôU«÷öÒÅû>Âm™GíµênCÙD†xQÑaТÑtFw¾J~E‡Hdb®•¯vãbp¶âw2/2Ö4Q?¨ù -?ÑBDÞò³h\ 1º— É0<”#Õ&_ê—B¢îؙrtÁyö’) )ZøÔ½·¥‚(W¦M0¤‹•žT3ÛÞÅS#¥« ö0*¦’Ur'(\ ¹´Ù‡‹:”J¦Áãke–æúKC2,}=ìݵÞ~òÑøђ…»–ZOl/€pctÅü‡Œ<502“K•ãã,/ JkükOxßÞÍRú xë H´¿@3'N*à‡»ûR3W Ï2zf>#qÈ6+Ø…‹jÐ5{7‚Å{`0±y© Þ1ãK¹#¨ÆŒf~fâ%3çn)®b—¢ºñô¤vs-öUQAœÖקCü3©ÜªŽ³VéÅ/ËãªÜך8Ñ  hOSNMÂãñO•Œå$–%¾Uávu;nz[ý|z=í¡×Iݹ éA+Mr9ºNÉN~)˜Ð(tÖOÿUÀIµòI¡YC§X E-ï{÷F‰òºVN•â•¿x_’xÅyR¯ø ³‰dÖ-w¹‘ï -ú‹ªQt‡xY¾èÓpèÅivu}EÖx¢LT°¤zí`§Nëí§ç~+nèmƒáEkxÖCeò–Þ€Žƒƒ¿þ`´–rendstream -endobj -1744 0 obj<>/XObject<<>>>>>>endobj -1745 0 obj<>stream -xRËnƒ0¼ós¤\^qH¥µUshš -¤ªGLBpŠ¡Éçw AJՇªbY²–™Ý™Ý}³<¸t<Œ}ii¹Ìň‡Œ#ŒÆôöéÖ¹5O¬ëûž‡$' -ÆH2Üu‘¤v¢ª*/6-¡cQ®…µ„ÀËbCËú]Öh¶”Kí÷êXTD-JÙP¼’2Ó#ËdfÞ|•ì¨.IìêÚº\3S§rläÅ^Þ ØI/ÑñC’HçjjèöpPuƒ)^¥þœÆ…ãsCøÞL«ÿèFCPŒ%òQTAø¿”.•Jò<—E_õ­ât:±‹ûƒ¹ãVÖ²ÿ'†¶þNµQÐlh‹D–ÕRk¨¼‹\̖õ9£sNÓúD¼  e¢¦Æ³Çù «ZídÚàV¥m)«F4…ª ÓÎØ¥f¶7a> žâ$îÚf`!ù´âLì.±ž­+@Ê×endstream -endobj -1746 0 obj<>/XObject<<>>>>>>endobj -1747 0 obj<>stream -xWQOÛH~çWŒx)HÁ„Ú7(W éšrÂRé´±×ñ^í]ß®4ÿ¾ßÌÚ!1<œ*Jˆí™o¾ùæ›õ'SºÂ¿)ÝÌh¾ ¬>¹J®èz>OnéúöŸgøñš -¹°¸Mfãïïӓ˯ŸhvEiP‹›[JsB˜+|“})UÓjë =֍wÓÊ»m0vMÆRPõJ§ÿJ”éMŒr1¿F¦4?Ãcӄ¾o´ß½%W쟍\ÓtÚ?2»IüÈó·{²ºÝ:ÿ“SpJ“ë@Šj•ÊšPÓjGÛÒd%e•Ñ¶ ”)K*Ëtàû*ZNU«¬4¦bNHÐ^ÑÅt1w‘©ªB]§R˜–§ ¥¥ 1Xæl«Œ ¯!ÛRµ¤À¬×*ßQ됰O…©4)›_:èƶ¸v “{ÚR{®ü ýåÖ´€K¸eÀÊ:Ào)w`]‹R²ªËõ+ÈØ-eÇ‡¶Ú‘ZPåNY«ÂϐŒ’§HvP4¡àR«A„.p§©ªˆ{ÒSÐg ³î¼j³Ì3_ÝK¢TVZ[n0Ô¸+£Â«®ÖôÌÚáD>L×f€Ìœç.ëjÔ1 -’k–Æ·gúalñAÐ'x¦JAžhj æ/†¼˜^bm¬4¡‡Uæ‰i©ÛûÇïÏ]{J¿<]>> Y}ü²£§âVí¸/ødêF3QX…ʼ®ê„ —³Nfåaù|ùçÃÝÓåÝÃóËyD„neèÖ¨)H¹B7ÄOè~¼­AW–ßSâ1!S¼ÉZxWKczyÉ ¢ÁǧQ:•ç€ °½ÊŠÎf>s=ā”¡ â‡=¦D[–_.CŠ~<.ŸâziÖ%†â]>ç±%Ê 3Ðãw®a¾°M€E&»¯Šöu$1„ËJñºv­Fö5Kj±L㊇z_Çú§Ý5z”ÓXȗu µK‡YPÌ=DÕ»S»#Ç£Rð -T>҂Èn{蓢løäì ½¡kçyÚýõ=³” *Tf*Ób0{½DØ;ú٧ԍSmëU.C‚v¨*8xëØ †Þ5\®8'*êUf÷r4èí¿{9ûørþržô³}N)¾ìೃÝÔ*ð^µÐ«xí]×$ZqE»÷œCJÆ$å®æ6Vn͈ybBæMƒ­€Ú¬Û’Ú(S±"Ç"Žþ#™•õ@ûˆ=Daô-Ô~?Ä^‹.à2—hD/duâIX½%‚©FM ˎË~a sÃ[ ;ŽëóMDv(i™q",‘8¥ûK ï*à£,/ñ[=éíìh(ÙÏVÐtT¡p»sßgd=šî1ÃK=!ÏQ(]Wå2;A·½DP5‰{~LûX…· ߊSG,P”eGü.SzQ|&̬Æ1à-­bDuÇG 3Ò¼JîœC#~•êd”ÔëµòyÅGLþ¶ÔÀé{R—餯–å¾÷ 6¾ù¸ð¨¥Ð{ ¯4©?GŒþû•b™é·ÛNfïÀ'´ê`-²¼x ZÍç&å坙ÂðHŽCçÓ5^âA:XÎËôõâÜPð]¾QØíùð•ìn|ßs9¹ogà‘qôḈö28š_ˆ¹L/9ÿ7FE<@lBۍñΊóC -Ð*×V ÛÎ;º%Ý˗ÕÎâûf2ï‚+Ú£½–©&š–Ñ¡G(gã‹(¯W ïdDXՎҲ<9#ËQŽ¬Rþ#ºV¤‚å¿'«/¬ÔÑÓ6,Þ|rjàVÇÝë;Kq%$íTE"v6Ü3”ºwëÓ~OÀHFà‡uÀÉú͂‘€›ìŸíËXñkKQ£°ð\1F«•ÅÃ/ÇÅ¢«†ÌÑ%Ž(AÊx7m椶/žEÑóh†ne5[*OÂÿ”Œ[‘׊ô„äýCg…´Ôt¾q8J}FëpŠÒ,=ÜÏ£ÀځËk´“w6›þ¥ê[ -s¢é´?· qN£[¿nZ¼à­Öq«]~½}}•ºùħåÿÿêvÃÅÇ^ÿðØt¶`2þHOþ:ù © Âfendstream -endobj -1748 0 obj<>/XObject<<>>>>>>endobj -1749 0 obj<>stream -xW]sÛ6|÷¯¸ñt¦öŒDëÖì¼ÅNÒú!Ž©Mü‘ „˜$X´ªß½¨0Œ§ÓÄÉÈìíîíAŸLi‚¿SZÎh¾ ´<™$š_͒]^/ñz†¦\>¸yåýÛõÉŇš.ic«Åõ”Öa›É„ÖéÙl’Ìzlì¦Ð%vr¶h½±Õùúž»¤)–ósãÙ2Yàɳûœœ-µß™jK™Õ®úÕÓÞ6Ïäwº¢­uÞŁ¥Ân“ªÜPn -M{S´ÓEMےoTúŒ ö•¬¬‚„Ö́ezÓnNžÎQ-N.ô‹.Èæ4#ÛМrüŸ›*c ñq—ÐÛÂYª¬×ØVyÙ;m›FWž6Ý;€2ÎSëZÅ(·Ú;rÞ6:#(úÏ—ü‹*R<†µa¯$S>‰«f‹ä’a>Ï69ÿ#GŒՏW%<¸m‹ ˜&!È[ò‡šKÐätó¢ªT‰=áÏêýç¿ÞÄW–ªR[¬jà|TŽ_U•‰ -ÝÇñØ̸ºPQ,æôªe -áv -Ž¸‚üTk[(ó¸`r<èPDªZð TÏþØ©—P̶°UÐé¶Õ8L¥©m+Š¡”…î/ª0Y÷~wpg€ÏºÔåFj‹ÊÞ?ÞýB©­*²iq$>`}] Nð“q CؓsG†ߵN([@„Ýù²jÀmÄ*˜.>,zuÿ¸¢/`£73ÞÖ{Õdí ÊíßÑJ•õtN©ªXm`ÏͶe÷¡~¨wÙ=žµÕ¡´øtfôúézö4íP1L¿'¢\B÷‘’T9-ž£ʋ¯@;§R¥èhp"¡$ડ»Vo/îî?¬(- ·“ôs:Øæa±ßÐ]èÿmh,¬ƒ'-ýÝj4øgÕÍ×Aá4àAÌ¡¯ ’q¹–y-Ïçu¿‹bËÇâxkUìÇ[T‘ãþré…hs>I!ÔlŒ÷èÝM¨"÷·4VªUƒfE×9O²Ì%>É`MPŒ¥ÈÄlP&òú,aK ¹4ßd$¿HCh!j…P£ßkÀ`&m-æD 5»ãa½}Cãl†­×*ã³Ç͞ÎGƒãåáï§ð¶ã[ávü@¸>è=!Œz µ…:¢0{tC%‚U>ku#yS_$(|Íà\¤2غ‚ £De´r#ŒâÒâsö°´5H€+•Ö™Îº˜èx͔ €†6æ8ºÀ’>gFãp0XõBw,p”Ê=󜹤ˆ†…Ø7ÝñtæjšÜ衊ÒãLÞ©áØÍY«ÓN TâʍütÎ<ôóx~æ&òeB·<«¤ÓÆ¢¹]»(žêû6Žå•©Ò±.4¨by$lhšÜ$Ó%"¨¨wjŠ¼oïÐã¶P[cŠ…Ò•ä>¦Äsm]Û&ŒÐFׅI•øÌæ?kØÍU´c/mï™j ZNÌ“Ú êAéàYrW`€å‚“£^º;6‚ ù>87Ó.mÌ®Ø!31nœ\+PEilŸÌ乖pÿ4ÒÖü¬î_¢CÐm­ï/`ƒ(DrÒYÊhn8&‘ÐØVú^ìf_­ ßÑcƒp Ês“B¾É$â"€›tD -!2¾Ü?¬p_˜‘ÞàÈíø¡wXÅ7Œíoï?­$”ÝOÎ†Õ_ÅìõœX•+‚ÜøƒJ( -̬˜œrcÇ8‡ÕØó”FÜÚ»ÀAÙæÅ(¾âÉ íÏwÈ¬ôu#.ÅrÓù’ 6í†T  ;XÏõªþÑhÓ!ÉÜëŒ]çª-<âW­ÿY}‡5„¿[ -:gÌHœŸ]uW‰ñRƒM,Š¸L <F)·ÞPîâñÚė? Üþó¸$€ &î1¨™ƒ^ÄÈzõµ‰K»¼ì®U#áU¾<,‡Dó1ҍ CœÃñts5:¾~X]ÕB W»àýã=±çE˜ëG}·æ…ŸØ£d]aüßïПÒ#m¼‰y‹þ€•îºœýtÆæÁ¥íæJ2 ¯U@tþ Ó5v?¾"ÕºñH²!ÓÀ;$Œt¡‚&æý¤¬Á¹ƒ-») 7òx¹Ž7Êé_ë®ç´˜È×­Õۏ·oùûÙ7n·w6mKܽ?Ÿ1—“þöñ_ßç.×Éâj†osX8-yƒ÷ë“?Nþpþ¶Gendstream -endobj -1750 0 obj<>/XObject<<>>>>>>endobj -1751 0 obj<>stream -x­XÛnã6}ÏWÌ[¬­XvÖÉö¥°“ º@“m“}1PÐms#‹®(Տï^dYŽR´¨È´HçræÌ0Ä4Ä_L—#O(ٜ̞NÎo¿P|AOKÌL®0Hi ‡CzJz£atÅý¢w”ji()´1dªE.KZzgT¾¢.žé糧vAqì„ F—Ö»~w‹2$(ћm¦QʔR‘'²Wy)TÎR7UVªm&i£_ø÷V¥‰è[Ika¨Ï2§;Åéeɇi£jä‹,DF¯RX«i}˵„üTb JÉZaf×P&ÑE!“²O"OéQl‚2±2´k…7*'£7’D!tp ”išˆ­X@a½ìrÔ:ÃÄ¥ZUŒö§f¯‘—4šDÞµÎJe'ÁÓÖ¿T[‚éKeð<ýä<>¤/Áán7ýógÞ»¹›ÍςÃ芏=Øwÿ9u/0š…)Œ¯ýÛÆë¯ £·°’šÃ渱‚Þ:e þÛ§Sށ:Øñ^׃Q·VŸ Õ§ƒµ?ìÒNuÞbøäAW%‚ÿŽ~fño£üô¿ità N«üD·‡¬ï_Ö¾ññoÇûWÇbº£îwu/ØÏyÝA®ùlÒJ®QY–iz?â¬Áƒ'ç -¾ê<áŸcŸWø´Â($OßБ¦ÞÊÆ×¼÷Ç·ûG—‡´;©ĔLœ £±çlCó^ܧQŸÆó3f¢¤"Z¼X† -‹;^ô€U#¬0m ú§\— að?ˆ_¤‰0LǏ®ÄAcOÀLџiÃ$›ƒcuN -äZǟ§/êézbl©}?ÑԘ -¼»Ô…¥ï H8g&gÏ2§[ëèúPu“lQ’™œë€Ê¼º‚Í[Ì'eë‘*T6(0ó³ˆîœ d‰vxb:¦ÿ=±Ã¼½A!Ãvé<ãZ‰ïyOɾ ‚ú ˜ÕÏjd«©¤LÁ­µ½µ†šO-›m«Ë -NglD´%Í;‹4Œ/jÇs=k¹¨+h€5X¨ -º—åìÛ÷GÊá/¥Ëuûä²]»¦(í!4‡'-´f°UÛ>É ÀS¨rÖԍs’s -¶uWxÚf"AAÍI" Œd^¹.¤léáÂ@zÄXˆx(¸ØíNk°ï²´õ©Á-€ÍÂÖԘ­C¡ RãpϹÞå\¥3 i[æ Ïr;£’*ÀÍ¡È©É©! !}h…VŒØÖ©PË6HXÈÞxï ¦¬ ˆì[ˆwÁÙä÷w¼ÚÓߛí²ñIz¹ŒÌZLBŒE•X 5ƒÀ¤2ÌxmÉÈ´x³ósÑÓf[ ø$µ8B_'ՋM2«>™½œÒ³”è©Zgc‡.Ҁ¶¥H<ã°·¤àÎZ=¬cÍ0Á9Ì»xßj!ŒÝe£ÖH÷ˆnuÑRÁ5¥Â %ã269/hºÜÜm´ÍÆ£Ö%àA$›ãÔhÎú·Á]ú~´o·waÏ*:WJcûYdÿ©¨Êµ.T)JDåÔæ`'Ç2ªÝÍûzQhËm^Õaô.Ç ™ˆ -Á;ˆ -Úm.m]payG[ÎØTæÞa¶pË>Ê@FW¹®lô–äÈôԢ–Š/ §@‰ÑU‘Èàñp‡¹kOGÛþXF“Kšwsøí ²@5§»rpñ™îi€Ï ä¾´É”+ý‚—*ø¾Ì^+C/pmÁ‡ØqTs#ì wš)gâ´Õʖð>_ò2­Ÿ›·›yaãpáÄ3ôª+Tî*KY)®çxQ^j/—jµ^èb­5.qK»—‚ÆØVDˆ&‡ÈØW¢ãÙ¡ð²ÌóÛãkÖ£k}ö=ÙÌùPò‰~E…ü Ë5£û-´ïN1Â{þÝÚãÎi\w0+ ¿§¨f¸¥Ùçµ}Þا½”ß^ù[y<¹Œ†Wcš\Ƒm§w³)ýVèˆ3z–Tƒ²Ã¥™µ„ ƒË!n™é¿ÿÀÅä*š|០؏®Xêק“ßOþN°Ñendstream -endobj -1752 0 obj<>/XObject<<>>>>>>endobj -1753 0 obj<>stream -xíWÛnÛF}×WÌ£]H /®¬E ÉrZ#ìÆ -übÀàem1–¸wiÕýúž™%EšU‚À@©lËËÎ}Î~äã/ ã¢1¥›Ál9xõƧ״¼Åƒñ‹Œ|Ï÷}Z¦—UR(Òî·of» ,p=òq&Ç9Η>ÂÀC\-%j÷-¢›y{)‘H‰DJtÃRðKyõ戂À7 -EÚB[Ev[¿]å†t^àj½Æ¥"#6ŠK¬ÕC\ÆV ©Ð´‰ÓU^(£TAqZjƒ÷Š'Ò·Ý­^cÿØ;bûzKê¯x۝t -=šBŒÖcÄZa‘¨ToØ:EkÆkè4V•””zkpÎ-îë{C·º¤˜æzçEýR­4ˆ¼•6[¬&óT¤«Rùß0ÞB‹H£un,ms»òèÌR¦•qáHžèS¥Ê§¼¸K®Î—ð¸|„×ÈÕüúP `3Ï.zzã,+‡Åæˆ]&:DÒBÙÙÙù%1œ¼:ÿö·÷ç.~ f?{´äLȃ-Qª;X§ÊŒ` ëq®ötõ¢゛ÇNýËtHmâ0²’D£²~¶Î‹T¹ŒÜˆºÈiœªóü,îÝäXµ^ΒÔúl&‘Àž3Me°ÇF‡?¦wRÓ¢ÐìÚ(êCœÞ+Ô+bLæ(ßÒRMê’Mè-ºy7.&°,yêéÍPý¬ ɹ”$ŸÕ&$TߺΊóªÍBmÍêªäƒÁì÷®‰\¹p>%ʞâ8ѕõHâͳn5ï¢ZªTåR›ê рn“®TV­ñjÜÓÔ6@ls´\©Pà(~ΊÙxÔ¶$˜à⋽•ÖÓ¨¥žh8dýÌû;ýdzš¹[Ñh÷Š~â'¨…GFvà̅µ 2Ñè„F¬ïM¸¹Gòëìq7ê#îóª·Çé ÚMÜ,íP4 Eñ (ÜÌåx:¤ž´îƽkFö냮Ògíò¤]ÎeYK~Žö/匠ŽÐ^›º7ÙÛƸÜ.wöÁùöîéçM}1uéMz¥îЋ Q,ŇêÚH­ºŕ]é2·¨áG%Pi»öpÜô³Uo#ÄÁ€ؼ$0óV—÷8çw«D—+­3Bw8 2`yLà1‚ðz½møÕÍ1l*£&§m'‡¢Z‚e9ºX3º¹¾qœ"‚œEzÛhïƒò’Û”YÃpë2B£[Õ#à1M«Ó´*Á5LŒ¬7ÄðEXo©„(RRY ³¥¨F–IýuŒ=Ñg÷Í7}7›ÒE©?ªÔbúO+ž}e|c G͆ѱϟœ¡ïyG¿öåSÆ}œ9܄Æä'„÷+K8O¼ñ!>Z±;_ó½ÓåàÏÁ?Š<8Žendstream -endobj -1754 0 obj<>/XObject<<>>>>>>endobj -1755 0 obj<>stream +-‚RƒHðã ÐTÃBŠ|Œ'BfD3Á!‘"³—¦£»ΝmÖژX«_ +¡r‡Ki¯‹'˜Ê¸éçJú©ˆHê£Ý9ñ1_‰€öâÆ¶½õ&Ù#—“›8c\QíƒQœ›„Ÿ9þ”S¥Ïœß‰l•#tgE¸–"M«…î(&sšÏS¦–Õ³hI3'¹7ÔYI¦èi™O©HY´;I `²æ…Å +¶…ˆv’óÈBÙ@„)× K.Ö0§+ä^~ÎYÂðƒÐÊPc.ô,t–ŽÈ#/•}²TQ„rcøQbÓóºõS%­ ˆD–!™·ÜÙ«‡#ò\n‰î\…Qjm‹ð ¸¯ÕRäilÙK¬ëè Ñè¶xQøüBa#r %ќù¦OuäWio:ÎLÆÜFWÖ¦ Í0/3“Àéú òœÅª û½Xh1“4B¤u‰‹iBòT2%MÕa©Äl}ºº4U‹0ł#ˆ¶Ë:öçA™Ý·ÑaÃ*+¯2’ku¹›×{mjèr ¼K¯ç <³¶0䇽G©±K¨H²•«*|]vÒmOØÞ<øÂxþÃY:jˆ°;ÙùWt¹ܛšaKâ”ÆʐÖzè +I°xJúã&•Í´  ò +1g !Ãq!sΑËHv$BF¯L¡£A¶íï5Q/-Ã8ë¥q21K‰2gJÌrSm”¦j_ҍµgjN#ùÇÎUœivŒ8Þ: | îmN±ýsóÆ ¬ÂŸ¯4þŒZÌ49§É4æc]0¢sF¸W@m¢!q\rÎBÀø«À3™(áÁ†µ+)Vn +î¹£è÷œòˆzð¸9 ’{T§sä,ˆ­C™ +[&êC¹SÔڎ9wa—ïŠéåDöˆ\&»¬tå¶æӍÅøÆ®)r´ßªL·²ØM¶eµ|k~{öÖ(þ~yx}¼˜=Þ^œ Ñ§.‡úÅÌT±éÏus  +ùÊ"ª>À©«EñUŽsSfPG»£É4|˜<ÍN˜ÿzþ~óåcýççƽG.´§ÿ=4C,¨£ÝZ÷_Äö‡ÛíNåÿ?‚n¿ *åëaùãaш‚nÓÃ.ÎÅf<»y¼½©Ï8ì`$¢<Ã]ÃîÑvy¡}Õ1«v³âffhš5TÁ$·›u0ô—]·AÝÀ¨¸k¿Öþ6íc:endstream +endobj +1735 0 obj<>/XObject<<>>>>>>endobj +1736 0 obj<>stream +x½VmoÛ6þî_ñÔ6gˆ^í*ncHк¶Û"lâ•%ºb#‘®HÅ –ý÷))s¼(+Šb6ü"ò^ž;Þ=Çσ>½‡˜FHˁïú£©;Ãl~lþÓ§bXNãwæã9â5iDsú“¤}q:Aûbi.ãONà»s’¹ÛºÄø×Wño'?ÁaŸÉ„“t á¿V¦íÊ{<} +-ë4‡wT^!Ó+OÕ+u£³m]ŽìÙ¤‹üoÿüâ¿ð‡‹oà÷¦Yú’øÝa·Uà¤æ ¦ý|3iU%œõƒ¤õșcؗ¯¡ªç9·LDî3wêFnèâBIŕñý§½PÀ‘%7ÁXf’¨‹¯©5©‘M– 'Ó©Ç×nÖ“k:ƒU÷L tRéz•V|£]œkԊȱ¸ôe÷-,s:S74h:Çv½)A¬ˆTnéVÈm£ñÙj)ÉjÃÉyBDgi’8˜,…ÁÅ}è;~"×½ŽlðkN<šZ©:!따’éÜÐC3c¥ÑȘݩ¿Ñ¨Á¹“µ{»­x¸væð5.ñN ™fÞïY¤3ÝÞýY©é4k¡Y'±/\ïÙ\ó=·5 {ߍٳÉIIi7ȔZN˜ZîÙí7<[|è"ò6Š†>n{d­ÎìG§p¶_© Y?PÞÀžwÐ>Á5zœ^b8&C>/XObject<<>>>>>>endobj +1738 0 obj<>stream +xV]oÛ6}÷¯¸HÔlʲÛm†di€=díÀ-Ñ6c‰TI*F°õ¿÷”lÇζtœ8"ï×¹çܫϝ”øIi:¤Ñ„²²3`ŽGø=žMýw|Œ e8H§S6>>¸œw’ë½¥ù®&3|É nšgÝ/oæ÷õ‡)›à ûŠn7.±NWT k…EˆÏµ4"§¥6dy¹àd…yæÈ<ãVÐÙwéIutôÚzǯïÞ4ÏÓ›…ˆÇÿӇ\:rkW…Tˆî4ÙÏumàŽŠ‚;©Ýu+îÖ¶G[m6+£ëªGkmÝFÙZÇR¥ZÑíÍåÕQD”ÔÖ$…Îx‘„’“…T‰-9õ¯¨oéîîÔfψeZ-›û-ØO“øùåI¨6‰â’xྚ•Ïü¤²%ø»T@ §+.Jݶ·mãse{¼¶Ñ(?…êýû#8À]ž7²(<É~êiwì›ó/ÇߐË÷' B¡_g¿Y¾ï(.K¤’Žå‘,*‚þ¢Àtú!¢/g§íJoÑ–gþZr=¦4Ríƒ"/V\ªÉ¥§?x^9d±^¦V¥¢¼æå¡7Tê\ô Úªà™ˆŽw# ?cJ@ë/iÙ3 !ÄI63²rÄúAÐVºõ»ÿ‡ú—Ñôm;¥šÒÓ ;g#6Á‡~U¨õpú)dâ=Ÿb¼xÞÚ¥–ûšº½ã;-ÁïWUÉõÞ×!•î6ø[â~‚IK•–ÊõBëì:ôn!€Yڇ‘ D†›ºM“8±¡ïÎá”%”ëT R” a辶@ßîˆ!°8…qE5¨ÈZL÷|šÅ¾7°Nýˆ™$W5,[m£Tútqó ÆѶAyÍÑô’炨F¡Knb™¥·(´yüšr„ò£Ú]§W]2Œ§[®ÈÞÇ?À¢ñäÂxˆËkØ*'³¸ü^ÒÞ[ØKk«G!*h€çˆÆhÎV¼$?‡}͍,°`”ÀjƒóÅq`^8àšcéÄvZ'*†­s%óÐS#šnÀ¸äå‚g›º²¤‘“‘+© ̈(vyPw7L¤Ãfµ²ïÒÒgôƒÇDi0'׀ø Ìvói8‰ùÃOÌÉX µb ԑjÀt߯VÏ8<{Š™G ½l̂7Ð5Óe…¤vãdÇ«–±Œ%:‰²1²õSu)Ç;Dæ´y¤Å#0}Бè b”;™µ(ù÷’¦:£µ{ÝíEoc%@óφ(ÌêxwÖàNð²4áõ'êº½¸¹¼ OFß{^é¬.Á¦À oÙo úӁaê6š¡9Ƌ'/pR+KëЛñdÆ&çC¼_ù«Ã‘wñaÞù¥óEªÞþendstream +endobj +1739 0 obj<>/XObject<<>>>>>>endobj +1740 0 obj<>stream +x­XÛnÛ8}ÏW °/È—¤Nº@Rt‹ °E»?(h‰ŽÙP¤KRuõ÷{†mYQë½ØA‚ÀçvΙúëٔ&ø™Ò͌®æ”—g“lBóÙUvM×·7ø†_'iuöfq6~wMÓ)-V82¿½¡EAx|2¡E>Z9[RXK:_|Áƒ°eÙØÛÊå²y?Q¡œÌƒuuF‹—Ç6¢ü¼Uf©L‘yÛ?»RZ’_ÛJ´””ۍ’Ð6AYCvE5\“EXŽMLèrz•Í÷öÉ˼r*ÔTÚ¢ÒÒgôÁPYÓ_²ø]òµ²¼€Måi+üPvc­–ãd§e'C~´Z8åٞ$¸ï”Œ¤`Pt¯ +IÊô+:®¼û™ß¬‰#!€¤gsÀ‰¤µá—æÓW Ê7ĉr)Z¤ÆÆû­ +ùz|ˆ x}M¯>ìœLçÙ«ì*»É¦ý¡Lõ}üÎIùæñí¥ßÈ\­TNïß3³RO•‹PV.FÌñðb,CÎaeEòáÉEfVz26‘ -˜#každ‘Ñ}©| -W¡–]ä_Sñvi]7µUX^N~­À܂ÿç×AMbÁ|ù3H ~¹o*—w ‘.Ù[gN²[NPä¹­L8Ñ®4Eª^¤~ +„ ^?0ŀCS¡µÝFNV^²dZÕJ" qÐÒÕJªM‰¶=‰l¬+…NiµâÒö ´…ù í-äúid +ҕʍ ¼‡J?CR Hø"LA«°Ia2s…t¬piÄÖ`á¶áø‹^=•¢ N,h(ƒBJN$êb‚}Wˆ§ÈŠ† ûžshÞLòEF6Ï3§{G>g©Ÿ@„û^¬±ŠrKÉ'ùચȸ)q/8®ôa6óJA·Õ% éŸç¦Ÿ ôÓuŠÛÉ;´Lö=¤Ûîlݔk€ÝïÀ¦IÀmK[ëžiãìF:]_Ăm•Ö$4ԘJ'*îh-¾qs-Ô7UT cjÖ̊l3,…- h®šÐNŠ¢†7ð +nÉ΄”îtmN´³¶%Œ¥yº—-Hl!ˆ'i¤ëÖ²Pv㞋ׁ%G&(‘C¡èmh_J×PC@¬Ê¹m/”Ó9¾5¸½Â÷ñÊùxÿþÍ=}tö .ûôÖæU‰É´»ô]¦Ç/o&X ‹Q{{¤…ô7™Å=}¨»¹žßfóW3|ýÀÎ®ù½ßgžý Hx;oendstream +endobj +1741 0 obj<>/XObject<<>>>>>>endobj +1742 0 obj<>stream +xµWێÚH}ç+J!Œ4øÂÅÀ[ÈîFB«QfZi%¤QÓnCGv·Ó—LÈ×oµ±1d‡ÉFcaÓ}êÔ©‹«¿tBð/„ɆЬxDѯ£é¯üW ’ÎûUÇÿ0†0„U‚[¢éV1àò €íù)ßøšQ«¸Ùû9ɞ¬àß<-Ájö”p¥ÍSN´¾[}FœQ‰Óƒ” $1LÙ±Ã¯••ÃRÁŒç˜$2M%Š¹‚ÁD¡K³¸ÈYZ@Fbæý#ma„ZmdÆ¿VÖä7ÇXí¥UÎó†YžX®XƄÑ÷kœŸÚ¢9 ÙI}´¹a” K€ž9* mа{b0äÈ>eä++Œ€ÞkÃ2T¨tß2ɳ\jÍ1؅®Rš2 Á1 £C@»ÕÖÀ›ºøtyŒDÞ¼[÷ºë»ÚI€Ð G€ŸÙÌf~Áòañ¦½»}¿É|¯øvg`Ý£ë;g³¨—Ù=,­€N•<¸¢ïa!hAÔ©Wñ9úýÉ!høÄ0à_1?ÚfÚ÷ð88OÇ&ìَ¹Eͅá´È^ ¼ Û"h항{Ì<ŒÁýØŠXÇxï[­Î‹ÿ´p„®‡y»XΛÄ Á¨}£•ÀO3¬¡cNÒ'çv˜ñÛ)¤J_ +E´M°5p—S¯Täz˜š¶Âr2úH¼%Ä â†ªF,›õ™-䶱9hð?%8ù¥„•Þ¹Ú¾"‹ki^[1öÃñç³àæ—JЅ9¥Òb¢¾¾öˍ 7 5_™ñu(á +w57¬»ÔRŽÁ)Ӈbm¥æEPÅ\‹*>çkÐcò·0˜î·Ñ¡Nû[êpôÆ:ÔÉzÚp7ɇ‹ 7Ö¡ K†óNdW—REK—¥~³4íÂc9à^Ï«[«fcœÝê7šcv^?nÈÿá{þ ®åè9ÜËå›JµÓ!ä¬*#ió\*SœþdjÃp^ƒ¿Çś¢1/­{VP™¹)×͜nŒ­V¯ïœÿô<܄ ¦C<*•3Þrþð~J~fÔàlO­ƒ©OýjCày¤>„ÀŠiãf÷Õ¯>Z㠍¢©xsKc÷ìUç¯Î¿à(Kµendstream +endobj +1743 0 obj<>/XObject<<>>>>>>endobj +1744 0 obj<>stream +xµVÛnã6|÷W`û±|ìô-›4€MÆ.ڇ-Q2w%RKRñúïw%ʼnÖZ`“«m’ç2gf¨¯ƒ ñ=¡Å”f1%å`ébGSš/x=ů•”……Ùø"ZžZ˜Žç?žø¸ŒnÇtI› 9â%^¤„øã1m’³¿n>Æ4œŒr“ž}°…É•&Qû™Ê+£EAD£ÚÙQ¡¶#'“Ú*ý²Z_*Q>}±Û‹È™hBÞž2eª„sýÈMà÷ˆœú66 +Å×;ÔnüNÚw‰Ü¯=IL­ýúÿ|é®ÚŸËIçÀ…ŸR“colúÿ‚`×èvN“ICìá4fþ®HΐHS™’蝡BiI"ó˜%J{¥·J§ o³â åғU(-#¡µ9(Sjêm!©²¦¬¼£ÌØð䆤]C.j Ü9/ܛ=dë¼°ž¦¶´åV rʕQb´–‰ç~gMïš]¢ª +•D8˛3•×}AŸ\>Äñ§!ëèö’&‹‹Ù¼É?‰£8¢OªT>D š|‹Ú" +¸ýÕ@A;ᛮË-0Åñ,§Uèú·µ²Â¡œgi7B©{I;SI– ‰)%ÌjÒ{¸µÜoü9Œ3lêîªQ/ي?âY¨Bð80†€Â'¥ëoç´6…°ØÏØ®Wƒ\Ò¢i`ëÎËҝƒ~P®Œõ/þÔ‘ *ÿá Xo"­ŠK¨ ¤€ +"ºE ®Nvøñ¸å-ê(¼|N€ÂʯµÂi×u¯{¸©`Pæe„É×ÏÎQ]]q†°í^е´Ï*Áÿ½òHÏ=?už30½,W0rL«£ÓIëBº“ˆ6;€†Ÿ­Ä¨­Òp·¦,A>á~½nâ_ÝQºbzi¶çôç=€–:5¶ÑÂè6i:\DË î´æšùg/ˆCÉևq`ãx”PêqŒøš=ŠÙÐãê& R©4Ô®ÇöÒ.rƒËiW¢Ý‚Ù`RY¡ „ ¢é• ÏÑÕ~§d­9+(];pš0Þ²¬À*`â¤Ô´=¼¸­8ëgžª,SI]`D3O˜ù<­^¶×-±É`sÛF×-©† ™ám¦\c<% Ǎ-àmb¬­+jQg +—±æ ÓÖ ÞÂÞéê_aŸ]66pÝhÐ1%[¤̾ ā‚<Œ·_XØhA´×L§ ‚·çûâ àrfðUÙǃ­Ñ* Ñ˜)]‹ç–¡vP‹üÕðÃXαµá¬Ò¶À´*†’+~¸¹æ—’‘JäI,&­Þ_aÑ9çpºŒ&—4œ·¦û\DtmtRÔìpo ‹§¦i»‘ùځո Ù8:—…º;™ŸÐïùQ¼tZ®°.öÈ¢ZSY%¼¤;•XãLæéñᚘûNþ̂(Ì>ð™aÁg™8)J˜3ʘ]óÌŽaŽ˜÷²¦¦dhõ‡hÜ4ÍnžçX ‘€|$¦Š;«Sf¥1"…Õ( ©QebŒ/#[ëÀvA¥ú&û ©0ŸàZzfY;àeë1“ÏÊËÍ/Ãí»¾ºûxEÖ|Æ%K7&©K8a薻vۇ‹1?Ÿ¼-çñ2Š/¦xtæӘOþ¾ü1ø~ªÄMendstream +endobj +1745 0 obj<>/XObject<<>>>>>>endobj +1746 0 obj<>stream +xWQOÛH~çWŒx)HÁ„Ú7(W éšrÂRé´±×ñ^í]ß®4ÿ¾ßÌÚ!1<œ*Jpì™o¾ùæ›õ'SºÂ¿)-f4¿¡¬>¹J®èz>OnéúvÏ3üxM…|qs›ÌÆ×ïӓ˯ŸhvEiP7‹[JsB˜+\Éiµ§é"¡Çºñn£sZy· Æ®ÉX +ª^©óô_‰2]Ä(ókdJó3<6MèûFûÑ[rÅþÙøÈ5M§ý#³ErÏ<»'«Û­ó?9§4¹¤¨ÖY©¬ 5­v´-MVRVmÛ@™²¤²L¾¯2¡åTµÊJcñ(`ª!æ„í]Lçcp™ª*Ôu*…i pšPZšƒeζÊØð²-UK +Ìz­òµ ðT˜J“²ù¥ó€nlKk2¹§-µçÊÒïQnM ¸„[¬ ¡ü–r‡Öµ(%«º\¿‰<‰ýÐRÖy|h«©pU*ü É(yŠdE +.µÚDèw‘ªŠ¸'=Õ }q¶0ëΫÖ8Ë<ó·{I”*ÐJkˍ†weT¸qÕÁ՚žY;œÈ‡ òÚ ™óÜe]:´³›äš¥ñí™~›C|Ð+ô ž©R'šˆù‹!/æ‡_±6VšÐCªÀ s‰Ä´Ôíýã÷g‚®=¥_ž.Ÿ†¬ƒ>~ÙÑÓ q«vÜ|2u£™‹ ƒ‡(¬Be^WuBÐËY'³ò°|¾üóáîéòîáùå<"B·2tkԔ¤\¡â't? ÞÖ +Ëï)ñ˜)Þd-¼«¥1½¼äÑàãÓ(ÊsÀ Ø^eEg3Ÿ¹â@ÊÐ +ñ¿ÃS¢-Ë/‚¡E?—σñ}iÖ%†â]>ç±%Ê 3Ðãw®a¾°M€E&»¯Šöu$1„ËJñºv­Fö5Kj±L㊇z_Çú§Ý5z”ÓXȗu µK‡YPÌ=DÕ»S»#Ç£Rð +T>҂Èn{蓢løäì ½¡kçyÚýõ=³” *Tf*Ób0{½DØ;ú٧ԍSmëU.C‚v¨*8xëØ †Þ5\®8'*êUf÷r4èí¯½œ}|99Oúَ¾ §_vðÙÁnjx¯€ZèƒU¼ö®k‹@­¸¢Ý{Î!%c„’rWs+·fÄ<1!ó¦ÁV@mÖmIm”©X‘cGÿŒLÊz }Ä¢0új¿b¯Eð™Ë 4¢²:ñ$Ž¬ÞÁT£&PeNje¿°†¹á­† Çõy&";”´ÌŽ8–HœRý¥†wðQ–—ø-‡žôvv4”ìg+h:ªP¸Ý¹Îï3²ƒM÷˜á%žƒç(”®«r™ Û^"¨ƒÄ=?¦}¬ ‰ÂۅoÅ©#(ʲ#~—)=ˆ(>fVãð–Ö 1¢ºã£‚…i^¥wΎ¡ +€¿Ju2JêõZù¼â#&[jàô=©ËtÒWËrßû› ß|\xÔR轅‡WšÔŸ#Æ ÿýJ±ÌôÛm'³wàÀZu°Y^¼­æs“òrŠ ÎLaø@$G€¡óé/ñƒ  ,çezzqî(ø.ß(ìö|¸$»×ñ{.'·ãí ¼"2Ž>â˜9Ð^¦ÇAó 1—é%Çãÿæ興Mh»1ÞYq~HZåñºãñÂ*aÛyG÷£¤{ù²ÚY|ßLæ]pE{´×2ÕDÓ2:ôål|åõ +䝌«ÚQZ–'gd9Ê1€UÊD׊T°ü÷dõ叒:ZcچÅÀ›ON œÀê¸{}g)®„€¤ª¢HÄΆ{†òO÷n}Úï Éü°8Y¿Y0p“ý³}+>`m)jž+Æècµ²¢xøå¸XtՐ9ºÄ%HÏ⦠ºÂ–‚Ôöų zÍЭ¬fKåIáã‚2‚q+òZ‘ž‚\¢謐öšÎ7G©ÏÈbNQš¥‡ûyX;pyí‘vòÎfÓ¿TÝ`KaN4öç–!Îitë×M‹W²Õ:nµË¯·¯¯R‹O|Zþÿ¯n×x1¼ù8Ã뿲ÍLÆéÉ_'¿„3Âendstream +endobj +1747 0 obj<>/XObject<<>>>>>>endobj +1748 0 obj<>stream +xWÑrÛ6|÷WÜx:S{F¢-ɖì¼ÅNÒú!Ž©Mü’ „˜$X€´ê¿ïÞTÆÓiâdd öv÷ö ¿ftŽ¿3ZÍi±¤¬::OÎiq9OætqµÂë9þ9M…|pýÊû7›£³×4[ѦÀVË«mrÂ6çç´ÉNf«d‘Ѓ³i©+ìämÙµÆÖ§›oxî‚fXÎÏMç«d‰'Oî +ò¶ÒíÎÔ[Ê­öõ¯-í­{¢v§kÚÙF]Y¾ð¯TÚmRW)¦Ô´7eI;]6ôb;jÊž°Á¾–•M@Ðƽ¢\§Ý–1àäÙÕâäR?ë’lAs²ŽTàÿÂÔ9‰û„Þ–ÞRm[mU+{gsºn)uvïÊø–:ß)F¹Õ­'ßZ§s2€¢ÿiyãŠQ#RE†Ç°6ì•äªMâªù2¹`˜÷‡³MA¦ý‘#ƌê'Œ«üÎveÌNªIAj-µ/ — Ék÷¬ժ‡žñgýþó_ï?â++U«-Ö5p>*ǯªÎE…þãxln|Sª(ózÕ³2¥Àð;GŒ \C~j´m”ù\° +ô("Sx‚TÏþØ©çP̶´©*éxÛi¦²Ìvu{Œ¡”…îϪ4yÿ~po€ÏºÒU*µEeïn¡ÌÖµÎØ´8°¾>P'øÉx†!ìɹa£Ýu^¨:@„ýù²jÄmÄ*˜Î>,uÿ¸¦/`£973Þ5{årˆvåö¦ÝÑZU©z<¥LÕ¬6°fÛ±ûP?Ԁ»ìÏÚú¥²øxbôúézö4íQ1L¿'¢\Bw‘’Ly-ž£ʳ¯g@» Jeèhp"¡$઱»ÖoÎnï>¬)+ ·“ôs:Øæa±ßÐ]èÿmh,¬ƒ'-ýÝi4øçÕõ×Qá4àAÌ¡¯ ’s¹–y-Ïý§Í°‹bËÇâxëȊ*ã-ªÈñ¹ôB´9Ÿ¤jRÓ¶èÝ4Tƒ‡û¦µ4Ö/Ô(‡fE×yO²Ì>ÉaMPŒ¥ÈÄ|T&ò¶y–@ ri­3ÈH~!‘†ÐB4 + Æv¯ƒ™´˜?Ö쏇yôö Mó9¶ö­V9Ÿ=Íiþx:/?…·Þ·ÓûxÂõ^ï aäÑk¨-Ô…Ù£ûURTù¤yXԍäÍZü"Aäs£s!ÊaOè +~@€Œ•çÐÊO0j8ˆ+‹ÏÙÃÒÖ zp¬ÔZç:ïc¢à S‚¥æ0úÀ’>gFãp0XõB,pTÊ?ñœ¹{ ˆ†…Ø;‹îx<ñÎLaôXEéq&ïØpì¬Õq/*ñU*?ž2ÃÁ<]\„ù‰|‘Ð Ï*éÄÌY4·ïR€òá©¡oãX^›: ët©AË#aC³ä:™­Ae³S3äEx{‡OÙB]ƒ)Hגû˜ÏwMc]¡N7¥É”øÌ?kØÏU´ã/¥È÷\9ƒ–ód6‡zP:xևÜ`9€à$¨—àC¾Î͵ϜIáŠ2“óáÆ)´jª(í“›¢ÐrÀîáŸFچŸÕà Btº­¦ÍíÃl%HNz«BÍ Ç"œí¤ïÅ^aö5 +ò<6*· ¢0Dá;‘L".¸yAG¤"ãËÝýñE€ùá ŽlЎz‡U|ø×íÍݧµ„²ÿ©Óy°³†«˜½Ó«öeŸ`PÉE¹S‚Snìç°{~„Òˆ[8#Û<ÅW<Ù´ýù=¡nÄ¥Xn¶X1¢Ñ¦ý +8°ƒõ\¯6“̽ÎØu¡º²E¼ãªõ?«ï1ãñƒ†ð—³• “qƌÄùÙgQe‘¯4ØÄr ˆËd0°°ÁSa”òp\å.¯M|ù“À>KrqQÍDð"FFÐk¨M\Úçe­š—¨òµàa9$š‘hìM:à¼.Aח“ÃëûÍ؅P-ÄPpµÞ?Ü^„¹~Ôwkžyð‰=*ÖÆÿýý)ý1áÐƛ˜·¸áXé¯[Áُ'l\Ú®/%“ð +@QDçŸ0]c÷ã+R£]‹$›2 ¼ÃAÂH*hbÞOʝ;Ú²Ÿr#w‘«x£œ-ñµîjAËsùºµ~ûñæ-?ûÆíöÎf]…»—àç3¦ýòéêüš¿}ü×÷¹‹åU²¼œãÛ/œ_ñï7Gý í¶Zendstream +endobj +1749 0 obj<>/XObject<<>>>>>>endobj +1750 0 obj<>stream +x­XÛnã6}ÏWÌ[¬­µì¬“ô¥°“ º@“m“}1PÐms#‹®(Տï^dYŽR´¨È´HçræÌ0Ä4Ä_L#O(ٜ̞N>ß^Q|NOKÌL.1Hi ‡CzJzñEtÅý¢w”ji()´1dªE.KZzgT¾¢.žé糧vNqì„ FÖ»~w‹2$(ћm¦QʔR‘'²Wy)TÎR7UVªm&i£_ø÷V¥‰è[Ika¨Ï2§;Åéeɇi£jä‹,DF¯RX«i}˵„üTb JÉZaf×P&ÑE!“²O"OéQl‚2±2´k…7*'£7’D!tp ”išˆ­X@a½ìrÔ:ÃÄ¥ZUŒö§f¯‘—4šDÞµÎJe'ÁÓÖ¿T[‚éKeð<ýä<>¤«àðs·›þù3ïÝÜÍægÁ€atÉÇ컏ÿœºÍÂÆ×~ŒáMãõ׏„Ñ[XIÍasÜXAo²ÿíÓ)ï@ìx¯ëÁ¨[«OÐêÓÁÚÎvi§:o1|ò «ÁG?3‚ø·‡Ñ~úß4:pP§U~¢ÛCVŒ÷/kßøø·ãý«c1ÝQ÷»ºìgŽ¼î ×|6i%ר¬KŽ4½qÖà‰ŒÁ“s_užðϱÏ+ |Za’Š§oèHSoeãkÞûãÛý£KáCÚÔ bJ&NÐÑØs¶¡y/îÓ¨Oãù3QÒ-^ ,C…Å/zÀª‡Ö ˜6ýS®K0øÄ/ÒD¦ãGW â ±'`¦è/´a’ÍÁ±:'r­ãÏÓçõt=1¶Ô¾ŸˆhjLÞ]êÂÒ÷$œ3“3g™Ó­ut}(ȺI¶¨ ÉLÎuÀHe^]Áæ- 挲õH• +*˜ùYDwβÄ;¼ 1ÓÿžØaލޠa»áTžq­Ä÷¼§d_ÐNAýLŽêg5²ÕTR¦àÖÚÞZÃM€§–Ͷ‚Õe§36¢ ڒæEƵ㹞µ\TÈ4À,TÝËröíû#åð—Òåº}rÙ®]S”öšÃ“Z3تmŸdà)T9kêÆ9ɹÛ:‡+NïfSú­Ð?gô, ¨e‡K3k1CÜ2ÓÿóÉe4ù2Â?x÷芥~}:ùýäo²Ñendstream +endobj +1751 0 obj<>/XObject<<>>>>>>endobj +1752 0 obj<>stream +xíW[OãF~ϯ8P%^_hH«ªUBصè’/HȗxI<¬gœ”þú~çŒ7»Z!UªÔd/sîçûŽ? òñÐiHјÒÍ`¶¼yëÓw´¼Çƒñ‹Œ|Ï÷}Z¦G×UR(Òþ·ïfû ,p=òq&Ç39Ώ—>ÂÀC\-%j÷-¢»y{)‘H‰DJtÇRðKyóö„‚À7 +EÚB[Ev[¿]冞t^àj½Æ¥"#6ŠK¬ÕS\ÆV ©Ð´‰ÓU^(£TAqZjƒ÷ŠgÒ÷Ý­^cÿØ;aûzGêx۝t +=šBŒÖcÄZa‘¨ToØ:EkÆkè4V•””zgpÎ-îëGC÷º¤˜æzçEýR­4ˆ¼•6[¬&ó\¤«RùŸ0ÞB‹H£un,ír»òèÂR¦•qáHžéS¥Êç¼xKn.×ð¸Ü€Û#äj~{,°™W=½q–•ŠÃbŒNsÄ."i¡ììâòšŠNÞ\¾ÿõç÷—®~ f?x´äLȃQªX§ÊŒ` ëq®ötõ¢セ3ÇNýÍtHmâ0²’D£²~¶.‹T¹Œ<ˆºÈiœªóü"îÝäXµ^ΒÔúl&‘Àž3Me°ÇF‡?¦wRÓ¢ÐìÚ(êSœ>*Ô+bLæW(ßÒRMê’Mè-ºy7.&°,yîéÍPý¬ ɹ–$ŸÕ&$TߺΊóªÍBmÍêªäƒÁì÷¾‰\¹p>%ʞâ8ѕõHâͳn5ï£ZªTå[©Mõ…h@·IW*«Öx5îij ¶9Z®T(p? gÅlZywäó½óåà÷Á_‹¢8Œendstream +endobj +1753 0 obj<>/XObject<<>>>>>>endobj +1754 0 obj<>stream x¥WÛnÛF}×W ò¹h‘²e§@ìØÔJ -Šº0VäRژÜU¹ËÊ×÷Ì./ 4ujÃ4o;sæÌ̙åߣ˜føé,¡ù‚Òr4‹f4ŸÍq<9?Ã1Á_%)]®FÇ7'Ǵʱdq~F«ŒðúlF«t|£´(Šý„ÜVRaRQP)¬“­+ódñ?7Ùz­¥£„îÇËäáòþˆžTQÝë”ÄF(k·õ62SòõÀÖÅoVG3šÆó(Œ±ÐY°TÉTÉOÒ[(•µJoÎ?Á¿Ô®RÒFÔ@¥)ñ2aI€ŠlÂI`S9i×éVi‰ç  ’¥ù$3â ¶µø7yŽX8ô-Ê: Æ<âúQҏ¼êøfFo‡Óä$:aøwê~.=gt$úæZ—³èœ×LýO·‚(ÜhŽ¸Ïgƒ5ÁOÜ/b2û+"\_Løxéoýñʯ'4°v¸ð«çHñÅýø‡û#àlw§oûÓ«púbÓóÞô¼7=Gm4^æÁtc9‰£EOuÒãedý(è€×™‚äáêÅø@d‹lö§¾¸ÁûñõáÅNþ ó>ì%Øê¯@,˜õG&o¼ß÷0y±—ÿ\eå®¼.p—BrÚ•J"gÍB'—¾íµÑSQ»­©´AAY´(!"lêP§I¨.Ù¶2Z}ÆËF[ZK÷$¥þEc úš^6ê‘픮¡h†LšÖՄÖÏäÇm•…,™ºÈàq¨gV¹ÚÃñ¨¡šÉ"Èλœ$bG¼•©9ì1ëۇ„r¡ ëAç¦(Ì˨WjÁëÆEghɜÉ)5åŽ-áB“„~’U™ä'¬i*!Êë<‚S=R^‰M mnâ|Ö}‡?¨-Ï aۊhľ0@Ù‚Ô8i'0í=´FµT›íÚÔÕÖÐËb샟b|µ3#Ž¼ áNDžs²Ü -ÈñZ¦ŽOÝÐ÷zZ˜/Ÿ˜€ÂÓáhã8#íôÈ+Sr4ӃÙÅ̼wò7itGsÏ(ª"­èÏA³)=¸ßß-Ú\“V]ì}åpfqÈSóšO¦rÏÓÀC>Ltľ§:L[?˦ʚÃõX‘¥d´”îòÝû;ßA`/ÔÜ$­À€Ìs°f­U¥*ºÐ 2ﶂ£A¿xW JÆKW]T]¢Û2ŸŽoÞPŒMKŽ|ŸÒtÑÌÑdFt'ÚlCõ¶(zÞçgaŽ\‡Æt'ʵh÷ -Ü>X¯t†=-W°ë÷ÍV¯yš-ö@쉷ÎÀ„çw½ÕAô­Äë›ü`%íMMe ’E–ù4÷}kvÌrSÇdËu„ÒFA(¤šïƒ|+ dµ.|‡ÔhÓ^n -³…ý +RoµuW ]W§Ý±k+Èä©ÞíLåè'ÚK_Jù ’ô´Ã '²˜ÝU -¤"æ8z![Á¢²w¢BŸ±le2uá[¶#B;0[¹zO¦Èðö€_šÐ .°ªêz½Áªê çt‡­7‰}bæm×»M% l¾ö°é„€µ&¾€ÄÂçž -ÉÕÏyå[ì{Xz­ÍkN 6Òü*4§Ý‚•û¶ÝšúÙõêKæÇßâ{ü*tý£”\î,ÜUìö°G-štƒg²BÐí¾¼œ@|«põbà&dÉþÂÊûHM3«š>0¬>ï—×p…â[&¢+CË÷«Ž·ï²©|0Zlá¡šur:”YãµyÖJÇ*ôcP…g]=ì__Z‚-$³‰SÞ5ªJ%¾:¬”¡Ò–«”̤5ÏB?­=“™Ä$,PÓKƒ/¯êâ ‰Ò#ºJî -•òG øùk{ä6Lqf‚½ߜ7/ðw>Ç]»E¾¸½¼ _*ó‘çßÕ!&^9mLÏføÉÆßVГÅy´8Mðو×ãùŒÍ\¯F¿ŽþÚ×<~endstream -endobj -1756 0 obj<>/XObject<<>>>>>>endobj -1757 0 obj<>stream -x•W]oÓH}ϯ¸êSAIHÒ6mW©åcU¡–.1âaه‰=N öŒñØdóï÷ÜùH×Õ -!±gîǹçÞsýs0¥ þLérFgsŠ‹Ád<¡³‹ëñ9_]âÿ3ü­$¥ƒÛhðêÃ9M§¥¸2¿º¤(!ŸL(ŠOëP¤•¤ZÓJ’‘55%eŠź(sù/™f¥ðXª_Y¥U!U=¦C÷Y\i£Ó~ÒÆX ‰Ž>@õFâI%Ë<‹Eiõ"ú>˜Ðhz6žÁÿiYéZÇ:7´Å -¾„Rº¦¸©*\ÏwTŠªÎ⬵ähžØ3cº«)3Tjc²UNQÚÔ G^5‰ŽWëk´p.¿Þ=,ÛRˆ‰ -±c,™fJ&Cö¿ÝdñQ"©B;ó6g«ñg;îbÝäI Ua€ªukdõKV´jÚ)k…¼¹Φ?c6ÖÊFüâ¤$l3eP“²ÔUMoh'ÍIÇ/°…¬áåû—³9¸äoR~Á–Ú‘lÛJJ…¢«4[Á„vº¡¢1\ys€4ρÍØ©5B·fÁ•­®~¨žâ±·½Íê=-’¤’ƐNñål… -§DÕ~È%!ÇÒ Q9–¸W@üAº{¤àϟ>y¬²BT;çbiËr{…³!ð·ZՕÎ;6…’ùhñà²-£G‹èíãha “Läzm8Ư™JôÖÐõidæ=DcŠ4Õ‰ô²¥´”áµÒð1¶Pã -²©Îs ²¬)5¹¿ùîßë\¯DþìÅܗœ¥€SS¬Æ\ûN–@VúƒŸ¾úp±Ÿ"£À&GFÚZ(ðŽÓ:DøÚ]=  ÃՍD#õ]áKÄóôúÔfŽó6T>³Ú´üviÿ 1HìP°4³ÜYFôð)¢Û÷´|(˜VÈÆ9=êIè€+z¦O=„$ó4ðØוöÄ·M{ÀôÔ!ÙnëcäNOH—¶bB¹÷[µx͐-ž³¸©b•t"Þr'¥"˙/¦FwŒlÙÐ܄6?L_K%ªLJQ Ì‹¤„E‚ç•ÕUê:…L³ -Ó%‘5üáHÿN€ÁOAaր¹0¢¸(¡£®/†~L0^áéCt˜^N"ˆUžÃܦã“ǜ퓶™wº€G—zIÃÉÿdBíØ}äÌ •¿ãÁ:/ÆáՇkšB½YÆGgçnœÏ&ãù˜–ìn=ÄÌf¨Í§ÏÿüüéË#›nï£ÙåxÎz€©äYô{+õ,Î{€\] ™Ç>‡Y¡žKË*Œ’&› â‰þ9ÃÜg º†Ì承¢|íÖÆðx‰¦~ÙñÊ '«Âaì{›o݈Ïe5Ä4¬!¹ëMFѾ¶×­…0tÊ\ì ›ÜÑÐi¾½°tè8æWŽ=ÞYá°l@ˆ9bÊy×á0ÝŒmƒ‘–Vº \ǂu×fî/B3Qa´«ÍÌöW—¸–[vsöÍFÁø: öºÒM9Å9}ðš=ÃR`ÑK,÷}<tCZKBhûmX„°kfFs¢ÉÁç%xƒ³,@Ô.xv9â70TnŠøͯã—Ó(±J`YñpEéAåÍýVˆµ~ÂïJdâfwÞ}Èyh°ö~l1íwo*tJØaœ¬ƒun¨cÙ¼ vÄ%®I¿Ùèì‹hÕTÜ7Õ±3×½v†ŸÜ” ìa—ðäyÓ·Mðùc }~}8Â.³Áñ ò‹k»ÇçÕüŠ,rAÂLj¬*ðÉîðL_óX•âAoՁV؆ªHÖºƒ/¼Ò.àèÖç@±ë;ü-T&tíGú̏ôã$÷ ð×Ód|Å3û(£¾t™Ÿ}‡ Õ9’Êñ1¿èÝªÃ³ û$[m«aV<]Šðe÷x|lýl²Jz1»òÛätŽïÕ«3|™N"-oîooûôw¬¨˜úî“rÿ9 -F—@—œþŽžÏ¯Æó‹§gSNû}4økðÃn:endstream -endobj -1758 0 obj<>/XObject<<>>>>>>endobj -1759 0 obj<>stream -xÝW[OãF~ϯ8⥠ÇI U©DhQE ›H[©ôal/¶‡õØdóïû™±76—vúR!DÐ\Ιs¾Ëɗސ|ü i:¢ñ„¬ç{>§3oB'³)>ð[HŠ{óUop}BÃ!­b™Ì¦´ŠÛ}ŸVááB~-i§*ÒU¥É\W8XnDIR„R1þ‘¤« —¥¦På¥HrM‚2,'¹ÛŠœDX’à•T…"ź.eAA¡¶cU­>÷|êÇÞYò½[U<® U=yt‘ïèvIŸ’< Z¬£ßÜF¾?n‚¹4I"H[Q¤`¢9ô6IÓ悳¯x.aM‡"-ñÞõ†ß¦qÌ#¾k-K”-Pª”e -…P1֎I+JÊ4åªD)PAk¥"J")ø`ŗðUG­Ò}D†øK‘‚P‹g”ã*idÀu‰Ušªm’¯I=•‰BÁ“Ü,ü¹NU Ò¿pOÈ Mƒ²ÀCsbŠÔåG=¸öéÌö½?:ñN¸æ‘Êоº7çxP¤ïÍxC«w紓º³á©±, -.mðk›”¦T>˔ÎirjsùÂþh‘.•)§ëãÖØë¬V½ðRƒG ÄcÂnÔig[¾>”Y,¤¸ÊÛM‚f%Íjä)‚¸Î­ç:¨zîÅ£‰­Ù -ûö7Г(D&ނû¤]®@»$6ø®n (@P7Ë< *Q™hj˜$Óºõ9éReõD‚ÌwוßÏ ª3Ü$½Ì öjÃó¤¬[ìÊãHøáÞ݋¸º[ ›ØHÈF<#ÍÌm芮qV¶i6‹Í6Ñ Þ»Màs¹¹–¥%J4󽓧H\¨ í UÆtyƒWÁ„)KÞÁ }/½:õC¶dìtz±§n8Ö|Nsp}FC¨<Ë}lH?ò½©GK÷~ eΚ̵àÓåÝíÅÍžÝgévžºî -¨¡ˆ">µOLÍ}è¢÷—Vbšþe•.­pBÛª­óÆ1:åm‹TÍJšï(’±¨RXV+â}‘d¢ØՑ?À£ -è'ØÉ¢‚ڌrPZÊäwÑäv½´-‹[>¸àYƤ€çäkç8A!Å#%q÷i…\'쁨0gïï<µm!ËùÍݒLª‡¶3? ç??Yût³X¢k¸UDµôß_~è2òï®-[!8‹%hÄi°²:¯ÙðÍr wÒe†ûÕî6\ÖHá»ï@5z¥Ã" d´çˆ­ËP®}UmtæŸ<°úÿ㈎iµ:Z=m—,†~Û ¡qc|ÍlS+.cÝÉ.+nÝOF<¢SBãÕûŽNÃÖ³¢=Ã=eññ,Ëeeæ?€ªˆ°³b“‡q3ivNۉÛF?f3l¦¨ò=b,›Y,’=S 3û4Ýzx= \ß}üp³ø…–·ó ZÝÑüªpõëÝ^,WW`xb—8®¦ô{´h?‹ÓËd0³Ý|ì$ ©a ¨©g傋Å'Ü`íf–Nb"݊æ©Ä½›¹úÂÿŒã•â‘ûI¤d¯Çì  ¤ -3&ðÆ;A_eߞS~¯KÒ«¾xÚ|ûÀà÷ÖÚV¶9zÕüè¥ÝÍÜýà ¾ùÌÆ4™žZã²0¸/ÔgÌKß°Ê$¾½ðÔ̅è×úScrtø¯mòd‚oZ§#,N Ç#¾íjÕû½÷7p6dDendstream -endobj -1760 0 obj<>/XObject<<>>>>>>endobj -1761 0 obj<>stream -xWÛnÛF}÷WLõä6£‹uñCl4Œ6J © -øeE®ÄÉ]•KZÑßçÌ,)Kk¥( ;!¹œ9sæ̅ÿ^ ¨ŸM‡4šPZ^õ“>Mf÷ÉÝͦøÿ¿•¦<N¸Œ<.¯>~¾§Á”–ؚLÆɌ–ÁR¿OËôzØOf }vUj얼*׊jGkMu®©T¾ÖՇå7X¹£Á X¹N“ ¬\¯r>™ºR{9Þ çi]¹½×UŒ§LÃBi¬Îh} eI:­³´«\ª½§Æ³k¼£²þ|BŸTšϱ÷>ÝFɐ}îTú¢kJ­•±žÙ¦\ëŠÜ†vªR%ûó´Ï lãZÕð¨Si›jz¾^åŸ?àýÜùš|îš"£\½j2–£‰üv°z<ÀîF5EM á«ñˆ_Ñ«®T¸ý©e3Øj<îó¡Îèrô­_µv þڃ³½NZ¿Ã ҌxŸ6tp í•íÜáÕ= žØʵ Ö<˜á¼õ<êW]ôh[¸µ*Èí„s¼çËuö6 Á›mò‡ïŽë§º‹T÷ú[r5º£½ÐUªÐU U'˜Ø %ˆ*òH©ïú{ªwuw— Œ˜'ý/Ï"*NãBº‡ŠµFŽW›Õ|f´2ö~|CkÐk]M_|'ƒ0i¾ü8üº¼„NEHNRæJN„W¹¢@H’w¡™Fλ.oK)Ÿï¦lJê²Áõ0£°N3|,À *RŸ• *Æתª›Ý çW]²!덮*TX¨¿ÿNzcï }/i•¼7H¢—BPä èúÌ^¡?µÕ$y ݹZÛÚ@\çeϽ‰PèLLü]ä8z‰µÅM˺ªsJa醔'JA Õ{'…롨}®Ebøƒ·(Iôý˜\…tGžqOxFõƒT¼Å—%š"߬-ˆ]#FaX ôŽA)Fõum2vº2.3°Pp—ËD'Æ6|¹˜Âôû$C`®Ê -˜UðhçŒÅ‚»(#ôqE½Vºçï÷Zä(_pŽÎèÊRÛ *’ôqÓQ…wBÂ[üQ,Ádá¶lµBa´£DÂd´Á¨®ŒÎ±˜@÷¹+ 2ItE<ÌAGär…›PB€Í¦¥jÓÙE~MíÉííۀA¸®P5 ¹~G¤²sޛ5À 4n—fÛ@Y,»P£˜ohÒUÎ†–vž³‹¤K  ã®Ý.¡Ä©x‰ñˆ0^›TâlóEãèe8Ѷ[™LHyõ fÄè‰Ð.Úmûø˜0ƛZc@é!àÙ ÔN…\H£?ñÌÊRE¥UvàôF~/;ãâ Õ¡LÁ®¸#TîÕdšÐoò»a9Ç( ÁqÛiw±ù×¥4Ÿ…JŠë^&Ra¨^¶•C•EyšôuËÍ7T |¾¤ßd¨ÇpV2^Å-Ä÷ž£°Õuëq·î†E1s -A?#kۑ²Ö5X;Ñ`‘ÜçëReq1ü6Çì;X`m ƒjS¹òb‹ƒV `ÄP ù–ñƒaWáDã¢DwŠóv°i^9kЭOųñ³ÁòžqúÛ­F;!|úd-当4XÁ?HmP&:l„1ì–'‹3ô^}ÞfÒ¥™ìh‹3A및\ütŠã}#¯´̶ÍþùÚØ´h²cKàö…‘̶ÊE“5ŠVOóEû:ÇYiÌ$v®ëǧ¯ ŽöãçYûe5˜à£n6¢ÉT6ÿÅ×Çú³rßðÁ¥¦ Ë ɐo»ã·Óþ=)üßO¹»É,™Œ‡øÄKƒÑˆA|Z^ýuõd\Ê(endstream -endobj -1762 0 obj<>/XObject<<>>>>>>endobj -1763 0 obj<>stream +ÈñZ¦ŽOÝÐ÷zZ˜/Ÿ˜€ÂÓáhã8#íôÈ+Sr4ӃÙÅ̼wò7itGsÏ(ª"­èÏA³)=¸ßß-Ú\“V]ì}åpfqÈSóšO¦rÏÓÀC>Ltľ§:L[?˦ʚÃõX‘¥d´”îòÝû;ßA`/ÔÜ$­À€Ìs°f­U¥*ºÐ 2ﶂ£A¿xW JÆKW]T]¢Û2ŸŽoÞPŒMKŽ|ŸÒtÑÌÑø,:èN:´Ù†êlPô¼ÏϹ#èN”kÑî¸}°^é {Z®`×ï=š­^ó4[ìØo=œ Îîz«ƒè[#ˆ×7ùÁJڛšÊ$‹,óiîûÖì˜å¦ŽÉ–륍‚PH5ßùV Éj]ø?¨Ñ¦½þÜf- +ûV¤Þjë®@»®N»-b×VÈS½Û™ÊÑO´—¾”ò$é7h‡Nd90»«HEÌqô&Bþ¶‚DeïD…>cÙÊd.ê·*lG„v`>¶r-ôžL‘á-ì¿4= \`UÕõ"zƒUÕAÎ7è[o6ûÄÌÛ®w›J@Ù|íaÓ kL| ˆ…Ï=’«ŸóÊ·:Ø÷°ôZ›×œl¤ùUhN»*÷m»5õ³ë՗̏¿Å÷øUèúG)¹ÜY¹«ØíaZ4éÏd… Û}y98øVáêÄÀMȒý…•!ö?šfV5}`X}Þ/¯á„ Å·LDW†–ïWoßdSù`´4ØÂC=4ëät(³Æk󬕎UèÇ  +ϺzØ¿¾2´[Hf§¼kT•J|uX)C¥-W(™Ikž…~Z{&3‰IX ¦—_&^ÿÔÅ¥Gt•Ü*å ðó×ö Èm˜âÌ{=¾9o5^à;ï|Ž/ºv‹|q{yA¿Tæ#Ï¿«CL¼rÚ.˜žÍð!“¿­ '‹óhqšà³‘_ŸÇlæz5úuôý#<‹endstream +endobj +1755 0 obj<>/XObject<<>>>>>>endobj +1756 0 obj<>stream +x•WÛnÛF}×W üä’"ɶl‰;—Â(츃<4}X‘K‰ ¹«î’Qõ÷=³‰¢åq`8wçræ̜á?½1ðoL—:›RZõFÝ]\ÏéüêÿŸà×HÊ{·IïՇs)ÉqezuIIF8>Q’žÖ+¡H+Iµ¦…$+kjÖT(”êj]ÊÉ6 …¯¥úQ­*©ê!ÝXº/R£­ÎkøÉë,d:møÕ+‰oŒ\—E*êB«ɷވã³áþO×F×:Õ¥¥¹¨ð%”Ò5¥1¸^ni-L]¤ÅZԒ£ybÏ鮦ÂÒZ[[,ÊxŠò¦n8òªIt¼:_ƒ™wùåîaގbLT‰-c‘ɼP2ë³ÿͪHWˆIUڛ÷°y[•HW8Ûq—ê¦ÌZ¨ + T[+ÍihÑ´SÖ +ys)¼ÍpÆ®œ••øÁII:ÙÊ¢&ëµ65½¡­´'¿ÀNT²†”sN¦à¿Éù[jG²Bl )Š®òb 3ÚꆪÆråíÒ²>.[`¿+R¡–ݙW6Ú|'ažâ±³½)ê•;-²ÌHkIçøˆr¶‚B…s´¿ä’‹€Pˆ£Oy¨ÛÁì12z0KÞ>f.‘h0+D©—–cüR¨Lo,]_FfáÓC2¤DS-‘ÈQÖ¢”Ž2\¸V!Æjœ¡C6×e©A–%• &÷7ßýkYê…(ÿ†½”û’³pj«ÅkßÉÈJK¿ñ·¯>\ì¦È ²É“чö†f +¼ã´ö¾öW÷hu%ÑHÇ®p%xú}ê 3Gy+ ŸEm[~»´Ð$n(8š9Hî?Ïzø˜Ðí{š¿O"ƒ"L+dãô¤tÀ=Ӊ§ƒB’eyì†ëB⻦Ýczê‘l·õ!r§'¤×®bBù·kñš!›=gq+RÕ"ëD¼áNÊEQ2_lþ²¡¹ m¾Ÿ¾6•J˜B[ÊQ ̇¤„E‚ç•Ó…õȎBæ…ÁtÉd 8rüN'Àh§ 8kÀ\Q\”ØQ×ý0&¯øíC²Ÿ^^"ˆSžýܶã“ǜ듶™wº‚GŸzIÃÉÿdBíØCäÌ Uˆ¿ãÁz/ÖáՇkC½YÆgç~œ/‡Ó!Í÷Ø݈™ÍP›ŸþøýÓÇϏlº½ &¸Èz€©äYôVêYœw"?¸ º@2}ö²B=—–S%!5L6Äýó†¹Ï<t/,+˜Ë¿ž¢|íÖÆðx‰¦~ÙñÊ,'§Âqì›oýˆ/¥éc֐ÜåÊ%£hW×ëÎB:ëRl!›ÜÑÐi¿¾ptè8æGž=ÁYåpl@ˆ9b*y×á0ýŒm‹‘–]Q©SÁºë2¡™¨0ÚÕeæú«K\Ç-·9ˆHûŽf£`|{it³‚âœ>ø͈‰‚žq)pèeŽû!žNº1-‰%!¶ý&.BØ5 «9Ñlï³O¼Á9 @j=ûñ*?EÂæ×ñËi¬±J`Y pD@åÍýV‰ïµã„ß-”<ÈÄ>Ìî ¼úóØ`íýØazܽ[¨Ð)q‡ñ²Öù¡ŽiäNð.ØI—¸&ÇÍ®Î®ˆN-AÅ]S:ópÔN¿ã“›’ÝïAƒoŽm|þPBŸ_ƒpË,Gp8¨ÂâšÀîáùHµ°"‹ÒBð2"ŸÜÏÁk§R¼1èÚÓ +ېɀd­;8ðÂ+ÝŽn}·Þ±Ã_BeD×a¤OÂH§ðs˜ì~‹ ¯xvǓþì`@ÝfÉÏCËK$]â%czq¤,N=ž-Jx‰rlà±gÉÓ¥ /XnÏÇËØ?Mad»«°mŽ§xŸ½:ÛëØ+Öüæþö†°oà + U𯜻·ÌA¼0¸ÚìôW$ò|z5œ^L °|ñlÂi¿Ozöþ}VGendstream +endobj +1757 0 obj<>/XObject<<>>>>>>endobj +1758 0 obj<>stream +xåWKoÛF¾ëW |© X%ْ\Ô¬ØnÂ²Hº‡%¹”“\‡KZÑ¿ï7»KF¢m.½4A`û˜Ù™ï1üÒ’¿CšŽh<¡(ïùžOãé̛ÐÉlŠßGøWJJzó 7¸>¡á‚G&³)1a»ïS.ä×꘶ª&½Vu“,tƒÕZT$E´&•à?’t²Ò©¢i¡IPŽå´p{#Qˆ*¼’©HdXו,),ÕFãg¢Ê£àsϧþp썐Å!ß»QåãªTõ“GŖn—ô)-bœ E0ý6øã~0òýqÌ¥Ja†ØŠb…S}Ì¡7i–µœ}íÄs kz8Y…÷®Öü6kdó]+Y¡l¡R•Œ)W(„J°vLZQZý ©PJ²Z)SKÁk¾„¯z8ò(PH÷vâ/E +B-žQŽ7ª¤‘×%QY¦6i±"õT¥ +O ³ðç*S¡ÈþÂ=/´ ÊCÍI(IQ—9ôàÚ§3Û÷þèÄ;ᚓû«mlztŽ‡5ÉúÞlwã^/Ïi+õŸJ™È²äÂÙÆ¿·YiÊä³Ìèœ&§6×o í&œÁ¥2åvýeüؖ›x5€·WOTÂàÕõ˜°uÜZHlD‰_ªµƒ4JR܅Í:E3ÓöM 2a܇½ç;({®£‰­i€}»èI”"— Á}Ô.W å]’;|W·” ¬›e‘‡µ¨L´µL“Y‚t%ʪ~"Á绛ÊïæÐ5®SB†½Ñ´jZîÊãHxâÞ틸º[ ›ÄHÌZ<#ÍÌn錮qV¶i6‹Ñ&Õ æ»Màs…¹–¥'N5ëA'O ¤T9Ú©œéôïÂ-UU¼ƒú^úuëÿ†Œo’¶ Ðìͽ °Ççg ®Ïh—`»èh §ÞÔ£¥«Ð4gMçZ1èòîöâfaÏî²x +;]÷ÔTÄ1ŸÚ%®æ>‹V´K+MmóZWVx¡ å½óÆq:åß·†µ4ßR,Qg°¼½ˆ÷eš‹rÛDþ+¡¿`/‹h3*@ih(m˜ÑE›ÛõÒö,®ù4₇9“žU¬œc…¥”&ݧ•r•²‡¢FÀ¤½¿óÔN´…¬æ7wK2©>ÚÎü4œÿüpdðÓÍb‰®áV7Öqù¡ËØk¼»±|…à,¦ §ÁÊ릀†-ß,›p—!e. ¡¸_û݆K©|÷¨±F¯tT¦¡Œwuï2”kWu[ú'í„þÿ8ªcb£®V÷Kš@ÿíÒºˆ1Îvvj›¹àd›»é7#Ó)±ñú]Çça‹€•YўᦲxÃøF–õª6ó%@WÆ،Y´ÍÃ8“™÷Œ´;§îÄÝgf(3Ìn‰µ¨¬‹=b¬›Y/–m3 „3;5 ÁÎͤup}÷ñÃÍâZ^ÜÎ/(¸£ùU'`ðëÝ^,ƒ«°<±K,×SúÚì?‹ÓËe2óÝüí$ ©a h¨i儋Å'ÜàîfžNb"ۈ­æ©Æ½›¹üÂ?ŒcVâ‘ûI¦b™oÆø (¤ 3&üÖ[;A_eçŽÓ~¯ËÒ«¾zÚ~Ý`p´™«V;ˆ ·o¶CzÕ$é¥ÎÜýà ¾¬fcšLO­±Yܗê3æ-ÈsTç_G<•s!ú́þÔÇþk=™àKîtæSã1ßvô~ïý ZæpQendstream +endobj +1759 0 obj<>/XObject<<>>>>>>endobj +1760 0 obj<>stream +xWMoÛF½ûWLur›Ñ·äC6šF§…T|Y‘+qcrWå’Vôïóf–”¥µR†\μyóæƒÿ^ ¨Ÿ͆4šRZ^õ“>MçwɘÆóþ?Äo¥i#†³.£Ë«Ÿïh0£å¶¦ÓI2§eF°ÔïÓ2½̒yBŸ]•»%¯Êµ¢ÚÑZSk*•¯uõaù VÆ4+·ÃY2…•ëUÎ'SWj/Ç{á<­+·÷ºê‘ñ”iX(Õ­¤,éB§µq–v•Kµ÷ÔxvwT–ŸOè“Jóã9öÞ§ÛÁ(²ÏJ_tM©³µ2֓"۔k]‘ÛÐNUªdžö¹£s\«uª3mSMÏ×k£üó¼Ÿ;_“Ï]Sd”«WMÆr4‘ßvBØݨ¦¨i!|5ñ+zÕՁ +·?u£l[Ç}>Ô]Ž¾5ð«Ö®Á_{pVã±×Iëw8Ešïㆮ¡½²;¼ºÄ[¹¶Áš3œ·žƒGýª‹m ·V¹pŽ÷|¹NÀކ! x³ÍA^à°óÝqýXw‘ +à~BK®FcÚ ]¥z]µàQEq‚Ɂ P
"€”J𮿧zWww™ÀˆépÒÿòü!¢âþ4.¤{¡XkäxµYmÁgF+cï&7´½ÖÕôeÁw2“ž–‡¿ÓBW€—ÐýÉ£ÉéAÊ\ Á‰ð*WIò.4ÓhØq×åm)åóݔMI]6¸†“IÖi†¸AEê³rAÅøZUu³»áãªK6d½ÑU… + õ÷ßIbì´ï%­’÷IãRŠ|}@ŸÙ+ô§¶š$¯!£;Wk[ˆë¼ì¹  +‰‰?¢‹G/±¶¸é€¢cCWuN),ݐòdB)´zï¤p=µÏµH Ðaàå!‰¾›«îÈ3î Ϩ~Š·øR£DSÄ⛵±kÄ( „Þ1ˆ#Ũ¡®MÆNWÆe +îr™èÄ؆¯#÷S˜~ŸdÌU´ó¡³ +¾íœ±Xpe„>®¨×J÷üý^‹å ÎÑ]Yj›AE’>n:ªðNHx‹?Š%˜ì1ܖ  V(Œv”H˜¬‚6ՕÑ9è>wD&‰®èû'й\á&”`³iA©ÚôEv‘_S{r{û6`®+T@C®ß)„ìœ÷f 0Û¥Ù6PË.Ô(æڇôEU£³¡¥çì"éhGBç¸k·K(qc*žFb<$"Œ×fU£8ÛÁ|Ñ8zN´íV&SR^}ƒ1z"´‹vÛ>>!Œñ¦ÖÐ@zx6(µ€S!ÒèO<³²TQi•8½‘ßËθxBu(S°+î•{5OÙ¦F®M +ÁfÍ”M7Ýð†J4BŒÊ3ۑßv=¡ ;àg§+Òíh/6£»„¾¨—“ÅÞ¾¸ ó“¡ÆüÎÙ *|Š1‚X°ü0ò€Š +ƒˆ+ Ä‚av`P©'Ô¢T¦ä·RlS.EÄq|ºÞkÒʐ®PË|XÆu¯JQ8Ü©cœXÒ0XUÔ7~%؎"wÝBq¶ÉR5†ÚG:ã­S~7,Ÿ0JBpÜvÚ]ìéëRšÏB%Åu/©°T/ÛÊ¡J„¢¼ MúºåæŽ*þ´¤ßd¨ÇpV2^Å-Ä÷ž£°Õuëq·î†E1s +A?#kۑ²Ö5X;Ñ`‘ÜçëReq1ü6Çì;X`m ƒjS¹òb‹ƒV `ÄP ù–ñƒaWáDã¢DwŠóv°i^9kЭOųñ³ÁòžqúÛ­F;!|úd-当4XÁ?HmP&:l„1ì–'‹3ô^}ÞfÒ¥™ìh‹3A및\ütŠã}#¯´̶ÍþùÚØ´h²cKàö…‘̶ÊE“5ŠVO‹öuŽ³Ò˜=H쓮¿.8ڏŸçí—Õ`Šºùˆ¦3Ùü÷_îéÏÊ}Ôš6,4 'B¾íŽßÎúwü¥ð?åÆÓy2 ñ9È/Æ âÓò꯫×ËÊ;endstream +endobj +1761 0 obj<>/XObject<<>>>>>>endobj +1762 0 obj<>stream x¥VMoÛ8½ûW ri -Xª>Ûé­A·@Mwa¹äBK”ÍF"µ"U5ÿ~ßP’£(ÙEa–Mræͼ7þwS„WL›„Ò5eÕ" -#Z]ÇáŠVÛ ž¼IE¿¥¼üz!M6áv¾p³_|ø²¢8¦}$ëí†ö9!AÑ>»Ô¢’6¤Û‚žLÛPV*©%lF—OÔZ¥thŒÈ3aqX¬)Hº“îæöێ|”%¹“Ôä:ƒl´Ô©²$“emóñýþûµÉEíóKŸ­4™(©B\ÙpŽÎÊf8uÔjq(%§+”ÎIPn*¡ôlÿ’„%å†\ GKc€“FÄi˜pNp'^䬶=héBÞ 9ãž8$þ ¿œ¡ª¹ûÆÐIԵԖA¥£“)s2¼Þc :•Ë¡*•u@ç¡·¨Œ„s²ªÑ]œY&-úŒ֑Ò3¨î$Ü`¬íEGF¸ž) Ɵ尯ŠKúâ‚䊂ô:\sSn‹%0tò‡l–t0îDVTáq¿’D¯A÷·w;BIþ³þÛüfF;‘9OÈ$§õŒ–J³=˜žyDCe#ó¾BôEÙYÛFf8P÷j’jÙ+þ- öbjd&Dî!¼ƒÈj/–‰ Džƒ°È -´oëóL¨ü‰ÂF:ž›³Æ†¼,Ž?UUß©^ˆÊÍáûñü?"&Sþk‘qõ#[géaPæÜLøãf½Pí™ôzF'÷ÓãÑbFS°ÞÀcòBêc—©ørM1¯À8Côë Ñ'QG!ÝÇñL랎R¥Ç?µÎö:ŒL/øGgšG†Çd]Dtú<ÛåŒ. Ӑü)ª–Gz¥Î¡&>zxÏêԶמuz”3u׍!V°ë{"ܒ8è= ÓÖ,@ÑÆa4eÅ.cÛº6ãðL霋â©O½ÍrKgy½3³ó³—±Õ{儝Ñï`½@àeþÜm Iºêž{ ÍmK§|ñC\اy³Á;ï@ÚtcáNAy^*Õl¤@ƒŽwˆÙ=o|Þð²Ó³Rµd{1L)çsdj§p‡€2[B ¼Öªc‹ ªvÐå¸þpyj™¥\:¡J;´i;ÜÇñ·û6¥tõÍÚ}úzó‰þnÌw sül²¶Â},8/# ÆÁ&ºþ-!¯ÖÛp}•àä§+Žö×~ñÏâ?%h³Œendstream -endobj -1764 0 obj<>/XObject<<>>>>/Annots 1012 0 R>>endobj -1765 0 obj<>stream -x­VMÛ6½ûW CÀÖZþÜ »IÝä°(Úuq”D[L$Ò);þ÷}CJ²£dQh$9œ™7œ÷fþÄ4ÁߘVSš-)-“h‚_ºþø•¡Å"Ž–TÒ|͛‚žWŸ%Åq-®§«I4£ùjŠ+%MïæÑ´ùâ«×ß%ͦKø¶þôvÝÑ|q‡;8oٓÿâÓëoœÎ}œîôa3¸YßÑtB›°-W·´É<$ü’ßäâàdEÓ8¢wÆ:¥÷$èQ¥•±fçè­²®RIídFkUȗ›Oƒ §sx>­“%¹JJ2šžD™6à€ñ*Ï)Œ1Þkø«S§Œ¶ÁtŽR5¦Ó`Ãt“ËoSl;4½ÝÙíK:Tæ¨2i‘p)…¶dvdåATÂÃpðR˜½JEAG%O|¼ØëŒ2UÉԙJIŸ0ų¨Ë…£ÚÊÊ›¤]e¾Dêj¸:ägë}&E à`Ç0°’*iM]¥rð-ÝÉTŸÛ‘( -s²´Cþ¹Úç²jjÙÆG¡ -‘¨B¹óˆli Œaћo×O¾²þˆR£wj_s9”Ëù5Ø÷ÍZ4ý6¤ñ˜OÆ¥Ív½^’9ðÓFô›N%%µ*Ü»¿j4Ê•M…¦Dp†Nñ¥h’3ÚÈu¹/ ^Žc -ôl?%_Éï&Äm]J¦ª -­®B­<{†¶L"F~nI5ôß°í´¿LMàÚká8[›ó›&¿a…Î ¯á{8œò(ŸMÛgìïõÃwiGtqޒïÌæWµlEÄw”õö…ÒŸm‹™;Û³ü\&¦P)…SÏ؃QÚqC5´ñÏb1äQ -ÉOh›«½ÈìˆBò]I?ÕÚ ÕøgïUÃÄx»õ%‰ûX›‡ õê ²n ²èuV5”·uч\ú¸ªÀ·{ðÈD -i ŽZ'¾#ö}&~ÄJ†À JÁ![ýhå -\ô‰‚Ð)¨3êb‹?} Û—mµzÀ8Xö½ÐyVë\ „Žö¨^ ½gµòzúAéŒÅðnÁiN'“I?Â;YɟXª¡6þñ‚º"Շ¦UÛÑÓPLc2z_7ë ݵƒedìm¸" U<7^µø'OÆáÇ@п{?Só‚ž(cIƒŒôšžîîŸ1½pw_Ó¹4˜„~Ì}Ìvö¹8ÍzM7ZS¹X2+Ÿ‰t¡ß%ÎͺÕt×lÀ½ÒÑóÚÍÂ3P òsŒµeXVýùƉqÁ/£¼œõ‹p7§³E´Z`A±Óì{/ŽÆÁvܶÝxÃ8ÒA½z¿NïG½–&£Õbñ¦Zh[úJVî=óX‰ï}ћMª­é%ý•ω‡Îý(äM÷ƒ—„µMÓÇ#Ãæ¦.²¶AX[²*•å¥$,U¨?Ö¦\¡}üJtÕYPA¿[^tЏ[§<›±q]ôÇA7£²fã!›VSk„V`’_{2µ;{± LðS§°†´‘å÷*ÏÔÅjÀ`dC®û•cO“‹c½€NªTa/‚a!,=∄W^G£ ·ÕÙ#„úqmø>ö2Q˜²¾B¸´¹€•Ï»\µº½g6crüèjÞnÈ­&vËÊ|y-Ó@¹x¶`´¿l¿þ¤ÂõÁendstream -endobj -1766 0 obj<>/XObject<<>>>>>>endobj -1767 0 obj<>stream -xu”OoÛ0 Åïù¼-j7¶SÇ=¶ërÛ°¡vÉE‘™Zm,y’Ãß~OþÓmY— €a‰ä㏏ù¹Hh…oB›”²œd½XÅ+ÊÓ,^ÓºØà9ÅÏ2‡ƒÛ$Ó˃‡Ýâf»¦$¡Ý¹òbC»’gµ¢\n•§SOŽ=µ ùŠÉõõÁœ”¤“Ò¯Ž¼¡Æ(íÃC8Öì;c_ÉU²£Þ´Ô í¯I蒜Öӓ¨"¾Ú½,V¥9ÔîÊåwÇ֑Ñôxt‘èLò¤X{GRhÒ¦£ƒ5ã¡ -.‘·Ì! TRB¥=³%ái eöûòèbº—’SúyT=ÕN2AíЉ c‡Ãí—]¥dE¢iX £RY–ÞX…Ž¦>Gqû+òâoÛAþx¼¦KÈ`Mc•ðà6_˜  Ln¶w”IG”%#4‰Ã—¾Ï.ÿ&¥ajËJ— ôÆM3—AɁa‚ƒAhIêH‚ËgeZ¡µiux¯Ž@jTIÊQ-JÆÕðÎ"4Ð9+É¡va3:ðv|QÄ{°ïD¢Qž°¦leÈ¢¹›2Ô F -ŽÁàæüSërrb´‰‹„æ"û4ßÐß]çoæùØZ «ð[þàPîóVI¯âðDí†û:Œ›´¨16W™öT<(LÇV -ÇïªÁB”ËÿJ™µnʱl­ò=5­mŒcw=ö:¹¨'Yð"œŒ|ÃóãlìIY%Î0y§¹RMX¢ ë4lkkn°¥.¬!º54JvêYÃ}ådаJµ)Õq u¹Ëj\¦Ùíý»æFÿ QLSK²".î2J6i\ZO÷Ÿîé«5/Xz4²­1&f2)Éñ/UdmVwáþ?6_çEœß¦Xœ&Y¢>íß¿8¾‹Eendstream -endobj -1768 0 obj<>/XObject<<>>>>>>endobj -1769 0 obj<>stream -xV]oÛ6}ϯ¸)K¶äØî€>t[]äa¶x]‡u(hŠŠÙH¢JRqüïw.I%Š‹¡KD/ïǹçžë¯ šã{Aë‚ÊÉöbžÍ©¼¾Î6´Ü¬ñ\àÇ*ªÃÁb³ÊÊóƒwùö5sÚÕðµZohWüÌñF^þt½W–Š"£[/ä½Ø7Š>lo©5ÕÐ(÷j÷%8X¬£ƒY¹Ì -¸¸ÄEF7·0”^›ŽDW‘4]­ï+øM¼¼¤Å"].Öي/ßêN*r¢Ý *³ùUztCßë¹i*Ÿ.?hëÑÐV#¹Û“óªýôj̉?½pN9RB€É×A9OÞp -sš-ʘµR9Gþ hèô#Õìяxi‡pÒQ©jŠBF»ƒv$ZÒ<(ëH4M°OPáYxÐ*:j8‹Ì!cÁÎ Õ3ZVÕÊ*`” 9¾ªяÅ&¯YòS¬²%C÷—¨':ˆE½5èWn#pÏÕ Sãí+@ó ,êiôÞ -« ÿržl^…<ÝÝãQwTé:¤äÏÒ?Š“#ôøé<¡æu"9X⛔Ø^©ŽÃÍøbîM²Ìœy~“jÄ»ï8>/XObject<<>>>>/Annots 1017 0 R>>endobj -1771 0 obj<>stream -x­VMoÛ8½ûW zÙ°iKŠ?š›»mÅ6E·ñ{(PÐe±‘H•¤ì¨‡ýíû†–[×èe ˆ‹ä̛÷Þ õu”Ð ? -SÊ”7£™˜ÑŽHL6ÀAÇԟ®”Ø ¦ ˜±Ú³l1Dº™rà«ׅU†l†þ";'ûôüÒ{ï,y´jT Ñ4Œ϶ºÖ¡ç˜eg"_2>¦˜‡%lƒBGÝ´µE§‘F°ÄÎ`=bÚéí©!ÈY7f"ô -½¸EWÝFÜ?fnԎ•ûûÃÛªBho¦ÓÃá rïE}m]'TÑMÿUøW7ÊM‹!Té§ÚêQ´U;qj¹—=½v:§·Ç#—¬¼9rۇýyæ:T:¯bÁ Í0kTJí :7o­B”²˜XƒGÜÿ¾‡MAoÂÀIˆ× -÷×p—ha¹ élƒ§HÆßÃpKÉ#ÿÒÅY³S°J9Ȟ©G Ùº,A»32[Œg¬Å± É^»ÐIìÿnÅ¡§WÃËQ²Àâ*£E2ˌ;ö~}÷rMïý»Ð+›w\O´9#Âõr<1YÎ^ðþ_]Ì× ¼ÎS¼²aC’­øàëÍè¯ÑëkJendstream -endobj -1772 0 obj<>/XObject<<>>>>/Annots 1020 0 R>>endobj -1773 0 obj<>stream -xeQÁr›0½óïè́–qnÉ´é%¶6íô‹ŒEQj•„iþ¾+ìv:í Á²zûžÞ#§‡c#PH4}’³œ2^»w‰X3¹–,G.9}/'ì#ëmÁJ”Õ†bAÛi´ÉCd[ðuK -²¢à¸稛•¬`‚áì5ÜÔ/.ÁùœŠ WŸwOwèBï²lžgfG=¨!˜³q“gÖ}ËbaŽTHÒ§¯úƒJJ…ÑYÛ¦´;4z èíq:Ñõ¬Ã>‚o1w¦é0yí:/{<¯H!Lê„ÖØ¿ú ûç´Z…ÉжWaN¢ðÂEÞû™Ôu;õ•áC‹Æ÷íE "‹ƒ¦t?ù³ Ý¢ê§q´.0üíâšôÿ蝕3ċ¥ˆ-´#ÃÃ1úî•mb?¼b#‡'3|g—FW×FsI« -ð¼dÕbãþýÃ=>:û¢›€7¶™zMLÁØeDéï‚t“o#þ¿!–²br-hÞtʋmÔ{['Ÿ’_Ô/±mendstream -endobj -1774 0 obj<>/XObject<<>>>>>>endobj -1775 0 obj<>stream -xWMoÛF½ûWÌMIáÐ"¥ÈN’4 4M -«‡¹¬È•¸1¹Ëî.-óß÷Í,)ÉB↉;3oÞ{3ùç"§9~rº.h±¢²½˜gszý¦È -ZÞ\ãs_¯i+7׫lõ£y‘gËóï×WŸÞP1§õAV×7´®æ¸R¾øP«.jOÅ"£;]öÞØÝ©v£^®¿Ë›ùuzóÕb‰|ÖÕ <šgtk£wU_FãlztIy>>Z\#C<º®M 뢦½ -¤bTe­+ŠŽb­SÔVd7¨®Ñ*hyO2‘Jg£2/(K¦íœÊF -’fhk3ZךÃÏéU¾Hù»u¾UœØɵ€ªë£' 5’±!ª¦‘‡ÓÒN[íU“ý¨úåX}‘Ñ_qª]ˆ´AÚuU>Æ­¥VÙá,¦ÛŽ©0";¯UÔ84Öü é·Èåëc0•¦ÁõX´º2x’¬Ž{çï3z?P¥·ªoâ©Î½iRe©;Õ¦Tq´w-Ф”KÚצ¬©ÕÊ£ ˜-G$ß[éì5=hÞCòø,„9iƒ€“ TÍÀ áàG€GÚ£ ‰S¢ÑM:tº4èË@}à Ù4ZZ‚ó‹Hn}±šã3läh60x¡‘‰W2¡ð/ºÝã?9ã¬À¯¦qûJª¦+•¶ÃŒ\ǬO˜ÚM†´·gÀò%³ë}"ÚÖ4ˆàÈY$-Ç ÜA¢Kӂö€mDœ¤Â­)É+»“B$³ŒÞYҏŠë¡ÖìjðKÿšÈ8§7“¼– ’¶åÐ[Ê¡;(;Ë)‡yä«Hk~U@˜ãׅ| -™Cwr:…!À!|~®æ)ꩪGMCG÷M3©N -¾ûü~ꯠ(äš5®T 7£o/ ·ga¶]Î{)]G¹A 3´d@î)ÍQÖ#Õá˜BÞ<–Fï8âŸd!Y‚T^oÁ‚êÉ=øLpÌ]¦»¦æ`Ï´­ØŽ ãÁ±N•÷:Šñ¤3U“@ŒVù{¶+´„fð=jLˆÚ²W°¸kU«g¤½wþY›#'›1,‘­*õÿq™£Œ¾ò3ésÙhø+D3Iše1qáx,Ñw@%-— [HaÎ%ÁVQ+0CÑíÝo zÖ¨Çׯ_¿ž? €ƒö¾ýït#X¤ùÐû0™Áäù2hZ…r:±ç,9=&Æôðäã:;MY‹öÄ+6‰6×^¬}r‚ÆÜ'çØ:ö tò50 БŽõ/Ô¸‰Å±mëmŽñ–~*8ö0Ý4aš£Í$rÉxmUd‡Ž$²7±F˜t„Yç#“Q.ΐáŒBÇañe~ÉóË)åQx]Ó X!sÝ8F˜X Ï’($”`Ïþ`uòzvàJw"&d( úr'=R˜Ì‚ú%Ž= ÎA“Ûܲ‰cw`º¶Åˆ‡ãG\”¢*Ùf$ÝߍíÏ[›æÙ4ÒÉ<&­[£÷ƒV¡ñŠžz•ù4ùၷ€pœU1ëºn>ãÜy4é!ÆSOÑúÃiL6åu× ¼fáÞÒr42 tXÀ -™Ë8„‡»XØY\×avJǃÈê gá8Ê:…1uʠэyþ]Á‰]`Ï)uHúã½òt;œö£åd\Š-Sï‘çuõét–Œâgö N;žwܕã+œ™Œ$^[Òåjð%A"@VÎ΢¨c³ƒ?T‡U ÷Ÿü©iDa'+ʸn(ÞgÚ9aVZ]PxM¿«é–ö®RØ^À9w´l§Ø2€Ù÷ÞÊ֗$…#[[(ÉÁ>¯ºê|¦°:˜õãֈ¤õš’¶-ì#jÜbî‘B¸*SyŠlTpV¸}õéæ¸v/i¢?¿Ô/±¬^øφ¾”9ÿq}ñçÅ¿kКendstream -endobj -1776 0 obj<>/XObject<<>>>>>>endobj -1777 0 obj<>stream -x…VËnÛ8Ýû+î¢@S –-ù™]¤éèb0Ô]MgAS´ÅF"5$ÁßsI¹~¤ÆˆD—÷qι‡úo”ÓŸœV͖$›Ñ4›Òb¹Â÷|Íß~¢]|P,ólþ³ùjöòÄûÍhòqNyN›Š,×+ڔ„Ó)mäͧlGÙ½ -A›=u- Úi§zQ×*ebˆQª¤`éÉ؞úJÚ<<’0%}ùðH­uÁócœÁsþ÷¶¶ò)£Ï¢ÙŠ7›o£)óYV üMç‚+Ld9UßrÄäã”îRŸãbŽ!Šä“|¶"üŒ ç÷@¦Ù–Ç”Ól}Š[ÿ6M#ßÝeœ™ãæóÅÏãÎK®¿Á4µð¬Q¤=é†!&ðÔs [—ʝ€Ü]ˏ0Ž ´U$z¦ÁîH‡[ÚëgçP!g£¹¬©ÇÙ8EY&nÒÖÙ`¥­IhF*tpPÂù,!|G9ÀRψ‹Y¶Èè‹gò}z|xE¾âVJeb©ËqWYÊárbkŸ5*T¶ôQG<ïtÛZÝrLҏ´]]BÞR[ ‰“ÔX–]«¤Þi«aº˜õ¬‰öW#G%`Bn!MY¨Ô^¢0¼’Óá@•­UF†0JÓG1C¨v·BJå£p-R¹4¸‡¾uæ(W¥OGb—;g°´F…u&¸Î‡„U\߇„=/–IÔK¥Eï —·/Aƒ‘~¹DÿèV¾ú÷ØÊ zVgª0ìÝ;ÊïŠ,_®³<_dÓIÍ/à øä¿>Ë<Ó;6þL¦yÉyd<갏4kˆ›¦ˆHHkŒ’A[sBÄ|D”°=@V´íXՊÕÚDM\³üõ"jÆ0ZŠ ø7äµ5*|}“ÑÃYM&õ‚Äت½òz±Õ¨2£ûä=gƒ8pðаU¼hÃ" DŠ^0\†¾Ñ•5‡Æv±iO}Ö%ìÍÛŽ žUÍ+Í[™°!±Úð@!ù¤×áª8äÁ{ÍV°ï9#5i…÷𴎥ã"ûqµÏä5˜:N¥žÒvòˆ†d­¡T(|@%ùŒ ×ƒ¬¡­Ê×Xª#®¸cÎáö>ì Ècü®ºŽ¶ÁÛa7J@9xZ¹¨|´<Æi·Îö‰çým䚍1º¨ë ›ÉY}÷ªv¢Þ)T°ÓטDÏ\†a›FvÍÎÔlq …᧠›8Xc¦¼GƒԚ\Iˆ4;%¼5ÿë°K8l»w¢d—ýq'^nÙଏ5Ò¯JÉ'ôºïjáÀ¬± -¡};™ô}Ÿy¾V3ëö“¨…®-E€êøâ=»z0Pg¤Â¬0!úKJᱞlSWèýðK§bõ´Á(YâHøN«ô¾B#çð».Ž¥;ˆŠ'ÿ}îj£œØêšÝø…Ÿ,{@o=¼ªäüú³žÑ¢X¤w†Ï÷¾¿§Gg¿aèƒ•O%Ønx–ññÀx5Å;DyóÛ[m—\. -܄ˆÎçÑÿ،þ}ÁÐÿendstream -endobj -1778 0 obj<>/XObject<<>>>>/Annots 1023 0 R>>endobj -1779 0 obj<>stream -xV]oã6|÷¯XÜË)…#ÛòW®EQäÒ暸k/.®~¡%ÚV#‘:‘Š ?¾³$å]®Š C“Ü™ÙÙ]~LhŒŸ -š.(-ãxŒ•ÃŸïÉâ*žÓl‰E*i:Ǔð_A÷¼'—ñÍ®–øœà·–´¼] F·o(Ój‹‹å­2w3VÒèf/*+kJf1ý¡òTgr„µÚHk.V¹³“¥?{9Å NGØ<‰éÓ^X’†ý$TF¿äxF“I8œ,ã¾ÑeÕ ¤¡T—%oVR®H5åË1Ý)²òɚ!I‘îÃ:µyQÐF’­…2Îdd5 ÜR×ÒTZe¹ÚQ!-îŽiµ—Œ`L—“©]J¡x‡eØÝe˜|§WÉڊÊd%UfH¿nt»„"ÇZ¤¬´ZGA„õÅ9ñÈÇË 5Ff1]÷P…c” -Å䌔Š„-+6È2Øp˜éÈwjñ¢ç áÞk$*AØ 1‚2v2¢ìëÑE^G؀,že²ÍížÞɺ¬¦,DÃÙøETBIÜÈGuN‘M×ðŽiù™óáÝŠÅ4”Ì/îηû9æäÏÖX]sžüM^a'·åA’OXE,­$mž­ŒÃõÉ"ž±ÃûÀGFw€ºë›ªÒµ%ù¥KìÛ¡Ù4²×à¨$»¢ÍS¹Žt}ܾ¾àü” @3R±ëëj*‘JgÀ —’ËoPÄd~0ô¡oX%úžóùÔ©5ºíJçÄiÛËG8èÈ삌WFfÃSÓӜÅJuS€Ô>W¤·#2ÆàÐ-›Âæ¬èQ³u´‘©6zfŸDîÀ&d1$§¤÷.éåé‡Ð2Då¨/£;ãûv2DƒØ¢ÚE^¸ÂànÛ8t›X×»˜ÞæpMö(à» lÖ©‡è –ÇÚ³nÀÎrÉ—ïHéàM%ÌG¦KÛÂU/ÖX'ò$U/.’Ô>ô=Àë‹òjs•é¦)r©`n¬1«Ï” -yy–¥!)ÔwF¯¹}W o^£0¨ÌÓZ½µ1ý¬[¾‚'×+݃gBaláv%wÚæ²|8q` hRÚ$cÊ Uµ¶:ÕªGYƽx„N§¢ñ*{Í%¥ÛÝ -‡@,ª½xpxEÂxAÐèd‹¾ÛɳŽ>ÁÞ¯†”ü:¤?C™òñn‘{Ü Üæµo<#Oçœk$˜sIL÷¢Ü7ÛBk ƒ±+P̘n¶]cXl¹ÙâÀ4ÃGnî눧#ϝ¯A׃釙¢¸™vÇ›Û}-%AJÛ•C¡ñ<2ßò·ÇqÅCwDÉuîuÀÅWFóÉ®+~ 8Î&E*²L{×VwRAžüH 3³¢G#xpt{_ÏHô¯D5:„¶çbžªñR=Ið3®Mq+ ï0®67küpïßÖXÆ7#GÙ ÄõÕ#Ú1ëÆSI–é¹+ÎßVsìx9 O¥ƒäÞ\½×gOõ´ÒØJÔ%]>Òß´«eE¯²£X¯ÎÕÂ Ó uÕò[‹wtîK±G·Wat{Ûͯüûòæ?^Ò3¼ßóopø tÐendstream -endobj -1780 0 obj<>/XObject<<>>>>/Annots 1071 0 R>>endobj -1781 0 obj<>stream -x}Y]sÛF|ׯطØUL|’¸—+Y9'ªŠ/>KŽîÁ/ J8“€–|¿þºg̀T]¥*åf£ggçkÐ_¡[à¿Ð-#gn½¿X ü2ýïó¯a¬\§Aæö.ɂd;w{aàޅ‹tFZ 6Nflº -.‹"ü2ÌI -¢]O.ò ¹ÊƒÔeÈa”À/%E˜ælCè"THg#•ôÂU„½B¸b— -¡B/\Ò ³\³\¹KPh …!ݙH/LÐÑUêêÀ…‹qH'Ò þaJN€rÅ4 é…1²KaDN€Bf3Ò ñ£Gž Â ÃϤ™ÅH] -ÿY;yL£(4+"ˆêDJÑ%ùB‚“%Ø£Š7 bËýã‘Ðy ²Å«'ÄS…>6KCz£éÂo‘II¨ÑxéwÁ2NËr=H‹Á®Vôgbý’Ø8 @J%@³,OX -CÙd˜²t<Ö`Ø]21†5xï¢Å2ÀFŒhÙÎqÎîÚÙrÒÎ#—¥Ð)g ¢Î8áNÈ@©Ðb°IŽ„)+AˆW,ðƒH‚bJYÊzé2ô—Ó#T.ÒlŽ~VÒ7†^fO”2"‚dQƒý¢‰eáĈÁJ­Á`s ¡Z6‰‰(ÕZ 6aÚ k0ØՒQœ,[ 6ç42¬Á{K‘)k1X”–ÕZL6ŸÅÊb°Ëˆqž¼²,¦ê̲Á¨D¤ÞfÁb°g·Z¶˜U<÷yÈoÂYˆ,ø| -2ùYŸOe žò«¬Ïï¨õùTÖà)¿;äwÐùUÖçwdÓI¬¬Á°ŒG4”5q–!¤¬Å`±ÎÂh-›el±É²ÅÌ`ĚTÖ`°Ø=²¯¬ÁÈ*vb-f~³™e‹™ßd!¿q$3,D!V‚|~#ƒ˜iؑ²ƒõ–•5,Ô¤²# ¸³Øu-‹Z­ÅÌ ôÂdÙb°y4·l0âË𝴃MÂÙºƒÅþAÕ VÎTà W Ì+ÕÌü®æq–,Ư2Ø} -2=8²1oxþYa f¥Tk03ÈëˆÑÌ òJjXƒgxeµ3G<|Uk1¢ò¥¬Å`a³nòÙb°˜"Ö+‹ç%ûhÒbœb!\åx‡â%. ’P /¤WYƒÁ.åèWVRÄbóÇ é‘O‘bh“,Ö`°(…™Ö`¡JŒÖb°qŒbWË3 , e}ëóWíÐÂ+A¾pÃ+ Mx¥¬ÁŒƒa ‹#sfÙ`x…C"3Z‹½Ï3Ë>έ¼rñ­ ñÙ`zÅÖ`XFQÀ«Ik1، -e‡X¥þ&Œ8ø#A>¿Š±n¶b”5,ŽjìHYƒ±nė7Ãúý¢‰¥bq! ‚L],ª>+k0£Òge ƺ‹¢¬Å`‘#ËJE8g¤Ø¥m<§ Ʋ(+¤Hž%ë¥x%‘šó -2ґ•A)k0£,ûQÖ`F™×E£5,ޗ!ÕJ¡,üËÞ)°WôÉ@Læ73qâ%Pz`â øsÁ‰”(„x„'ápA½01$ ,ºpD?ƒÁ¢[ñ=b2l1XŒïȲ#ãxñH-+uȎ’:DwÀ² Ÿ7¾a…øÕO?v´GÂâ’pjÒ2#f(d]e ‹9ˆ(k0¯le}(ðž#CØy|ßÍ|)d($³i1ؘï­*µ˜¢IÃÌPðEÛ°Ò"ò dÂóC€Q!8\†Sˆ(Èù®:±¹¿\°'øÄL6!±œBf…3cÒÈõx!TN!8ômd8…à0mWÊa’⻦ÿ"'§ü›^*¾¯MŒ¤¥(E‡uñ­‹€"¡pù’Ë2šÛaÏr#›(Eþ;f(ÎIþ›æQÄϊõþîâÝà…»Ûâãm¶\¹»|³Å/ë77îêp(ëMõRvoïþƒ§1cBÿô%ÌDxþÍ]ñ°+]³u×Mݗu?<‰ÚŸ”£Oâs·Åþ¡p‡²Ý6í¾¨×¥«ºîèÍãÃñ¥y6 `r(Úªkj±º˜ñ¬5ëoeïšC_½úH¸Ïe±q]õߒ˜H÷±xq/ûª?'áëïͣەßËÝ9› †Ûâùœ\î¾­úҽʮàö®yv×»jŒÖÜ­|xËW¯í]2ˆ]¬«ú‘\΂÷>5m_¾ìÚ¢Þô—77çfÛ+oåÄ-Œ|,_þuDdªbç“wõ„Š§øã‚¢ì‹ ˸¦*[w}óáÖ­5®3ëøÐÅ|¯«ºoº§ñ±¿Ÿz‡ó4pÜFCˆIŸ˜Á5ÑC×Eínܺ©·Õã±-¡z¹û¢=°êrÂl͏‰+:W ;Ô¿÷_<¸´á¤ pâÿ/»¯oꦗúúög¿ÆåÏ.Ä-ö£àådÓeÐ+xÎ蕮¨ ô=鞟ÊÚ[ýú†ä÷²íÐh_ߢiݱ+7vG¯ï…Á}lDê­zh¤jÓV°†ßŸë]ƒ}nÚo(eqWâ8¤Ñ[=ɼ¾¯jh;yþÚǶ9dHœ=‹l}éJ·+ú²ëÝÝõ§w7Ÿ\×ëonÛ6{÷±Z·M×leœ$Wu”|¹+ÑÍÁáyç¶Õ®D·Üáè:ø½q맢~<0¸J³aP C}ÜoïUÉf76ï<-8± +àóøÇë¸ÚÙ$ä:è(îqØêlSn‹ãŽñnúfÝțψ%WÃøSž¾û)_7 Ïà¿@s¶ß+LíO _$]9 8¦óÝ7è‹ýÁr·Wß_µÑŠMtµ^—]7´q×[^7›Ò}¯ -wýçí«*ènê¾m6Ç5§þ©Ë4ŒœA=š‡/O i_•8ÅFGXèÿ´óþtâKÛý¨×菍ÛöÙ´Í؊i~¬v›ÑÂûªÆ±õÊ©ÆG±žkÍXO>/XObject<<>>>>/Annots 1091 0 R>>endobj -1783 0 obj<>stream -xm•Mo›@†ïüŠ9¶“ý€e9UŽÚT9TJÔ;Á¤vjÀ\õçw>øغȲ­×Ͼ3³ÃìúW¤AáKCfÀ:¨šHÅ -Y>¾}ŽR+pÞág¹‹Í$Îð²m\œPŒ™‰=µ²q -Ž9CT'¸* ¦À6Ö! 4R§â,¤FšgTþ’WŠJóØÑnRür,¸&KE$´‹¬% blðgÚˉ UJå,P¢ÝPtJ)XQTû͐ûÇj…Êqÿ¼¥Þ²àR•Á€inyÔ ;)¦Æ¤Vã*Yx½â}N^Vw¦â]©äu™lGò° -¼3ïJś&²[ñ² -¼3ïJś(nÆT3«À;Sñ®T¼& {Å*ðÎT¼+/Ž#ÍĔ—Uà©xW*^¥Ã^± -¼3ïJٛx:{s^Q«w¡ì ¨Ê°KIFGŠ¼~Qâ]5ÒÄ`Wd-Sñ:š˜ÅË*ðÎT¼ åaNÏ­Ê<ä $†ÕԒ†išþc¥Ã‘XOez:Ëß} ¯Ñ}Ý=8ŒÅ+Ý^ÎgPøòRPTïL'1<¶cÝ·åê¾ïúá}ñ)Øi:ÅÖ¤1ìDZ¬Ž§öŒ”Ð_ۖĥïªzØ°¸žÊ±:ÖÌv˜{ hU ű†¡l^JÀ%ÕÏói)íÍ2͵õÝáZ§®½) ã,l®Í…ðmÈ-fª‡‘ÉMl¼/‚þ?.n}‚f NaÁnAl(å„d b'¦[{ÆÐmÁl‚Ùôô[0Ÿ`¾5= *W«M¼4‰»tûq¯Ïãé|†cù›g£ï®/çzø@±îü4yt½*oÁðÿÎÔóþËýžúî­®FøØUצnÇr~È;7"v™Êi¿ãƒ¾\êöpú#•8÷Ôà?3bp³?Ñ×è/d®æendstream -endobj -1784 0 obj<>/XObject<<>>>>>>endobj -1785 0 obj<>stream -xV]oÛ6}ϯ¸ÈS ¤Ší8Nö°‡6k‚`kÒ-ºJ¢$6’è’”]ï×ïÜKÚu”ìAÃÉsÏ9÷\~=šÒ?Sº˜ÑقŠîh’Mh>›d š_^àó ¿NS%¦‹¼[^ÿ@³ -+쵸¸¤eIØg‚oŠWWZíhvžÑƒêrE+í*ë:ÕšŒ÷ƒö¯—_déEÜãÍÙ<›a—WX4ÍèÊv+匷}zsNÓizsv¨xsÙè´½×nó¯=-¯>R°Tû(ÿñRÑ݇Œ–ÍàÉT´µ)TÜÖô5¿å5pUd©§n[yÓ7vhKÆ;¡7Ó³ˆÒiÕ¶[*&ÖÞeålíTç)4*0|ÐäU§ùQ°…m„¦ÎúŠUi°‡Z+Óª¼•—âzpE•Á7Á©ÞWڍNßïÏÅr%UXÖ¨ÞâD'äÊë’>¼CqÌN–ö˜-²9³wyب^° HªV¦Ço;æ¦5šÝ-yûOÕ§:íƕõBÏƀ§F­ÖRi¼Tr(‚±ý½6’2¼wI÷ülcÀ«Ô©m"×à“)mÁ[i*0a÷äÒçW~(RžîtÈõ`>¿'cí¢hâ-9¤ö_«Ö”c–nt¯Çp¢ M_FŸ¸Û“7¤t.XØÀ©Í^Fò+­ËŒnA±¸jg7ú:˜¢GLåðU¥<÷$ïéîúá„T°¶nð•ñe·ÔqÕ¥^é¾ôdE0ºÅÂn\ÐƒÆ -Õâ`»‚ÁD¸Òöâ{ǁ°ÑÐ7–éήÑ'Œ@œ`ú»%êèÅ*TÀk>¾=ª 5>œÈrç0Ù ™žÄ¦Ü'š6Öyôæ-ùì0#¿hêš Y©"À¨“EŠpÖàþŒ{¤*ÅlX8:½Q®Üpp ¥3(Ýs_–LŸ³FÆX„BäÊgtƒwPTÔì¤õñä¤Y¡]@Ÿ@å|| “¨ƒ ؅˹i¿?AëENÐÃô“®DúÍš¶xԁì*˜ÿ@®©º6±È9\Œ2aÂæ©8óm“h>Œe¬TÁ‘"•ûDªp1¶Õd¾tp$N‚™qz‚DìDi˜ %²6²Xš7÷©þ6È|.¯ïò¬°}%Yù¢ã§Žq~Á”2M|Æ~œ?pS¨Z£|á ¬JEëòpS"’e me&=™\ºO‰`c(7¨ZÍs’œ©›(O§$iáü}²aXâxÛåÐ1{ý}ώ6Î"!òHªRcž”2žò-}8⽤EœC…uŽ½À² /I¢Ä0ápÝÅIk 0Ô#¬{WøL~vҟw÷?½ÿåíܾÌ6§Œ¸Ӗ‡¤Eú¢f~´ëwŽx¤Ò.ÚAB—£ÊtìÕowiæôÊ: –Weɜ,@?";¦Ò˜¼äC¢GGJƒD?K”D -9ÒH[µªñd’©¨±ð’ÒÂ@q­Lᬷ•LÇÓۏäƒ*™$ßÂpf,¢‡¯Ä=ŊÞ^ýüïáq–Ño\†7Iߞ^ÿÃÅ)f KÑüöq -†¤\Ð*\**žérYñ§‡)…«ZRàÉÄxl,Õف½ƒÕ*<›jZÊIW‡4æ¨Ls)u&ß[R.xŒõb€Q{N/<'ûO¿K[â{.%ǸÅÐ7ãÅT®wS4ÎMÕâ½8RÜåºÆý„‡yX..AJ5h ôŒF -ę¶i,_Ý !b¢r¶ãU#ë$®’LF&ós€“‘/"Oà& ;²¾^í±1¢œÝÆõ<, 4ìéõå÷[ôù"Þ¢ÿïe}¾¸Ìç3\÷qyœÎÏù¤÷Ë£_þ„y Bendstream -endobj -1786 0 obj<>/XObject<<>>>>>>endobj -1787 0 obj<>stream -xµVMoã6½çW |i²°µþ”C ÚèvÛÆ@Q J¢,n$R+RqÔ_ß7¤ìudoz(Š$@ ‰3oÞ¼yœ¯W3šâgFë9-bJ««i4¥x6æ´Ü¬ñÿ¤Ü¿XÎo£å¥‹Õòò‰Ù&ŽâK'V›óç÷Û«÷–4›Ñ6ªx³¦mF@4Ò6½Þʒy–M)êZéíMód)‘ÖѾš\!ÉÖRfø,§LÙ':#-I"M¥µ$PŽU•*E3¦B‡7ZðTmZЮ‘ÂÉD@a¥‰úó¤!Æð2™‹¶tô,Ê֟ŸÅ‹ÍrLI‹g§ ^jÙ¨Jj'œ28¹PԘqÞN:rÁ´RxÀ•›Ú©J”!ôx€ŸyPŽ—êI–CE óô8{UòqPá ÂW ¨ã¬¶³NVàNw{ÑEt×ÀÝ xµ‚vº6JƒAk/$÷±SÑZ 7-£eiRÐF•¬ r¶ZKnhTÙyîÞ¸¥4Àb˜,–Åù*ZFôI¼ÐK¥|›N53™¯¡+}çÈ:Ѹ¶öU¦¥—^V6ŒZ˝qŠó UâEUmE®Ú"ì -ù[Ž!+…ö–P‹³>?æîk)ðƒèáÓý ÞÔT·ý…RShÂrÃ@ö!ã[ð ªDgç¢Ö²(ù#ó…ҏ4ò-†”$´U¥FçýjPPß[t¿gi1Ô_[žœ! -ž’ÚEjó -ö0+sqÔÑ»@ñ»PKˆÑ5ôÜjoÐeõÌ3ˆãh¹1ÐC`"aiÏ°lýóAêÂhÓ6\øö ‡í£;̾2½F“ÎIK×'œ<ބRÃpÔÆZ•À|YÖT$tÑf27MÅcÁã¾W® 1€f1ƒ%{A/%èZ9ÑtÞhxî½=ñœpMóérs:™’á9±:•T7ˆ*{V¡¦Ê ©°ˆÈ%̥ﺟlv£ß§UD¿˜•HWr1çécîçö äòplŠÒzÒf¯ .5ÊdÒöÑF7T¨¼°¯”ajˆé´-¬¶ÁüÁŠw€ß˜ú\Û=çB§’å„Úð›È@WÝÏs^¶¶è‰`t¹BEÎ}’ClÈ{éaªy.\WÂnµ…*ß$*Žè)2jÄþ»Ãa|U0=4æÈéÙH=˜ MH™qQ2¥؎XaÃڌú{Dâ~À-Z`z°ði¾Yü¾<¨ -¡¸ˆ1tƒVG—~éçOŠè³æËFÍ]`É¢æƁ­7źŽèÏFá6øWµîŸý'¹†(GnÿW½¾Bü¦`4ãvùŽ`Øë+Ö©`ö¹‚G'©lТ—Æ5€]Ë¿ôúM½øho{e P -ÁÃÞø®ÀyeΛ~ñÅØ»7 Š·a•y¸ûtG¿5æ öRúɤíq/äx“ÁÉzzË«Ïù†´Œ±m¯æX£ðz¶ŒùØÏ۫߯þَ۶endstream -endobj -1788 0 obj<>/XObject<<>>>>>>endobj -1789 0 obj<>stream -x…V]oÚH}ϯ¸â¥©Ô¸•ö!%t‹68Šº›}즱=îÌÃþú=wl§ ͶʇÀžûuî9÷Îדºø iÔ£þâì¤té|4 †4ð¹‡?#i]¿è†ÁàøŇèäýÇ -G­ák8)J~º]ŠâÓÞy0h™êŠ&©’¹³o£/°PˆƒlqÖ!\”œÞæ’ -i¬Îi+,ÂÚ8™Û -GV:§ò ¾àÑNÇ:%§ir{7]\ß/ɼ2|8§ë˛ùåM6b'IPbD&œŠ92â…ý Çñl!á]ep·“R£Çӵхݧ÷–‡çüéñmÐXö†¨–3²%¬cWç¶U–“7öýñÐîÃ!­„•Éã[ª$Ðö‰S_kC™Æ÷D8Q'Š”ë2M(ÞÊ* ožY•©T˜W³®mVH%´:<ÃÓ1Œ¨èwÊu‡DžP'{ÚgÊáY¯;wޑʭãƒz¸"ß#ÛÜBu­QH{¨ŽaÕ¿²C™Úl‰ÔjÚÊ´ðvßÓá¬?¨!.\kÄûx®¤þ F/Í´å•8XJJɝñ4ÖVÚxèb°S™ èÞ¶™‚u¦…1Ú/Rê­M*w2ía[©4m pcAŸT»€>ë²i”/Væb•"°±sÿqB±9®Cºp -ôU¹3Or­RùSTÂnÐ(ƒ\™#$çôº>ÖNæȧæ-X‹ 2ŠÁwðÀ¡FÖJ Mì¥P„üêÏÌmðOîEV ñ•'º²ž“ڞƒÈ¡™V%^Äü”÷BÌ|nÆZ§€šßÄ:Ó҂¤ö·ՖC3l  É<ô°‘Ë"{ܘ¬¸ªª‚LÅF[Lxa;â -, l>œòìᬎŸNñŸ3*J•SòXßÕVˆÍ¦þ™b':_«M‰­Ñ¸8ç)5[€ eyޔ~¿³š^ð»žcSiù‶npwÀPLS™qlÝ/Ó镇 ÎªÑ*k/nÊ%tóp…¿0 -¼¥º³Ï¥Öý@žk#%h$v¼a¼ƒ£ÀíU¨ŽékàjW~Õ}Çõ}ÃÇöÄïy4ÏÅéӝ̠5v†ÛîkÉiÇ×ç{ÒfëkG!ã£pzY:}¥lìEŒ\ŋýWÍ>¤ Á'Ê+éøbõšåàGËŸ"M×ÜÉ©_ʾOÏõœÿÂæŒ>Ý.–Ôï½Èqø£ÕÍՌ&·4ZâæCÝçGõù÷Ç͵6àæ<îÓð|Œ×ååüÃ%-Œþâ«ÓqÉs·Rí÷íY8Äug£îŸýÞ<Žƒáy¯iÕ`ÄIL£“?Oþç³endstream -endobj -1790 0 obj<>/XObject<<>>>>>>endobj -1791 0 obj<>stream +Xªd9¶Ó[ƒnšîÂrɅ–(›DjEªjþý¾¡>¢(ÙEa–Mræͼ7þwS„WLÛ%JËEF´¾ŽÃ5­w[<¯ð®%åÝB”ðòë…dµ wó…›Ãâ×5Å1r$Ùì¶tÈ ¢ˆé¥¥´!ÝæôdššÒBIí, d3ºx¢Æ*}¢cmD– +ëø‹3ÀbMñCҝt7·ßöä£,ɝ¥&×<`£¥V™4mêïߨ-XmPÔ!»ôÙ +“Š‚Jĕ5çh­¬ûSGIÇBrº\éŒe¦JÏö/IXR®ÏŐq´0æ8iDAœ„+Îiî̋œÕ6G-]È[4g؇Ä?ᗪʑ»k EUImÔI::›"#Ã붠U™ì+¡BYtzƒÊH8'Ë +ÝÅi‘¦Ò¢Ïa)=ƒêÎÂõ†Ú^td €ë™’À`üYûª¸UW\°º¢ ¹7ܔÛ| ­ü!ë%;“åQxܯ$Ñ©AÐýíݞP’?Ĭÿ6¿©ÑN¤Î2‰Æi=£…ÒÀl挧ZžÐPYˬ«}QvÖ¶‡™F ÔŽš¤ZvŠKƒ˜j™J‘{ï ²Ê‹e"(‘e ,²íÛúI”?QØÀAËs3j¬ÏËâøSUuê„¨Ü¾Ïÿ#b2å¿W?°5Jƒ2çfÂ7ë…jG~ÐëIœÜOG‹!LÁJxÉ ©]î¥þáË5Åp¼ã Ño"$DoÃ8 +éÎ8Žg÷ìpԓ*=þ©u°×~d:éÀ?ZS?2<&ë"º £°Ðçh—C0z¸ÌMMò§(+Xê•:ƒn˜øèá=«SsØN{ÖÕêQÎÔ]Õ†X®ïaˆpKâ ÷€pªMS±D‡Ñ”%»ŒmªÊԎS@ÀX0¥1‡ESŸ:›å–Îòzgfçg/c«÷þÊ [£ßÁzÀËü¹Û’dÝ9=÷šÿÚNùâ5†8°?Nófƒ÷ށ´i‡,:ŝ‚ò¼TÊ!Ø@ƒwˆÙ7>oxÙéY©Z²½¦”÷ÑÅó¹ 2•S¸C@™-!^kˆ?Õ©Á…‰eH{èrX¸¼µÌR&P…íÛ´ëïãxƒÛ}—P²ºfí?}½ùD×滄9~6iSâ>œ—‘Á`]ÿ–×›]¸¹ZáË?¹âhÿ,þB峟endstream +endobj +1763 0 obj<>/XObject<<>>>>>>endobj +1764 0 obj<>stream +xV]oÛ6}ϯ¸)ëÓqÜ}趺ÈÃlñºëPг‘D•”âøßï\’JC– ‰"^ޏsÏ=×ßÏrÊðÓUAåŠd{–%•——Éš–ë+<ø±Šj¯WIyzðÓö,ݼ¦"£m _««5m+‚Ÿ oäùÏ{ÑÊR¾NèfòNìE77Ԛjl”{µýæäWÁÁ¢\&\œãFžÐu7XÊA›ŽDW‘4]­oG+øM¸¼¤<—‹«dŗot'9Ñî•IvÝØ÷ÆŽÜ<•/çµFÑÐF#¹›£TûåՔ!÷~záœr¤„Ü“ï£r †SÈh‘—!k!¥rŽ†½¢±ÓT³Gç=â¥ýIcD¥ª9 + m÷ڑŒhIs¯¬#Ñ4Þ>B…g1€VÑAû“È2ìÌhQ=£eU­¬Hɐã«êýèPlôšD?Å*Y2tŸÍH­8Ò^Ü+ê­A¿Z{®œšn_š{aQO£wVXXø—ódóÊçÑè£J×>¥á$ýƒ8:BÏ#jŽ¡QG’£E!CÛ)Õрp€[¡;4ãÃo¦4>ø×\:­mkhDî Ռ‚$­ •Ó­n„eÈØÔtŠvª1Ÿ +é–9$ºzaE«˜Þè,¹¤tséxN÷5JÚ}SÒ›nfDøòäâ°× V;¢ÞhxÑՃjØwF¦ö9=ƒü£«±è°hûF]°‡ÆÜz^ž`Žsæ'úª00„‘G‰&ït÷&”“Ñëi¸–!¾þc¥‡&ŸDô‰‡@ƒ}£·ôŽÍÑ®´ƒ@Ÿj0öøÂ}.—ý¥LŸàæ |1Lê³LœyzkÄ»,ö‚õ–ŽAªxÔÿ£Ò5wbþ¬ç…—&°y?'À݆gš­@&<ý‘ë•ÔµVÕ)7£…‘¥ÊȑÑõbÈÓÃëîvÎnªA‰ `Rt 2^Œè7f‘C†“_Ô=Þ³è|u¥|@Öõ¹,{y€,,˲YÃNU6¼e„Ø›CÇ}îçˆ@ô«ów

{TÿïsÎrµNV—æ7òrÅ9¾ßžý~ö/8ééGendstream +endobj +1765 0 obj<>/XObject<<>>>>/Annots 1030 0 R>>endobj +1766 0 obj<>stream +x­VMoÛ8½ûW zÙ°iKŠ?š›»mÅ6E·ñ{(PÐe±‘H•¤ì¨‡ýíû†–[×èe ˆ‹ä̛÷Þ õu”Ð ? -SÊ”7£™˜Ñˆ÷ñö~Å“ÜK]K.KÕ^*å.l5ÅxO›J{‘t7؎À!"ˆÚC-ہà~Jõ¯ä^ÑV)C­…ömAta#ósʄºÇô¨{Ðù42ÀkzmòûÇ{ +NE)˜|‘˜l€ƒŽ©?])±L0cµgÙbˆt3åÀV#"® « Ù !üEvNöéù¥÷ÞYòhÕ¨¢i#žmu­CÏ1ËÎD¾d| M?0KØ…Žºik .ŠN1"`-8ˆÁzÄ´ÓÛS?B³nÌD"èzq‹®º¸Ìܨ+÷÷‡·7T…ÐÞL§‡ÃAäދ ûÚºN¨¢›þ«ð¯n”›C¨ÒOµ)Ô£h«v ãÔr/{zítNoG.Yysä4¶ûóÌt¨t^łAšaÖ¨”ÚAtnÞZ…(e1±¸ÿ}›4‚Þ„“¯î¯á.ÑÂr@ÿÒÙ!O5Œ ¾‡á–’Gþ¥‹³f§`”r=S²*tY‚vgdx^Ü^Z²ó(ïÓXØiÃÝGœ»3xÊ^³n'þƍq÷>óԁN‡à¸*Î`bxÜjŒñÙÚ4·?£g÷ûÿTýÁº‚¨ ú/ më5O‰ÑÄöÕ¹ØWÀ;î0$jÀq=w‚®{X™6pê LC®ËCÇC +¸€[îàlªê2²È¦?ÎWjä +3Àá}×´¬ÊykœbåÛªÞbês ˜su8õµO‘vיK‡­ÑE¥RÅVæt8µxµýXÜ°¢ÁÆ y‡Ë!S+C^) ï­%°†Š5âñ7¦Ê¶ªìXKÀhô® +e··(AzìŠ2{Û(A|þ¶Ï)X‹c @’½v¡“Øÿ݊CO¯†—£d7ÄUF‹d.–wìýúîåšÞ;ûv¡W6︞hsF„ëåxb²œ½àý¿º˜¯x/œ§xeã ْ¾ÞŒþýFRJ'endstream +endobj +1767 0 obj<>/XObject<<>>>>/Annots 1033 0 R>>endobj +1768 0 obj<>stream +xeQÁr›0½óïè́Ë8·dÚô’N[›vzÈE–EQj•„iþ¾+ìv:í Á²zûžÞ#§‡cS P}’³œ2^»wI±fb-XŽ\pú^þNØG8ÖےU¨ê Åm§Ñ&M’=nÁ+4-)ˆš‚ãBœ£Q+^³’ g¯äpÓ¼¸çpZl¼ú¼{ºCÂx—eó<3;êAÁœ›<³î[ s¤… }*ð²?Èt¡„ñµmJKÙAé1 ·ÇéD׳û¾ÅÜÕaòÚ#t_÷x^‘B˜ä ­!°õA÷Ï7hµ “# m¯Âœ>/XObject<<>>>>>>endobj +1770 0 obj<>stream +x•WÛnÛF}÷WLó"h‰¾û¥hsi‹¦I‹¨ +øeE®ÄµI.»»´¬¿ï™½Dá¦) ¹³3sΙ‹þ>YÒ?KºÎéüŠŠæd‘áãb‘åtqsÿsüI›“W'gïn)_Ðj“«ëZ•„ã <)¦¯+Ñ9ihy›ÑOF÷5¢ëT»¥Ÿ?~^}<]=Àü‚–Ë`>ÏoàbUN?9aÛ)WÑ'ѬÃ§¨»JP>#A­ÜÑöèÊMßN閔%ñ$T-ÖµÌhUI*zcd먑®Ò%ÝOkõ(ë=9Í!,h¾<Ž‹J´[yŠ7µ[Iöޑõ{Džnð¶¤BÔµ,C—1)Ùfí d©ÜqŠÓ,ú˯² N”ƒÛ(c©¦Áyá$€Y ‚Þ܁ïýþæõŒãq•pâ8†R7Bá`Ù௏f éMxfü $º?Sö×jÀ®[+>v€ +ŠwÂr¼%ǽUO!ðZY‡Gxn,ÕpňŒÚVΧYIe"*ÉÿN›Gë“i3úÅùË­n$0ت‚¬ë7›ºUM"ÙŽÖ½£R•íđ…3IOÒ६kÚhC ­«å3YéúΎ¹x/Y $Ÿ»š¡«©‚kŽ…ý°:ûœÿ:ãü*áóCþ!ž(%‰Øgô¹’`‹è뚬Ø^Œ’ä`z ‡!‚h ;£·• +èÀIK>ï€ K.H1£ÚAߐ0Œ'?0ÍÀÚ§„C¨>.ìÈ5RðºñwQOª–[8äÚð׊µª•ã*¡PþiÉ囝Z@¯힃/¤µ¨0†»Ö,`­ïOG˜¾mÀTF#ŠJeSšx …úkd³Lš0>wœº«úqæÕVÒ(7ùŠ1’HX@|ÛäAËC˜Òc°– p@8ƒ¨FÙÓó…pk…º‘Ï¢p‘K‹z¢Xx5²kÖËM$•E§ (}1 + +½`FeotO=ú¨•Az¯Þ„^ñ¢ˆ"ӌÐ}<e|ü;‰§AIgô֗e€ µ™|9Œ‘ç ÙcS3ùš"hDžYëív »aPÑOjÌéžF÷»nKˆÐqO€Ü +ñu‰Ø÷º7Ö0¢–P©/ç6Êe ø÷˜UÂM,O€rÀØ{Â1„ç)° >(®oÕs(tT[o{o‚¾ÅNÎÞ¥®>=“®8{iܟΨ–ìŽ§·:ÖIÙ°ý#¼œ.3>~‘¢ô²rTØ`öCÚ^ZMq¶–tœ^FïРtnÁ¤>/XObject<<>>>>>>endobj +1772 0 obj<>stream +xV]oÛ6}ϯ¸ÈS +¤Ší¸Nö°‡6kŠ`«Ó-ºJ¢$6’è’”]ï×ïÜKÚu”îAÃÉsÏ9÷\~9™Ò?SºšÑ傊îd’Mh>›d š__áó ¿NS%¦‹ïËÓ«¸ÇËËy6Ã.gX4ÍèÆvk匷}zsNÓizsv¨xsÕè´½×nƒó¯=­n>P°Tû(ÿñRÑ݇ŒVÍàÉT´³)TÜÎô5¿å5pUd©§­n[yÓ7vhKÆ;¡—ÓˈÒiÕ¶;*&ÖÞeílíTç)4*0|ÐäU§ùQ°…m„¦ÎúŠUi°‡Ú(Óª¼•—âzpE•Á7Á©ÞWڍN?ìÏÅr%UXÖ¨ÞâD'äÊë’Þ¿AqÌN–ö˜-²9³wyت^° HªV¦Ço;æ¦5š-W¼ýÇêcvãÊz¡gkÀS£6k©4^*9”A€Ø~„^‰?IÞ;¤{~¶5àŽUêÔ. +‘kðɀŽ¶à­4˜°réәŠ†”§¥¹̧àd¬]M¼%€4Âþ՚rÌÒ;Ýk'Ç1œhHӗQã'îöäM)À Ö6pj{‘üZë2£;P,®Úۍ¾ &€èS9|U)ϽÉ{ZÞ>œ“jÖÖ ¾2ž ìŽ:®ºÔkݗž¬èFwX؍ zÐX¡Zl×0˜WÚR|ë8°¶úÆòÀ -íýpÎÄ ¦_®PG/V¡^óñíQ©ñáD–;‡ÉÎÉô$6å>Ñ´µÎ£7ïÈ`§€ùES×lÈJæ@,R„³ÏðgÜ#U)fÃÂÑérå–ûƒK(Aéžû²d’øœ 2Æ""W>£wxEEÁNZONšÚô TÎÇ2‰:˜€]¸L‘›¶ðû´^Dá=N?éJ¤ß ¡i‹GÈ®ƒùäÚø—ú¡Ëa[œãÅ(&,`ž8oÐ6‰æãXÆJu)R¹ÿG¤ +c[­@æ÷ŽÄI03N¯C€Èွ “¡DÖÀ†BKóò>ÕΆ™Ïåõ]ž¶¯$+¿‡èô)¤Sœ_0¥LŸqØçܪÖè#_8«RcѺ<Ĕˆ$FYC[™IO¦׀îS"ØÊ;T-ƒæ9IÎÔM”§S’´pþ!Ù0,q<‚Çís‚蹘½þ¶gG[gy$U©1OJOùŽ>ñ^Ò"ΡÂ:Ç^`YЋ—$Qb˜p¸î㤵ê‘ Ö=Ž+|&?;éÏåýOoyý·/³Í)#nÄ´å!i‘¾¨™íû#©´vÀ£Ç娲„û^õ»}š9½¶ŽÅ‚åUY2ç# ЏÇÈN©´&oÄÇù˜èÑ‘Ò ÑÏ%‘BŽ4Ò_×­êE|™d*j켤´0P\ë{S8ëm%Óñâîù ŠG&É·0œ‹èá+qO±¦×7?ÿ{x\fô—áÍ_Ò··ÿpqŠÙB§R4¿}š‚!i´ +—ŠŠgú£\VüÅÖaJájā–xò1Kuv`ï`µ +Ϧš–rÒÕÆ!9*Ó\JÉ÷–” c½`ÔžÓ ÅùáÓïҖøžKÉ1n1ô͸C1•ëýsSµƒx/‚w¹®qB?!Âa–‹ @ÐÇÒG =£‘q¦mËW7Hˆ˜¨œíxÕÈ:‰«£$“‘ÉüáÆdä‹ÈS¸ÉĞ섃¯WlŒ(g·qý£ƒ ( {q{ýíýjoÑÿ÷²>_\g‹W3\÷qyœÎ'|ÒÛÕɯ'ßt $endstream +endobj +1773 0 obj<>/XObject<<>>>>>>endobj +1774 0 obj<>stream +xµVMoã6½çW |i²°µ–¿sè!A»ÀÝnÛ( +äBI”ōDjE*Šûëû†”½ŽìME‘$qæ͛7óõ*¦)~bZÏh¾¢´ºšFSZÅÓhF‹ÍÿÏð×HÊý‹Åì6Z\z1_..Ÿˆ7«huéÄrsþü~{õþÂ☶9P­6kÚfDÓ)mÓëm¡,™gٔ¢®•ÞQgš'K‰´ŽºBjr…$[K™á³œ2eŸH茴tü%‰4•Ö’@9VUª͘ +ñ̑tO¥r®”$ó\¦îfûåjJ“xŽº¶ÙõëøÞhIÀSµiA»F +'…”&êcÌV 1¶€—É\´¥£gQ¶þ|¼šocJZ<;ñRËFUR;á”ÑÀɅ¢ÆŒóî¥#g I+…\¹©ªDBø™åp©žd¹g¨ˆcž¾§S%¾ |•€:Îj÷ÖÉ +Üé}'öÝõp7hµ\B;]¥Á µ’ûØ©h-Л–Ñ‹²4)h£JV9[­%7H4ªÜ{îÞ¸¥`1Læ‹Àâl-"ú$^è¥R¾M§š™ÌÖÐȾsdh\[û*ÓRK/+F­åÎ8Åù*ñ¢ª¶"×mv…ü-ǐ•B{K¨ÅY‡s÷µ øA ôðé~Pojª +„ÛˆþB©)4a¹a ûÇ‡ñ-xU"ȳó QkY”|€‘ùBéGùC JÚ*‰R£óˆ~5(¨ï-:‚ß³´@Èê¯-OÎOIí‚"µy{˜•¹8êè] ø]¨%D‰h‹zîµ7è²zæÄq´Üè!0‘°4gX¶þù ua´i.|{†ÃöÑf _™^£ÉÞIK×'œ<ބRÃpÔÆZ•À|YÖT$t±'ÌdnšŠÇ‚ǽS® 1€f1ƒ%{A/%èZ9Ñì½ÑðÜ{{â9á4šfÓÅæt2 $Ãsb%t*©n Uö¬BM•ASa‘K:˜Kßu?Ùì +F¿9Nˈ~1;*‘®äb.ÎÓÇÜÏíAÈåáØ¥5ô¤M§ .5ÊdÒöÑF7T¨¼°¯”ajˆé´-¬¶ÁüÁŠw€ß˜ú\Û=çB§’å„Úð›È@WÝÏs^¶¶è‰`t¹BEÎ}’ClÈ{éaªy.\WÂnµ…*ß$jÑRdԈ_Œƒ1&ø<ÀŸ‘”6/úa0:~ñ!:yÿñ’ ŠRøOBŠ‚Ÿ~Ÿ¢øtÐ&­2]Ó4S²pömô# +q-Î%§w…¤R« Ú +‹°¥6N&ä¶Â‘•Î©bƒ/8d´Ó±ÎÈišÞÝϖ7+2¯ .èæêvqu; ØI”‘ §bŽŒxá0p<[JxW9ÜídŽÔèóijtNaÿé½eçá9úü6h-cÔË9Ù +Ö±krÛ*KËé ûádl÷á˜ÖÂÊäó[ª%Ðö‰SOµ¡\ã{"œhEÊŠu•%oeÐWς¬ÊU&Ì«Y76k ¤Zžáé‰FÔô+ºG¢H¨—‹=ísåðlÐMzïHÖñA"®(6ÇÈvwPÝhÒjbXõ¯ìQ®6[G"³š¶2+½Ý·t8ŽÈÀƒË–7ñþŸž+™?C‚ÑËrm9F-–’Jrg< „µµ6ºØ#ìT.z°]¦`„iiDŒö‹Œzeg“ɝÌzGØÖ*Ë:B ÜXÐ'Ó. Oºj動…XgÈlì=|œRl¥ë‘.}Uáß,ēLU&ˆJØZe« +„äœ^×Gêd|ނµÈ §|jd­4ÐÄ^jEȯùÌÜÿä^ä%TE¢kë9ù¨ÍÓÆèªÓÙÝ(ڇåUìe 1BkÑtɂœ\qS&ë¹UÉJJ:èÊt$:n&Ò •Y°½ R´¦Ï߁ü[ìV +4ÕT9l!CV?ãü˜>nZ€=y¾Q2yœß^ß=®æÎ<çñd5ûm1»ü#ÉûF7…ÙHn28AèÕ +¸bZÚqŸy霔fü¼³TW×‹ñt-SQeî>Þ5wTøk±BJC§`"¢Bx¨ééÕ§U4[óÛ91mށ²¯}ö1¥7j'™“kµéˆÊ“‹G¢‹7Žž +LÚz{èÜ5cq ]è?êÅŽ%ÕnKߧÛ>§t”Wñ¶kö78Q­`ÛA¹4ùù4'££ŠÀ·Á ¥;Tl^ørċâà5GǦ)×BÁœ‘W"‹ +°Ì°ÙŸ7ÆQ\ˆ»øº@:É$F—Œ¼ ÍGnø<ì-Áj^~x¨ù$¼üÚ9O½Æ@8P"KY$íÔ`zylAè³ìç&“ÙJÉá¡ø=­õžÏµ mØ®=XðÕR…2U<7u ®ÑTÇ[#€/M@6Du˜|<‘C;¬J¼ˆù)ùÜŒTg€šßĺˆ³Ê‚¤ö—ՎCsl  É<°‘«2{ܘ¬¸º®ƒ\ÅF[Lxa;â +¬Jl>œòìᬎŸNñŸ3ªœÊ”SòXßõVˆí¦þ‘b§ºHÕ¦ÂÖh\žó”š/A†²Îÿú½y4žãóAÛª‘Ozüqòq„³endstream +endobj +1777 0 obj<>/XObject<<>>>>>>endobj +1778 0 obj<>stream xmUMSÛH½ûWôžBjc1ú°lrƒ[®]¶¼…9ä2–F–@šQfF8üû}=’X։)(ªi=½÷úuó}“ÀWLë„ÒœŠn!"AYGÊ6küžàÛ*ª7ûÅå}FqLû ä›5íKB»´/.¶äm£Jzi¬dÛ¾~©È׊¯:GÒ¾1MåÒIê2ŒÆsè SÝ5u²T$©lªJY¥ EÞåãþi!h§Q 'éÂÃÎÏʓéù%.¢­'?X~”¦Äs‘ÛÆQÁà¡åˆXýÁ¿ÄÀµkJe}œÅL çªáä ¡GÙ$5í 5zA…³þßÎ ÂÖu£Õ/2ÍÃúÙ8[Æ8ðLè`Íp¬=šÂF½)ä89ª,&ú4°zÎp,F±ÌÎtj}ˆÖs^¤kÒê4Ï´%íÒ4eµZ>\ ‰"Ð8œ˜À¦¿õÄÂ×@:á(Ðјòó™_Ù ±˜ØaP}Øò’r!~Dí¨ü9Ñ¿Œyf?¥'ç±rLä~¿ƒÁ |úÏ|I‡}­ lãìÅÐcF¥ã}ܒúÞp`j&  „0M'хéöÖxS˜÷ܛ -† 8à¦c€šã4õÊV¦“|)O¡ý èû€ëˊŽÇ­iõ7Ó%s\ùMJÉz:|×7×´³æ ã¡ÛéDãÍ6/ç–kãQ^$«hÑ#œ /ãÙã¶,ßDù*Á? -´ÄنkwûÅ?‹ôðˆendstream -endobj -1792 0 obj<>/XObject<<>>>>>>endobj -1793 0 obj<>stream -x}VïoÛ6ýž¿â€}ˆ 8ŠÅv¶O]Ò.ÚÆC,è<´DÙ\$R%©¸þï÷Ž”âDíÚ"€%‘wïÞ½{äד! ðH³§”–'ƒd@ÓÑE2§É|†ß#üYIyø0ž]âñFÓI2ê~ø}urþþ’FZåH2Íi• ð&í]íD奥Ñ4¡¥±^lT¡üáÍê_l›Ðp·æ½Êzw¢ÜÚûèÈhÂO•I²Bo%™œªBøÜØÒѦöäw’”Fø\¤’DQ„7Ç5•5O¼]9ÒÆcÁ^§ÐÙp¦¦¬„W›B&´ÚaeÚ NöBi÷œóÌU2U¹J‘“1`#Ü á((LoIèŒjÇ¿—’ÄJ/i8k*O’ W -F† Ý,ï¾'c–LyÉÍòԑ*«B–`B>àêª}e´µ¦®°ÌõIÚ> -ÕgÎ…°­{J»ƒG*š,œÑný†‹•h¹ÀŸß›)!&媐ˆz.}zßpqá±0[”È™ œ;NQR)€ä~qíÈÒu¹‘Ö5lp¯˜5ƈÞu*­|,dÝ[¿a˜b` ú ì }4ÎS“Ed%÷e¿3ô¨Í>¬³¦’ J4áñ%dé î¤^÷vLUؗéô©úc´-_(ǐóu¥2®lkXv†˜A¦²ƒ~¯ DVDýÊ!ä ^®'فp0õ)úÀ‹u-í—*<)–™v4HEö ºÇ;žDX‹ë>–©tG¥`ªä¥‘ŸNοI‚N}ùøöáÞÉbhžy^Ö½¶‚KtcŠYPZ[ žË›åÙýC30••iQg ÿlä?½¸Oúœ¹“³v54xªÍÆd‡SúB óqÄ4„©Xä6HêÔÔ<Ù #h ´ìC`úgÑ2%Ì(¾m­€#„7¬ç\ÄQGÎ€2[cfY”Ì"\¡ úy¨öÊïÌWtÂhÌ^fѕºä̤5O-Ö!&½Y¾f*±[µF'ÉÉgáÀ5OX%œÛgëÞÚjàµôÜ2õ÷£²ÆH Ú¦)A«MŽ·HãG<8+dέ”Ï¯"O' „úB/[äÝJ‚’•Ð0P€K…f/†')øõOMn”ÐÝÕ-Ýkõ¿výÆ蚮‡Þh2EFOhÛ+ì®ÝÍêX¹8–`–gQb2ʊ \]-ÏK0èÓêãŽ' -Vò¡ò]iÐt -M'ôZÍNÎ,†íýçTG1¦ÆÚºò” /ÈãTrùÑáŽ~ÿBÏL¢ÐÇýíõx~AWFk¤ç:¯­â’éîÃ]B ”äH^ÌLÆu7ÆÉ÷ŠÞ[l¸1öU%á:wô”Þ¯íºËöbÙ\·¨ù—l œ%D_š-â.ørµ¯C©æ}»½4Oò+~™ÌúÙ ³ùÅ"dÀ¢á`Ð?YC ûÙ0ž¿¸Oãð'èÉtžL/F¸uøprÉ1Þ­Nþ<ù„+ÂPendstream -endobj -1794 0 obj<>/XObject<<>>>>>>endobj -1795 0 obj<>stream -xÝV]oÛ6}÷¯¸Húà±"َìØC²´˜¦[?l@‚¦¨ˆ Eº$UÏÿ~‡”ä:Îìy6KÔå¹çÜK}e”â›ÑbJ³œx=JÜ^/“œæË®§ø³‚Êø`6Kæ§ë·ëÑ凔®i])_⢠ ¤)­ù˜ºOm~¨p9ÿ:vÛ¯o/Xövý4Ji’¥É;†Þ²m0<¿0Øpî‚AöfÀ੎ąµÆžeoޝ¬¬ðáÊÆ‹tÀÀzž\~˜S–µÙN¦yˆ}Ûxò•t$5~Q,©µ¶(f´;áE#‹äcÃ9*àd:G -’<*³Adß:„“èúå¡´PxñéÏƒ©õìœgizÁ† -p€J/Š!úz¤ÿ%Ϭô·‚y©#ÕlƒúFÂíMÖ41çD½pWSã`ܪáêX9-ÍÌÑ i %¦ù‹G¯Usdä+æÉU¦Qm­)Ýv! ˆÐ´ë½ÇÄtño‚ ®Ol_¸F®!i-DAÞ+ðS ‡L¬ÎÇÕíÃ=)©EßwŸV"aî¥ÑdÊhõÀê £{ö,Bã$ô—i,ýÜÚ ~–LC_ì¤Ra›&eÌ39S ôèPò9¤.Ý`Kµ˜¿Ä‚ÇÔ¥74QúeQb¢Á!Âé ÝZ!F2ôv^ dþé÷oïWwà¥5u„:-LkRsÕÂ%Uûàš²E7ƒfÝÀ²Iè‹(~ƒ">JÝü›zcÁ­Ÿ¬V¯X`È#¿Û=!RÖ(ßo>ÞFEcCu¥vž)åƒ8í ÚÛ} ûRx~Yç±ì¨4J™Ý0qÞâ_6Å ƒo¨Ün¦³¢Y-Β³ÂÔLêxó:øú: ]Î'µ*B,‹"˜ÑðR£ƒKÆ¡²5µ.¤ ØF-Dɤ‚!nêºÑ’3/‚"ë4ȍµÐ°ÚÓNú*ò·3ú"±¢4–j¶§Öbõ;´x4^“v•i] ˜º0Z6eP²óTU` ˆ'·¶Ù¤3ìçǯm”b½‰ ÷Žî„Â9n¹kGB&$Püä¡;Ébë‚xށ¯–Že7Ͳ4.g”çóö,¸¹¿½¡?¬yB‘èÎ𦆷(°sÒo˜,Òð¶0þʝçx%¹šâ öÙU<¢Þ¯GŸGÿ{1mendstream -endobj -1796 0 obj<>/XObject<<>>>>>>endobj -1797 0 obj<>stream -xm1oƒ0„wÿŠS¦tÀµ g$J+u¨Ô6º:`RG‘úïûM§Ê²õ$w÷îÊ$‰"ÅF¡ -Lp%S®é‚æ”nthØΰÇç-dӐDi Sƒp!`ªuªxÎQ¾|>˜óf ˜l™™z!$ÇÁ]'׍޶øp¶FùEï¢Ê Éu¶ORÊ©×{?Øcë»Óÿ*LÃü·º…qê’±‚—Øß܀Á†£ÅÅŦÁv•ÃàOo|eÛö›/‘ú7R*j«7Ðù²í¡|ݕx‹ýÙU#ö}5Zڎ¾ïfarç“BlÿÚÝûgJs•§Ôƒ:È\Ί'ÃÞÙº3cendstream -endobj -1798 0 obj<>/XObject<<>>>>/Annots 1102 0 R>>endobj -1799 0 obj<>stream -x¥WÛn7}÷W ôbVÖź䥰]»_)q -(¸+JbÌ%7K®½ôÛ{†\I¶ -C‚–KrfΜ93þzÔ¡3üuhإހ²üè,9£AoŒïþhˆï.>¥¤¿ÀÖÝׇߎ:ãdLç£A2¢œÎÇI¯~Ð4 ×ô#Ω7Ä«øÀ¯ÎGÉ°~ÌiÔÅéý;¶Þïw’Žups§~Ú]Ùëðþ·žuÏ{8ÐëñU9õ‡Ýä¼~ÚƒsßÅs9;jߌ©{F³  G4›‡±’\­DáeIÝaBS‘§‚„™“õ+¬]Mn¦”i%w§³/¸§ON¼§Õ%]Üt2[)GY}KfÊ`!œj¹Bfj¡2RfaË\xeM¯SgX_Õë'}¾ ->tº™2ÞºÕÖô/ßÛøKº„f«ªt醌]ÓJ¼HÑñ«àµi*ËD“ ­åœ~½øtM-rRòµgÔê¢õÙJnÈKçIyKÃÓ£2s»v4>oî~ßÍF. …°(³yÐR¥•ßr®b¿.<Eò*—d´.•WfÙ¬­vz¾àÎZ8žà¥@ÔIÎ8~ž‘·qªb.¼„ /Bi‘j„‹Z”R<5ڊ9žlŒo±YËôÀ®S¸çé„=D’€ \\ XÊJ:`é(•Òв”Âë I³&“óf'Q/Ÿ´Z¶êŽ(“éj.çO§!ɯÀ½Ð ™H/ØÖâÐêÃ~m£ó*/´ÌAµ@Çþ\Xš ýLŒ²“ÀGhz†—áõÇ»ÉgÊE¶2ÒŸC¬ä¶£\–™ÂûºNRQÚy•y@¨5ø³±ƒ]V`[ê¨ .sQ%x¹_ŠÑo ï\áø¶V~~’˜ÏAkà„«ŠÂ–šóµR%ãoBÆvgcþwð€boàðVï$ X1=W =®ÀªXÕv±€+t;ÝѸö ydDö,–4ìc àPºð?.`øx`óíáf´x¯Lõ ÛË ç«• -‡`ÝÆy™»§ÓWu¸­ˆ•÷Å»v{½^'àK¹¶æËþF®ÿ^+“¬|®ÙÖµ‰H7¡ûi—¢ì6BbX[½³(P›.—ÙïÈ{& MÀ³PË -l¹Ÿ¶»ô(ʂ®¬12óö‹ýPt[,¸1@Œ¢äªÈ$[¼ï"Ê¢¡%ŠP·FÕrÏRúâÁ >¥èH¶bA6T㒉Òê0¸¤z‰Ñí´”Õºô¨½†Ó Ã -¼N±nšå†kÞ¯X6ØÔDþ‡„þøZé† ³øø_ËêÓÉñäò–¤,ŸN#ÈYÝZÃdÄ Á>uCŠo·½#¼lm³=»zhOÀ“ã‰a‰¨°XÿïZèZq9¹Ÿ’eù†4/¡A%ÄÊåõÇÉOÚáÆ×ï!š MVH{¨ß…*Ñ6¸l½]JÉXýøEÌ}²TŒ;A]œZA©æy»Èo…FBŽTÔ&ã–puëȅ©„Nh²ˆTeÁb=ßDáæš^ícÚAöµ€Œnõëà6p_ÛÒ -·"üM‚@𻫍©Ô(€HuèòÀº¾ A6ýÂ%S{ޘ†bGöUÑÀf&sÈÎ (cà¦ Ðëi.]VªtOÄ"ÐôK…¤ÐGHsí‚5ÈÏa s›U»~ƒáÇ ÈñíÃlš\¾nòð‘=srîÿxõЀÔñþâaÚw[\,˜Ý]Ïï?]ؾ?”ÖÛÌjwÌràØOnïÀÝ@'^¸H-_Ue‰e5 -ÖCÄ™˜ ì†ÎóÑÃébïæ<³”dª<•etÝdA’1¡4 âHn£­"{‡9ï˜Õ±¿p§”åÓ kz$`‡~Z’¶ÐÐ*É¢ø°ÜÚ"vBd m‘ Fäu§ÅB) íˆm¸ÃÜEk€‰E“+=}¯œo4Yªã܉›éqr7 =;ÖüVàò1“„óÆ÷áæ -#`™+cµ]nösÌV®¸¾é <1äÓgÐS»ŸÁb=­ñð²Kö9…’.v@ÄþCº%iŒ+šËJ½Ï©ÕHå -tjbê¢M€ "OBrÚ7£ý€>Ǿô3>ÿ‡28ïFíîœ_ώþ<úûEendstream -endobj -1800 0 obj<>/XObject<<>>>>/Annots 1111 0 R>>endobj -1801 0 obj<>stream -x­WßoÛ6~÷_qÈËRÀ¡,ùG’Á´Éš¢I³Øk0,Ã@K´­V"5QŠë—ýíûŽ¤bÇEÑ=¬iU[$ï¾ûî»ãåï^LüÄtœÐpBiÙˆޜßҍÔr©jð“¤ô¦È•nœ]‡mQ›²ó;_0¹hª×Q„§(;;"5etÑÚéÆFނ`úæüV|œ&‘ )¼®w0•µ)Ä:×V´ORè"ú§Pª]G…Ô¥ÔbՔûßóZЕk,”²É&ü]ÑÆà­mdQÔù8sK© Dе&IºmìJEŸT–7žˆ¼PôøxŸ.ïa½¬iöüfyt˜zCfáö8ZæØH•¬›ÜaaÏ2ËÜz‘ke_ût è´ËÆH°*iïO28³ªi+¡¾ªÎóÀçwo'a«VÍú ‚vcÿÓî§,ëö¾Ç0hh®@¨¢ TÒ±È*éÈ;/¬éSfôOM`–sm¦2º½L¨å¬ÎŸ ž¹J%“zÁþ¼].7‚f íù­â #H÷vºk‚µF[u¥¾;eUí<26‰8|S‰t–ÛÈV2žêmý cϵ+¼¡ sDxJ4òG`´­²´^)íëìñ‰…¸_qiµ$;à4ÏÎ÷*îM2¡™òn/gôéúòåûÌàÁk5sWç(6_1t¯¬iëTÑEmÖVÕ}ÒÆW7á+C#˒‡Z:DÊيÞ2G…ç_{¾óJ6é -%ZT|–›H„³®þ9dÍ_ç(-Øíò¾ç•#© 8 äq¡¸ž„âkHBBxDãk+„Ž > Umæ…*mŸl ¤àºªǚë%¨Ò² ©ÚómæŸQ›0ŒÔfµ\.¸‹–5÷¥T…ŸS.}nüÚ! |þ@:#ß³‘ÇkZ*Ô;g qÅgf­ #3bM2`nÆ®;xØï)ä*¯mÓ§´V  ¬Ø¢…ÿw÷×·³·÷Ÿþ\éŠ ö‹ì»3 ¶®ˆjà - ÞfÊz º5°Ìç÷cÄåù_ŽWKek²MÈ°Uèh€„l§`—z­€ -äu7ˆ©óe®eñÜ0œã¾Ó3_`)£ƒC?QÙ„.«Ûahg*;Ucp½ò:ôu};ëh_0{ŽkÇOHŠS¬ -îÂ}M¶œ£}腫„"Bòú„Fҙ*eEg /º’Û‹3îî¹ =¿¡»Y:WáÎàðÉV*͹+¼—Ÿ%¼g§Oìžcc}w·Ë6N÷6ˆÖ‘ä‰c+<nêfaŠ]#Ü;ãm4™è3ywäÌñp°óê@dê)G½ð†ƒoÐ*±¯éÝ}¨Ð÷¨‡ñ:Ã1½¼9/WÌÎ{7†¬ä“‚êŠ&ç>à½C†²ª@#ŒýF §H£‹M Ûß,;Ì8Ü[2³;õÕ^<²Ú*ÌM:±Û=†]È´iQŸ›—ûƒòç­)vjŸÜ©†û_[ã|¯p•È'™¾œ?úÙÃ*hu¿XÒ>_«Î$÷ Ì8¦¸×Û¼¬[~–q#Ú ½k}L3–AтÛØz•£çîދ[zÁÙ¶eb¼äi÷h&ܶ¸kr JYµëÀË-ßÍ*»#òÑp€1šgX> ú “_"¨ìٛ»èú]I¦_|7W_j¾ýŒË‡èw <Ï©”{q/ÛEʬz¤!¾“P@ñ¿9œ i‚ÿàéùÍÅ9îmÃ7½5i[b^v)£Ãpî0ú¹ÿŸáãùþ¸?â_ŽÆ ’GñxÈ.g½_{ÿô{endstream -endobj -1802 0 obj<>/XObject<<>>>>/Annots 1114 0 R>>endobj -1803 0 obj<>stream +† 8à¦c€šã4õÊV¦“|)O¡ý èû€ëˊŽÇ­iõ7Ó%s\ùMJÉz:|×7×´³æ ã¡ÛéDãÍ6/ç–kãQ^$Øýˆá}Ï·eù&ÊW þQ %ÎR®Ýíÿ,þòïð~endstream +endobj +1779 0 obj<>/XObject<>>>>>endobj +1780 0 obj<>stream +x¥W]sÛ6|÷¯¸ñ‹”‹)YyKe;ñ$‘„™N§î‚j’PH0²þ}÷ҒÙf&mÇc›ÜíÞÞüí,¤¾BšE4ž’ÌÏFÁˆÆ‹IÑd>Ãs„ïRQzöÂ>uËùa< æE üĶámxIW†>¹a0ëîÿ%>Þ,(Qœâ”élNqB7Â'²¿ÜŠU%Ea@ËR «‹ ½-M½£ûÒdZèFgªzÿéÎ gþœÁ˜s“>6b믺H̾¢ÞâɯœP6+£Y0啿™š +¥²[Åó6shkJ²†*eÛW¥I9ýÞ5û€)Tϳí„͝ўϸ\HçÖ´…néŠy,¡Ð{þ͋ýÍÁÀu.# ˆOKªœç&Îsy=“ \åkÌ-x‹à¼'·[֕E·ù™_mõvc·GÁÜ_-»…㺄»ÀtL<·?,æ÷¶é%Ï⥓Cî-ٔbÓ£ummãÑۗ2Áe,éÿðؖ•[ïÛkót"Iw|#BÔ­G"I<œBíi'ìö‚Ôæuw|Ê×V廇‡Ô˜µpªþoYy¨0Fë1ž¦Ç 43çüBÔÖúù‰ëÅ9N—q×?ÇɋèNªt¢>î¤ÕÞ£îÞó¼•h€æºÓ“[<;Ý¢Dÿ+—•Ù7‰@¬¼Ÿ%t̓pqt°7¡bÍ7Dvf?[O;¨mŠ¦­›óãÝ;EÁåØ ò_Üô'Óy0½äÿ: Êpâüý:>ûtöÇã°endstream +endobj +1781 0 obj<>/XObject<>>>>>endobj +1782 0 obj<>stream +x¥W]oÚJ}ϯõ…T¤o4IoQB’÷æV²T-f7¶×õ®Kù÷=³kÂmnu[EM¼;gΙ¾ùÔŏOÀzŠ³£®×¥Awà ¨?â9À¿RÒÒ¾8íâϟ¼èz^ÿg/‚³³¿øJþÐ œg~è ½½ Nޝ‘ߧp‰Ãƒ„»] +ããÀ÷Ï÷h–,$ÍEI7ÊHý:ü‚[}ò}w« qëø“ªH¯U•.H͍Hr2kI³É©%mU…ÛaŸ*Ã+øt,rª´$Í ¡õfAFáî%Ú£{)ðLd8Vˆ•ôØq—:ÁùÂáCbÖ4Ù\tzƒ*Òb-(Vþ¬ù$+Tið&µ=E@"ŽU•’|eåҐ™Þæ1eÒ¬Õ¢qé÷€\†ˆŒ6b»³_J›©M¯(Õ2I‘Ž4&5 œ•ðŒÿëJηÔÖì>ðžïr²ˆME¾F•[ª­¾„z€Ä\}L6b›õ\² g\Ja,†ö’V… +€åß$ƒD«RUE㑒å ¿»ZÃß`±K§[JU̎¸`7áGdé]ŒC²€ÔTˆU‘ ¨æ̂ö¹È$%†+__›Žo~OÏ£ 3”žü._à##ó\YRëDå"…C &ƒásÂìzn–âµÈWR۔´Œ«21[æ²Ø¥°,Uv€ŠÊ-ö%'$r8J€Ì´ÔÆY«¹W‹:_m\Yœ(\FìœYxvïKߣ¿@aHîHÑAιI–[ë‡:ßÖ2À}üͨ'g<$ù‚#¿ i&KP…úÛ}ƒäUb™<)swƒj¹Æ‘Y’îðKò¥*3aP°Í:+å*Ѽ¯ò<1KÅȱHåöÍÞï¯.?}¾¾=_žŽÏßOn.£hvû.|ßãišÄ¥Òji¢è)‹(:¯J0Ïü )ÂuÝ9å^Ãsm¾Éäã.Š½3G›CC×Þ$8ô¦«9>Õ¶` |ŠÖıL͜i +ŠŽ°V ôšªÕ +r@ê¨/·¼ƒÌb••aúDÇ¡‚’ 6Óèg<À¸sÁÐT-ÒÐe,âõžê¸1nDnÇÜo[îëȁü¾Ù&§=ŽT&I¡ +/zM“\ó”¨sÂ,ʄ[¹¥k„Ú¶uZÔ´Dë9J”ö €o"­de ü$øfý$ŒžZ^×<ÑšBb'ÿܱåƒi…É[Ï«¬Ò”øÝtÁ}ˆ­„ƒr‡;ª%å6µà"¢4ÓÙÎûF•Ú8j‹ÃÒ:FkËe컉v­VÌ´%¶fYMÏ -²$gyðh¨qˆë9ÜÁ„çU™EÁ`HÏó¶/;Më¾OVkdœ&ñ£åœµ¦[:¯×¢ Ðhc¥26ÔB + ˆDꖳú;>ϟyãAueu‹Œ˜ÿ¾å™ s¿p–剆ŸÆ[t¼K½_屌^ÿ¾ÓgéÌ+cP·Ö¹*¶˜¨€ÒÄé՝,³Ä7Ã! W4WßÛ%;·ªEÎýðáY2­k¥ю_‘Àî& +C)HçH™¡$˜q<˜Úh52w»­®íˆ×ÊœÁzW`;iÃ>G+îùÈÉ£gÎÝzÈeÛ¬“ØõÐFdV¬hµ˜ž<Ïç©Ûlµ]"Ç{vKã1gCÈ¥­–yžðìƳóL ֿ£ËÕô/+:?gÒ §Î½°§“‹Ëñ}ø>ŠJ¥L+)VVU.ÞP¶mžkÐÃZŠ5ù´ï.´¥9y£Á©Ý1V®G·I5©Ç¢ȗ»ë\ò$%<µE¾å£Qê%¦3ð t帽â­óËj«®•5N1^ýÍçFmx|ûØpØêÕm¬ûr®wƒÝß²-Wèƒ-n??y÷ßýhTwH¿ŒÏz4ö¬gãéÛ1÷¡/\ó WöÛµ-ký¾ zÔvϸ6/!ꣀƒSþƅc~ÿ”¯_†GŽ~Ž@Üendstream +endobj +1783 0 obj<>/XObject<>>>>>endobj +1784 0 obj<>stream +x­V]oÚH}çW\ñ²‰lÀ¾¬È×*jÓ¦jw%^&ö€§±g¨gÊ¿ßsǶBØt…UAì™ûuνçþè„ÔÇOHãˆ1%Eç…ã ªŸò—0˜P<}~yzŽèÒÐ×׏…ý`ôòX÷³Q0 ádŒïþJIËÎù¼sz=¤0¤ùÎâɘæ)áx¿OóäèÒhÐߦ"m6”‰'I‚Ö¥Yª\’Ë„£Dhz$SåœL©²J¯ðF’Ńè!`¸jnXrÆäÁñü{'Š‚¨R/“AŸGßt*Kúúû••d–TgÊí³‘¥) [pÒºÑÕÏ$z¿8,ðé煮Rá„wÙ§^8@%ákΑ?J¹¶”JûèÌúÙzeÅC.ý ÑFÁ0՗”%ü +²2©J嶔d2y$-7HŒþTˆtcé¯;Z™‘oQ£óíî++Ë'•HZ Ü ÇÝ8.ÈNtMISå#IéI 8]•¦B˜&Wɖ”¦iâà¸T¥L¸>ÍQö½ýЍâ`ÈÑw/L±®J|aôR­ªR8eôb1M ¥•uü?ìÍe±Î…“v±˜m­“Åbñ 1Ó] :ƒwÚxŸ;°`ʽÌFËÒfjÍ0Ü«Ö]›PÛ.ßé!ï6Ä 6)G63Už2¯¬t\Ûî•fTÒnÚ7Øsٟ`Y°Ï·†¢ÿ®Î^|B‹Ü¬*ù;Ýà¦9a2iڂç@ý²7vìý?×Õe@a•á¸²ž"»ñÃ[|\¾¹ƒ™BÔ@ÍGùfw¹IDþ C)’l/‰÷gãx#´/–C³p€›ÔøVYš<7Æaqô98Ç-Jþ }À­Í8Ú +#Á75ߦÊó¢¶q6¦|ä4š—´A¹÷Dj +;oǞ„§×I3_zhöÂá¨îÂE‰=z¡ݓºi_¶õÛ|ö×冋] {!9”&¯Jý—X½?Ó]•{ßä˜ÉÒ|Zñ{0 ±b¡o?ù7ϋ¤fc½BdXô´ÄȲɛ¢ é4ÇBt¼¨”r Éæ#ü¶1ÁZéOq‚;‹V’ «$©n¿Ü°²Ìúe´ÞùR¬Q¯Õ¦U­_Žüvó¸—h©×Lì³zÒHYÆA|Ѩó Ëlz{>å%ç;PڒT<^½d±å^cóž ¨7îŸñù( ¢ h¦RI»¯ÁÚÅG‡ñ$ˆG¼üãX8ŒùÙÕ¼óµó4íxgendstream +endobj +1785 0 obj<>/XObject<<>>>>>>endobj +1786 0 obj<>stream +xWMo7½ûWÌMIáÈÚµ"9rHÒ0Ð4)¬ +äBíRZÆ\rKr-ëß÷ÍpW’…Ä- ;Ò~pfÞ¼÷fòÏEA3ü´,ézAU{1›Îèõ›rZÒüf‰Ï%~ƒ¦Ü¸^.¦‹Ý(Êb:?¿ñ~uqõé •3Zmd±¼¡UM0ÕêŇFuI*Ë)ÝéªÆméNµkõrõ]Þ,–ùÍW×s䳪_àÑbJ·._÷U2ÞåGçTãåâÑUc"9Ÿ4íT$•’ª]Sò”Ã ¶rzƒê¬VQËÃx2’ITy—”qxA92mçCR.Q”4Ӟ6æqJ«Fsø½*®s~Æm|h'vrD£ ê:ktä¤F2.&e­<Œ˜Ž¶Úé ìôGÕχêÕ_‘qj|L´FÚ5uU>Æ­£V¹ýYL¿RaD¶A«¤qhjøÒo‘-Ê!ߧhjM{ß`ÑêÚàIr:í|¸ŸÒû=Õz£z›ÎÐÈu¤ªJw«Ë©âèà[ »—R.iטª¡V+Œ$`6‘Bï¤N°×ô CdxÉã³æ¤ N>$RmBÚ=7„ƒIé€2$N…F¯5éØéÊ /{zè-7dmµ´ç— Üúâ4ÇgØ"Èa60x¡‰‰W1¡ð/ºÝã?9á¬À/kýn‚’êñJ­Ý~B¾cÖ 'ŒízŠ´7gÀò%³íC&ÚÆXDðä’–ãî(Ñ¥iQÀ6 NRáÆT”ÛJ!’Ù”Þ9ҏŠë¡ÖlðKÿšÉ8£7£¼æ’¶ åÐ[* ;({ZPó(7Ö쪄0‡¯×òu,dÝÈñ†‡ðø¹šå¨§ª4 ­ý4ͤ:)øîóû±¿‚¢kb}¥,7¡o/ ¿ca¶]Î{)]G¹A 3´d@î1ÍAÖÕ㡘RÞ<–Fï8žd!Y‚TAoÀ‚úÉ=øLôÌ]¦»¦ +æàε«ÙŽ À±NU÷:‰ñä3•ÍH F«Â=ÛZBøY“vìlFàî:Õê é|xÖf®G›1,‘ªôÿq™£ ¾ò3ésÙhø+D3ɚe1qáx,ÓwJZ.¶œK‚­¢Q`†¢Û»ßþ@õ¬Ñ€¯_¿~=~í|÷ßé&°Hó¡÷q4ƒÑóeд +åt4bÇYr:;LŒñáÑ9þÆuvšªí‰W¬57l®½XûèÖÜgçØxö tò50ŒÐ‘NÍ/dýÈâƒØրõˆ6 ÇxK{*8ö0mm'Å`3™\2[Ù¡c'‰ìLjÐ&aօÄd”‹d8¡ØÃñAX|™]òßârLy^g{¡+Äzß­!€c„‘ÕÐù$‹BB öìNg¯g®u'bB†Ò /wÒ#…É,¨_âسà4»Í-›8vÖ©o[œ!x8~ÄE™!ª–mFÒýݸþñ¼õ·yžã ŸÌc bÒz°5…a?h¯è©§1qQYȓ8rûøÇY“®ëfΝG“ÞgÃØbê)Z}x"Ñ¦‚îìž×,¼À›@^ŽT«X!s‡ðp ;‹ë;ÌNéxùBòà,¼…A,¨¨SS§ ܘçÿѼØöœJǬ?Þ+O·Ãq?šÆ¥Ø2õéq^WŸNgÉ°!~fê´çyÇ]9¾Â™ÉHâµ%ÏQ¡_2$díÝ$‰Ê16;øC}X•p߄ÑߘšFv²¢ ë†â}fO[ï!ÌZ«K +¯é· ÝÒÎ÷@ +Û 8òö€í[0ûÞ;Ùú²¤r`k %yØgäUWÏV³~Ø‘´~@Sò¶…a@[Ì=RWeª3O‘ŠÞ ·¯>Ý×îùužèÏ/õsì‹×%þ3€á_̗ܛ«‹?/þA›endstream +endobj +1787 0 obj<>/XObject<<>>>>>>endobj +1788 0 obj<>stream +x…VËnÛ8Ýû+î¢@S –-ù™]¤éèb0Ô]MgAS´ÅF"5$ÁßsI¹~¤ÆˆD—÷qι‡úo”ÓŸœV͖$›Ñ4›Òb¹Â÷|Íß~¢]|P,ólþ³ùjöòÄûÍhòqNyN›Š,×+ڔ„Ó)mäͧlGÙ½ +A›=u- Úi§zQ×*ebˆQª¤`éÉ؞úJÚ<<’0%}ùðH­uÁócœÁsþ÷¶¶ò)£Ï¢ÙŠ7›o£)óYV üMç‚+Ld9UßrÄäã”îRŸãbŽ!Šä“|¶"üŒ ç÷@¦Ù–Ç”Ól}Š[ÿ6M#ßÝeœ™ãæóÅÏãÎK®¿Á4µð¬Q¤=é†!&ðÔs [—ʝ€Ü]ˏ0Ž ´U$z¦ÁîH‡[ÚëgçP!g£¹¬©ÇÙ8EY&nÒÖÙ`¥­IhF*tpPÂù,!|G9ÀRψ‹"[dôÅ3ù‚>=>¼"_q+¥2±Ô師, åp9±µÏŠ*[ú¨#žÆw:ˆm­n9&éGÚ®.!o©­…ÄIj,Ë®URﴌÕ0]ÌzÖD„@û«‘£0!·¦¬Tj/э^ÉÎép ÊÖ*£ C¥é£˜!T»Û!¥òQ¸©\ÜCߺNó”«Ò§#±Ë³ Ø Z£Â:\çCÂ*®ïCˆË$ꍥҢwËۗ ÁH¿Ü¢t+_ý{le=«3UöîåwE–/×Yž/²é¤Àæp|ò_Ÿežé›&SŽ¼ä<2uØGƒ‚5ÄÍNSD$¤5FÉ ­9 !b>"J؂ +Úv¬jE‰jí¢&®Yþz5c-EPüòÚ¾¾Éèá¬&“zAblՍ^y½ØjT™Ñ}òž3A8xhØ*^´a "E/.ŠFCßèʚCc;Ø´§Î>ëöæmGPϪæ•æ­LØØ mx „|RŽk‹pUòà=Šf+Ø÷œš´Â{ xZÇÒq‘ý¸ÚgòL§ROi;yDC²ÖP*> ’|FÐëAÖЂVåk,U‹‘@WÜ1 çð {öä1~W]GÛàmƒ°% ƒˆ¼­\T>Zcˆ´[g{„Äóþ6rÍÆÝÔu†Íä¬>ƒ{U;Qï”*ØékL¢€g. ðM£ »fgj6€¸†ÂðS†M¬±FSÞ£Á jM®Ç$DšޚÿuØ%¶Ý;Q²Ëþ¸/·lpÖÇé€W¥äzÝwµpàÖX…оLú¾Ï<_«™uûIÔBז"@u|ñž]=¨3RaV˜ý%¥ðXO¶©+ô~ø¥S±zÚàF”,q¤ |§Uz_¡‘søÀ]ÇRƒDň“ÿ>wµQNluÍnüÂÇO–= ·^Ur~ýYÏhQ,Ò;Ãçû?ßßÓ£³ß°GôÁʎ§l7<Ëøx`¼šâ¢¼ùí­6‡K.nBDçó5gùc3ú{ô¹!ÿendstream +endobj +1789 0 obj<>/XObject<<>>>>/Annots 1036 0 R>>endobj +1790 0 obj<>stream +xVÛnã6}÷W öe•Â‘ï—mQٴ٦vۍ‹íƒ_h‰¶ÕH¤V¤¢èÇ÷ Iù¢Í¶@$ph’sΙ33üÜÑ?#ZŒi2§¤è ã!VŽ>¾ëçËxFÓ© ÉlÂ9=ð~œ\ÄKš.ø<Æo%iÛ{»ê îÞÐxH«-BÌKZ¥îf¬$Ñí^”VV4žÄô‡ÊÊÖ*#­¹ZýåΎþìõdq:ÂæQLŸö’@$ì'¡Rªý%?øÃSÂáñ"žóá[]”5BJtQðva%eŠT]l°Ó½"+Ÿ­é“É>¬S“å9m$ÙJ(“ãLJV“À-U%M©Uš©åÒâî˜V{Ɇt=šxЅŠwX†Ý^&ŒÉvêx•¬¬8"¡T–R¥†4ðøëwó@(r¬EÂÚA«uDX_]|¼ÌPmdÓMU8F‰PLÎH©Hвb“ƒ,ƒ ‡™î‘|«/zÎî½FB „ #(c'#Š®mäu„ ÈâE&›Ìî靬 +Àª‹\Ԝ_D)”č|ÔQçÙd}œï€P,¦¡ñlþéö|³ÏcNŽñlÕçÉßävp2 Q¥!ùŒUÄÒJÒæ`e®Ïã); ¹|Dnt ¨½¾.K]Y’OPºÐÁ¾-šM { ŽJ²+š,‘ëHW§íë+ÎOQ4#»®®¦‰t Jq)¹üE¼AfG#Aú†U¢ïi>›MœZƒ»¶tΜ¹½\p„ƒŽÌÁ.Èx©ad6Ì)5ÍY¬D×9Hí3õHzë0"c,îÝ¢ÎmƊž4[G™ˆ`£›ø,r›6!‹!9%¸G@pI'O78„–!ª4Cm|Ýß·“>ÄÕþ$²Ü×pÓÄ¡ÛĺÚÅô6ƒkÒ'ßíe ´ÎHD_°ä8®Ðº8Ë%\¾#¥ƒ40™,mW½Xc­pȓT¸HVPûØ÷¯+Êd¨ÉTª˜&Ϥ‚y¸u°Æ¬>SÊåõE–ú¤Pß)½æö]‚¼yÂ "K*môÖÆô³n`øªž\ ¬tž …±…Û•Üi› Ëòáđ0 I98h“ü)6TVÚêDçl¨e÷â :‹Æ«ì5—”Nlw(±|¨öüÑ!@âiãA£“ ún+Ï:ú{¿êÓø×>ýùʔ·ãˆ4Ø3àNà&«|ûày>ç\#ÁœÇô Šp³-´¶0ÛŌigÛ †Å–›-Lâa?|ä澎x:òÜù4| 0˜~˜)Š›i{üQ±p±ÝWR4á¡´íP9Ï#ó-{WŒ1tG”Ìs«³ßÔÁËã8-W{xÄÕÅ))!ï-<¶’Z‘.eå½bÆÊÂ5LÏ­@?Á%—P"ºy¸½¿¿ u¶m†VòŽóù­%À¸¢9±»>GŽfRæâðÿ(úÔ¹× \bYÌ'c¸®ø-à8›©PÈ0í][ÝIxò#%Ì\̊àÁÁÝi|=#Ñ¿Õè~Ø^Šy®ÆKyô$Áϸ6Å­,¼Ã¸ÚܬýñÃs|[Xo`ߌe'×W‡\hǬO%u^¦—®¸|[µ<Ì©wàå€<•Ž’{suB~¬]Ÿ=×ÓJcKQtýDÓ®’%½JOb½ºT /4L/ÔUÃo-NÜɹ/ÅÜ-Ãèö¶›-ýûòö?^ÒS¼ßç³1Þàx¢Œ¦oÅO«Þï½ðOÐendstream +endobj +1791 0 obj<>/XObject<<>>>>/Annots 1084 0 R>>endobj +1792 0 obj<>stream +x}™ËnÛH†÷~ŠÚutñ"JšÍÀñLº Lº=m§3‹lh‰²9‘H5IåòöóS"ëP2Œüþyî—*Ò]ÅnÆ¿Ø-—æn½¿šE3~3þø㗫8–.OçQîö.Ï¢ävîþj¾Œf.O’(ƒ[Í¢ø7[!°wË8š»\pî]<›G CªÒù*G5‚9º=•Î— .a0Np¢§CZ »\âOõ&ó•Æ¸XD+7W jã™jš‹#HÎc1ªHYƒa9žÖà½Kf 5¬dvž¥š¡LU z $ë’ ÿ p’„xˆ;ñ‚ˆ‚ Å°ÙŠ‚Ö'!¥ø'¾’?E> ‹¨ôA`½h,ÁïÝb%)IEí*J yJî,ÕÌÇÉ\2¢H썒úÀâĀa糩¬Á°+Ma5˜Â$3i‡‘µ6Ó²Ö`ØåB²XƒaWÒS†5xïÒ$D ñZ KkYY‹…]Mâµv‘HžG¯,†]֚ Þ»ŒÒÛ*X ›¤cÖÅg‹aó©Ï¾¾«A‡GëéQ¨ïÈj= kðP_Ãj}GY­§a êX_ßAÖ××°ZߑÏY†5Í xfYƒÉ³.¡ k1,vfFÖbØfŽÈ•"_߀aÙiDXƒa½æÀ K-­¬ÁT!^MìZ ›ÉV v-– +Ê,Ö`ØU2Õl0yNeùY‹a³xb×bXâ›È «y0š †]ÎÙW†5X껜æY0©œ.v?ƒŠÌ lº́5X*¨³Xƒ¥‚‰ôU` – +ÎeRk0yÆ++k±Ô(–ˆFY‹ÉF,GV`-†E3õe-†e‹X¯,–\ª(mÊÉu¥':Wâp,ûBö½'-–`ÕÁ‘õj¹j3JÛ& +$‰¼ÄPÔj–FÒbØT†:ˆZ,Fåh4¬Á°º– « •Pm·L–±GZYƒ‘ÕÓÝ°“C=0 ë5s+ÒVÅ 4+RÍ£™Ö`4ónF¼£¬ÅbWnZ†5–‘ ¯AÖ`XVåYý€“p­—6׃ÉñØ@VŒtà|a‘Ö³PªH=9ó (3œá $ zñ ¤ +Ƭ7) Ë*¦zT0@”ï0ô‚’ym,9¡ý±` ‚j ½ ‘ú1O)J¬HLƔaÀbS:ß°‹âTÜ ²Ãòû…e †]Éd½S¼ê0Ê拨OržÄ©¿¯s"§@8õk¾;@ ²æpg$½A֖Ž„VS–šO¼'yï×®¦b™~2g®~\£E¤iõÿ>yòiŒyÚ!d#õ@¹q†µ•N§ˆÝìoC"§ È œÊNåØ?ƒPäNå§r¼ŽùóEì)r§róÓ~ºm¨½D@S8Ä7rï®Þ¾g|gîaËçÕ|±týªÊoÖ¯nÿŒÜõáP֛ê{Ù½~ø/OSªØ?ý5 Ï¿z(w¥k¶î¦©û²îOOÒ)Ó:<Éø»»¦í‹ÇjWõ?D#_sß:ŽÜ¯wÿ#̛لI"wó»ûXW߅’iäþñÛ­ŠM þQn~-z÷¯ª>~ìÛ¢Þôono/Õ̉×k9s‹ +óå_G«ŠjŠ»~æ§zÊWéJî‹ýcá0ãšþ¹lÝÍíû{·ÞUCr&ÚU÷‡b]Õ}Ó=ýýÜ;v^ä~¿O܍êúL —d²×|së¢v·nÝÔÛêéؖH½Mܧ¢=H…êrÝ»¦5¿Ì\ѹâdØmáÔõ`Rq'þ¿‰Ô}~U7ý`êó럽)†ïgÓÑèO¢ïgvlÕÄ ½ÆsÉ^I"œYuݱìÜ·ç²öZ?¿òkÙvUS~íªÎ»rc#z9CâØ4dê©ìÝ¡%ÿ”jÓVhã÷ßê]C‘¿5헪~Rw5§2z­gÀëOUl§ÏBö©mŽˆ‹g©ÖÇ®t»¢/»Þ=Üܽ½½s]_¬¿¸mÛì݇jÝ6]³íµÇ¦â°£åË]ٗ.:|Û¹mµ#1ÅVb8]‡ß·~.ê§ò²“X,‘èÔŸ¶Ÿ‚ "›¿h”¬Ýø<<$S?XÓ Ï½d$ÆSpôÙ¦Üǝä»é›u³S3g©ÁʐƟVó·?­–—! xx†3{Æp¶_«uéî$}É¥ÖÜ×»o˜‹ýd¹ûëï®åÁ‰õ\†èz½.»î4Æ]slQ¼n6¥ûZîæÏû¥»­û¶Ù×=Íxî²(¦fHêñ¥“E5­Ïö™#<í‘þcüÓÎûÓ©/m÷£^ë¢Ùö Ú —2¿;V»Í á]Umåwùd´9IY[}ÑöãÝþ‘1b…Õü煀3]‰ƒ„6lU—ý&’½s<AÂÙўuÑ3b“N÷֪ޏë¦(÷>oo& u!;üÀ±!®½;>]NÙ¸Lþ$>î/‘û¥¬Ë–í]ÕÛæÜCކe OnW~-wݼ Q` `çʶmÚž‘¤g„Ÿ5 kµ=Öµ^šêÒ.yWôëçSU&M°ŒÜÃXxYÙUîƒ³Ç^ˆßv'5Ž±<÷éÍ /–ýkH™3Ý\&=éâsïEÍ"é‡njT÷Œ’éK’$TÉì%’L*9òí{.šz›ÐÖЯGÜ'./(w°|žp™æOm"üχ«_ý]Q²–endstream +endobj +1793 0 obj<>/XObject<<>>>>/Annots 1092 0 R>>endobj +1794 0 obj<>stream +xm“]OÂ0†ïû+Î¥^Pú±~ìÊ@ㅉJã=Ž¡#cCƟïi»±š,˚¼<çi{ÚñM80|8RCq Œ2üå:¼=Π­¦ À…¤²O5¬Iš‘JNuJ£kµ£Râ4º#®ÊqÆëº!%î@£;Òèfšf£Râ4º#ew«¥Ä®ýºöš¢;f¤™ðý†Ú@£+ðG7¤Äht¯TY”4Óᨌ¥ªÞL".ʹ¿P¦M2R¥þ©~+*78f֏ßS ;²td¾Ò8¸¿m ¸m¸{®¸ÁÆ%Õ\yî@ߺ=a0ãþTÜ6BÓC3míÌ{˜OAÎzÊÙ$ææÏð»M·•QXwU]Ã×æ§j>¡;µ—º<ßùâùÊö û/•Y œùÃĎ֋çå^Ní¾,:¸o‹Ë¡lºMWµMX†k<=f†å¾þéÂâx,›mõ[ž}I¦-ÕJàÿ 1WawŽ¼’?z/½Œendstream +endobj +1795 0 obj<>/XObject<<>>>>>>endobj +1796 0 obj<>stream +x}VaoÛ6ýž_qÀ>ÄÅVÛÙ>uI·Xq° óPÐes‘H•¤âúßï)Å©ÚµEK"ïÞ½{÷ÈÏ'cáÿ˜f)]L)«NFɈ¦ée2§É|†ß)þ¬¤"|¸˜]áñ;Òé$Iû~]œÿvEéˆV’LgsZå„#¼É×;Q{i)$´4֋*•?¼Yý‹mã¶³tŽÐ«|p/ª ½±OŽŒ&üT¹$+ôV’)¨.…/Œ­mO~'Ii„/D&I”exs\S[óÌە#m<ìÅÁqꝍ/bÂÌTµðjSʄV;¬ÌZęÑ^(í^rž¹ZfªPr2ìb„$…é- Sãø—ãR’Xégm¥“d•‚‘qB·Ë‡Çoɘ%S^r»ðbÝGK;Á¥ +OŠe¦ R‘}ƒîñŽgQÖâfˆe*ÛQ%؁*yi$‡Ç§—óïQ’ SŸÞ¿}ü‡w²Úgž—õ`­àݘb–G”5ÖB…åçòvyöðØLmeV69è?Kƒü§——“!gîål\ žj³1ùá”~‡PÂ|`ÓiœŠEA`ƒ¤ÎLÃ“Í 0‚Ö`@«!ö$¡-SŒâÛÖ +8BxÃz.DEpÔë (³ f–EÉ,ÂzÑ¡_†j¯ü.ÀüŠNÙË<ºR¿€à!€œ›¬á©Å:Äd ·KÀ×Ì@-¶`«Ñè$9ù"ü\ó„Õ¹}¾L ­^GÏSÿð8ªŒê m–´Úæx ‰´~ă³BæÂJùò*òyB¨/ô²óHÞÝ£$(Y ¸LhöÒhx’‚_ÿÐä҄î¯ïèA«/øk×o®ízè&SæôŒö°½ÂîºÝ\ Ž•‹i fy%&£ªùhÂÕõò|±ƒ>Û¡>áx¢`%*ߔMgÐtB¡ÕìäÌbØ>|Iucf¬mjO¹ð‚µ:Ä#\†qåê^‡8>/XObject<<>>>>>>endobj +1798 0 obj<>stream +xÝV]oÛ6}÷¯¸Húà±"َìØC²´˜¦[?l@‚¦¨ˆ Eº$UÏÿ~‡”ä:ÎìylKÔå¹çÜ+}e”âÈh1¥YN¼¥ .¯—INóåçS|­ 2ޘ͒ùéúíztù!¥kZ—@ʗ8)(iJk>¦îS›*œÎ¿ŽÝöëÛ –½]?Ršdi²ÄŽƒ¡·l ϯ 6œ»`½0xª#qa­±'Fٛw'++|¸²1Â"0°Þ…;—æ”em¶“ibß6ž|%IK*A­-ŠmÇNxÑÈ"9ÁÇpŽ +8™ÎQ㣂$ÊlÙ·á$º~y(-^|GzçóÅÅ`j=;çYš^°¡ Ò‹bˆ¾éÉ3+½°Ä­`^êÇH5Û ¾‘pG{ӄ5MÌ9Qo \ÕÔ8·j¸:VNK3sôBh‰iþâÖãkÕùŠyr•iTA[kŠ†G·]H"4íz/ä11]ü›`ƒëÛ®‘kHZ Q7Ä +üUÂ!«óquûpOJjÑ·Æݧ՟H˜{i4™2Z=°zÃèž=‹Ð8 ýeK?·ö‚Ÿ%ÓÐ;©TئIóLÎÔ½:”|©K7ØR-æ/±à1µCé M”~Y”˜hpˆpúG·V„Fˆ‘‡Ì½È™úýÛûÕÝxiM¡N ÓÚƇÔ\5…pIÕÞ¸¦lÑÍ Y70ÂàHè‹(~ƒ">JÝü‹zcÁ­Ÿ¬V¯X`È#¿Û=!RÖ(ßo>ÞFEcCu¥vž)åƒ8í ÚÛ} ûRx~Yç±ì¨4J™Ý0qÞâ'›â ƒ# Tn7Œ?ÓYѬgÉYaj&u¼x| }†.gŽZ!–€EÌèN‡x©ÑÁ%ãPÙƒÚ +ÒHl£¢dRaÁ7uÝhəÁ?‘uäÆZhXíi'}ùÛ‹ }‘XQK5ÛSk±úZ</I»Ê´®L]-‹² (ÙyªŒ*°ÄçCÛlÒöóã×6J ±ÞĆ{GwBá9n¹kGB&$Püä¡{’ÅÖñ6¼_-Ënše9h\Î(Ïçí³üáæþö†þ°æ E¢;ÛÞ¢tÂÎI¿a²HÃÛÂø?(wžã•äjŠ7 ØgW³€ó~=ú<útïmendstream +endobj +1799 0 obj<>/XObject<<>>>>>>endobj +1800 0 obj<>stream +xm1oƒ0„w~Å)S:àڎ1d$J+u¨Ô6º:`RG`‘úïûM§Ê²õ$w÷îšp:¹ÄF£êÎ8´LC9͒nth’IŸ·9LC]˜„sS­¥bCùòù`Î ¨0Ýp23õB†ƒ»N.ŒÞ¶øp¶FùEï¢Rä:Û§’rêõÞöØúpú_…i˜ÿV·nœ‚CÁWðÝ%ö77`°ÝÑââbÓÇΆÊað§à_Ù¶ýfKdñ)4µ-6(²eÛCùº+ñû³«Fìûjêhi;ú>ÌÂôΧ9ßþµ»÷Wº`:“Ôƒ:ˆL͊'“¼'?µ·cendstream +endobj +1801 0 obj<>/XObject<<>>>>/Annots 1103 0 R>>endobj +1802 0 obj<>stream +x¥WÛn7}÷W ôbVÖ]ÊKa»v+4¾4R. Ü%1撛%׊^úí=C®$[ +…!AË%93gΜ=éÐ9þ:4êRoHY~ržœÓ°7Áw<ÂwŸRҒ_`ëþëýo'I2¡Áx˜Œ)§Á$éÕšfášþpŒÃ9õFxøÕ`œŒêǜÆ]œ>¼cëý~'âX7wê§ý•½ïíYwÐÁ^¯Ê©?ê&ƒúiw Î}Ïåü¤}3¡î9͗€`8Ó|ÄJvvµ…—%u ÍDž +fAÖ¯±v5½™Q¦•4Þ½™Á=}êtâ=­î8é⦳ùZ9Êê[2k¼P áTË2SK•‘2K[æÂ+k’xՄ:£úª^?éóUð¡“ЭȔñÖ­w¦ùÞö@àÀ_Ò%4_W¥K·dì†ÖâY’ˆŽ_¨M3Y>#šLh-ôëÅÇkj‘“’¯=§Vw­Ï×rK^:OʓXqž>)³°G“Asÿûn0r-„E™Í „–*­ü–”sûuá (’W¹$»¤M©¼2«fmµÓ‹ðw6‘ð/¢NrÎ@À¡ð󜼍kT á%LxJ‹T#\<в”’à©ÑV,ðdó`|‡ÍF¦GvÂ=gì!’\àâÁ2P¶PÒKG©”†V¥^oIšµ0™\4Cø8‰zø¤ÕªµTßpD™LW ¹x|’üÜ ’€ôŒm-­>ì76:¯òBËT $qìÏE¥¹ÐOÄ(; |„¦'x^¸›~¦\dk#]ðé8Äú@na 9Êe™)\`±? ë$¥]T™„Zƒ?[[1Øee°u ŽÊà2EQ‚—‡¥ pñöÈðÁ.€oå×à'‰Å$°N¸ª(lé¡9_+U2þ&dl6æ(ö +dõN:€ÓsuñÐ§5X«Ú.—p…ng{×¾!ŒƒÈžÄ +†}ŒJ7>àÇ l¾>܌¶¢¾a9á|µRá¬Û:/s÷øæEî*bí}ñ¶ÝÞl6 xçd®­ù²¿‘ë¿7Ê$kŸkv„uíG"ÒMè~Ö¥(ûÀVï<ŠÔ¦Ëeö;òž CSpÄ,Õª[îgí.}eAWÖ™y‡Å~(ºÜ FQòUä?’-ÞweÑÐE(ŒÛ ê¹g)ý +ñ`ŽŸRt$[± ªqÉDiu\R=‹Äèö?ZÊjÓzÔÞÀéÐq^ +§X·ÍÀrÃ5ï×,ì j"ÿ–CB|©‰tÅÀY|ü¯eõñìtzyKR–§o"ÈYÝZ£dÌ Á>v‡#Šow½#¼lí²=¿zhOÀ“Ó©a‰¨°XÿïZèZq9½Ÿ‘eù†´(¡A%ÄÊåõ‡éOÚáÆי š¢MVH{¨ß¥*Ñ6¸l½]IÉXýøEÌ}²TŒ;A]œZA©æi·Èo…FBŽTÔ&ãŽpuëȅ©„NhºŒTeÁb½ØFáæš^ícÚAö€Œnõëà6pßØÒ +·"üM‚@ð»#«™Ô(€HuèòÀº¾ A6ýÂ%S{ޘ…bGöUÑÀf&sÌÎ (cà¦ Ðëi!]VªôOÄ"ÐôK…¤ÐGHsí‚5ÈÏq ›Uû~ƒáÇ ÈñíÃ|–\¾nòð‘=qrîÿxñЀÔñîâaÖ÷[\,G˜Ý]Ïï?^¿ß¾>”ÖÛÌjwÊràØOnïÀÝ@'ž¹H-^Ue‰e5 +ÖCÄ™˜ ì†ÎóÑãéâàæ<³’dª<•etÝdA’1¡4 âHn£"{Ç9ï˜Õ±¿p§”åãkz$`‡~Z’¶ÐÐ*É¢ø°ÜÚ"vBd m‘ Fäu§ÅB) íˆm¸ãÜEk€‰E“+=}§œo4Yªã܉›éÓônzv¬ù$„ÁåS& ç%îýÍFÀ2WÆj»Ú昝\q?|ÕxbȦϠ§ö0ƒ!ÄzZãáå –ìs +%]1쀈ý‡tKÒW47–”zŸSª‘0ÊèÔÄÔE›AD +ž„ä´oƇ}8‰}ég&|þe8èFíî Ìãëùɟ'ÿÍ >endstream +endobj +1803 0 obj<>/XObject<<>>>>/Annots 1112 0 R>>endobj +1804 0 obj<>stream +x­WßoÛ6~÷_qÈËRÀ¡,ùG’Á´Éš¢I³Øk0,Ã@K´­V"5QŠë—ýíûŽ¤bÇEÑ=¬iU[$ï¾ûî»ãåï^LüÄtœÐpBiÙˆÞÅ@hêW³Ï½Å„4Ëñ•¦¦©,çòg^Œ®FÇÅQr̛~7­sÚZEÍ +Ñ×JÑMžÖƚECÎoéFj¹T5øIRzSäJ7ήö¨MÙù‚/˜\4Õë(ÂS”‘š2ºhítc#oÁF0}s~+>N“HÐ^W;˜ÊÚbk+Ú')týS(Õ®£BêRj±jʂýïy- èÊ5JÙäFþ®ÀhcðÖ6²(HêŒ|œ¹¥Ô"èZ“$Ý6v¥Š¢O*ËOD^(z|¼O—÷0á^ÖÆ4{~³¼F:L½!³p{-sl¤JÖMî°°g™en½Èµ²¯}:tÚec$X‡´÷'œYÕ´•P_Uçyà󻷓°U«fýÁ +»±ÿi÷S–u{_ˆc44W TÑ*éXd•täÖô)3ú§&0Ë9H‹6SÝ^&ÔrVçOPÏ\¥’ɽ`Þ.—A3ÐÆöüÖqФ{;Ý5ÁZ£­ºÒ ߝ²ªv›D¾©¿D:Ëmä+™ Oõ¶þŽ†±çÚÞPÐ9" +<¥Fù#0ÚVYZ¯”öuöxȋˆÄB\¯8„ƒ´Z’ð@šgç{÷À&™ÐÌ@y·—3út}ù€ò}fðàŠµÇš¹«s›¯ºWÖ´uªè¢6k«êƒ>i㫛𕡑eÉC-¢@ålŊGo™£Âó¯€=ßÀy%›t…’­?*>ËM$ÂYWȲ揯s”ìvyßsÊ‘TÈœò¸P\OBñ5$!!‡ <¢ñµBÇŸ…ª6óB•¶O¶Rp]ՊcÍõ’ +ƒÇTiY†Tíù6óϨMFj³Z.—ÜE˚{€RªB‚Ï)—>7 +~í> ‘ïÙÈã5-ꝳ…8ƒâ3³Ö…‘±&07c×¼@ì÷r•×¶éSZ+ÐVìŠHÑ€ÿ»ûëÛÙÛûO®tÅûEv„Ý™[WDµa…o3e½ÎÝXæó{Œ1âòü/Ç«¥²µ Ù&dØ*t4@B6ŒS°K½V@òºÄÔù2ײxnÎqßé™/°”ÑAŠ¡Ÿ¨lB—U‰mŽ0´³F•ª1 ¸^yú:ƒ¾u´/˜=ǵã'$Å)Vwa‡¾&[ÎÑ>ôÂUB !y}B#éL•²¢3†]ÉíÅw÷\žßÐݬ‡«pgpød+•æ‹ÜÞKƒ‡ÏÞ³Ó'vϱ±¾»Ûe§{DëHòıH· u³0E®îñ6šŽLô™À¼;ræx8Øyu 2õ”£^xÃÁ7h•XŠ×ôîŽ>HTè{ÔÃøa‚˜^Þ¿¿œ‰—+fç½CVòIAuE“sðÞ!CYU ÎŠFƌ~£……S¤ÑÅ&ío–fٝ€úŽj/Ù@mæƒ&ŠØmwWÙîdÚ´¨ÏÍËýAùó֏;µOîTÃ}‡¯‚­q¾W¸Jä“Ì _Îýìa´º_,iŸ¯Ug’{ fSÜëm^V€Æ-?˸í…Þµ>¦Ë hÁml½ÊÑsw ïEŽ ‹-½àlÛ21^ò´{4 “ n[ܵ¹¥¬ÇÚuàe–ïf•Ýùh8ÀÍ3,Šý†É/TöìÍ]t}‡®$Ó/¾›?«/5 ß~Æåà ô»žçTʽŒ¸—í"eV=ÒßI( x‚ßN†4Áÿðôüæâ÷¶á›‡Þš´-1/»‰”Ña8÷ŽŽý\€ÿÏðñ|Üñ/GãI€£x>/XObject<<>>>>/Annots 1115 0 R>>endobj +1806 0 obj<>stream xWÛnÛ8}ÏW òR/È÷K -ìCb;EÐÄñÆjÝ,(‰²ÙH¢+Rqü÷{†’œDÈ¢À¢¨#Šä\Ϝý:éRÿº4îQDazÒñ:4¼ãw0áßþç’b·1Œ¼ÞGýÁäà ÷:ÕÏד.7yJ©×éyÕ*¡•ÓÐõ±÷êîx⍚WþIûz@Ý.ù1ÜMÆäGNe‡ü°åo%I‘'ò§Ëö͒Œᓡ­ˆ(Ñ֐Ž)(6ÆûÃÿyÒ¡óÛåG­;æÚèØ⤁÷‰FF$2RY˜ËTfV$Tì6¹ˆ$YMv+U^+é÷ί”¥ï/3Šrõ,sã[’+­ÅQq¬4wû4ǺÈ"ÒY%1¶;2ÊJ–ð쥵a^¨Ó3øBf«¨½“¹Þ™ƒiïUé½iïŠ Qaۆ;µkïã½í÷<ù"-H¨2 Õ0§ØEçÙhS <ÛJœ´[h¤ sHÃ/i—ë ‘)/°·çS±z‘‘G ¹ww ‡*)žõÍbu?ýêÍnoÏ*ýùíbî{óó3Z»CýÉ茾/®|Ï=­WH\ùè?\NçÕaÜZù—ÕBdQC.î×Û.µíë ê"³Œ‘ó~·Lroì!è͐^DØÛí“Êr[™ÓN³×yDáVd—¨·X;ï1ÖZëx½¡H#.é(́~ê€öÊnþHF^]´TŒe)“ÒÃñ']â4s„‹L½P _H—ëå´á#2"fDÙ­Ê6 ÃH#­î¡ô‰Ï¼ñ 0á7@(R¹ ­Î%<—Sì$ Y»Dà¬ta)Ó¶¡™]q +ìCb;EÐÄñÆjÝ,(‰²ÙH¢+Rqü÷{†’œDÈ¢À¢¨#Šä\Ϝý:éRÿº4îQDazÒñ:4¼ãw0áßþç’b·1Œ¼ÞGýÁäà ÷:ÕÏד.7yJ©×éyÕ*¡•ÓÐõ±÷êîx⍚WþIûz@Ý.ù1ÜMÆäGNe‡ü°åo%I‘'ò§Ëö͒Œᓡ­ˆ(Ñ֐Ž)(6ÆûÃÿyÒ¡óÛåG­;æÚèØ⤁÷‰FF$2RY˜ËTfV$Tì6¹ˆ$YMv+U^+é÷ί”¥ï/3Šrõ,sã[’+­ÅQq¬4wû4ǺÈ"ÒY%1¶;2ÊJ–ð쥵a^¨Ó3øBf«¨½“¹Þ™ƒiïUé½iïŠ Qaۆ;µkïã½í÷<ù"-H¨2 Õ0§ØEçÙhS <ÛJœ´[h¤ sHÃ/i—ë ‘)/°·çS±z‘‘G ¹ww ‡*)žõÍbu?ýêÍnoÏ*ýùíbî{óó3Z»CýÉ茾/®|Ï=­WH\ùè?\NçÕaÜZù—ÕBdQC.î×Û.µíë ê"³Œ‘ó~·Lroè!è͐^DØÛí“Êr[™ÓN³×yDáVd—¨·X;ï1ÖZëx½¡H#.é(́~ê€öÊnþHF^]´TŒe)“ÒÃñ']â4s„‹L½P _H—ëå´á#2"fDÙ­Ê6 ÃH#­î¡ô‰Ï¼ñ 0á7@(R¹ ­Î%<—Sì$ Y»Dà¬ta)Ó¶¡™]q !‹abÎPD@_6nl¤% ܓ²g$’DCㆺ`ÓP;•‹ R¹Y7±;éì°ÇÇXB*obé¢Ï™(3hD…©0ª“è(þŒä³Dõ–R-o¡BÁ„†s:“M[œ*ç£Õ¨~pŠÚdÀG-ÎÀ *ž…sb‘è çñ78ì{4ÕY¬6$BÕ«L€/J?¶óüù®D˜‘kR bA"D”¢ã —|Å' €%Ræ‰[îÏäñ¦@ÅúzM}Dê6Œ´Д1! þØîIVóËËŌ.??>^ÎînÓë/¨åhŠ¨úÙýzõngÎ4ˆ°D%•†€J xCø³ΊÓ%|i#'w"™ŸÒ)Øå”îdV0dátí²Y @ ‚m®Úê½ó˅¨¨Á†‚T’ ±†®e]õSº²’6tVW®¬Ë< «žÓ"#Ã"Wö@2ôòrû¿èf€4£• ­”Iåè­*¯¾v³šaJ>wF¬uþ´Éu±3àj0~a#×v15ȲH9s®?áMŽšôè3ËQéÇmˆåžCzÃÙnu±ÙÂö­ Ÿ\¢L eñck © :Sa2ª³f„j]” “÷^¶Ø:³“¡Š´çffÌEŽhö'#Ò@)¨^›øæ1¸ d…ljå7Å6D„j&@‡d,ŠÄ2œ¬uÃF ×û0uÎ'UféW! ‰†Î¯jŠ{OPLY[Á!„±ïtrÑ5õ‚õ£BÐYL<]£PŒNY›0sEe˜L |!m Epå­X䞭 p¥ÌÚÇVCKæļQ‹Q¢ãwË¸Ò¤)RÌL㸃ÓkœŸ²¹ŽÍX_WÐýt1lº˜¼O½ +F:n¢œ¼Âpë+CºŸßÑê¡ç\ŠuÝFÊ|£éÓX„À›• ì $KCÈ#gäǖnš£Å½?‡h ŽC†^‡8V]Ù±¼ˆctGGé: ¹$òWkw9 $Ì®(òUO=DúÎ 63催oBeنÑi ñ(‰ªý|Ú£¿—Ò³Xæ9^7lßëDº–A92u‚÷iåÉiz*a†{U­ÙàÈ՛ -‰gSW³ñ›¸»xá[à8 •y&úæ†ÃÏôõaqûm9㩍uŸ£g`؎Z]xåºKÎÁµzùL˛ŗ.aþ*Q1©µ;ÀǤO£±›ÄW—wW—„®ð““1Óaá†oŽY©|„o?w.؈ÿ1Ô Fø°ö*'†–;÷Oþ:ù3`-endstream -endobj -1804 0 obj<>/XObject<<>>>>/Annots 1117 0 R>>endobj -1805 0 obj<>stream -xVÛrÛ6}×Wìä¥òŒDI´.NfòàXvë™$V,¥íLÕˆMÔ$Àdõë{e[‰›Zօ$v»çìYüݛЯ -b:SRöÆјf¯øœžñgŒw-)ãXzø¸ý¹7'ќ¦³8šRIÓÅ": W­£ÉtÅǎÞmz£«)M&´É8èülA›Ô¹Ó&éß®.ès•ŠF¾!ü¾Ý|^-£Ëß/O6õ†°Â¢´_ãr89E ÜÚ\¬F׫ƒé¯×«ïN¿5¼•©ªeҘúÑøvyû=뙷Æ3Æs䍸ç…5RµVé;ú°¦›¶yoÌ=©†”¥TZU‹]!©1¤´mDQP“KºybP¦¾F´É±¿¨{²©hoÚWI®´ätǏÙfµ))úŽcfغÐ$¿6R§2¥JÖʤôK¾©^ÓmJè”ýº ['m•Hd՝V™J„nÈVR¦muÔ9I"­KUËæÁÔ÷¤¥ºËw¦Î ‚ZY?±íèê5MoԆ§S_°x¡Ž¿)šKñ¼Z{#Z‰äžboÙQ–°˜;ˆs . -¼­ü"kQ kmöB#=¨&?òºŠ#ºÑ’L†Z¨$'£‹=‰ª’¢†—ǃ&h-ʝ8J—S‘5ÖÛ`).ªÚdª@8Ü}žÂ*¦¤PR7(£œÝÓԔB鯰¶-Ù:É9\Êr‡XØ6óÄ;ЮmÜ5¶6•HD*Ô½DN&I@Ðs˜ºúsíM¯5™:õé„ĹØÖašµ\ýWbÛ¾+ܓɄc–@´Z^lOß-cÙ¢x¹øâ(<ºš…Öïx&’‚l[U¦nè-¨øú>‰”ùŒ-q!¸ðdsÆßÙ`ÂŔTQ2Í»œ"ºæ꡸øçý¦FËÁÀ0ÔκÃʓñ€¤/qbʪ„$v°³äX]SûŽpŽBxÚöÏ]Ii)µ’éöä(2waRKˆ•mѨ -™%¦RȨD£)UöŽ–7ί?FÌ>¨ïd@ÏoÄ’MEÑö$BAeP [î¢Äèl۟}º„RTâå„j”ÅLe#TÈ\ ”ËT2`,+§Ë>AW8öð¼„à1x•¨E)pîA¸҇þ£»ÂìDqT’ÇÕ(u- )Û -JæZÐ5(Æ¿‚eGí sÃ…y`T¸Ÿ\PˆÖÑÁ³æßà˜^EŠƒ"Qøû#À÷g·µ1F$¾{Þ}WRó–Fò+w¬~`ÔÁ-€ê[ÏÇãtSi­ö6‹Ú¼ÐR<8^È$L½.~ÛN>‚ðaÁfcÉ®uµî¨ÁzßÓú±yŸ%äI5{†I­*žµÞ‘<@äZº+I˜éà0¨©}‹{xíúÉÒúz9€þ§®!9ˆ×I¾Ïb‹~rjŒ¶*A­ xè¯Ï?¼;ßn¤ÃÇQX¤Z¨`&¸Ê2 Ôö,Ą å˜˜^ž|Oz‡ý"1‘¸_žMÒ« ©S…WGa1,ó˜ÞïP6e!6Ìn8e«—eÔ?í†g­š0ˆ³×4‹ƒ‚Û G-”J`¿¶2Úº³JÅÜ p|je½_,—P6µÐãO6^™qPæàn%È$Î/Þs É°â¨:¼^é¤hÁ¡ç%x2åžâ@¯®0ÐèªMáŠ=ºš‡éóÄæãÍæ’Þøã“:5@ލ87TŸ /;[x…nž¦å‘ï´S†‘îŽ Ì拏ýîäЈÎÂ&s¯ÏNi6sãI«Úü…“(ìÀ}bNvØ-.ÆP¯´ÿ¿QÓùY4ŸÅþÈ<™ÍØÓå¦÷©÷/f3¢õendstream -endobj -1806 0 obj<>/XObject<<>>>>/Annots 1126 0 R>>endobj -1807 0 obj<>stream -xW]oÛ6}÷¯¸ÈKS V,Ùqœ<-íÖ®@[lÛb@_h‰²XK¢FRöüïw.)يÒbCá$2u¿Î9÷^öïIL3ü‹é6¡ù’Òj2‹føæôãÓÛI¼ZF3Z.Vъ*Jâet×=•ô8>ãôfͧpDËä–‹Õ-þNð1’òIrãÅÅÝÌ;]Ä·Ñm÷ÄNÙl±ŠýÏ'f|0¿[FÉØßrŽ¬’»U´ð9Æx#<õî’Õ*ZŽ­æñ¾Œû,vžØìÕzrý^g´ÎÒòvEëÌcƒoÒËׅhœ4”¬"ú]ÈiJuÕ¨RÒãÇW/×ßa¿ 8öS¼˜ÀÃå_º¥TÔ¤7N¨š\!Ɋj#ÈêÖ¤@ÇèjðíAn¬r2¢µîMer/KÝT²v´—Æ*]_Ñ18æÀ3šÆó.ӇºÔ"ë‚xﯿ<’6ÔZUoÉØcF!Ý;Šo»tç €‰t‘vÑCšJkéq˜hª3I{%îNæ°a´¦ó íÍáà]íŒÎÚÔ!ÕçÐ hvœ+ÛW'3>ŒT#k’õ^]sÉýêGå(Brôíòµ®ÓÖÆäKÀ„Ë{c€p¦Ÿ?½§ûç-‘nÕt£jnŠ3“?aMñF%s›ÿ¦Òl81Ÿ‚jm* g”–ÊÏ?OäVíAOýªM ´>$Ë]’fUò6͈ÌLÓA¹âÇ¥áÇ£n -nìsF"*³¸“²a/µø­)З}Nxšy‡¥í”1rō‘¹ÄÜΨ’®ÐÙ¹ÓHå¾nÆÓÒCa½ÖŽ¾·Öá –¥Ù˼ Úó»Ffýäp%҄Ã9ÀúŠ­°9|ûtžz ?QÆápˆÒ#ˆH#”sùdøq©êåp/ºËÁVú˜/ ØzF'êρ&ÒÈ݁kÄXFulõöãgzûÇ{ÞLè¶nñ~{ÑG ]º‹aÁçÇsokDS¨Àð  -ʱàRA+Ñègõüª—&¸€KÎÁjð¡*°]!1©í8|BÆ#/˜ZØô=w^ã{ì4ÁsÝßAºÝóÎqo‚»-ànJ±¸Î ”äíϹ暧šíN6Ø, É$ÿUƒ Êù im[AiAéã%êæØoN¿*†Jé}K҈l†G灨€@·ÈúH«m7˜W®õ$r»B÷©ɦÛXT‹Jò®æ§•ÿ÷Lp0C¾êô¹ ÌœpUFâ#./|‡àõÚ¿ÅX a° sô¨O1Òp±Í.qYã x<Ý!?µaˆvýËÇ×onC°[OìyšÑ}Öâ=ž9Ý -îy„¶ÅÜW¾UÎ÷cŽÞ7,fhˆ°ê"L“šÞÜáÿ -HïÿÜ»KÜöo’®ž›%»ûm=ùsò/¶'îendstream -endobj -1808 0 obj<>/XObject<<>>>>/Annots 1131 0 R>>endobj -1809 0 obj<>stream -x­VMÛ6½ï¯¤‡:@%[–¿vOÝm’6‡¢iÖhQ @@K”ÅD"’òÆÿ¾oHÉñ:IIÄXŠä|¼yo†®2šá_Fë9å+*Ú«Y:£ÅjÉ¿›5~çøo%U¼£§Ÿ×¿†£ùõuº¢–²Õ*ÝP\5t•oføžoVé»ùuØ «°{¶ni1Ïq*žåÝó5v×Ù£]0ǍÍe€wÛ«é‹em+NfµYÓ¶ !Ïh[Lþ®¥&åI¸÷ŽŽ¦§ÊXÔ çŒ-É;IO·ï`%¬LŠƒ‹_F»“”×3J²<Ãüäu¯Éג -Ó¶B—ñôr¸ssFç`‰’’n:'íAÚ¬v¢Ý‰ÔØýÍKkŒ‡ -_{MÎ mkåèA5 V -/‘B©¬,¼±G*DÓÈ2š€-í…ÒJïC„ ;?ì9Óۂ£.%½™¨T¦áÌoÏoŸ]$èÅ~“ÿÎ -]Ôož¦‚(zk¥ö Üüå:£KGÞK9ÊTʃlL×ây+eÀî<—_þºŒJG0Z␆¦$³ãøá|w¤Þ yDdÄX!Jìc¬&„2Àu3„H‹ÞR£€€©§ŸgºÑez˜2±ÀOž}Êæ X³G|UH5Œ䎜òÁ “׬üÐ3ä(˜7Îbn煙ƒPV6R¸X—eÓ7@@Ri´|„Ü4æqØž¾ø.ú%–îo¿»};;ÿ"!°l±ŒìÏÓ |J²å&2u¨lÐ؃àÚj¥`*B901¯¨…Þ£ú=²f}–UÖ´ ¼¯ãí #ø'ÜD2|¾+Y1Ðaò*u …œ[¤ºˆIM_\S†RAÄKJÖAÆóM:‘ŠBº‘åè YwÔEàaå»ÇŽXÉëèghé© hœ!ù±3Ö݉â=KÏtŠõQQkÀ¦NðîÀ=VK‹„¿žo¦ÓÏ|L»~7=™f©§µÐF[Ó»1þK“!­/…³“ÑiJ/Ad¦¤„ù(܈ˆAã5'\Ié‘sÕãvmZ„…Î|‘Mk0„”® Ë1œñØ`·0S*'Ê(w¦ÎS® “ Z¬8YË#$EM×õCN¢÷¦^®¬+ Ü4UiÚ¨÷ò"4.Ai¤KGØ9ØQ(ºðAjÅ=0 Ì ­¼‚M¥G¿D;’ ÉQI v׫¦›øÒ‚ _%ÕÖpV‹û‰*eÁ;L¨Îš½m¼9 -dBéVjßېا:å:̊“ƆÆäêЙN !žg¶Ê8&ïyÔ0y-™N‚ œ”;:/[P¦ -ý¢ æ÷®@ZJ(<·y^·âˆ>àjî'H*&‚ÇKøg’éqwäù2]/ñЁºÏò¥$©es!Ð$ž= î"\:põ©ã:YpýLç•Ññ-ÁKj±kÐÿÁD,>Ê¢ç ¿1ÌVD¢}ªÇe`ço`D»)ý¡1ڕÿсفŒUkÓvŠŸ &Œžûэü&Nô>7ð<} 24G<˜¸Ì,y¨çŸ!*‡rH°ék7§x¹ár¼;Ìÿbûï\Nï»Í@ºl…'ò&§Õj†÷(È&'½²ædôÌ=?~ÀtL'ã…d=»æóß8N«MºZÎ#¡³åšÃ~¾½úóê_f„”endstream -endobj -1810 0 obj<>/XObject<<>>>>>>endobj -1811 0 obj<>stream -xV[oÛ6~ϯ8kæ•bɗ8öàÔ ¬]»Ä0 À@‹”ÍZ"]ŠJš¿ï’[‹b‚ÄÒá¹}úëQFCüdtšÓhJE}4L‡4™Òg§ø?ǯST†£l’ž¾ô"NjÉK/ÆÓçÏϗG'(šÑ²Dñé씖’Px8¤e1pÖú×ÇË/ʺ ÊNº”ƒZliÓxQUµ01nÜÅ%10ɧ阃ÿ´^‘ßOº¤{ےÀ(íní„ÔfM¥u$hçÔ­¶mC·Ê5Ú²%]‹z%‰Z¯7ž*ªÞÒÖØ»˜ÐoÙJö‡œâ^†”d£4çâ±ÒF8­ºÓUE+…UQ+‰Ï~ƒÚ¯RäxEê›W†k§ôº,„¡µ¥•(¶\”=k’Äá›ÜÏý+ÄÐÊù¯¯[Z©Dú°!AR7¢ñÊý3œQ†…3šÉ(‹»Ïgé(ÍRzk띮xÝMXj˜|^x}«h¡*¼u÷Ô´»}Ú²å̍Á%@qR9ÞFò©GÙ×}‚74£°bÄnŠtdÁ` 8jîÑzý·ŽfG9—IgøÛ¡öñrI[åVÊن$UÙ]­ Ó`å"ž7ÐQ—Jgë€Tƒ -·ÚF1¿£X«›ã”–@r£t-EÅœl9¤T1Öӝu۔ã8lš§“¾ÁO;e>,æŸ_n.œIžMv$à“J²,´A¯ÆšÒ2R8I•-„gA`PæÖªÆJx¯B2!°0¥^·8mwÙ7Û) IìdëV“ß—Wý,½:ç%ðr­y+H¼á¬AºœôàmŠª•ê$ÖN;ô0 íi­ŒrÂyˆ€œÁÇ(c09`ÏIÏ:ÖæãÈÚ×RîŠÞÏÿ~÷ïWçÊú¡†ðDäQD!Dœ\ô-°¦1+G;ÒªÆüêã+“Zbߞ‚¼/yQ8…Ç•»Ãã”>X»e¸º Tv͘D úf;l mî ˆ"ຠœ\@°ý&j0ËN°ìe´WÖ,£ìÔ×B•=“›`œ µÒOý—ÛYï'C1①{µpÚÒV•½ã"B"*Ïx šòb±Ÿn/†ð2s‘$ýT{òŸõ²î†Ër¸+%ߋ'îøx¸ýÀk%@1`EÍƶ¸‚ïàÖ©LòeŸ ³Â!· ²›_G[m´¿9~yPl¢¡>#tî‘ï…çBüJ‚­ˆd¥GåÓÁ´¢aÅ$ûÅíýmAJ} ÞE{ƒxhÊÜjg ÛäSnaÀƈ˜øû<°AÝB;†¼ ”åŽkqO½Ÿ¯UPQË¶¤·‹¼#ó¬#s6Å7–Ùˆ¦“,NF¬ÖëùÇó9}vö .ZØ¢åÃÆyÇðÕx$9 -äàßZãé 5óø%%›Ì8û»åÑ_Gÿ/ÈÞendstream -endobj -1812 0 obj<>/XObject<<>>>>>>endobj -1813 0 obj<>stream -x•WaOÛHýίør©œ8 !ô>Q•Þ!µ”+9U•*6öš,±½îoví$˜Díµ*¢°;;óޛ7“G1 ð7¦‹!&”Gƒh@ççƒhHãé¾⟑”ù_LFѸûów³£þ‡KŠ/h–!ÔdÓ,%„ h–ô†ÓhѽÆ©òÜB’-æ)‰2¥ß¼™=âþ˜b\ãûgËh‚½oº¦¢¶Ž’…ÖV’Ód9ÊËë$B–R! ]Z҆2£‹ø¼ Ü#UJ×y­Ñ{]þæș5ÇO5͵[ÓuºÖ5GARñ€ ©D”TÕ¸°"Rxúì{þ(Ñeö²¬ž/w!žPßô…È”tI©,ŠùúWò=åâq o[}'ßÆÃCŸèÂ?—#SŽõº„¾tIß$Q®‘wªÒW@B•x–2DI¥*òå«G:ùèÊ)pÑL,%"@I ƒ‚ 2P`¤H}¹r$æX¯ÂQmA2W^Jà†ƒsÉÉk“âçi܋b."º)9Aè î,òå^V`´vQ“ápiƒáZ„é“(j$¬¡ßÈVT,åHLu÷Øk¡÷PQÛF2-²LQY1Ò-tJÊ T’×´R¹'d§$#m¥¡›«‡…Ë×ThÀø£VÉÿ, I•Ê)‘TYʄáÈ?jiCé¾wQ¹ï½Q@ðMï´­Ð!uû¦eìn?Ï®ÿ F0Óy®W\ gÍd¥*ˤ‘¥#•yÀ(ÝÞܟò—ßY‹ß_ÝqΩ²Î¨yíàÒ<©¬¢²]¦>j½$€FM·½ŠÛÛ‚"úʘÛTf¨ ^ä¨Òp–xtÙwIeTÂ8ÿc`eóäû'WKɱwÁû6¼ïXZ£-8Ð\i{fmÙ¾õ27F²9kU¡Ð ‘;,]ôë´òÀم®ó”¼›€_@ -÷â\~þ0ܱ‰tðÝ[ùìH¦è¾ƒ¸ÒAp9È­´‡È’Õ,e’3„7ø è²uüqPuþìÂIHK*0³H›—úµ5}oU}˽ߟ«²ïç‹ÿÒ²3ˆ¦¬ÏN|xIà°¤áâŸçVöƒ«‘ÜÎäMÂ3ÜòY$Uk8È3HÀ{3(¼>ãø$Œ‚êçÒ­$4W—êYÂ4[ÅCˆyÂù˜|> ¿ÚFóŠmíÍäz¨U*»-Ä û–îÁQó‰œxÔÕF÷Ô5`ý °¾÷ÐaÔp-cØÎ÷7œÅ¾:öá·WóÕ;s3´¼ÿG<ö}Ç·À„߶ŒõØl -žC€²`´pÔ¼¥Ïa¨€S*šA"֛Ä~ÆĜ¨ÒI“ ØÖ …yÇÀ@~1ðꒉÊ`Ð8~sǖ#·œÝŽ•øIºBØ% Èwã6tD_ê2Ô³F*ãÕC5Sj['Öß-ó¦~çY¢Âlå4æF‹4X·`xì8þ=pîÁèhÙIpßP jd—¡ôÄsÝZc7P…<%;eíºÀö°‘w»\ØfLaR8Ì)v~ìd¯°›Q ˆ`æ©·ì0`ÚM[ÛN—Õããã¯W_nonÿÄwô ûBÛº„ëŠ$‘R7§sÞUž‚Ø÷­9{¤PvX~N‡íB -4@§`5²¢lÅBÚ8SÕìP~¥æ¡Ææàìf3l¦ßd£*wênÖÅÎËá̯¯ÌÍõvN}AXã^IÒénF§TI³À$§GÞë-6¯úëŸ;?s¹|?ÖT‰ yΣSPÁ란=o/ºY®[Iöö|Ž@oó°æ€EÓ£²¡Ñ%¯&ÞÏÑ +™çÖ§ÍäŽ'ø4Ñd4Æ~õéÝÝý…â£Câ±¼Sqô³öÂÙų-ý¥Ï>ãÉ4šœñÉâóKt=;úûè?Ýë"™endstream -endobj -1814 0 obj<>/XObject<<>>>>>>endobj -1815 0 obj<>stream -xTM›0½çWLÕ U¾B»·¬v#õÐÏ J=3YØ`;µMšüûcÒMÒöЂ@ò›yóÞ~LˆéN`‘Â,.&qC6_„dłÞSz4ÂfrWN¢Õ $”‚ä½Ô@ÇãJ¤E˜…iË΢–̶{¼c™¶­|„Ö3À f(”|S>Q­ ’Äך¦ ª”ÊÀ6õõ9 -ŽªÓ¨¾«kd© áºÝY0J m\§®Ý"h (‰ï`‡ºa;œu'â›Ó̧æÉ,L]û¬Õ%» <nNd³ÐÀÕõúUTµ22Ä0Mbñç¢Þè¨SÄ(2LTÌ£DUÃôþ+Ï°²Îrπô”  C>àyoYÕ!ülí@6ZÍG9àP5¼=x+~“ƒæJs?ÿw²ƒ3éܒ ûÑ՗JѪ#4LÖ ôÈe µÑJ ÓG«“7A„–Gš‡ƒX—¶œñ ØlÛ®s³¤ºÌšöQ²¬â´ÓŠ£1h|™–N¼ËÒ»ëc$Äõ±!g<>~*náýfÈio\ -Öß¾f$å‘Ôn¥cx4…×ÌåY°ãYR[`vÀùþ¿”À»Mdö:›Êö»KÚ.q§$û¥ ÑÓ×.e°¡î­ä žÇ˜íbt?Éi㋤Yì-^/?Ü-á³VOÈ-Ü+Þ ”––Ûïðô˜.bڎúŸY^„ù<¥ß “>/XObject<<>>>>/Annots 1140 0 R>>endobj -1817 0 obj<>stream +‰gSW³ñ›¸»xá[à8 •y&úæ†ÃÏôõaqûm9㩍uŸ£g`؎Z]xåºKÎÁµzùL˛ŗ.aþ*Q1©µ;ÀǤO£±›ÄW—wW—„®ð““1Óaá†oŽY©|„o?w.؈ÿ1Ô Fø°ö*'†c–;÷Oþ:ùö+$endstream +endobj +1807 0 obj<>/XObject<<>>>>/Annots 1118 0 R>>endobj +1808 0 obj<>stream +xVÛrÛ6}×Wìä¥òŒEI´nÉLËn=“ÄŠ¥´©ú‘ ‰šX‚Œ£~}Ï l+qS˺Äîb÷œ=‹¿{cá5¦yLg3JÊÞ(ÑôõŸ“Æxג2~€¥‡ÛŸ{“xÍh2£ •4™Ï£E¸*hí'£(>vônÓ^Mh<¦MÆAg‹9mRçzD›¤»º ÏU*ù†ðûvóyµŒ.¿<ÙüÕÀ +‹ÒþYD|ËÁø 1pks±^¯¦¿^¯¾g8ùÖðV¦ª–IcêGãÛåí÷¬§ÞzOiϐ7âž֜’ʨµJßч5Ý´Í{cîI5¤,¥ÒªZì +I!¥m#Š‚š\ÒÍû˃2õ5¢MŽÕøE¥Ø“mLE{ÓÖ¸Jr¥%§;zÌ6«MI¹Ðw3Ãօ&ùµ‘:•)U²V&¥‡\òMÕðšnSB§ì×Ø:iÓ¨D’ «î´ÊT"tC¶’2m«£ Î¡Hi]ªZ6¦¾'-Õ]¾3unÔÊú üوm‡W¯i x3 68›ø‚ÅÓuüMéÔ¥ç7âS’MEÑö$BAeP [î¢Äèl۟~º„RTâå„j”ÅLe#TÈ\ ”ËT2`,+§Ë>AW8öð¼„à1x•¨E)pîA¸҇þ£»ÂìDqT’ÇÕ(u- )Û +JæZÐ5(Æ¿‚eGí sÃ…y`T¸Ÿ\PˆÖÑÁ³æßàˆ^EŠƒ"Qøû#À÷g·µFt§{Þ}WRó–†ò+w¬~`ÔÁ-€ê[ÍF£tSi­ö6óÚ¼ÐR<8^È$L½.~ÛN>‚ðaÁfcÉ®uµî¨ÁzßÓú±yŸ%äI5{†I­*žµÞ‘<@äZº+I˜éà0¨©}‹{xíúÉÒúzy +ýO]Cr¯“|ŸÅýäÔmU‚ZA&ðÐ^Ÿxw¾Ý:I‡£°HµPÿÀ$Lp•e<¨í!Yˆ AË11½<ùžô#úEb"q¿Z=4ag¯i·AZ(•À~me´ug•Š¹àøÔÊz¿X.¡lj¡-ÆŸl¼2'â ÌÁ74ÜJ>( H_¼?æ@’aÅQux½ÒIтCÏKðdÊ=Ł^]a Ñ8T›Â{x5 Óç‰ÍǛÍ%½ñÇ/&uj€¼qn¨>9&@_v8¶ð< +Ý 1';è–æ#¨WÚÿ_‡¨Élͦ±?2§ öt¹é}êý RÓ¢ôendstream +endobj +1809 0 obj<>/XObject<<>>>>/Annots 1127 0 R>>endobj +1810 0 obj<>stream +xW]oÛ6}÷¯¸èKS V,Ûqì<-íÖn@WlÛb@_h‰²XK¢FRÖüïw.)يÒbCá$2u¿Î9÷^öïIL3ü‹énN‹%ådÍðÍùÇÇw“x½Šf´Z®£5•4WѦ{*èq2|Æéí"Z NáˆVó[X.×wø{Ž‘”Mæw1^\nfÞé2¾‹îº'vÊfËuì>1ãƒÅfÍÇþV d5߬£¥Ï1Æá©w7_¯£ÕØjoðeÜg1gÇá‰Í^o'7oáuFÛ ­îÖ´M=6ø&¹z“‹ÚIC°¢_uKNS¢ËZ’~ýðjû öKŠã`?¯á~›^ý¥JDEz焪È咬(w‚¬nLtŒ.߶rg•“muo"(•GY躔•££4VéêšNÁ1žÑ4^„p©n«B‹´ ⽿ùüHÚPcUµ'cOU…t7ßué.–颾8¢‡$‘ÖÒã0ÑD§’ŽJܝÍaÃhM3@ۛÃÁo•3:m‡TŸCƒ éUp®l_L ø0Rµ¬HVGetÅ%Gôs¨•£É Ð׫7ºJc“Ï.ïñd,¿¾A#d^$¹Lªz[QXM‡ +X‘°ôL–ʽ€U%۞®7 +¼´tFéÆúØ;#*8³ž×$áÑBþ@gTTº:•½a`€% *ëL€‡€4ŠP¿ËHÄæY¸àÄs³œ^TêTeŠ#Hg^KOÜgº©RŽrçêû›/¿H›}øë&9Ú(weñœÔx ‰yäkï”ùŸÝü€ß-Ê,E’«ªS<‡$ÓTœxÝì +•§;µC1­FÖú×æD$åfó}:Æ …Z¨ÂŸö j‘Ä^Úk`œMÊ¢ð©^éCa)}Sͼköè³\bF |\«‘04؊“e$CtvÀÑ9=+ b’æ>VvÄu®­»4Ö`\k>h®®•ÐðÏìïgGώìSÀP&Žø…±A_¾|¡Ñ-åÒX$EG?-ãÀS¢+‡æáJG…¨*UG•6¢  º´Ü—ŒÀ€Ñ7|ZX^ᕣâñDíYäC{á½½‡u쾗y?ÂÎUs“ +{J (=£n™t­Ä˜ÕÉóÖéþÇ©öÞû&ú„™~úøžîŸ·D²Wӝª¸)ÎÌ`Lþ€M4ÅC•Ìlþ›J_T°á4Æ| +ª´)<œQR(?ÿ<‘{u<õË&ÉÑú,shtAšUÉGØ4#2SM­rù÷ JÏGÝ8jsnìsF"*³x²f/%5ø­)З}Ixšy‡¥í”1rŵ‘™ÄÜN©”.×é¥ÓHe¾nÆóÒCa½ÒŽ¾5Öá –¥Ù˼ Úó»Efýäp҄Ã9Àúšj­°9|ûtžz ?QFÛ¶QrI„rn"Ÿ ? µQ½îew9ØKó%[ÂèDýÐD™k¹FŒeTÇVï>|¢w¼ç̈́nëï×W}ÐÙå¡»|¾?÷öFÔ¹J ª  .´R~fP/o¡zi2¸ä¬ªÛ%˜ÚÞљÃ÷(d<ò‚©…MÐsç5~ÄN<×ý¤Û=Oá÷&¸Ûóë²@™AÞþœk¦yªùÑîd ½Å²à‘LòQÖªœßÖ6%”æäþhH/éDק~súU1TJï[’Fd3<º Dº¥@Öß@‚Xm³Ã¼r'‘ÛºOÜH6ÝÆ¢J”’p5?¯üßpOÀs0ä«NŸ+ÐÀìÁ We$Þ9áòÂw^¯ý[ŒÕe›0'ú# Ûô +—5ŠÇóòc†h׿||óöv0»õЧ)Ý×a-Þãù§ó­àžG¨Ñh[Ì}å[år?æè}Ãb††ë.Ât~KÓÛ þ¯€ôþϽ{¹ÂmÿvÞÕs»aw¿l'NþH3ãendstream +endobj +1811 0 obj<>/XObject<<>>>>/Annots 1132 0 R>>endobj +1812 0 obj<>stream +x­VMÛ6½ï¯¤‡:@%[–-{÷ÔÝ&is(šf´DÙL$R!)oüïû†”¯“ôAŒ¥HÎǛ÷føá*£þe´šS^PÙ^ÍÒ-Š%ÿ®Wøã¿•TóŽž~^ÿŽæ××iA-eE‘®)®º¿Ê×3|Ï×EºÀn~vÃ*잭[ZÌsœŠgy÷|ÝUöh—Ìqc}àÝæjúbAYF›š“)Ö+ÚT!ämÊÉß{©Iyî½££é©6–u¹c+òÇNÒÓÍ;XÉ+“òàâ—Ñî$åõŒ’,Oç0?yÝkò{I¥i[¡«xz9Üǹ9#€s°DIE7“ö í Ö?;ÑnEjìîfŠ¥5Æà …¯½&g†6{åèA5 •V +/‘B¥¬,½±G*EÓÈ*š€-í…ÒJïB„ ;?ì9Óے£®$½™¨T¦áÌoÏoŸ]$èÅn“ÿÖ +]îßjj ØÔ Þ¸Ç +bi‘ðÀÀóÍtú™i×o§'Ó,•à”£Úèckz7Æi2¤õE£pv2:Mé%ˆÌ””0…±"hÜ£æ„+)Ý#r®zÜޛVa¡3_dÓ !¥kÃr §ÇF<6Ø ÌTʉêʝ©ó”+Ãä‚÷œÜË#$EM×õCN¢÷¦^•®¬+ Ü4UiÚ¨÷ò"4.Ae¤KGØ9ØQ(ºðAjÅ=0 Ì ­¼‚M¥G¿D;’ ÉQIH »ëUSMüNiaÁ†¯’jc8+ˆÅýDµ²à‹&TgÍΊ6Þ2¡tŠkµëmHìӝŒrfÅIcCcrûЙN !žg¶Ê8&ïyÔ0y-™N‚ œ”;:/[P¦ýb/Ìï]€´”Ë—’d/› &ñìipGáҁ«L×ɒëg:¯ŒŽo žXR‹mƒþ&bñQ–=gøa¶"íS=.;#ÚÔHéÑ®üÌd¬ûX›¶Sü<`09`ôÜïˆnäo4qj¤ð¸çAèc¡9âÁÄefÉC=ÿ Q9ôC‚M_»9ÅË —ãÍØaþ‡DÛçrzß­ÒežÈ뜊b†÷(È&'½²ædô̔=?~ÀtL'ã…d5»æóß8NÅ:-–óH謘qØÏ7W^ý P ” endstream +endobj +1813 0 obj<>/XObject<<>>>>>>endobj +1814 0 obj<>stream +x•WïOÛHýÎ_1å>\ª#vœ@zŸ¨Z¤J=Ê‘N•*6öšl±wÝÝ5!ÿý½Ùµ ¸r ¢ïΏ7oÞL~d4ÁoF‹)Íæ”דdB'ËY²¤ãåï§ø³’Êðàxzš¼_¤ç°‘Ѫ„­ùrA«‚`g2¡U>²Æø_Þ®¾ãPÖš$‹]£ZÜHRÚyQUµÐñÜqwnŽ§sxÅá ã%ùð¤Jڙ–"k›k+ +¥¯©4–5VÞ*Ó:º•Ö)£É”t%êµ7ju½ñT)xõ†n´ÙFƒ~#ÉTEÉáÇ2¡q6K¦ìœO¬•VIG[UU´–@F‹Zøì7ð}˜ÀÆ!É;/5ûNè+¢Ì…¦kCk‘ß°S6ô$H6“ß#yŸ÷+ DÒÒúÿ†¯­Tº@j B9á¼´o¢…SÊPD®æxv±ç$tå…õŒ5'áêuAÆ4Þé(1Y¤x%ôÁè_=y»c„ €müæ }ŒFA¶ò ˜\’¦Å…¬a‘¢“úQð‘äF¤ç=!G!ݍ¸eâfHåË + ú´Þ½&Þ#NŽ ÌqD4‚½}öƒx;t}nêà®B¤lëi +©ôyjó¤2¹¨bL÷Y Ž2d@0B¸£¹y +酪€¼~âdi<èíZqÿ6LŠ¼­„EBhI”ÀJÁ$ã–ñ$ÖXo¹q[‡"sæZ7D!xc ü#¡_ú¤9À€è£Ú9ÄË6­¸ !1Ia¯+ø®L‹âVhY‚yð7²'Sy—zxì)ÑGȨï+¹,RÈ,’˜jé7¦ ôZ-² ÚÑÛk‹•®1`«XžªÕ0þhU~ƒ€eRZy%*+µÌ~€ü£•.¦žž£i¡’±i³M›=hÛ@ —Øš6èì—ÕÇ߉,MU™-'Ø+^¡ÊRBöî5¥‹OWGüòsñó‡³KŽšâ­Z·ÐlýVå¨Z-7¬ÔgcnÔ@Eí°‹ûۃ%ôwP Mè0Ò(K6;M}ހ@%iǏôÇP¦Îc x +Âòø.ú뇣ÓÍ!(ÐZ7vN÷¾Çöà¬SµBc ŒÜaÙl‘¶EØë6¦ÅÄ j‚úR¨ÇòsÇPÇÎҋ~/0„Hè¾q}‰Qå ¿5"GÎ0•È8;÷øLè´cÝ´4øy(!4,oP™­@xܼ”¶Î¦AªRdz:ŤMÃ| /}u&XK0Rö¡%±€¥À2PCüãÜÊapu”ëÅ¥›Í£ny'rŒªäŽ$â}?(?_Æñ6n ké·œkµº“͞ñ "žP>.>ïЫ½µ¸Ðô¹wkÈu« +9l¡ 4ì;ºB:$*Và]dWo=”®ë€õm„ …jY—Cv¾½å(žËóÅ>üúd¾eî†V áÿ°ÇòÜñ=0ñi_±‹MØ#eÍúè <Èùy”¾Ä¡‚šâPÝ ±»H¬g\˜C¥±•²uHqÞ10àcX °jd®J4ŽºdI;Ž,êµ=,HÒ×ÂÝ0B7îM'ôW«c>ûi¤J^=T7¥öyb=ÝÒ-rEØyÂf+‡±¶F9v97Ô"YÄ%@¨=ñG·¶Ø T-ÂNe¿.°<ÜÓ»_.\7¦0©=æ«;;|–ØݨD¼ ɎK~¿)`«cYîYv a6Ç·”åŒæó®A®ÎþxF—Ö|‡{ì…y‹‘ìLÆyÜ_/&®bôšÅöx¾Læ'Óø•%›glèãêàσ–ü.endstream +endobj +1815 0 obj<>/XObject<<>>>>>>endobj +1816 0 obj<>stream +x•UMO1½çW ê¡©Jö3,ˆ~ ¶­ztœ kðÚ[Û äßwloÄZ©$Š´‰=3ï½y3ù=É!£w‡”ðv’%Ty–0_ÒsAƒ°eU&ó݃Óz’~œCžC½¦\ÕâêPž,ƒšO÷öö~ž\]|¹øDOpÎÔz%тVrŒsì0£{µ‚è˜a-:4þ\ƒÀuÛ2:“B!ïê[*H CÁ)ýêV ×j¶H¦ ԍ°þÇ fyIŒêÕ´E¦,lt¶Ñ½\©·z‹`;Æ ÒÝb¬«;'4]öµ™¹é[TÎîƒ6£ðËÀr#:·®ZnjóÀw*Ç;°6º@¶ ˆQØE?„)NÀ¯0$þŸÐ}èÐ4¬³pÛ[‰€ ‰áó÷˾¬þ†Ý{5)©”H 3R {Ҟˆƒ}©Úå.LOT…„-ۀB F‚; wBJð±À,< ”Idq9Q󞙕ydéÙ&E'’ ˜÷x ¸P7õV [­ž FI +o¼i­c@ðŽECt|ÝmÔ¸yÜ sHGCo¬&ç5¾’wH „7!>éÉI¬$ߚpÄ7€µíò9ºé@9ƒ£q1Œaçõf/] +•ÚÆ'ðy³dáií\ƒ´·&•š¥–µK£¼È³³0"¯ bÇó<+«ˆ tºe$ ™ ‘÷Ž-%ƒplúñÉ)¼iõ +Þ?ÆV¼Ã7kðõ/ENî ÙM?tõ)Ó?ô„å?™4ŽK€å§kwA¤èxjxÄzޖ²Mð)q ÃâW+n“@.&€ÐM[ÂbØ*c¾› B«È¼ `ŒŽ‹¯õ‡ãíúÍäë^ÿ¸š“”R[(pc¶Q3¿ËüìEËjZß hW |dm'ѦöÞÌgAÙ¾{¡ÈvUCAÔCÓ¯½Ë`MՅ +rPˆcðöbØgyEÿ‹Êrs}r~z—Fß"wp¦yX¥4Üq†gۀÙaFÓ±š¾v Ì«ER´G(8¯ +ÏèC=ù6ùü;ûÂendstream +endobj +1817 0 obj<>/XObject<<>>>>/Annots 1141 0 R>>endobj +1818 0 obj<>stream x}W]Û6|÷¯X(z.ò·Ï h›¦I ô¡M òBK+‹9JTIê|þ÷%%ŸO¹ÉÙú —³³³Cúßɜfø7§›-7”דY6ÓóÇÇ“Åò6ÛÒf¾ÎTÓr±É–ý¡O“õ*[Ñf¶Èfx9ßndh¼“—ÛÛlM«Ù*½¼Ýbfº“—X„–·+D]mop-!S9™Ï—ò -QVs}ƒién˜¶XˈѴ·»Éôý--f´+‘ÓæfK»"¦‚'ùÕ¯•j;ZÜfô‘[ë‚nô¶;ø—»¯qæü&Í|µP»â -CçýÑg‹.Ú6ièŠæó~èâ&ÛÈÐ]Åĵ҆TQ8öžJëhߐ’¬•î}P{ÃxdXyö¤=yUïÕÏñ3³î ¢'s”i+už"fô - E„¾²)è`)ØêUà¼jt®ÌEÐ~J·°Åå)¨;¦àA×ø°XDxT¥Ì=#¦“íÈwûZReô‹ñöšÚÌ3“. ƒ*å)¯Tsà!‘9ÒvzÈÿš0ôÈT«F¦IRÁôH<©‘”j´¯IòVàsö|^ -¸¨°¼îòJ¾%‡\5òí<›R²­Ø´œÊï0øØ «fôIJ"µA=›€?Iä„ä .@làbT…ƒ³]K¶¤–-è ceéޚ® Á!Oà½&§ñ¤š‚¸»Ágô"g}í+Gµpž”´·]FržÁhåÖz¯÷àd‡l̵Rˆ¦Rú•>T€!æ,(, 8Šý ¥‹uf ë^|ÏƶìFK–Nc9½¸(‘ d2Çä/ Æzg©±Ð‘÷ÔPfõ+#I4ՑËÜÖmÖ:lnÏ|½§†¾§;2™…ç# ˆ:‚åì¨mÐÎ}¦o9Ü†( ÂBhÎZ -1Æüö¨€¦Ô‡Î)ñ€ó@@l¤<˜‹·H -ƒR3; %eIqȱð -5Wøûr%<‚8, ù|yIëüØÊPËÎ$¶Ï ÷í­eÐ5Š9æþ3z@†Æö0Zzߒ±öñlw¨"å¢Ä&pÃNÒMù¾Ƌß&ßJž]þÒ·ÐŒ–'èë­ÚC2'bç¬COþ)´èäàè 1y¸Ýßk •×HY²åkؘØOñKýˆv¬µtCƒÕB¹b®oìC«\-e‘ë§ŐeKÉ­C`‚'XÓøƿKßc½°‚/õu-´:4ÖkÿíÄàñÿžÝ‰t-»“j¾éÔ¾Mt“›®`΅èg6Ðd¡J½Z4Ԉ—û"A"ªA/Á2¥%â~P¹hæ(½/Ha[<â°°ÂK’åFT&š‘J6ýó2¼Â®Û8ü®Ž–½cÁlÄâúíÿ‰+#eOSÍ) iaw‰Ù$eï~+ÁV*4…¸(:4£­c¿9.;/ãÎ -ŽºB— m#déG剣EãA—ÇÍ2VŽPvFÒA´â‚´ÁËT ó”êõÛ1-£èæ3ÂùáˆiÏ,=D̥ŃÖi”?õ{J -|sˆÛVÁØ.Í5( 9‰c!W›ö¡Bû;ò­Ê¿Ù·wb›©¾Åcad¶›¾_÷ç­«‹lÞ¤WCÙ®ÎݚžãLhWØ42i»ÑðŒ>_Úa©“k'B¥> )ALS\œaz¤%¿vhVÛÈ® £Ä·ÈóŽ¹Eô¨Q’{0† ã2BâPR>/XObject<<>>>>>>endobj -1819 0 obj<>stream +QVs}ƒién˜¶XˈѴ·»Éôý--f´+‘ÓæfK»"¦‚'ùÕ¯•j;ZÜdô‘[ë‚nô¶;ø—»¯qæü&Í|µP»â +CçýÑg‹.Ú6ièŠæó~(†ldè®bâZiCª({O¥u´ïHIÖJ÷>¨½a<2¬<{Ҟ¼ª÷êçø™YwÈѓ9Ê´•:O3z†"B_ÙÎt°l +õ*p^5:Wæ"h? ¥[ Ø¿âòÔSð k|X,¢ +<ªR枑ÓÉvä»}­©‹Œ2úÅx{Mm +æ™I—„A•ò”Wª9páÈi»@=äMzdªÕ #Ó$)Š`z¤NžÔHJ5Úפy+p9{>/\TX ^wy%ߒC®ùvžM)ÙVlZ +Nåw|l†U3ú$%‘Ú žMÀŸ$rBò 6p1ªÂÁÙ®%[RËtб²toM×†àÆ'ð^“¿ÓÆxRMA\‚Ýà3úG‘³¾‡ö•£Z8OJÚÛ.£¹ OÈ`´rk½×{p?²Ã6æZ)DS)ýJ*Às”–†G +Å~ÒÅ:3uH/ +¾gc[v£%K§1Ȝ^\”H2 ™crŒŒã +½³ÔXèÈûNj(³ú•‘‰$š +êÈenë6k 6·Æg¾ÞSÃGßÓ™L‰BŒŽóDÁòvÔ¶hç>ÓηœGnC”a!4g-…c~{T@HSêCç”xÀy 6RL€ÎÅ[¤ …A©™„’²¤¸äØx…š+ü}¹A–„|¾¼¤õ ~le¨eç Ûç„ûö‰Ö2èÅsÿ= Cc{-½oÉX{‡x¶;T‘rQbž²ª\^AþÂÖÒO +F‚ˆ/ÏáxÐ!äûh”zJûÈ{jÕ¶‡«Ú×ÓéÙ÷ÒÕ4b¿ôâèY0ÚEF¸a§ 馌üNß?ãÅo“o%ϊ.é[hFˋôuVí!™±sÖ¡'ÿZtò ptˆ†˜<Üî﵅Êk¤,ٌrµ lLì§x‡¥~D;ÖÚ:‚¡ˆ‰Áj¡\1ׁ7ö¡U®–²ÈõSˆbȲ¥äÖ¡F0Á¬éa\ãߥï±^ +XÁ—úºZëµÿ‰vbðøÏîDº–ÝI5ßtjß&ºÉMW0 +çBôŽ3h²P%Œ^-jÄË}‘ Õ —`™Òq?¨\4s”Þ¤°-qXXá%I‰r#*ÍH%þyH^a×í H~WGˌޱ`6bqýöÿŒŽ@Ä•‘²§©æ” +†´°»Äl’²÷ ¿È`+•GšB\ šÑֱߗ—qˆg… G]¡Ë…¶ ²ô£òÄÑ¢ñ Ëãf«G(;#é ZqAÚàe*†ˆyJõú혖QtóáüpÄ´g–" æÒâAë4J‰Ÿú=%>ˆ9Äm«`l—攉…œÄ±«MûP¡ýùVåßìÛ;±ÍTßâ±02[€M߯ûóÖÕE6oÒ«¡lWçnMÏq¦G´+l™´ÝhxFŸ/í°Ôɵ¡RŸ” ¦).Î0=Ғ_;4«md׆Qâ[äyÇÜ"úFԏ(É=C†q!q()ž¸°òëúíp¸”³5Îkg ô†æ³È Gíþe<®½¡içÝÔXœýz;5zûCöC=š4´õÿÌHë'>uÙxÞÁRŽMÉ%Ӏ¾'þY0çÀ=UiÎcq'|Ñ¿}!6%}Ð(œ _\‰ôàÞ¢‘h= ŒŠ„ä؎ápÈM+Ûxs¢a}Øh]£Lédx„ÿ]Gw…;Õ8Á%XÏÈîÕ¥öJ*ByÅiãv«Œ±Ç´òŽU8ÂÖ¢‹º,aZ¸õœwN=ùÀ5¶\´]<þôfErqÆAs éöñÉò&iæû?wV›m¶Y/ð3 +šo–æ·ÝäïÉ£Xîendstream +endobj +1819 0 obj<>/XObject<<>>>>>>endobj +1820 0 obj<>stream x•WÁn7½û+¦ºTbY’eÙ)ЃƒÚ€&Mµ@_¸»Ü#.©’\Éúû¾™ÝµÜµ}(‚ —ä̼yoõÏɌ¦ø3£«9],)¯O¦“)]^_L®iq}…Ïñ7h*åÃüb6Y¼õa6ÿøö‰Å>­NÎï4›ÑªDðåõ­ Bàé”Vù¸VùÚ8=9]ý8™ÒÙ|‰«b¼Zkâ¥ó;ä+GDZÎ&¹we»Üß8&íR8´‹—ý^²¾"«wÚÒ¯Ãý&R<8ïµo"íMZSB´7¯)tÖTïܓÖ*ÑZEÊ´vÔD]qäm¡‡D1³‹Éœ‹Ùéw‘|IßT)R›ù¤qO Tú@™Ê7{ŠH¹¯·*™ÌX“|´€Jcu"v¹ŒÿÃNÙFsÆåA+Îÿàb-RÊ}(HQ4•3¥É•KöÐïä¤[P•@Tñ’q( FÊÞõÉõÜ¡²ÚÇôb·ßê {£„­ÕœOä4ò@\ß¹6ÕZT¦]Lè‹Vy(¤ˆÆ#,gšRj|.‘`ß_„LgÓ8•øÀ6è­ -äŠþ¾}øNV…JÓÎÛ¦Ö 7S¨PII-çwiæ2…Ï.-I!ƒÅ„î]ÒÁ)K:âéƔ¾š,™÷¥Zi$I£û/«Û‡/7¿ÓíÃÃ#ªuŒ +äŠþ¾}øNV…JÓÎÛ¦Ö 7S¨PII-çwiæ2…Ï.-IçW“Å„î]ÒÁ)K:âéƔ¾š,™÷¥Zi$I£û/«Û‡/7¿ÓíÃÃ#ªuŒ ñA!t!Hté3™„ ìµü©€Joœ~Úê<¡n”²ƒâ÷k0…Bã°D¦‰Û½ >S£”«¼—6P©Ë·F+½Êu`bbg_1æœ`›Ãã¸qà¡´ow­v"|ß  Ht“®)ú2ñÒãiw®W= b)öXä @@ -4229,362 +4213,354 @@ B ôýèÚÍȂ“>¤^:=&ߡɸöå¾DßUCk¿§äùLðE“CÇÀȔ´õ1¤1¡¯’ÕjûP«Ý;á@‹.ފʒ”¥)„} S‰ýi¥¶[¨X¡š?aG›¬0€2y%qjDž=­E ­·Âö>Qf$믝tm$(²çۄŸ] ’÷VFçëFUtÐs³lo… ~áçw½a¼pžªÈZºqAí®Þk^ìREÁ-ÁoƒQ ]Wiì|{šu$X¡e|%OªG]CŠí0(¼û™MráM(ùt Q‘=˜|Ú °a¿bÒ1¤lN¦#—Ç PAÍqGñˆs©Àfz€¦Êhk[ÀGzªúu9¡›€;WªzW`ä˜â¯™ÞÙÖ_ìê©q 8‰#¹qæIGn‰ëC2yól¿ñu‰¬qÍm`ŒÚF€ŒÙ ,Åüjê-Âçpa&&7üœ–ç¯ÐªÆØtqƒÂ#ȏ§"r‘CÿžC›"Òf‚u¦ÃØç2F»f+ÁƒÁàðI¢wà@aŒÛèy6|½ÿmԑƒïeOÇÒ³WAn©‰­~E£\Ԉç+xŽW«´K#Wf–€¬6¸¬YpåÞ£ú;sÈU‚×ñ®£‘£eVH×ò#ðYçm¿ß~Ô,á|›~Ÿ+ÄÉ4t=ÊGŽŠQBÌbÕEt¼4O?õs/j€×7f&‡él’¡jóêçò¾Q–tÖ´Ëý ó¼ÇK³ÓÔ;ïmn¾Í–³#} ˆÂÞ`d¾-_ ÂMè3›'„-ÆZaSCrªÂ# H€Ó0Zyðk¿›m|ӋQñ¶ƒYsÿ-H1É$8ÎÕý\Æ!Ç֛Ïï®»7³%~©]_Ðòr‰_axX~»ùü醾ÿ–K¿ùØîQÇÑÏúgWӏ¼ÿÝgëby=Y^ÎñÄÅ®ÙrΧoW'žü í(endstream -endobj -1820 0 obj<>/XObject<<>>>>>>endobj -1821 0 obj<>stream -xVÛnÜ6}÷W üRh´×úäac¯“ì]×RšE¸åeM‰*Iy³ß3¤”Úª [Îå̙3üëhBcü›Ðٔf§”WGãdLó‹‹äœæçgø}Š+© “³q2}ë`vžœ¿ȎF74SV"ÆéÙ9eÁÿ_ò“«h¼´4'”í$9Qmå;™?iåüÙŸáúä,^7›#tVœÀ~’ЪöÖm£éœ&“Îtz†l`ší”£RiI¹©½Pµ#AìœLI^:ïè`ZÊEM´¥±yCÏB«BxÉg–Ґ–“öYZ„õ$´3¸¬u¼¼ß Oùkõ$õsÓ»É,&›‹ÖÉ 5[-+BRª$å© -^D} S÷V0w^6±‚M#œ“0Қ£à4æßkv_ìVlõöÆ>©úqB©j™tߦ§ÉœùŠªÝδº ÂÐâö6T<ÿDª[ ;°Ú× }‘´Ïn•,¤\XY¶Qó1œÖ• äl—¤©ÿыFl•V^¡0ÀªJvڅ•ÂjÕ{æ H¸aNÖÅ È:êT@å‡3ª$ù üõ`Fºú€:†E¼…Âjƒv­Ížëo(26Œt.‹ãà©Dùúkmc•ƒ‹À˜·û±6V¡ž‰—¤ ©§ -œk«†)nÞàôª\`ƒR‘ ‘ J[ÅбYây»Ö8þ°ú˜.~]>Ý_õ'‹«ÛÕrÑÖøÝ |4‡ÙõhMÛP¶L³›Ï÷Ãöd‘äF¨Û©Jia¬%8å¶4ÙçèríÝÐÅ*P:ÌØËzžj³×¢ -“‚öŠg´Äì;°‘ PwÕ6Á¼—˜ Ú+ÌMtºÚ›º®æA™Ç¾jŽúډ‚( -FøØ]ä!§íp¤âDք¿ õ±/ÙñèfL½$ÍãäýŽôQÇPYL#Ô©ª½G?«ÆXaA¶ -áw0ÁËðÈJÁC‰|Où¢$~Z¦ËÐÁ”iúùnI BºÚ¬i–°öoèv‘›Ê>-)]Ü}XPúy•-J7°¿ÚÜÝ-Ö×iŸ@'ué§Í—5]¯®i½ÉhùÛ*Íhµ¦åâ¬zè£ô·z%º×R@L½ ?ë #+­o*éœxixܬ̥z–AY7_™ààAÔ=kräBÐmVÉ­D‹)·u =« `ÆÎ;E,•Å¬‡EôÝ­î)PÏJgt²„ÓÜXdäqßIOm“|¼¤;’@ -âÄIŸ‚—çÀÒ¸Ÿ£0 \xˆ×MWË: ¡–ß°»†³À>‚hGe„KQ´ëuŠ´xo‘Ès ÆpXEð¢\†åxà¯0’ƒ*zžÇìQN«‘>&ð¸À’…N~cÖÔÁݖÕsóæà `Y„>fkÖoï÷˜ãý—RÎà”—÷wH(¿0ÞAEÉñÿŒ lE“höJJyê ¤\i¡¸ƒÇ·Sù.rŸº@ŸS¨õ'²m¼ÈCË+ääûÝÝóLàxËýŏDíD‹_*¥zl­ ÀT -|¶~m¼¼dµÂžîÆ:Ò&Ç6æÕz”„)>’N Óë5<'´±oڷΎ؟…[#­¶ñæù?ï®ùE¹ÿñ´›ŸâÅøó]C+&§3öµÌŽ~9úžO_endstream -endobj -1822 0 obj<>/XObject<<>>>>>>endobj -1823 0 obj<>stream -x½W[OÛH~çWùeA"&h¥>¥+$–eK´R%^Æö˜L±gÒ›Äÿ~¿sƆ`ØíÛAÁžÛùngòsgFS|Íè䐎æ”×;ÓtJ¦3ü<>=ÁÏC|{MåÎùbçàëGšӢĔù)~)çSZä»GÓô(=Li¡CC‡{‹}L³Y=9<ÁèÝo­¥f©)wu­lAÉÊØ:¿úýîòÛߗß*½«eÄí½ 8»¸¾º¼Yl½n­ÙPæ6)]•Ô¹– -gkèA7¼ó”&3†wTô¤*S „°r6h^Üò O‹‹Ûƒ«[ -®lÖ -%š@Ö58›÷:oªŽŒ ª*]¤ý¢‡ó”‹Þ½q /¤ÙzmªŠ¬Ö5Ž0Ã7¤()\ ªY5 ­-ܚ\,¥a \ýxí¾T‚Uj‚zÐTÇ@%Kpù¥km‘óLm*å·êúrs÷RFè&?à™JS uŽpz©:è¦]׆Y¹L†Iý‰ƒª3…zš¥k❴m¼ÑX;1µAû'텼¼2x»O†^‘ -¡­uOÖh÷¥zbQðoVôºV‹º’·`!²0Fî À,1ÊkõzÙ ÀT›‡%S¦âŠŒèœ@‰¿ÁƒelKãõl?C—Òwèê¹^WjÃGß·DX3‘åµóCcp<úÙâÈø}ŸVÚ/Õ*PÖ¶sÐÆ©<ÓQýª/#´™År÷»XàÚؖ7æó‡ÑæP¾¦'£}³*ת¨Yy^ÕéýÞöíähE,†=ê {‡ýÚ°¡Î"­4¹Þ6n¯í_2x*© -v%´\h ª'0¡XSa ۍËÉTþ8fö•'´÷ÚàŒÜÙê`E}#å\´‚âÀl‚7ây†%ÃÖ‰à4d,RA½øF؊áBä)ُþ Thۉ÷’˜--4"@µ„ pJq¶rŸ=*OXÌ4¬+ÞbË)],uþ8Ú{Ý狧73Û E² VÊ׉¸­ÑõÊyå ʃe¥l7œY¤6*Éþ£ûrpîÄØ7¾±Ý+rÔl‘ž¬z¯K,ø_g¯ÐTgŐµê$Ò2=xñ9ԟ˜ ûjtNÀÝò;ëÂ4œÈ bL½âª{}ž©P@N l)gRâ -¼ýX¨}pìǨ{Ëõád™qaBÞ¡!°q-Ö¿¾º[\Þp—@éiÄ`þ›&*ùOá'•4‘Hc|EÞkÌÞx~ŽPøªQzI öDïˆã·:àâL³ÐZ["âmQAõ²—A+y¶R¦sž%ØÅVƒh†&/¾€NU­Eº$øg¨¡6.:¯ìQéZúT£7/¤Ë¶+Ž­Hé¬ -®'LÌÆÖ3ꈙûÝÁŒ÷{Ò¦B‡ÌؐIÅG»'#g±ˆÌ'¸ËµôŠ¼qÒ÷ֈnÐܵF°3:•C¨ã‚S9HˆOHo€c‚2›oŠl[g±ÉÅ{êziò¥TIì”È-‡J¡ÄH@øZˆtœµæ«S9»rT Šc ÊUˆ n ©Lj-0 ­iÀ.bÙwûO¼ÞÁ×)}®wDZ©Pÿ/^78(é3]_ûOÓS¾@½&لq›Í&Ýú>躙–á:€ÓCM¥BãDȼÏô=6“×÷Î9ïw{²ÊŠûH›˜èÊ杭X£?ÔªÀ58pjŽ …hYrPmãjôõÇî¨ñʆŠÝŒöX‡÷×Ïʹw4R…ZA1ø¿@šâr¯Ø­QxþξbÍçKeqó‹L1Ñlœÿ w9^äxûJ X~qtóçá%‡£ä=24ßÞ︇±AàJÑïڄ%C5LÆZu_õDl*Ót’½ßž¯!Ò>úËw‚é8#n3¥ÙÃmÈU­´&<âÇq ?o}>¦î%9CŠ ¹Áÿ“¤À/+.tirfÞõÅ#uã=?Š}kñ_ -' -F@,Í}-8gï÷$M¾žö³fshêôˆæ'㇟»³?ÎÏèÖ»ˆ+úâr\À} C<&LN¦0rñÎg¸ãùi:ÿpˆÏ{x=›ó´ËÅÎ_;ÿýæ¢Åendstream -endobj -1824 0 obj<>/XObject<<>>>>>>endobj -1825 0 obj<>stream -x…V]OãF}çWÜò[“/ô-°l…Ôݦ`Uª„„Æö8™eìIgƤüûž;3 Y/»hµû~œ{ι÷߃ ñoDçcšÌ¨l†ÙÎ.ÏñszÁ?Çøo%Õá‹ét–ßúb2eo}1;˦ýϯòƒÓOS(¯‘|vqNyEH<R^Ï[ãWÒRišÆ´TŠÎI25áCüâ7†¤µÆ:RŽVâYµKr¦‘~Å¿ m¥¨^ÈvmË#ÀÚXO£Éå ¹®\‘pt/šB|È¿ i0š £¼:~8Vò7rMQqÜíëµ5 ©Vújùá»—P«'IÕRy¡-„_mŒ}r]¯dùD/¦³1BVš¶¦ZiÙK]ÈÚbo_¸boÈy’C-¨VP%$8!åFKâÙ(ÔCÚxÆ¥¶óVxeÚ_Räñ ¨£©y[ыô$¤kãœ*´L "-ÕBéÙ(¿¹ÏiÂíoV²e¼Xæ©î A*:åæ kDU -‡¸Ue¥s½~œô rÄUmi¬•¥Ïh¡¥Àˀ‹_ R >†½´µ(%Ý.h#ßÕ.Ùëg÷±ªÏ¨êg©SâPxHæÎ8p+Ô¤_ÈÈ*qKŦµYfmS„QeœàôÓ%(³u0El'Ãl’M3Ê%€˜ÆÇ^I=3©ïº’¹Ìø"®6æ©[ÓàŠ®n¿¿¹ûûæŽï矯描‡ýc:r+Ó銖ÀžÇDÔ<'¦T¯ïؙ“öÂ)DùêFµ[&܆ר2íQÙ* Tß `¨ÔÓZV?b¯Ša &cPkUž0/¶#íÕÙ»¯*FB+çe(ßUë­LÏû•ÿق2Ñ -Öր¼¤‹¹)×ÌêTÍßÈÖ`À"4* ÎðÔZX° Xcº‰F€Œnë^Õ°“à0áQ¦-~Á]¼„öL+ü&¹Òª5C -:Cà^ÃߪåÊÓ^^ ¾Ë; ;K ;ûÃbÄ];ñ©³d®Ç<åW¾Í¯ÿ¸½ù’ÓѯGßGK–ñû×nŸ^Œy¸O¨€”V˜ì±öVÂzq™ñ@v롽Óc R|6¸ ¬Â'œj »ã-™ö!ðƚvÙ' ªÛ6[RèŒ~–ô¬}ürÏ¡ZâÕÂ1¿Ø^'ÉDaðª‡Ôß×,kö=ÀoÂOÆUÑø§ƒÊ™ ^‹ ¹·?Ўcˆ`sÜÈÚÊge:üÁFUtpíׇ!bÆCìy:äȯU²Æ [ÿíM,ùQFsj»¦€íÀ™¾H_(ãNóë]çwrÛÚ|r6LcmZ Wh¯[®âR†Xƒ%C¿žwµÖ½´HÂÕÅם„D£š+3Àž¢¹`ï±ÙII‡Ì!«qÊ+ 4PéßNZ ¡ '©ÁFKÙßjA±NÂ`…Ž­½Aºà[Æ-9… §¥…å hÂ÷Û± §àÈI«Q;Qðà‰w&|lT|ÑyÓÀKtU®D«\¯cÈ@¬pDœf"ÿ[K BAÀ[];$³æˆ÷f‚C%Þ6h fÛaj/셵ZòeíÚ=¼R*lfƒÏ‹7À /Bálœiµºl#ÉVÍӉd›Ø(­©•¼Ô±X’¾±lSõø÷I Ñ»@F%¿N¼c+Œ ûõF9²ÄB¼ªDø¾¢¸6q6öΩ]»õÎÚÄIøÒÑôp|'k¨ u§ûŒ/–>9ƒ?=|E~ºHö?šá‚¿˜Ðl2ÆuŽs$´°æ+2úhÊn·2y¦ƒí ƒóá%?ÿý3]d³³1!|=š…­t“üuð?Òïendstream -endobj -1826 0 obj<>/XObject<<>>>>>>endobj -1827 0 obj<>stream -x}WmoÛ6þž_q0Ìê÷Äq‹®@ÓµC€µÍšlC|¡%Êf#‘*)Ùñ¿ßs$%ËN³‹¼—çž{îôãlJüNérFó¥åÙd4¡ùùl´ óå%>Ïðg%ågWwg㏯hzNw9®,–øŽO&t—æ“Ñ|t9¢;éjº|q÷§Ïi: §‡³Kœ|m4ÕI©)K¡³pê"ž+Wi¡¤®i<¾ºþãöÃ×>|ß}º967Ñ7Ӑۘ¦È؞¦•¤Êš²ªeF¹±$¨ÎíŒÍüY¾?¡át>šqñf㤏¦=J&÷ÿ‹45 ‚ØÉ@î…Y¯aWéÚøçV´2´SõfD×¹?¹¸Â'~BBgOœ·Ö}Ü"ó ÐðozhQÊ7dªZ€R”û(¶“È»Hq2µ²~6à/:•¾ ´Çñq1cÝ×…BŒ øö6‰Äéê˜ý«®Qxó@"–Ö‚W¥tN¬üu~¤ªÉ‰½£Dé­(TFZÖàß1 - û Ôç -(„™  # ’ ¬•i]ìÉɺ©@5NÃrCŒR£óQt6‹•å:+‘udïù)ԃ„½T ŽiìáG[#ŒÈFl%`™Ùy#hG÷dê ŠçùÛY'·wµ,ï_Ъ©)S>V -¼@È®©*ck߀ȷÄw' !ßôCèBیÓñ)|ӏÌR`d"¹nt®Ö¾-›Ò4¾Ìö BÙ`v0ÖÚïÒTªGôq*Ð÷]ÏC† Y§˜1û*ªÖáÎF½ß‹­¦ ˜’üUo(íjÛ¤L'w4O¤—7QpóxÐëM”Qú±€)‘[)ÑîZ(ÐÌHq§¹b‘“´ãvçäë'¡öb@ž'úFïÙá|ÄØÏ×eœ¯Ëãk0æ뗠17ï½_/r‘páԉ¶Jîè?ݬ=6çìNԌ{ÂPÆ ‰æ˜¶ž‹è{AIf0"üNØF/ǝŒÙ!Ì¥] ÐY€õ–Tl…*<= F‚ųæÕO䏱e;ðÝZ¯¦9ʔ¡Y!bª„YKA¼½ãôJ!Z?œàÉM+)¬Ä,ÙJ¯3g©<5{Ù4® Ì`YÍhµGȼfµ# }ÃUCSÈCÁ…« -À3ª֌0á ‚Ëé ÊEœO@L7Æ@´—!ÂOô §Ží’ ˜.Ö$ñrf‡"Û -Ì^0$­ÆªŠS,Öð潯_çÿ'4 -|b®<­ÍV úýó-#|ä 뀯]´ïü(ãžöö3>Ê°T”ãj°›'Ú3áG™=R½¸FBþ|“þ¬¤ìMlÇëŠÈ㺪À¬NHwϓ¶©'¼à &nÌÃ?aŠWO±ù° h(·­UÚ ^R)ÐM ¶YŸhò?Ì®=õº8èC-fÖÒÝ¿ˆ®Ûáõ®pæ%3š»†éî—%¯•¹Hyg‚jzd;ÜV £¯–•?ê“ã¹Î£¢·ë†•ˆ$ ¯(NÒ5֐ ->L{#…‰]ùÆöSr·QéÆ«pÜà oð>ÿ#ÓJ‘nü"ý ØjcuâÑ#çS í/¡^^ª¼ÍÛ~àaL3ò‘áðÅ 1Žv¦þ°%aËVh* &!Z(£UQª-çÛBy$v–$¨éûª@ÇvŒ«­œ$ˆ:ԈÓK0·zÉ׫*ÆcØ>óBùjmÙFk=nì,˜‹}í%Þ} @9¶Hü‡…¢¶ûØÁì{üqßû¦ ¼g.ç´¸\ò -wûîÓÕ;º±æ;xA¿›´)q·'cñøðròŠÏ?}ñ<_,G‹‹Yا‹»ûpwö×Ùd4½ýendstream -endobj -1828 0 obj<>/XObject<<>>>>/Annots 1145 0 R>>endobj -1829 0 obj<>stream -xWÛnÛF}÷WLõˆiQ’%9€Ñ:møÁ®k3 ŠºVäRbBî²\Ҋþ¾gf©í^DY‘;÷3gF…4Àߐ¦CM(.ŽÁ€&ÓI0¤ñlŠóÿ*M©¼ÏNƒÙk/FãÙëÃpL^‘€Õ`Ð~<\ !ŽOñYP8ÁŠÿ–ÓãQ8 áD8bW -N&Á´ýÆo?DG'Wc -CŠR„2™M)JDû€¢¸¿´®vÊs»¢4ˉ­hm›Šâ<Ó¦¦§>¸fntýŽtOoßF_¡ó .xÇ£0À1éÁ(8 (Ò®¦3mgúxȦû¡z©)¶E¡Lâo¶ö v¨qš¾¿§'üùpsýxùðÛåÃÓSt{¨²Ðï¶!·´MžÐ\SYÙ¢¬u"A(*•s+[%lÎpPíUÖ2 ãp„t¡,*êµþ°_e®Y‹kâX;—6y¾îQ£Zè€nR2¶Þ*­èþgr6­W -@Èe&¶U¥ã:_ãìj$ÊlÕ1+IvÅ<ˆ­Iä*Ô7 óÐ'·zR%’*õI#‹P"Hf Ê3£Ù,mµ±'­Akv8ñ5º©ß8hr–Jë\6GÉ륒pÈéê™Õ*ó¦&dîÙ~’TdTÛ–íÄ')Uõ¶Eì)Tq'‡«íE'l•H=Äiê‰Úsú„ß]Ü^öX;ËþQåŸPי5dÓ]h+®©·“h­±&ö¯cN²àJk’Ì,6Ú·À`LÔëR'RUþ–fÈ®D‘fߑUÍÂI¤…Z(%;¸1‡R•%®tÌڒ™{*²Åpãü°¬)V@»”@jݶ5@Ó&q¤M\­Ö¿Q@xÉî.Õ³D|rµë öþþŽÎ;ÞËv´ÐgðøG aŠþK›(vSÊjš«ø@/[$í»„úϤšó¬¢ÿ-óÜÚoMIÇ·]>F׿|êò ÊàØ¾Þ Qp qº֋ÊB眝٣©À£*æjÓ œèÏÀ„]9ô¹CÑr+@:à¦É[¸¹'€¼]0pùI¡\ö™WЂÿA±»Rþ­g/`“J­Ëm }ž?uÞvúŒi -Xp”*p8ÐüY¡B -h3M--Ûö'ž¢_¾6àç¹æŽpLü^gµ&µP™‘^Ⱥ©qu–ç¢èK9œ mâÊPË!$kö-à[‡aŠŒÂøŽ¤ºÝg¹W¡\V:ÕàR™{ujzNkíñÔgøbKù=­ -`0J÷ÑՎ.PˆV'‡ÑÒJæŠ &s«¼š-^üŒfQkdb+uœ¥¸j/áOo0 úQÂþ–Ûð ÔÓ¶4TíõLÇ®G(ȏ΍§n‰¹ƒq€ÉÜÔÎÕÌ<«úð@º˜Ù;¦sý¬sžFMÅw ›ðÀՂˆð·Î~WKÛì³ñVê¼¥Ö½O½wý£ƒox¾•xÁß-!}¹‹¾Üªª›]Kø\p³aqè;,!HƒTýe6]\E—²ÿ 'H(c§)K[u¹€wÄ×<õ¥_¹ŒFîoÞ)<!VF¬€¼†ÆەqУ XBêvݏ‡™’–òŒ-⃁lÇ€ØOôÊ ·K¤(¤ÜÒ\­rj`…ë÷œÉRÏÍ햂>çþIÓ,ÎpÕwi«ŸýØ#±†‰8ôÆK´3 -7öOòØj…<+Þ¡ - `«9½jÆے©¾4sW¯>oÿfv©¹E¡†ã÷ªVzŽæZ@M˺.ߟœl½ð§6€Í -xÁÛÇ>gûm2±±4k~–*1â¡ø_üæÕ œà‡ÏlD“ÁÐ×ðñâöÃÝWö+/…mÜøå xbÉãÀñtpöúτñdLN‡ª‹ë,výzô7‹:óendstream -endobj -1830 0 obj<>endobj -1831 0 obj<>endobj -1832 0 obj<>endobj -1833 0 obj<>endobj -1834 0 obj<>endobj -1835 0 obj<>endobj -1836 0 obj<>endobj -1837 0 obj<>endobj -1838 0 obj<>endobj -1839 0 obj<>endobj -1840 0 obj<>endobj -1841 0 obj<>endobj -1842 0 obj<>endobj -1843 0 obj<>endobj -1844 0 obj<>endobj -1845 0 obj<>endobj -1846 0 obj<>endobj -1847 0 obj<>endobj -1848 0 obj<>endobj -1849 0 obj<>endobj -1850 0 obj<>endobj -1851 0 obj<>endobj -1852 0 obj<>endobj -1853 0 obj<>endobj -1854 0 obj<>endobj -1855 0 obj<>endobj -1856 0 obj<>endobj -1857 0 obj<>endobj -1858 0 obj<>endobj -1859 0 obj<>endobj -1860 0 obj<>endobj -1861 0 obj<>endobj -1862 0 obj<>endobj -1863 0 obj<>endobj -1864 0 obj<>endobj -1865 0 obj<>endobj -1866 0 obj<>endobj -1867 0 obj<>endobj -1868 0 obj<>endobj -1869 0 obj<>endobj -1870 0 obj<>endobj -1871 0 obj<>endobj -1872 0 obj<>endobj -1873 0 obj<>endobj -1874 0 obj<>endobj -1875 0 obj<>endobj -1876 0 obj<>endobj -1877 0 obj<>endobj -1878 0 obj<>endobj -1879 0 obj<>endobj -1880 0 obj<>endobj -1881 0 obj<>endobj -1882 0 obj<>endobj -1883 0 obj<>endobj -1884 0 obj<>endobj -1885 0 obj<>endobj -1886 0 obj<>endobj -1887 0 obj<>endobj -1888 0 obj<>endobj -1889 0 obj<>endobj -1890 0 obj<>endobj -1891 0 obj<>endobj -1892 0 obj<>endobj -1893 0 obj<>endobj -1894 0 obj<>endobj -1895 0 obj<>endobj -1896 0 obj<>endobj -1897 0 obj<>endobj -1898 0 obj<>endobj -1899 0 obj<>endobj -1900 0 obj<>endobj -1901 0 obj<>endobj -1902 0 obj<>endobj -1903 0 obj<>endobj -1904 0 obj<>endobj -1905 0 obj<>endobj -1906 0 obj<>endobj -1907 0 obj<>endobj -1908 0 obj<>endobj -1909 0 obj<>endobj -1910 0 obj<>endobj -1911 0 obj<>endobj -1912 0 obj<>endobj -1913 0 obj<>endobj -1914 0 obj<>endobj -1915 0 obj<>endobj -1916 0 obj<>endobj -1917 0 obj<>endobj -1918 0 obj<>endobj -1919 0 obj<>endobj -1920 0 obj<>endobj -1921 0 obj<>endobj -1922 0 obj<>endobj -1923 0 obj<>endobj -1924 0 obj<>endobj -1925 0 obj<>endobj -1926 0 obj<>endobj -1927 0 obj<>endobj -1928 0 obj<>endobj -1929 0 obj<>endobj -1930 0 obj<>endobj -1931 0 obj<>endobj -1932 0 obj<>endobj -1933 0 obj<>endobj -1934 0 obj<>endobj -1935 0 obj<>endobj -1936 0 obj<>endobj -1937 0 obj<>endobj -1938 0 obj<>endobj -1939 0 obj<>endobj -1940 0 obj<>endobj -1941 0 obj<>endobj -1942 0 obj<>endobj -1943 0 obj<>endobj -1944 0 obj<>endobj -1945 0 obj<>endobj -1946 0 obj<>endobj -1947 0 obj<>endobj -1948 0 obj<>endobj -1949 0 obj<>endobj -1950 0 obj<>endobj -1951 0 obj<>endobj -1952 0 obj<>endobj -1953 0 obj<>endobj -1954 0 obj<>endobj -1955 0 obj<>endobj -1956 0 obj<>endobj -1957 0 obj<>endobj -1958 0 obj<>endobj -1959 0 obj<>endobj -1960 0 obj<>endobj -1961 0 obj<>endobj -1962 0 obj<>endobj -1963 0 obj<>endobj -1964 0 obj<>endobj -1965 0 obj<>endobj -1966 0 obj<>endobj -1967 0 obj<>endobj -1968 0 obj<>endobj -1969 0 obj<>endobj -1970 0 obj<>endobj -1971 0 obj<>endobj -1972 0 obj<>endobj -1973 0 obj<>endobj -1974 0 obj<>endobj -1975 0 obj<>endobj -1976 0 obj<>endobj -1977 0 obj<>endobj -1978 0 obj<>endobj -1979 0 obj<>endobj -1980 0 obj<>endobj -1981 0 obj<>endobj -1982 0 obj<>endobj -1983 0 obj<>endobj -1984 0 obj<>endobj -1985 0 obj<>endobj -1986 0 obj<>endobj -1987 0 obj<>endobj -1988 0 obj<>endobj -1989 0 obj<>endobj -1990 0 obj<>endobj -1991 0 obj<>endobj -1992 0 obj<>endobj -1993 0 obj<>endobj -1994 0 obj<>endobj -1995 0 obj<>endobj -1996 0 obj<>endobj -1997 0 obj<>endobj -1998 0 obj<>endobj -1999 0 obj<>endobj -2000 0 obj<>endobj -2001 0 obj<>endobj -2002 0 obj<>endobj -2003 0 obj<>endobj -2004 0 obj<>endobj -2005 0 obj<>endobj -2006 0 obj<>endobj -2007 0 obj<>endobj -2008 0 obj<>endobj -2009 0 obj<>endobj -2010 0 obj<>endobj -2011 0 obj<>endobj -2012 0 obj<>endobj -2013 0 obj<>endobj -2014 0 obj<>endobj -2015 0 obj<>endobj -2016 0 obj<>endobj -2017 0 obj<>endobj -2018 0 obj<>endobj -2019 0 obj<>endobj -2020 0 obj<>endobj -2021 0 obj<>endobj -2022 0 obj<>endobj -2023 0 obj<>endobj -2024 0 obj<>endobj -2025 0 obj<>endobj -2026 0 obj<>endobj -2027 0 obj<>endobj -2028 0 obj<>endobj -2029 0 obj<>endobj -2030 0 obj<>endobj -2031 0 obj<>endobj -2032 0 obj<>endobj -2033 0 obj<>endobj -2034 0 obj<>endobj -2035 0 obj<>endobj -2036 0 obj<>endobj -2037 0 obj<>endobj -2038 0 obj<>endobj -2039 0 obj<>endobj -2040 0 obj<>endobj -2041 0 obj<>endobj -2042 0 obj<>endobj -2043 0 obj<>endobj -2044 0 obj<>endobj -2045 0 obj<>endobj -2046 0 obj<>endobj -2047 0 obj<>endobj -2048 0 obj<>endobj -2049 0 obj<>endobj -2050 0 obj<>endobj -2051 0 obj<>endobj -2052 0 obj<>endobj -2053 0 obj<>endobj -2054 0 obj<>endobj -2055 0 obj<>endobj -2056 0 obj<>endobj -2057 0 obj<>endobj -2058 0 obj<>endobj -2059 0 obj<>endobj -2060 0 obj<>endobj -2061 0 obj<>endobj -2062 0 obj<>endobj -2063 0 obj<>endobj -2064 0 obj<>endobj -2065 0 obj<>endobj -2066 0 obj<>endobj -2067 0 obj<>endobj -2068 0 obj<>endobj -2069 0 obj<>endobj -2070 0 obj<>endobj -2071 0 obj<>endobj -2072 0 obj<>endobj -2073 0 obj<>endobj -2074 0 obj<>endobj -2075 0 obj<>endobj -2076 0 obj<>endobj -2077 0 obj<>endobj -2078 0 obj<>endobj -2079 0 obj<>endobj -2080 0 obj<>endobj -2081 0 obj<>endobj -2082 0 obj<>endobj -2083 0 obj<>endobj -2084 0 obj<>endobj -2085 0 obj<>endobj -2086 0 obj<>endobj -2087 0 obj<>endobj -2088 0 obj<>endobj -2089 0 obj<>endobj -2090 0 obj<>endobj -2091 0 obj<>endobj -2092 0 obj<>endobj -2093 0 obj<>endobj -2094 0 obj<>endobj -2095 0 obj<>endobj -2096 0 obj<>endobj -2097 0 obj<>endobj -2098 0 obj<>endobj -2099 0 obj<>endobj -2100 0 obj<>endobj -2101 0 obj<>endobj -2102 0 obj<>endobj -2103 0 obj<>endobj -2104 0 obj<>endobj -2105 0 obj<>endobj -2106 0 obj<>endobj -2107 0 obj<>endobj -2108 0 obj<>endobj -2109 0 obj<>endobj -2110 0 obj<>endobj -2111 0 obj<>endobj -2112 0 obj<>endobj -2113 0 obj<>endobj -2114 0 obj<>endobj -2115 0 obj<>endobj -2116 0 obj<>endobj -2117 0 obj<>endobj -2118 0 obj<>endobj -2119 0 obj<>endobj -2120 0 obj<>endobj -2121 0 obj<>endobj -2122 0 obj<>endobj -2123 0 obj<>endobj -2124 0 obj<>endobj -2125 0 obj<>endobj -2126 0 obj<>1<>8<>9<>13<>14<>15<>19<>24<>35<>36<>38<>40<>44<>55<>58<>60<>62<>63<>66<>67<>72<>73<>76<>87<>104<>117<>120<>126<>133<>142<>144<>147<>149<>150<>152<>156<>159<>163<>168<>170<>]>>>>endobj +¼Ý¡räߐ[Î8!’„19ÓaÍ#§môq8 ºÒÙ_+éÈ{>u9¡›€;WªzW`ä˜â¯™ÞÙÖ_ìê©q 8‰#¹qæIGn‰ëC2yól¿ñu‰¬qÍm`ŒÚF€ŒÙ ,Åüjê-Âçpa&&7üœ–ç¯ÐªÆØtqƒÂ#ȏ§"r‘CÿžC›"Òf‚u¦ÃØç2F»f+ÁƒÁàðI¢wà@aŒÛèy6|½ÿmԑƒïeOÇÒ³WAn©‰­~E£\Ԉç+xŽW«´K#Wf–€¬6¸¬YpåÞ£ú;sÈU‚×ñ®£‘£eVH×ò#ðYçm¿ß~Ô,á|›~Ÿ+ÄÉ4t=ÊGŽŠQBÌbÕEt¼4O?õs/j€×7f&‡él’¡jóêçò¾Q–tÖ´Ëý ó¼ÇK³ÓÔ;ïmn¾Í–³#} ˆÂÞ`d¾-_ ÂMè3›'„-ÆZaSCrªÂ# H€Ó0Zyðk¿›m|ӋQñ¶ƒYsÿ-H1É$8ÎÕý\Æ!Ç֛Ïï®»7³%~©]_Ðòr‰_axX~»ùü醾ÿ–K¿ùØîQÇÑÏúgWӏ¼ÿÝgëby=Y^ÎñÄÅ®ÙRP¸]üyò/Êdendstream +endobj +1821 0 obj<>/XObject<<>>>>>>endobj +1822 0 obj<>stream +xVÛnÜ6}÷W ö¥.k¯ñ ÈÃÆ^' Ø»®¥4 Š>p%ÊbM‰*)y³ß3¤”Úª †[Îå̙3üëhJüLélFóSJË£I4¡ÅÅEtN‹ó3ü=ûƒéÙ$š½u0?N‡ß?&G㛠šM(Éãô윒Œà‚/éñU!êFZšG”’œ(w‚ÒB¦OZ¹æçäO}z®ŸÌdÇ°ŸF´®k²6m”©‚邦ÓÎtv†l`šÊQ®´¤ÔTP•#AìœLNt£ƒi)ÕÒæƖÔzZe¢‘|f)öi9iŸ¥E؆„v—µ—÷…h¨AþZ=I}à\&t2‡dSÑ:é£Á¢¶f§eIHJå¤ʅ‚QÈT½Ì]#k‡XÞ¦ÎIiÍQpòÆß»€/v+vú@{cŸTõ8H!W•Œºo³ÓhÁÀ|CÕ®0­Î(3´¼½õxÏïHUþ?c3tVû*¢¯’ +ñŒàVɌAJ…•y«5-Œá´ +Td4³]’¦ú G*j±SZ5 +…V•³Ó.¬V«ÞÃ0o@ s²Ê^@ÖQ§š(ß7˜Q%É_pxà¯#€•骟Ô™÷æ « Úa´6{®¼ ÈØ0Ò©ÌZŒƒ‡ß§Päë;t®µµU.=l¿Üۓ’w¡n§J¥…²–à”Ûz¨ÑtdŸ¢ËUã†.֞Ò~Æ^ÖóT™½/¸¥Ÿ´W<£½ >`/ÀF&Gݕ»óžc‚h¯07Á‘ïjo꺚eŽš²Eô­‘e ÿ±»ÈCN»á„IÅ-¬ñÿêc_²ãñ̈́.zIZ„Éûþè£N ²˜F¨SY ú€~–µ±Â¼l9ZÖ¢)`6†—á‘•‚‡ùò Iü¼ŠW¾ƒ1-ãøË݊@…x½ÝÐÐí2;¶7”|^Q¼¼û¸¤øË:YEoaµ½»[n®ã>NêâÏÛ¯º^_Óf›Ðê·uœÐzC«åXõÐGéoõJt¯¥€$Ô˜6 @ùY_Yi-xSJçÄ#HÃãfe*Õ³ôâȺùʧ¢Þ°&.xÝf•ÜI´hr[åг*fì¼SÄ\Y̺_D?<Ñúž<õ¬tF·>K8MEF î;ÙP[G$/éN€$‚°A1DzIÇÞ˳giØOµQ.ÜG ë¦+e…PËïØ]ÉYbA´ƒ2ˆ¥ÈKÚõ&FZ¼·H¤)Pôc8¬¢ xQ.Crà®0’ƒ*zž‡ìQN«‘>&p”aÉB'¿3 +ƒaJànÇê¹Gysð†°,‹ +BXÆjõÛûq¼ÿRÊ9œòòþa åÆÉ|ö>ÔtΏ¶¢i0{%¥>/XObject<<>>>>>>endobj +1824 0 obj<>stream +x½W[OÛH~çWùeA“h¥>¥+$–eK´R%^Æö˜L±gÒ›Äÿ~¿sƆ`ØíÛAÁžÛùngòsgJ|MédFGsÊëI:¡“)~Ÿžàç ß^S¹s¾Ø9üú‘¦Ç´(1e~Š_ +ÂðɄùîì4=Jg)-thh¶·øÑÇ4ÆѳŒÞýÖZj–šrW×Ê”¬Œ} ó«ßï.¿ý}ù-¡Ò»ZFÜ^Ðˀ³‹ë«Ë›ÅÖë֚ en“ÒUIk©pö·†tÃ;Oè`ŠÃðŽŠžTe +”VÎ͋[žáiqq{xuKÁ•ÍZ¡DȺgó^çMՑ±¡QU¥‹´_t6O¹èÝ×ðBª‘­×¦ªÈj]Pã3|CŠ’ÂZ¡šU“ÐÚØ­ÉÅâQz@ÁՏ×îëA%X¥Ö!¨MAu T²t—YºÖ 9OÁÔ¦R~«®/7w/EaÄ¡nòCž¨4ÕP秗ªƒnÚpm• Ád˜ÔŸ8¨:S¨§Yº¶!ÞIÛƍ¥±S´Ò^ÈË+ƒ·û”aè©ÚZ÷dv_ª'…ÿfE¯k±¨+y &" cäÎÌ£¼VP¯—LµyX1e*®Èˆ^< ”ømåkz2JÐ7«r­Šš•÷àUÞïñèmßM£ˆÅ°G½aâ°_6ÔY¤•®·Ûkûŗ ^€Jª‚] -WÚƒê L(ÖTXÂvãr2•?Ž™}å í=¤68#w¶:DQÄÈF9W­ 8°›àxžaÉ°uG"8 ‹TAP/¾¶b¸yJö£ÿÚvâ½$fK ͇‚P-áœRœ­ÜgÊ“V3 늷ØDz@JK?Žö^÷ùâéÍÌ6H‘ì‚•òu"nkt½r^yƒò`G)Û g©J@A²ÿh㾜;1öM…ol÷Šœ5[¤'«ÞëKþ×Ù+4ÕY1$E­:‰´L^|õç&þp7…€üÁº0 '2ƒSo ¸êÞ__g*[ʙ”¸o?jû1ê^Ær}8Yf\8!ïÐظë__Ý-.o¸K ƒô4b0ÿM*ùOá'•4‘Hc|EÞkÌÞx~ŽPøªQzI öDïˆã·:àâL³ÐZ["âmQAõ²—A+y¶R¦sž%ØÅVƒh†&/¾€NU­Eº$øg¨¡6.:¯ìQéZúT£7/¤Ë¶+Ž­Hé¬ +®'LÌÆÖ3ꈙûÝÁŒ÷{Ò¦B‡ÌؐIÅG»'#g±ˆÌ'¸ËµôŠ¼qÒ÷ֈnÐܵF°3:•C¨ã‚S9HˆOHo€c‚2›oŠl[g±ÉÅ{êziò¥TIì”È-‡J¡ÄH@øZˆtœµæ«S9»rT Šc ÊUˆ n ©Lj-0 ­iÀ.bÙwûO¼Þá× }®wDZ©Pÿ/^78(é3]_ûOÒS¾@½&لq›Í&Ýú>캙–á:€ÓCM¥BãDȼÏô=6“×÷Î9ïw{²ÊŠûH›˜èÊ杭X£?ÔªÀ58pjŽ …hYrPmãjôõÇî¨ñʆŠÝŒöX‡÷×Ïʹw4R…ZA1ø¿@šÎp¹Æ×láÖ(S÷’œ!E†ÜàÎÿIRà—º493ïú⑺ñ‰Žžµø/…#  G–fƒ¾œ³÷{’&‡_OûYÓ94uzDó“ñÃÏÝÙçgtëÝÄ}q9.àˆ>†€!>&œL`äâÏpÇóÓtþa†Ï{x=ÏyÚåb篝¨Y¢Üendstream +endobj +1825 0 obj<>/XObject<<>>>>>>endobj +1826 0 obj<>stream +x…V]OÛH}çWÜåº"&_„°oÒRËfÁZi%$4¶ÇñۓΌÉòï÷ܙIH]ZTAbߏsÏ9÷~;ÑÿFt>¦ÉŒòæ`˜ éìâ?§sþ9Æ#©ô_L§³düÖ“ñ(™¿õÅì,™ö?¿LN?Mi4¢´DòÙüœÒ‚x8¤4?^´ÚUÒP®›F·”‹ÎJÒ%áCüâ6š¤1ÚXR–*ñ¬ÚYÝHWño¢6R/dº¶å¿`­£Ñäâ„l—W$,݋&Ò¯CŒ&è(-ŽŽ•üƒl“wûzitCª•®ØF~ø@Úì%¬Õ“¤j¥œ¨,-…«6Ú<ل®*™?ыîLˆäº-©Tµì¥Îd©±3/\±Ód@ɾT+¨Hœr@£%ñ¬ê¡Z;Æ¥4uF8¥Ûßbäñ ¨£©E[Ћt$"¤km­ÊjAEZ*…ª;dG ôú>¥ ·¿©dËx± ÍS#ì‚tÊÍgF‹"q‹ÂHk{ýXé:A别Ú\#s—в–Ì=.®Χ@| :iJ‘KºYÒ"F¾Ë]²×ÏîCU_PÕ¯RÇľpŸÎÏœ±à–¯©~! #‹È-š®õ*i›Ì*᧟.h@™­ƒÉ(`;ž'“dšP*Ä4<öJêÁ˜I}|ׅÌeÆïqk­Ÿº5 .éòæÏûë»®ïèññ~ñårñøx˜Ð¿º#[é®.hìy @$BÍsbJõúYiž!œLäO¾nT»e +Ýù-¡Oõ݀†jA½º–ÅÏØ«BȃÉèÕÁZ•'̋íH{µö‘¨•uÒK„ïŠõV¦çýÊÿjA™`k£A^҆\€”kfuªfodë¼0`á§j-Œ€GHØ,1ݎ¤F€„nÊ^Õ°ï0þQ¦-~Á]œ„öt+ü&Ùܨ5C +:CàNCߨUåh//wÍÀùG_å†E†ý„a!⮝ðÔY4×cžò+ßWŸo®oS:úýèÇhÑ2Þ`ßòÊî3ÐÓ €1÷ 呪f{,݆Õ±^^af<Ázhïô艞õ.( ÿ §ZÁî8G‹AÆ}@¼1º]õIƒê¶ÍZúÔ0*]?KzV‚>ÞÞs¨–xµpÌï¶×I´‘i¼ê õwÆ5‹ãšýð[†ð‹q4þå R&¨SÀbBîí´c"Ø7²6òYé°Qe\ûõaˆ˜ñ{ž9òk…,EWㅭÿö&ý(¡µ]“ÁvàL·ÒeJÛÓôj D+mÝNn[›Î†i¬u‹áŠÚÁëVUXÊ«·dè×ñ®®ë^Z$áêÂëVB¢AÍ‹•éá@OÁ\°ƒ÷Øl¥¤C搀ÕXåê©ô­“ƒ/ÈÊCj°ÑÄJö·šW¬•0XQ‡ÖÞ w-ãVœBUª…á hÄ÷û± 'ïÈQ«A;QðàŽ‰w&|ŒT|Ñ9ÝÀst•W¢U¶×1d V¸ô"Ž3‘ÿ­¥¡ à­.w[Ù’^óÄ{3Á¡n´³í0µöÂR­ø²€v͞ÀN^)å73ˆÁçÅ`ú¡p6θÚ@]¶‘h+žæñDñ²MlT]S+y©c±D}cÙÆêñ!îO¢w Jð~yÇVöë rd‰ùxU‰ 8ð}EamâlìS» +v띵‰“ðÅ£éáøN–PêŽ÷_,}rzzøà‹:ý4ö?šá‚ŸOh6ã:Ç9⏠Zý}Ôy·[™<ÓÁö…Áùð‚ŸÿñƙÎæÉìlŒC_ãq~í:=øûàdZïendstream +endobj +1827 0 obj<>/XObject<<>>>>>>endobj +1828 0 obj<>stream +x}WïoÛ6ýž¿â `˜ Ôvì$Ž[tš®¬mÖd +ä -Q‰TIɎÿû½#)Yvš%àXäýx÷îÝéÇɌNñ;£Ë9-(­NN'§tv>Ÿ,è|y‰ÏsüYIùÉÕÝÉôã+šÓ]Ž+‹%>d„㧧t—ŽæËÉÙärBwÒ5tùâî;NŸÓlNç—8=úÚjj +I©©*¡³pê"ž‘«Vi©¤nh:½ºþãöÃ×>|Þ}º947šÐ7Ӓ+L[flOÓJRmMU72£ÜXT ç¶Æfþ,ß?¥ñìl2ç0âÍÖIMw”LîÿijZ±ƒÜK³^îҍñÏ[­iei«šbB×¹?¹¸Â'~BBgœwÖ}Ü"ó ÐøozhQÉ7dêF€³ã³Yc?_—q¾.¯Ád˜¯_‚Æܼ÷~½ÈED…=\P'Ú(¹¥{üô³öÐlœ³[U–P3î C$$šcÚz.¢ï%™Áˆð8aƒ· +3f{€0—v%@gÖcXP±ªôô€YÏ>Ht˜W?‘?ƖíÀ÷Ph½šæ(S†f…ˆ© +f-ñöŒÓ+…hýp‚'S¶¤°³d+½Μ¥òÔdÓº60ƒe5£Õ oðšÕŽ4ô W LY Y k +¬*Ïh¨jX3ÂX„3.§c4(q>1-Œhí/C„Ÿèy®1:5ḱzÁds½F·Ó‰n ¹¾!|*(@N=-º5$A1]¬Iâ7 äÌE¶˜½`HZOU§X¬áÍ{_¿ÞÿO4:høÄ\yZ›ôûç[FøÀÖ_»èÐùAÆíf|*`©¬ +ã°›'Ú3áG™=P½¸FBþ|“ᬤLlÇëŠÈ㺮Á¬NHwǓ¶›©G¼à &nÌã?aŠWO±ù° h(·mTÚ¢^R%ÐM-¶YŸhò?̶›={õº9èC-fÖÒÝ¿ˆ®»áõ®tæ%3š»†éî—%¯•¹Hyg‚jzd;ÜV £¯–•?Zê“ã¹Î£b°ë†•ˆ$ ¯,Ò ֐>Lw#…‰]ùÆöSr[¨´ð*7xüÏÿßÈ´J¤…_¤¿¡;c¬Ž2¾¸a!ÆÂÑÍÔÿ¶$lÙ +M!Á$ÄB Eb´±*Jµá|;(Ä’Ã’5Ýa_èØ~‚qÕ£•£Q‡qz ævC/ù`UÅx ÛÀc^¨ _-Ûjí±Ç­s±¯½Ä»(Çɂ‚ÿ°P4v;˜}O?.ã{ßl÷Ìå-.—¼ÂݾûtõŽn¬ù^Ðï&m+ÜÈX<>¾<}åW¾'/žç‹ådq1álá‡å‡»“¿Nþþµ¾endstream +endobj +1829 0 obj<>/XObject<<>>>>/Annots 1146 0 R>>endobj +1830 0 obj<>stream +xWÛnÛF}÷WLõˆiQ’)9€Ñ:møÁ®k+ ŠºVäRbBî²\Ҋþ¾gf©í^D¡Hî™Û™3£¿ŽBàoH“!"Š‹£A0 hCO'¸â_¥)•ãéi0}íÁh<}ýÄ0Ñ+'`5´×GgCǧø,(œLaÅËéñ(ŒB8ŽØ•‚†QLÚoüôÃìèäjLaH³¡DÓ ÍAÐ,î/­«] òÜ®(ÍrDb+ZÛ¦¢8Ï´©é©®™]¿#]ÇÁÓÛ·³¯À<ƒ óx¸LúÃi0 +ΚiWәmgúxȦû¡z©)¶E¡Lâß:mììPã4}OOøóáæúñòá·Ë‡§§Ùíý!d? ßmCni›<¡¹¦²²EYëD‚PT*çV¶J؜á ÚWe@Çáé„C XTÔkýa¿Ê\3ŠkâX;—6y¾îQKµÐݤdl½­èþgr6­W +DÈe&¶U¥ã:_ãÚÕH.ÀlÕ1+IvÅ<ˆ­IÎT¨oæ'oõ¤J$Uê’F!¡D8™-(όf³´EcOZ'‚Öì0ò5º©ß8 9K¥u.›£äõRI8ätõ̰ʼ© ™ûF¶Á?FI*2ªÀۖíÄ')Uõ¶8ŠØS@q'‡«ô¢¶J¤â4õöœ>¡Æw·—=Fç³ÔEù'@ã:³†lº m…À5õv'ZkŒÄþuÌI\iM’™Å}K æD½.u"Uåoi†ìJiöYÅ¥Y8‰´Pk°¥d7æPª²Ä+³¶dÇ_枊l±Ý8ÿ ,#Å +l—H­Û¶³ìqÚ$Ž´‰«µÐzã7 +/ÙÝ¥z–ˆO®vÔ¾¿¥¿£óŽwÆò,ô™<þ„D”¢¿áRçM»© e5ÍU ~ —-’ö]BýgQ€ÌyU‡€èÃÿ' Å<·ö[SÒñ-Í.g׿|êê¨ÊäØ>Þ0Qx qº™Ö‹ÊˆsÎÎìITàQsµéNôgp®úÜ¡h¹"hKˆäƒ-ÜÜH^A.˜¸|§P®FûÌ+ àHlÇ®”ëÙ Ú¤RëÄr[Ïë§ÎÛî@Ÿ±L ŽR ›?+THm¦©¥eÛþÄ]ôË×ú<×ÜŽ…ßcVkR •酬›Wgy.ø`_ÊáldÃW†Z ‘ Ù·€o¦)2 +ã;‘ +èv_å^¥rYéTCKeJìÕ©Mè9­µ;äSŸù¨h§8¨ m3…З£®B–«º)ÿ‹¶á†¶á¡™-m¯0rüàÄ0Ãx@ZGøà‹-å÷²*„Á(ÝgW;º !ZUœfK{2ÏP$H8™ÛXåÒlùâg4µF&¹RÇYšA«öþôö€³%êo)± _AzږÔ^ÏtìúpD‚üèÜxꖘ;¬Mí\Í̳ʳd+G=BE±S WýPNDòý5.žðlÝ1[5Æ0¯Ðw3±îÉ Š4Ž쒾í^a÷…aRteÒ[ªy–g5˜>=.VöŽé\?뜧QSñ»…Mx àjáˆè·Î~WKÛì«ñöÔy+)Œ½/½wý­‚ot¾=ñB¿[Aúr7ûr«bL¨vlv-ÑsáÍFŅ¢ï°„ Rõ—Ùptq5»|ý9AB™;MYÚª«¼#¾ðԗ~åJ0¹¿y§ñ|„X±òz<oWÆq@".P ©#Ôtt?fJZË26¶· P;>á ˆýD¯œh»DŠBÊ[šK£UN ¬pýàž3Yêµ¹ÝRÐçÜ?išÅ^õ]Úâ³{â#Ö°#ñn¼D›±¢pcÿ$Ÿ­äÁZñUX[ÍùÒC3ߖ,½ð¥™»¸Êxðyû7³KÍ- +ŽßC­ô͵~M˺.ߟœl½ðWm›ð‚·}ÍöÛdbciF~•*1âüƒ/~sÈjFøá3Q4ú>^Ü~¸ ûÊ~å¥ð£›¿o@|òxsàx28{ýgÂ8šÑéÄ@uÃH~:\Ύ~=úQ£;endstream +endobj +1831 0 obj<>endobj +1832 0 obj<>endobj +1833 0 obj<>endobj +1834 0 obj<>endobj +1835 0 obj<>endobj +1836 0 obj<>endobj +1837 0 obj<>endobj +1838 0 obj<>endobj +1839 0 obj<>endobj +1840 0 obj<>endobj +1841 0 obj<>endobj +1842 0 obj<>endobj +1843 0 obj<>endobj +1844 0 obj<>endobj +1845 0 obj<>endobj +1846 0 obj<>endobj +1847 0 obj<>endobj +1848 0 obj<>endobj +1849 0 obj<>endobj +1850 0 obj<>endobj +1851 0 obj<>endobj +1852 0 obj<>endobj +1853 0 obj<>endobj +1854 0 obj<>endobj +1855 0 obj<>endobj +1856 0 obj<>endobj +1857 0 obj<>endobj +1858 0 obj<>endobj +1859 0 obj<>endobj +1860 0 obj<>endobj +1861 0 obj<>endobj +1862 0 obj<>endobj +1863 0 obj<>endobj +1864 0 obj<>endobj +1865 0 obj<>endobj +1866 0 obj<>endobj +1867 0 obj<>endobj +1868 0 obj<>endobj +1869 0 obj<>endobj +1870 0 obj<>endobj +1871 0 obj<>endobj +1872 0 obj<>endobj +1873 0 obj<>endobj +1874 0 obj<>endobj +1875 0 obj<>endobj +1876 0 obj<>endobj +1877 0 obj<>endobj +1878 0 obj<>endobj +1879 0 obj<>endobj +1880 0 obj<>endobj +1881 0 obj<>endobj +1882 0 obj<>endobj +1883 0 obj<>endobj +1884 0 obj<>endobj +1885 0 obj<>endobj +1886 0 obj<>endobj +1887 0 obj<>endobj +1888 0 obj<>endobj +1889 0 obj<>endobj +1890 0 obj<>endobj +1891 0 obj<>endobj +1892 0 obj<>endobj +1893 0 obj<>endobj +1894 0 obj<>endobj +1895 0 obj<>endobj +1896 0 obj<>endobj +1897 0 obj<>endobj +1898 0 obj<>endobj +1899 0 obj<>endobj +1900 0 obj<>endobj +1901 0 obj<>endobj +1902 0 obj<>endobj +1903 0 obj<>endobj +1904 0 obj<>endobj +1905 0 obj<>endobj +1906 0 obj<>endobj +1907 0 obj<>endobj +1908 0 obj<>endobj +1909 0 obj<>endobj +1910 0 obj<>endobj +1911 0 obj<>endobj +1912 0 obj<>endobj +1913 0 obj<>endobj +1914 0 obj<>endobj +1915 0 obj<>endobj +1916 0 obj<>endobj +1917 0 obj<>endobj +1918 0 obj<>endobj +1919 0 obj<>endobj +1920 0 obj<>endobj +1921 0 obj<>endobj +1922 0 obj<>endobj +1923 0 obj<>endobj +1924 0 obj<>endobj +1925 0 obj<>endobj +1926 0 obj<>endobj +1927 0 obj<>endobj +1928 0 obj<>endobj +1929 0 obj<>endobj +1930 0 obj<>endobj +1931 0 obj<>endobj +1932 0 obj<>endobj +1933 0 obj<>endobj +1934 0 obj<>endobj +1935 0 obj<>endobj +1936 0 obj<>endobj +1937 0 obj<>endobj +1938 0 obj<>endobj +1939 0 obj<>endobj +1940 0 obj<>endobj +1941 0 obj<>endobj +1942 0 obj<>endobj +1943 0 obj<>endobj +1944 0 obj<>endobj +1945 0 obj<>endobj +1946 0 obj<>endobj +1947 0 obj<>endobj +1948 0 obj<>endobj +1949 0 obj<>endobj +1950 0 obj<>endobj +1951 0 obj<>endobj +1952 0 obj<>endobj +1953 0 obj<>endobj +1954 0 obj<>endobj +1955 0 obj<>endobj +1956 0 obj<>endobj +1957 0 obj<>endobj +1958 0 obj<>endobj +1959 0 obj<>endobj +1960 0 obj<>endobj +1961 0 obj<>endobj +1962 0 obj<>endobj +1963 0 obj<>endobj +1964 0 obj<>endobj +1965 0 obj<>endobj +1966 0 obj<>endobj +1967 0 obj<>endobj +1968 0 obj<>endobj +1969 0 obj<>endobj +1970 0 obj<>endobj +1971 0 obj<>endobj +1972 0 obj<>endobj +1973 0 obj<>endobj +1974 0 obj<>endobj +1975 0 obj<>endobj +1976 0 obj<>endobj +1977 0 obj<>endobj +1978 0 obj<>endobj +1979 0 obj<>endobj +1980 0 obj<>endobj +1981 0 obj<>endobj +1982 0 obj<>endobj +1983 0 obj<>endobj +1984 0 obj<>endobj +1985 0 obj<>endobj +1986 0 obj<>endobj +1987 0 obj<>endobj +1988 0 obj<>endobj +1989 0 obj<>endobj +1990 0 obj<>endobj +1991 0 obj<>endobj +1992 0 obj<>endobj +1993 0 obj<>endobj +1994 0 obj<>endobj +1995 0 obj<>endobj +1996 0 obj<>endobj +1997 0 obj<>endobj +1998 0 obj<>endobj +1999 0 obj<>endobj +2000 0 obj<>endobj +2001 0 obj<>endobj +2002 0 obj<>endobj +2003 0 obj<>endobj +2004 0 obj<>endobj +2005 0 obj<>endobj +2006 0 obj<>endobj +2007 0 obj<>endobj +2008 0 obj<>endobj +2009 0 obj<>endobj +2010 0 obj<>endobj +2011 0 obj<>endobj +2012 0 obj<>endobj +2013 0 obj<>endobj +2014 0 obj<>endobj +2015 0 obj<>endobj +2016 0 obj<>endobj +2017 0 obj<>endobj +2018 0 obj<>endobj +2019 0 obj<>endobj +2020 0 obj<>endobj +2021 0 obj<>endobj +2022 0 obj<>endobj +2023 0 obj<>endobj +2024 0 obj<>endobj +2025 0 obj<>endobj +2026 0 obj<>endobj +2027 0 obj<>endobj +2028 0 obj<>endobj +2029 0 obj<>endobj +2030 0 obj<>endobj +2031 0 obj<>endobj +2032 0 obj<>endobj +2033 0 obj<>endobj +2034 0 obj<>endobj +2035 0 obj<>endobj +2036 0 obj<>endobj +2037 0 obj<>endobj +2038 0 obj<>endobj +2039 0 obj<>endobj +2040 0 obj<>endobj +2041 0 obj<>endobj +2042 0 obj<>endobj +2043 0 obj<>endobj +2044 0 obj<>endobj +2045 0 obj<>endobj +2046 0 obj<>endobj +2047 0 obj<>endobj +2048 0 obj<>endobj +2049 0 obj<>endobj +2050 0 obj<>endobj +2051 0 obj<>endobj +2052 0 obj<>endobj +2053 0 obj<>endobj +2054 0 obj<>endobj +2055 0 obj<>endobj +2056 0 obj<>endobj +2057 0 obj<>endobj +2058 0 obj<>endobj +2059 0 obj<>endobj +2060 0 obj<>endobj +2061 0 obj<>endobj +2062 0 obj<>endobj +2063 0 obj<>endobj +2064 0 obj<>endobj +2065 0 obj<>endobj +2066 0 obj<>endobj +2067 0 obj<>endobj +2068 0 obj<>endobj +2069 0 obj<>endobj +2070 0 obj<>endobj +2071 0 obj<>endobj +2072 0 obj<>endobj +2073 0 obj<>endobj +2074 0 obj<>endobj +2075 0 obj<>endobj +2076 0 obj<>endobj +2077 0 obj<>endobj +2078 0 obj<>endobj +2079 0 obj<>endobj +2080 0 obj<>endobj +2081 0 obj<>endobj +2082 0 obj<>endobj +2083 0 obj<>endobj +2084 0 obj<>endobj +2085 0 obj<>endobj +2086 0 obj<>endobj +2087 0 obj<>endobj +2088 0 obj<>endobj +2089 0 obj<>endobj +2090 0 obj<>endobj +2091 0 obj<>endobj +2092 0 obj<>endobj +2093 0 obj<>endobj +2094 0 obj<>endobj +2095 0 obj<>endobj +2096 0 obj<>endobj +2097 0 obj<>endobj +2098 0 obj<>endobj +2099 0 obj<>endobj +2100 0 obj<>endobj +2101 0 obj<>endobj +2102 0 obj<>endobj +2103 0 obj<>endobj +2104 0 obj<>endobj +2105 0 obj<>endobj +2106 0 obj<>endobj +2107 0 obj<>endobj +2108 0 obj<>endobj +2109 0 obj<>endobj +2110 0 obj<>endobj +2111 0 obj<>endobj +2112 0 obj<>endobj +2113 0 obj<>endobj +2114 0 obj<>endobj +2115 0 obj<>endobj +2116 0 obj<>endobj +2117 0 obj<>endobj +2118 0 obj<>endobj +2119 0 obj<>endobj +2120 0 obj<>endobj +2121 0 obj<>endobj +2122 0 obj<>endobj +2123 0 obj<>endobj +2124 0 obj<>endobj +2125 0 obj<>1<>8<>9<>13<>14<>16<>20<>24<>36<>37<>39<>41<>43<>60<>63<>66<>69<>70<>73<>83<>88<>91<>93<>104<>121<>134<>143<>146<>147<>151<>154<>156<>157<>159<>162<>166<>170<>172<>]>>>>endobj xref -0 2127 +0 2126 0000000000 65535 f 0000000015 00000 n 0000000247 00000 n @@ -4626,7 +4602,7 @@ xref 0000006079 00000 n 0000006182 00000 n 0000006285 00000 n -0000006388 00000 n +0000006387 00000 n 0000006490 00000 n 0000006593 00000 n 0000006696 00000 n @@ -4653,20 +4629,20 @@ xref 0000009060 00000 n 0000009163 00000 n 0000009266 00000 n -0000009368 00000 n -0000009470 00000 n -0000009572 00000 n -0000009675 00000 n +0000009369 00000 n +0000009472 00000 n +0000009574 00000 n +0000009676 00000 n 0000009778 00000 n 0000009881 00000 n 0000009984 00000 n -0000010086 00000 n -0000010189 00000 n +0000010087 00000 n +0000010190 00000 n 0000010292 00000 n -0000010395 00000 n -0000010498 00000 n -0000010601 00000 n -0000010704 00000 n +0000010394 00000 n +0000010497 00000 n +0000010600 00000 n +0000010703 00000 n 0000010806 00000 n 0000010909 00000 n 0000011012 00000 n @@ -4678,7 +4654,7 @@ xref 0000011630 00000 n 0000011733 00000 n 0000011836 00000 n -0000011939 00000 n +0000011938 00000 n 0000012041 00000 n 0000012144 00000 n 0000012247 00000 n @@ -4691,2029 +4667,2028 @@ xref 0000013175 00000 n 0000013278 00000 n 0000013382 00000 n -0000013485 00000 n -0000013589 00000 n -0000013693 00000 n -0000013797 00000 n -0000013901 00000 n -0000014005 00000 n -0000014109 00000 n -0000014213 00000 n -0000014316 00000 n -0000014420 00000 n -0000014524 00000 n -0000014627 00000 n -0000014730 00000 n -0000014833 00000 n -0000014937 00000 n -0000015040 00000 n -0000015144 00000 n -0000015248 00000 n -0000015352 00000 n -0000015456 00000 n -0000015560 00000 n -0000015664 00000 n -0000015768 00000 n -0000015872 00000 n -0000015976 00000 n -0000016079 00000 n -0000016182 00000 n -0000016286 00000 n -0000016390 00000 n -0000016494 00000 n -0000016597 00000 n -0000016701 00000 n -0000016805 00000 n -0000016909 00000 n -0000017012 00000 n -0000017114 00000 n -0000017216 00000 n -0000017545 00000 n -0000017648 00000 n -0000017752 00000 n -0000017856 00000 n -0000017960 00000 n -0000018064 00000 n -0000018168 00000 n -0000018272 00000 n -0000018376 00000 n -0000018480 00000 n -0000018584 00000 n -0000018688 00000 n -0000018792 00000 n -0000018896 00000 n -0000019000 00000 n -0000019104 00000 n -0000019208 00000 n -0000019312 00000 n -0000019415 00000 n -0000019519 00000 n -0000019623 00000 n -0000019727 00000 n -0000019831 00000 n -0000019935 00000 n -0000020039 00000 n -0000020143 00000 n -0000020247 00000 n -0000020350 00000 n -0000020454 00000 n -0000020558 00000 n -0000020662 00000 n -0000020766 00000 n -0000020870 00000 n -0000020974 00000 n -0000021078 00000 n -0000021182 00000 n -0000021286 00000 n -0000021390 00000 n -0000021494 00000 n -0000021598 00000 n -0000021702 00000 n -0000021806 00000 n -0000021910 00000 n -0000022014 00000 n -0000022117 00000 n -0000022486 00000 n -0000022589 00000 n -0000022693 00000 n -0000022797 00000 n -0000022901 00000 n -0000023005 00000 n -0000023108 00000 n -0000023212 00000 n -0000023316 00000 n -0000023420 00000 n -0000023524 00000 n -0000023628 00000 n -0000023732 00000 n -0000023836 00000 n -0000023940 00000 n -0000024044 00000 n -0000024148 00000 n -0000024251 00000 n -0000024355 00000 n -0000024459 00000 n -0000024563 00000 n -0000024667 00000 n -0000024771 00000 n -0000024875 00000 n -0000024979 00000 n -0000025083 00000 n -0000025187 00000 n -0000025291 00000 n -0000025395 00000 n -0000025498 00000 n -0000025602 00000 n -0000025706 00000 n -0000025810 00000 n -0000025914 00000 n -0000026018 00000 n -0000026122 00000 n -0000026226 00000 n -0000026330 00000 n -0000026434 00000 n -0000026538 00000 n -0000026642 00000 n -0000026746 00000 n -0000026848 00000 n -0000026950 00000 n -0000027052 00000 n -0000027421 00000 n -0000027524 00000 n -0000027628 00000 n -0000027732 00000 n -0000027836 00000 n -0000027940 00000 n -0000028044 00000 n -0000028148 00000 n -0000028252 00000 n -0000028356 00000 n -0000028459 00000 n -0000028563 00000 n -0000028667 00000 n -0000028771 00000 n -0000028875 00000 n -0000028979 00000 n -0000029083 00000 n -0000029186 00000 n -0000029290 00000 n -0000029394 00000 n -0000029497 00000 n -0000029600 00000 n -0000029704 00000 n -0000029808 00000 n -0000029912 00000 n -0000030016 00000 n -0000030120 00000 n -0000030224 00000 n -0000030328 00000 n -0000030432 00000 n -0000030536 00000 n -0000030640 00000 n -0000030743 00000 n -0000030847 00000 n -0000030951 00000 n -0000031055 00000 n -0000031159 00000 n -0000031263 00000 n -0000031367 00000 n -0000031470 00000 n -0000031573 00000 n -0000031675 00000 n -0000031777 00000 n -0000032130 00000 n -0000032233 00000 n -0000032337 00000 n -0000032441 00000 n -0000032545 00000 n -0000032649 00000 n -0000032753 00000 n -0000032857 00000 n -0000032961 00000 n -0000033065 00000 n -0000033169 00000 n -0000033273 00000 n -0000033377 00000 n -0000033480 00000 n -0000033584 00000 n -0000033688 00000 n -0000033792 00000 n -0000033896 00000 n -0000034000 00000 n -0000034104 00000 n -0000034208 00000 n -0000034312 00000 n -0000034416 00000 n -0000034519 00000 n -0000034623 00000 n -0000034727 00000 n -0000034831 00000 n -0000034935 00000 n -0000035039 00000 n -0000035143 00000 n -0000035246 00000 n -0000035350 00000 n -0000035454 00000 n -0000035558 00000 n -0000035662 00000 n -0000035766 00000 n -0000035870 00000 n -0000035974 00000 n -0000036078 00000 n -0000036182 00000 n -0000036286 00000 n -0000036390 00000 n -0000036494 00000 n -0000036597 00000 n -0000036699 00000 n -0000036801 00000 n -0000037178 00000 n -0000037231 00000 n -0000037318 00000 n -0000037372 00000 n -0000037458 00000 n -0000037513 00000 n -0000037600 00000 n -0000037667 00000 n -0000037753 00000 n -0000037856 00000 n -0000037960 00000 n -0000038064 00000 n -0000038168 00000 n -0000038272 00000 n -0000038376 00000 n -0000038480 00000 n -0000038584 00000 n -0000038688 00000 n -0000038792 00000 n -0000038896 00000 n -0000039000 00000 n -0000039104 00000 n -0000039208 00000 n -0000039312 00000 n -0000039416 00000 n -0000039520 00000 n -0000039624 00000 n -0000039728 00000 n -0000039832 00000 n -0000039936 00000 n -0000040040 00000 n -0000040144 00000 n -0000040248 00000 n -0000040352 00000 n -0000040456 00000 n -0000040558 00000 n -0000040662 00000 n -0000040766 00000 n -0000040870 00000 n -0000040974 00000 n -0000041077 00000 n -0000041179 00000 n -0000041281 00000 n -0000041602 00000 n -0000041706 00000 n -0000041810 00000 n -0000041914 00000 n -0000042018 00000 n -0000042122 00000 n -0000042226 00000 n -0000042330 00000 n -0000042434 00000 n -0000042538 00000 n -0000042642 00000 n -0000042746 00000 n -0000042850 00000 n -0000042954 00000 n -0000043058 00000 n -0000043162 00000 n -0000043266 00000 n -0000043370 00000 n -0000043474 00000 n -0000043578 00000 n -0000043682 00000 n -0000043786 00000 n -0000043890 00000 n -0000043994 00000 n -0000044098 00000 n -0000044202 00000 n -0000044304 00000 n -0000044408 00000 n -0000044512 00000 n -0000044616 00000 n -0000044720 00000 n -0000044824 00000 n -0000044928 00000 n -0000045032 00000 n -0000045136 00000 n -0000045240 00000 n -0000045344 00000 n -0000045448 00000 n -0000045552 00000 n -0000045656 00000 n -0000045760 00000 n -0000045864 00000 n -0000045968 00000 n -0000046072 00000 n -0000046176 00000 n -0000046280 00000 n -0000046384 00000 n -0000046488 00000 n -0000046592 00000 n -0000046696 00000 n -0000046800 00000 n -0000046903 00000 n -0000047005 00000 n -0000047107 00000 n -0000047548 00000 n -0000047652 00000 n -0000047756 00000 n -0000047860 00000 n -0000047964 00000 n -0000048068 00000 n -0000048172 00000 n -0000048276 00000 n -0000048380 00000 n -0000048484 00000 n -0000048588 00000 n -0000048692 00000 n -0000048796 00000 n -0000048900 00000 n -0000049004 00000 n -0000049108 00000 n -0000049212 00000 n -0000049316 00000 n -0000049420 00000 n -0000049524 00000 n -0000049628 00000 n -0000049732 00000 n -0000049836 00000 n -0000049940 00000 n -0000050044 00000 n -0000050148 00000 n -0000050252 00000 n -0000050356 00000 n -0000050460 00000 n -0000050564 00000 n -0000050668 00000 n -0000050772 00000 n -0000050876 00000 n -0000050980 00000 n -0000051084 00000 n -0000051188 00000 n -0000051292 00000 n -0000051396 00000 n -0000051500 00000 n -0000051604 00000 n -0000051708 00000 n -0000051812 00000 n -0000051916 00000 n -0000052020 00000 n -0000052124 00000 n -0000052227 00000 n -0000052331 00000 n -0000052435 00000 n -0000052539 00000 n -0000052642 00000 n -0000052744 00000 n -0000052846 00000 n -0000053271 00000 n -0000053375 00000 n -0000053479 00000 n -0000053583 00000 n -0000053687 00000 n -0000053791 00000 n -0000053895 00000 n -0000053999 00000 n -0000054103 00000 n -0000054207 00000 n -0000054311 00000 n -0000054415 00000 n -0000054519 00000 n -0000054623 00000 n -0000054727 00000 n -0000054831 00000 n -0000054935 00000 n -0000055039 00000 n -0000055143 00000 n -0000055247 00000 n -0000055351 00000 n -0000055455 00000 n -0000055559 00000 n -0000055663 00000 n -0000055767 00000 n -0000055871 00000 n -0000055975 00000 n -0000056079 00000 n -0000056183 00000 n -0000056287 00000 n -0000056391 00000 n -0000056495 00000 n -0000056599 00000 n -0000056703 00000 n -0000056807 00000 n -0000057096 00000 n -0000057199 00000 n -0000057303 00000 n -0000057407 00000 n -0000057511 00000 n -0000057615 00000 n -0000057719 00000 n -0000057823 00000 n -0000057927 00000 n -0000058031 00000 n -0000058135 00000 n -0000058239 00000 n -0000058342 00000 n -0000058446 00000 n -0000058550 00000 n -0000058654 00000 n -0000058758 00000 n -0000058862 00000 n -0000058966 00000 n -0000059070 00000 n -0000059173 00000 n -0000059277 00000 n -0000059381 00000 n -0000059485 00000 n -0000059589 00000 n -0000059693 00000 n -0000059797 00000 n -0000059901 00000 n -0000060005 00000 n -0000060109 00000 n -0000060213 00000 n -0000060317 00000 n -0000060421 00000 n -0000060525 00000 n -0000060629 00000 n -0000060733 00000 n -0000060837 00000 n -0000060941 00000 n -0000061045 00000 n -0000061149 00000 n -0000061253 00000 n -0000061357 00000 n -0000061460 00000 n -0000061562 00000 n -0000061923 00000 n -0000061972 00000 n -0000062059 00000 n -0000062084 00000 n -0000062140 00000 n -0000062227 00000 n -0000062296 00000 n -0000062383 00000 n -0000062434 00000 n -0000062521 00000 n -0000062606 00000 n -0000062693 00000 n -0000062749 00000 n -0000062836 00000 n -0000062886 00000 n -0000062973 00000 n -0000063025 00000 n -0000063111 00000 n -0000063184 00000 n -0000063240 00000 n -0000063327 00000 n -0000063375 00000 n -0000063461 00000 n -0000063509 00000 n -0000063596 00000 n -0000063637 00000 n -0000063678 00000 n -0000063765 00000 n -0000063809 00000 n -0000063896 00000 n -0000063941 00000 n -0000064028 00000 n -0000064072 00000 n -0000064159 00000 n -0000064203 00000 n -0000064290 00000 n -0000064332 00000 n -0000064419 00000 n -0000064467 00000 n -0000064554 00000 n -0000064627 00000 n -0000064675 00000 n -0000064760 00000 n -0000064785 00000 n -0000064838 00000 n -0000064922 00000 n -0000064947 00000 n -0000065050 00000 n -0000065154 00000 n -0000065258 00000 n -0000065362 00000 n -0000065466 00000 n -0000065569 00000 n -0000065673 00000 n -0000065777 00000 n -0000065881 00000 n -0000065985 00000 n -0000066089 00000 n -0000066193 00000 n -0000066296 00000 n -0000066400 00000 n -0000066504 00000 n -0000066608 00000 n -0000066712 00000 n -0000066816 00000 n -0000066920 00000 n -0000067024 00000 n -0000067128 00000 n -0000067232 00000 n -0000067336 00000 n -0000067440 00000 n -0000067543 00000 n -0000067647 00000 n -0000067751 00000 n -0000067855 00000 n -0000067959 00000 n -0000068063 00000 n -0000068167 00000 n -0000068271 00000 n -0000068375 00000 n -0000068479 00000 n -0000068582 00000 n -0000068686 00000 n -0000068790 00000 n -0000068894 00000 n -0000068998 00000 n -0000069102 00000 n -0000069206 00000 n -0000069310 00000 n -0000069414 00000 n -0000069517 00000 n -0000069618 00000 n -0000069720 00000 n -0000070105 00000 n -0000070209 00000 n -0000070234 00000 n -0000070281 00000 n -0000070367 00000 n -0000070414 00000 n -0000070500 00000 n -0000070533 00000 n +0000013486 00000 n +0000013590 00000 n +0000013694 00000 n +0000013798 00000 n +0000013902 00000 n +0000014006 00000 n +0000014110 00000 n +0000014214 00000 n +0000014317 00000 n +0000014421 00000 n +0000014525 00000 n +0000014629 00000 n +0000014732 00000 n +0000014835 00000 n +0000014938 00000 n +0000015042 00000 n +0000015146 00000 n +0000015250 00000 n +0000015354 00000 n +0000015458 00000 n +0000015562 00000 n +0000015666 00000 n +0000015770 00000 n +0000015874 00000 n +0000015978 00000 n +0000016082 00000 n +0000016186 00000 n +0000016290 00000 n +0000016394 00000 n +0000016498 00000 n +0000016602 00000 n +0000016706 00000 n +0000016810 00000 n +0000016913 00000 n +0000017017 00000 n +0000017121 00000 n +0000017225 00000 n +0000017329 00000 n +0000017432 00000 n +0000017534 00000 n +0000017636 00000 n +0000017997 00000 n +0000018100 00000 n +0000018204 00000 n +0000018308 00000 n +0000018411 00000 n +0000018515 00000 n +0000018619 00000 n +0000018723 00000 n +0000018826 00000 n +0000018930 00000 n +0000019034 00000 n +0000019137 00000 n +0000019241 00000 n +0000019345 00000 n +0000019449 00000 n +0000019553 00000 n +0000019657 00000 n +0000019761 00000 n +0000019865 00000 n +0000019969 00000 n +0000020073 00000 n +0000020177 00000 n +0000020281 00000 n +0000020385 00000 n +0000020489 00000 n +0000020593 00000 n +0000020697 00000 n +0000020801 00000 n +0000020905 00000 n +0000021009 00000 n +0000021113 00000 n +0000021217 00000 n +0000021321 00000 n +0000021425 00000 n +0000021528 00000 n +0000021632 00000 n +0000021736 00000 n +0000021840 00000 n +0000021944 00000 n +0000022048 00000 n +0000022152 00000 n +0000022256 00000 n +0000022359 00000 n +0000022712 00000 n +0000022815 00000 n +0000022919 00000 n +0000023023 00000 n +0000023127 00000 n +0000023231 00000 n +0000023335 00000 n +0000023439 00000 n +0000023543 00000 n +0000023647 00000 n +0000023751 00000 n +0000023855 00000 n +0000023959 00000 n +0000024063 00000 n +0000024167 00000 n +0000024271 00000 n +0000024375 00000 n +0000024479 00000 n +0000024583 00000 n +0000024686 00000 n +0000024790 00000 n +0000024894 00000 n +0000024998 00000 n +0000025102 00000 n +0000025206 00000 n +0000025310 00000 n +0000025414 00000 n +0000025518 00000 n +0000025622 00000 n +0000025726 00000 n +0000025830 00000 n +0000025934 00000 n +0000026037 00000 n +0000026141 00000 n +0000026245 00000 n +0000026349 00000 n +0000026453 00000 n +0000026557 00000 n +0000026661 00000 n +0000026765 00000 n +0000026869 00000 n +0000026972 00000 n +0000027074 00000 n +0000027176 00000 n +0000027278 00000 n +0000027647 00000 n +0000027750 00000 n +0000027854 00000 n +0000027958 00000 n +0000028062 00000 n +0000028166 00000 n +0000028270 00000 n +0000028374 00000 n +0000028478 00000 n +0000028582 00000 n +0000028685 00000 n +0000028789 00000 n +0000028893 00000 n +0000028997 00000 n +0000029101 00000 n +0000029205 00000 n +0000029309 00000 n +0000029413 00000 n +0000029516 00000 n +0000029620 00000 n +0000029724 00000 n +0000029828 00000 n +0000029932 00000 n +0000030036 00000 n +0000030140 00000 n +0000030243 00000 n +0000030347 00000 n +0000030451 00000 n +0000030554 00000 n +0000030657 00000 n +0000030761 00000 n +0000030865 00000 n +0000030969 00000 n +0000031073 00000 n +0000031177 00000 n +0000031281 00000 n +0000031384 00000 n +0000031488 00000 n +0000031592 00000 n +0000031696 00000 n +0000031799 00000 n +0000031901 00000 n +0000032003 00000 n +0000032356 00000 n +0000032459 00000 n +0000032563 00000 n +0000032667 00000 n +0000032771 00000 n +0000032875 00000 n +0000032979 00000 n +0000033083 00000 n +0000033187 00000 n +0000033291 00000 n +0000033394 00000 n +0000033498 00000 n +0000033602 00000 n +0000033706 00000 n +0000033810 00000 n +0000033914 00000 n +0000034018 00000 n +0000034122 00000 n +0000034226 00000 n +0000034329 00000 n +0000034433 00000 n +0000034537 00000 n +0000034641 00000 n +0000034745 00000 n +0000034849 00000 n +0000034953 00000 n +0000035056 00000 n +0000035160 00000 n +0000035264 00000 n +0000035368 00000 n +0000035472 00000 n +0000035576 00000 n +0000035680 00000 n +0000035784 00000 n +0000035888 00000 n +0000035992 00000 n +0000036096 00000 n +0000036200 00000 n +0000036304 00000 n +0000036408 00000 n +0000036512 00000 n +0000036616 00000 n +0000036961 00000 n +0000037014 00000 n +0000037101 00000 n +0000037155 00000 n +0000037241 00000 n +0000037296 00000 n +0000037383 00000 n +0000037450 00000 n +0000037536 00000 n +0000037639 00000 n +0000037743 00000 n +0000037847 00000 n +0000037951 00000 n +0000038055 00000 n +0000038159 00000 n +0000038263 00000 n +0000038367 00000 n +0000038471 00000 n +0000038575 00000 n +0000038679 00000 n +0000038783 00000 n +0000038887 00000 n +0000038991 00000 n +0000039095 00000 n +0000039199 00000 n +0000039303 00000 n +0000039407 00000 n +0000039511 00000 n +0000039615 00000 n +0000039719 00000 n +0000039823 00000 n +0000039927 00000 n +0000040031 00000 n +0000040134 00000 n +0000040238 00000 n +0000040342 00000 n +0000040446 00000 n +0000040550 00000 n +0000040654 00000 n +0000040758 00000 n +0000040861 00000 n +0000040963 00000 n +0000041065 00000 n +0000041386 00000 n +0000041490 00000 n +0000041594 00000 n +0000041698 00000 n +0000041802 00000 n +0000041906 00000 n +0000042010 00000 n +0000042114 00000 n +0000042218 00000 n +0000042322 00000 n +0000042426 00000 n +0000042530 00000 n +0000042634 00000 n +0000042738 00000 n +0000042842 00000 n +0000042946 00000 n +0000043050 00000 n +0000043154 00000 n +0000043258 00000 n +0000043362 00000 n +0000043466 00000 n +0000043570 00000 n +0000043674 00000 n +0000043778 00000 n +0000043882 00000 n +0000043986 00000 n +0000044089 00000 n +0000044193 00000 n +0000044297 00000 n +0000044401 00000 n +0000044505 00000 n +0000044609 00000 n +0000044713 00000 n +0000044817 00000 n +0000044921 00000 n +0000045025 00000 n +0000045129 00000 n +0000045233 00000 n +0000045337 00000 n +0000045441 00000 n +0000045545 00000 n +0000045649 00000 n +0000045753 00000 n +0000045857 00000 n +0000045961 00000 n +0000046065 00000 n +0000046169 00000 n +0000046273 00000 n +0000046377 00000 n +0000046480 00000 n +0000046582 00000 n +0000046684 00000 n +0000047109 00000 n +0000047213 00000 n +0000047317 00000 n +0000047421 00000 n +0000047525 00000 n +0000047629 00000 n +0000047733 00000 n +0000047837 00000 n +0000047941 00000 n +0000048045 00000 n +0000048149 00000 n +0000048253 00000 n +0000048357 00000 n +0000048461 00000 n +0000048565 00000 n +0000048669 00000 n +0000048773 00000 n +0000048877 00000 n +0000048981 00000 n +0000049085 00000 n +0000049189 00000 n +0000049293 00000 n +0000049397 00000 n +0000049501 00000 n +0000049605 00000 n +0000049709 00000 n +0000049813 00000 n +0000049917 00000 n +0000050021 00000 n +0000050125 00000 n +0000050229 00000 n +0000050333 00000 n +0000050437 00000 n +0000050541 00000 n +0000050645 00000 n +0000050749 00000 n +0000050853 00000 n +0000050957 00000 n +0000051061 00000 n +0000051165 00000 n +0000051269 00000 n +0000051373 00000 n +0000051477 00000 n +0000051581 00000 n +0000051685 00000 n +0000051789 00000 n +0000051893 00000 n +0000051997 00000 n +0000052101 00000 n +0000052204 00000 n +0000052306 00000 n +0000052408 00000 n +0000052833 00000 n +0000052937 00000 n +0000053041 00000 n +0000053145 00000 n +0000053249 00000 n +0000053353 00000 n +0000053457 00000 n +0000053561 00000 n +0000053665 00000 n +0000053769 00000 n +0000053872 00000 n +0000053976 00000 n +0000054080 00000 n +0000054184 00000 n +0000054288 00000 n +0000054392 00000 n +0000054496 00000 n +0000054600 00000 n +0000054704 00000 n +0000054808 00000 n +0000054912 00000 n +0000055016 00000 n +0000055120 00000 n +0000055224 00000 n +0000055328 00000 n +0000055432 00000 n +0000055536 00000 n +0000055640 00000 n +0000055744 00000 n +0000055848 00000 n +0000055952 00000 n +0000056056 00000 n +0000056160 00000 n +0000056264 00000 n +0000056368 00000 n +0000056472 00000 n +0000056576 00000 n +0000056680 00000 n +0000056784 00000 n +0000056888 00000 n +0000057217 00000 n +0000057320 00000 n +0000057424 00000 n +0000057528 00000 n +0000057632 00000 n +0000057736 00000 n +0000057840 00000 n +0000057944 00000 n +0000058048 00000 n +0000058152 00000 n +0000058256 00000 n +0000058360 00000 n +0000058463 00000 n +0000058567 00000 n +0000058671 00000 n +0000058775 00000 n +0000058879 00000 n +0000058983 00000 n +0000059087 00000 n +0000059190 00000 n +0000059294 00000 n +0000059398 00000 n +0000059502 00000 n +0000059606 00000 n +0000059710 00000 n +0000059814 00000 n +0000059918 00000 n +0000060022 00000 n +0000060126 00000 n +0000060230 00000 n +0000060334 00000 n +0000060438 00000 n +0000060542 00000 n +0000060646 00000 n +0000060750 00000 n +0000060854 00000 n +0000060958 00000 n +0000061062 00000 n +0000061166 00000 n +0000061270 00000 n +0000061374 00000 n +0000061478 00000 n +0000061581 00000 n +0000061683 00000 n +0000061785 00000 n +0000062154 00000 n +0000062258 00000 n +0000062283 00000 n +0000062332 00000 n +0000062419 00000 n +0000062444 00000 n +0000062500 00000 n +0000062587 00000 n +0000062656 00000 n +0000062743 00000 n +0000062794 00000 n +0000062881 00000 n +0000062966 00000 n +0000063053 00000 n +0000063109 00000 n +0000063196 00000 n +0000063246 00000 n +0000063333 00000 n +0000063385 00000 n +0000063471 00000 n +0000063544 00000 n +0000063600 00000 n +0000063687 00000 n +0000063735 00000 n +0000063821 00000 n +0000063869 00000 n +0000063956 00000 n +0000063997 00000 n +0000064038 00000 n +0000064125 00000 n +0000064169 00000 n +0000064256 00000 n +0000064301 00000 n +0000064388 00000 n +0000064432 00000 n +0000064519 00000 n +0000064563 00000 n +0000064650 00000 n +0000064692 00000 n +0000064779 00000 n +0000064827 00000 n +0000064914 00000 n +0000064987 00000 n +0000065035 00000 n +0000065120 00000 n +0000065145 00000 n +0000065198 00000 n +0000065282 00000 n +0000065307 00000 n +0000065410 00000 n +0000065514 00000 n +0000065618 00000 n +0000065722 00000 n +0000065826 00000 n +0000065929 00000 n +0000066032 00000 n +0000066136 00000 n +0000066240 00000 n +0000066344 00000 n +0000066448 00000 n +0000066552 00000 n +0000066656 00000 n +0000066760 00000 n +0000066864 00000 n +0000066968 00000 n +0000067072 00000 n +0000067176 00000 n +0000067280 00000 n +0000067384 00000 n +0000067488 00000 n +0000067591 00000 n +0000067695 00000 n +0000067799 00000 n +0000067903 00000 n +0000068007 00000 n +0000068111 00000 n +0000068215 00000 n +0000068319 00000 n +0000068423 00000 n +0000068527 00000 n +0000068630 00000 n +0000068734 00000 n +0000068838 00000 n +0000068942 00000 n +0000069046 00000 n +0000069150 00000 n +0000069254 00000 n +0000069358 00000 n +0000069462 00000 n +0000069566 00000 n +0000069668 00000 n +0000069770 00000 n +0000069872 00000 n +0000070241 00000 n +0000070345 00000 n +0000070370 00000 n +0000070418 00000 n +0000070505 00000 n +0000070530 00000 n 0000070578 00000 n 0000070665 00000 n 0000070710 00000 n 0000070796 00000 n -0000070829 00000 n -0000070877 00000 n -0000070964 00000 n -0000070989 00000 n -0000071037 00000 n -0000071124 00000 n -0000071169 00000 n -0000071255 00000 n -0000071298 00000 n -0000071384 00000 n -0000071425 00000 n -0000071511 00000 n -0000071560 00000 n -0000071646 00000 n -0000071692 00000 n -0000071778 00000 n -0000071823 00000 n -0000071909 00000 n -0000071961 00000 n -0000072047 00000 n -0000072097 00000 n -0000072183 00000 n -0000072229 00000 n -0000072315 00000 n -0000072358 00000 n -0000072444 00000 n -0000072488 00000 n -0000072574 00000 n -0000072617 00000 n -0000072703 00000 n -0000072748 00000 n -0000072834 00000 n -0000072872 00000 n -0000072958 00000 n -0000073000 00000 n -0000073086 00000 n -0000073129 00000 n -0000073215 00000 n -0000073253 00000 n -0000073339 00000 n -0000073381 00000 n -0000073467 00000 n -0000073511 00000 n -0000073597 00000 n -0000073644 00000 n -0000073730 00000 n -0000073778 00000 n -0000073863 00000 n -0000074056 00000 n -0000074105 00000 n -0000074191 00000 n -0000074216 00000 n -0000074263 00000 n -0000074350 00000 n -0000074375 00000 n -0000074430 00000 n -0000074517 00000 n -0000074573 00000 n -0000074660 00000 n -0000074693 00000 n -0000074741 00000 n -0000074828 00000 n -0000074902 00000 n -0000074989 00000 n -0000075057 00000 n -0000075144 00000 n -0000075198 00000 n -0000075285 00000 n -0000075353 00000 n -0000075440 00000 n -0000075514 00000 n -0000075601 00000 n -0000075649 00000 n -0000075736 00000 n -0000075793 00000 n -0000075880 00000 n -0000075961 00000 n -0000076016 00000 n -0000076103 00000 n -0000076184 00000 n -0000076271 00000 n -0000076304 00000 n -0000076357 00000 n -0000076444 00000 n -0000076469 00000 n -0000076517 00000 n -0000076604 00000 n -0000076646 00000 n -0000076733 00000 n -0000076776 00000 n -0000076863 00000 n -0000076913 00000 n -0000077000 00000 n -0000077048 00000 n -0000077135 00000 n -0000077192 00000 n -0000077235 00000 n -0000077322 00000 n -0000077376 00000 n -0000077463 00000 n -0000077508 00000 n -0000077595 00000 n -0000077652 00000 n -0000077738 00000 n -0000077834 00000 n -0000077919 00000 n -0000077976 00000 n -0000078079 00000 n -0000078183 00000 n -0000078286 00000 n -0000078390 00000 n -0000078494 00000 n -0000078598 00000 n -0000078702 00000 n -0000078806 00000 n -0000078910 00000 n -0000079014 00000 n -0000079118 00000 n -0000079222 00000 n -0000079325 00000 n -0000079428 00000 n -0000079532 00000 n -0000079636 00000 n -0000079740 00000 n -0000079843 00000 n -0000079947 00000 n -0000080051 00000 n -0000080155 00000 n -0000080259 00000 n -0000080363 00000 n -0000080467 00000 n -0000080571 00000 n -0000080675 00000 n -0000080779 00000 n -0000080883 00000 n -0000080987 00000 n -0000081091 00000 n -0000081195 00000 n -0000081299 00000 n -0000081403 00000 n -0000081507 00000 n -0000081611 00000 n -0000081715 00000 n -0000081819 00000 n -0000081923 00000 n -0000082027 00000 n -0000082131 00000 n -0000082234 00000 n -0000082337 00000 n -0000082439 00000 n -0000082541 00000 n -0000082910 00000 n -0000083014 00000 n -0000083118 00000 n -0000083222 00000 n -0000083326 00000 n -0000083430 00000 n -0000083533 00000 n -0000083637 00000 n -0000083741 00000 n -0000083845 00000 n -0000083949 00000 n -0000084053 00000 n -0000084157 00000 n -0000084261 00000 n -0000084365 00000 n -0000084469 00000 n -0000084573 00000 n -0000084677 00000 n -0000084781 00000 n -0000084885 00000 n -0000084989 00000 n -0000085093 00000 n -0000085197 00000 n -0000085301 00000 n -0000085404 00000 n -0000085508 00000 n -0000085612 00000 n -0000085716 00000 n -0000085820 00000 n -0000085923 00000 n -0000086027 00000 n -0000086131 00000 n -0000086235 00000 n -0000086339 00000 n -0000086443 00000 n -0000086547 00000 n -0000086651 00000 n -0000086755 00000 n -0000086859 00000 n -0000086963 00000 n -0000087066 00000 n -0000087170 00000 n -0000087274 00000 n -0000087378 00000 n -0000087482 00000 n -0000087586 00000 n -0000087690 00000 n -0000087794 00000 n -0000087898 00000 n -0000088001 00000 n -0000088103 00000 n -0000088205 00000 n -0000088630 00000 n -0000088733 00000 n -0000088837 00000 n -0000088941 00000 n -0000089045 00000 n -0000089149 00000 n -0000089253 00000 n -0000089357 00000 n -0000089461 00000 n -0000089565 00000 n -0000089669 00000 n -0000089773 00000 n -0000089877 00000 n -0000089981 00000 n -0000090084 00000 n -0000090188 00000 n -0000090292 00000 n -0000090395 00000 n -0000090499 00000 n -0000090603 00000 n -0000090707 00000 n -0000090811 00000 n -0000090915 00000 n -0000091019 00000 n -0000091123 00000 n -0000091227 00000 n -0000091330 00000 n -0000091434 00000 n -0000091538 00000 n -0000091642 00000 n -0000091746 00000 n -0000091850 00000 n -0000091954 00000 n -0000092057 00000 n -0000092161 00000 n -0000092265 00000 n -0000092562 00000 n -0000092644 00000 n -0000092731 00000 n -0000092816 00000 n -0000092903 00000 n -0000092936 00000 n -0000092982 00000 n -0000093068 00000 n -0000093114 00000 n -0000093197 00000 n -0000093230 00000 n -0000093274 00000 n -0000093361 00000 n -0000093412 00000 n -0000093499 00000 n -0000093548 00000 n -0000093635 00000 n -0000093683 00000 n -0000093769 00000 n -0000093818 00000 n -0000093871 00000 n -0000093958 00000 n -0000094008 00000 n -0000094095 00000 n -0000094128 00000 n -0000094191 00000 n -0000094278 00000 n -0000094336 00000 n -0000094423 00000 n -0000094517 00000 n +0000070839 00000 n +0000070925 00000 n +0000070966 00000 n +0000071052 00000 n +0000071101 00000 n +0000071187 00000 n +0000071233 00000 n +0000071319 00000 n +0000071364 00000 n +0000071450 00000 n +0000071502 00000 n +0000071588 00000 n +0000071638 00000 n +0000071724 00000 n +0000071770 00000 n +0000071856 00000 n +0000071899 00000 n +0000071985 00000 n +0000072029 00000 n +0000072115 00000 n +0000072158 00000 n +0000072244 00000 n +0000072289 00000 n +0000072375 00000 n +0000072413 00000 n +0000072499 00000 n +0000072541 00000 n +0000072627 00000 n +0000072670 00000 n +0000072756 00000 n +0000072794 00000 n +0000072880 00000 n +0000072922 00000 n +0000073008 00000 n +0000073052 00000 n +0000073138 00000 n +0000073185 00000 n +0000073271 00000 n +0000073319 00000 n +0000073406 00000 n +0000073599 00000 n +0000073648 00000 n +0000073734 00000 n +0000073759 00000 n +0000073806 00000 n +0000073893 00000 n +0000073918 00000 n +0000074033 00000 n +0000074120 00000 n +0000074145 00000 n +0000074227 00000 n +0000074314 00000 n +0000074399 00000 n +0000074486 00000 n +0000074541 00000 n +0000074628 00000 n +0000074684 00000 n +0000074771 00000 n +0000074820 00000 n +0000074868 00000 n +0000074955 00000 n +0000075029 00000 n +0000075116 00000 n +0000075184 00000 n +0000075271 00000 n +0000075325 00000 n +0000075412 00000 n +0000075480 00000 n +0000075567 00000 n +0000075641 00000 n +0000075728 00000 n +0000075776 00000 n +0000075863 00000 n +0000075920 00000 n +0000076007 00000 n +0000076088 00000 n +0000076143 00000 n +0000076230 00000 n +0000076311 00000 n +0000076398 00000 n +0000076431 00000 n +0000076484 00000 n +0000076571 00000 n +0000076596 00000 n +0000076644 00000 n +0000076731 00000 n +0000076773 00000 n +0000076860 00000 n +0000076903 00000 n +0000076990 00000 n +0000077040 00000 n +0000077127 00000 n +0000077175 00000 n +0000077262 00000 n +0000077319 00000 n +0000077362 00000 n +0000077449 00000 n +0000077503 00000 n +0000077590 00000 n +0000077635 00000 n +0000077722 00000 n +0000077763 00000 n +0000077820 00000 n +0000077907 00000 n +0000078003 00000 n +0000078089 00000 n +0000078122 00000 n +0000078225 00000 n +0000078329 00000 n +0000078433 00000 n +0000078537 00000 n +0000078641 00000 n +0000078745 00000 n +0000078849 00000 n +0000078953 00000 n +0000079057 00000 n +0000079161 00000 n +0000079265 00000 n +0000079369 00000 n +0000079473 00000 n +0000079577 00000 n +0000079681 00000 n +0000079785 00000 n +0000079889 00000 n +0000079993 00000 n +0000080097 00000 n +0000080200 00000 n +0000080304 00000 n +0000080408 00000 n +0000080512 00000 n +0000080616 00000 n +0000080720 00000 n +0000080824 00000 n +0000080928 00000 n +0000081032 00000 n +0000081136 00000 n +0000081239 00000 n +0000081343 00000 n +0000081447 00000 n +0000081551 00000 n +0000081654 00000 n +0000081758 00000 n +0000081862 00000 n +0000081965 00000 n +0000082069 00000 n +0000082173 00000 n +0000082277 00000 n +0000082381 00000 n +0000082484 00000 n +0000082586 00000 n +0000082688 00000 n +0000083057 00000 n +0000083161 00000 n +0000083265 00000 n +0000083369 00000 n +0000083473 00000 n +0000083577 00000 n +0000083681 00000 n +0000083785 00000 n +0000083889 00000 n +0000083993 00000 n +0000084097 00000 n +0000084201 00000 n +0000084305 00000 n +0000084409 00000 n +0000084513 00000 n +0000084617 00000 n +0000084720 00000 n +0000084824 00000 n +0000084928 00000 n +0000085032 00000 n +0000085136 00000 n +0000085240 00000 n +0000085344 00000 n +0000085448 00000 n +0000085552 00000 n +0000085655 00000 n +0000085759 00000 n +0000085863 00000 n +0000085967 00000 n +0000086071 00000 n +0000086175 00000 n +0000086279 00000 n +0000086383 00000 n +0000086487 00000 n +0000086591 00000 n +0000086695 00000 n +0000086799 00000 n +0000086903 00000 n +0000087007 00000 n +0000087111 00000 n +0000087215 00000 n +0000087319 00000 n +0000087423 00000 n +0000087526 00000 n +0000087630 00000 n +0000087734 00000 n +0000087838 00000 n +0000087942 00000 n +0000088046 00000 n +0000088149 00000 n +0000088251 00000 n +0000088353 00000 n +0000088778 00000 n +0000088882 00000 n +0000088986 00000 n +0000089090 00000 n +0000089194 00000 n +0000089297 00000 n +0000089401 00000 n +0000089505 00000 n +0000089609 00000 n +0000089713 00000 n +0000089817 00000 n +0000089921 00000 n +0000090025 00000 n +0000090129 00000 n +0000090232 00000 n +0000090335 00000 n +0000090439 00000 n +0000090543 00000 n +0000090647 00000 n +0000090751 00000 n +0000090855 00000 n +0000090959 00000 n +0000091063 00000 n +0000091167 00000 n +0000091271 00000 n +0000091375 00000 n +0000091478 00000 n +0000091582 00000 n +0000091686 00000 n +0000091790 00000 n +0000091894 00000 n +0000091998 00000 n +0000092102 00000 n +0000092206 00000 n +0000092309 00000 n +0000092413 00000 n +0000092517 00000 n +0000092621 00000 n +0000092725 00000 n +0000092829 00000 n +0000092933 00000 n +0000093036 00000 n +0000093140 00000 n +0000093244 00000 n +0000093605 00000 n +0000093653 00000 n +0000093740 00000 n +0000093787 00000 n +0000093873 00000 n +0000093920 00000 n +0000094006 00000 n +0000094047 00000 n +0000094092 00000 n +0000094179 00000 n +0000094224 00000 n +0000094310 00000 n +0000094343 00000 n +0000094389 00000 n +0000094474 00000 n +0000094520 00000 n 0000094603 00000 n -0000094644 00000 n -0000094687 00000 n -0000094773 00000 n -0000094821 00000 n -0000094908 00000 n -0000094949 00000 n -0000095036 00000 n -0000095080 00000 n -0000095167 00000 n -0000095211 00000 n -0000095297 00000 n -0000095354 00000 n -0000095400 00000 n -0000095487 00000 n -0000095512 00000 n -0000095561 00000 n -0000095648 00000 n -0000095702 00000 n -0000095789 00000 n -0000095840 00000 n -0000095927 00000 n -0000095981 00000 n -0000096068 00000 n -0000096118 00000 n -0000096203 00000 n -0000096260 00000 n -0000096310 00000 n -0000096397 00000 n -0000096461 00000 n -0000096548 00000 n -0000096581 00000 n -0000096658 00000 n -0000096744 00000 n -0000096834 00000 n -0000096920 00000 n -0000097009 00000 n -0000097095 00000 n -0000097136 00000 n -0000097207 00000 n -0000097293 00000 n -0000097425 00000 n -0000097511 00000 n -0000097585 00000 n -0000097671 00000 n -0000097768 00000 n -0000097854 00000 n -0000097903 00000 n -0000097968 00000 n -0000098055 00000 n -0000098080 00000 n -0000098145 00000 n -0000098232 00000 n -0000098257 00000 n -0000098319 00000 n -0000098406 00000 n -0000098431 00000 n -0000098480 00000 n -0000098567 00000 n -0000098592 00000 n -0000098640 00000 n -0000098727 00000 n -0000098777 00000 n -0000098861 00000 n -0000098905 00000 n -0000098989 00000 n -0000099030 00000 n -0000099074 00000 n -0000099160 00000 n -0000099210 00000 n -0000099296 00000 n -0000099346 00000 n -0000099432 00000 n -0000099481 00000 n -0000099567 00000 n -0000099614 00000 n -0000099700 00000 n -0000099758 00000 n -0000099874 00000 n -0000099963 00000 n -0000100079 00000 n -0000100166 00000 n -0000100202 00000 n -0000100322 00000 n -0000100410 00000 n -0000100454 00000 n -0000100543 00000 n -0000100587 00000 n -0000100676 00000 n -0000100721 00000 n -0000100811 00000 n -0000100899 00000 n -0000100963 00000 n -0000101051 00000 n -0000101087 00000 n -0000101149 00000 n -0000101237 00000 n -0000101264 00000 n -0000101320 00000 n -0000101409 00000 n -0000101436 00000 n -0000101540 00000 n -0000101645 00000 n -0000101750 00000 n -0000101855 00000 n -0000101960 00000 n -0000102065 00000 n -0000102170 00000 n -0000102275 00000 n -0000102380 00000 n -0000102485 00000 n -0000102590 00000 n -0000102694 00000 n -0000102799 00000 n -0000102904 00000 n -0000103009 00000 n -0000103114 00000 n -0000103219 00000 n -0000103324 00000 n -0000103428 00000 n -0000103533 00000 n -0000103638 00000 n -0000103743 00000 n -0000103848 00000 n -0000103953 00000 n -0000104058 00000 n -0000104163 00000 n -0000104268 00000 n -0000104373 00000 n -0000104478 00000 n -0000104583 00000 n -0000104688 00000 n -0000104793 00000 n -0000104898 00000 n -0000105002 00000 n -0000105107 00000 n -0000105212 00000 n -0000105317 00000 n -0000105422 00000 n -0000105527 00000 n -0000105632 00000 n -0000105737 00000 n -0000105842 00000 n -0000105947 00000 n -0000106051 00000 n -0000106155 00000 n -0000106258 00000 n -0000106361 00000 n -0000106802 00000 n -0000106907 00000 n -0000107012 00000 n -0000107117 00000 n -0000107221 00000 n -0000107326 00000 n -0000107431 00000 n -0000107536 00000 n -0000107641 00000 n -0000107746 00000 n -0000107851 00000 n -0000107956 00000 n -0000108061 00000 n -0000108166 00000 n -0000108271 00000 n -0000108376 00000 n -0000108481 00000 n -0000108586 00000 n -0000108691 00000 n -0000108796 00000 n -0000108985 00000 n -0000109041 00000 n -0000109129 00000 n -0000109198 00000 n -0000109286 00000 n -0000109362 00000 n -0000109451 00000 n -0000109522 00000 n -0000109610 00000 n -0000109690 00000 n -0000109779 00000 n -0000109842 00000 n -0000109925 00000 n -0000110013 00000 n -0000110089 00000 n -0000110178 00000 n -0000110252 00000 n -0000110341 00000 n -0000110420 00000 n -0000110509 00000 n -0000110563 00000 n -0000110612 00000 n -0000110701 00000 n -0000110728 00000 n -0000110777 00000 n -0000110866 00000 n -0000110893 00000 n -0000110943 00000 n -0000111032 00000 n -0000111096 00000 n -0000111185 00000 n -0000111249 00000 n -0000111338 00000 n -0000111393 00000 n -0000111482 00000 n -0000111536 00000 n -0000111605 00000 n -0000111693 00000 n -0000111749 00000 n -0000111838 00000 n -0000111874 00000 n -0000111923 00000 n -0000112012 00000 n -0000112077 00000 n -0000112166 00000 n -0000112222 00000 n -0000112311 00000 n -0000112359 00000 n -0000112448 00000 n -0000112502 00000 n -0000112557 00000 n -0000112646 00000 n -0000112701 00000 n -0000112790 00000 n -0000112826 00000 n -0000112862 00000 n -0000112898 00000 n -0000118585 00000 n -0000118630 00000 n -0000118675 00000 n -0000118720 00000 n -0000118765 00000 n -0000118810 00000 n -0000118855 00000 n -0000118900 00000 n -0000118945 00000 n -0000118990 00000 n -0000119035 00000 n -0000119080 00000 n -0000119125 00000 n -0000119170 00000 n -0000119215 00000 n -0000119260 00000 n -0000119305 00000 n -0000119350 00000 n -0000119395 00000 n -0000119440 00000 n -0000119485 00000 n -0000119530 00000 n -0000119575 00000 n -0000119620 00000 n -0000119665 00000 n -0000119710 00000 n -0000119755 00000 n -0000119800 00000 n -0000119845 00000 n -0000119890 00000 n -0000119935 00000 n -0000119980 00000 n -0000120025 00000 n -0000120070 00000 n -0000120115 00000 n -0000120160 00000 n -0000120205 00000 n -0000120250 00000 n -0000120295 00000 n -0000120340 00000 n -0000120385 00000 n -0000120430 00000 n -0000120475 00000 n -0000120520 00000 n -0000120565 00000 n -0000120610 00000 n -0000120655 00000 n -0000120700 00000 n -0000120745 00000 n -0000120790 00000 n -0000120835 00000 n -0000120880 00000 n -0000120925 00000 n -0000120970 00000 n -0000121015 00000 n -0000121060 00000 n -0000121105 00000 n -0000121150 00000 n -0000121195 00000 n -0000121240 00000 n -0000121285 00000 n -0000121330 00000 n -0000121375 00000 n -0000121420 00000 n -0000121465 00000 n -0000121510 00000 n -0000121555 00000 n -0000121600 00000 n -0000121645 00000 n -0000121690 00000 n -0000121735 00000 n -0000121780 00000 n -0000121825 00000 n -0000121870 00000 n -0000121915 00000 n -0000121960 00000 n -0000122005 00000 n -0000122050 00000 n -0000122095 00000 n -0000122140 00000 n -0000122185 00000 n -0000122230 00000 n -0000122275 00000 n -0000122320 00000 n -0000122365 00000 n -0000122410 00000 n -0000122455 00000 n -0000122500 00000 n -0000122545 00000 n -0000122590 00000 n -0000122635 00000 n -0000122680 00000 n -0000122725 00000 n -0000122770 00000 n -0000122815 00000 n -0000122860 00000 n -0000122905 00000 n -0000122950 00000 n -0000122995 00000 n -0000123040 00000 n -0000123085 00000 n -0000123130 00000 n -0000123175 00000 n -0000123220 00000 n -0000123265 00000 n -0000123310 00000 n -0000123355 00000 n -0000123400 00000 n -0000123445 00000 n -0000123490 00000 n -0000123535 00000 n -0000123580 00000 n -0000123625 00000 n -0000123670 00000 n -0000123715 00000 n -0000123760 00000 n -0000123805 00000 n -0000123850 00000 n -0000123895 00000 n -0000123940 00000 n -0000123985 00000 n -0000124030 00000 n -0000124075 00000 n -0000124120 00000 n -0000124165 00000 n -0000124210 00000 n -0000124255 00000 n -0000124300 00000 n -0000124345 00000 n -0000124390 00000 n -0000124435 00000 n -0000124480 00000 n -0000124525 00000 n -0000124570 00000 n -0000124615 00000 n -0000124660 00000 n -0000124705 00000 n -0000124750 00000 n -0000124795 00000 n -0000124840 00000 n -0000124885 00000 n -0000124930 00000 n -0000124975 00000 n -0000125020 00000 n -0000125065 00000 n -0000125110 00000 n -0000125155 00000 n -0000125200 00000 n -0000125245 00000 n -0000125290 00000 n -0000125335 00000 n -0000125380 00000 n -0000125425 00000 n -0000125470 00000 n -0000125515 00000 n -0000125560 00000 n -0000125605 00000 n -0000125650 00000 n -0000125695 00000 n -0000125740 00000 n -0000125785 00000 n -0000125830 00000 n -0000125875 00000 n -0000125920 00000 n -0000125965 00000 n -0000126010 00000 n -0000126055 00000 n -0000126100 00000 n -0000126145 00000 n -0000126190 00000 n -0000126235 00000 n -0000126280 00000 n -0000126325 00000 n -0000126370 00000 n -0000126415 00000 n -0000126460 00000 n -0000126505 00000 n -0000126550 00000 n -0000126595 00000 n -0000126640 00000 n -0000126685 00000 n -0000126730 00000 n -0000126775 00000 n -0000126820 00000 n -0000126865 00000 n -0000126910 00000 n -0000126955 00000 n -0000127000 00000 n -0000127045 00000 n -0000127090 00000 n -0000127135 00000 n -0000127180 00000 n -0000127225 00000 n -0000127270 00000 n -0000127315 00000 n -0000127360 00000 n -0000127405 00000 n -0000127450 00000 n -0000127495 00000 n -0000127540 00000 n -0000127585 00000 n -0000127630 00000 n -0000127675 00000 n -0000127720 00000 n -0000127765 00000 n -0000127810 00000 n -0000127855 00000 n -0000127900 00000 n -0000127945 00000 n -0000127990 00000 n -0000128035 00000 n -0000128080 00000 n -0000128125 00000 n -0000128170 00000 n -0000128215 00000 n -0000128260 00000 n -0000128305 00000 n -0000128350 00000 n -0000128395 00000 n -0000128440 00000 n -0000128485 00000 n -0000128530 00000 n -0000128575 00000 n -0000128620 00000 n -0000128665 00000 n -0000128710 00000 n -0000128755 00000 n -0000128800 00000 n -0000128845 00000 n -0000128890 00000 n -0000128935 00000 n -0000128980 00000 n -0000129025 00000 n -0000129070 00000 n -0000129115 00000 n -0000129160 00000 n -0000129205 00000 n -0000129250 00000 n -0000129295 00000 n -0000129340 00000 n -0000129385 00000 n -0000129430 00000 n -0000129475 00000 n -0000129520 00000 n -0000129565 00000 n -0000129610 00000 n -0000129655 00000 n -0000129700 00000 n -0000129745 00000 n -0000129790 00000 n -0000129835 00000 n -0000129880 00000 n -0000129925 00000 n -0000129970 00000 n -0000130015 00000 n -0000130060 00000 n -0000130105 00000 n -0000130150 00000 n -0000130195 00000 n -0000130240 00000 n -0000130285 00000 n -0000130330 00000 n -0000130375 00000 n -0000130420 00000 n -0000130465 00000 n -0000130510 00000 n -0000130555 00000 n -0000130600 00000 n -0000130645 00000 n -0000130690 00000 n -0000130735 00000 n -0000130780 00000 n -0000130825 00000 n -0000130870 00000 n -0000130915 00000 n -0000130960 00000 n -0000131005 00000 n -0000131050 00000 n -0000131095 00000 n -0000131140 00000 n -0000131185 00000 n -0000131230 00000 n -0000131275 00000 n -0000131320 00000 n -0000131365 00000 n -0000131410 00000 n -0000131455 00000 n -0000131500 00000 n -0000131545 00000 n -0000131590 00000 n -0000131635 00000 n -0000131680 00000 n -0000131725 00000 n -0000131770 00000 n -0000131815 00000 n -0000131860 00000 n -0000131905 00000 n -0000131950 00000 n -0000131995 00000 n -0000132040 00000 n -0000132085 00000 n -0000132130 00000 n -0000132175 00000 n -0000132220 00000 n -0000132265 00000 n -0000132310 00000 n -0000132355 00000 n -0000132400 00000 n -0000132445 00000 n -0000132490 00000 n -0000132534 00000 n -0000132579 00000 n -0000132624 00000 n -0000132669 00000 n -0000132714 00000 n -0000132759 00000 n -0000132804 00000 n -0000132849 00000 n -0000132894 00000 n -0000132939 00000 n -0000132984 00000 n -0000133029 00000 n -0000133074 00000 n -0000133119 00000 n -0000133164 00000 n -0000133209 00000 n -0000133253 00000 n -0000133298 00000 n -0000133343 00000 n -0000133388 00000 n -0000133433 00000 n -0000135057 00000 n -0000135218 00000 n -0000135387 00000 n -0000135580 00000 n -0000139621 00000 n -0000139815 00000 n -0000143896 00000 n -0000144090 00000 n -0000148180 00000 n -0000148374 00000 n -0000152107 00000 n -0000152301 00000 n -0000156347 00000 n -0000156541 00000 n -0000159649 00000 n -0000159843 00000 n -0000163786 00000 n -0000163947 00000 n -0000164181 00000 n -0000164384 00000 n -0000166981 00000 n -0000167165 00000 n -0000170445 00000 n -0000170620 00000 n -0000173218 00000 n -0000173393 00000 n -0000174928 00000 n -0000175089 00000 n -0000175277 00000 n -0000175480 00000 n -0000178202 00000 n -0000178405 00000 n -0000179839 00000 n -0000180056 00000 n -0000181509 00000 n -0000181706 00000 n -0000183558 00000 n -0000183718 00000 n -0000184213 00000 n -0000184383 00000 n -0000186123 00000 n -0000186302 00000 n -0000188177 00000 n -0000188365 00000 n -0000190207 00000 n -0000190395 00000 n -0000192105 00000 n -0000192274 00000 n -0000193077 00000 n -0000193306 00000 n -0000195175 00000 n -0000195372 00000 n -0000196911 00000 n -0000197108 00000 n -0000198604 00000 n -0000198827 00000 n -0000200996 00000 n -0000201199 00000 n -0000203092 00000 n -0000203306 00000 n -0000204607 00000 n -0000204839 00000 n -0000206512 00000 n -0000206725 00000 n -0000208629 00000 n -0000208837 00000 n -0000210115 00000 n -0000210354 00000 n -0000211950 00000 n -0000212138 00000 n -0000213396 00000 n -0000213557 00000 n -0000213747 00000 n -0000213959 00000 n -0000216815 00000 n -0000216990 00000 n -0000217338 00000 n -0000217527 00000 n -0000219168 00000 n -0000219356 00000 n -0000220849 00000 n -0000221028 00000 n -0000222758 00000 n -0000222938 00000 n -0000224902 00000 n -0000225115 00000 n -0000226889 00000 n -0000227111 00000 n -0000228160 00000 n -0000228405 00000 n -0000229825 00000 n -0000230039 00000 n -0000231576 00000 n -0000231774 00000 n -0000233805 00000 n -0000234070 00000 n -0000235826 00000 n -0000236039 00000 n -0000237616 00000 n -0000237823 00000 n -0000239818 00000 n -0000240050 00000 n -0000242079 00000 n -0000242291 00000 n -0000244272 00000 n -0000244485 00000 n -0000246689 00000 n -0000246919 00000 n -0000249106 00000 n -0000249266 00000 n -0000250003 00000 n -0000250197 00000 n -0000251753 00000 n -0000251933 00000 n -0000253674 00000 n -0000253863 00000 n -0000255064 00000 n -0000255261 00000 n -0000256579 00000 n -0000256767 00000 n -0000257636 00000 n -0000257868 00000 n -0000259291 00000 n -0000259526 00000 n -0000261442 00000 n -0000261603 00000 n -0000261796 00000 n -0000261999 00000 n -0000264638 00000 n -0000264822 00000 n -0000267495 00000 n -0000267670 00000 n -0000269459 00000 n -0000269663 00000 n -0000270360 00000 n -0000270567 00000 n -0000272315 00000 n -0000272513 00000 n -0000274241 00000 n -0000274454 00000 n -0000276141 00000 n -0000276354 00000 n -0000277903 00000 n -0000278072 00000 n -0000278652 00000 n -0000278840 00000 n -0000280334 00000 n -0000280554 00000 n -0000282159 00000 n -0000282369 00000 n -0000284036 00000 n -0000284239 00000 n -0000285331 00000 n -0000285595 00000 n -0000287319 00000 n -0000287565 00000 n -0000289455 00000 n -0000289678 00000 n -0000291468 00000 n -0000291691 00000 n -0000293566 00000 n -0000293745 00000 n -0000294969 00000 n -0000295201 00000 n -0000296872 00000 n -0000297051 00000 n -0000298631 00000 n -0000298810 00000 n -0000300357 00000 n -0000300536 00000 n -0000302040 00000 n -0000302219 00000 n -0000303885 00000 n -0000304055 00000 n -0000304801 00000 n -0000304999 00000 n -0000306817 00000 n -0000307050 00000 n -0000309105 00000 n -0000309294 00000 n -0000310950 00000 n -0000311120 00000 n -0000311882 00000 n -0000312052 00000 n -0000313157 00000 n -0000313327 00000 n -0000314147 00000 n -0000314317 00000 n -0000315134 00000 n -0000315304 00000 n -0000316466 00000 n -0000316689 00000 n -0000318342 00000 n -0000318568 00000 n -0000320251 00000 n -0000320496 00000 n -0000322387 00000 n -0000322556 00000 n -0000324301 00000 n -0000324485 00000 n -0000326235 00000 n -0000326491 00000 n -0000328467 00000 n -0000328666 00000 n -0000330889 00000 n -0000331100 00000 n -0000332867 00000 n -0000333068 00000 n -0000334084 00000 n -0000334273 00000 n -0000335966 00000 n -0000336145 00000 n -0000337890 00000 n -0000338078 00000 n -0000339914 00000 n -0000340108 00000 n -0000342020 00000 n -0000342251 00000 n -0000344355 00000 n -0000344567 00000 n -0000346003 00000 n -0000346217 00000 n -0000347666 00000 n -0000347873 00000 n -0000349110 00000 n -0000349289 00000 n -0000350276 00000 n -0000350464 00000 n -0000351596 00000 n -0000351784 00000 n -0000353285 00000 n -0000353473 00000 n -0000354556 00000 n -0000354745 00000 n -0000356078 00000 n -0000356282 00000 n -0000358271 00000 n -0000358468 00000 n -0000360584 00000 n -0000360805 00000 n -0000362779 00000 n -0000363010 00000 n -0000364482 00000 n -0000364693 00000 n -0000366522 00000 n -0000366701 00000 n -0000368620 00000 n -0000368850 00000 n -0000370591 00000 n -0000370812 00000 n -0000372412 00000 n -0000372634 00000 n -0000373930 00000 n -0000374171 00000 n -0000375777 00000 n -0000375975 00000 n -0000377824 00000 n -0000378021 00000 n -0000379642 00000 n -0000379821 00000 n -0000381874 00000 n -0000382053 00000 n -0000383891 00000 n -0000384070 00000 n -0000385780 00000 n -0000385959 00000 n -0000386393 00000 n -0000386563 00000 n -0000388236 00000 n -0000388415 00000 n -0000390200 00000 n -0000390379 00000 n -0000392025 00000 n -0000392194 00000 n -0000393509 00000 n -0000393697 00000 n -0000395264 00000 n -0000395452 00000 n -0000397067 00000 n -0000397255 00000 n -0000398643 00000 n -0000398813 00000 n -0000400448 00000 n -0000400618 00000 n -0000401631 00000 n -0000401845 00000 n -0000403332 00000 n -0000403512 00000 n -0000404276 00000 n +0000094636 00000 n +0000094680 00000 n +0000094767 00000 n +0000094818 00000 n +0000094905 00000 n +0000094954 00000 n +0000095041 00000 n +0000095089 00000 n +0000095175 00000 n +0000095224 00000 n +0000095279 00000 n +0000095365 00000 n +0000095390 00000 n +0000095443 00000 n +0000095530 00000 n +0000095580 00000 n +0000095667 00000 n +0000095700 00000 n +0000095819 00000 n +0000095905 00000 n +0000095948 00000 n +0000096035 00000 n +0000096078 00000 n +0000096165 00000 n +0000096206 00000 n +0000096269 00000 n +0000096356 00000 n +0000096414 00000 n +0000096501 00000 n +0000096595 00000 n +0000096681 00000 n +0000096722 00000 n +0000096765 00000 n +0000096851 00000 n +0000096899 00000 n +0000096986 00000 n +0000097027 00000 n +0000097114 00000 n +0000097158 00000 n +0000097245 00000 n +0000097289 00000 n +0000097375 00000 n +0000097432 00000 n +0000097478 00000 n +0000097565 00000 n +0000097590 00000 n +0000097639 00000 n +0000097726 00000 n +0000097780 00000 n +0000097867 00000 n +0000097918 00000 n +0000098005 00000 n +0000098059 00000 n +0000098146 00000 n +0000098196 00000 n +0000098281 00000 n +0000098338 00000 n +0000098388 00000 n +0000098475 00000 n +0000098539 00000 n +0000098626 00000 n +0000098659 00000 n +0000098736 00000 n +0000098822 00000 n +0000098912 00000 n +0000098998 00000 n +0000099087 00000 n +0000099173 00000 n +0000099214 00000 n +0000099285 00000 n +0000099371 00000 n +0000099503 00000 n +0000099589 00000 n +0000099663 00000 n +0000099749 00000 n +0000099846 00000 n +0000099932 00000 n +0000099981 00000 n +0000100046 00000 n +0000100133 00000 n +0000100158 00000 n +0000100223 00000 n +0000100311 00000 n +0000100338 00000 n +0000100401 00000 n +0000100490 00000 n +0000100517 00000 n +0000100567 00000 n +0000100656 00000 n +0000100683 00000 n +0000100732 00000 n +0000100821 00000 n +0000100872 00000 n +0000100958 00000 n +0000101003 00000 n +0000101089 00000 n +0000101134 00000 n +0000101179 00000 n +0000101267 00000 n +0000101318 00000 n +0000101406 00000 n +0000101457 00000 n +0000101545 00000 n +0000101595 00000 n +0000101683 00000 n +0000101731 00000 n +0000101819 00000 n +0000101882 00000 n +0000101972 00000 n +0000102060 00000 n +0000102124 00000 n +0000102212 00000 n +0000102248 00000 n +0000102310 00000 n +0000102398 00000 n +0000102425 00000 n +0000102481 00000 n +0000102570 00000 n +0000102597 00000 n +0000102701 00000 n +0000102806 00000 n +0000102911 00000 n +0000103016 00000 n +0000103121 00000 n +0000103226 00000 n +0000103331 00000 n +0000103435 00000 n +0000103540 00000 n +0000103645 00000 n +0000103750 00000 n +0000103855 00000 n +0000103960 00000 n +0000104065 00000 n +0000104170 00000 n +0000104275 00000 n +0000104380 00000 n +0000104485 00000 n +0000104590 00000 n +0000104695 00000 n +0000104800 00000 n +0000104905 00000 n +0000105009 00000 n +0000105114 00000 n +0000105219 00000 n +0000105324 00000 n +0000105429 00000 n +0000105534 00000 n +0000105639 00000 n +0000105744 00000 n +0000105849 00000 n +0000105953 00000 n +0000106058 00000 n +0000106163 00000 n +0000106268 00000 n +0000106373 00000 n +0000106478 00000 n +0000106583 00000 n +0000106687 00000 n +0000106792 00000 n +0000106897 00000 n +0000107002 00000 n +0000107107 00000 n +0000107212 00000 n +0000107316 00000 n +0000107419 00000 n +0000107522 00000 n +0000107963 00000 n +0000108068 00000 n +0000108173 00000 n +0000108278 00000 n +0000108383 00000 n +0000108488 00000 n +0000108593 00000 n +0000108698 00000 n +0000108779 00000 n +0000108835 00000 n +0000108923 00000 n +0000108992 00000 n +0000109080 00000 n +0000109156 00000 n +0000109245 00000 n +0000109316 00000 n +0000109404 00000 n +0000109484 00000 n +0000109573 00000 n +0000109636 00000 n +0000109719 00000 n +0000109807 00000 n +0000109883 00000 n +0000109972 00000 n +0000110046 00000 n +0000110135 00000 n +0000110214 00000 n +0000110303 00000 n +0000110357 00000 n +0000110406 00000 n +0000110495 00000 n +0000110522 00000 n +0000110571 00000 n +0000110660 00000 n +0000110687 00000 n +0000110737 00000 n +0000110826 00000 n +0000110890 00000 n +0000110979 00000 n +0000111043 00000 n +0000111132 00000 n +0000111187 00000 n +0000111276 00000 n +0000111330 00000 n +0000111399 00000 n +0000111487 00000 n +0000111543 00000 n +0000111632 00000 n +0000111668 00000 n +0000111717 00000 n +0000111806 00000 n +0000111871 00000 n +0000111960 00000 n +0000112016 00000 n +0000112105 00000 n +0000112153 00000 n +0000112242 00000 n +0000112296 00000 n +0000112351 00000 n +0000112440 00000 n +0000112495 00000 n +0000112584 00000 n +0000112620 00000 n +0000112656 00000 n +0000112692 00000 n +0000118297 00000 n +0000118342 00000 n +0000118387 00000 n +0000118432 00000 n +0000118477 00000 n +0000118522 00000 n +0000118567 00000 n +0000118612 00000 n +0000118657 00000 n +0000118702 00000 n +0000118747 00000 n +0000118792 00000 n +0000118837 00000 n +0000118882 00000 n +0000118927 00000 n +0000118972 00000 n +0000119017 00000 n +0000119062 00000 n +0000119107 00000 n +0000119152 00000 n +0000119197 00000 n +0000119242 00000 n +0000119287 00000 n +0000119332 00000 n +0000119377 00000 n +0000119422 00000 n +0000119467 00000 n +0000119512 00000 n +0000119557 00000 n +0000119602 00000 n +0000119647 00000 n +0000119692 00000 n +0000119737 00000 n +0000119782 00000 n +0000119827 00000 n +0000119872 00000 n +0000119917 00000 n +0000119962 00000 n +0000120007 00000 n +0000120052 00000 n +0000120097 00000 n +0000120142 00000 n +0000120187 00000 n +0000120232 00000 n +0000120277 00000 n +0000120322 00000 n +0000120367 00000 n +0000120412 00000 n +0000120457 00000 n +0000120502 00000 n +0000120547 00000 n +0000120592 00000 n +0000120637 00000 n +0000120682 00000 n +0000120727 00000 n +0000120772 00000 n +0000120817 00000 n +0000120862 00000 n +0000120907 00000 n +0000120952 00000 n +0000120997 00000 n +0000121042 00000 n +0000121087 00000 n +0000121132 00000 n +0000121177 00000 n +0000121222 00000 n +0000121267 00000 n +0000121312 00000 n +0000121357 00000 n +0000121402 00000 n +0000121447 00000 n +0000121492 00000 n +0000121537 00000 n +0000121582 00000 n +0000121627 00000 n +0000121672 00000 n +0000121717 00000 n +0000121762 00000 n +0000121807 00000 n +0000121852 00000 n +0000121897 00000 n +0000121942 00000 n +0000121987 00000 n +0000122032 00000 n +0000122077 00000 n +0000122122 00000 n +0000122167 00000 n +0000122212 00000 n +0000122257 00000 n +0000122302 00000 n +0000122347 00000 n +0000122392 00000 n +0000122437 00000 n +0000122482 00000 n +0000122527 00000 n +0000122572 00000 n +0000122617 00000 n +0000122662 00000 n +0000122707 00000 n +0000122752 00000 n +0000122797 00000 n +0000122842 00000 n +0000122887 00000 n +0000122932 00000 n +0000122977 00000 n +0000123022 00000 n +0000123067 00000 n +0000123112 00000 n +0000123157 00000 n +0000123202 00000 n +0000123247 00000 n +0000123292 00000 n +0000123337 00000 n +0000123382 00000 n +0000123427 00000 n +0000123472 00000 n +0000123517 00000 n +0000123562 00000 n +0000123607 00000 n +0000123652 00000 n +0000123697 00000 n +0000123742 00000 n +0000123787 00000 n +0000123832 00000 n +0000123877 00000 n +0000123922 00000 n +0000123967 00000 n +0000124012 00000 n +0000124057 00000 n +0000124102 00000 n +0000124147 00000 n +0000124192 00000 n +0000124237 00000 n +0000124282 00000 n +0000124327 00000 n +0000124372 00000 n +0000124417 00000 n +0000124462 00000 n +0000124507 00000 n +0000124552 00000 n +0000124597 00000 n +0000124642 00000 n +0000124687 00000 n +0000124732 00000 n +0000124777 00000 n +0000124822 00000 n +0000124867 00000 n +0000124912 00000 n +0000124957 00000 n +0000125002 00000 n +0000125047 00000 n +0000125092 00000 n +0000125137 00000 n +0000125182 00000 n +0000125227 00000 n +0000125272 00000 n +0000125317 00000 n +0000125362 00000 n +0000125407 00000 n +0000125452 00000 n +0000125497 00000 n +0000125542 00000 n +0000125587 00000 n +0000125632 00000 n +0000125677 00000 n +0000125722 00000 n +0000125767 00000 n +0000125812 00000 n +0000125857 00000 n +0000125902 00000 n +0000125947 00000 n +0000125992 00000 n +0000126037 00000 n +0000126082 00000 n +0000126127 00000 n +0000126172 00000 n +0000126217 00000 n +0000126262 00000 n +0000126307 00000 n +0000126352 00000 n +0000126397 00000 n +0000126442 00000 n +0000126487 00000 n +0000126532 00000 n +0000126577 00000 n +0000126622 00000 n +0000126667 00000 n +0000126712 00000 n +0000126757 00000 n +0000126802 00000 n +0000126847 00000 n +0000126892 00000 n +0000126937 00000 n +0000126982 00000 n +0000127027 00000 n +0000127072 00000 n +0000127117 00000 n +0000127162 00000 n +0000127207 00000 n +0000127252 00000 n +0000127297 00000 n +0000127342 00000 n +0000127387 00000 n +0000127432 00000 n +0000127477 00000 n +0000127522 00000 n +0000127567 00000 n +0000127612 00000 n +0000127657 00000 n +0000127702 00000 n +0000127747 00000 n +0000127792 00000 n +0000127837 00000 n +0000127882 00000 n +0000127927 00000 n +0000127972 00000 n +0000128017 00000 n +0000128062 00000 n +0000128107 00000 n +0000128152 00000 n +0000128197 00000 n +0000128242 00000 n +0000128287 00000 n +0000128332 00000 n +0000128377 00000 n +0000128422 00000 n +0000128467 00000 n +0000128512 00000 n +0000128557 00000 n +0000128602 00000 n +0000128647 00000 n +0000128692 00000 n +0000128737 00000 n +0000128782 00000 n +0000128827 00000 n +0000128872 00000 n +0000128917 00000 n +0000128962 00000 n +0000129007 00000 n +0000129052 00000 n +0000129097 00000 n +0000129142 00000 n +0000129187 00000 n +0000129232 00000 n +0000129277 00000 n +0000129322 00000 n +0000129367 00000 n +0000129412 00000 n +0000129457 00000 n +0000129502 00000 n +0000129547 00000 n +0000129592 00000 n +0000129637 00000 n +0000129682 00000 n +0000129727 00000 n +0000129772 00000 n +0000129817 00000 n +0000129862 00000 n +0000129907 00000 n +0000129952 00000 n +0000129997 00000 n +0000130042 00000 n +0000130087 00000 n +0000130132 00000 n +0000130177 00000 n +0000130222 00000 n +0000130267 00000 n +0000130312 00000 n +0000130357 00000 n +0000130402 00000 n +0000130447 00000 n +0000130492 00000 n +0000130537 00000 n +0000130582 00000 n +0000130627 00000 n +0000130672 00000 n +0000130717 00000 n +0000130762 00000 n +0000130807 00000 n +0000130852 00000 n +0000130897 00000 n +0000130942 00000 n +0000130987 00000 n +0000131032 00000 n +0000131077 00000 n +0000131122 00000 n +0000131167 00000 n +0000131212 00000 n +0000131257 00000 n +0000131302 00000 n +0000131347 00000 n +0000131392 00000 n +0000131437 00000 n +0000131482 00000 n +0000131527 00000 n +0000131572 00000 n +0000131617 00000 n +0000131662 00000 n +0000131707 00000 n +0000131752 00000 n +0000131797 00000 n +0000131842 00000 n +0000131887 00000 n +0000131932 00000 n +0000131977 00000 n +0000132022 00000 n +0000132067 00000 n +0000132112 00000 n +0000132157 00000 n +0000132202 00000 n +0000132247 00000 n +0000132292 00000 n +0000132337 00000 n +0000132382 00000 n +0000132427 00000 n +0000132472 00000 n +0000132517 00000 n +0000132562 00000 n +0000132607 00000 n +0000132652 00000 n +0000132697 00000 n +0000132742 00000 n +0000132787 00000 n +0000132832 00000 n +0000132877 00000 n +0000132922 00000 n +0000132967 00000 n +0000134609 00000 n +0000134770 00000 n +0000134939 00000 n +0000135132 00000 n +0000139029 00000 n +0000139223 00000 n +0000143650 00000 n +0000143844 00000 n +0000148198 00000 n +0000148392 00000 n +0000152436 00000 n +0000152630 00000 n +0000156208 00000 n +0000156402 00000 n +0000159997 00000 n +0000160191 00000 n +0000163343 00000 n +0000163504 00000 n +0000163738 00000 n +0000163941 00000 n +0000166521 00000 n +0000166696 00000 n +0000170340 00000 n +0000170515 00000 n +0000173018 00000 n +0000173193 00000 n +0000174969 00000 n +0000175130 00000 n +0000175318 00000 n +0000175521 00000 n +0000178152 00000 n +0000178327 00000 n +0000178592 00000 n +0000178795 00000 n +0000180229 00000 n +0000180446 00000 n +0000181900 00000 n +0000182097 00000 n +0000183949 00000 n +0000184109 00000 n +0000184604 00000 n +0000184774 00000 n +0000186514 00000 n +0000186702 00000 n +0000188191 00000 n +0000188370 00000 n +0000190346 00000 n +0000190525 00000 n +0000191467 00000 n +0000191696 00000 n +0000193565 00000 n +0000193762 00000 n +0000195301 00000 n +0000195498 00000 n +0000196994 00000 n +0000197217 00000 n +0000199386 00000 n +0000199589 00000 n +0000201482 00000 n +0000201696 00000 n +0000202997 00000 n +0000203229 00000 n +0000204902 00000 n +0000205115 00000 n +0000207019 00000 n +0000207227 00000 n +0000208505 00000 n +0000208744 00000 n +0000210263 00000 n +0000210451 00000 n +0000211763 00000 n +0000211951 00000 n +0000212498 00000 n +0000212659 00000 n +0000212849 00000 n +0000213052 00000 n +0000216173 00000 n +0000216348 00000 n +0000216696 00000 n +0000216885 00000 n +0000218508 00000 n +0000218696 00000 n +0000220068 00000 n +0000220238 00000 n +0000222193 00000 n +0000222353 00000 n +0000223034 00000 n +0000223247 00000 n +0000224669 00000 n +0000224883 00000 n +0000226452 00000 n +0000226650 00000 n +0000228572 00000 n +0000228837 00000 n +0000230548 00000 n +0000230761 00000 n +0000232329 00000 n +0000232536 00000 n +0000234565 00000 n +0000234797 00000 n +0000236825 00000 n +0000237038 00000 n +0000239006 00000 n +0000239218 00000 n +0000241199 00000 n +0000241453 00000 n +0000243716 00000 n +0000243946 00000 n +0000245991 00000 n +0000246222 00000 n +0000248131 00000 n +0000248342 00000 n +0000250218 00000 n +0000250387 00000 n +0000252226 00000 n +0000252448 00000 n +0000254446 00000 n +0000254697 00000 n +0000256661 00000 n +0000256830 00000 n +0000258360 00000 n +0000258554 00000 n +0000260133 00000 n +0000260313 00000 n +0000262054 00000 n +0000262243 00000 n +0000263444 00000 n +0000263623 00000 n +0000264712 00000 n +0000264909 00000 n +0000266280 00000 n +0000266459 00000 n +0000267185 00000 n +0000267417 00000 n +0000268891 00000 n +0000269094 00000 n +0000270903 00000 n +0000271087 00000 n +0000271622 00000 n +0000271783 00000 n +0000271974 00000 n +0000272186 00000 n +0000275133 00000 n +0000275308 00000 n +0000277928 00000 n +0000278103 00000 n +0000279934 00000 n +0000280132 00000 n +0000281493 00000 n +0000281691 00000 n +0000283380 00000 n +0000283568 00000 n +0000285250 00000 n +0000285429 00000 n +0000287531 00000 n +0000287710 00000 n +0000289483 00000 n +0000289662 00000 n +0000291343 00000 n +0000291532 00000 n +0000293380 00000 n +0000293593 00000 n +0000295624 00000 n +0000295837 00000 n +0000297389 00000 n +0000297578 00000 n +0000298852 00000 n +0000299059 00000 n +0000300832 00000 n +0000301030 00000 n +0000302793 00000 n +0000303006 00000 n +0000304714 00000 n +0000304917 00000 n +0000306297 00000 n +0000306486 00000 n +0000307375 00000 n +0000307563 00000 n +0000309089 00000 n +0000309292 00000 n +0000311000 00000 n +0000311203 00000 n +0000312020 00000 n +0000312233 00000 n +0000313719 00000 n +0000313899 00000 n +0000314663 00000 n +0000314927 00000 n +0000316651 00000 n +0000316897 00000 n +0000318788 00000 n +0000319011 00000 n +0000320801 00000 n +0000321024 00000 n +0000322899 00000 n +0000323078 00000 n +0000324302 00000 n +0000324534 00000 n +0000326203 00000 n +0000326382 00000 n +0000327962 00000 n +0000328141 00000 n +0000329688 00000 n +0000329867 00000 n +0000331371 00000 n +0000331550 00000 n +0000333215 00000 n +0000333385 00000 n +0000334131 00000 n +0000334329 00000 n +0000336147 00000 n +0000336380 00000 n +0000338436 00000 n +0000338625 00000 n +0000340281 00000 n +0000340451 00000 n +0000341213 00000 n +0000341383 00000 n +0000342488 00000 n +0000342658 00000 n +0000343478 00000 n +0000343648 00000 n +0000344465 00000 n +0000344635 00000 n +0000345797 00000 n +0000346020 00000 n +0000347673 00000 n +0000347899 00000 n +0000349582 00000 n +0000349827 00000 n +0000351718 00000 n +0000351887 00000 n +0000353633 00000 n +0000353818 00000 n +0000355568 00000 n +0000355824 00000 n +0000357801 00000 n +0000358000 00000 n +0000360224 00000 n +0000360435 00000 n +0000362202 00000 n +0000362403 00000 n +0000363421 00000 n +0000363610 00000 n +0000365304 00000 n +0000365483 00000 n +0000367228 00000 n +0000367416 00000 n +0000369252 00000 n +0000369447 00000 n +0000371359 00000 n +0000371591 00000 n +0000373693 00000 n +0000373906 00000 n +0000375343 00000 n +0000375557 00000 n +0000377006 00000 n +0000377213 00000 n +0000378450 00000 n +0000378629 00000 n +0000379616 00000 n +0000379804 00000 n +0000380936 00000 n +0000381124 00000 n +0000382625 00000 n +0000382813 00000 n +0000383895 00000 n +0000384084 00000 n +0000385416 00000 n +0000385586 00000 n +0000387260 00000 n +0000387439 00000 n +0000389223 00000 n +0000389402 00000 n +0000391047 00000 n +0000391216 00000 n +0000392530 00000 n +0000392718 00000 n +0000394284 00000 n +0000394472 00000 n +0000396091 00000 n +0000396279 00000 n +0000397679 00000 n +0000397849 00000 n +0000399482 00000 n +0000399652 00000 n +0000400665 00000 n +0000400862 00000 n +0000402073 00000 n +0000402277 00000 n +0000403623 00000 n +0000403809 00000 n +0000404285 00000 n 0000404473 00000 n -0000405686 00000 n -0000405890 00000 n -0000407236 00000 n -0000407422 00000 n -0000407898 00000 n -0000408077 00000 n -0000409622 00000 n -0000409801 00000 n -0000411038 00000 n -0000411242 00000 n -0000412654 00000 n -0000412849 00000 n -0000415544 00000 n -0000415720 00000 n -0000416495 00000 n -0000416665 00000 n -0000418173 00000 n -0000418343 00000 n -0000419742 00000 n -0000419912 00000 n -0000421462 00000 n -0000421631 00000 n -0000422595 00000 n -0000422774 00000 n -0000424302 00000 n -0000424490 00000 n -0000425458 00000 n -0000425628 00000 n -0000425958 00000 n -0000426154 00000 n -0000427884 00000 n -0000428098 00000 n -0000429782 00000 n -0000429977 00000 n -0000431684 00000 n -0000431897 00000 n -0000433384 00000 n -0000433579 00000 n -0000435161 00000 n -0000435384 00000 n -0000436749 00000 n -0000436937 00000 n -0000438108 00000 n -0000438305 00000 n -0000439856 00000 n -0000440044 00000 n -0000440688 00000 n -0000440892 00000 n -0000442630 00000 n -0000442818 00000 n -0000444560 00000 n -0000444739 00000 n -0000446137 00000 n -0000446316 00000 n -0000448014 00000 n -0000448193 00000 n -0000449674 00000 n -0000449853 00000 n -0000451637 00000 n -0000451841 00000 n -0000453490 00000 n -0000453549 00000 n -0000453652 00000 n -0000453817 00000 n -0000453899 00000 n -0000454007 00000 n -0000454130 00000 n -0000454242 00000 n -0000454420 00000 n -0000454541 00000 n -0000454701 00000 n -0000454819 00000 n -0000454916 00000 n -0000455068 00000 n -0000455208 00000 n -0000455386 00000 n -0000455541 00000 n -0000455643 00000 n -0000455743 00000 n -0000455952 00000 n -0000456053 00000 n -0000456241 00000 n -0000456384 00000 n -0000456530 00000 n -0000456646 00000 n -0000456813 00000 n -0000456925 00000 n -0000457099 00000 n -0000457202 00000 n -0000457375 00000 n -0000457496 00000 n -0000457626 00000 n -0000457752 00000 n -0000457867 00000 n -0000457975 00000 n -0000458122 00000 n -0000458227 00000 n -0000458346 00000 n -0000458475 00000 n -0000458634 00000 n -0000458768 00000 n -0000458905 00000 n -0000459037 00000 n -0000459186 00000 n -0000459318 00000 n -0000459466 00000 n -0000459580 00000 n -0000459698 00000 n -0000459852 00000 n -0000459983 00000 n -0000460077 00000 n -0000460201 00000 n -0000460313 00000 n -0000460490 00000 n -0000460599 00000 n -0000460724 00000 n -0000460870 00000 n -0000460972 00000 n -0000461148 00000 n -0000461292 00000 n -0000461404 00000 n -0000461531 00000 n -0000461659 00000 n -0000461787 00000 n -0000461898 00000 n -0000462097 00000 n -0000462208 00000 n -0000462323 00000 n -0000462467 00000 n -0000462675 00000 n -0000462809 00000 n -0000462963 00000 n -0000463088 00000 n -0000463219 00000 n -0000463350 00000 n -0000463511 00000 n -0000463632 00000 n -0000463835 00000 n -0000463946 00000 n -0000464061 00000 n -0000464254 00000 n -0000464397 00000 n -0000464513 00000 n +0000405961 00000 n +0000406131 00000 n +0000407638 00000 n +0000407808 00000 n +0000409207 00000 n +0000409377 00000 n +0000410926 00000 n +0000411095 00000 n +0000412058 00000 n +0000412279 00000 n +0000413813 00000 n +0000414034 00000 n +0000415641 00000 n +0000415863 00000 n +0000417113 00000 n +0000417292 00000 n +0000418837 00000 n +0000419016 00000 n +0000420253 00000 n +0000420457 00000 n +0000421869 00000 n +0000422064 00000 n +0000424693 00000 n +0000424869 00000 n +0000425319 00000 n +0000425498 00000 n +0000427026 00000 n +0000427214 00000 n +0000428182 00000 n +0000428352 00000 n +0000428682 00000 n +0000428878 00000 n +0000430608 00000 n +0000430822 00000 n +0000432506 00000 n +0000432701 00000 n +0000434408 00000 n +0000434621 00000 n +0000436109 00000 n +0000436304 00000 n +0000437886 00000 n +0000438109 00000 n +0000439474 00000 n +0000439671 00000 n +0000441208 00000 n +0000441396 00000 n +0000442275 00000 n +0000442479 00000 n +0000444215 00000 n +0000444403 00000 n +0000446145 00000 n +0000446324 00000 n +0000447723 00000 n +0000447902 00000 n +0000449600 00000 n +0000449779 00000 n +0000451259 00000 n +0000451438 00000 n +0000453224 00000 n +0000453428 00000 n +0000455079 00000 n +0000455138 00000 n +0000455241 00000 n +0000455406 00000 n +0000455488 00000 n +0000455596 00000 n +0000455719 00000 n +0000455831 00000 n +0000456009 00000 n +0000456130 00000 n +0000456290 00000 n +0000456408 00000 n +0000456505 00000 n +0000456657 00000 n +0000456797 00000 n +0000456975 00000 n +0000457130 00000 n +0000457232 00000 n +0000457332 00000 n +0000457541 00000 n +0000457642 00000 n +0000457785 00000 n +0000457931 00000 n +0000458047 00000 n +0000458214 00000 n +0000458326 00000 n +0000458500 00000 n +0000458603 00000 n +0000458776 00000 n +0000458897 00000 n +0000459027 00000 n +0000459153 00000 n +0000459268 00000 n +0000459376 00000 n +0000459523 00000 n +0000459628 00000 n +0000459747 00000 n +0000459876 00000 n +0000460035 00000 n +0000460169 00000 n +0000460306 00000 n +0000460438 00000 n +0000460587 00000 n +0000460719 00000 n +0000460867 00000 n +0000460968 00000 n +0000461096 00000 n +0000461214 00000 n +0000461368 00000 n +0000461499 00000 n +0000461645 00000 n +0000461746 00000 n +0000461844 00000 n +0000461968 00000 n +0000462080 00000 n +0000462257 00000 n +0000462366 00000 n +0000462491 00000 n +0000462637 00000 n +0000462739 00000 n +0000462911 00000 n +0000463110 00000 n +0000463221 00000 n +0000463336 00000 n +0000463480 00000 n +0000463688 00000 n +0000463822 00000 n +0000463976 00000 n +0000464101 00000 n +0000464232 00000 n +0000464365 00000 n +0000464496 00000 n 0000464671 00000 n -0000464828 00000 n +0000464806 00000 n 0000464959 00000 n -0000465080 00000 n -0000465257 00000 n -0000465367 00000 n -0000465497 00000 n -0000465667 00000 n -0000465761 00000 n -0000465888 00000 n -0000466015 00000 n -0000466111 00000 n -0000466297 00000 n -0000466423 00000 n -0000466556 00000 n -0000466683 00000 n -0000466795 00000 n -0000466985 00000 n -0000467091 00000 n -0000467297 00000 n -0000467456 00000 n -0000467604 00000 n -0000467732 00000 n -0000467913 00000 n -0000468023 00000 n -0000468138 00000 n -0000468283 00000 n -0000468447 00000 n -0000468597 00000 n -0000468728 00000 n -0000468946 00000 n -0000469051 00000 n -0000469183 00000 n -0000469304 00000 n -0000469470 00000 n -0000469574 00000 n -0000469731 00000 n -0000469842 00000 n -0000469987 00000 n -0000470129 00000 n -0000470279 00000 n -0000470396 00000 n -0000470560 00000 n -0000470671 00000 n -0000470811 00000 n -0000470938 00000 n -0000471055 00000 n -0000471194 00000 n -0000471300 00000 n -0000471434 00000 n -0000471566 00000 n -0000471711 00000 n -0000471838 00000 n -0000471970 00000 n -0000472100 00000 n -0000472225 00000 n -0000472333 00000 n -0000472504 00000 n -0000472608 00000 n -0000472743 00000 n -0000472871 00000 n -0000473045 00000 n -0000473147 00000 n -0000473297 00000 n -0000473447 00000 n -0000473572 00000 n -0000473778 00000 n -0000473878 00000 n -0000473996 00000 n -0000474161 00000 n -0000474252 00000 n -0000474413 00000 n -0000474539 00000 n -0000474682 00000 n -0000474809 00000 n -0000474949 00000 n -0000475085 00000 n -0000475193 00000 n -0000475367 00000 n -0000475473 00000 n -0000475593 00000 n -0000475705 00000 n -0000475822 00000 n -0000475924 00000 n -0000476107 00000 n -0000476238 00000 n -0000476376 00000 n -0000476536 00000 n -0000476676 00000 n -0000476844 00000 n -0000476976 00000 n -0000477094 00000 n -0000477226 00000 n -0000477363 00000 n -0000477495 00000 n -0000477629 00000 n -0000477759 00000 n -0000477927 00000 n -0000478047 00000 n -0000478156 00000 n -0000478348 00000 n -0000478520 00000 n -0000478624 00000 n -0000478748 00000 n -0000478870 00000 n -0000478982 00000 n -0000479164 00000 n -0000479280 00000 n -0000479404 00000 n -0000479522 00000 n -0000479640 00000 n -0000479745 00000 n -0000479922 00000 n -0000480034 00000 n -0000480165 00000 n -0000480289 00000 n -0000480456 00000 n -0000480573 00000 n -0000480703 00000 n -0000480843 00000 n -0000480980 00000 n -0000481116 00000 n -0000481252 00000 n -0000481389 00000 n -0000481501 00000 n -0000481708 00000 n -0000481836 00000 n -0000481921 00000 n -0000482092 00000 n -0000482214 00000 n -0000482374 00000 n -0000482473 00000 n -0000482588 00000 n -0000482690 00000 n -0000482851 00000 n -0000482955 00000 n -0000483054 00000 n -0000483218 00000 n -0000483322 00000 n -0000483455 00000 n -0000483587 00000 n -0000483709 00000 n -0000483838 00000 n -0000483945 00000 n -0000484111 00000 n -0000484233 00000 n -0000484343 00000 n -0000484457 00000 n -0000484632 00000 n -0000484735 00000 n -0000484855 00000 n -0000484970 00000 n -0000485084 00000 n -0000485199 00000 n -0000485313 00000 n -0000485428 00000 n -0000485546 00000 n -0000485663 00000 n -0000485769 00000 n -0000485930 00000 n -0000486026 00000 n -0000486140 00000 n -0000486250 00000 n -0000486381 00000 n -0000486514 00000 n -0000486615 00000 n -0000486793 00000 n -0000486903 00000 n -0000487057 00000 n -0000487226 00000 n -0000487414 00000 n -0000487595 00000 n -0000487751 00000 n -0000487917 00000 n -0000488049 00000 n -0000488196 00000 n -0000488335 00000 n -0000488469 00000 n -0000488593 00000 n -0000488714 00000 n -0000488833 00000 n -0000489003 00000 n -0000489165 00000 n -0000489271 00000 n -0000489388 00000 n -0000489539 00000 n -0000489704 00000 n -0000489829 00000 n -0000489985 00000 n -0000490103 00000 n -0000490233 00000 n -0000490397 00000 n -0000490501 00000 n -0000490619 00000 n -0000490737 00000 n +0000465104 00000 n +0000465329 00000 n +0000465440 00000 n +0000465555 00000 n +0000465748 00000 n +0000465891 00000 n +0000466007 00000 n +0000466165 00000 n +0000466322 00000 n +0000466453 00000 n +0000466574 00000 n +0000466751 00000 n +0000466885 00000 n +0000467033 00000 n +0000467151 00000 n +0000467281 00000 n +0000467451 00000 n +0000467545 00000 n +0000467672 00000 n +0000467799 00000 n +0000467895 00000 n +0000468081 00000 n +0000468207 00000 n +0000468342 00000 n +0000468475 00000 n +0000468602 00000 n +0000468714 00000 n +0000468906 00000 n +0000469004 00000 n +0000469190 00000 n +0000469294 00000 n +0000469418 00000 n +0000469540 00000 n +0000469652 00000 n +0000469848 00000 n +0000469964 00000 n +0000470088 00000 n +0000470206 00000 n +0000470324 00000 n +0000470429 00000 n +0000470618 00000 n +0000470841 00000 n +0000470980 00000 n +0000471143 00000 n +0000471280 00000 n +0000471383 00000 n +0000471589 00000 n +0000471748 00000 n +0000471896 00000 n +0000472024 00000 n +0000472205 00000 n +0000472315 00000 n +0000472430 00000 n +0000472575 00000 n +0000472739 00000 n +0000472889 00000 n +0000473107 00000 n +0000473212 00000 n +0000473344 00000 n +0000473465 00000 n +0000473672 00000 n +0000473800 00000 n +0000473885 00000 n +0000474051 00000 n +0000474155 00000 n +0000474312 00000 n +0000474423 00000 n +0000474568 00000 n +0000474710 00000 n +0000474860 00000 n +0000474977 00000 n +0000475141 00000 n +0000475252 00000 n +0000475392 00000 n +0000475519 00000 n +0000475636 00000 n +0000475775 00000 n +0000475881 00000 n +0000476015 00000 n +0000476147 00000 n +0000476292 00000 n +0000476419 00000 n +0000476551 00000 n +0000476681 00000 n +0000476806 00000 n +0000476914 00000 n +0000477085 00000 n +0000477189 00000 n +0000477324 00000 n +0000477452 00000 n +0000477626 00000 n +0000477728 00000 n +0000477878 00000 n +0000478028 00000 n +0000478153 00000 n +0000478359 00000 n +0000478459 00000 n +0000478577 00000 n +0000478742 00000 n +0000478833 00000 n +0000478994 00000 n +0000479120 00000 n +0000479263 00000 n +0000479390 00000 n +0000479530 00000 n +0000479666 00000 n +0000479774 00000 n +0000479948 00000 n +0000480054 00000 n +0000480174 00000 n +0000480286 00000 n +0000480403 00000 n +0000480505 00000 n +0000480682 00000 n +0000480794 00000 n +0000480925 00000 n +0000481049 00000 n +0000481216 00000 n +0000481333 00000 n +0000481463 00000 n +0000481603 00000 n +0000481740 00000 n +0000481876 00000 n +0000482012 00000 n +0000482149 00000 n +0000482261 00000 n +0000482432 00000 n +0000482554 00000 n +0000482714 00000 n +0000482813 00000 n +0000482928 00000 n +0000483030 00000 n +0000483191 00000 n +0000483295 00000 n +0000483394 00000 n +0000483525 00000 n +0000483700 00000 n +0000483803 00000 n +0000483923 00000 n +0000484038 00000 n +0000484152 00000 n +0000484267 00000 n +0000484381 00000 n +0000484496 00000 n +0000484614 00000 n +0000484731 00000 n +0000484837 00000 n +0000485015 00000 n +0000485118 00000 n +0000485274 00000 n +0000485382 00000 n +0000485508 00000 n +0000485628 00000 n +0000485729 00000 n +0000485836 00000 n +0000486000 00000 n +0000486104 00000 n +0000486237 00000 n +0000486369 00000 n +0000486491 00000 n +0000486620 00000 n +0000486727 00000 n +0000486893 00000 n +0000487015 00000 n +0000487125 00000 n +0000487239 00000 n +0000487400 00000 n +0000487496 00000 n +0000487610 00000 n +0000487720 00000 n +0000487851 00000 n +0000487984 00000 n +0000488085 00000 n +0000488263 00000 n +0000488373 00000 n +0000488527 00000 n +0000488696 00000 n +0000488884 00000 n +0000489065 00000 n +0000489221 00000 n +0000489387 00000 n +0000489519 00000 n +0000489666 00000 n +0000489805 00000 n +0000489939 00000 n +0000490063 00000 n +0000490184 00000 n +0000490303 00000 n +0000490473 00000 n +0000490635 00000 n +0000490741 00000 n 0000490858 00000 n -0000490994 00000 n -0000491093 00000 n -0000491248 00000 n -0000491352 00000 n -0000491469 00000 n -0000491619 00000 n -0000491719 00000 n -0000491833 00000 n -0000491947 00000 n -0000492061 00000 n -0000492175 00000 n -0000492289 00000 n -0000492403 00000 n -0000492517 00000 n -0000492631 00000 n -0000492747 00000 n -0000492849 00000 n -0000492963 00000 n +0000491009 00000 n +0000491136 00000 n +0000491292 00000 n +0000491410 00000 n +0000491540 00000 n +0000491704 00000 n +0000491808 00000 n +0000491926 00000 n +0000492044 00000 n +0000492165 00000 n +0000492301 00000 n +0000492400 00000 n +0000492555 00000 n +0000492659 00000 n +0000492776 00000 n +0000492926 00000 n +0000493026 00000 n +0000493140 00000 n +0000493254 00000 n +0000493368 00000 n +0000493482 00000 n +0000493596 00000 n +0000493710 00000 n +0000493824 00000 n +0000493938 00000 n +0000494054 00000 n +0000494156 00000 n +0000494270 00000 n trailer -<]>> +<<44d39a97f681ab9eaa30845c7407c375>]>> startxref -493959 +495224 %%EOF diff --git a/docs/announce b/docs/announce index 7310bdd7373..f5716556ba0 100644 --- a/docs/announce +++ b/docs/announce @@ -1,6 +1,3 @@ -This document is out of date - - Announcing Samba version 2.2 ============================ diff --git a/docs/docbook/Makefile.in b/docs/docbook/Makefile.in index dae5b81e712..ae24606caf7 100644 --- a/docs/docbook/Makefile.in +++ b/docs/docbook/Makefile.in @@ -21,9 +21,7 @@ MANPAGES_NAMES=findsmb.1 smbclient.1 \ smbpasswd.8 testprns.1 \ smb.conf.5 wbinfo.1 pdbedit.8 \ smbcacls.1 smbsh.1 winbindd.8 \ - smbgroupedit.8 vfstest.1 \ - profiles.1 smbtree.1 ntlm_auth.1 \ - editreg.1 + smbgroupedit.8 vfstest.1 ## This part contains only rules. You shouldn't need to change it ## if you are adding docs @@ -85,9 +83,9 @@ $(TXTDIR)/Samba-HOWTO-Collection.txt: $(PROJDOC)/samba-doc.sgml $(DOCBOOK2TXT) -o . $< mv ./samba-doc.txt $@ -$(TXTDIR)/Samba-Developers-Guide.txt: $(DEVDOC)/dev-doc.sgml +$(TXTDIR)/Samba-Developers-Guide.txt: $(PROJDOC)/samba-doc.sgml $(DOCBOOK2TXT) -o . $< - mv ./dev-doc.txt $@ + mv ./samba-doc.txt $@ # PostScript @@ -95,9 +93,9 @@ $(PSDIR)/Samba-HOWTO-Collection.ps: $(PROJDOC)/samba-doc.sgml $(DOCBOOK2PS) -o . $< mv ./samba-doc.ps $@ -$(PSDIR)/Samba-Developers-Guide.ps: $(DEVDOC)/dev-doc.sgml +$(PSDIR)/Samba-Developers-Guide.ps: $(PROJDOC)/samba-doc.sgml $(DOCBOOK2PS) -o . $< - mv ./dev-doc.ps $@ + mv ./samba-doc.ps $@ # Adobe PDF files diff --git a/docs/docbook/configure b/docs/docbook/configure index 8680e5b5abd..609c17ed87f 100755 --- a/docs/docbook/configure +++ b/docs/docbook/configure @@ -557,13 +557,10 @@ else echo "$ac_t""no" 1>&6 fi -if test "x$JW" = x; then - { echo "configure: error: "jw is required"" 1>&2; exit 1; } -fi # Extract the first word of "perl", so it can be a program name with args. set dummy perl; ac_word=$2 echo $ac_n "checking for $ac_word""... $ac_c" 1>&6 -echo "configure:567: checking for $ac_word" >&5 +echo "configure:564: checking for $ac_word" >&5 if eval "test \"`echo '$''{'ac_cv_path_PERL'+set}'`\" = set"; then echo $ac_n "(cached) $ac_c" 1>&6 else @@ -595,13 +592,10 @@ else echo "$ac_t""no" 1>&6 fi -if test "x$PERL" = x; then - { echo "configure: error: "perl is required"" 1>&2; exit 1; } -fi # Extract the first word of "htmldoc", so it can be a program name with args. set dummy htmldoc; ac_word=$2 echo $ac_n "checking for $ac_word""... $ac_c" 1>&6 -echo "configure:605: checking for $ac_word" >&5 +echo "configure:599: checking for $ac_word" >&5 if eval "test \"`echo '$''{'ac_cv_path_HTMLDOC'+set}'`\" = set"; then echo $ac_n "(cached) $ac_c" 1>&6 else @@ -633,9 +627,6 @@ else echo "$ac_t""no" 1>&6 fi -if test "x$HTMLDOC" = x; then - { echo "configure: error: "htmldoc is required"" 1>&2; exit 1; } -fi DOC_BUILD_DATE=`date '+%d-%m-%Y'` diff --git a/docs/docbook/configure.in b/docs/docbook/configure.in index 57482d134e5..3a9ed51d163 100644 --- a/docs/docbook/configure.in +++ b/docs/docbook/configure.in @@ -1,18 +1,8 @@ AC_INIT(global.ent) -# Jade wrapper AC_PATH_PROG(JW, jw) -if test "x$JW" = x; then - AC_MSG_ERROR("jw is required") -fi AC_PATH_PROG(PERL, perl) -if test "x$PERL" = x; then - AC_MSG_ERROR("perl is required") -fi AC_PATH_PROG(HTMLDOC, htmldoc) -if test "x$HTMLDOC" = x; then - AC_MSG_ERROR("htmldoc is required") -fi DOC_BUILD_DATE=`date '+%d-%m-%Y'` AC_SUBST(DOC_BUILD_DATE) diff --git a/docs/docbook/devdoc/dev-doc.sgml b/docs/docbook/devdoc/dev-doc.sgml index 5e1af3d3a03..e256dbe3a2c 100644 --- a/docs/docbook/devdoc/dev-doc.sgml +++ b/docs/docbook/devdoc/dev-doc.sgml @@ -12,9 +12,6 @@ - - - ]> @@ -69,8 +66,5 @@ url="http://www.fsf.org/licenses/gpl.txt">http://www.fsf.org/licenses/gpl.txt diff --git a/docs/docbook/devdoc/modules.sgml b/docs/docbook/devdoc/modules.sgml deleted file mode 100644 index 0bcdadc66ce..00000000000 --- a/docs/docbook/devdoc/modules.sgml +++ /dev/null @@ -1,156 +0,0 @@ - - - - JelmerVernooij - - Samba Team -

jelmer@samba.org
- - - 19 March 2003 - - -Modules - - -Advantages - - -The new modules system has the following advantages: - - - -Transparent loading of static and shared modules (no need -for a subsystem to know about modules) -Simple selection between shared and static modules at configure time -"preload modules" option for increasing performance for stable modules -No nasty #define stuff anymore -All backends are available as plugin now (including pdb_ldap and pdb_tdb) - - - - -Loading modules - - -Some subsystems in samba use different backends. These backends can be -either statically linked in to samba or available as a plugin. A subsystem -should have a function that allows a module to register itself. For example, -the passdb subsystem has: - - - -BOOL smb_register_passdb(const char *name, pdb_init_function init, int version); - - - -This function will be called by the initialisation function of the module to -register itself. - - - -Static modules - - -The modules system compiles a list of initialisation functions for the -static modules of each subsystem. This is a define. For example, -it is here currently (from include/config.h): - - - -/* Static init functions */ -#define static_init_pdb { pdb_mysql_init(); pdb_ldap_init(); pdb_smbpasswd_init(); pdb_tdbsam_init(); pdb_guest_init();} - - - -These functions should be called before the subsystem is used. That -should be done when the subsystem is initialised or first used. - - - - - -Shared modules - - -If a subsystem needs a certain backend, it should check if it has -already been registered. If the backend hasn't been registered already, -the subsystem should call smb_probe_module(char *subsystem, char *backend). -This function tries to load the correct module from a certain path -($LIBDIR/subsystem/backend.so). If the first character in 'backend' -is a slash, smb_probe_module() tries to load the module from the -absolute path specified in 'backend'. - - -After smb_probe_module() has been executed, the subsystem -should check again if the module has been registered. - - - - - - -Writing modules - - -Each module has an initialisation function. For modules that are -included with samba this name is 'subsystem_backend_init'. For external modules (that will never be built-in, but only available as a module) this name is always 'init_module'. (In the case of modules included with samba, the configure system will add a #define subsystem_backend_init() init_module()). -The prototype for these functions is: - - - -int init_module(void); - - -This function should call one or more -registration functions. The function should return non-zero on success and zero on -failure. - -For example, pdb_ldap_init() contains: - - -int pdb_ldap_init(void) -{ - smb_register_passdb("ldapsam", pdb_init_ldapsam, PASSDB_INTERFACE_VERSION); - smb_register_passdb("ldapsam_nua", pdb_init_ldapsam_nua, PASSDB_INTERFACE_VERSION); - return TRUE; -} - - - -Static/Shared selection in configure.in - - -Some macros in configure.in generate the various defines and substs that -are necessary for the system to work correct. All modules that should -be built by default have to be added to the variable 'default_modules'. -For example, if ldap is found, pdb_ldap is added to this variable. - - - -On the bottom of configure.in, SMB_MODULE() should be called -for each module and SMB_SUBSYSTEM() for each subsystem. - - -Syntax: - - -SMB_MODULE(subsystem_backend, object files, plugin name, subsystem name, static_action, shared_action) -SMB_SUBSYSTEM(subsystem) - - -Also, make sure to add the correct directives to -Makefile.in. @SUBSYSTEM_STATIC@ -will be replaced with a list of objects files of the modules that need to -be linked in statically. @SUBSYSTEM_MODULES@ will -be replaced with the names of the plugins to build. - - -You must make sure all .c files that contain defines that can -be changed by ./configure are rebuilded in the 'modules_clean' make target. -Practically, this means all c files that contain static_init_subsystem; calls need to be rebuilded. - - - - - diff --git a/docs/docbook/devdoc/packagers.sgml b/docs/docbook/devdoc/packagers.sgml deleted file mode 100644 index fb47c7305c3..00000000000 --- a/docs/docbook/devdoc/packagers.sgml +++ /dev/null @@ -1,40 +0,0 @@ - - - - JelmerVernooij - - - -Notes to packagers - - -Versioning - -Please, please update the version number in -source/include/version.h to include the versioning of your package. This makes it easier to distinguish standard samba builds -from custom-build samba builds (distributions often patch packages). For -example, a good version would be: - - -Version 2.999+3.0.alpha21-5 for Debian - - - - - -Modules - -Samba now has support for building parts of samba as plugins. This -makes it possible to, for example, put ldap or mysql support in a seperate -package, thus making it possible to have a normal samba package not -depending on ldap or mysql. To build as much parts of samba -as a plugin, run: - - -./configure --with-shared-modules=rpc,vfs,auth,pdb,charset - - - - - - diff --git a/docs/docbook/devdoc/rpc_plugin.sgml b/docs/docbook/devdoc/rpc_plugin.sgml deleted file mode 100644 index c83742a2476..00000000000 --- a/docs/docbook/devdoc/rpc_plugin.sgml +++ /dev/null @@ -1,83 +0,0 @@ - - - - AnthonyLiguori - - IBM -
aliguor@us.ibm.com
-
-
- - JelmerVernooij - - Samba Team -
jelmer@samba.org
-
-
- January 2003 -
- -RPC Pluggable Modules - - -About - - -This document describes how to make use the new RPC Pluggable Modules features -of Samba 3.0. This architecture was added to increase the maintainability of -Samba allowing RPC Pipes to be worked on separately from the main CVS branch. -The RPM architecture will also allow third-party vendors to add functionality -to Samba through plug-ins. - - - - - -General Overview - - -When an RPC call is sent to smbd, smbd tries to load a shared library by the -name librpc_<pipename>.so to handle the call if -it doesn't know how to handle the call internally. For instance, LSA calls -are handled by librpc_lsass.so.. -These shared libraries should be located in the <sambaroot>/lib/rpc. smbd then attempts to call the init_module function within -the shared library. Check the chapter on modules for more information. - - - -In the init_module function, the library should call -rpc_pipe_register_commands(). This function takes the following arguments: - - - -int rpc_pipe_register_commands(const char *clnt, const char *srv, - const struct api_struct *cmds, int size); - - - - -clnt -the Client name of the named pipe - - -srv -the Server name of the named pipe - - -cmds -a list of api_structs that map RPC ordinal numbers to function calls - - -size -the number of api_structs contained in cmds - - - - - -See rpc_server/srv_reg.c and rpc_server/srv_reg_nt.c for a small example of -how to use this library. - - - -
diff --git a/docs/docbook/faq/clientapp.sgml b/docs/docbook/faq/clientapp.sgml index 3d44dd44c03..6d687bf772f 100644 --- a/docs/docbook/faq/clientapp.sgml +++ b/docs/docbook/faq/clientapp.sgml @@ -1,8 +1,8 @@ - + Specific client application problems -MS Office Setup reports "Cannot change properties of '\\MSOFFICE\\SETUP.INI'" +MS Office Setup reports "Cannot change properties of '\MSOFFICE\SETUP.INI'" When installing MS Office on a Samba drive for which you have admin user permissions, ie. admin users = username, you will find the @@ -60,16 +60,16 @@ set the following parameters on the share containing it: -[MSOP95] - path = /where_you_put_it - comment = Your comment - volume = "The_CD_ROM_Label" - read only = yes - available = yes - share modes = no - locking = no - browseable = yes - public = yes + [MSOP95] + path = /where_you_put_it + comment = Your comment + volume = "The_CD_ROM_Label" + read only = yes + available = yes + share modes = no + locking = no + browseable = yes + public = yes diff --git a/docs/docbook/faq/config.sgml b/docs/docbook/faq/config.sgml index db27102cdf2..78f73252a23 100644 --- a/docs/docbook/faq/config.sgml +++ b/docs/docbook/faq/config.sgml @@ -1,4 +1,4 @@ - + Configuration problems @@ -8,18 +8,4 @@ When you have a user in 'admin users', samba will always do file operations for this user as 'root', even if 'force user' has been set. - - -I have just installed samba and I'm trying to log in from Windows, but samba refuses all logins! - - -Newer windows clients(NT4, 2000, XP) send encrypted passwords. Samba can't compare these -passwords to the unix password database, so it needs it's own user database. You can -add users to this database using "smbpasswd -a user-name". - - - -See also the "User database" chapter of the samba HOWTO Collection. - - diff --git a/docs/docbook/faq/errors.sgml b/docs/docbook/faq/errors.sgml index 97619ce704c..6476ec064e4 100644 --- a/docs/docbook/faq/errors.sgml +++ b/docs/docbook/faq/errors.sgml @@ -1,4 +1,4 @@ - + Common errors @@ -50,6 +50,7 @@ Windows NT in the chapter "Portability" of the samba HOWTO collection + @@ -63,6 +64,7 @@ It also ignores the "-N" argument when querying some (but not all) of our NT servers. + No, it does not ignore -N, it is just that your server rejected the null password in the connection, so smbclient prompts for a password diff --git a/docs/docbook/faq/features.sgml b/docs/docbook/faq/features.sgml index 66b05379cce..bc1081e5c02 100644 --- a/docs/docbook/faq/features.sgml +++ b/docs/docbook/faq/features.sgml @@ -1,4 +1,4 @@ - + Features @@ -83,7 +83,9 @@ manual carefully. Tools for printing faxes Your incomed faxes are in: -/var/spool/fax/incoming. Print it with: +/var/spool/fax/incoming + +print it with: for i in * diff --git a/docs/docbook/faq/general.sgml b/docs/docbook/faq/general.sgml index 3f7c2074f95..38bcdf49e37 100644 --- a/docs/docbook/faq/general.sgml +++ b/docs/docbook/faq/general.sgml @@ -1,4 +1,4 @@ - + General Information diff --git a/docs/docbook/faq/install.sgml b/docs/docbook/faq/install.sgml index f8341dc65ac..88520fc71d4 100644 --- a/docs/docbook/faq/install.sgml +++ b/docs/docbook/faq/install.sgml @@ -1,4 +1,4 @@ - + Compiling and installing Samba on a Unix host @@ -22,7 +22,7 @@ client to client - check your client's documentation. -Some files that I KNOW are on the server don't show up when I view the files from my client! +Some files that I KNOW are on the server doesn't show up when I view the files from my client! See the next question. diff --git a/docs/docbook/faq/printing.sgml b/docs/docbook/faq/printing.sgml deleted file mode 100644 index 4a58c385bb2..00000000000 --- a/docs/docbook/faq/printing.sgml +++ /dev/null @@ -1,37 +0,0 @@ - - - - RonanWaide - - - -Printing problems - - -setdriver or cupsaddsmb failes - -setdriver expects the following setup: - - -you are a printer admin, or root. this is the smb.conf printer admin group, not the Printer Operators group in NT. I've not tried the latter, but I don't believe it will work based on the current code. -printer admins has to be defined in [global] -upload the driver files to \\server\print$\w32x86 and win40 as appropriate. DON'T put them in the 0 or 2 subdirectories. -Make sure that the user you're connecting as is able to write to the print$ directories -Use adddriver (with appropriate parameters) to create the driver. note, this will not just update samba's notion of drivers, it will also move the files from the w32x86 and win40 directories to an appropriate subdirectory (based on driver version, I think, but not important enough for me to find out) -Use setdriver to associate the driver with a printer - - - - -The setdriver call will fail if the printer doesn't already exist in -samba's view of the world. Either create the printer in cups and -restart samba, or create an add printer command (see smb.conf doco) -and use RPC calls to create a printer. NB the add printer command MUST -return a single line of text indicating which port the printer was -added on. If it doesn't, Samba won't reload the printer -definitions. Although samba doesn't really support the notion of -ports, suitable add printer command and enumport command settings can -allow you pretty good remote control of the samba printer setup. - - - diff --git a/docs/docbook/faq/sambafaq.sgml b/docs/docbook/faq/sambafaq.sgml index 2cc7d466fd5..e9e5ed7a3c7 100644 --- a/docs/docbook/faq/sambafaq.sgml +++ b/docs/docbook/faq/sambafaq.sgml @@ -5,7 +5,6 @@ - ]> @@ -35,5 +34,4 @@ and the old samba text documents which were mostly written by John Terpstra. &clientapp; &errors; &features; -&printing; diff --git a/docs/docbook/global.ent b/docs/docbook/global.ent index 5f89a97593e..46745c27738 100644 --- a/docs/docbook/global.ent +++ b/docs/docbook/global.ent @@ -6,7 +6,6 @@ - @@ -31,9 +30,8 @@ - - -d|--debug=debuglevel @@ -61,6 +59,13 @@ level parameter in the '> + +-h|--help +Print a summary of command line options. + +'> + -s <configuration file> @@ -77,218 +82,7 @@ compile time. --V +-v Prints the version number for smbd. '> - - --l|--logfile=logbasename -File name for log/debug files. The extension -".client" will be appended. The log file is -never removed by the client. - -'> - - - - --R <name resolve order> -This option is used to determine what naming -services and in what order to resolve -host names to IP addresses. The option takes a space-separated -string of different name resolution options. - -The options are: "lmhosts", "host", "wins" and "bcast". -They cause names to be resolved as follows : - - -lmhosts: -Lookup an IP address in the Samba lmhosts file. If the -line in lmhosts has no name type attached to the -NetBIOS name -(see the lmhosts - 5 for details) -then any name type matches for lookup. - - -host: -Do a standard host name to IP address resolution, using -the system /etc/hosts, NIS, or DNS -lookups. This method of name resolution is operating -system dependent, for instance on IRIX or Solaris this -may be controlled by the /etc/nsswitch.conf - file). Note that this method is only used -if the NetBIOS name type being queried is the 0x20 -(server) name type, otherwise it is ignored. - - -wins: -Query a name with the IP address listed in the -wins server parameter. If no -WINS server has been specified this method will be -ignored. - - -bcast: -Do a broadcast on each of the known local interfaces -listed in the interfaces -parameter. This is the least reliable of the name -resolution methods as it depends on the target host -being on a locally connected subnet. - - - -If this parameter is not set then the name resolve order -defined in the smb.conf -5 file parameter -(name resolve order) will be used. - -The default order is lmhosts, host, wins, bcast. Without -this parameter or any entry in the name resolve order - parameter of the smb.conf -5 file, the name resolution methods -will be attempted in this order. -'> - - --n <primary NetBIOS name> -This option allows you to override -the NetBIOS name that Samba uses for itself. This is identical -to setting the NetBIOS -name parameter in the smb.conf -5 file. However, a command -line setting will take precedence over settings in -smb.conf -5. -'> - - --i <scope> -This specifies a NetBIOS scope that -nmblookup will use to communicate with when -generating NetBIOS names. For details on the use of NetBIOS -scopes, see rfc1001.txt and rfc1002.txt. NetBIOS scopes are -very rarely used, only set this parameter -if you are the system administrator in charge of all the -NetBIOS systems you communicate with. -'> - - --W|--workgroup=domain -Set the SMB domain of the username. This -overrides the default domain which is the domain defined in -smb.conf. If the domain specified is the same as the servers -NetBIOS name, it causes the client to log on using the servers local -SAM (as opposed to the Domain SAM). -'> - - --O socket options -TCP socket options to set on the client -socket. See the socket options parameter in -the smb.conf -5 manual page for the list of valid -options. - -'> - - - - --N -If specified, this parameter suppresses the normal -password prompt from the client to the user. This is useful when -accessing a service that does not require a password. - -Unless a password is specified on the command line or -this parameter is specified, the client will request a -password. -'> - - --U|--user=username[%password] -Sets the SMB username or username and password. - -If %password is not specified, the user will be prompted. The -client will first check the USER environment variable, then the -LOGNAME variable and if either exists, the -string is uppercased. If these environmental variables are not -found, the username GUEST is used. - -A third option is to use a credentials file which -contains the plaintext of the username and password. This -option is mainly provided for scripts where the admin does not -wish to pass the credentials on the command line or via environment -variables. If this method is used, make certain that the permissions -on the file restrict access from unwanted users. See the --A for more details. - -Be cautious about including passwords in scripts. Also, on -many systems the command line of a running process may be seen -via the ps command. To be safe always allow -rpcclient to prompt for a password and type -it in directly. - -'> - - --A|--authfile=filename -This option allows -you to specify a file from which to read the username and -password used in the connection. The format of the file is - - - -username = <value> -password = <value> -domain = <value> - - -Make certain that the permissions on the file restrict -access from unwanted users. -'> - - --k - -Try to authenticate with kerberos. Only useful in -an Active Directory environment. - - -'> - - - --h|--help -Print a summary of command line options. - -'> - - diff --git a/docs/docbook/manpages/editreg.1.sgml b/docs/docbook/manpages/editreg.1.sgml deleted file mode 100644 index 22c3c3e7596..00000000000 --- a/docs/docbook/manpages/editreg.1.sgml +++ /dev/null @@ -1,85 +0,0 @@ - %globalentities; -]> - - - - editreg - 1 - - - - - editreg - A utility to report and change SIDs in registry files - - - - - - editreg - -v - -c file - file - - - - - DESCRIPTION - - This tool is part of the Samba - 7 suite. - - editreg is a utility that - can visualize windows registry files (currently only NT4) and apply - so-called commandfiles to them. - - - - - - OPTIONS - - - - registry_file - Registry file to view or edit. - - - - - -v,--verbose - Increases verbosity of messages. - - - - - -c commandfile - Read commands to execute on registry_file from commandfile. Currently not yet supported! - - - - &stdarg.help; - - - - - - VERSION - - This man page is correct for version 3.0 of the Samba - suite. - - - - AUTHOR - - The original Samba software and related utilities - were created by Andrew Tridgell. Samba is now developed - by the Samba Team as an Open Source project similar - to the way the Linux kernel is developed. - - The editreg man page was written by Jelmer Vernooij. - - - diff --git a/docs/docbook/manpages/findsmb.1.sgml b/docs/docbook/manpages/findsmb.1.sgml index 090b1c8388d..0b3bbca0176 100644 --- a/docs/docbook/manpages/findsmb.1.sgml +++ b/docs/docbook/manpages/findsmb.1.sgml @@ -1,5 +1,5 @@ - + findsmb @@ -23,16 +23,15 @@ DESCRIPTION - This perl script is part of the - Samba7 - suite. + This perl script is part of the + Samba suite. findsmb is a perl script that prints out several pieces of information about machines on a subnet that respond to SMB name query requests. - It uses nmblookup1 - and smbclient1 - to obtain this information. + It uses + nmblookup(1) and + smbclient(1) to obtain this information. @@ -46,17 +45,16 @@ bugs in Windows95 into account when trying to find a Netbios name registered of the remote machine. This option is disabled by default because it is specific to Windows 95 and Windows 95 machines only. - If set, nmblookup1 + If set, nmblookup will be called with -B option. subnet broadcast address Without this option, findsmb will probe the subnet of the machine where - findsmb1 - is run. This value is passed to - nmblookup1 - as part of the -B option. + findsmb is run. This value is passed + to nmblookup as part of the + -B option. @@ -78,21 +76,19 @@ version. The command with -r option - must be run on a system without - nmbd8 - running. - + must be run on a system without nmbd running. If nmbd is running on the system, you will only get the IP address and the DNS name of the machine. To get proper responses from Windows 95 and Windows 98 machines, the command must be run as root and with -r option on a machine without nmbd running. - For example, running findsmb - without -r option set would yield output similar + For example, running findsmb without + -r option set would yield output similar to the following - + IP ADDR NETBIOS NAME WORKGROUP/OS/VERSION --------------------------------------------------------------------- 192.168.35.10 MINESET-TEST1 [DMVENGR] @@ -105,7 +101,7 @@ IP ADDR NETBIOS NAME WORKGROUP/OS/VERSION 192.168.35.88 SCNT2 +[MVENGR] [Windows NT 4.0] [NT LAN Manager 4.0] 192.168.35.93 FROGSTAR-PC [MVENGR] [Windows 5.0] [Windows 2000 LAN Manager] 192.168.35.97 HERBNT1 *[HERB-NT] [Windows NT 4.0] [NT LAN Manager 4.0] - + @@ -119,12 +115,10 @@ IP ADDR NETBIOS NAME WORKGROUP/OS/VERSION SEE ALSO - - nmbd8 - , - smbclient1 - , and nmblookup - 1 + nmbd(8), + smbclient(1) + , and + nmblookup(1) @@ -138,11 +132,11 @@ IP ADDR NETBIOS NAME WORKGROUP/OS/VERSION The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) - and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook - XML 4.2 for Samba 3.0 was done by Alexander Bokovoy. + excellent piece of Open Source software, available at + + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 + release by Jeremy Allison. The conversion to DocBook for + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/lmhosts.5.sgml b/docs/docbook/manpages/lmhosts.5.sgml index a8a5f2c0728..7934c18e8ec 100644 --- a/docs/docbook/manpages/lmhosts.5.sgml +++ b/docs/docbook/manpages/lmhosts.5.sgml @@ -1,5 +1,5 @@ - + lmhosts @@ -13,15 +13,15 @@ - lmhosts is the Samba - 7 NetBIOS name to IP address mapping file. + lmhosts is the + Samba NetBIOS name to IP address mapping file. DESCRIPTION - This file is part of the Samba - 7 suite. + This file is part of the + Samba suite. lmhosts is the Samba NetBIOS name to IP address mapping file. It @@ -35,7 +35,7 @@ It is an ASCII file containing one line for NetBIOS name. The two fields on each line are separated from each other by white space. Any entry beginning with '#' is ignored. Each line - in the lmhosts file contains the following information: + in the lmhosts file contains the following information : IP Address - in dotted decimal format. @@ -52,16 +52,16 @@ - An example follows: + An example follows : - + # # Sample Samba lmhosts file. # 192.9.200.1 TESTPC 192.9.200.20 NTSERVER#20 192.9.200.21 SAMBASERVER - + Contains three IP to NetBIOS name mappings. The first and third will be returned for any queries for the names "TESTPC" @@ -73,24 +73,24 @@ be resolved. The default location of the lmhosts file - is in the same directory as the smb.conf - 5 file. + is in the same directory as the + smb.conf(5)> file. VERSION - This man page is correct for version 3.0 of the Samba suite. + This man page is correct for version 2.2 of + the Samba suite. SEE ALSO - - smbclient1 - , smb.conf5 - , and smbpasswd - 8 + smbclient(1) + , + smb.conf(5), and + smbpasswd(8) @@ -108,8 +108,7 @@ ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook - XML 4.2 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/net.8.sgml b/docs/docbook/manpages/net.8.sgml index 62cee8c1d72..aab9032f147 100644 --- a/docs/docbook/manpages/net.8.sgml +++ b/docs/docbook/manpages/net.8.sgml @@ -1,5 +1,5 @@ - + net @@ -42,8 +42,8 @@ DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. The samba net utility is meant to work just like the net utility available for windows and DOS. @@ -65,8 +65,7 @@ -w target-workgroup - Sets target workgroup or domain. You have to specify - either this option or the IP address or the name of a server. + Sets target workgroup or domain. You have to specify either this option or the IP address or the name of a server. @@ -87,8 +86,7 @@ -I ip-address - IP address of target server to use. You have to - specify either this option or a target workgroup or a target server. + IP address of target server to use. You have to specify either this option or a target workgroup or a target server. @@ -116,8 +114,7 @@ -S server - Name of target server. You should specify either - this option or a target workgroup or a target IP address. + Name of target server. You should specify either this option or a target workgroup or a target IP address. @@ -214,7 +211,7 @@ SYSTEM - Displays the time on the remote server in a format ready for /bin/date + Displays the time on the remote server in a format ready for /bin/date @@ -222,7 +219,7 @@ SET Tries to set the date and time of the local server to that on - the remote server using /bin/date. + the remote server using /bin/date. @@ -279,7 +276,7 @@ - USER ADD <name> [password] [-F user flags] [misc. options] + USER ADD <name> [password] [-F user flags] [misc. options Add specified user diff --git a/docs/docbook/manpages/nmbd.8.sgml b/docs/docbook/manpages/nmbd.8.sgml index f2b4ac5a05a..db920c79a1c 100644 --- a/docs/docbook/manpages/nmbd.8.sgml +++ b/docs/docbook/manpages/nmbd.8.sgml @@ -1,7 +1,5 @@ - %globalentities; -]> - + + nmbd @@ -37,8 +35,7 @@ DESCRIPTION - This program is part of the Samba - 7 suite. + This program is part of the Samba suite. nmbd is a server that understands and can reply to NetBIOS over IP name service requests, like @@ -60,8 +57,8 @@ option (see OPTIONS below). Thus nmbd will reply to broadcast queries for its own name(s). Additional names for nmbd to respond on can be set - via parameters in the smb.conf - 5 configuration file. + via parameters in the + smb.conf(5) configuration file. nmbd can also be used as a WINS (Windows Internet Name Server) server. What this basically means @@ -113,6 +110,13 @@ than a file. + + -a + If this parameter is specified, each new + connection will append log messages to the log file. + This is the default. + + -i If this parameter is specified it causes the @@ -120,21 +124,33 @@ server is executed on the command line of a shell. Setting this parameter negates the implicit daemon mode when run from the command line. nmbd also logs to standard - output, as if the -S parameter had been + output, as if the -S parameter had been given. - &stdarg.help; + + -o + If this parameter is specified, the + log files will be overwritten when opened. By default, + smbd will append entries to the log + files. + + + + -h + Prints the help information (usage) + for nmbd. + -H <filename> NetBIOS lmhosts file. The lmhosts file is a list of NetBIOS names to IP addresses that is loaded by the nmbd server and used via the name - resolution mechanism name resolve - order described in smb.conf - 5 to resolve any - NetBIOS name queries needed by the server. Note + resolution mechanism + name resolve order described in smb.conf(5) + to resolve any NetBIOS name queries needed by the server. Note that the contents of this file are NOT used by nmbd to answer any name queries. Adding a line to this file affects name NetBIOS resolution @@ -144,12 +160,70 @@ Samba as part of the build process. Common defaults are /usr/local/samba/lib/lmhosts, /usr/samba/lib/lmhosts or - /etc/samba/lmhosts. See the lmhosts - 5 man page for details on the contents of this file. + /etc/lmhosts. See the + lmhosts(5) + man page for details on the contents of this file. - &popt.common.samba; + + -V + Prints the version number for + nmbd. + + + + -d <debug level> + debuglevel is an integer + from 0 to 10. The default value if this parameter is + not specified is zero. + + The higher this value, the more detail will + be logged to the log files about the activities of the + server. At level 0, only critical errors and serious + warnings will be logged. Level 1 is a reasonable level for + day to day running - it generates a small amount of + information about operations carried out. + + Levels above 1 will generate considerable amounts + of log data, and should only be used when investigating + a problem. Levels above 3 are designed for use only by developers + and generate HUGE amounts of log data, most of which is extremely + cryptic. + + Note that specifying this parameter here will override + the log level + parameter in the + smb.conf(5) file. + + + -l <log directory> + The -l parameter specifies a directory + into which the "log.nmbd" log file will be created + for operational data from the running nmbd + server. The default log directory is compiled into Samba + as part of the build process. Common defaults are + /usr/local/samba/var/log.nmb, + /usr/samba/var/log.nmb or + /var/log/log.nmb. Beware: + If the directory specified does not exist, nmbd + will log to the default debug log location defined at compile time. + + + + + + -n <primary NetBIOS name> + This option allows you to override + the NetBIOS name that Samba uses for itself. This is identical + to setting the + NetBIOS name parameter in the + smb.conf file. However, a command + line setting will take precedence over settings in + smb.conf. + + + -p <UDP port number> UDP port number is a positive integer value. @@ -159,6 +233,18 @@ won't need help! + + -s <configuration file> + The default configuration file name + is set at build time, typically as + /usr/local/samba/lib/smb.conf, but + this may be changed when Samba is autoconfigured. + + The file specified contains the configuration details + required by the server. See + smb.conf(5) for more information. + + @@ -172,7 +258,7 @@ inetd meta-daemon, this file must contain suitable startup information for the meta-daemon. See the install document + url="UNIX_INSTALL.html">UNIX_INSTALL.html document for details. @@ -185,7 +271,7 @@ If running the server as a daemon at startup, this file will need to contain an appropriate startup sequence for the server. See the "How to Install and Test SAMBA" document + url="UNIX_INSTALL.html">UNIX_INSTALL.html document for details. @@ -195,23 +281,21 @@ meta-daemon inetd, this file must contain a mapping of service name (e.g., netbios-ssn) to service port (e.g., 139) and protocol type (e.g., tcp). - See the "How to Install and Test SAMBA" + See the UNIX_INSTALL.html document for details. /usr/local/samba/lib/smb.conf - This is the default location of - the smb.conf - 5 server - configuration file. Other common places that systems + This is the default location of the + smb.conf + server configuration file. Other common places that systems install this file are /usr/samba/lib/smb.conf - and /etc/samba/smb.conf. + and /etc/smb.conf. When run as a WINS server (see the - wins support - parameter in the smb.conf - 5 man page), + wins support + parameter in the smb.conf(5) man page), nmbd will store the WINS database in the file wins.dat in the var/locks directory configured under @@ -219,9 +303,9 @@ If nmbd is acting as a browse master (see the local master - parameter in the smb.conf - 5 man page, nmbd + url="smb.conf.5.html#LOCALMASTER">local master + parameter in the smb.conf(5) man page, + nmbd will store the browsing database in the file browse.dat in the var/locks directory configured under wherever Samba was configured to install itself. @@ -247,11 +331,10 @@ cause nmbd to dump out its server database in the log.nmb file. - The debug log level of nmbd may be raised or lowered - using smbcontrol - 1 (SIGUSR[1|2] signals - are no longer used since Samba 2.2). This is to allow - transient problems to be diagnosed, whilst still running + The debug log level of nmbd may be raised or lowered using + smbcontrol(1) + (SIGUSR[1|2] signals are no longer used in Samba 2.2). This is + to allow transient problems to be diagnosed, whilst still running at a normally low log level. @@ -265,15 +348,14 @@ SEE ALSO - - inetd - 8, smbd - 8, smb.conf - 5, smbclient - 1, testparm - 1, testprns - 1, and the Internet - RFC's rfc1001.txt, rfc1002.txt. + inetd(8), smbd(8), + smb.conf(5) + , smbclient(1) + , + testparm(1), + testprns(1), and the Internet RFC's + rfc1001.txt, rfc1002.txt. In addition the CIFS (formerly SMB) specification is available as a link from the Web page http://samba.org/cifs/. @@ -289,11 +371,11 @@ The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook - XML 4.2 for Samba 3.0 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/nmblookup.1.sgml b/docs/docbook/manpages/nmblookup.1.sgml index 176050b9c8a..33ae631ed96 100644 --- a/docs/docbook/manpages/nmblookup.1.sgml +++ b/docs/docbook/manpages/nmblookup.1.sgml @@ -1,6 +1,4 @@ - %globalentities; -]> + @@ -38,8 +36,8 @@ DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. nmblookup is used to query NetBIOS names and map them to IP addresses in a network using NetBIOS over TCP/IP @@ -68,7 +66,7 @@ query to a machine running a WINS server and the user wishes to query the names in the WINS server. If this bit is unset the normal (broadcast responding) NetBIOS processing code - on a machine is used instead. See RFC1001, RFC1002 for details. + on a machine is used instead. See rfc1001, rfc1002 for details. @@ -88,8 +86,8 @@ where it ignores the source port of the requesting packet and only replies to UDP port 137. Unfortunately, on most UNIX systems root privilege is needed to bind to this port, and - in addition, if the nmbd - 8 daemon is running on this machine it also binds to this port. + in addition, if the nmbd(8) + daemon is running on this machine it also binds to this port. @@ -103,8 +101,12 @@ - &popt.common.connection; - &stdarg.help; + + -h + Print a help (usage) message. + + + -B <broadcast address> @@ -113,8 +115,7 @@ query to the broadcast address of the network interfaces as either auto-detected or defined in the interfaces - parameter of the smb.conf - 5 file. + parameter of the smb.conf (5) file. @@ -129,8 +130,48 @@ - &popt.common.samba; + + -d <debuglevel> + debuglevel is an integer from 0 to 10. + The default value if this parameter is not specified + is zero. + + The higher this value, the more detail will be logged + about the activities of nmblookup. At level + 0, only critical errors and serious warnings will be logged. + + Levels above 1 will generate considerable amounts of + log data, and should only be used when investigating a problem. + Levels above 3 are designed for use only by developers and + generate HUGE amounts of data, most of which is extremely cryptic. + + Note that specifying this parameter here will override + the + log level parameter in the + smb.conf(5) file. + + + + -s <smb.conf> + This parameter specifies the pathname to + the Samba configuration file, + smb.conf(5). This file controls all aspects of + the Samba setup on the machine. + + + + -i <scope> + This specifies a NetBIOS scope that + nmblookup will use to communicate with when + generating NetBIOS names. For details on the use of NetBIOS + scopes, see rfc1001.txt and rfc1002.txt. NetBIOS scopes are + very rarely used, only set this parameter + if you are the system administrator in charge of all the + NetBIOS systems you communicate with. + + + -T This causes any IP addresses found in the @@ -157,7 +198,7 @@ This is the NetBIOS name being queried. Depending upon the previous options this may be a NetBIOS name or IP address. If a NetBIOS name then the different name types may be specified - by appending '#<type>' to the name. This name may also be + by appending '#<type>' to the name. This name may also be '*', which will return all registered names within a broadcast area. @@ -170,8 +211,8 @@ nmblookup can be used to query a WINS server (in the same way nslookup is - used to query DNS servers). To query a WINS server, nmblookup - must be called like this: + used to query DNS servers). To query a WINS server, + nmblookup must be called like this: nmblookup -U server -R 'name' @@ -192,10 +233,10 @@ SEE ALSO - nmbd - 8, samba - 7, and smb.conf - 5. + nmbd(8), + samba(7), and smb.conf(5) + @@ -208,11 +249,11 @@ The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook - XML 4.2 for Samba 3.0 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/ntlm_auth.1.sgml b/docs/docbook/manpages/ntlm_auth.1.sgml deleted file mode 100644 index 08a7d4aa88a..00000000000 --- a/docs/docbook/manpages/ntlm_auth.1.sgml +++ /dev/null @@ -1,126 +0,0 @@ - %globalentities; -]> - - - - ntlm_auth - 1 - - - - - ntlm_auth - tool to allow external access to Winbind's NTLM authentication function - - - - - ntlm_auth - -d debuglevel - -l logfile - -s <smb config file> - - - - - DESCRIPTION - - This tool is part of the Samba - 7 suite. - - ntlm_auth is a helper utility that authenticates - users using NT/LM authentication. It returns 0 if the users is authenticated - successfully and 1 if access was denied. ntlm_auth uses winbind to access - the user and authentication data for a domain. This utility - is only to be used by other programs (currently squid). - - - - - - OPTIONS - - - --helper-protocol=PROTO - - Operate as a stdio-based helper - - - - - --username=USERNAME - - Specify username of user to authenticate - - - - - --domain=DOMAIN - - Specify domain of user to authenticate - - - - - --workstation=WORKSTATION - - Specify the workstation the user authenticated from - - - - - --challenge=STRING - challenge (HEX encoded) - - - - --lm-response=RESPONSE - LM Response to the challenge (HEX encoded) - - - - --nt-response=RESPONSE - NT or NTLMv2 Response to the challenge (HEX encoded) - - - - --password=PASSWORD - User's plaintext password - - - - --request-lm-key - Retreive LM session key - - - - --request-nt-key - Request NT key - - - &popt.common.samba; - &stdarg.help; - - - - - - VERSION - - This man page is correct for version 3.0 of the Samba - suite. - - - - AUTHOR - - The original Samba software and related utilities - were created by Andrew Tridgell. Samba is now developed - by the Samba Team as an Open Source project similar - to the way the Linux kernel is developed. - - The ntlm_auth manpage was written by Jelmer Vernooij. - - - diff --git a/docs/docbook/manpages/pdbedit.8.sgml b/docs/docbook/manpages/pdbedit.8.sgml index fc9a212c192..3454b7d7faa 100644 --- a/docs/docbook/manpages/pdbedit.8.sgml +++ b/docs/docbook/manpages/pdbedit.8.sgml @@ -1,7 +1,7 @@ %globalentities; ]> - + pdbedit @@ -33,19 +33,18 @@ -e passdb-backend -g -b passdb-backend - -g -d debuglevel -s configfile -P account-policy - -C value + -V value DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. The pdbedit program is used to manage the users accounts stored in the sam database and can only be run by root. @@ -69,11 +68,12 @@ present in the users database. This option prints a list of user/uid pairs separated by the ':' character. + Example: pdbedit -l - -sorce:500:Simo Sorce -samba:45:Test User - + + sorce:500:Simo Sorce + samba:45:Test User + @@ -86,26 +86,26 @@ samba:45:Test User out the account fields in a descriptive format. Example: pdbedit -l -v - ---------------- -username: sorce -user ID/Group: 500/500 -user RID/GRID: 2000/2001 -Full Name: Simo Sorce -Home Directory: \\BERSERKER\sorce -HomeDir Drive: H: -Logon Script: \\BERSERKER\netlogon\sorce.bat -Profile Path: \\BERSERKER\profile ---------------- -username: samba -user ID/Group: 45/45 -user RID/GRID: 1090/1091 -Full Name: Test User -Home Directory: \\BERSERKER\samba -HomeDir Drive: -Logon Script: -Profile Path: \\BERSERKER\profile - + + --------------- + username: sorce + user ID/Group: 500/500 + user RID/GRID: 2000/2001 + Full Name: Simo Sorce + Home Directory: \\BERSERKER\sorce + HomeDir Drive: H: + Logon Script: \\BERSERKER\netlogon\sorce.bat + Profile Path: \\BERSERKER\profile + --------------- + username: samba + user ID/Group: 45/45 + user RID/GRID: 1090/1091 + Full Name: Test User + Home Directory: \\BERSERKER\samba + HomeDir Drive: + Logon Script: + Profile Path: \\BERSERKER\profile + @@ -116,15 +116,14 @@ Profile Path: \\BERSERKER\profile This option sets the "smbpasswd" listing format. It will make pdbedit list the users in the database, printing out the account fields in a format compatible with the - smbpasswd file format. (see the - smbpasswd - 5 for details) + smbpasswd file format. (see the smbpasswd(5) for details) Example: pdbedit -l -w - -sorce:500:508818B733CE64BEAAD3B435B51404EE:D2A2418EFC466A8A0F6B1DBB5C3DB80C:[UX ]:LCT-00000000: -samba:45:0F2B255F7B67A7A9AAD3B435B51404EE:BC281CE3F53B6A5146629CD4751D3490:[UX ]:LCT-3BFA1E8D: - + + sorce:500:508818B733CE64BEAAD3B435B51404EE:D2A2418EFC466A8A0F6B1DBB5C3DB80C:[UX ]:LCT-00000000: + samba:45:0F2B255F7B67A7A9AAD3B435B51404EE:BC281CE3F53B6A5146629CD4751D3490:[UX ]:LCT-3BFA1E8D: + @@ -138,6 +137,8 @@ samba:45:0F2B255F7B67A7A9AAD3B435B51404EE:BC281CE3F53B6A5146629CD4751D3490:[UX operations. + + -f fullname @@ -162,6 +163,7 @@ samba:45:0F2B255F7B67A7A9AAD3B435B51404EE:BC281CE3F53B6A5146629CD4751D3490:[UX + -D drive This option can be used while adding or @@ -206,10 +208,9 @@ samba:45:0F2B255F7B67A7A9AAD3B435B51404EE:BC281CE3F53B6A5146629CD4751D3490:[UX ask for the password to be used. Example: pdbedit -a -u sorce -new password: -retype new password - - + new password: + retype new password + @@ -270,18 +271,7 @@ retype new password If you specify -g, then -i in-backend -e out-backend applies to the group mapping instead of the user database. - - This option will ease migration from one passdb backend to - another and will ease backing up. - - - - - - -g - If you specify -g, - then -i in-backend -e out-backend - applies to the group mapping instead of the user database. + This option will ease migration from one passdb backend to another and will ease backing up. @@ -305,30 +295,31 @@ retype new password maximum password age and bad lockout attempt. Example: pdbedit -P "bad lockout attempt" - -account policy value for bad lockout attempt is 0 - + + account policy value for bad lockout attempt is 0 + - -C account-policy-value + -V account-policy-value Sets an account policy to a specified value. This option may only be used in conjunction with the -P option. - Example: pdbedit -P "bad lockout attempt" -C 3 - -account policy value for bad lockout attempt was 0 -account policy value for bad lockout attempt is now 3 - + Example: pdbedit -P "bad lockout attempt" -V 3 + + account policy value for bad lockout attempt was 0 + account policy value for bad lockout attempt is now 3 + + &stdarg.debuglevel; &stdarg.help; - &popt.common.samba; + &stdarg.configfile; @@ -350,9 +341,9 @@ account policy value for bad lockout attempt is now 3 SEE ALSO - smbpasswd - 5, samba - 7 + smbpasswd(8), + samba(7) + @@ -365,11 +356,11 @@ account policy value for bad lockout attempt is now 3 The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook - XML 4.2 for Samba 3.0 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/rpcclient.1.sgml b/docs/docbook/manpages/rpcclient.1.sgml index 39a1e512c00..10e0ff438d5 100644 --- a/docs/docbook/manpages/rpcclient.1.sgml +++ b/docs/docbook/manpages/rpcclient.1.sgml @@ -1,7 +1,7 @@ %globalentities; ]> - + rpcclient @@ -36,8 +36,8 @@ DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. rpcclient is a utility initially developed to test MS-RPC functionality in Samba itself. It has undergone @@ -56,9 +56,28 @@ NetBIOS name of Server to which to connect. The server can be any SMB/CIFS server. The name is resolved using the - name resolve order line from smb.conf - 5. - + name resolve order line from + smb.conf(5). + + + + + -A|--authfile=filename + This option allows + you to specify a file from which to read the username and + password used in the connection. The format of the file is + + + + username = <value> + password = <value> + domain = <value> + + + Make certain that the permissions on the file restrict + access from unwanted users. + + @@ -66,8 +85,13 @@ execute semicolon separated commands (listed below)) - + + + + &stdarg.debuglevel; + &stdarg.help; + -I IP-address IP address is the address of the server to connect to. @@ -86,132 +110,117 @@ above. - &popt.common.samba; - &popt.common.credentials; - &popt.common.connection; - &stdarg.help; - - + + + -l|--logfile=logbasename + File name for log/debug files. The extension + '.client' will be appended. The log file is + never removed by the client. + + - - COMMANDS + + + -N|--nopass + instruct rpcclient not to ask + for a password. By default, rpcclient will + prompt for a password. See also the -U + option. + - - LSARPC + + + -s|--conf=smb.conf + Specifies the location of the all-important + smb.conf file. + - - lsaqueryQuery info policy + + + + -U|--user=username[%password] + Sets the SMB username or username and password. - lookupsidsResolve a list - of SIDs to usernames. - + If %password is not specified, the user will be prompted. The + client will first check the USER environment variable, then the + LOGNAME variable and if either exists, the + string is uppercased. If these environmental variables are not + found, the username GUEST is used. + + A third option is to use a credentials file which + contains the plaintext of the username and password. This + option is mainly provided for scripts where the admin does not + wish to pass the credentials on the command line or via environment + variables. If this method is used, make certain that the permissions + on the file restrict access from unwanted users. See the + -A for more details. - lookupnamesResolve a list - of usernames to SIDs. - + Be cautious about including passwords in scripts. Also, on + many systems the command line of a running process may be seen + via the ps command. To be safe always allow + rpcclient to prompt for a password and type + it in directly. + - enumtrustsEnumerate trusted domains - - enumprivsEnumerate privileges - - getdispnameGet the privilege name - - lsaenumsidEnumerate the LSA SIDS - - lsaenumprivsaccountEnumerate the privileges of an SID - - lsaenumacctrightsEnumerate the rights of an SID - - lsaenumacctwithrightEnumerate accounts with a right - - lsaaddacctrightsAdd rights to an account - - lsaremoveacctrightsRemove rights from an account - - lsalookupprivvalueGet a privilege value given its name - - lsaquerysecobjQuery LSA security object - - - - - - LSARPC-DS - - - dsroledominfoGet Primary Domain Information - - - - - DFS - - dfsexistQuery DFS support - dfsaddAdd a DFS share - dfsremoveRemove a DFS share - dfsgetinfoQuery DFS share info - dfsenumEnumerate dfs shares - - - - - - REG - - shutdownRemote Shutdown - abortshutdownAbort Shutdown + + + + + -W|--workgroup=domain + Set the SMB domain of the username. This + overrides the default domain which is the domain defined in + smb.conf. If the domain specified is the same as the server's NetBIOS name, + it causes the client to log on using the server's local SAM (as + opposed to the Domain SAM). + + + + - - - SRVSVC + + COMMANDS - - srvinfoServer query info + LSARPC + + lsaquery - netshareenumEnumerate shares - - netfileenumEnumerate open files + lookupsids - Resolve a list + of SIDs to usernames. + - netremotetodFetch remote time of day + lookupnames - Resolve a list + of usernames to SIDs. + - + enumtrusts + + + - - - SAMR + SAMR + + queryuser + querygroup + queryusergroups + querygroupmem + queryaliasmem + querydispinfo + querydominfo + enumdomgroups + + - - queryuserQuery user info - querygroupQuery group info - queryusergroupsQuery user groups - querygroupmemQuery group membership - queryaliasmemQuery alias membership - querydispinfoQuery display info - querydominfoQuery domain info - enumdomusersEnumerate domain users - enumdomgroupsEnumerate domain groups - enumalsgroupsEnumerate alias groups - createdomuserCreate domain user - samlookupnamesLook up names - samlookupridsLook up names - deletedomuserDelete domain user - samquerysecobjQuery SAMR security object - getdompwinfoRetrieve domain password info - - - - SPOOLSS + SPOOLSS - - adddriver <arch> <config> - - Execute an AddPrinterDriver() RPC to install the printer driver + + adddriver <arch> <config> + - Execute an AddPrinterDriver() RPC to install the printer driver information on the server. Note that the driver files should already exist in the directory returned by getdriverdir. Possible values for @@ -220,16 +229,16 @@ The config parameter is defined as follows: - -Long Printer Name:\ -Driver File Name:\ -Data File Name:\ -Config File Name:\ -Help File Name:\ -Language Monitor Name:\ -Default Data Type:\ -Comma Separated list of Files - + + Long Printer Name:\ + Driver File Name:\ + Data File Name:\ + Config File Name:\ + Help File Name:\ + Language Monitor Name:\ + Default Data Type:\ + Comma Separated list of Files + Any empty fields should be enter as the string "NULL". @@ -238,174 +247,133 @@ Comma Separated list of Files use of a bi-directional link for communication. This field should be "NULL". On a remote NT print server, the Print Monitor for a driver must already be installed prior to adding the driver or - else the RPC will fail. - - addprinter <printername> - <sharename> <drivername> <port> - - Add a printer on the remote server. This printer + else the RPC will fail. + + + + + addprinter <printername> + <sharename> <drivername> <port> + - Add a printer on the remote server. This printer will be automatically shared. Be aware that the printer driver must already be installed on the server (see adddriver) and the portmust be a valid port name (see enumports. - + - deldriverDelete the + deldriver - Delete the specified printer driver for all architectures. This does not delete the actual driver files from the server, only the entry from the server's list of drivers. - + - enumdataEnumerate all + enumdata - Enumerate all printer setting data stored on the server. On Windows NT clients, these values are stored in the registry, while Samba servers store them in the printers TDB. This command corresponds to the MS Platform SDK GetPrinterData() function (* This - command is currently unimplemented). + command is currently unimplemented). + - enumdataexEnumerate printer data for a key - enumjobs <printer> - List the jobs and status of a given printer. + enumjobs <printer> + - List the jobs and status of a given printer. This command corresponds to the MS Platform SDK EnumJobs() - function + function (* This command is currently unimplemented). + + - enumkeyEnumerate printer keys - enumports [level] - - Executes an EnumPorts() call using the specified + enumports [level] + - Executes an EnumPorts() call using the specified info level. Currently only info levels 1 and 2 are supported. - + - enumdrivers [level] - - Execute an EnumPrinterDrivers() call. This lists the various installed + enumdrivers [level] + - Execute an EnumPrinterDrivers() call. This lists the various installed printer drivers for all architectures. Refer to the MS Platform SDK documentation for more details of the various flags and calling - options. Currently supported info levels are 1, 2, and 3. + options. Currently supported info levels are 1, 2, and 3. - enumprinters [level] - Execute an EnumPrinters() call. This lists the various installed + enumprinters [level] + - Execute an EnumPrinters() call. This lists the various installed and share printers. Refer to the MS Platform SDK documentation for more details of the various flags and calling options. Currently - supported info levels are 0, 1, and 2. + supported info levels are 0, 1, and 2. - getdata <printername> <valuename;> - Retrieve the data for a given printer setting. See + getdata <printername> + - Retrieve the data for a given printer setting. See the enumdata command for more information. This command corresponds to the GetPrinterData() MS Platform - SDK function. + SDK function (* This command is currently unimplemented). - getdataexGet printer driver data with keyname - getdriver <printername> - - Retrieve the printer driver information (such as driver file, + getdriver <printername> + - Retrieve the printer driver information (such as driver file, config file, dependent files, etc...) for the given printer. This command corresponds to the GetPrinterDriver() MS Platform SDK function. Currently info level 1, 2, and 3 are supported. - + - getdriverdir <arch> - - Execute a GetPrinterDriverDirectory() + getdriverdir <arch> + - Execute a GetPrinterDriverDirectory() RPC to retrieve the SMB share name and subdirectory for storing printer driver files for a given architecture. Possible values for arch are "Windows 4.0" (for Windows 95/98), "Windows NT x86", "Windows NT PowerPC", "Windows - Alpha_AXP", and "Windows NT R4000". + Alpha_AXP", and "Windows NT R4000". - getprinter <printername> - Retrieve the current printer information. This command + getprinter <printername> + - Retrieve the current printer information. This command corresponds to the GetPrinter() MS Platform SDK function. - + + - getprintprocdirGet print processor directory - openprinter <printername> - Execute an OpenPrinterEx() and ClosePrinter() RPC + openprinter <printername> + - Execute an OpenPrinterEx() and ClosePrinter() RPC against a given printer. - setdriver <printername> - <drivername> - Execute a SetPrinter() command to update the printer driver + + setdriver <printername> + <drivername> + - Execute a SetPrinter() command to update the printer driver associated with an installed printer. The printer driver must already be correctly installed on the print server. See also the enumprinters and enumdrivers commands for obtaining a list of - of installed printers and drivers. - - addformAdd form - setformSet form - getformGet form - deleteformDelete form - enumformsEnumerate form - setprinterSet printer comment - setprinterdataSet REG_SZ printer data - rffpcnexRffpcnex test - + of installed printers and drivers. - + - - - NETLOGON + GENERAL OPTIONS - + + debuglevel - Set the current + debug level used to log information. - logonctrl2 - Logon Control 2 - - - logonctrl - Logon Control - - - samsync - Sam Synchronisation - - - samdeltas - Query Sam Deltas - - - samlogon - Sam Logon - - - - - - - GENERAL COMMANDS - - - debuglevelSet the current - debug level used to log information. - - help (?)Print a listing of all + help (?) - Print a listing of all known commands or extended help on a particular command. - + - quit (exit)Exit rpcclient - . - - + quit (exit) - Exit rpcclient + . + + @@ -419,7 +387,7 @@ Comma Separated list of Files From Luke Leighton's original rpcclient man page: - WARNING! The MSRPC over SMB code has + "WARNING! The MSRPC over SMB code has been developed from examining Network traces. No documentation is available from the original creators (Microsoft) on how MSRPC over SMB works, or how the individual MSRPC services work. Microsoft's @@ -427,13 +395,12 @@ Comma Separated list of Files to be... a bit flaky in places. The development of Samba's implementation is also a bit rough, - and as more of the services are understood, it can even result in - versions of smbd - 8 and rpcclient - 1 that are incompatible for some commands or services. Additionally, + and as more of the services are understood, it can even result in + versions of smbd(8) and rpcclient(1) + that are incompatible for some commands or services. Additionally, the developers are sending reports to Microsoft, and problems found or reported to Microsoft are fixed in Service Packs, which may - result in incompatibilities. + result in incompatibilities." @@ -455,8 +422,7 @@ Comma Separated list of Files The original rpcclient man page was written by Matthew Geddes, Luke Kenneth Casson Leighton, and rewritten by Gerald Carter. The conversion to DocBook for Samba 2.2 was done by Gerald - Carter. The conversion to DocBook XML 4.2 for Samba 3.0 was - done by Alexander Bokovoy. + Carter. diff --git a/docs/docbook/manpages/samba.7.sgml b/docs/docbook/manpages/samba.7.sgml index a352a6a7c66..17865edd81e 100644 --- a/docs/docbook/manpages/samba.7.sgml +++ b/docs/docbook/manpages/samba.7.sgml @@ -1,5 +1,5 @@ - + samba @@ -8,7 +8,7 @@ - Samba + SAMBA A Windows SMB/CIFS fileserver for UNIX @@ -29,30 +29,26 @@ - smbd - 8 - The smbd daemon provides the file and print services to + smbd + The smbd + daemon provides the file and print services to SMB clients, such as Windows 95/98, Windows NT, Windows for Workgroups or LanManager. The configuration file - for this daemon is described in smb.conf - 5 + for this daemon is described in smb.conf - nmbd - 8 + nmbd The nmbd daemon provides NetBIOS nameservice and browsing support. The configuration file for this daemon - is described in smb.conf - 5 + is described in smb.conf - smbclient - 1 + smbclient The smbclient program implements a simple ftp-like client. This is useful for accessing SMB shares on other compatible @@ -63,17 +59,15 @@ - testparm - 1 + testparm The testparm - utility is a simple syntax checker for Samba's smb.conf - 5 configuration file. + utility is a simple syntax checker for Samba's + smb.confconfiguration file. - testprns - 1 + testprns The testprns utility supports testing printer names defined in your printcap file used @@ -82,8 +76,7 @@ - smbstatus - 1 + smbstatus The smbstatus tool provides access to information about the current connections to smbd. @@ -91,8 +84,7 @@ - nmblookup - 1 + nmblookup The nmblookup tools allows NetBIOS name queries to be made from a UNIX host. @@ -100,18 +92,15 @@ - smbgroupedit - 8 - The smbgroupedit - tool allows for mapping unix groups to NT Builtin, - Domain, or Local groups. Also it allows setting - priviledges for that group, such as saAddUser, etc. + make_smbcodepage + The make_smbcodepage + utility provides a means of creating SMB code page + definition files for your smbd server. - smbpasswd - 8 + smbpasswd The smbpasswd command is a tool for changing LanMan and Windows NT password hashes on Samba and Windows NT servers. @@ -158,8 +147,8 @@ list. Details on how to join the mailing list are given in the README file that comes with Samba. - If you have access to a WWW viewer (such as Mozilla - or Konqueror) then you will also find lots of useful information, + If you have access to a WWW viewer (such as Netscape + or Mosaic) then you will also find lots of useful information, including back issues of the Samba mailing list, at http://lists.samba.org. @@ -167,7 +156,7 @@ VERSION - This man page is correct for version 3.0 of the + This man page is correct for version 2.2 of the Samba suite. @@ -181,8 +170,8 @@ If you have patches to submit, visit http://devel.samba.org/ - for information on how to do it properly. We prefer patches - in diff -u format. + for information on how to do it properly. We prefer patches in + diff -u format. @@ -217,11 +206,11 @@ The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML - 4.2 for Samba 3.0 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/smb.conf.5.sgml b/docs/docbook/manpages/smb.conf.5.sgml index 2fbd27b9344..7910b1ce8ef 100644 --- a/docs/docbook/manpages/smb.conf.5.sgml +++ b/docs/docbook/manpages/smb.conf.5.sgml @@ -1,5 +1,5 @@ - + smb.conf @@ -15,13 +15,14 @@ SYNOPSIS - The smb.conf file is a configuration - file for the Samba suite. smb.conf contains - runtime configuration information for the Samba programs. The smb.conf file - is designed to be configured and administered by the swat - 8 program. The complete - description of the file format and possible parameters held within - are here for reference purposes. + The smb.conf file is a configuration + file for the Samba suite. smb.conf contains + runtime configuration information for the Samba programs. The + smb.conf file is designed to be configured and + administered by the swat(8) + program. The complete description of the file format and + possible parameters held within are here for reference purposes. + FILE FORMAT @@ -104,13 +105,13 @@ The user has write access to the path /home/bar. The share is accessed via the share name "foo": - - -[foo] - path = /home/bar - read only = no - - + + + [foo] + path = /home/bar + read only = no + + The following sample section defines a printable share. The share is readonly, but printable. That is, the only write @@ -119,15 +120,15 @@ access will be permitted as the default guest user (specified elsewhere): - - -[aprinter] - path = /usr/spool/public - read only = yes - printable = yes - guest ok = yes - - + + + [aprinter] + path = /usr/spool/public + read only = yes + printable = yes + guest ok = yes + + @@ -191,12 +192,12 @@ than others. The following is a typical and suitable [homes] section: - - -[homes] - read only = no - - + + + [homes] + read only = no + + An important point is that if guest access is specified in the [homes] section, all home directories will be @@ -256,12 +257,12 @@ it. A typical [printers] entry would look like this: - -[printers] - path = /usr/spool/public - guest ok = yes - printable = yes - + + [printers] + path = /usr/spool/public + guest ok = yes + printable = yes + All aliases given for a printer in the printcap file are legitimate printer names as far as the server is concerned. @@ -269,11 +270,11 @@ to set up a pseudo-printcap. This is a file consisting of one or more lines like this: - - -alias|alias|alias|alias... - - + + + alias|alias|alias|alias... + + Each alias should be an acceptable printer name for your printing subsystem. In the [global] section, specify @@ -287,11 +288,11 @@ alias|alias|alias|alias... components (if there are more than one) are separated by vertical bar symbols ('|'). - On SYSV systems which use lpstat to determine what + NOTE: On SYSV systems which use lpstat to determine what printers are defined on the system you may be able to use "printcap name = lpstat" to automatically obtain a list of printers. See the "printcap name" option - for more details. + for more details. @@ -471,7 +472,7 @@ alias|alias|alias|alias... There are some quite creative things that can be done - with these substitutions and other smb.conf options. + with these substitutions and other smb.conf options. @@ -551,7 +552,7 @@ alias|alias|alias|alias... then steps 1 to 5 are skipped. - + If the client has passed a username/password pair and that username/password pair is validated by the UNIX system's password programs then the connection is made as that @@ -684,7 +685,6 @@ alias|alias|alias|alias... logon script lpq cache time machine password timeout - mangle prefix mangled stack map to guest max disk size @@ -728,9 +728,9 @@ alias|alias|alias|alias... prefered master preferred master preload - preload modules printcap printcap name + printer driver file private dir protocol read bmpx @@ -771,6 +771,7 @@ alias|alias|alias|alias... unix password sync update encrypted use mmap + use rhosts use sendfile username level username map @@ -806,7 +807,7 @@ alias|alias|alias|alias... allow hosts available blocking locks - block size +block size browsable browseable case sensitive @@ -882,6 +883,7 @@ alias|alias|alias|alias... path posix locking postexec + postscript preexec preexec close preserve case @@ -890,6 +892,8 @@ alias|alias|alias|alias... printable printer printer admin + printer driver + printer driver location printer name printing public @@ -935,10 +939,10 @@ alias|alias|alias|alias... - abort shutdown script (G) + abort shutdown script (G) This parameter only exists in the HEAD cvs branch - This a full path name to a script called by smbd - 8 that + This a full path name to a script called by + smbd(8) that should stop a shutdown procedure issued by the shutdown script. @@ -950,7 +954,7 @@ alias|alias|alias|alias... - addprinter command (G) + addprinter command (G) With the introduction of MS-RPC based printing support for Windows NT/2000 clients in Samba 2.2, The MS Add Printer Wizard (APW) icon is now also available in the @@ -964,12 +968,12 @@ alias|alias|alias|alias... will perform the necessary operations for adding the printer to the print system and to add the appropriate service definition to the smb.conf file in order that it can be - shared by smbd - 8. + shared by smbd(8) + . The addprinter command is automatically invoked with the following parameter (in - order): + order: printer name @@ -986,22 +990,16 @@ alias|alias|alias|alias... driver location" parameter is included for backwards compatibility only. The remaining fields in the structure are generated from answers to the APW questions. - + Once the addprinter command has been executed, smbd will reparse the smb.conf to determine if the share defined by the APW exists. If the sharename is still invalid, then smbd will return an ACCESS_DENIED error to the client. - - - The "add printer command" program can output a single line of text, - which Samba will set as the port the new printer is connected to. - If this line isn't output, Samba won't reload its printer shares. - See also deleteprinter command, printing, + linkend="printing">printing, show add printer wizard @@ -1014,7 +1012,7 @@ alias|alias|alias|alias... - add share command (G) + add share command (G) Samba 2.2.0 introduced the ability to dynamically add and delete shares via the Windows NT 4.0 Server Manager. The add share command is used to define an @@ -1068,10 +1066,9 @@ alias|alias|alias|alias... - add machine script (G) + add machine script (G) This is the full pathname to a script that will - be run by smbd - 8 when a machine is added + be run by smbd(8) when a machine is added to it's domain using the administrator username and password method. This option is only required when using sam back-ends tied to the @@ -1087,7 +1084,7 @@ alias|alias|alias|alias... - ads server (G) + ads server (G) If this option is specified, samba does not try to figure out what ads server to use itself, but uses the specified ads server. Either one DNS name or IP @@ -1100,10 +1097,10 @@ alias|alias|alias|alias... - add user script (G) + add user script (G) This is the full pathname to a script that will - be run AS ROOT by smbd - 8 under special circumstances described below. + be run AS ROOT by smbd(8) + under special circumstances described below. Normally, a Samba server requires that UNIX users are created for all users accessing files on this server. For sites @@ -1113,16 +1110,16 @@ alias|alias|alias|alias... url="smbd.8.html">smbd to create the required UNIX users ON DEMAND when a user accesses the Samba server. - In order to use this option, smbd - 8 must NOT be set to security = share + In order to use this option, smbd + must NOT be set to security = share and add user script must be set to a full pathname for a script that will create a UNIX user given one argument of %u, which expands into the UNIX user name to create. When the Windows user attempts to access the Samba server, - at login (session setup in the SMB protocol) time, smbd - 8 contacts the password server and + at login (session setup in the SMB protocol) time, + smbd contacts the password server and attempts to authenticate the given user with the given password. If the authentication succeeds then smbd attempts to find a UNIX user in the UNIX password database to map the @@ -1150,10 +1147,10 @@ alias|alias|alias|alias... - add group script (G) + add group script (G) This is the full pathname to a script that will - be run AS ROOT by smbd - 8 when a new group is + be run AS ROOT by smbd(8) when a new group is requested. It will expand any %g to the group name passed. This script is only useful for installations using the @@ -1166,7 +1163,7 @@ alias|alias|alias|alias... - admin users (S) + admin users (S) This is a list of users who will be granted administrative privileges on the share. This means that they will do all file operations as the super-user (root). @@ -1182,13 +1179,13 @@ alias|alias|alias|alias... - add user to group script (G) + add user to group script (G) Full path to the script that will be called when a user is added to a group using the Windows NT domain administration - tools. It will be run by smbd - 8 AS ROOT. - Any %g will be replaced with the group name and - any %u will be replaced with the user name. + tools. It will be run by smbd(8) + AS ROOT. Any %g will be + replaced with the group name and any %u will + be replaced with the user name. Default: add user to group script = @@ -1199,13 +1196,13 @@ alias|alias|alias|alias... - allow hosts (S) + allow hosts (S) Synonym for hosts allow. - algorithmic rid base (G) + algorithmic rid base (G) This determines how Samba will use its algorithmic mapping from uids/gid to the RIDs needed to construct NT Security Identifiers. @@ -1228,7 +1225,7 @@ alias|alias|alias|alias... - allow trusted domains (G) + allow trusted domains (G) This option only takes effect when the security option is set to server or domain. @@ -1252,9 +1249,10 @@ alias|alias|alias|alias... - announce as (G) - This specifies what type of server nmbd - 8 will announce itself as, to a network neighborhood browse + announce as (G) + This specifies what type of server + nmbd + will announce itself as, to a network neighborhood browse list. By default this is set to Windows NT. The valid options are : "NT Server" (which can also be written as "NT"), "NT Workstation", "Win95" or "WfW" meaning Windows NT Server, @@ -1273,7 +1271,7 @@ alias|alias|alias|alias... - announce version (G) + announce version (G) This specifies the major and minor version numbers that nmbd will use when announcing itself as a server. The default is 4.9. Do not change this parameter unless you have a specific @@ -1288,7 +1286,7 @@ alias|alias|alias|alias... - auto services (G) + auto services (G) This is a synonym for the preload. @@ -1297,7 +1295,7 @@ alias|alias|alias|alias... - auth methods (G) + auth methods (G) This option allows the administrator to chose what authentication methods smbd will use when authenticating a user. This option defaults to sensible values based on @@ -1315,7 +1313,7 @@ alias|alias|alias|alias... - available (S) + available (S) This parameter lets you "turn off" a service. If available = no, then ALL attempts to connect to the service will fail. Such failures are @@ -1329,12 +1327,12 @@ alias|alias|alias|alias... - bind interfaces only (G) + bind interfaces only (G) This global parameter allows the Samba admin to limit what interfaces on a machine will serve SMB requests. It - affects file service smbd - 8 and name service nmbd - 8 in a slightly different ways. + affects file service smbd(8) and + name service nmbd(8) in slightly + different ways. For name service it causes nmbd to bind to ports 137 and 138 on the interfaces listed in the nmbd. - For file service it causes smbd - 8 to bind only to the interface list - given in the + For file service it causes smbd(8) + to bind only to the interface list given in the interfaces parameter. This restricts the networks that smbd will serve to packets coming in those interfaces. Note that you should not use this parameter for machines @@ -1365,9 +1362,10 @@ alias|alias|alias|alias... If bind interfaces only is set then unless the network address 127.0.0.1 is added - to the interfaces parameter list smbpasswd - 8 and swat - 8 may not work as expected due to the reasons covered below. + to the interfaces parameter list smbpasswd(8) + and swat(8) may + not work as expected due to the reasons covered below. To change a users SMB password, the smbpasswd by default connects to the localhost - 127.0.0.1 @@ -1377,9 +1375,9 @@ alias|alias|alias|alias... interfaces parameter list then smbpasswd will fail to connect in it's default mode. smbpasswd can be forced to use the primary IP interface - of the local host by using its smbpasswd - 8 -r remote machine - parameter, with remote machine set + of the local host by using its + -r remote machine + parameter, with remote machine set to the IP name of the primary interface of the local host. The swat status page tries to connect with @@ -1399,10 +1397,9 @@ alias|alias|alias|alias... - blocking locks (S) - This parameter controls the behavior - of smbd - 8 when given a request by a client + blocking locks (S) + This parameter controls the behavior of smbd(8) when given a request by a client to obtain a byte range lock on a region of an open file, and the request has a time limit associated with it. @@ -1422,9 +1419,9 @@ alias|alias|alias|alias... - block size (S) - This parameter controls the behavior of smbd - 8 when reporting disk free + block size (S) + This parameter controls the behavior of + smbd(8) when reporting disk free sizes. By default, this reports a disk block size of 1024 bytes. @@ -1438,19 +1435,27 @@ alias|alias|alias|alias... Changing this option does not change the disk free reporting size, just the block size unit reported to the client. - - + + Default: block size = 1024 + Example: block size = 65536 + + + + + - browsable (S) + browsable (S) See the browseable. + + - browse list (G) - This controls whether smbd - 8 will serve a browse list to + browse list (G) + This controls whether + smbd(8) will serve a browse list to a client doing a NetServerEnum call. Normally set to yes. You should never need to change this. @@ -1461,7 +1466,7 @@ alias|alias|alias|alias... - browseable (S) + browseable (S) This controls whether this share is seen in the list of available shares in a net view and in the browse list. @@ -1472,7 +1477,7 @@ alias|alias|alias|alias... - case sensitive (S) + case sensitive (S) See the discussion in the section NAME MANGLING. @@ -1483,7 +1488,7 @@ alias|alias|alias|alias... - casesignames (S) + casesignames (S) Synonym for case sensitive. @@ -1491,12 +1496,12 @@ alias|alias|alias|alias... - change notify timeout (G) + change notify timeout (G) This SMB allows a client to tell a server to "watch" a particular directory for any changes and only reply to the SMB request when a change has occurred. Such constant scanning of - a directory is expensive under UNIX, hence an smbd - 8 daemon only performs such a scan + a directory is expensive under UNIX, hence an + smbd(8) daemon only performs such a scan on each requested directory once every change notify timeout seconds. @@ -1509,7 +1514,7 @@ alias|alias|alias|alias... - change share command (G) + change share command (G) Samba 2.2.0 introduced the ability to dynamically add and delete shares via the Windows NT 4.0 Server Manager. The change share command is used to define an @@ -1559,8 +1564,12 @@ alias|alias|alias|alias... + + + + - comment (S) + comment (S) This is a text field that is seen next to a share when a client does a queries the server, either via the network neighborhood or via net view to list what shares @@ -1577,7 +1586,7 @@ alias|alias|alias|alias... - config file (G) + config file (G) This allows you to override the config file to use, instead of the default (usually smb.conf). There is a chicken and egg problem here as this option is set @@ -1601,7 +1610,7 @@ alias|alias|alias|alias... - copy (S) + copy (S) This parameter allows you to "clone" service entries. The specified service is simply duplicated under the current service's name. Any parameters specified in the current @@ -1619,7 +1628,7 @@ alias|alias|alias|alias... - create mask (S) + create mask (S) A synonym for this parameter is create mode . @@ -1663,14 +1672,14 @@ alias|alias|alias|alias... - create mode (S) + create mode (S) This is a synonym for create mask. - csc policy (S) + csc policy (S) This stands for client-side caching policy, and specifies how clients capable of offline caching will cache the files in the share. The valid values @@ -1689,7 +1698,7 @@ alias|alias|alias|alias... - deadtime (G) + deadtime (G) The value of the parameter (a decimal integer) represents the number of minutes of inactivity before a connection is considered dead, and it is disconnected. The deadtime only takes @@ -1715,7 +1724,7 @@ alias|alias|alias|alias... - debug hires timestamp (G) + debug hires timestamp (G) Sometimes the timestamps in the log messages are needed with a resolution of higher that seconds, this boolean parameter adds microsecond resolution to the timestamp @@ -1732,7 +1741,7 @@ alias|alias|alias|alias... - debug pid (G) + debug pid (G) When using only one log file for more then one forked smbd-process there may be hard to follow which process outputs which message. This boolean parameter is adds the process-id @@ -1747,7 +1756,7 @@ alias|alias|alias|alias... - debug timestamp (G) + debug timestamp (G) Samba debug log messages are timestamped by default. If you are running at a high debug level these timestamps @@ -1760,7 +1769,7 @@ alias|alias|alias|alias... - debug uid (G) + debug uid (G) Samba is sometimes run as root and sometime run as the connected user, this boolean parameter inserts the current euid, egid, uid and gid to the timestamp message headers @@ -1776,7 +1785,7 @@ alias|alias|alias|alias... - debuglevel (G) + debuglevel (G) Synonym for log level. @@ -1785,7 +1794,7 @@ alias|alias|alias|alias... - default (G) + default (G) A synonym for default service. @@ -1793,7 +1802,7 @@ alias|alias|alias|alias... - default case (S) + default case (S) See the section on NAME MANGLING. Also note the short preserve case parameter. @@ -1805,7 +1814,7 @@ alias|alias|alias|alias... - default devmode (S) + default devmode (S) This parameter is only applicable to printable services. When smbd is serving Printer Drivers to Windows NT/2k/XP clients, each printer on the Samba @@ -1843,7 +1852,7 @@ alias|alias|alias|alias... - default service (G) + default service (G) This parameter specifies the name of a service which will be connected to if the service actually requested cannot be found. Note that the square brackets are NOT @@ -1869,27 +1878,24 @@ alias|alias|alias|alias... Example: - + [global] default service = pub [pub] path = /%S - + - delete group script (G) + delete group script (G) This is the full pathname to a script that will - be run AS ROOT smbd - 8 when a group is requested to be deleted. - It will expand any %g to the group name passed. - This script is only useful for installations using the Windows NT domain administration tools. + be run AS ROOT by smbd(8) when a group is requested to be deleted. It will expand any %g to the group name passed. This script is only useful for installations using the Windows NT domain administration tools. - deleteprinter command (G) + deleteprinter command (G) With the introduction of MS-RPC based printer support for Windows NT/2000 clients in Samba 2.2, it is now possible to delete printer at run time by issuing the @@ -1915,7 +1921,7 @@ alias|alias|alias|alias... See also addprinter command, printing, + linkend="printing">printing, show add printer wizard @@ -1931,7 +1937,7 @@ alias|alias|alias|alias... - delete readonly (S) + delete readonly (S) This parameter allows readonly files to be deleted. This is not normal DOS semantics, but is allowed by UNIX. @@ -1945,7 +1951,7 @@ alias|alias|alias|alias... - delete share command (G) + delete share command (G) Samba 2.2.0 introduced the ability to dynamically add and delete shares via the Windows NT 4.0 Server Manager. The delete share command is used to define an @@ -1993,11 +1999,10 @@ alias|alias|alias|alias... - delete user script (G) + delete user script (G) This is the full pathname to a script that will - be run by smbd - 8 when managing users - with remote RPC (NT) tools. + be run by smbd(8) + when managing user's with remote RPC (NT) tools. This script is called when a remote client removes a user @@ -2015,13 +2020,13 @@ alias|alias|alias|alias... - delete user from group script (G) + delete user from group script (G) Full path to the script that will be called when a user is removed from a group using the Windows NT domain administration - tools. It will be run by smbd - 8 AS ROOT. - Any %g will be replaced with the group name and - any %u will be replaced with the user name. + tools. It will be run by smbd(8) + AS ROOT. Any %g will be + replaced with the group name and any %u will + be replaced with the user name. Default: delete user from group script = @@ -2032,7 +2037,7 @@ alias|alias|alias|alias... - delete veto files (S) + delete veto files (S) This option is used when Samba is attempting to delete a directory that contains one or more vetoed directories (see the veto files @@ -2061,7 +2066,7 @@ alias|alias|alias|alias... - deny hosts (S) + deny hosts (S) Synonym for hosts deny. @@ -2070,7 +2075,7 @@ alias|alias|alias|alias... - dfree command (G) + dfree command (G) The dfree command setting should only be used on systems where a problem occurs with the internal disk space calculations. This has been known to happen with Ultrix, @@ -2103,17 +2108,17 @@ alias|alias|alias|alias... Where the script dfree (which must be made executable) could be: - -#!/bin/sh -df $1 | tail -1 | awk '{print $2" "$4}' - + + #!/bin/sh + df $1 | tail -1 | awk '{print $2" "$4}' + or perhaps (on Sys V based systems): - -#!/bin/sh -/usr/bin/df -k $1 | tail -1 | awk '{print $3" "$5}' - + + #!/bin/sh + /usr/bin/df -k $1 | tail -1 | awk '{print $3" "$5}' + Note that you may have to replace the command names with full path names on some systems. @@ -2124,7 +2129,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - directory (S) + directory (S) Synonym for path . @@ -2132,7 +2137,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - directory mask (S) + directory mask (S) This parameter is the octal modes which are used when converting DOS modes to UNIX modes when creating UNIX directories. @@ -2180,7 +2185,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - directory mode (S) + directory mode (S) Synonym for directory mask @@ -2188,7 +2193,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - directory security mask (S) + directory security mask (S) This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog @@ -2223,7 +2228,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - disable netbios (G) + disable netbios (G) Enabling this parameter will disable netbios support in Samba. Netbios is the only available form of browsing in all windows versions except for 2000 and XP. @@ -2238,7 +2243,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - disable spoolss (G) + disable spoolss (G) Enabling this parameter will disable Samba's support for the SPOOLSS set of MS-RPC's and will yield identical behavior as Samba 2.0.x. Windows NT/2000 clients will downgrade to using @@ -2259,7 +2264,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - display charset (G) + display charset (G) Specifies the charset that samba will use to print messages to stdout and stderr and SWAT will use. Should generally be the same as the unix charset. @@ -2274,12 +2279,12 @@ df $1 | tail -1 | awk '{print $2" "$4}' - dns proxy (G) - Specifies that nmbd - 8 when acting as a WINS server and - finding that a NetBIOS name has not been registered, should treat the - NetBIOS name word-for-word as a DNS name and do a lookup with the DNS server - for that name on behalf of the name-querying client. + dns proxy (G) + Specifies that nmbd(8) + when acting as a WINS server and finding that a NetBIOS name has not + been registered, should treat the NetBIOS name word-for-word as a DNS + name and do a lookup with the DNS server for that name on behalf of + the name-querying client. Note that the maximum length for a NetBIOS name is 15 characters, so the DNS name (or DNS alias) can likewise only be @@ -2297,7 +2302,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - domain logons (G) + domain logons (G) If set to yes, the Samba server will serve Windows 95/98 Domain logons for the workgroup it is in. Samba 2.2 @@ -2312,20 +2317,20 @@ df $1 | tail -1 | awk '{print $2" "$4}' - domain master (G) - Tell smbd - 8 to enable WAN-wide browse list + domain master (G) + Tell + nmbd(8) to enable WAN-wide browse list collation. Setting this option causes nmbd to claim a special domain specific NetBIOS name that identifies it as a domain master browser for its given workgroup. Local master browsers in the same workgroup on broadcast-isolated subnets will give this nmbd their local browse lists, - and then ask smbd - 8 for a complete copy of the browse - list for the whole wide area network. Browser clients will then contact - their local master browser, and will receive the domain-wide browse list, - instead of just the list for their broadcast-isolated subnet. + and then ask smbd(8) + for a complete copy of the browse list for the whole wide area + network. Browser clients will then contact their local master browser, + and will receive the domain-wide browse list, instead of just the list + for their broadcast-isolated subnet. Note that Windows NT Primary Domain Controllers expect to be able to claim this workgroup specific special @@ -2350,7 +2355,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - dont descend (S) + dont descend (S) There are certain directories on some systems (e.g., the /proc tree under Linux) that are either not of interest to clients or are infinitely deep (recursive). This @@ -2369,22 +2374,22 @@ df $1 | tail -1 | awk '{print $2" "$4}' - dos charset (G) + dos charset (G) DOS SMB clients assume the server has the same charset as they do. This option specifies which charset Samba should talk to DOS clients. - The default depends on which charsets you have installed. + The default depends on which charsets you have instaled. Samba tries to use charset 850 but falls back to ASCII in - case it is not available. Run testparm - 1 to check the default on your system. + case it is not available. Run testparm(1) + to check the default on your system. - dos filemode (S) + dos filemode (S) The default behavior in Samba is to provide UNIX-like behavior where only the owner of a file/directory is able to change the permissions on it. However, this behavior @@ -2403,13 +2408,13 @@ df $1 | tail -1 | awk '{print $2" "$4}' - dos filetime resolution (S) + dos filetime resolution (S) Under the DOS and Windows FAT filesystem, the finest granularity on time resolution is two seconds. Setting this parameter for a share causes Samba to round the reported time down to the nearest two second boundary when a query call that requires one second - resolution is made to smbd - 8. + resolution is made to smbd(8) + . This option is mainly used as a compatibility option for Visual C++ when used against Samba shares. If oplocks are enabled on a @@ -2429,15 +2434,14 @@ df $1 | tail -1 | awk '{print $2" "$4}' - dos filetimes (S) + dos filetimes (S) Under DOS and Windows, if a user can write to a file they can change the timestamp on it. Under POSIX semantics, only the owner of the file or root may change the timestamp. By default, Samba runs with POSIX semantics and refuses to change the timestamp on a file if the user smbd is acting on behalf of is not the file owner. Setting this option to - yes allows DOS semantics and smbd - 8 will change the file + yes allows DOS semantics and smbd will change the file timestamp as DOS requires. Default: dos filetimes = no @@ -2446,7 +2450,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - encrypt passwords (G) + encrypt passwords (G) This boolean controls whether encrypted passwords will be negotiated with the client. Note that Windows NT 4.0 SP3 and above and also Windows 98 will by default expect encrypted passwords @@ -2455,11 +2459,10 @@ df $1 | tail -1 | awk '{print $2" "$4}' directory docs/ shipped with the source code. In order for encrypted passwords to work correctly - smbd - 8 must either - have access to a local smbpasswd - 5 file (see the smbpasswd - 8 program for information on how to set up + smbd(8) must either + have access to a local smbpasswd(5) + file (see the + smbpasswd(8) program for information on how to set up and maintain this file), or set the security = [server|domain|ads] parameter which causes smbd to authenticate against another @@ -2470,7 +2473,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - enhanced browsing (G) + enhanced browsing (G) This option enables a couple of enhancements to cross-subnet browse propagation that have been added in Samba but which are not standard in Microsoft implementations. @@ -2496,7 +2499,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - enumports command (G) + enumports command (G) The concept of a "port" is fairly foreign to UNIX hosts. Under Windows NT/2000 print servers, a port is associated with a port monitor and generally takes the form of @@ -2519,7 +2522,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - exec (S) + exec (S) This is a synonym for preexec. @@ -2527,7 +2530,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - fake directory create times (S) + fake directory create times (S) NTFS and Windows VFAT file systems keep a create time for all files and directories. This is not the same as the ctime - status change time - that Unix keeps, so Samba by default @@ -2561,7 +2564,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - fake oplocks (S) + fake oplocks (S) Oplocks are the way that SMB clients get permission from a server to locally cache file operations. If a server grants an oplock (opportunistic lock) then the client is free to assume @@ -2593,11 +2596,10 @@ df $1 | tail -1 | awk '{print $2" "$4}' - follow symlinks (S) + follow symlinks (S) This parameter allows the Samba administrator - to stop smbd - 8 from following symbolic - links in a particular share. Setting this + to stop smbd(8) + from following symbolic links in a particular share. Setting this parameter to no prevents any file or directory that is a symbolic link from being followed (the user will get an error). This option is very useful to stop users from adding a @@ -2614,7 +2616,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - force create mode (S) + force create mode (S) This parameter specifies a set of UNIX mode bit permissions that will always be set on a file created by Samba. This is done by bitwise 'OR'ing these bits onto @@ -2642,7 +2644,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - force directory mode (S) + force directory mode (S) This parameter specifies a set of UNIX mode bit permissions that will always be set on a directory created by Samba. This is done by bitwise 'OR'ing these bits onto the @@ -2671,7 +2673,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - force directory security mode (S) + force directory security mode (S) This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box. @@ -2707,7 +2709,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - force group (S) + force group (S) This specifies a UNIX group name that will be assigned as the default primary group for all users connecting to this service. This is useful for sharing files by ensuring @@ -2743,7 +2745,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - force security mode (S) + force security mode (S) This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog @@ -2781,7 +2783,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - force user (S) + force user (S) This specifies a UNIX user name that will be assigned as the default user for all users connecting to this service. This is useful for sharing files. You should also use it carefully @@ -2809,11 +2811,11 @@ df $1 | tail -1 | awk '{print $2" "$4}' - fstype (S) + fstype (S) This parameter allows the administrator to configure the string that specifies the type of filesystem a share - is using that is reported by smbd - 8 when a client queries the filesystem type + is using that is reported by smbd(8) + when a client queries the filesystem type for a share. The default type is NTFS for compatibility with Windows NT but this can be changed to other strings such as Samba or FAT @@ -2826,7 +2828,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - getwd cache (G) + getwd cache (G) This is a tuning option. When this is enabled a caching algorithm will be used to reduce the time taken for getwd() calls. This can have a significant impact on performance, especially @@ -2840,7 +2842,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - group (S) + group (S) Synonym for force group. @@ -2848,7 +2850,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - guest account (S) + guest account (S) This is a username which will be used for access to services which are specified as guest ok (see below). Whatever privileges this @@ -2878,16 +2880,12 @@ df $1 | tail -1 | awk '{print $2" "$4}' - guest ok (S) + guest ok (S) If this parameter is yes for a service, then no password is required to connect to the service. Privileges will be those of the guest account. - This paramater nullifies the benifits of setting - restrict - anonymous = 2 - See the section below on security for more information about this option. @@ -2898,7 +2896,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - guest only (S) + guest only (S) If this parameter is yes for a service, then only guest connections to the service are permitted. This parameter will have no effect if @@ -2914,7 +2912,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - hide dot files (S) + hide dot files (S) This is a boolean parameter that controls whether files starting with a dot appear as hidden files. @@ -2924,7 +2922,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - hide files(S) + hide files(S) This is a list of files or directories that are not visible but are accessible. The DOS 'hidden' attribute is applied to any files or directories that match. @@ -2962,7 +2960,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - hide local users(G) + hide local users(G) This parameter toggles the hiding of local UNIX users (root, wheel, floppy, etc) from remote clients. @@ -2972,7 +2970,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - hide unreadable (G) + hide unreadable (G) This parameter prevents clients from seeing the existance of files that cannot be read. Defaults to off. @@ -2981,7 +2979,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - hide unwriteable files (G) + hide unwriteable files (G) This parameter prevents clients from seeing the existance of files that cannot be written to. Defaults to off. Note that unwriteable directories are shown as usual. @@ -2992,7 +2990,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - hide special files (G) + hide special files (G) This parameter prevents clients from seeing special files such as sockets, devices and fifo's in directory listings. @@ -3003,10 +3001,10 @@ df $1 | tail -1 | awk '{print $2" "$4}' - homedir map (G) + homedir map (G) Ifnis homedir - is yes, and smbd - 8 is also acting + is yes, and smbd(8) is also acting as a Win95/98 logon server then this parameter specifies the NIS (or YP) map from which the server for the user's home directory should be extracted. At present, only the Sun @@ -3019,8 +3017,8 @@ df $1 | tail -1 | awk '{print $2" "$4}' that copes with different map formats and also Amd (another automounter) maps. - A working NIS client is required on - the system for this option to work. + NOTE :A working NIS client is required on + the system for this option to work. See also nis homedir , domain logons @@ -3036,7 +3034,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - host msdfs (G) + host msdfs (G) This boolean parameter is only available if Samba has been configured and compiled with the --with-msdfs option. If set to yes, @@ -3054,7 +3052,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - hostname lookups (G) + hostname lookups (G) Specifies whether samba should use (expensive) hostname lookups or use the ip addresses instead. An example place where hostname lookups are currently used is when checking @@ -3070,7 +3068,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - hosts allow (S) + hosts allow (S) A synonym for this parameter is allow hosts. @@ -3119,9 +3117,9 @@ df $1 | tail -1 | awk '{print $2" "$4}' Note that access still requires suitable user-level passwords. - See testparm - 1 for a way of testing your host access - to see if it does what you expect. + See testparm(1) + for a way of testing your host access to see if it does + what you expect. Default: none (i.e., all hosts permitted access) @@ -3134,7 +3132,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - hosts deny (S) + hosts deny (S) The opposite of hosts allow - hosts listed here are NOT permitted access to services unless the specific services have their own lists to override @@ -3151,7 +3149,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - hosts equiv (G) + hosts equiv (G) If this global parameter is a non-null string, it specifies the name of a file to read for the names of hosts and users who will be allowed access without specifying a password. @@ -3163,14 +3161,14 @@ df $1 | tail -1 | awk '{print $2" "$4}' hosts equiv may be useful for NT clients which will not supply passwords to Samba. - The use of hosts equiv + NOTE : The use of hosts equiv can be a major security hole. This is because you are trusting the PC to supply the correct username. It is very easy to get a PC to supply a false username. I recommend that the hosts equiv option be only used if you really know what you are doing, or perhaps on a home network where you trust your spouse and kids. And only if you really trust - them :-). + them :-). Default: no host equivalences Example: hosts equiv = /etc/hosts.equiv @@ -3180,7 +3178,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - include (G) + include (G) This allows you to include one config file inside another. The file is included literally, as though typed in place. @@ -3197,7 +3195,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - inherit acls (S) + inherit acls (S) This parameter can be used to ensure that if default acls exist on parent directories, they are always honored when creating a subdirectory. @@ -3215,7 +3213,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - inherit permissions (S) + inherit permissions (S) The permissions on new files and directories are normally governed by create mask, @@ -3256,7 +3254,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - interfaces (G) + interfaces (G) This option allows you to override the default network interfaces list that Samba will use for browsing, name registration and other NBT traffic. By default Samba will query @@ -3308,7 +3306,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - invalid users (S) + invalid users (S) This is a list of users that should not be allowed to login to this service. This is really a paranoid check to absolutely ensure an improper setting does not breach @@ -3320,12 +3318,12 @@ df $1 | tail -1 | awk '{print $2" "$4}' A name starting with '+' is interpreted only by looking in the UNIX group database. A name starting with - '&' is interpreted only by looking in the NIS netgroup database + '&' is interpreted only by looking in the NIS netgroup database (this requires NIS to be working on your system). The characters - '+' and '&' may be used at the start of the name in either order + '+' and '&' may be used at the start of the name in either order so the value +&group means check the UNIX group database, followed by the NIS netgroup database, and - the value &+group means check the NIS + the value &+group means check the NIS netgroup database, followed by the UNIX group database (the same as the '@' prefix). @@ -3344,7 +3342,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - keepalive (G) + keepalive (G) The value of the parameter (an integer) represents the number of seconds between keepalive packets. If this parameter is zero, no keepalive packets will be @@ -3364,7 +3362,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - kernel oplocks (G) + kernel oplocks (G) For UNIXes that support kernel based oplocks (currently only IRIX and the Linux 2.4 kernel), this parameter @@ -3372,10 +3370,10 @@ df $1 | tail -1 | awk '{print $2" "$4}' Kernel oplocks support allows Samba oplocks to be broken whenever a local UNIX process or NFS operation - accesses a file that smbd - 8 has oplocked. This allows complete - data consistency between SMB/CIFS, NFS and local file access (and is - a very cool feature :-). + accesses a file that smbd(8) + has oplocked. This allows complete data consistency between + SMB/CIFS, NFS and local file access (and is a very + cool feature :-). This parameter defaults to on, but is translated to a no-op on systems that no not have the necessary kernel support. @@ -3393,12 +3391,12 @@ df $1 | tail -1 | awk '{print $2" "$4}' - lanman auth (G) - This parameter determines whether or not smbd - 8 will attempt to authenticate users - using the LANMAN password hash. If disabled, only clients which support NT - password hashes (e.g. Windows NT/2000 clients, smbclient, etc... but not - Windows 95/98 or the MS DOS network client) will be able to connect to the Samba host. + lanman auth (G) + This parameter determines whether or not smbd will + attempt to authenticate users using the LANMAN password hash. + If disabled, only clients which support NT password hashes (e.g. Windows + NT/2000 clients, smbclient, etc... but not Windows 95/98 or the MS DOS + network client) will be able to connect to the Samba host. Default : lanman auth = yes @@ -3409,10 +3407,9 @@ df $1 | tail -1 | awk '{print $2" "$4}' - large readwrite (G) - This parameter determines whether or not smbd - 8 supports the new 64k streaming - read and write varient SMB requests introduced + large readwrite (G) + This parameter determines whether or not smbd + supports the new 64k streaming read and write varient SMB requests introduced with Windows 2000. Note that due to Windows 2000 client redirector bugs this requires Samba to be running on a 64-bit capable operating system such as IRIX, Solaris or a Linux 2.4 kernel. Can improve performance by 10% with @@ -3427,15 +3424,15 @@ df $1 | tail -1 | awk '{print $2" "$4}' - ldap admin dn (G) - The ldap admin dn defines the Distinguished + ldap admin dn (G) + The ldap admin dn defines the Distinguished Name (DN) name used by Samba to contact the ldap server when retreiving user account information. The ldap admin dn is used in conjunction with the admin dn password stored in the private/secrets.tdb file. See the - smbpasswd - 8 man page for more information on how - to accmplish this. + smbpasswd(8) man + page for more information on how to accomplish this. + @@ -3452,7 +3449,17 @@ df $1 | tail -1 | awk '{print $2" "$4}' - ldap filter (G) + ldap del only sam attr (G) + Inverted synonym for + ldap delete dn. + + + + + + + + ldap filter (G) This parameter specifies the RFC 2254 compliant LDAP search filter. The default is to match the login name with the uid attribute for all entries matching the sambaAccount @@ -3466,7 +3473,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - ldap port (G) + ldap port (G) This parameter is only available if Samba has been configure to include the --with-ldapsam option at compile time. @@ -3488,7 +3495,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - ldap server (G) + ldap server (G) This parameter is only available if Samba has been configure to include the --with-ldapsam option at compile time. @@ -3505,7 +3512,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - ldap ssl (G) + ldap ssl (G) This option is used to define whether or not Samba should use SSL when connecting to the ldap server This is NOT related to @@ -3539,7 +3546,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - ldap suffix (G) + ldap suffix (G) Specifies where user and machine accounts are added to the tree. Can be overriden by ldap user suffix and ldap machine suffix. It also used as the base dn for all ldap searches. @@ -3550,7 +3557,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - ldap user suffix (G) + ldap user suffix (G) It specifies where users are added to the tree. @@ -3563,7 +3570,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - ldap machine suffix (G) + ldap machine suffix (G) It specifies where machines should be added to the ldap tree. @@ -3575,7 +3582,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - ldap passwd sync (G) + ldap passwd sync (G) This option is used to define whether or not Samba should sync the LDAP password with the NT and LM hashes for normal accounts (NOT for @@ -3599,7 +3606,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - ldap trust ids (G) + ldap trust ids (G) Normally, Samba validates each entry in the LDAP server against getpwnam(). This allows LDAP to be used for Samba with the unix system using @@ -3618,7 +3625,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - level2 oplocks (S) + level2 oplocks (S) This parameter controls whether Samba supports level2 (read-only) oplocks on a share. @@ -3662,9 +3669,9 @@ df $1 | tail -1 | awk '{print $2" "$4}' - lm announce (G) - This parameter determines if nmbd - 8 will produce Lanman announce + lm announce (G) + This parameter determines if + nmbd(8) will produce Lanman announce broadcasts that are needed by OS/2 clients in order for them to see the Samba server in their browse list. This parameter can have three values, yes, no, or @@ -3689,7 +3696,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - lm interval (G) + lm interval (G) If Samba is set to produce Lanman announce broadcasts needed by OS/2 clients (see the lm announce parameter) then this @@ -3709,7 +3716,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - load printers (G) + load printers (G) A boolean variable that controls whether all printers in the printcap will be loaded for browsing by default. See the printers section for @@ -3722,9 +3729,9 @@ df $1 | tail -1 | awk '{print $2" "$4}' - local master (G) - This option allows nmbd - 8 to try and become a local master browser + local master (G) + This option allows + nmbd(8) to try and become a local master browser on a subnet. If set to no then nmbd will not attempt to become a local master browser on a subnet and will also lose in all browsing elections. By @@ -3743,7 +3750,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - lock dir (G) + lock dir (G) Synonym for lock directory. @@ -3751,7 +3758,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - lock directory (G) + lock directory (G) This option specifies the directory where lock files will be placed. The lock files are used to implement the max connections @@ -3765,7 +3772,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - lock spin count (G) + lock spin count (G) This parameter controls the number of times that smbd should attempt to gain a byte range lock on the behalf of a client request. Experiments have shown that @@ -3784,7 +3791,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - lock spin time (G) + lock spin time (G) The time in microseconds that smbd should pause before attempting to gain a failed lock. See lock spin @@ -3798,7 +3805,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - locking (S) + locking (S) This controls whether or not locking will be performed by the server in response to lock requests from the client. @@ -3826,7 +3833,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - log file (G) + log file (G) This option allows you to override the name of the Samba log file (also known as the debug file). @@ -3840,7 +3847,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - log level (G) + log level (G) The value of the parameter (a astring) allows the debug level (logging level) to be specified in the smb.conf file. This parameter has been @@ -3858,7 +3865,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - logon drive (G) + logon drive (G) This parameter specifies the local path to which the home directory will be connected (see logon home) @@ -3875,7 +3882,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - logon home (G) + logon home (G) This parameter specifies the home directory location when a Win95/98 or NT Workstation logs into a Samba PDC. It allows you to do @@ -3917,7 +3924,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - logon path (G) + logon path (G) This parameter specifies the home directory where roaming profiles (NTuser.dat etc files for Windows NT) are stored. Contrary to previous versions of these manual pages, it has @@ -3965,7 +3972,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - logon script (G) + logon script (G) This parameter specifies the batch file (.bat) or NT command file (.cmd) to be downloaded and run on a machine when a user successfully logs in. The file must contain the DOS @@ -4007,7 +4014,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - lppause command (S) + lppause command (S) This parameter specifies the command to be executed on the server host in order to stop printing or spooling a specific print job. @@ -4051,7 +4058,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - lpq cache time (G) + lpq cache time (G) This controls how long lpq info will be cached for to prevent the lpq command being called too often. A separate cache is kept for each variation of the @@ -4080,7 +4087,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - lpq command (S) + lpq command (S) This parameter specifies the command to be executed on the server host in order to obtain lpq -style printer status information. @@ -4124,7 +4131,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - lpresume command (S) + lpresume command (S) This parameter specifies the command to be executed on the server host in order to restart or continue printing or spooling a specific print job. @@ -4164,7 +4171,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - lprm command (S) + lprm command (S) This parameter specifies the command to be executed on the server host in order to delete a print job. @@ -4194,7 +4201,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - machine password timeout (G) + machine password timeout (G) If a Samba server is a member of a Windows NT Domain (see the security = domain) parameter) then periodically a running @@ -4204,8 +4211,8 @@ df $1 | tail -1 | awk '{print $2" "$4}' will be changed, in seconds. The default is one week (expressed in seconds), the same as a Windows NT Domain member server. - See also smbpasswd - 8, and the + See also smbpasswd(8) + , and the security = domain) parameter. Default: machine password timeout = 604800 @@ -4214,7 +4221,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - magic output (S) + magic output (S) This parameter specifies the name of a file which will contain output created by a magic script (see the magic script @@ -4234,7 +4241,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - magic script (S) + magic script (S) This parameter specifies the name of a file which, if opened, will be executed by the server when the file is closed. This allows a UNIX script to be sent to the Samba host and @@ -4265,7 +4272,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - mangle case (S) + mangle case (S) See the section on NAME MANGLING @@ -4275,7 +4282,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - mangled map (S) + mangled map (S) This is for those who want to directly map UNIX file names which cannot be represented on Windows/DOS. The mangling of names is not always what is needed. In particular you may have @@ -4300,7 +4307,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - mangled names (S) + mangled names (S) This controls whether non-DOS names under UNIX should be mapped to DOS-compatible names ("mangled") and made visible, or whether non-DOS names should simply be ignored. @@ -4359,7 +4366,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - mangling method (G) + mangling method (G) controls the algorithm used for the generating the mangled names. Can take two different values, "hash" and "hash2". "hash" is the default and is the algorithm that has been @@ -4374,7 +4381,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - mangle prefix (G) + mangle prefix (G) controls the number of prefix characters from the original name used when generating the mangled names. A larger value will give a weaker @@ -4386,10 +4393,10 @@ df $1 | tail -1 | awk '{print $2" "$4}' - mangled stack (G) + mangled stack (G) This parameter controls the number of mangled names - that should be cached in the Samba server smbd - 8. + that should be cached in the Samba server + smbd(8). This stack is a list of recently mangled base names (extensions are only maintained if they are longer than 3 characters @@ -4413,7 +4420,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - mangling char (S) + mangling char (S) This controls what character is used as the magic character in name mangling. The default is a '~' @@ -4430,7 +4437,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - map archive (S) + map archive (S) This controls whether the DOS archive attribute should be mapped to the UNIX owner execute bit. The DOS archive bit is set when a file has been modified since its last backup. One @@ -4450,7 +4457,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - map hidden (S) + map hidden (S) This controls whether DOS style hidden files should be mapped to the UNIX world execute bit. @@ -4465,7 +4472,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - map system (S) + map system (S) This controls whether DOS style system files should be mapped to the UNIX group execute bit. @@ -4480,15 +4487,14 @@ df $1 | tail -1 | awk '{print $2" "$4}' - map to guest (G) + map to guest (G) This parameter is only useful in security modes other than security = share - i.e. user, server, and domain. This parameter can take three different values, which tell - smbd - 8 what to do with user + smbd(8) what to do with user login requests that don't match a valid UNIX user in some way. The three settings are : @@ -4536,7 +4542,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - max connections (S) + max connections (S) This option allows the number of simultaneous connections to a service to be limited. If max connections is greater than 0 then connections will be refused if @@ -4556,7 +4562,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - max disk size (G) + max disk size (G) This option allows you to put an upper limit on the apparent size of disks. If you set this option to 100 then all shares will appear to be not larger than 100 MB in @@ -4583,7 +4589,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - max log size (G) + max log size (G) This option (an integer in kilobytes) specifies the max size the log file should grow to. Samba periodically checks the size and if it is exceeded it will rename the file, adding @@ -4599,7 +4605,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - max mux (G) + max mux (G) This option controls the maximum number of outstanding simultaneous SMB operations that Samba tells the client it will allow. You should never need to set this parameter. @@ -4611,10 +4617,9 @@ df $1 | tail -1 | awk '{print $2" "$4}' - max open files (G) + max open files (G) This parameter limits the maximum number of - open files that one smbd - 8 file + open files that one smbd(8) file serving process may have open for a client at any one time. The default for this parameter is set very high (10,000) as Samba uses only one bit per unopened file. @@ -4630,11 +4635,11 @@ df $1 | tail -1 | awk '{print $2" "$4}' - max print jobs (S) + max print jobs (S) This parameter limits the maximum number of jobs allowable in a Samba printer queue at any given moment. - If this number is exceeded, smbd - 8 will remote "Out of Space" to the client. + If this number is exceeded, + smbd(8) will remote "Out of Space" to the client. See all total print jobs. @@ -4646,7 +4651,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - max protocol (G) + max protocol (G) The value of the parameter (a string) is the highest protocol level that will be supported by the server. @@ -4684,15 +4689,14 @@ df $1 | tail -1 | awk '{print $2" "$4}' - max smbd processes (G) + max smbd processes (G) This parameter limits the maximum number of smbd(8) processes concurrently running on a system and is intended as a stopgap to prevent degrading service to clients in the event that the server has insufficient resources to handle more than this number of connections. Remember that under normal operating - conditions, each user will have an smbd - 8 associated with him or her + conditions, each user will have an smbd associated with him or her to handle connections to all shares from a given host. @@ -4705,9 +4709,8 @@ df $1 | tail -1 | awk '{print $2" "$4}' - max ttl (G) - This option tells nmbd - 8 + max ttl (G) + This option tells nmbd(8) what the default 'time to live' of NetBIOS names should be (in seconds) when nmbd is requesting a name using either a broadcast packet or from a WINS server. You should never need to @@ -4720,9 +4723,9 @@ df $1 | tail -1 | awk '{print $2" "$4}' - max wins ttl (G) - This option tells smbd - 8 when acting as a WINS server ( + max wins ttl (G) + This option tells nmbd(8) + when acting as a WINS server ( wins support = yes) what the maximum 'time to live' of NetBIOS names that nmbd will grant will be (in seconds). You should never need to change this @@ -4738,7 +4741,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - max xmit (G) + max xmit (G) This option controls the maximum packet size that will be negotiated by Samba. The default is 65535, which is the maximum. In some cases you may find you get better performance @@ -4753,7 +4756,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - message command (G) + message command (G) This specifies what command to run when the server receives a WinPopup style message. @@ -4763,13 +4766,13 @@ df $1 | tail -1 | awk '{print $2" "$4}' An example is: - message command = csh -c 'xedit %s;rm %s' & + message command = csh -c 'xedit %s;rm %s' & This delivers the message using xedit, then removes it afterwards. NOTE THAT IT IS VERY IMPORTANT THAT THIS COMMAND RETURN IMMEDIATELY. That's why I - have the '&' on the end. If it doesn't return immediately then + have the '&' on the end. If it doesn't return immediately then your PCs may freeze when sending messages (they should recover after 30 seconds, hopefully). @@ -4814,7 +4817,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' Default: no message command Example: message command = csh -c 'xedit %s; - rm %s' & + rm %s' & @@ -4822,7 +4825,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - min passwd length (G) + min passwd length (G) Synonym for min password length. @@ -4831,7 +4834,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - min password length (G) + min password length (G) This option sets the minimum length in characters of a plaintext password that smbd will accept when performing UNIX password changing. @@ -4849,7 +4852,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - min print space (S) + min print space (S) This sets the minimum amount of free disk space that must be available before a user will be able to spool a print job. It is specified in kilobytes. The default is 0, which @@ -4867,7 +4870,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - min protocol (G) + min protocol (G) The value of the parameter (a string) is the lowest SMB protocol dialect than Samba will support. Please refer to the max protocol @@ -4891,9 +4894,8 @@ df $1 | tail -1 | awk '{print $2" "$4}' - min wins ttl (G) - This option tells nmbd - 8 + min wins ttl (G) + This option tells nmbd(8) when acting as a WINS server ( wins support = yes) what the minimum 'time to live' of NetBIOS names that nmbd will grant will be (in @@ -4906,7 +4908,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - msdfs proxy (S) + msdfs proxy (S) This parameter indicates that the share is a stand-in for another CIFS share whose location is specified by the value of the parameter. When clients attempt to connect to @@ -4917,7 +4919,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' and host msdfs options to find out how to set up a Dfs root share. - Example: msdfs proxy = \\\\otherserver\\someshare + Example: msdfs proxy = \otherserver\someshare @@ -4925,17 +4927,17 @@ df $1 | tail -1 | awk '{print $2" "$4}' - msdfs root (S) + msdfs root (S) This boolean parameter is only available if Samba is configured and compiled with the --with-msdfs option. If set to yes, Samba treats the share as a Dfs root and allows clients to browse the distributed file system tree rooted at the share directory. Dfs links are specified in the share directory by symbolic - links of the form msdfs:serverA\\shareA,serverB\\shareB + links of the form msdfs:serverA\shareA,serverB\shareB and so on. For more information on setting up a Dfs tree - on Samba, refer to "Hosting a Microsoft - Distributed File System tree on Samba" document. + on Samba, refer to msdfs_setup.html + . See also host msdfs @@ -4945,7 +4947,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - name cache timeout (G) + name cache timeout (G) Specifies the number of seconds it takes before entries in samba's hostname resolve cache time out. If the timeout is set to 0. the caching is disabled. @@ -4958,7 +4960,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - name resolve order (G) + name resolve order (G) This option is used by the programs in the Samba suite to determine what naming services to use and in what order to resolve host names to IP addresses. The option takes a space @@ -5011,7 +5013,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - netbios aliases (G) + netbios aliases (G) This is a list of NetBIOS names that nmbd(8) will advertise as additional names by which the Samba server is known. This allows one machine @@ -5032,7 +5034,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - netbios name (G) + netbios name (G) This sets the NetBIOS name by which a Samba server is known. By default it is the same as the first component of the host's DNS name. If a machine is a browse server or @@ -5051,7 +5053,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - netbios scope (G) + netbios scope (G) This sets the NetBIOS scope that Samba will operate under. This should not be set unless every machine on your LAN also sets this value. @@ -5060,7 +5062,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - nis homedir (G) + nis homedir (G) Get the home share server from a NIS map. For UNIX systems that use an automounter, the user's home directory will often be mounted on a workstation on demand from a remote @@ -5093,7 +5095,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - non unix account range (G) + non unix account range (G) The non unix account range parameter specifies the range of 'user ids' that are allocated by the various 'non unix account' passdb backends. These backends allow @@ -5102,10 +5104,10 @@ df $1 | tail -1 | awk '{print $2" "$4}' This range of ids should have no existing local or NIS users within it as strange conflicts can occur otherwise. - These userids never appear on the system and Samba will never + NOTE: These userids never appear on the system and Samba will never 'become' these users. They are used only to ensure that the algorithmic RID mapping does not conflict with normal users. - + Default: non unix account range = <empty string> @@ -5117,7 +5119,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - nt acl support (S) + nt acl support (S) This boolean parameter controls whether smbd(8) will attempt to map UNIX permissions into Windows NT access control lists. @@ -5131,10 +5133,9 @@ df $1 | tail -1 | awk '{print $2" "$4}' - nt pipe support (G) + nt pipe support (G) This boolean parameter controls whether - smbd - 8 will allow Windows NT + smbd(8) will allow Windows NT clients to connect to the NT SMB specific IPC$ pipes. This is a developer debugging option and can be left alone. @@ -5146,7 +5147,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - nt status support (G) + nt status support (G) This boolean parameter controls whether smbd(8) will negotiate NT specific status support with Windows NT/2k/XP clients. This is a developer @@ -5163,12 +5164,11 @@ df $1 | tail -1 | awk '{print $2" "$4}' - null passwords (G) + null passwords (G) Allow or disallow client access to accounts that have null passwords. - See also smbpasswd - 5. + See also smbpasswd (5). Default: null passwords = no @@ -5178,7 +5178,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - obey pam restrictions (G) + obey pam restrictions (G) When Samba 2.2 is configured to enable PAM support (i.e. --with-pam), this parameter will control whether or not Samba should obey PAM's account and session management directives. The @@ -5199,7 +5199,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - only user (S) + only user (S) This is a boolean option that controls whether connections with usernames not in the user list will be allowed. By default this option is disabled so that a @@ -5227,7 +5227,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - only guest (S) + only guest (S) A synonym for guest only. @@ -5236,7 +5236,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - oplock break wait time (G) + oplock break wait time (G) This is a tuning parameter added due to bugs in both Windows 9x and WinNT. If Samba responds to a client too quickly when that client issues an SMB that can cause an oplock @@ -5254,15 +5254,15 @@ df $1 | tail -1 | awk '{print $2" "$4}' - oplock contention limit (S) + oplock contention limit (S) This is a very advanced smbd(8) tuning option to improve the efficiency of the granting of oplocks under multiple client contention for the same file. - In brief it specifies a number, which causes smbd - 8not to grant an oplock even when requested - if the approximate number of clients contending for an oplock on the same file goes over this + In brief it specifies a number, which causes smbd not to + grant an oplock even when requested if the approximate number of + clients contending for an oplock on the same file goes over this limit. This causes smbd to behave in a similar way to Windows NT. @@ -5278,7 +5278,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - oplocks (S) + oplocks (S) This boolean option tells smbd whether to issue oplocks (opportunistic locks) to file open requests on this share. The oplock code can dramatically (approx. 30% or more) improve @@ -5306,16 +5306,13 @@ df $1 | tail -1 | awk '{print $2" "$4}' - ntlm auth (G) - This parameter determines - whether or not smbd - 8 will + ntlm auth (G) + This parameter determines whether or not smbd will attempt to authenticate users using the NTLM password hash. If disabled, only the lanman password hashes will be used. - Please note that at least this option or lanman auth should - be enabled in order to be able to log in. + Please note that at least this option or lanman auth should be enabled in order to be able to log in. Default : ntlm auth = yes @@ -5323,11 +5320,10 @@ df $1 | tail -1 | awk '{print $2" "$4}' - os level (G) + os level (G) This integer value controls what level Samba advertises itself as for browse elections. The value of this - parameter determines whether nmbd - 8 + parameter determines whether nmbd(8) has a chance of becoming a local master browser for the WORKGROUP in the local broadcast area. @@ -5347,7 +5343,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - os2 driver map (G) + os2 driver map (G) The parameter is used to define the absolute path to a file containing a mapping of Windows NT printer driver names to OS/2 printer driver names. The format is: @@ -5360,9 +5356,10 @@ df $1 | tail -1 | awk '{print $2" "$4}' LaserJet 5L. The need for the file is due to the printer driver namespace - problem described in the Samba + problem described in the Samba Printing HOWTO. For more details on OS/2 clients, please - refer to the OS2-Client-HOWTO containing in the Samba documentation. + refer to the OS2-Client-HOWTO + containing in the Samba documentation. Default: os2 driver map = <empty string> @@ -5371,7 +5368,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - pam password change (G) + pam password change (G) With the addition of better PAM support in Samba 2.2, this parameter, it is possible to use PAM's password change control flag for Samba. If enabled, then PAM will be used for password @@ -5389,12 +5386,12 @@ df $1 | tail -1 | awk '{print $2" "$4}' - panic action (G) + panic action (G) This is a Samba developer option that allows a - system command to be called when either smbd - 8 or smbd - 8 crashes. This is usually used to - draw attention to the fact that a problem occurred. + system command to be called when either + smbd(8) or nmbd(8) + crashes. This is usually used to draw attention to the fact that + a problem occurred. Default: panic action = <empty string> Example: panic action = "/bin/sleep 90000" @@ -5402,24 +5399,20 @@ df $1 | tail -1 | awk '{print $2" "$4}' - paranoid server security (G) + paranoid server security (G) Some version of NT 4.x allow non-guest users with a bad passowrd. When this option is enabled, samba will not use a broken NT 4.x server as password server, but instead complain - to the logs and exit. + to the logs and exit. - Disabling this option prevents Samba from making - this check, which involves deliberatly attempting a - bad logon to the remote server. - Default: paranoid server security = yes - passdb backend (G) + passdb backend (G) This option allows the administrator to chose which backends to retrieve and store passwords with. This allows (for example) both smbpasswd and tdbsam to be used without a recompile. Multiple backends can be specified, separated by spaces. The backends will be searched in the order they are specified. New users are always added to the first backend specified. @@ -5487,7 +5480,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' for its own processing - unixsam - Allows samba to map all (other) available unix users + unixsam - (EXPERIMENTAL) Allows samba to map all (other) available unix users This backend uses the standard unix database for retrieving users. Users included in this pdb are NOT listed in samba user listings and users included in this pdb won't be @@ -5503,22 +5496,22 @@ df $1 | tail -1 | awk '{print $2" "$4}' - Default: passdb backend = smbpasswd unixsam - Example: passdb backend = tdbsam:/etc/samba/private/passdb.tdb smbpasswd:/etc/samba/smbpasswd unixsam - Example: passdb backend = ldapsam_nua:ldaps://ldap.example.com unixsam + Default: passdb backend = smbpasswd guest + Example: passdb backend = tdbsam:/etc/samba/private/passdb.tdb smbpasswd:/etc/samba/smbpasswd + Example: passdb backend = ldapsam_nua:ldaps://ldap.example.com Example: passdb backend = plugin:/usr/local/samba/lib/my_passdb.so:my_plugin_args tdbsam:/etc/samba/private/passdb.tdb - passwd chat (G) + passwd chat (G) This string controls the "chat" - conversation that takes places between smbd - 8 and the local password changing + conversation that takes places between smbd and the local password changing program to change the user's password. The string describes a - sequence of response-receive pairs that smbd - 8 uses to determine what to send to the + sequence of response-receive pairs that + smbd(8) uses to determine what to send to the passwd program and what to expect back. If the expected output is not received then the password is not changed. @@ -5540,8 +5533,8 @@ df $1 | tail -1 | awk '{print $2" "$4}' The string can contain the macro %n which is substituted for the new password. The chat sequence can also contain the standard - macros \\n, \\r, - \\t and \\s to give line-feed, + macros \n, \r, + \t and \s to give line-feed, carriage-return, tab and space. The chat sequence string can also contain a '*' which matches any sequence of characters. Double quotes can be used to collect strings with spaces @@ -5563,10 +5556,10 @@ df $1 | tail -1 | awk '{print $2" "$4}' passwd chat debug and pam password change. - Default: passwd chat = *new*password* %n\\n - *new*password* %n\\n *changed* - Example: passwd chat = "*Enter OLD password*" %o\\n - "*Enter NEW password*" %n\\n "*Reenter NEW password*" %n\\n "*Password + Default: passwd chat = *new*password* %n\n + *new*password* %n\n *changed* + Example: passwd chat = "*Enter OLD password*" %o\n + "*Enter NEW password*" %n\n "*Reenter NEW password*" %n\n "*Password changed*" @@ -5574,12 +5567,11 @@ df $1 | tail -1 | awk '{print $2" "$4}' - passwd chat debug (G) + passwd chat debug (G) This boolean specifies if the passwd chat script parameter is run in debug mode. In this mode the strings passed to and received from the passwd chat are printed - in the smbd - 8 log with a + in the smbd(8) log with a debug level of 100. This is a dangerous option as it will allow plaintext passwords to be seen in the smbd log. It is available to help @@ -5602,7 +5594,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - passwd program (G) + passwd program (G) The name of a program that can be used to set UNIX user passwords. Any occurrences of %u will be replaced with the user name. The user name is checked for @@ -5640,7 +5632,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - password level (G) + password level (G) Some client/server combinations have difficulty with mixed-case passwords. One offending client is Windows for Workgroups, which for some reason forces passwords to upper @@ -5683,7 +5675,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - password server (G) + password server (G) By specifying the name of another SMB server (such as a WinNT box) with this option, and using security = domain or security = server you can get Samba @@ -5704,10 +5696,10 @@ df $1 | tail -1 | awk '{print $2" "$4}' the "LM1.2X002" or the "NT LM 0.12" protocol, and it must be in user level security mode. - Using a password server + NOTE: Using a password server means your UNIX box (running Samba) is only as secure as your password server. DO NOT CHOOSE A PASSWORD SERVER THAT - YOU DON'T COMPLETELY TRUST. + YOU DON'T COMPLETELY TRUST. Never point a Samba server at itself for password serving. This will cause a loop and could lock up your Samba @@ -5778,7 +5770,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - path (S) + path (S) This parameter specifies a directory to which the user of the service is to be given access. In the case of printable services, this is where print data will spool prior to @@ -5809,7 +5801,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - pid directory (G) + pid directory (G) This option specifies the directory where pid files will be placed. @@ -5821,9 +5813,8 @@ df $1 | tail -1 | awk '{print $2" "$4}' - posix locking (S) - The smbd - 8 + posix locking (S) + The smbd(8) daemon maintains an database of file locks obtained by SMB clients. The default behavior is to map this internal database to POSIX locks. This means that file locks obtained by SMB clients are @@ -5839,7 +5830,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - postexec (S) + postexec (S) This option specifies a command to be run whenever the service is disconnected. It takes the usual substitutions. The command may be run as the root on some @@ -5864,7 +5855,23 @@ df $1 | tail -1 | awk '{print $2" "$4}' - preexec (S) + postscript (S) + This parameter forces a printer to interpret + the print files as PostScript. This is done by adding a %! + to the start of print output. + + This is most useful when you have lots of PCs that persist + in putting a control-D at the start of print jobs, which then + confuses your printer. + + Default: postscript = no + + + + + + + preexec (S) This option specifies a command to be run whenever the service is connected to. It takes the usual substitutions. @@ -5873,12 +5880,12 @@ df $1 | tail -1 | awk '{print $2" "$4}' is an example: preexec = csh -c 'echo \"Welcome to %S!\" | - /usr/local/samba/bin/smbclient -M %m -I %I' & + /usr/local/samba/bin/smbclient -M %m -I %I' & Of course, this could get annoying after a while :-) See also preexec close - and postexec + and postexec . Default: none (no command executed) @@ -5890,7 +5897,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - preexec close (S) + preexec close (S) This boolean option controls whether a non-zero return code from preexec should close the service being connected to. @@ -5901,7 +5908,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - preferred master (G) + preferred master (G) This boolean parameter controls if nmbd(8) is a preferred master browser for its workgroup. @@ -5930,7 +5937,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - prefered master (G) + prefered master (G) Synonym for preferred master for people who cannot spell :-). @@ -5939,7 +5946,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - preload (G) + preload (G) This is a list of services that you want to be automatically added to the browse lists. This is most useful for homes and printers services that would otherwise not be @@ -5955,24 +5962,9 @@ df $1 | tail -1 | awk '{print $2" "$4}' - - preload modules (G) - This is a list of paths to modules that should - be loaded into smbd before a client connects. This improves - the speed of smbd when reacting to new connections somewhat. - - It is recommended to only use this option on heavy-performance - servers. - - Default: preload modules = - - Example: preload modules = /usr/lib/samba/passdb/mysql.so - - - - preserve case (S) + preserve case (S) This controls if new filenames are created with the case that the client passes, or if they are forced to be the default case @@ -5988,7 +5980,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - print command (S) + print command (S) After a print job has finished spooling to a service, this command will be used via a system() call to process the spool file. Typically the command specified will @@ -6078,7 +6070,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - print ok (S) + print ok (S) Synonym for printable. @@ -6088,7 +6080,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - printable (S) + printable (S) If this parameter is yes, then clients may open, write to and submit spool files on the directory specified for the service. @@ -6106,7 +6098,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - printcap (G) + printcap (G) Synonym for printcap name. @@ -6116,7 +6108,7 @@ df $1 | tail -1 | awk '{print $2" "$4}' - printcap name (G) + printcap name (G) This parameter may be used to override the compiled-in default printcap name used by the server (usually /etc/printcap). See the discussion of the A minimal printcap file would look something like this: - -print1|My Printer 1 -print2|My Printer 2 -print3|My Printer 3 -print4|My Printer 4 -print5|My Printer 5 - + + print1|My Printer 1 + print2|My Printer 2 + print3|My Printer 3 + print4|My Printer 4 + print5|My Printer 5 + where the '|' separates aliases of a printer. The fact that the second alias has a space in it gives a hint to Samba that it's a comment. - Under AIX the default printcap + NOTE: Under AIX the default printcap name is /etc/qconfig. Samba will assume the file is in AIX qconfig format if the string - qconfig appears in the printcap filename. + qconfig appears in the printcap filename. Default: printcap name = /etc/printcap Example: printcap name = /etc/myprintcap @@ -6169,7 +6161,7 @@ print5|My Printer 5 - printer admin (S) + printer admin (S) This is a list of users that can do anything to printers via the remote administration interfaces offered by MS-RPC (usually using a NT workstation). Note that the root user always @@ -6183,8 +6175,113 @@ print5|My Printer 5 + + + + printer driver (S) + Note :This is a deprecated + parameter and will be removed in the next major release + following version 2.2. Please see the instructions in + the Samba 2.2. Printing + HOWTO for more information + on the new method of loading printer drivers onto a Samba server. + + + This option allows you to control the string + that clients receive when they ask the server for the printer driver + associated with a printer. If you are using Windows95 or Windows NT + then you can use this to automate the setup of printers on your + system. + + You need to set this parameter to the exact string (case + sensitive) that describes the appropriate printer driver for your + system. If you don't know the exact string to use then you should + first try with no + printer driver option set and the client will + give you a list of printer drivers. The appropriate strings are + shown in a scroll box after you have chosen the printer manufacturer. + + See also printer + driver file. + + Example: printer driver = HP LaserJet 4L + + + + + - printer name (S) + printer driver file (G) + Note :This is a deprecated + parameter and will be removed in the next major release + following version 2.2. Please see the instructions in + the Samba 2.2. Printing + HOWTO for more information + on the new method of loading printer drivers onto a Samba server. + + + This parameter tells Samba where the printer driver + definition file, used when serving drivers to Windows 95 clients, is + to be found. If this is not set, the default is : + + SAMBA_INSTALL_DIRECTORY + /lib/printers.def + + This file is created from Windows 95 msprint.inf + files found on the Windows 95 client system. For more + details on setting up serving of printer drivers to Windows 95 + clients, see the outdated documentation file in the docs/ + directory, PRINTER_DRIVER.txt. + + See also + printer driver location. + + Default: None (set in compile). + + Example: printer driver file = + /usr/local/samba/printers/drivers.def + + + + + + + + printer driver location (S) + Note :This is a deprecated + parameter and will be removed in the next major release + following version 2.2. Please see the instructions in + the Samba 2.2. Printing + HOWTO for more information + on the new method of loading printer drivers onto a Samba server. + + + This parameter tells clients of a particular printer + share where to find the printer driver files for the automatic + installation of drivers for Windows 95 machines. If Samba is set up + to serve printer drivers to Windows 95 machines, this should be set to + + \\MACHINE\PRINTER$ + + Where MACHINE is the NetBIOS name of your Samba server, + and PRINTER$ is a share you set up for serving printer driver + files. For more details on setting this up see the outdated documentation + file in the docs/ directory, + PRINTER_DRIVER.txt. + + See also + printer driver file. + + Default: none + Example: printer driver location = \\MACHINE\PRINTER$ + + + + + + + + printer name (S) This parameter specifies the name of the printer to which print jobs spooled through a printable service will be sent. @@ -6201,7 +6298,7 @@ print5|My Printer 5 - printer (S) + printer (S) Synonym for printer name. @@ -6210,7 +6307,7 @@ print5|My Printer 5 - printing (S) + printing (S) This parameters controls how printer status information is interpreted on your system. It also affects the default values for the print command, @@ -6241,7 +6338,7 @@ print5|My Printer 5 - private dir (G) + private dir (G) This parameters defines the directory smbd will use for storing such files as smbpasswd and secrets.tdb. @@ -6255,7 +6352,7 @@ print5|My Printer 5 - protocol (G) + protocol (G) Synonym for max protocol. @@ -6264,7 +6361,7 @@ print5|My Printer 5 - public (S) + public (S) Synonym for guest ok. @@ -6273,7 +6370,7 @@ print5|My Printer 5 - queuepause command (S) + queuepause command (S) This parameter specifies the command to be executed on the server host in order to pause the printer queue. @@ -6302,7 +6399,7 @@ print5|My Printer 5 - queueresume command (S) + queueresume command (S) This parameter specifies the command to be executed on the server host in order to resume the printer queue. It is the command to undo the behavior that is caused by the @@ -6337,7 +6434,7 @@ print5|My Printer 5 - read bmpx (G) + read bmpx (G) This boolean parameter controls whether smbd(8) will support the "Read Block Multiplex" SMB. This is now rarely used and defaults to @@ -6352,7 +6449,7 @@ print5|My Printer 5 - read list (S) + read list (S) This is a list of users that are given read-only access to a service. If the connecting user is in this list then they will not be given write access, no matter what the - read only (S) + read only (S) An inverted synonym is writeable. @@ -6393,7 +6490,7 @@ print5|My Printer 5 - read raw (G) + read raw (G) This parameter controls whether or not the server will support the raw read SMB requests when transferring data to clients. @@ -6416,7 +6513,7 @@ print5|My Printer 5 - read size (G) + read size (G) The option read size affects the overlap of disk reads/writes with network reads/writes. If the amount of data being transferred in several of the SMB @@ -6443,7 +6540,7 @@ print5|My Printer 5 - realm (G) + realm (G) This option specifies the kerberos realm to use. The realm is used as the ADS equivalent of the NT4domain. It @@ -6456,7 +6553,7 @@ print5|My Printer 5 - remote announce (G) + remote announce (G) This option allows you to setup nmbd(8) to periodically announce itself to arbitrary IP addresses with an arbitrary workgroup name. @@ -6481,7 +6578,7 @@ print5|My Printer 5 addresses of the remote networks, but can also be the IP addresses of known browse masters if your network config is that stable. - See the documentation file BROWSING + See the documentation file BROWSING.txt in the docs/ directory. Default: remote announce = <empty string> @@ -6492,7 +6589,7 @@ print5|My Printer 5 - remote browse sync (G) + remote browse sync (G) This option allows you to setup nmbd(8) to periodically request synchronization of browse lists with the master browser of a Samba @@ -6530,7 +6627,7 @@ print5|My Printer 5 - restrict anonymous (G) + restrict anonymous (G) This is a integer parameter, and mirrors as much as possible the functinality the RestrictAnonymous @@ -6543,7 +6640,7 @@ print5|My Printer 5 - root (G) + root (G) Synonym for root directory". @@ -6552,7 +6649,7 @@ print5|My Printer 5 - root dir (G) + root dir (G) Synonym for root directory". @@ -6560,7 +6657,7 @@ print5|My Printer 5 - root directory (G) + root directory (G) The server will chroot() (i.e. Change its root directory) to this directory on startup. This is not strictly necessary for secure operation. Even without it the @@ -6592,7 +6689,7 @@ print5|My Printer 5 - root postexec (S) + root postexec (S) This is the same as the postexec parameter except that the command is run as root. This is useful for unmounting filesystems @@ -6607,7 +6704,7 @@ print5|My Printer 5 - root preexec (S) + root preexec (S) This is the same as the preexec parameter except that the command is run as root. This is useful for mounting filesystems (such as CDROMs) when a @@ -6625,7 +6722,7 @@ print5|My Printer 5 - root preexec close (S) + root preexec close (S) This is the same as the preexec close parameter except that the command is run as root. @@ -6639,14 +6736,14 @@ print5|My Printer 5 - security (G) + security (G) This option affects how clients respond to Samba and is one of the most important settings in the smb.conf file. The option sets the "security mode bit" in replies to - protocol negotiations with smbd - 8 to turn share level security on or off. Clients decide + protocol negotiations with smbd(8) + to turn share level security on or off. Clients decide based on this bit whether (and how) to transfer user and password information to the server. @@ -6691,7 +6788,7 @@ print5|My Printer 5 The different settings will now be explained. - SECURITY = SHARE + SECURITY = SHARE When clients connect to a share level security server they @@ -6760,10 +6857,10 @@ print5|My Printer 5 See also the section NOTE ABOUT USERNAME/PASSWORD VALIDATION. - SECURITY = USER + SECURITY = USER - This is the default security setting in Samba 3.0. + This is the default security setting in Samba 2.2. With user-level security a client must first "log-on" with a valid username and password (which can be mapped using the username map @@ -6787,27 +6884,24 @@ print5|My Printer 5 See also the section NOTE ABOUT USERNAME/PASSWORD VALIDATION. - SECURITY = DOMAIN - + SECURITY = SERVER - This mode will only work correctly if net - 8 has been used to add this - machine into a Windows NT Domain. It expects the encrypted passwords - parameter to be set to yes. In this - mode Samba will try to validate the username/password by passing - it to a Windows NT Primary or Backup Domain Controller, in exactly - the same way that a Windows NT Server would do. - - Note that a valid UNIX user must still - exist as well as the account on the Domain Controller to allow - Samba to have a valid UNIX account to map file access to. + In this mode Samba will try to validate the username/password + by passing it to another SMB server, such as an NT box. If this + fails it will revert to security = user, but note + that if encrypted passwords have been negotiated then Samba cannot + revert back to checking the UNIX password file, it must have a valid + smbpasswd file to check users against. See the + documentation file in the docs/ directory + ENCRYPTION.txt for details on how to set this + up. - Note that from the client's point - of view security = domain is the same as security = user - . It only affects how the server deals with the authentication, - it does not in any way affect what the client sees. + Note that from the client's point of + view security = server is the same as + security = user. It only affects how the server deals + with the authentication, it does not in any way affect what the + client sees. Note that the name of the resource being requested is not sent to the server until after @@ -6825,42 +6919,27 @@ print5|My Printer 5 server parameter and the encrypted passwords parameter. - - SECURITY = SERVER + + SECURITY = DOMAIN - In this mode Samba will try to validate the username/password - by passing it to another SMB server, such as an NT box. If this - fails it will revert to security = - user. It expects the This mode will only work correctly if smbpasswd(8) has been used to add this + machine into a Windows NT Domain. It expects the encrypted passwords - parameter to be set to - yes, unless the remote server - does not support them. However note - that if encrypted passwords have been negotiated then Samba cannot - revert back to checking the UNIX password file, it must have a valid - smbpasswd file to check users against. See the - documentation file in the docs/ directory - ENCRYPTION.txt for details on how to set this - up. + parameter to be set to yes. In this + mode Samba will try to validate the username/password by passing + it to a Windows NT Primary or Backup Domain Controller, in exactly + the same way that a Windows NT Server would do. - Note this mode of operation - has significant pitfalls, due to the fact that is - activly initiates a man-in-the-middle attack on the - remote SMB server. In particular, this mode of - operation can cause significant resource consuption on - the PDC, as it must maintain an active connection for - the duration of the user's session. Furthermore, if - this connection is lost, there is no way to - reestablish it, and futher authenticaions to the Samba - server may fail. (From a single client, till it - disconnects). + Note that a valid UNIX user must still + exist as well as the account on the Domain Controller to allow + Samba to have a valid UNIX account to map file access to. - Note that from the client's point of - view security = server is the same as - security = user. It only affects how the server deals - with the authentication, it does not in any way affect what the - client sees. + Note that from the client's point + of view security = domain is the same as security = user + . It only affects how the server deals with the authentication, + it does not in any way affect what the client sees. Note that the name of the resource being requested is not sent to the server until after @@ -6871,6 +6950,14 @@ print5|My Printer 5 See the map to guest parameter for details on doing this. + BUG: There is currently a bug in the + implementation of security = domain with respect + to multi-byte character set usernames. The communication with a + Domain Controller must be done in UNICODE and Samba currently + does not widen multi-byte user names to UNICODE correctly, thus + a multi-byte username will not be recognized correctly at the + Domain Controller. This issue will be addressed in a future release. + See also the section NOTE ABOUT USERNAME/PASSWORD VALIDATION. @@ -6878,17 +6965,16 @@ print5|My Printer 5 server parameter and the encrypted passwords parameter. - + Default: security = USER Example: security = DOMAIN - - security mask (S) + security mask (S) This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security @@ -6923,7 +7009,7 @@ print5|My Printer 5 - server string (G) + server string (G) This controls what string will show up in the printer comment box in print manager and next to the IPC connection in net view. It can be any string that you wish @@ -6967,7 +7053,7 @@ print5|My Printer 5 - set directory (S) + set directory (S) If set directory = no, then users of the service may not use the setdir command to change directory. @@ -6983,7 +7069,7 @@ print5|My Printer 5 - share modes (S) + share modes (S) This enables or disables the honoring of the share modes during a file open. These modes are used by clients to gain exclusive read or write access @@ -7012,7 +7098,7 @@ print5|My Printer 5 - short preserve case (S) + short preserve case (S) This boolean parameter controls if new files which conform to 8.3 syntax, that is all in upper case and of suitable length, are created upper case, or if they are forced @@ -7032,7 +7118,7 @@ print5|My Printer 5 - show add printer wizard (G) + show add printer wizard (G) With the introduction of MS-RPC based printing support for Windows NT/2000 client in Samba 2.2, a "Printers..." folder will appear on Samba hosts in the share listing. Normally this folder will @@ -7067,7 +7153,7 @@ print5|My Printer 5 - shutdown script (G) + shutdown script (G) This parameter only exists in the HEAD cvs branch This a full path name to a script called by smbd(8) that @@ -7093,15 +7179,15 @@ print5|My Printer 5 Default: None. Example: abort shutdown script = /usr/local/samba/sbin/shutdown %m %t %r %f Shutdown script example: - -#!/bin/bash + + #!/bin/bash -$time=0 -let "time/60" -let "time++" + $time=0 + let "time/60" + let "time++" -/sbin/shutdown $3 $4 +$time $1 & - + /sbin/shutdown $3 $4 +$time $1 & + Shutdown does not return so we need to launch it in background. @@ -7111,7 +7197,7 @@ let "time++" - smb passwd file (G) + smb passwd file (G) This option sets the path to the encrypted smbpasswd file. By default the path to the smbpasswd file is compiled into Samba. @@ -7126,7 +7212,7 @@ let "time++" - smb ports (G) + smb ports (G) Specifies which ports the server should listen on for SMB traffic. @@ -7137,7 +7223,7 @@ let "time++" - socket address (G) + socket address (G) This option allows you to control what address Samba will listen for connections on. This is used to support multiple virtual interfaces on the one server, each @@ -7154,7 +7240,7 @@ let "time++" - socket options (G) + socket options (G) This option allows you to set socket options to be used when talking with the client. @@ -7227,7 +7313,7 @@ let "time++" - source environment (G) + source environment (G) This parameter causes Samba to set environment variables as per the content of the file named. @@ -7249,23 +7335,17 @@ let "time++" /usr/local/smb_env_vars + +use spnego (G) + This variable controls controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000sp2 clients to agree upon an authentication mechanism. As of samba 3.0alpha it must be set to "no" for these clients to join a samba domain controller. It can be set to "yes" to allow samba to participate in an AD domain controlled by a Windows2000 domain controller. +Default: use spnego = yes + + - use spnego (G) - This variable controls controls whether samba will try - to use Simple and Protected NEGOciation (as specified by rfc2478) with - WindowsXP and Windows2000sp2 clients to agree upon an authentication mechanism. - Unless further issues are discovered with our SPNEGO - implementation, there is no reason this should ever be - disabled. - Default: use spnego = yes - - - - - stat cache (G) - This parameter determines if smbd - 8 will use a cache in order to + stat cache (G) + This parameter determines if smbd(8) will use a cache in order to speed up case insensitive name mappings. You should never need to change this parameter. @@ -7274,7 +7354,7 @@ let "time++" - stat cache size (G) + stat cache size (G) This parameter determines the number of entries in the stat cache. You should never need to change this parameter. @@ -7286,7 +7366,7 @@ let "time++" - strict allocate (S) + strict allocate (S) This is a boolean that controls the handling of disk space allocation in the server. When this is set to yes the server will change from UNIX behaviour of not committing real @@ -7310,7 +7390,7 @@ let "time++" - strict locking (S) + strict locking (S) This is a boolean that controls the handling of file locking in the server. When this is set to yes the server will check every read and write access for file locks, and @@ -7330,7 +7410,7 @@ let "time++" - strict sync (S) + strict sync (S) Many Windows applications (including the Windows 98 explorer shell) seem to confuse flushing buffer contents to disk with doing a sync to disk. Under UNIX, a sync call forces @@ -7338,8 +7418,7 @@ let "time++" all outstanding data in kernel disk buffers has been safely stored onto stable storage. This is very slow and should only be done rarely. Setting this parameter to no (the - default) means that smbd - 8 ignores the Windows applications requests for + default) means that smbd ignores the Windows applications requests for a sync call. There is only a possibility of losing data if the operating system itself that Samba is running on crashes, so there is little danger in this default setting. In addition, this fixes many @@ -7355,7 +7434,7 @@ let "time++" - strip dot (G) + strip dot (G) This is a boolean that controls whether to strip trailing dots off UNIX filenames. This helps with some CDROMs that have filenames ending in a single dot. @@ -7367,7 +7446,7 @@ let "time++" - sync always (S) + sync always (S) This is a boolean parameter that controls whether writes will always be written to stable storage before the write call returns. If this is no then the server will be @@ -7389,7 +7468,7 @@ let "time++" - syslog (G) + syslog (G) This parameter maps how Samba debug messages are logged onto the system syslog logging levels. Samba debug level zero maps onto syslog LOG_ERR, debug @@ -7409,7 +7488,7 @@ let "time++" - syslog only (G) + syslog only (G) If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files. @@ -7421,7 +7500,7 @@ let "time++" - template homedir (G) + template homedir (G) When filling out the user information for a Windows NT user, the winbindd(8) daemon uses this parameter to fill in the home directory for that user. @@ -7437,10 +7516,9 @@ let "time++" - template shell (G) + template shell (G) When filling out the user information for a Windows NT - user, the winbindd - 8 daemon + user, the winbindd(8) daemon uses this parameter to fill in the login shell for that user. Default: template shell = /bin/false @@ -7450,7 +7528,7 @@ let "time++" - time offset (G) + time offset (G) This parameter is a setting in minutes to add to the normal GMT to local time conversion. This is useful if you are serving a lot of PCs that have incorrect daylight @@ -7464,9 +7542,9 @@ let "time++" - time server (G) - This parameter determines if nmbd - 8 advertises itself as a time server to Windows + time server (G) + This parameter determines if + nmbd(8) advertises itself as a time server to Windows clients. Default: time server = no @@ -7475,7 +7553,7 @@ let "time++" - timestamp logs (G) + timestamp logs (G) Synonym for debug timestamp. @@ -7486,17 +7564,16 @@ let "time++" - total print jobs (G) + total print jobs (G) This parameter accepts an integer value which defines a limit on the maximum number of print jobs that will be accepted system wide at any given time. If a print job is submitted - by a client which will exceed this number, then smbd - 8 will return an + by a client which will exceed this number, then smbd will return an error indicating that no space is available on the server. The default value of 0 means that no such limit exists. This parameter can be used to prevent a server from exceeding its capacity and is designed as a printing throttle. See also - max print jobs. + max print jobs. Default: total print jobs = 0 @@ -7505,7 +7582,7 @@ let "time++" - unicode (G) + unicode (G) Specifies whether Samba should try to use unicode on the wire by default. Note: This does NOT mean that samba will assume that the unix machine uses unicode! @@ -7517,19 +7594,19 @@ let "time++" - unix charset (G) + unix charset (G) Specifies the charset the unix machine Samba runs on uses. Samba needs to know this in order to be able to convert text to the charsets other SMB clients use. - Default: unix charset = UTF8 - Example: unix charset = ASCII + Default: unix charset = ASCII + Example: unix charset = UTF8 - unix extensions(G) + unix extensions(G) This boolean parameter controls whether Samba implments the CIFS UNIX extensions, as defined by HP. These extensions enable Samba to better serve UNIX CIFS clients @@ -7545,7 +7622,7 @@ let "time++" - unix password sync (G) + unix password sync (G) This boolean parameter controls whether Samba attempts to synchronize the UNIX password with the SMB password when the encrypted SMB password in the smbpasswd file is changed. @@ -7566,7 +7643,7 @@ let "time++" - update encrypted (G) + update encrypted (G) This boolean parameter allows a user logging on with a plaintext password to have their encrypted (hashed) password in the smbpasswd file to be updated automatically as @@ -7597,7 +7674,7 @@ let "time++" - use client driver (S) + use client driver (S) This parameter applies only to Windows NT/2000 clients. It has no affect on Windows 95/98/ME clients. When serving a printer to Windows NT/2000 clients without first installing @@ -7635,7 +7712,7 @@ let "time++" - use mmap (G) + use mmap (G) This global parameter determines if the tdb internals of Samba can depend on mmap working correctly on the running system. Samba requires a coherent mmap/read-write system memory cache. Currently only HPUX does not have such a @@ -7653,7 +7730,27 @@ let "time++" - user (S) + use rhosts (G) + If this global parameter is yes, it specifies + that the UNIX user's .rhosts file in their home directory + will be read to find the names of hosts and users who will be allowed + access without specifying a password. + + NOTE: The use of use rhosts + can be a major security hole. This is because you are + trusting the PC to supply the correct username. It is very easy to + get a PC to supply a false username. I recommend that the + use rhosts option be only used if you really know what + you are doing. + + Default: use rhosts = no + + + + + + + user (S) Synonym for username. @@ -7662,7 +7759,7 @@ let "time++" - users (S) + users (S) Synonym for username. @@ -7670,7 +7767,7 @@ let "time++" - username (S) + username (S) Multiple users may be specified in a comma-delimited list, in which case the supplied password will be tested against each username in turn (left to right). @@ -7711,7 +7808,7 @@ let "time++" will be looked up only in the UNIX groups database and will expand to a list of all users in the group of that name. - If any of the usernames begin with a '&' then the name + If any of the usernames begin with a '&'then the name will be looked up only in the NIS netgroups database (if Samba is compiled with netgroup support) and will expand to a list of all users in the netgroup group of that name. @@ -7735,7 +7832,7 @@ let "time++" - username level (G) + username level (G) This option helps Samba to try and 'guess' at the real UNIX username, as many DOS clients send an all-uppercase username. By default Samba tries all lowercase, followed by the @@ -7758,7 +7855,7 @@ let "time++" - username map (G) + username map (G) This option allows you to specify a file containing a mapping of usernames from the clients to the server. This can be used for several purposes. The most common is to map usernames @@ -7821,10 +7918,10 @@ let "time++" '!' to tell Samba to stop processing if it gets a match on that line. - -!sys = mary fred -guest = * - + + !sys = mary fred + guest = * + Note that the remapping is applied to all occurrences of usernames. Thus if you connect to \\server\fred and @@ -7850,7 +7947,7 @@ guest = * - use sendfile (S) + use sendfile (S) If this parameter is yes, and Samba was built with the --with-sendfile-support option, and the underlying operating system supports sendfile system call, then some SMB read calls (mainly ReadAndX @@ -7867,7 +7964,7 @@ guest = * - utmp (G) + utmp (G) This boolean parameter is only available if Samba has been configured and compiled with the option --with-utmp. If set to yes then Samba will attempt @@ -7889,7 +7986,7 @@ guest = * - utmp directory(G) + utmp directory(G) This parameter is only available if Samba has been configured and compiled with the option --with-utmp. It specifies a directory pathname that is @@ -7906,7 +8003,7 @@ guest = * - wtmp directory(G) + wtmp directory(G) This parameter is only available if Samba has been configured and compiled with the option --with-utmp. It specifies a directory pathname that is @@ -7928,9 +8025,9 @@ guest = * - valid users (S) + valid users (S) This is a list of users that should be allowed - to login to this service. Names starting with '@', '+' and '&' + to login to this service. Names starting with '@', '+' and '&' are interpreted using the same rules as described in the invalid users parameter. @@ -7955,7 +8052,7 @@ guest = * - veto files(S) + veto files(S) This is a list of files and directories that are neither visible nor accessible. Each entry in the list must be separated by a '/', which allows spaces to be included @@ -8003,7 +8100,7 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - veto oplock files (S) + veto oplock files (S) This parameter is only valid when the oplocks parameter is turned on for a share. It allows the Samba administrator @@ -8029,7 +8126,7 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - vfs path (S) + vfs path (S) This parameter specifies the directory to look in for vfs modules. The name of every vfs object will be prepended by this directory @@ -8042,7 +8139,7 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - vfs object (S) + vfs object (S) This parameter specifies a shared object files that are used for Samba VFS I/O operations. By default, normal disk I/O operations are used but these can be overloaded @@ -8056,7 +8153,7 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - vfs options (S) + vfs options (S) This parameter allows parameters to be passed to the vfs layer at initialization time. See also @@ -8069,7 +8166,7 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - volume (S) + volume (S) This allows you to override the volume label returned for a share. Useful for CDROMs with installation programs that insist on a particular volume label. @@ -8081,7 +8178,7 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - wide links (S) + wide links (S) This parameter controls whether or not links in the UNIX file system may be followed by the server. Links that point to areas within the directory tree exported by the @@ -8100,10 +8197,9 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - winbind cache time (G) - This parameter specifies the number of - seconds the winbindd - 8 daemon will cache + winbind cache time (G) + This parameter specifies the number of seconds the + winbindd(8) daemon will cache user and group information before querying a Windows NT server again. @@ -8113,10 +8209,11 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - winbind enum users (G) - On large installations using winbindd - 8 it may be - necessary to suppress the enumeration of users through the setpwent(), + winbind enum users (G) + On large installations using + winbindd(8) it may be + necessary to suppress the enumeration of users through the + setpwent(), getpwent() and endpwent() group of system calls. If the winbind enum users parameter is @@ -8134,10 +8231,11 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - winbind enum groups (G) - On large installations using winbindd - 8 it may be necessary to suppress - the enumeration of groups through the setgrent(), + winbind enum groups (G) + On large installations using + winbindd(8) it may be + necessary to suppress the enumeration of groups through the + setgrent(), getgrent() and endgrent() group of system calls. If the winbind enum groups parameter is @@ -8154,10 +8252,10 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - winbind gid (G) + winbind gid (G) The winbind gid parameter specifies the range of group - ids that are allocated by the winbindd - 8 daemon. This range of group ids should have no + ids that are allocated by the + winbindd(8) daemon. This range of group ids should have no existing local or NIS groups within it as strange conflicts can occur otherwise. @@ -8170,7 +8268,7 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - winbind separator (G) + winbind separator (G) This parameter allows an admin to define the character used when listing a username of the form of DOMAIN \user. This parameter @@ -8191,10 +8289,10 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - winbind uid (G) + winbind uid (G) The winbind gid parameter specifies the range of group - ids that are allocated by the winbindd - 8 daemon. This range of ids should have no + ids that are allocated by the + winbindd(8) daemon. This range of ids should have no existing local or NIS users within it as strange conflicts can occur otherwise. @@ -8207,10 +8305,12 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - winbind use default domain (G) - This parameter specifies whether the winbindd - 8 daemon should operate on users - without domain component in their username. + winbind use default domain + + winbind use default domain (G) + This parameter specifies whether the + winbindd(8) + daemon should operate on users without domain component in their username. Users without a domain component are treated as is part of the winbindd server's own domain. While this does not benifit Windows users, it makes SSH, FTP and e-mail function in a way much closer to the way they would in a native unix system. @@ -8223,7 +8323,7 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - wins hook (G) + wins hook (G) When Samba is running as a WINS server this allows you to call an external program for all changes to the WINS database. The primary use for this option is to allow the @@ -8271,7 +8371,7 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - wins proxy (G) + wins proxy (G) This is a boolean that controls if nmbd(8) will respond to broadcast name queries on behalf of other hosts. You may need to set this @@ -8285,46 +8385,33 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - wins server (G) + wins server (G) This specifies the IP address (or DNS name: IP - address for preference) of the WINS server that nmbd - 8 should register with. If you have a WINS server on + address for preference) of the WINS server that + nmbd(8) should register with. If you have a WINS server on your network then you should set this to the WINS server's IP. You should point this at your WINS server if you have a multi-subnetted network. - If you want to work in multiple namespaces, you can - give every wins server a 'tag'. For each tag, only one - (working) server will be queried for a name. The tag should be - seperated from the ip address by a colon. - - - You need to set up Samba to point + NOTE. You need to set up Samba to point to a WINS server if you have multiple subnets and wish cross-subnet - browsing to work correctly. - + browsing to work correctly. - See the documentation file Browsing in the samba howto collection. + See the documentation file BROWSING.txt + in the docs/ directory of your Samba source distribution. Default: not enabled - Example: wins server = mary:192.9.200.1 fred:192.168.3.199 mary:192.168.2.61 - For this example when querying a certain name, 192.19.200.1 will - be asked first and if that doesn't respond 192.168.2.61. If either - of those doesn't know the name 192.168.3.199 will be queried. - - - Example: wins server = 192.9.200.1 192.168.2.61 - + Example: wins server = 192.9.200.1 - wins support (G) - This boolean controls if the nmbd - 8 process in Samba will act as a WINS server. You should + wins support (G) + This boolean controls if the + nmbd(8) process in Samba will act as a WINS server. You should not set this to yes unless you have a multi-subnetted network and you wish a particular nmbd to be your WINS server. Note that you should NEVER set this to yes @@ -8337,7 +8424,7 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - workgroup (G) + workgroup (G) This controls what workgroup your server will appear to be in when queried by clients. Note that this parameter also controls the Domain name used with the - writable (S) + writable (S) Synonym for writeable for people who can't spell :-). @@ -8362,7 +8449,7 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - write cache size (S) + write cache size (S) If this integer parameter is set to non-zero value, Samba will create an in-memory cache for each oplocked file (it does not do this for @@ -8394,7 +8481,7 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - write list (S) + write list (S) This is a list of users that are given read-write access to a service. If the connecting user is in this list then they will be given write access, no matter what the - wins partners (G) + wins partners (G) A space separated list of partners' IP addresses for WINS replication. WINS partners are always defined as push/pull partners as defining only one way WINS replication is unreliable. @@ -8435,7 +8522,7 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - write ok (S) + write ok (S) Inverted synonym for read only. @@ -8444,7 +8531,7 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - write raw (G) + write raw (G) This parameter controls whether or not the server will support raw write SMB's when transferring data from clients. You should never need to change this parameter. @@ -8456,7 +8543,7 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - writeable (S) + writeable (S) Inverted synonym for read only. @@ -8476,8 +8563,8 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ problem - but be aware of the possibility. On a similar note, many clients - especially DOS clients - - limit service names to eight characters. smbd - 8 has no such limitation, but attempts to connect from such + limit service names to eight characters. smbd(8) + has no such limitation, but attempts to connect from such clients will fail if they truncate the service names. For this reason you should probably keep your service names down to eight characters in length. @@ -8492,22 +8579,22 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ VERSION - This man page is correct for version 3.0 of the Samba suite. + This man page is correct for version 3.0 of + the Samba suite. SEE ALSO - - samba - 7, smbpasswd - 8, swat - 8, smbd - 8, nmbd - 8, smbclient - 1, nmblookup - 1, testparm - 1, testprns - 1. + samba(7), + smbpasswd(8), + swat(8), + smbd(8), + nmbd(8), + smbclient(1), + nmblookup(1), + testparm(1), + testprns(1) + @@ -8520,11 +8607,11 @@ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/smbcacls.1.sgml b/docs/docbook/manpages/smbcacls.1.sgml index 03fcbd6fd85..766d2a78b11 100644 --- a/docs/docbook/manpages/smbcacls.1.sgml +++ b/docs/docbook/manpages/smbcacls.1.sgml @@ -1,5 +1,5 @@ - + smbcacls @@ -17,26 +17,24 @@ smbcacls //server/share filename - -D acls - -M acls + -U username -A acls + -M acls + -D acls -S acls -C name -G name -n - -t - -U username -h - -d DESCRIPTION - This tool is part of the Samba - 7 suite. - + This tool is part of the + Samba suite. + The smbcacls program manipulates NT Access Control Lists (ACLs) on SMB file shares. @@ -92,8 +90,7 @@ Specifies a username used to connect to the specified service. The username may be of the form "username" in which case the user is prompted to enter in a password and the - workgroup specified in the smb.conf - 5 file is + workgroup specified in the smb.conf file is used, or "username%password" or "DOMAIN\username%password" and the password and workgroup names are used as provided. @@ -133,16 +130,13 @@ and masks to a readable string format. + + - -t - - Don't actually do anything, only validate the correctness of - the arguments. - + -h + Print usage information on the smbcacls + program. - - &stdarg.help; - &popt.common.samba.small; @@ -153,12 +147,12 @@ The format of an ACL is one or more ACL entries separated by either commas or newlines. An ACL entry is one of the following: - + REVISION:<revision number> OWNER:<sid or name> GROUP:<sid or name> ACL:<sid or name>:<type>/<flags>/<mask> - + The revision of the ACL specifies the internal Windows @@ -171,22 +165,24 @@ ACL:<sid or name>:<type>/<flags>/<mask> otherwise the name specified is resolved using the server on which the file or directory resides. - ACLs specify permissions granted to the SID. This SID again - can be specified in CWS-1-x-y-z format or as a name in which case - it is resolved against the server on which the file or directory - resides. The type, flags and mask values determine the type of - access granted to the SID. - - The type can be either 0 or 1 corresponding to ALLOWED or - DENIED access to the SID. The flags values are generally - zero for file ACLs and either 9 or 2 for directory ACLs. Some - common flags are: - - - #define SEC_ACE_FLAG_OBJECT_INHERIT 0x1 - #define SEC_ACE_FLAG_CONTAINER_INHERIT 0x2 - #define SEC_ACE_FLAG_NO_PROPAGATE_INHERIT 0x4 - #define SEC_ACE_FLAG_INHERIT_ONLY 0x8 + ACLs specify permissions granted to the SID. This SID again + can be specified in CWS-1-x-y-z format or as a name in which case + it is resolved against the server on which the file or directory + resides. The type, flags and mask values determine the type of + access granted to the SID. + + The type can be either 0 or 1 corresponding to ALLOWED or + DENIED access to the SID. The flags values are generally + zero for file ACLs and either 9 or 2 for directory ACLs. Some + common flags are: + + + #define SEC_ACE_FLAG_OBJECT_INHERIT 0x1 + #define SEC_ACE_FLAG_CONTAINER_INHERIT 0x2 + #define SEC_ACE_FLAG_NO_PROPAGATE_INHERIT 0x4 + + #define SEC_ACE_FLAG_INHERIT_ONLY 0x8 + At present flags can only be specified as decimal or @@ -237,7 +233,8 @@ ACL:<sid or name>:<type>/<flags>/<mask> VERSION - This man page is correct for version 3.0 of the Samba suite. + This man page is correct for version 2.2 of + the Samba suite. @@ -252,8 +249,7 @@ ACL:<sid or name>:<type>/<flags>/<mask> and Tim Potter. The conversion to DocBook for Samba 2.2 was done - by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 was done - by Alexander Bokovoy. + by Gerald Carter diff --git a/docs/docbook/manpages/smbclient.1.sgml b/docs/docbook/manpages/smbclient.1.sgml index cd513398b98..43994a4529f 100644 --- a/docs/docbook/manpages/smbclient.1.sgml +++ b/docs/docbook/manpages/smbclient.1.sgml @@ -1,7 +1,5 @@ - %globalentities; -]> - + + smbclient @@ -40,20 +38,18 @@ -R <name resolve order> -s <smb config file> -T<c|x>IXFqgbNan - -k DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. smbclient is a client that can 'talk' to an SMB/CIFS server. It offers an interface - similar to that of the ftp program (see ftp - 1). + similar to that of the ftp program (see ftp(1)). Operations include things like getting files from the server to the local machine, putting files from the local machine to the server, retrieving directory information from the server @@ -85,9 +81,7 @@ The server name is looked up according to either the -R parameter to smbclient or - using the name resolve order parameter in - the smb.conf - 5 file, + using the name resolve order parameter in the smb.conf file, allowing an administrator to change the order and methods by which server names are looked up. @@ -117,6 +111,21 @@ + + -s smb.conf + Specifies the location of the all important + smb.conf file. + + + + -O socket options + TCP socket options to set on the client + socket. See the socket options parameter in the + smb.conf (5) manpage for the list of valid + options. + + + -R <name resolve order> This option is used by the programs in the Samba @@ -125,51 +134,44 @@ string of different name resolution options. The options are :"lmhosts", "host", "wins" and "bcast". They - cause names to be resolved as follows: + cause names to be resolved as follows : - lmhosts: Lookup an IP + lmhosts : Lookup an IP address in the Samba lmhosts file. If the line in lmhosts has - no name type attached to the NetBIOS name (see - the lmhosts - 5 for details) then - any name type matches for lookup. - - - host: Do a standard host + no name type attached to the NetBIOS name (see the lmhosts(5) for details) then + any name type matches for lookup. + + host : Do a standard host name to IP address resolution, using the system /etc/hosts , NIS, or DNS lookups. This method of name resolution is operating system dependent, for instance on IRIX or Solaris this may be controlled by the /etc/nsswitch.conf file). Note that this method is only used if the NetBIOS name type being queried is the 0x20 (server) name type, otherwise - it is ignored. - - - wins: Query a name with + it is ignored. + + wins : Query a name with the IP address listed in the wins server parameter. If no WINS server has - been specified this method will be ignored. - - - bcast: Do a broadcast on + been specified this method will be ignored. + + bcast : Do a broadcast on each of the known local interfaces listed in the interfaces parameter. This is the least reliable of the name resolution methods as it depends on the target host being on a locally - connected subnet. - + connected subnet. If this parameter is not set then the name resolve order - defined in the smb.conf - 5 file parameter + defined in the smb.conf file parameter (name resolve order) will be used. The default order is lmhosts, host, wins, bcast and without this parameter or any entry in the name resolve order - parameter of the smb.conf - 5 file the name resolution + parameter of the smb.conf file the name resolution methods will be attempted in this order. @@ -200,8 +202,8 @@ -I options useful, as they allow you to control the FROM and TO parts of the message. - See the message command parameter in the smb.conf - 5 for a description of how to handle incoming + See the message command parameter in the + smb.conf(5) for a description of how to handle incoming WinPopup messages in Samba. Note: Copy WinPopup into the startup group @@ -209,6 +211,70 @@ messages. + + -i scope + This specifies a NetBIOS scope that smbclient will + use to communicate with when generating NetBIOS names. For details + on the use of NetBIOS scopes, see rfc1001.txt + and rfc1002.txt. + NetBIOS scopes are very rarely used, only set + this parameter if you are the system administrator in charge of all + the NetBIOS systems you communicate with. + + + + + -N + If specified, this parameter suppresses the normal + password prompt from the client to the user. This is useful when + accessing a service that does not require a password. + + Unless a password is specified on the command line or + this parameter is specified, the client will request a + password. + + + + + + -n NetBIOS name + By default, the client will use the local + machine's hostname (in uppercase) as its NetBIOS name. This parameter + allows you to override the host name and use whatever NetBIOS + name you wish. + + + + + -d debuglevel + debuglevel is an integer from 0 to 10, or + the letter 'A'. + + The default value if this parameter is not specified + is zero. + + The higher this value, the more detail will be logged to + the log files about the activities of the + client. At level 0, only critical errors and serious warnings will + be logged. Level 1 is a reasonable level for day to day running - + it generates a small amount of information about operations + carried out. + + Levels above 1 will generate considerable amounts of log + data, and should only be used when investigating a problem. + Levels above 3 are designed for use only by developers and + generate HUGE amounts of log data, most of which is extremely + cryptic. If debuglevel is set to the letter 'A', then all + debug messages will be printed. This setting + is for developers only (and people who really want + to know how the code works internally). + + Note that specifying this parameter here will override + the log level parameter in the smb.conf (5) + file. + + + -p port This number is the TCP port number that will be used @@ -235,7 +301,13 @@ - &stdarg.help; + + + -h + Print the usage message for the client. + + + -I IP-address @@ -268,6 +340,59 @@ + + -U username[%pass] + Sets the SMB username or username and password. + If %pass is not specified, The user will be prompted. The client + will first check the USER environment variable, then the + LOGNAME variable and if either exists, the + string is uppercased. Anything in these variables following a '%' + sign will be treated as the password. If these environment + variables are not found, the username GUEST + is used. + + If the password is not included in these environment + variables (using the %pass syntax), smbclient will look for + a PASSWD environment variable from which + to read the password. + + A third option is to use a credentials file which + contains the plaintext of the domain name, username and password. This + option is mainly provided for scripts where the admin doesn't + wish to pass the credentials on the command line or via environment + variables. If this method is used, make certain that the permissions + on the file restrict access from unwanted users. See the + -A for more details. + + Be cautious about including passwords in scripts or in + the PASSWD environment variable. Also, on + many systems the command line of a running process may be seen + via the ps command to be safe always allow + smbclient to prompt for a password and type + it in directly. + + + + + -A filenameThis option allows + you to specify a file from which to read the username, domain name, and + password used in the connection. The format of the file is + + + +username = <value> +password = <value> +domain = <value> + + + + If the domain parameter is missing the current workgroup name + is used instead. Make certain that the permissions on the file restrict + access from unwanted users. + + + + -L This option allows you to look at what services @@ -305,9 +430,16 @@ - &popt.common.samba; - &popt.common.credentials; - &popt.common.connection; + + + + -W WORKGROUP + Override the default workgroup (domain) specified + in the workgroup parameter of the smb.conf + file for this connection. This may be needed to connect to some + servers. + + -T tar options @@ -387,7 +519,7 @@ Tar Filenames - All file names can be given as DOS path names (with '\\' + All file names can be given as DOS path names (with '\' as the component separator) or as UNIX path names (with '/' as the component separator). @@ -455,7 +587,7 @@ smb:\> - The backslash ("\\") indicates the current working directory + The backslash ("\") indicates the current working directory on the server, and will change if the current working directory is changed. @@ -908,8 +1040,8 @@ and writeable only by the user. To test the client, you will need to know the name of a - running SMB/CIFS server. It is possible to run smbd - 8 as an ordinary user - running that server as a daemon + running SMB/CIFS server. It is possible to run smbd(8) + as an ordinary user - running that server as a daemon on a user-accessible port (typically any port number over 1024) would provide a suitable test server. @@ -931,7 +1063,8 @@ VERSION - This man page is correct for version 2.2 of the Samba suite. + This man page is correct for version 2.2 of + the Samba suite. @@ -945,11 +1078,11 @@ The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 - was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/smbcontrol.1.sgml b/docs/docbook/manpages/smbcontrol.1.sgml index e19aabedc7a..166ef63e87f 100644 --- a/docs/docbook/manpages/smbcontrol.1.sgml +++ b/docs/docbook/manpages/smbcontrol.1.sgml @@ -1,7 +1,5 @@ - %globalentities; -]> - + + smbcontrol @@ -18,7 +16,6 @@ smbcontrol -i - -s @@ -32,14 +29,14 @@ DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. smbcontrol is a very small program, which - sends messages to a smbd - 8, a nmbd - 8, or a winbindd - 8 daemon running on the system. + sends messages to an smbd(8), + an nmbd(8) + or a winbindd(8) + daemon running on the system. @@ -47,8 +44,6 @@ OPTIONS - &stdarg.help; - &stdarg.configfile; -i Run interactively. Individual commands @@ -59,7 +54,8 @@ destination - One of nmbd, smbd or a process ID. + One of nmbd + smbd or a process ID. The smbd destination causes the message to "broadcast" to all smbd daemons. @@ -75,12 +71,107 @@ message-type - Type of message to send. See - the section MESSAGE-TYPES for details. - - + One of: close-share, + debug, + force-election, ping + , profile, + debuglevel, profilelevel, + or printnotify. + + The close-share message-type sends a + message to smbd which will then close the client connections to + the named share. Note that this doesn't affect client connections + to any other shares. This message-type takes an argument of the + share name for which client connections will be closed, or the + "*" character which will close all currently open shares. + This may be useful if you made changes to the access controls on the share. + This message can only be sent to smbd. + + The debug message-type allows + the debug level to be set to the value specified by the + parameter. This can be sent to any of the destinations. + + The force-election message-type can only be + sent to the nmbd destination. This message + causes the nmbd daemon to force a new browse + master election. + + The ping message-type sends the + number of "ping" messages specified by the parameter and waits + for the same number of reply "pong" messages. This can be sent to + any of the destinations. + + The profile message-type sends a + message to an smbd to change the profile settings based on the + parameter. The parameter can be "on" to turn on profile stats + collection, "off" to turn off profile stats collection, "count" + to enable only collection of count stats (time stats are + disabled), and "flush" to zero the current profile stats. This can + be sent to any smbd or nmbd destinations. + + The debuglevel message-type sends + a "request debug level" message. The current debug level setting + is returned by a "debuglevel" message. This can be + sent to any of the destinations. + + The profilelevel message-type sends + a "request profile level" message. The current profile level + setting is returned by a "profilelevel" message. This can be sent + to any smbd or nmbd destinations. + + The printnotify message-type sends a + message to smbd which in turn sends a printer notify message to + any Windows NT clients connected to a printer. This message-type + takes the following arguments: + + + + + queuepause printername + Send a queue pause change notify + message to the printer specified. + + + + queueresume printername + Send a queue resume change notify + message for the printer specified. + + + + jobpause printername unixjobid + Send a job pause change notify + message for the printer and unix jobid + specified. + + + + jobresume printername unixjobid + Send a job resume change notify + message for the printer and unix jobid + specified. + + + + jobdelete printername unixjobid + Send a job delete change notify + message for the printer and unix jobid + specified. + + + + + Note that this message only sends notification that an + event has occured. It doesn't actually cause the + event to happen. + + This message can only be sent to smbd. + + + + + - parameters any parameters required for the message-type @@ -90,182 +181,18 @@ - - MESSAGE-TYPES - - Available message types are: - - - close-share - Order smbd to close the client - connections to the named share. Note that this doesn't affect client - connections to any other shares. This message-type takes an argument of the - share name for which client connections will be closed, or the - "*" character which will close all currently open shares. - This may be useful if you made changes to the access controls on the share. - This message can only be sent to smbd. - - - - - debug - Set debug level to the value specified by the - parameter. This can be sent to any of the destinations. - - - - - force-election - This message causes the nmbd daemon to - force a new browse master election. - - - - ping - - Send specified number of "ping" messages and - wait for the same number of reply "pong" messages. This can be sent to - any of the destinations. - - - - - profile - Change profile settings of a daemon, based on the - parameter. The parameter can be "on" to turn on profile stats - collection, "off" to turn off profile stats collection, "count" - to enable only collection of count stats (time stats are - disabled), and "flush" to zero the current profile stats. This can - be sent to any smbd or nmbd destinations. - - - - debuglevel - - Request debuglevel of a certain daemon and write it to stdout. This - can be sent to any of the destinations. - - - - - profilelevel - - Request profilelevel of a certain daemon and write it to stdout. - This can be sent to any smbd or nmbd destinations. - - - - - printnotify - - Order smbd to send a printer notify message to any Windows NT clients - connected to a printer. This message-type takes the following arguments: - - - - - - queuepause printername - Send a queue pause change notify - message to the printer specified. - - - - queueresume printername - Send a queue resume change notify - message for the printer specified. - - - - jobpause printername unixjobid - Send a job pause change notify - message for the printer and unix jobid - specified. - - - - jobresume printername unixjobid - Send a job resume change notify - message for the printer and unix jobid - specified. - - - - jobdelete printername unixjobid - Send a job delete change notify - message for the printer and unix jobid - specified. - - - - - Note that this message only sends notification that an - event has occured. It doesn't actually cause the - event to happen. - - - This message can only be sent to smbd. - - - - - samsync - Order smbd to synchronise sam database from PDC (being BDC). Can only be sent to smbd. - Not working at the moment - - - - - samrepl - Send sam replication message, with specified serial. Can only be sent to smbd. Should not be used manually. - - - - dmalloc-mark - Set a mark for dmalloc. Can be sent to both smbd and nmbd. Only available if samba is built with dmalloc support. - - - - dmalloc-log-changed - - Dump the pointers that have changed since the mark set by dmalloc-mark. - Can be sent to both smbd and nmbd. Only available if samba is built with dmalloc support. - - - - shutdown - Shut down specified daemon. Can be sent to both smbd and nmbd. - - - - tallocdump and pool-usage - Print a human-readable description of all - talloc(pool) memory usage by the specified daemon/process. Available - for both smbd and nmbd. - - - - drvupgrade - Force clients of printers using specified driver - to update their local version of the driver. Can only be - sent to smbd. - - - - - VERSION - This man page is correct for version 3.0 of + This man page is correct for version 2.2 of the Samba suite. SEE ALSO - nmbd - 8 and smbd - 8. + nmbd(8), + and smbd(8). + @@ -278,11 +205,11 @@ The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for - Samba 3.0 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/smbd.8.sgml b/docs/docbook/manpages/smbd.8.sgml index b31d919a124..9fb80901be1 100644 --- a/docs/docbook/manpages/smbd.8.sgml +++ b/docs/docbook/manpages/smbd.8.sgml @@ -1,7 +1,5 @@ - %globalentities; -]> - + + smbd @@ -34,8 +32,7 @@ DESCRIPTION - This program is part of the Samba - 7 suite. + This program is part of the Samba suite. smbd is the server daemon that provides filesharing and printing services to Windows clients. @@ -49,14 +46,15 @@ An extensive description of the services that the server can provide is given in the man page for the configuration file controlling the attributes of those - services (see smb.conf - 5. This man page will not describe the + services (see smb.conf(5) + . This man page will not describe the services, but will concentrate on the administrative aspects of running the server. Please note that there are significant security - implications to running this server, and the smb.conf - 5 manual page should be regarded as mandatory reading before + implications to running this server, and the smb.conf(5) + manpage should be regarded as mandatory reading before proceeding with installation. A session is created whenever a client requests one. @@ -124,8 +122,17 @@ - &popt.common.samba; - &stdarg.help; + + -h + Prints the help information (usage) + for smbd. + + + + -V + Prints the version number for + smbd. + -b @@ -133,6 +140,32 @@ Samba was built. + + -d <debug level> + debuglevel is an integer + from 0 to 10. The default value if this parameter is + not specified is zero. + + The higher this value, the more detail will be + logged to the log files about the activities of the + server. At level 0, only critical errors and serious + warnings will be logged. Level 1 is a reasonable level for + day to day running - it generates a small amount of + information about operations carried out. + + Levels above 1 will generate considerable + amounts of log data, and should only be used when + investigating a problem. Levels above 3 are designed for + use only by developers and generate HUGE amounts of log + data, most of which is extremely cryptic. + + Note that specifying this parameter here will + override the log + level parameter in the + smb.conf(5) file. + + + -l <log directory> If specified, @@ -142,9 +175,9 @@ messages from the running server. The log file generated is never removed by the server although its size may be controlled by the max log size - option in the smb.conf - 5 file. Beware: + url="smb.conf.5.html#maxlogsize">max log size + option in the + smb.conf(5) file. Beware: If the directory specified does not exist, smbd will log to the default debug log location defined at compile time. @@ -153,6 +186,14 @@ compile time. + + -O <socket options> + See the socket options + parameter in the smb.conf(5) + file for details. + + -p <port number> port number is a positive integer @@ -177,6 +218,19 @@ This parameter is not normally specified except in the above situation. + + + -s <configuration file> + The file specified contains the + configuration details required by the server. The + information in this file includes server-specific + information such as what printcap file to use, as well + as descriptions of all the services that the server is + to provide. See + smb.conf(5) for more information. + The default configuration file name is determined at + compile time. + @@ -189,7 +243,7 @@ If the server is to be run by the inetd meta-daemon, this file must contain suitable startup information for the - meta-daemon. See the "How to Install and Test SAMBA" + meta-daemon. See the UNIX_INSTALL.html document for details. @@ -201,7 +255,7 @@ If running the server as a daemon at startup, this file will need to contain an appropriate startup - sequence for the server. See the "How to Install and Test SAMBA" + sequence for the server. See the UNIX_INSTALL.html document for details. @@ -211,20 +265,21 @@ meta-daemon inetd, this file must contain a mapping of service name (e.g., netbios-ssn) to service port (e.g., 139) and protocol type (e.g., tcp). - See the "How to Install and Test SAMBA" + See the UNIX_INSTALL.html document for details. /usr/local/samba/lib/smb.conf - This is the default location of the smb.conf - 5 server configuration file. Other common places that systems + This is the default location of the + smb.conf + server configuration file. Other common places that systems install this file are /usr/samba/lib/smb.conf - and /etc/samba/smb.conf. + and /etc/smb.conf. This file describes all the services the server - is to make available to clients. See smb.conf - 5 for more information. + is to make available to clients. See + smb.conf(5) for more information. @@ -262,9 +317,9 @@ Samba uses PAM for authentication (when presented with a plaintext password), for account checking (is this account disabled?) and for session management. The degree too which samba supports PAM is restricted - by the limitations of the SMB protocol and the obey - pam restricions smb.conf - 5 paramater. When this is set, the following restrictions apply: + by the limitations of the SMB protocol and the + obey pam restricions + smb.conf paramater. When this is set, the following restrictions apply: @@ -324,9 +379,9 @@ it to die on its own. The debug log level of smbd may be raised - or lowered using smbcontrol - 1 program (SIGUSR[1|2] signals are no longer - used since Samba 2.2). This is to allow transient problems to be diagnosed, + or lowered using smbcontrol(1) + program (SIGUSR[1|2] signals are no longer used in + Samba 2.2). This is to allow transient problems to be diagnosed, whilst still running at a normally low log level. Note that as the signal handlers send a debug write, @@ -339,15 +394,14 @@ SEE ALSO - hosts_access - 5, inetd - 8, nmbd - 8, smb.conf - 5, smbclient - 1, testparm - 1, testprns - 1, and the - Internet RFC's rfc1001.txt, rfc1002.txt. + hosts_access(5), inetd(8), + nmbd(8), + smb.conf(5) + , smbclient(1) + , + testparm(1), + testprns(1), and the Internet RFC's + rfc1001.txt, rfc1002.txt. In addition the CIFS (formerly SMB) specification is available as a link from the Web page http://samba.org/cifs/. @@ -363,11 +417,11 @@ The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for - Samba 3.0 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/smbgroupedit.8.sgml b/docs/docbook/manpages/smbgroupedit.8.sgml index 6c489bb7855..188218c249c 100644 --- a/docs/docbook/manpages/smbgroupedit.8.sgml +++ b/docs/docbook/manpages/smbgroupedit.8.sgml @@ -1,11 +1,15 @@ - + smbgroupedit 8 + + smbgroupedit Query/set/change UNIX - Windows NT group mapping @@ -21,13 +25,17 @@ + DESCRIPTION -This program is part of the Samba -7 suite. +This program is part of the Samba +suite. + The smbgroupedit command allows for mapping unix groups @@ -62,8 +70,8 @@ etc. Privilege : -For example: - +For examples, + Users SID : S-1-5-32-545 Unix group: -1 @@ -83,8 +91,9 @@ Users NTGroupName(SID) -> UnixGroupName -For example: - +For example, + + Users (S-1-5-32-545) -> -1 @@ -100,6 +109,8 @@ Users (S-1-5-32-545) -> -1 + FILES @@ -109,6 +120,8 @@ Users (S-1-5-32-545) -> -1 + EXIT STATUS @@ -150,45 +163,65 @@ the 'Domain Admins' Global group: domadm:x:502:joe,john,mary - map this domadm group to the 'domain admins' group: + map this domadm group to the 'domain admins' group: + - Get the SID for the Windows NT "Domain Admins" group: + Get the SID for the Windows NT "Domain Admins" + group: + root# smbgroupedit -vs | grep "Domain Admins" Domain Admins (S-1-5-21-1108995562-3116817432-1375597819-512) -> -1 - + + map the unix domadm group to the Windows NT "Domain Admins" group, by running the command: - + + + root# smbgroupedit \ -c S-1-5-21-1108995562-3116817432-1375597819-512 \ -u domadm -td - warning: don't copy and paste this sample, the + + warning: don't copy and paste this sample, the Domain Admins SID (the S-1-5-21-...-512) is different for every PDC. - + + To verify that your mapping has taken effect: - + + + root# smbgroupedit -vs|grep "Domain Admins" Domain Admins (S-1-5-21-1108995562-3116817432-1375597819-512) -> domadm -To give access to a certain directory on a domain member machine (an + +To give access to a certain directory on a domain member machine (an NT/W2K or a samba server running winbind) to some users who are member of a group on your samba PDC, flag that group as a domain group: - + + + root# smbgroupedit -a unixgroup -td + + + + + + VERSION @@ -199,16 +232,22 @@ the Samba suite. + + SEE ALSO -smb.conf -5 +smb.conf(5) + + + AUTHOR @@ -222,8 +261,7 @@ to the way the Linux kernel is developed. smbgroupedit was written by Jean Francois Micouleau. The current set of manpages and documentation is maintained -by the Samba Team in the same fashion as the Samba source code. The conversion -to DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy. +by the Samba Team in the same fashion as the Samba source code. diff --git a/docs/docbook/manpages/smbmnt.8.sgml b/docs/docbook/manpages/smbmnt.8.sgml index 8c07ed2eb49..55b66d5d25b 100644 --- a/docs/docbook/manpages/smbmnt.8.sgml +++ b/docs/docbook/manpages/smbmnt.8.sgml @@ -1,7 +1,5 @@ - %globalentities; -]> - + + smbmnt @@ -25,7 +23,6 @@ -f <mask> -d <mask> -o <options> - -h @@ -41,8 +38,8 @@ by the user, and that the user has write permission on. The smbmnt program is normally invoked - by smbmount - 8. It should not be invoked directly by users. + by smbmount(8) + . It should not be invoked directly by users. smbmount searches the normal PATH for smbmnt. You must ensure that the smbmnt version in your path matches the smbmount used. @@ -91,8 +88,6 @@ - &stdarg.help; - @@ -112,8 +107,7 @@ The conversion of this manpage for Samba 2.2 was performed - by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 - was done by Alexander Bokovoy. + by Gerald Carter diff --git a/docs/docbook/manpages/smbmount.8.sgml b/docs/docbook/manpages/smbmount.8.sgml index 12f64c7354a..c4b91a5572d 100644 --- a/docs/docbook/manpages/smbmount.8.sgml +++ b/docs/docbook/manpages/smbmount.8.sgml @@ -1,5 +1,5 @@ - + smbmount @@ -26,8 +26,7 @@ smbmount mounts a Linux SMB filesystem. It is usually invoked as mount.smbfs by - the mount - 8 command when using the + the mount(8) command when using the "-t smbfs" option. This command only works in Linux, and the kernel must support the smbfs filesystem. @@ -40,12 +39,11 @@ smbmount is a daemon. After mounting it keeps running until the mounted smbfs is umounted. It will log things that happen when in daemon mode using the "machine name" smbmount, so - typically this output will end up in log.smbmount. The - smbmount process may also be called mount.smbfs. + typically this output will end up in log.smbmount. The + smbmount process may also be called mount.smbfs. NOTE: smbmount - calls smbmnt - 8 to do the actual mount. You + calls smbmnt(8) to do the actual mount. You must make sure that smbmnt is in the path so that it can be found. @@ -86,12 +84,15 @@ credentials=<filename> - specifies a file that contains a username and/or password. -The format of the file is: - -username = <value> -password = <value> - + specifies a file that contains a username + and/or password. The format of the file is: + + + + username = <value> + password = <value> + + This is preferred over having passwords in plaintext in a shared file, such as /etc/fstab. Be sure to protect any @@ -99,11 +100,6 @@ password = <value> - - krb - Use kerberos (Active Directory). - - netbiosname=<arg> sets the source NetBIOS name. It defaults @@ -145,7 +141,7 @@ password = <value> dmask=<arg> - Sets the directory mask. This determines the + sets the directory mask. This determines the permissions that remote directories have in the local filesystem. The default is based on the current umask. @@ -153,7 +149,7 @@ password = <value> debug=<arg> - Sets the debug level. This is useful for + sets the debug level. This is useful for tracking down SMB connection problems. A suggested value to start with is 4. If set too high there will be a lot of output, possibly hiding the useful output. @@ -162,7 +158,7 @@ password = <value> ip=<arg> - Sets the destination host or IP address. + sets the destination host or IP address. @@ -170,30 +166,31 @@ password = <value> workgroup=<arg> - Sets the workgroup on the destination + sets the workgroup on the destination sockopt=<arg> - Sets the TCP socket options. See the smb.conf - 5 socket options option. + sets the TCP socket options. See the smb.conf + socket options option. scope=<arg> - Sets the NetBIOS scope + sets the NetBIOS scope guest - Don't prompt for a password + don't prompt for a password + ro mount read-only @@ -301,9 +298,10 @@ password = <value> FreeBSD also has a smbfs, but it is not related to smbmount - For Solaris, HP-UX and others you may want to look at smbsh - 1 or at other solutions, such as - Sharity or perhaps replacing the SMB server with a NFS server. + For Solaris, HP-UX and others you may want to look at + smbsh(1) or at other + solutions, such as sharity or perhaps replacing the SMB server with + a NFS server. @@ -323,8 +321,7 @@ password = <value> The conversion of this manpage for Samba 2.2 was performed - by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 - was done by Alexander Bokovoy. + by Gerald Carter diff --git a/docs/docbook/manpages/smbpasswd.5.sgml b/docs/docbook/manpages/smbpasswd.5.sgml index f78e986bef9..5c80ac4c06c 100644 --- a/docs/docbook/manpages/smbpasswd.5.sgml +++ b/docs/docbook/manpages/smbpasswd.5.sgml @@ -1,5 +1,5 @@ - + smbpasswd @@ -19,8 +19,8 @@ DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. smbpasswd is the Samba encrypted password file. It contains the username, Unix user id and the SMB hashed passwords of the @@ -122,7 +122,7 @@ the attributes of the users account. In the Samba 2.2 release this field is bracketed by '[' and ']' characters and is always 13 characters in length (including the '[' and ']' characters). - The contents of this field may be any of the following characters: + The contents of this field may be any of the characters. @@ -136,11 +136,12 @@ Password Hash and NT Password Hash are ignored). Note that this will only allow users to log on with no password if the null passwords parameter is set in the smb.conf - 5 config file. + url="smb.conf.5.html#NULLPASSWORDS">smb.conf(5) + config file. D - This means the account - is disabled and no SMB/CIFS logins will be allowed for this user. + is disabled and no SMB/CIFS logins will be allowed for + this user. W - This means this account is a "Workstation Trust" account. This kind of account is used @@ -177,9 +178,8 @@ SEE ALSO - smbpasswd - 8, Samba - 7, and + smbpasswd(8), + samba(7), and the Internet RFC1321 for details on the MD4 algorithm. @@ -194,11 +194,11 @@ The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/smbpasswd.8.sgml b/docs/docbook/manpages/smbpasswd.8.sgml index 5d475cf08c7..8e6d925ae03 100644 --- a/docs/docbook/manpages/smbpasswd.8.sgml +++ b/docs/docbook/manpages/smbpasswd.8.sgml @@ -1,5 +1,5 @@ - + smbpasswd @@ -37,27 +37,25 @@ DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. The smbpasswd program has several different - functions, depending on whether it is run by the root user - or not. When run as a normal user it allows the user to change + functions, depending on whether it is run by the root + user or not. When run as a normal user it allows the user to change the password used for their SMB sessions on any machines that store SMB passwords. By default (when run with no arguments) it will attempt to change the current user's SMB password on the local machine. This is - similar to the way the passwd(1) program works. - smbpasswd differs from how the passwd program works + similar to the way the passwd(1) program works. + smbpasswd differs from how the passwd program works however in that it is not setuid root but works in - a client-server mode and communicates with a - locally running smbd - 8. As a consequence in order for this to + a client-server mode and communicates with a locally running + smbd(8). As a consequence in order for this to succeed the smbd daemon must be running on the local machine. On a UNIX machine the encrypted SMB passwords are usually stored in - the smbpasswd - 5 file. + the smbpasswd(5) file. When run by an ordinary user with no options, smbpasswd will prompt them for their old SMB password and then ask them @@ -69,13 +67,12 @@ smbpasswd can also be used by a normal user to change their SMB password on remote machines, such as Windows NT Primary Domain - Controllers. See the (-r) and -U options - below. + Controllers. See the (-r) and -U options below. When run by root, smbpasswd allows new users to be added and deleted in the smbpasswd file, as well as allows changes to - the attributes of the user in this file to be made. When run by root, - smbpasswd accesses the local smbpasswd file + the attributes of the user in this file to be made. When run by root, + smbpasswd accesses the local smbpasswd file directly, thus enabling changes to be made even if smbd is not running. @@ -124,8 +121,8 @@ If the smbpasswd file is in the 'old' format (pre-Samba 2.0 format) there is no space in the user's password entry to write - this information and the command will FAIL. See smbpasswd - 5 for details on the 'old' and new password file formats. + this information and the command will FAIL. See smbpasswd(5) + for details on the 'old' and new password file formats. This option is only available when running smbpasswd as @@ -143,8 +140,7 @@ If the smbpasswd file is in the 'old' format, then smbpasswd will FAIL to enable the account. - See smbpasswd - 5 for + See smbpasswd (5) for details on the 'old' and new password file formats. This option is only available when running smbpasswd as root. @@ -230,15 +226,15 @@ name of the host being connected to. The options are :"lmhosts", "host", "wins" and "bcast". They - cause names to be resolved as follows: + cause names to be resolved as follows : - lmhosts: Lookup an IP + lmhosts : Lookup an IP address in the Samba lmhosts file. If the line in lmhosts has - no name type attached to the NetBIOS name (see the lmhosts - 5 for details) then + no name type attached to the NetBIOS name (see the lmhosts(5) for details) then any name type matches for lookup. - host: Do a standard host + host : Do a standard host name to IP address resolution, using the system /etc/hosts , NIS, or DNS lookups. This method of name resolution is operating system depended for instance on IRIX or Solaris this @@ -247,12 +243,12 @@ type being queried is the 0x20 (server) name type, otherwise it is ignored. - wins: Query a name with + wins : Query a name with the IP address listed in the wins server parameter. If no WINS server has been specified this method will be ignored. - bcast: Do a broadcast on + bcast : Do a broadcast on each of the known local interfaces listed in the interfaces parameter. This is the least reliable of the name resolution methods as it depends on the @@ -260,8 +256,8 @@ The default order is lmhosts, host, wins, bcast - and without this parameter or any entry in the smb.conf - 5 file the name resolution methods will + and without this parameter or any entry in the + smb.conf file the name resolution methods will be attempted in this order. @@ -296,6 +292,7 @@ + -s This option causes smbpasswd to be silent (i.e. @@ -315,7 +312,7 @@ switch is used to specify the password to be used with the ldap admin dn. Note that the password is stored in - the secrets.tdb and is keyed off + the private/secrets.tdb and is keyed off of the admin's DN. This means that if the value of ldap admin dn ever changes, the password will need to be manually updated as well. @@ -358,15 +355,14 @@ mode communicating with a local smbd for a non-root user then the smbd daemon must be running for this to work. A common problem is to add a restriction to the hosts that may access the - smbd running on the local machine by specifying either allow - hosts or deny hosts entry in - the smb.conf - 5 file and neglecting to + smbd running on the local machine by specifying a + allow hosts or deny hosts + entry in the smb.conf file and neglecting to allow "localhost" access to the smbd. In addition, the smbpasswd command is only useful if Samba - has been set up to use encrypted passwords. See the document - "LanMan and NT Password Encryption in Samba" in the docs directory for details + has been set up to use encrypted passwords. See the file + ENCRYPTION.txt in the docs directory for details on how to do this. @@ -374,14 +370,15 @@ VERSION - This man page is correct for version 3.0 of the Samba suite. + This man page is correct for version 3.0 of + the Samba suite. SEE ALSO - smbpasswd - 5, Samba - 7. + smbpasswd(5), + samba(7) + @@ -394,11 +391,11 @@ The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/smbsh.1.sgml b/docs/docbook/manpages/smbsh.1.sgml index f51b5eb34fe..c40609be4fd 100644 --- a/docs/docbook/manpages/smbsh.1.sgml +++ b/docs/docbook/manpages/smbsh.1.sgml @@ -1,7 +1,5 @@ - %globalentities; -]> - + + smbsh @@ -31,8 +29,8 @@ DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. smbsh allows you to access an NT filesystem using UNIX commands such as ls, @@ -48,8 +46,7 @@ -W WORKGROUP Override the default workgroup specified in the - workgroup parameter of the smb.conf - 5 file + workgroup parameter of the smb.conf file for this session. This may be needed to connect to some servers. @@ -64,17 +61,91 @@ - -P prefix - This option allows + -P prefixThis option allows the user to set the directory prefix for SMB access. The default value if this option is not specified is smb. - &stdarg.configfile; - &stdarg.debug; - &stdarg.resolve.order; + + -R <name resolve order> + This option is used to determine what naming + services and in what order to resolve + host names to IP addresses. The option takes a space-separated + string of different name resolution options. + + The options are :"lmhosts", "host", "wins" and "bcast". + They cause names to be resolved as follows : + + + lmhosts : + Lookup an IP address in the Samba lmhosts file. If the + line in lmhosts has no name type attached to the + NetBIOS name + (see the lmhosts(5) + for details) then any name type matches for lookup. + + + host : + Do a standard host name to IP address resolution, using + the system /etc/hosts, NIS, or DNS + lookups. This method of name resolution is operating + system dependent, for instance on IRIX or Solaris this + may be controlled by the /etc/nsswitch.conf + file). Note that this method is only used + if the NetBIOS name type being queried is the 0x20 + (server) name type, otherwise it is ignored. + + + wins : + Query a name with the IP address listed in the + wins server parameter. If no + WINS server has been specified this method will be + ignored. + + + bcast : + Do a broadcast on each of the known local interfaces + listed in the interfaces + parameter. This is the least reliable of the name + resolution methods as it depends on the target host + being on a locally connected subnet. + + + + If this parameter is not set then the name resolve order + defined in the smb.conf file parameter + (name resolve order) will be used. + + The default order is lmhosts, host, wins, bcast. Without + this parameter or any entry in the name resolve order + parameter of the smb.conf + file, the name resolution methods will be attempted in this + order. + + + + -d <debug level> + debug level is an integer from 0 to 10. + + The default value if this parameter is not specified + is zero. + + The higher this value, the more detail will be logged + about the activities of nmblookup. At level + 0, only critical errors and serious warnings will be logged. + + + + + -l logfilename + If specified causes all debug messages to be + written to the file specified by logfilename + . If not specified then all messages will be + written tostderr. + + -L libdir @@ -93,12 +164,13 @@ To use the smbsh command, execute smbsh from the prompt and enter the username and password that authenticates you to the machine running the Windows NT - operating system. - -system% smbsh -Username: user -Password: XXXXXXX - + operating system. + + + system% smbsh + Username: user + Password: XXXXXXX + Any dynamically linked command you execute from @@ -116,7 +188,8 @@ VERSION - This man page is correct for version 3.0 of the Samba suite. + This man page is correct for version 3.0 of + the Samba suite. @@ -137,9 +210,9 @@ SEE ALSO - smbd - 8, smb.conf - 5 + smbd(8), + smb.conf(5) + @@ -152,11 +225,11 @@ The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/smbspool.8.sgml b/docs/docbook/manpages/smbspool.8.sgml index dabdcced01d..d164cb0864e 100644 --- a/docs/docbook/manpages/smbspool.8.sgml +++ b/docs/docbook/manpages/smbspool.8.sgml @@ -1,5 +1,5 @@ - + smbspool @@ -15,20 +15,20 @@ smbspool - job - user - title - copies - options - filename + job + user + title + copies + options + filename DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. smbspool is a very small print spooling program that sends a print file to an SMB printer. The command-line arguments @@ -45,8 +45,10 @@ smb://server/printer smb://workgroup/server/printer - smb://username:password@server/printer - smb://username:password@workgroup/server/printer + smb://username:password@server/printer + + smb://username:password@workgroup/server/printer + smbspool tries to get the URI from argv[0]. If argv[0] @@ -95,14 +97,15 @@ VERSION - This man page is correct for version 3.0 of the Samba suite. + This man page is correct for version 2.2 of + the Samba suite. SEE ALSO - smbd - 8 and Samba - 7. + smbd(8), + and samba(7). + @@ -118,11 +121,11 @@ The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/smbstatus.1.sgml b/docs/docbook/manpages/smbstatus.1.sgml index 98f7e864f6c..99963a4bec6 100644 --- a/docs/docbook/manpages/smbstatus.1.sgml +++ b/docs/docbook/manpages/smbstatus.1.sgml @@ -1,8 +1,5 @@ - %globalentities; -]> - - + + smbstatus @@ -34,8 +31,8 @@ DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. smbstatus is a very simple program to list the current Samba connections. @@ -57,7 +54,13 @@ gives brief output. - &popt.common.samba; + + + -d|--debug=<debuglevel> + sets debugging to specified level + + + -v|--verbose @@ -81,8 +84,8 @@ -p|--processes - print a list of smbd - 8 processes and exit. + print a list of + smbd(8) processes and exit. Useful for scripting. @@ -93,7 +96,18 @@ - &stdarg.help; + + + + -s|--conf=<configuration file> + The default configuration file name is + determined at compile time. The file specified contains the + configuration details required by the server. See smb.conf(5) + for more information. + + + -u|--user=<username> @@ -114,9 +128,8 @@ SEE ALSO - smbd - 8 and smb.conf - 5. + smbd(8) and + smb.conf(5). @@ -129,11 +142,11 @@ The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/smbtar.1.sgml b/docs/docbook/manpages/smbtar.1.sgml index 0492a3a5747..bd70493b6bf 100644 --- a/docs/docbook/manpages/smbtar.1.sgml +++ b/docs/docbook/manpages/smbtar.1.sgml @@ -1,5 +1,5 @@ - + smbtar @@ -16,20 +16,20 @@ smbtar - -r - -i - -a - -v -s server -p password -x services -X - -N filename - -b blocksize -d directory - -l loglevel -u user -t tape + -t tape + -b blocksize + -N filename + -i + -r + -l loglevel + -v filenames @@ -37,12 +37,12 @@ DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. smbtar is a very small shell script on top - of smbclient1 - which dumps SMB shares directly to tape. + of smbclient(1) + which dumps SMB shares directly to tape. @@ -100,11 +100,6 @@ - - -a - Reset DOS archive bit mode to - indicate file has been archived. - -t tape @@ -149,9 +144,8 @@ -l log level Log (debug) level. Corresponds to the - -d flag of - smbclient1 - . + -d flag of smbclient(1) + . @@ -187,9 +181,9 @@ DIAGNOSTICS - See the DIAGNOSTICS section for the - smbclient1 - command. + See the DIAGNOSTICS section for the + smbclient(1) + command. @@ -202,11 +196,10 @@ SEE ALSO - smbd - 8, - smbclient1 - , smb.conf - 5. + smbd(8), + smbclient(1), + smb.conf(5), + @@ -223,11 +216,11 @@ url="mailto:Martin.Kraemer@mch.sni.de">Martin Kraemer. Many thanks to everyone who suggested extensions, improvements, bug fixes, etc. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for - Samba 3.0 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter. diff --git a/docs/docbook/manpages/smbtree.1.sgml b/docs/docbook/manpages/smbtree.1.sgml deleted file mode 100644 index 3677695d5a1..00000000000 --- a/docs/docbook/manpages/smbtree.1.sgml +++ /dev/null @@ -1,93 +0,0 @@ - %globalentities; -]> - - - - smbtree - 1 - - - - - smbtree - A text based smb network browser - - - - - - smbtree - -b - -D - -S - - - - - DESCRIPTION - - This tool is part of the Samba - 7 suite. - - smbtree is a smb browser program - in text mode. It is similar to the "Network Neighborhood" found - on Windows computers. It prints a tree with all - the known domains, the servers in those domains and - the shares on the servers. - - - - - - OPTIONS - - - - -b - Query network nodes by sending requests - as broadcasts instead of querying the (domain) master browser. - - - - - -D - Only print a list of all - the domains known on broadcast or by the - master browser - - - - -S - Only print a list of - all the domains and servers responding on broadcast or - known by the master browser. - - - - &popt.common.samba; - &popt.common.credentials; - &stdarg.help; - - - - - - VERSION - - This man page is correct for version 3.0 of the Samba - suite. - - - - AUTHOR - - The original Samba software and related utilities - were created by Andrew Tridgell. Samba is now developed - by the Samba Team as an Open Source project similar - to the way the Linux kernel is developed. - - The smbtree man page was written by Jelmer Vernooij. - - - diff --git a/docs/docbook/manpages/smbumount.8.sgml b/docs/docbook/manpages/smbumount.8.sgml index 089ede79ea6..d6a1b65b578 100644 --- a/docs/docbook/manpages/smbumount.8.sgml +++ b/docs/docbook/manpages/smbumount.8.sgml @@ -1,5 +1,5 @@ - + smbumount @@ -47,8 +47,8 @@ SEE ALSO - smbmount - 8 + smbmount(8) + @@ -67,8 +67,7 @@ The conversion of this manpage for Samba 2.2 was performed - by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 - was done by Alexander Bokovoy. + by Gerald Carter diff --git a/docs/docbook/manpages/swat.8.sgml b/docs/docbook/manpages/swat.8.sgml index 72b3cd65c8f..c0052f3d53d 100644 --- a/docs/docbook/manpages/swat.8.sgml +++ b/docs/docbook/manpages/swat.8.sgml @@ -1,7 +1,5 @@ - %globalentities; -]> - + + swat @@ -25,13 +23,13 @@ DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. swat allows a Samba administrator to - configure the complex smb.conf - 5 file via a Web browser. In addition, + configure the complex + smb.conf(5) file via a Web browser. In addition, a swat configuration page has help links to all the configurable options in the smb.conf file allowing an administrator to easily look up the effects of any change. @@ -48,9 +46,8 @@ -s smb configuration file The default configuration file path is determined at compile time. The file specified contains - the configuration details required by the smbd - 8 server. This is the file - that swat will modify. + the configuration details required by the smbd + server. This is the file that swat will modify. The information in this file includes server-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide. @@ -68,10 +65,6 @@ WARNING: Do NOT enable this option on a production server. - - &popt.common.samba; - &stdarg.help; - @@ -80,12 +73,6 @@ INSTALLATION - Swat is included as binary package with most distributions. The - package manager in this case takes care of the installation and - configuration. This section is only for those who have compiled - swat from scratch. - - After you compile SWAT you need to run make install to install the swat binary and the various help files and images. A default install would put @@ -109,7 +96,7 @@ swat 901/tcp - Note for NIS/YP and LDAP users - you may need to rebuild the + Note for NIS/YP users - you may need to rebuild the NIS service maps rather than alter your local /etc/services file. @@ -133,19 +120,17 @@ + + Launching - - - - LAUNCHING - - To launch SWAT just run your favorite web browser and - point it at "http://localhost:901/". + To launch SWAT just run your favorite web browser and + point it at "http://localhost:901/". - Note that you can attach to SWAT from any IP connected - machine but connecting from a remote machine leaves your - connection open to password sniffing as passwords will be sent - in the clear over the wire. + Note that you can attach to SWAT from any IP connected + machine but connecting from a remote machine leaves your + connection open to password sniffing as passwords will be sent + in the clear over the wire. + @@ -167,9 +152,8 @@ /usr/local/samba/lib/smb.conf - This is the default location of the - smb.conf5 - server configuration file that swat edits. Other + This is the default location of the smb.conf(5) + server configuration file that swat edits. Other common places that systems install this file are /usr/samba/lib/smb.conf and /etc/smb.conf . This file describes all the services the server @@ -182,9 +166,8 @@ WARNINGS - swat will rewrite your - smb.conf5 - file. It will rearrange the entries and delete all + swat will rewrite your smb.conf + file. It will rearrange the entries and delete all comments, include= and copy= options. If you have a carefully crafted smb.conf then back it up or don't use swat! @@ -194,15 +177,16 @@ VERSION - This man page is correct for version 3.0 of the Samba suite. + This man page is correct for version 2.2 of + the Samba suite. SEE ALSO - inetd(5), - smbd8 - , smb.conf - 5 + inetd(5), + smbd(8), + smb.conf(5) + @@ -215,11 +199,11 @@ The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for - Samba 3.0 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/testparm.1.sgml b/docs/docbook/manpages/testparm.1.sgml index 31a95494165..f34528a43d2 100644 --- a/docs/docbook/manpages/testparm.1.sgml +++ b/docs/docbook/manpages/testparm.1.sgml @@ -1,7 +1,5 @@ - %globalentities; -]> - + + testparm @@ -31,12 +29,11 @@ DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. testparm is a very simple test program - to check an smbd - 8 configuration file for + to check an smbd configuration file for internal correctness. If this program reports no problems, you can use the configuration file with confidence that smbd will successfully load the configuration file. @@ -67,9 +64,13 @@ will prompt for a carriage return after printing the service names and before dumping the service definitions. - - &stdarg.help; - &stdarg.version; + + + + -h + Print usage message + + -L servername @@ -81,9 +82,9 @@ -v If this option is specified, testparm - will also output all options that were not used in - smb.conf5 - and are thus set to their defaults. + will also output all options that were not used in + smb.conf and are thus set to + their defaults. @@ -97,8 +98,7 @@ configfilename This is the name of the configuration file to check. If this parameter is not present then the - default smb.conf5 - file will be checked. + default smb.conf file will be checked. @@ -108,9 +108,7 @@ If this parameter and the following are specified, then testparm will examine the hosts allow and hosts deny - parameters in the - smb.conf5 - file to + parameters in the smb.conf file to determine if the hostname with this IP address would be allowed access to the smbd server. If this parameter is supplied, the hostIP parameter must also @@ -132,11 +130,9 @@ - smb.conf5 - + smb.conf This is usually the name of the configuration - file used by smbd8 - . + file used by smbd. @@ -162,11 +158,9 @@ SEE ALSO - - smb.conf5 - , - smbd8 - + smb.conf(5), + smbd(8) + @@ -179,11 +173,11 @@ The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/testprns.1.sgml b/docs/docbook/manpages/testprns.1.sgml index 3ff1d850557..cd99494a9af 100644 --- a/docs/docbook/manpages/testprns.1.sgml +++ b/docs/docbook/manpages/testprns.1.sgml @@ -1,5 +1,5 @@ - + testprns @@ -23,13 +23,13 @@ DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. testprns is a very simple test program to determine whether a given printer name is valid for use in - a service to be provided by smbd - 8. + a service to be provided by + smbd(8). "Valid" in this context means "can be found in the printcap specified". This program is very stupid - so stupid in @@ -54,9 +54,8 @@ done beyond that required to extract the printer name. It may be that the print spooling system is more forgiving or less forgiving than testprns. However, if - testprns finds the printer then - smbd8 - should do so as well. + testprns finds the printer then + smbd should do so as well. @@ -111,16 +110,16 @@ VERSION - This man page is correct for version 3.0 of + This man page is correct for version 2.2 of the Samba suite. SEE ALSO printcap(5), - smbd - 8, smbclient - 1 + smbd(8), + smbclient(1) + @@ -133,11 +132,11 @@ The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at + excellent piece of Open Source software, available at + ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy. + Samba 2.2 was done by Gerald Carter diff --git a/docs/docbook/manpages/vfstest.1.sgml b/docs/docbook/manpages/vfstest.1.sgml index 8be9271679d..d6c7e5f142c 100644 --- a/docs/docbook/manpages/vfstest.1.sgml +++ b/docs/docbook/manpages/vfstest.1.sgml @@ -1,7 +1,8 @@ %globalentities; ]> - + + vfstest @@ -27,8 +28,8 @@ DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. vfstest is a small command line utility that has the ability to test dso samba VFS modules. It gives the @@ -50,6 +51,7 @@ + &stdarg.debuglevel; &stdarg.help; @@ -60,8 +62,6 @@ - &popt.common.samba; - diff --git a/docs/docbook/manpages/wbinfo.1.sgml b/docs/docbook/manpages/wbinfo.1.sgml index 2e9a811bcb5..a6ca2442437 100644 --- a/docs/docbook/manpages/wbinfo.1.sgml +++ b/docs/docbook/manpages/wbinfo.1.sgml @@ -1,7 +1,5 @@ - %globalentities; -]> - + + wbinfo @@ -19,8 +17,8 @@ wbinfo -u -g + -i ip -N netbios-name - -I ip -n name -s sid -U uid @@ -29,11 +27,9 @@ -Y sid -t -m - --sequence -r user -a user%password -A user%password - --get-auth-user -p @@ -41,15 +37,14 @@ DESCRIPTION - This tool is part of the Samba - 7 suite. + This tool is part of the + Samba suite. The wbinfo program queries and returns information - created and used by the winbindd - 8 daemon. + created and used by the + winbindd(8) daemon. - The winbindd - 8 daemon must be configured + The winbindd(8) daemon must be configured and running for the wbinfo program to be able to return information. @@ -61,30 +56,27 @@ -u This option will list all users available - in the Windows NT domain for which the winbindd - 8 daemon is operating in. Users in all trusted domains + in the Windows NT domain for which the winbindd(8) + daemon is operating in. Users in all trusted domains will also be listed. Note that this operation does not assign - user ids to any users that have not already been seen by - winbindd8 - . + user ids to any users that have not already been seen by + winbindd(8). -g This option will list all groups available - in the Windows NT domain for which the Samba - 7 daemon is operating in. Groups in all trusted domains + in the Windows NT domain for which the winbindd(8) + daemon is operating in. Groups in all trusted domains will also be listed. Note that this operation does not assign - group ids to any groups that have not already been - seen by winbindd - 8. + group ids to any groups that have not already been seen by + winbindd(8). -N name The -N option - queries winbindd - 8 to query the WINS + queries winbindd(8) to query the WINS server for the IP address associated with the NetBIOS name specified by the name parameter. @@ -94,8 +86,7 @@ -I ip The -I option - queries winbindd - 8 to send a node status + queries winbindd(8) to send a node status request to get the NetBIOS name associated with the IP address specified by the ip parameter. @@ -105,15 +96,13 @@ -n name The -n option - queries winbindd - 8 for the SID + queries winbindd(8) for the SID associated with the name specified. Domain names can be specified before the user name by using the winbind separator character. For example CWDOM1/Administrator refers to the Administrator user in the domain CWDOM1. If no domain is specified then the - domain used is the one specified in the smb.conf - 5 workgroup - parameter. + domain used is the one specified in the smb.conf + workgroup parameter. @@ -146,18 +135,16 @@ -S sid Convert a SID to a UNIX user id. If the SID - does not correspond to a UNIX user mapped by - winbindd8 - then the operation will fail. + does not correspond to a UNIX user mapped by + winbindd(8) then the operation will fail. -Y sid Convert a SID to a UNIX group id. If the SID - does not correspond to a UNIX group mapped by - winbindd8 then - the operation will fail. + does not correspond to a UNIX group mapped by + winbindd(8) then the operation will fail. @@ -173,18 +160,12 @@ -m Produce a list of domains trusted by the - Windows NT server winbindd - 8 contacts + Windows NT server winbindd(8) contacts when resolving names. This list does not include the Windows NT domain the server is a Primary Domain Controller for. - - --sequence - Show sequence numbers of - all known domains - -r username @@ -212,25 +193,6 @@ Windows 2000 servers only). - - - --get-auth-user - Print username and password used by winbindd - during session setup to a domain controller. Username - and password can be set using '-A'. Only available for - root. - - - - -p - Check whether winbindd is still alive. - Prints out either 'succeeded' or 'failed'. - - - - &stdarg.version; - &stdarg.help; - @@ -239,9 +201,8 @@ EXIT STATUS The wbinfo program returns 0 if the operation - succeeded, or 1 if the operation failed. If the - winbindd8 - daemon is not working wbinfo will always return + succeeded, or 1 if the operation failed. If the winbindd(8) + daemon is not working wbinfo will always return failure. @@ -255,8 +216,8 @@ SEE ALSO - winbindd - 8 + winbindd(8) + @@ -271,8 +232,7 @@ were written by Tim Potter. The conversion to DocBook for Samba 2.2 was done - by Gerald Carter. The conversion to DocBook XML 4.2 for Samba - 3.0 was done by Alexander Bokovoy. + by Gerald Carter diff --git a/docs/docbook/manpages/winbindd.8.sgml b/docs/docbook/manpages/winbindd.8.sgml index e0489c43c48..ccef2fa6231 100644 --- a/docs/docbook/manpages/winbindd.8.sgml +++ b/docs/docbook/manpages/winbindd.8.sgml @@ -1,7 +1,5 @@ - %globalentities; -]> - + + winbindd @@ -31,8 +29,8 @@ DESCRIPTION - This program is part of the Samba - 7 suite. + This program is part of the + Samba suite. winbindd is a daemon that provides a service for the Name Service Switch capability that is present @@ -90,11 +88,12 @@ /etc/nsswitch.conf file can be used to initially resolve user and group information from /etc/passwd and /etc/group and then from the - Windows NT server. - + Windows NT server. + + passwd: files winbind group: files winbind - + The following simple configuration in the /etc/nsswitch.conf file can be used to initially @@ -130,8 +129,13 @@ group: files winbind than a file. - &popt.common.samba; - &stdarg.help; + + -d debuglevel + Sets the debuglevel to an integer between + 0 and 100. 0 is for no debugging and 100 is for reams and + reams. To submit a bug report to the Samba Team, use debug + level 100 (see BUGS.txt). + -i @@ -161,10 +165,15 @@ group: files winbind as 2 threads. The first will answer all requests from the cache, thus making responses to clients faster. The other will update the cache for the query that the first has just responded. - Advantage of this is that responses stay accurate and are faster. + Advantage of this is that responses are accurate and fast. + + -s|--conf=smb.conf + Specifies the location of the all-important + smb.conf file. + @@ -199,9 +208,8 @@ group: files winbind CONFIGURATION Configuration of the winbindd daemon - is done through configuration parameters in the - smb.conf5 - file. All parameters should be specified in the + is done through configuration parameters in the smb.conf(5) + file. All parameters should be specified in the [global] section of smb.conf. @@ -235,24 +243,27 @@ group: files winbind following setup. This was tested on a RedHat 6.2 Linux box. In /etc/nsswitch.conf put the - following: - + following: + + passwd: files winbind group: files winbind - + + + In /etc/pam.d/* replace the + auth lines with something like this: - In /etc/pam.d/* replace the - auth lines with something like this: - + + auth required /lib/security/pam_securetty.so auth required /lib/security/pam_nologin.so auth sufficient /lib/security/pam_winbind.so auth required /lib/security/pam_pwdb.so use_first_pass shadow nullok - + - Note in particular the use of the sufficient - keyword and the use_first_pass keyword. + Note in particular the use of the sufficient + keyword and the use_first_pass keyword. Now replace the account lines with this: @@ -260,26 +271,28 @@ auth required /lib/security/pam_pwdb.so use_first_pass shadow nullok The next step is to join the domain. To do that use the - net program like this: + smbpasswd program like this: - net join -S PDC -U Administrator + smbpasswd -j DOMAIN -r PDC -U + Administrator The username after the -U can be any Domain user that has administrator privileges on the machine. - Substitute the name or IP of your PDC for "PDC". + Substitute your domain name for "DOMAIN" and the name of your PDC + for "PDC". Next copy libnss_winbind.so to - /lib and pam_winbind.so - to /lib/security. A symbolic link needs to be + /lib and pam_winbind.so + to /lib/security. A symbolic link needs to be made from /lib/libnss_winbind.so to /lib/libnss_winbind.so.2. If you are using an older version of glibc then the target of the link should be /lib/libnss_winbind.so.1. - Finally, setup a smb.conf - 5 containing directives like the - following: - + Finally, setup a smb.conf containing directives like the + following: + + [global] winbind separator = + winbind cache time = 10 @@ -290,7 +303,7 @@ auth required /lib/security/pam_pwdb.so use_first_pass shadow nullok workgroup = DOMAIN security = domain password server = * - + Now start winbindd and you should find that your user and @@ -308,14 +321,19 @@ auth required /lib/security/pam_pwdb.so use_first_pass shadow nullok The following notes are useful when configuring and running winbindd: - nmbd - 8 must be running on the local machine - for winbindd to work. winbindd queries - the list of trusted domains for the Windows NT server + nmbd must be running on the local machine + for winbindd to work. winbindd + queries the list of trusted domains for the Windows NT server on startup and when a SIGHUP is received. Thus, for a running winbindd to become aware of new trust relationships between servers, it must be sent a SIGHUP signal. + Client processes resolving names through the winbindd + nsswitch module read an environment variable named + $WINBINDD_DOMAIN. If this variable contains a comma separated + list of Windows NT domain names, then winbindd will only resolve users + and groups within those Windows NT domains. + PAM is really easy to misconfigure. Make sure you know what you are doing when modifying PAM configuration files. It is possible to set up PAM such that you can no longer log into your system. @@ -339,9 +357,8 @@ auth required /lib/security/pam_pwdb.so use_first_pass shadow nullok SIGHUP - Reload the smb.conf - 5 file and - apply any parameter changes to the running + Reload the smb.conf(5) + file and apply any parameter changes to the running version of winbindd. This signal also clears any cached user and group information. The list of other domains trusted by winbindd is also reloaded. @@ -380,21 +397,6 @@ auth required /lib/security/pam_pwdb.so use_first_pass shadow nullok root. - - $LOCKDIR/winbindd_privilaged/pipe - The UNIX pipe over which 'privilaged' clients - communicate with the winbindd program. For security - reasons, access to some winbindd functions - like those needed by - the ntlm_auth utility - is restricted. By default, - only users in the 'root' group will get this access, however the administrator - may change the group permissions on $LOCKDIR/winbindd_privilaged to allow - programs like 'squid' to use ntlm_auth. - Note that the winbind client will only attempt to connect to the winbindd daemon - if both the $LOCKDIR/winbindd_privilaged directory - and $LOCKDIR/winbindd_privilaged/pipe file are owned by - root. - - /lib/libnss_winbind.so.X Implementation of name service switch library. @@ -429,13 +431,10 @@ auth required /lib/security/pam_pwdb.so use_first_pass shadow nullok SEE ALSO - nsswitch.conf(5), - Samba - 7, - wbinfo - 8, - smb.conf - 5 + nsswitch.conf(5), + samba(7), + wbinfo(1), + smb.conf(5) @@ -446,12 +445,11 @@ auth required /lib/security/pam_pwdb.so use_first_pass shadow nullok by the Samba Team as an Open Source project similar to the way the Linux kernel is developed. - wbinfo and winbindd were - written by Tim Potter. + wbinfo and winbindd + were written by Tim Potter. The conversion to DocBook for Samba 2.2 was done - by Gerald Carter. The conversion to DocBook XML 4.2 for - Samba 3.0 was done by Alexander Bokovoy. + by Gerald Carter diff --git a/docs/docbook/projdoc/ADS-HOWTO.sgml b/docs/docbook/projdoc/ADS-HOWTO.sgml index a98fe14e31a..887ecd74c27 100644 --- a/docs/docbook/projdoc/ADS-HOWTO.sgml +++ b/docs/docbook/projdoc/ADS-HOWTO.sgml @@ -14,10 +14,67 @@ This is a rough guide to setting up Samba 3.0 with kerberos authentication again Windows2000 KDC. +Pieces you need before you begin: + + +a Windows 2000 server. +samba 3.0 or higher. +the MIT kerberos development libraries (either install from the above sources or use a package). The heimdal libraries will not work. +the OpenLDAP development libraries. + + + + +Installing the required packages for Debian + +On Debian you need to install the following packages: + + +libkrb5-dev +krb5-user + + + + + +Installing the required packages for RedHat + +On RedHat this means you should have at least: + + +krb5-workstation (for kinit) +krb5-libs (for linking with) +krb5-devel (because you are compiling from source) + + + +in addition to the standard development environment. + +Note that these are not standard on a RedHat install, and you may need +to get them off CD2. + + + -Setup your <filename>smb.conf</filename> +Compile Samba +If your kerberos libraries are in a non-standard location then + remember to add the configure option --with-krb5=DIR. -You must use at least the following 3 options in smb.conf: +After you run configure make sure that include/config.h it + generates contains + lines like this: + + +#define HAVE_KRB5 1 +#define HAVE_LDAP 1 + + +If it doesn't then configure did not find your krb5 libraries or + your ldap libraries. Look in config.log to figure out why and fix + it. + +Then compile and install Samba as usual. You must use at least the + following 3 options in smb.conf: realm = YOUR.KERBEROS.REALM @@ -36,13 +93,13 @@ In case samba can't figure out your ads server using your realm name, use the You do *not* need a smbpasswd file, and older clients will be authenticated as if "security = domain", although it won't do any harm and allows you to have local users not in the domain. - I expect that the above required options will change soon when we get better - active directory integration. - + I expect that the above + required options will change soon when we get better active + directory integration. - + -Setup your <filename>/etc/krb5.conf</filename> +Setup your /etc/krb5.conf The minimal configuration for krb5.conf is: @@ -130,11 +187,12 @@ specify the -k option to choose kerberos authentication. Notes -You must change administrator password at least once after DC -install, to create the right encoding types +You must change administrator password at least once after DC install, + to create the right encoding types w2k doesn't seem to create the _kerberos._udp and _ldap._tcp in their defaults DNS setup. Maybe fixed in service packs? + diff --git a/docs/docbook/projdoc/AdvancedNetworkAdmin.sgml b/docs/docbook/projdoc/AdvancedNetworkAdmin.sgml deleted file mode 100644 index 18fda67123d..00000000000 --- a/docs/docbook/projdoc/AdvancedNetworkAdmin.sgml +++ /dev/null @@ -1,57 +0,0 @@ - - - - John HTerpstra - - Samba Team -
- jht@samba.org -
-
-
- April 3 2003 -
- -Advanced Network Manangement Information - - -Remote Server Administration - - - -How do I get 'User Manager' and 'Server Manager' - - - -Since I don't need to buy an NT Server CD now, how do I get the 'User Manager for Domains', -the 'Server Manager'? - - - -Microsoft distributes a version of these tools called nexus for installation on Windows 95 -systems. The tools set includes: - - - - Server Manager - - User Manager for Domains - - Event Viewer - - - -Click here to download the archived file ftp://ftp.microsoft.com/Softlib/MSLFILES/NEXUS.EXE - - - -The Windows NT 4.0 version of the 'User Manager for -Domains' and 'Server Manager' are available from Microsoft via ftp -from ftp://ftp.microsoft.com/Softlib/MSLFILES/SRVTOOLS.EXE - - - - -
- diff --git a/docs/docbook/projdoc/Browsing-Quickguide.sgml b/docs/docbook/projdoc/Browsing-Quickguide.sgml index adf20b7386f..0a5cf72038d 100644 --- a/docs/docbook/projdoc/Browsing-Quickguide.sgml +++ b/docs/docbook/projdoc/Browsing-Quickguide.sgml @@ -84,81 +84,6 @@ minutes to stabilise, particularly across network segments. - -How browsing functions and how to deploy stable and -dependable browsing using Samba - - - -As stated above, MS Windows machines register their NetBIOS names -(i.e.: the machine name for each service type in operation) on start -up. Also, as stated above, the exact method by which this name registration -takes place is determined by whether or not the MS Windows client/server -has been given a WINS server address, whether or not LMHOSTS lookup -is enabled, or if DNS for NetBIOS name resolution is enabled, etc. - - - -In the case where there is no WINS server all name registrations as -well as name lookups are done by UDP broadcast. This isolates name -resolution to the local subnet, unless LMHOSTS is used to list all -names and IP addresses. In such situations Samba provides a means by -which the samba server name may be forcibly injected into the browse -list of a remote MS Windows network (using the "remote announce" parameter). - - - -Where a WINS server is used, the MS Windows client will use UDP -unicast to register with the WINS server. Such packets can be routed -and thus WINS allows name resolution to function across routed networks. - - - -During the startup process an election will take place to create a -local master browser if one does not already exist. On each NetBIOS network -one machine will be elected to function as the domain master browser. This -domain browsing has nothing to do with MS security domain control. -Instead, the domain master browser serves the role of contacting each local -master browser (found by asking WINS or from LMHOSTS) and exchanging browse -list contents. This way every master browser will eventually obtain a complete -list of all machines that are on the network. Every 11-15 minutes an election -is held to determine which machine will be the master browser. By the nature of -the election criteria used, the machine with the highest uptime, or the -most senior protocol version, or other criteria, will win the election -as domain master browser. - - - -Clients wishing to browse the network make use of this list, but also depend -on the availability of correct name resolution to the respective IP -address/addresses. - - - -Any configuration that breaks name resolution and/or browsing intrinsics -will annoy users because they will have to put up with protracted -inability to use the network services. - - - -Samba supports a feature that allows forced synchonisation -of browse lists across routed networks using the "remote -browse sync" parameter in the smb.conf file. This causes Samba -to contact the local master browser on a remote network and -to request browse list synchronisation. This effectively bridges -two networks that are separated by routers. The two remote -networks may use either broadcast based name resolution or WINS -based name resolution, but it should be noted that the "remote -browse sync" parameter provides browse list synchronisation - and -that is distinct from name to address resolution, in other -words, for cross subnet browsing to function correctly it is -essential that a name to address resolution mechanism be provided. -This mechanism could be via DNS, /etc/hosts, -and so on. - - - - Use of the "Remote Announce" parameter diff --git a/docs/docbook/projdoc/Browsing.sgml b/docs/docbook/projdoc/Browsing.sgml index 60512c3cd15..aeb3b477c5e 100644 --- a/docs/docbook/projdoc/Browsing.sgml +++ b/docs/docbook/projdoc/Browsing.sgml @@ -534,10 +534,10 @@ options in the [global] section of the smb.conf file : -domain master = yes -local master = yes -preferred master = yes -os level = 65 + domain master = yes + local master = yes + preferred master = yes + os level = 65 @@ -559,10 +559,10 @@ smb.conf file : -domain master = no -local master = yes -preferred master = yes -os level = 65 + domain master = no + local master = yes + preferred master = yes + os level = 65 @@ -588,10 +588,10 @@ options in the [global] section of the smb.conf file : -domain master = no -local master = no -preferred master = no -os level = 0 + domain master = no + local master = no + preferred master = no + os level = 0 @@ -619,10 +619,10 @@ file : -domain master = no -local master = yes -preferred master = yes -os level = 65 + domain master = no + local master = yes + preferred master = yes + os level = 65 diff --git a/docs/docbook/projdoc/CVS-Access.sgml b/docs/docbook/projdoc/CVS-Access.sgml new file mode 100644 index 00000000000..98ef925f20f --- /dev/null +++ b/docs/docbook/projdoc/CVS-Access.sgml @@ -0,0 +1,157 @@ + + + + + + + Samba Team + + + + + (22 May 2001) + + +HOWTO Access Samba source code via CVS + + +Introduction + + +Samba is developed in an open environment. Developers use CVS +(Concurrent Versioning System) to "checkin" (also known as +"commit") new source code. Samba's various CVS branches can +be accessed via anonymous CVS using the instructions +detailed in this chapter. + + + +This document is a modified version of the instructions found at +http://samba.org/samba/cvs.html + + + + + + +CVS Access to samba.org + + +The machine samba.org runs a publicly accessible CVS +repository for access to the source code of several packages, +including samba, rsync and jitterbug. There are two main ways of +accessing the CVS server on this host. + + + +Access via CVSweb + + +You can access the source code via your +favourite WWW browser. This allows you to access the contents of +individual files in the repository and also to look at the revision +history and commit logs of individual files. You can also ask for a diff +listing between any two versions on the repository. + + + +Use the URL : http://samba.org/cgi-bin/cvsweb + + + + +Access via cvs + + +You can also access the source code via a +normal cvs client. This gives you much more control over you can +do with the repository and allows you to checkout whole source trees +and keep them up to date via normal cvs commands. This is the +preferred method of access if you are a developer and not +just a casual browser. + + + +To download the latest cvs source code, point your +browser at the URL : http://www.cyclic.com/. +and click on the 'How to get cvs' link. CVS is free software under +the GNU GPL (as is Samba). Note that there are several graphical CVS clients +which provide a graphical interface to the sometimes mundane CVS commands. +Links to theses clients are also available from http://www.cyclic.com. + + + +To gain access via anonymous cvs use the following steps. +For this example it is assumed that you want a copy of the +samba source code. For the other source code repositories +on this system just substitute the correct package name + + + + + + Install a recent copy of cvs. All you really need is a + copy of the cvs client binary. + + + + + + + Run the command + + + + cvs -d :pserver:cvs@samba.org:/cvsroot login + + + + When it asks you for a password type cvs. + + + + + + + Run the command + + + + cvs -d :pserver:cvs@samba.org:/cvsroot co samba + + + + This will create a directory called samba containing the + latest samba source code (i.e. the HEAD tagged cvs branch). This + currently corresponds to the 3.0 development tree. + + + + CVS branches other HEAD can be obtained by using the -r + and defining a tag name. A list of branch tag names can be found on the + "Development" page of the samba web site. A common request is to obtain the + latest 2.2 release code. This could be done by using the following command. + + + + cvs -d :pserver:cvs@samba.org:/cvsroot co -r SAMBA_2_2 samba + + + + + + Whenever you want to merge in the latest code changes use + the following command from within the samba directory: + + + + cvs update -d -P + + + + + + + + diff --git a/docs/docbook/projdoc/Compiling.sgml b/docs/docbook/projdoc/Compiling.sgml index ac98f34a32a..49aafebec0c 100644 --- a/docs/docbook/projdoc/Compiling.sgml +++ b/docs/docbook/projdoc/Compiling.sgml @@ -217,64 +217,6 @@ on this system just substitute the correct package name if you find this version a disaster! - - - Compiling samba with Active Directory support - - In order to compile samba with ADS support, you need to have installed - on your system: - - the MIT kerberos development libraries (either install from the sources or use a package). The heimdal libraries will not work. - the OpenLDAP development libraries. - - - If your kerberos libraries are in a non-standard location then - remember to add the configure option --with-krb5=DIR. - - After you run configure make sure that include/config.h it generates contains lines like this: - - -#define HAVE_KRB5 1 -#define HAVE_LDAP 1 - - - If it doesn't then configure did not find your krb5 libraries or - your ldap libraries. Look in config.log to figure out why and fix - it. - - - Installing the required packages for Debian - - On Debian you need to install the following packages: - - - libkrb5-dev - krb5-user - - - - - - Installing the required packages for RedHat - - On RedHat this means you should have at least: - - - krb5-workstation (for kinit) - krb5-libs (for linking with) - krb5-devel (because you are compiling from source) - - - - in addition to the standard development environment. - - Note that these are not standard on a RedHat install, and you may need - to get them off CD2. - - - - - diff --git a/docs/docbook/projdoc/DOMAIN_MEMBER.sgml b/docs/docbook/projdoc/DOMAIN_MEMBER.sgml index 8ac35203845..b178bfd2c26 100644 --- a/docs/docbook/projdoc/DOMAIN_MEMBER.sgml +++ b/docs/docbook/projdoc/DOMAIN_MEMBER.sgml @@ -45,7 +45,9 @@ security = line in the [global] section of your smb.conf to read: - security = domain + security = domain or + security = ads depending on if the PDC is + NT4 or running Active Directory respectivly. Next change the workgroup = line in the [global] section to read: @@ -84,7 +86,7 @@ In order to actually join the domain, you must run this command: - root# net rpc join -S DOMPDC + root# net join -S DOMPDC -UAdministrator%password as we are joining the domain DOM and the PDC for that domain @@ -121,6 +123,19 @@ clients to begin using domain security! + +Samba and Windows 2000 Domains + + + +Many people have asked regarding the state of Samba's ability to participate in +a Windows 2000 Domain. Samba 3.0 is able to act as a member server of a Windows +2000 domain operating in mixed or native mode. The steps above apply +to both NT4 and Windows 2000. + + + + Why is this better than security = server? @@ -163,11 +178,11 @@ reply, the Samba server gets the user identification information such as the user SID, the list of NT groups the user belongs to, etc. - Much of the text of this document + NOTE: Much of the text of this document was first published in the Web magazine LinuxWorld as the article Doing - the NIS/NT Samba. + the NIS/NT Samba. diff --git a/docs/docbook/projdoc/ENCRYPTION.sgml b/docs/docbook/projdoc/ENCRYPTION.sgml new file mode 100644 index 00000000000..f903d7d3347 --- /dev/null +++ b/docs/docbook/projdoc/ENCRYPTION.sgml @@ -0,0 +1,189 @@ + + + + + + JeremyAllison + + Samba Team +
+ jra@samba.org +
+
+
+ + + JelmerVernooij + + Samba Team +
+ jelmer@samba.org +
+
+
+ + 4 November 2002 +
+ +LanMan and NT Password Encryption in Samba + + + + Introduction + + Newer windows clients send encrypted passwords over + the wire, instead of plain text passwords. The newest clients + will only send encrypted passwords and refuse to send plain text + passwords, unless their registry is tweaked. + + These passwords can't be converted to unix style encrypted + passwords. Because of that you can't use the standard unix + user database, and you have to store the Lanman and NT hashes + somewhere else. For more information, see the documentation + about the passdb backend = parameter. + + + + + + Important Notes About Security + + The unix and SMB password encryption techniques seem similar + on the surface. This similarity is, however, only skin deep. The unix + scheme typically sends clear text passwords over the network when + logging in. This is bad. The SMB encryption scheme never sends the + cleartext password over the network but it does store the 16 byte + hashed values on disk. This is also bad. Why? Because the 16 byte hashed + values are a "password equivalent". You cannot derive the user's + password from them, but they could potentially be used in a modified + client to gain access to a server. This would require considerable + technical knowledge on behalf of the attacker but is perfectly possible. + You should thus treat the smbpasswd file as though it contained the + cleartext passwords of all your users. Its contents must be kept + secret, and the file should be protected accordingly. + + Ideally we would like a password scheme which neither requires + plain text passwords on the net or on disk. Unfortunately this + is not available as Samba is stuck with being compatible with + other SMB systems (WinNT, WfWg, Win95 etc). + + + Note that Windows NT 4.0 Service pack 3 changed the + default for permissible authentication so that plaintext + passwords are never sent over the wire. + The solution to this is either to switch to encrypted passwords + with Samba or edit the Windows NT registry to re-enable plaintext + passwords. See the document WinNT.txt for details on how to do + this. + + Other Microsoft operating systems which also exhibit + this behavior includes + + + MS DOS Network client 3.0 with + the basic network redirector installed + + Windows 95 with the network redirector + update installed + + Windows 98 [se] + + Windows 2000 + + + Note :All current release of + Microsoft SMB/CIFS clients support authentication via the + SMB Challenge/Response mechanism described here. Enabling + clear text authentication does not disable the ability + of the client to participate in encrypted authentication. + + + + Advantages of SMB Encryption + + + plain text passwords are not passed across + the network. Someone using a network sniffer cannot just + record passwords going to the SMB server. + + + WinNT doesn't like talking to a server + that isn't using SMB encrypted passwords. It will refuse + to browse the server if the server is also in user level + security mode. It will insist on prompting the user for the + password on each connection, which is very annoying. The + only things you can do to stop this is to use SMB encryption. + + + + + + + Advantages of non-encrypted passwords + + + plain text passwords are not kept + on disk. + + uses same password file as other unix + services such as login and ftp + + you are probably already using other + services (such as telnet and ftp) which send plain text + passwords over the net, so sending them for SMB isn't + such a big deal. + + + + + + + The smbpasswd Command + + The smbpasswd command maintains the two 32 byte password fields + in the smbpasswd file. If you wish to make it similar to the unix + passwd or yppasswd programs, + install it in /usr/local/samba/bin/ (or your + main Samba binary directory). + + smbpasswd now works in a client-server mode + where it contacts the local smbd to change the user's password on its + behalf. This has enormous benefits - as follows. + + smbpasswd now has the capability + to change passwords on Windows NT servers (this only works when + the request is sent to the NT Primary Domain Controller if you + are changing an NT Domain user's password). + + To run smbpasswd as a normal user just type : + + $ smbpasswd + Old SMB password: <type old value here - + or hit return if there was no old password> + New SMB Password: <type new value> + + Repeat New SMB Password: <re-type new value + + + If the old value does not match the current value stored for + that user, or the two new values do not match each other, then the + password will not be changed. + + If invoked by an ordinary user it will only allow the user + to change his or her own Samba password. + + If run by the root user smbpasswd may take an optional + argument, specifying the user name whose SMB password you wish to + change. Note that when run as root smbpasswd does not prompt for + or check the old password value, thus allowing root to set passwords + for users who have forgotten their passwords. + + smbpasswd is designed to work in the same way + and be familiar to UNIX users who use the passwd or + yppasswd commands. + + For more details on using smbpasswd refer + to the man page which will always be the definitive reference. + + +
diff --git a/docs/docbook/projdoc/GroupProfiles.sgml b/docs/docbook/projdoc/GroupProfiles.sgml new file mode 100644 index 00000000000..8bdf98059a9 --- /dev/null +++ b/docs/docbook/projdoc/GroupProfiles.sgml @@ -0,0 +1,289 @@ + + + + JohnTerpstra + + + JelmerVernooij + + + JohnRussell + +
apca72@dsl.pipex.com
+
+
+
+ +Creating Group Prolicy Files + + +Windows '9x + +You need the Win98 Group Policy Editor to +set Group Profiles up under Windows '9x. It can be found on the Original +full product Win98 installation CD under +tools/reskit/netadmin/poledit. You install this +using the Add/Remove Programs facility and then click on the 'Have Disk' +tab. + + + +Use the Group Policy Editor to create a policy file that specifies the +location of user profiles and/or the My Documents etc. +stuff. You then save these settings in a file called +Config.POL that needs to be placed in +the root of the [NETLOGON] share. If your Win98 is configured to log onto +the Samba Domain, it will automatically read this file and update the +Win9x/Me registry of the machine that is logging on. + + + +All of this is covered in the Win98 Resource Kit documentation. + + + +If you do not do it this way, then every so often Win9x/Me will check the +integrity of the registry and will restore it's settings from the back-up +copy of the registry it stores on each Win9x/Me machine. Hence, you will +occasionally notice things changing back to the original settings. + + + +The following all refers to Windows NT/200x profile migration - not to policies. +We need a separate section on policies (NTConfig.Pol) for NT4/200x. + + + + +Windows NT 4 + + +Unfortunately, the Resource Kit info is Win NT4 or 200x specific. + + + +Here is a quick guide: + + + + + +On your NT4 Domain Controller, right click on 'My Computer', then +select the tab labelled 'User Profiles'. + + + +Select a user profile you want to migrate and click on it. + + +I am using the term "migrate" lossely. You can copy a profile to +create a group profile. You can give the user 'Everyone' rights to the +profile you copy this to. That is what you need to do, since your samba +domain is not a member of a trust relationship with your NT4 PDC. + + +Click the 'Copy To' button. + +In the box labelled 'Copy Profile to' add your new path, eg: +c:\temp\foobar + +Click on the button labelled 'Change' in the "Permitted to use" box. + +Click on the group 'Everyone' and then click OK. This closes the +'chose user' box. + +Now click OK. + + + +Follow the above for every profile you need to migrate. + + + +Side bar Notes + + +You should obtain the SID of your NT4 domain. You can use smbpasswd to do +this. Read the man page. + + +With Samba-3.0.0 alpha code you can import all you NT4 domain accounts +using the net samsync method. This way you can retain your profile +settings as well as all your users. + + + + + +Mandatory profiles + + +The above method can be used to create mandatory profiles also. To convert +a group profile into a mandatory profile simply locate the NTUser.DAT file +in the copied profile and rename it to NTUser.MAN. + + + + + +moveuser.exe + + +The W2K professional resource kit has moveuser.exe. moveuser.exe changes +the security of a profile from one user to another. This allows the account +domain to change, and/or the user name to change. + + + + + +Get SID + + +You can identify the SID by using GetSID.exe from the Windows NT Server 4.0 +Resource Kit. + + + +Windows NT 4.0 stores the local profile information in the registry under +the following key: +HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList + + + +Under the ProfileList key, there will be subkeys named with the SIDs of the +users who have logged on to this computer. (To find the profile information +for the user whose locally cached profile you want to move, find the SID for +the user with the GetSID.exe utility.) Inside of the appropriate user's +subkey, you will see a string value named ProfileImagePath. + + + + + + + +Windows 2000/XP + + +You must first convert the profile from a local profile to a domain +profile on the MS Windows workstation as follows: + + + + +Log on as the LOCAL workstation administrator. + + + +Right click on the 'My Computer' Icon, select 'Properties' + + + +Click on the 'User Profiles' tab + + + +Select the profile you wish to convert (click on it once) + + + +Click on the button 'Copy To' + + + +In the "Permitted to use" box, click on the 'Change' button. + + + +Click on the 'Look in" area that lists the machine name, when you click +here it will open up a selection box. Click on the domain to which the +profile must be accessible. + + +You will need to log on if a logon box opens up. Eg: In the connect +as: MIDEARTH\root, password: mypassword. + + + +To make the profile capable of being used by anyone select 'Everyone' + + + +Click OK. The Selection box will close. + + + +Now click on the 'Ok' button to create the profile in the path you +nominated. + + + + +Done. You now have a profile that can be editted using the samba-3.0.0 +profiles tool. + + + + +Under NT/2K the use of mandotory profiles forces the use of MS Exchange +storage of mail data. That keeps desktop profiles usable. + + + + + + +This is a security check new to Windows XP (or maybe only +Windows XP service pack 1). It can be disabled via a group policy in +Active Directory. The policy is: + +"Computer Configuration\Administrative Templates\System\User +Profiles\Do not check for user ownership of Roaming Profile Folders" + +...and it should be set to "Enabled". +Does the new version of samba have an Active Directory analogue? If so, +then you may be able to set the policy through this. + + + +If you cannot set group policies in samba, then you may be able to set +the policy locally on each machine. If you want to try this, then do +the following (N.B. I don't know for sure that this will work in the +same way as a domain group policy): + + + + + +On the XP workstation log in with an Administrator account. + + +Click: "Start", "Run" +Type: "mmc" +Click: "OK" + +A Microsoft Management Console should appear. +Click: File, "Add/Remove Snap-in...", "Add" +Double-Click: "Group Policy" +Click: "Finish", "Close" +Click: "OK" + +In the "Console Root" window: +Expand: "Local Computer Policy", "Computer Configuration", +"Administrative Templates", "System", "User Profiles" +Double-Click: "Do not check for user ownership of Roaming Profile +Folders" +Select: "Enabled" +Click: OK" + +Close the whole console. You do not need to save the settings (this +refers to the console settings rather than the policies you have +changed). + +Reboot + + + + +
diff --git a/docs/docbook/projdoc/Integrating-with-Windows.sgml b/docs/docbook/projdoc/Integrating-with-Windows.sgml index 8a5c0c40f2d..a4e79fd42bb 100644 --- a/docs/docbook/projdoc/Integrating-with-Windows.sgml +++ b/docs/docbook/projdoc/Integrating-with-Windows.sgml @@ -18,46 +18,48 @@ Integrating MS Windows networks with Samba - -This section deals with NetBIOS over TCP/IP name to IP address resolution. If you -your MS Windows clients are NOT configured to use NetBIOS over TCP/IP then this -section does not apply to your installation. If your installation involves use of -NetBIOS over TCP/IP then this section may help you to resolve networking problems. - + +Agenda - - NetBIOS over TCP/IP has nothing to do with NetBEUI. NetBEUI is NetBIOS - over Logical Link Control (LLC). On modern networks it is highly advised - to NOT run NetBEUI at all. Note also that there is NO such thing as - NetBEUI over TCP/IP - the existence of such a protocol is a complete - and utter mis-apprehension. +To identify the key functional mechanisms of MS Windows networking +to enable the deployment of Samba as a means of extending and/or +replacing MS Windows NT/2000 technology. - -Since the introduction of MS Windows 2000 it is possible to run MS Windows networking -without the use of NetBIOS over TCP/IP. NetBIOS over TCP/IP uses UDP port 137 for NetBIOS -name resolution and uses TCP port 139 for NetBIOS session services. When NetBIOS over -TCP/IP is disabled on MS Windows 2000 and later clients then only TCP port 445 will be -used and UDP port 137 and TCP port 139 will not. +We will examine: - - -When using Windows 2000 or later clients, if NetBIOS over TCP/IP is NOT disabled, then -the client will use UDP port 137 (NetBIOS Name Service, also known as the Windows Internet -Name Service or WINS), TCP port 139 AND TCP port 445 (for actual file and print traffic). - - + + Name resolution in a pure Unix/Linux TCP/IP + environment + - -When NetBIOS over TCP/IP is disabled the use of DNS is essential. Most installations that -disable NetBIOS over TCP/IP today use MS Active Directory Service (ADS). ADS requires -Dynamic DNS with Service Resource Records (SRV RR) and with Incremental Zone Transfers (IXFR). -Use of DHCP with ADS is recommended as a further means of maintaining central control -over client workstation network configuration. - + Name resolution as used within MS Windows + networking + + + How browsing functions and how to deploy stable + and dependable browsing using Samba + + + MS Windows security options and how to + configure Samba for seemless integration + + + Configuration of Samba as: + + A stand-alone server + An MS Windows NT 3.x/4.0 security domain member + + An alternative to an MS Windows NT 3.x/4.0 Domain Controller + + + + + + @@ -553,4 +555,381 @@ of the WINS server. + + +How browsing functions and how to deploy stable and +dependable browsing using Samba + + + +As stated above, MS Windows machines register their NetBIOS names +(i.e.: the machine name for each service type in operation) on start +up. Also, as stated above, the exact method by which this name registration +takes place is determined by whether or not the MS Windows client/server +has been given a WINS server address, whether or not LMHOSTS lookup +is enabled, or if DNS for NetBIOS name resolution is enabled, etc. + + + +In the case where there is no WINS server all name registrations as +well as name lookups are done by UDP broadcast. This isolates name +resolution to the local subnet, unless LMHOSTS is used to list all +names and IP addresses. In such situations Samba provides a means by +which the samba server name may be forcibly injected into the browse +list of a remote MS Windows network (using the "remote announce" parameter). + + + +Where a WINS server is used, the MS Windows client will use UDP +unicast to register with the WINS server. Such packets can be routed +and thus WINS allows name resolution to function across routed networks. + + + +During the startup process an election will take place to create a +local master browser if one does not already exist. On each NetBIOS network +one machine will be elected to function as the domain master browser. This +domain browsing has nothing to do with MS security domain control. +Instead, the domain master browser serves the role of contacting each local +master browser (found by asking WINS or from LMHOSTS) and exchanging browse +list contents. This way every master browser will eventually obtain a complete +list of all machines that are on the network. Every 11-15 minutes an election +is held to determine which machine will be the master browser. By the nature of +the election criteria used, the machine with the highest uptime, or the +most senior protocol version, or other criteria, will win the election +as domain master browser. + + + +Clients wishing to browse the network make use of this list, but also depend +on the availability of correct name resolution to the respective IP +address/addresses. + + + +Any configuration that breaks name resolution and/or browsing intrinsics +will annoy users because they will have to put up with protracted +inability to use the network services. + + + +Samba supports a feature that allows forced synchonisation +of browse lists across routed networks using the "remote +browse sync" parameter in the smb.conf file. This causes Samba +to contact the local master browser on a remote network and +to request browse list synchronisation. This effectively bridges +two networks that are separated by routers. The two remote +networks may use either broadcast based name resolution or WINS +based name resolution, but it should be noted that the "remote +browse sync" parameter provides browse list synchronisation - and +that is distinct from name to address resolution, in other +words, for cross subnet browsing to function correctly it is +essential that a name to address resolution mechanism be provided. +This mechanism could be via DNS, /etc/hosts, +and so on. + + + + + +MS Windows security options and how to configure +Samba for seemless integration + + +MS Windows clients may use encrypted passwords as part of a +challenege/response authentication model (a.k.a. NTLMv1) or +alone, or clear text strings for simple password based +authentication. It should be realized that with the SMB +protocol the password is passed over the network either +in plain text or encrypted, but not both in the same +authentication requets. + + + +When encrypted passwords are used a password that has been +entered by the user is encrypted in two ways: + + + + An MD4 hash of the UNICODE of the password + string. This is known as the NT hash. + + + The password is converted to upper case, + and then padded or trucated to 14 bytes. This string is + then appended with 5 bytes of NULL characters and split to + form two 56 bit DES keys to encrypt a "magic" 8 byte value. + The resulting 16 bytes for the LanMan hash. + + + + +You should refer to the +Password Encryption chapter in this HOWTO collection +for more details on the inner workings + + + +MS Windows 95 pre-service pack 1, MS Windows NT versions 3.x +and version 4.0 pre-service pack 3 will use either mode of +password authentication. All versions of MS Windows that follow +these versions no longer support plain text passwords by default. + + + +MS Windows clients have a habit of dropping network mappings that +have been idle for 10 minutes or longer. When the user attempts to +use the mapped drive connection that has been dropped, the client +re-establishes the connection using +a cached copy of the password. + + + +When Microsoft changed the default password mode, they dropped support for +caching of the plain text password. This means that when the registry +parameter is changed to re-enable use of plain text passwords it appears to +work, but when a dropped mapping attempts to revalidate it will fail if +the remote authentication server does not support encrypted passwords. +This means that it is definitely not a good idea to re-enable plain text +password support in such clients. + + + +The following parameters can be used to work around the +issue of Windows 9x client upper casing usernames and +password before transmitting them to the SMB server +when using clear text authentication. + + + + passsword level = integer + username level = integer + + + +By default Samba will lower case the username before attempting +to lookup the user in the database of local system accounts. +Because UNIX usernames conventionally only contain lower case +character, the username level parameter +is rarely even needed. + + + +However, password on UNIX systems often make use of mixed case +characters. This means that in order for a user on a Windows 9x +client to connect to a Samba server using clear text authentication, +the password level must be set to the maximum +number of upper case letter which could appear +is a password. Note that is the server OS uses the traditional +DES version of crypt(), then a password level +of 8 will result in case insensitive passwords as seen from Windows +users. This will also result in longer login times as Samba +hash to compute the permutations of the password string and +try them one by one until a match is located (or all combinations fail). + + + +The best option to adopt is to enable support for encrypted passwords +where ever Samba is used. There are three configuration possibilities +for support of encrypted passwords: + + + + +Use MS Windows NT as an authentication server + + +This method involves the additions of the following parameters +in the smb.conf file: + + + + encrypt passwords = Yes + security = server + password server = "NetBIOS_name_of_PDC" + + + + +There are two ways of identifying whether or not a username and +password pair was valid or not. One uses the reply information provided +as part of the authentication messaging process, the other uses +just and error code. + + + +The down-side of this mode of configuration is the fact that +for security reasons Samba will send the password server a bogus +username and a bogus password and if the remote server fails to +reject the username and password pair then an alternative mode +of identification of validation is used. Where a site uses password +lock out after a certain number of failed authentication attempts +this will result in user lockouts. + + + +Use of this mode of authentication does require there to be +a standard Unix account for the user, this account can be blocked +to prevent logons by other than MS Windows clients. + + + + + +Make Samba a member of an MS Windows NT security domain + + +This method involves additon of the following paramters in the smb.conf file: + + + + encrypt passwords = Yes + security = domain + workgroup = "name of NT domain" + password server = * + + + +The use of the "*" argument to "password server" will cause samba +to locate the domain controller in a way analogous to the way +this is done within MS Windows NT. + + + +In order for this method to work the Samba server needs to join the +MS Windows NT security domain. This is done as follows: + + + + On the MS Windows NT domain controller using + the Server Manager add a machine account for the Samba server. + + + Next, on the Linux system execute: + smbpasswd -r PDC_NAME -j DOMAIN_NAME + + + + +Use of this mode of authentication does require there to be +a standard Unix account for the user in order to assign +a uid once the account has been authenticated by the remote +Windows DC. This account can be blocked to prevent logons by +other than MS Windows clients by things such as setting an invalid +shell in the /etc/passwd entry. + + + +An alternative to assigning UIDs to Windows users on a +Samba member server is presented in the Winbind Overview chapter in +this HOWTO collection. + + + + + + + +Configure Samba as an authentication server + + +This mode of authentication demands that there be on the +Unix/Linux system both a Unix style account as well as an +smbpasswd entry for the user. The Unix system account can be +locked if required as only the encrypted password will be +used for SMB client authentication. + + + +This method involves addition of the following parameters to +the smb.conf file: + + + +## please refer to the Samba PDC HOWTO chapter later in +## this collection for more details +[global] + encrypt passwords = Yes + security = user + domain logons = Yes + ; an OS level of 33 or more is recommended + os level = 33 + +[NETLOGON] + path = /somewhare/in/file/system + read only = yes + + + +in order for this method to work a Unix system account needs +to be created for each user, as well as for each MS Windows NT/2000 +machine. The following structure is required. + + + +Users + + +A user account that may provide a home directory should be +created. The following Linux system commands are typical of +the procedure for creating an account. + + + + # useradd -s /bin/bash -d /home/"userid" -m "userid" + # passwd "userid" + Enter Password: <pw> + + # smbpasswd -a "userid" + Enter Password: <pw> + + + + +MS Windows NT Machine Accounts + + +These are required only when Samba is used as a domain +controller. Refer to the Samba-PDC-HOWTO for more details. + + + + # useradd -s /bin/false -d /dev/null "machine_name"\$ + # passwd -l "machine_name"\$ + # smbpasswd -a -m "machine_name" + + + + + + + +Conclusions + + +Samba provides a flexible means to operate as... + + + + A Stand-alone server - No special action is needed + other than to create user accounts. Stand-alone servers do NOT + provide network logon services, meaning that machines that use this + server do NOT perform a domain logon but instead make use only of + the MS Windows logon which is local to the MS Windows + workstation/server. + + + An MS Windows NT 3.x/4.0 security domain member. + + + + An alternative to an MS Windows NT 3.x/4.0 + Domain Controller. + + + + + +
diff --git a/docs/docbook/projdoc/NT_Security.sgml b/docs/docbook/projdoc/NT_Security.sgml index a68a820b76e..28433315195 100644 --- a/docs/docbook/projdoc/NT_Security.sgml +++ b/docs/docbook/projdoc/NT_Security.sgml @@ -22,8 +22,10 @@ Viewing and changing UNIX permissions using the NT security dialogs - Windows NT clients can use their native security settings - dialog box to view and modify the underlying UNIX permissions. + + New in the Samba 2.0.4 release is the ability for Windows + NT clients to use their native security settings dialog box to + view and modify the underlying UNIX permissions. Note that this ability is careful not to compromise the security of the UNIX host Samba is running on, and @@ -34,12 +36,13 @@ How to view file security on a Samba share - From an NT4/2000/XP client, single-click with the right + From an NT 4.0 client, single-click with the right mouse button on any file or directory in a Samba mounted drive letter or UNC path. When the menu pops-up, click on the Properties entry at the bottom of - the menu. This brings up the file properties dialog - box. Click on the tab Security and you + the menu. This brings up the normal file properties dialog + box, but with Samba 2.0.4 this will have a new tab along the top + marked Security. Click on this tab and you will see three buttons, Permissions, Auditing, and Ownership. The Auditing button will cause either @@ -86,7 +89,7 @@ There is an NT chown command that will work with Samba and allow a user with Administrator privilege connected - to a Samba server as root to change the ownership of + to a Samba 2.0.4 server as root to change the ownership of files on both a local NTFS filesystem or remote mounted NTFS or Samba drive. This is available as part of the Seclib NT security library written by Jeremy Allison of @@ -190,7 +193,7 @@ message. The first thing to note is that the "Add" - button will not return a list of users in Samba (it will give + button will not return a list of users in Samba 2.0.4 (it will give an error message of "The remote procedure call failed and did not execute"). This means that you can only manipulate the current user/group/world permissions listed in @@ -230,9 +233,8 @@ Interaction with the standard Samba create mask parameters - There are four parameters - to control interaction with the standard Samba create mask parameters. - These are : + Note that with Samba 2.0.5 there are four new parameters + to control this interaction. These are : security mask force security mode @@ -254,8 +256,9 @@ If not set explicitly this parameter is set to the same value as the create mask - parameter. To allow a user to modify all the - user/group/world permissions on a file, set this parameter + parameter to provide compatibility with Samba 2.0.4 + where this permission change facility was introduced. To allow a user to + modify all the user/group/world permissions on a file, set this parameter to 0777. Next Samba checks the changed permissions for a file against @@ -270,7 +273,8 @@ If not set explicitly this parameter is set to the same value as the force - create mode parameter. + create mode parameter to provide compatibility + with Samba 2.0.4 where the permission change facility was introduced. To allow a user to modify all the user/group/world permissions on a file with no restrictions set this parameter to 000. @@ -289,7 +293,9 @@ by default is set to the same value as the directory mask parameter and the force directory security mode parameter by default is set to the same value as - the force directory mode parameter. + the force directory mode parameter to provide + compatibility with Samba 2.0.4 where the permission change facility + was introduced. In this way Samba enforces the permission restrictions that an administrator can set on a Samba share, whilst still allowing users @@ -305,6 +311,15 @@ force security mode = 0 directory security mask = 0777 force directory security mode = 0 + + As described, in Samba 2.0.4 the parameters : + + create mask + force create mode + directory mask + force directory mode + + were used instead of the parameters discussed here. diff --git a/docs/docbook/projdoc/Other-Clients.sgml b/docs/docbook/projdoc/Other-Clients.sgml index e4d7e341850..6ba04b01d39 100644 --- a/docs/docbook/projdoc/Other-Clients.sgml +++ b/docs/docbook/projdoc/Other-Clients.sgml @@ -339,14 +339,4 @@ create accounts on the Samba host for Domain users. - -Windows NT 3.1 - -If you have problems communicating across routers with Windows -NT 3.1 workstations, read this Microsoft Knowledge Base article. - - - - - diff --git a/docs/docbook/projdoc/PAM-Authentication-And-Samba.sgml b/docs/docbook/projdoc/PAM-Authentication-And-Samba.sgml index 7608f821cf3..adcd059bc2f 100644 --- a/docs/docbook/projdoc/PAM-Authentication-And-Samba.sgml +++ b/docs/docbook/projdoc/PAM-Authentication-And-Samba.sgml @@ -11,6 +11,8 @@ + + (Jun 21 2001) @@ -40,19 +42,6 @@ PAM is configured either through one file /etc/pam.conf (So or by editing individual files that are located in /etc/pam.d. - - - If the PAM authentication module (loadable link library file) is located in the - default location then it is not necessary to specify the path. In the case of - Linux, the default location is /lib/security. If the module - is located other than default then the path may be specified as: - - - eg: "auth required /other_path/pam_strange_module.so" - - - - The following is an example /etc/pam.d/login configuration file. This example had all options been uncommented is probably not usable @@ -62,20 +51,20 @@ by commenting them out except the calls to pam_pwdb.so. - #%PAM-1.0 - # The PAM configuration file for the `login' service - # - auth required pam_securetty.so - auth required pam_nologin.so - # auth required pam_dialup.so - # auth optional pam_mail.so - auth required pam_pwdb.so shadow md5 - # account requisite pam_time.so - account required pam_pwdb.so - session required pam_pwdb.so - # session optional pam_lastlog.so - # password required pam_cracklib.so retry=3 - password required pam_pwdb.so shadow md5 +#%PAM-1.0 +# The PAM configuration file for the `login' service +# +auth required pam_securetty.so +auth required pam_nologin.so +# auth required pam_dialup.so +# auth optional pam_mail.so +auth required pam_pwdb.so shadow md5 +# account requisite pam_time.so +account required pam_pwdb.so +session required pam_pwdb.so +# session optional pam_lastlog.so +# password required pam_cracklib.so retry=3 +password required pam_pwdb.so shadow md5 @@ -84,19 +73,19 @@ sample system include: - $ /bin/ls /lib/security - pam_access.so pam_ftp.so pam_limits.so - pam_ncp_auth.so pam_rhosts_auth.so pam_stress.so - pam_cracklib.so pam_group.so pam_listfile.so - pam_nologin.so pam_rootok.so pam_tally.so - pam_deny.so pam_issue.so pam_mail.so - pam_permit.so pam_securetty.so pam_time.so - pam_dialup.so pam_lastlog.so pam_mkhomedir.so - pam_pwdb.so pam_shells.so pam_unix.so - pam_env.so pam_ldap.so pam_motd.so - pam_radius.so pam_smbpass.so pam_unix_acct.so - pam_wheel.so pam_unix_auth.so pam_unix_passwd.so - pam_userdb.so pam_warn.so pam_unix_session.so +$ /bin/ls /lib/security +pam_access.so pam_ftp.so pam_limits.so +pam_ncp_auth.so pam_rhosts_auth.so pam_stress.so +pam_cracklib.so pam_group.so pam_listfile.so +pam_nologin.so pam_rootok.so pam_tally.so +pam_deny.so pam_issue.so pam_mail.so +pam_permit.so pam_securetty.so pam_time.so +pam_dialup.so pam_lastlog.so pam_mkhomedir.so +pam_pwdb.so pam_shells.so pam_unix.so +pam_env.so pam_ldap.so pam_motd.so +pam_radius.so pam_smbpass.so pam_unix_acct.so +pam_wheel.so pam_unix_auth.so pam_unix_passwd.so +pam_userdb.so pam_warn.so pam_unix_session.so @@ -121,13 +110,13 @@ source distribution. - #%PAM-1.0 - # The PAM configuration file for the `login' service - # - auth required pam_smbpass.so nodelay - account required pam_smbpass.so nodelay - session required pam_smbpass.so nodelay - password required pam_smbpass.so nodelay +#%PAM-1.0 +# The PAM configuration file for the `login' service +# +auth required pam_smbpass.so nodelay +account required pam_smbpass.so nodelay +session required pam_smbpass.so nodelay +password required pam_smbpass.so nodelay @@ -136,13 +125,13 @@ Linux system. The default condition uses pam_pwdb.so. - #%PAM-1.0 - # The PAM configuration file for the `samba' service - # - auth required /lib/security/pam_pwdb.so nullok nodelay shadow audit - account required /lib/security/pam_pwdb.so audit nodelay - session required /lib/security/pam_pwdb.so nodelay - password required /lib/security/pam_pwdb.so shadow md5 +#%PAM-1.0 +# The PAM configuration file for the `samba' service +# +auth required /lib/security/pam_pwdb.so nullok nodelay shadow audit +account required /lib/security/pam_pwdb.so audit nodelay +session required /lib/security/pam_pwdb.so nodelay +password required /lib/security/pam_pwdb.so shadow md5 @@ -154,16 +143,17 @@ program. - #%PAM-1.0 - # The PAM configuration file for the `samba' service - # - auth required /lib/security/pam_smbpass.so nodelay - account required /lib/security/pam_pwdb.so audit nodelay - session required /lib/security/pam_pwdb.so nodelay - password required /lib/security/pam_smbpass.so nodelay smbconf=/etc/samba.d/smb.conf +#%PAM-1.0 +# The PAM configuration file for the `samba' service +# +auth required /lib/security/pam_smbpass.so nodelay +account required /lib/security/pam_pwdb.so audit nodelay +session required /lib/security/pam_pwdb.so nodelay +password required /lib/security/pam_smbpass.so nodelay smbconf=/etc/samba.d/smb.conf -PAM allows stacking of authentication mechanisms. It is + +Note: PAM allows stacking of authentication mechanisms. It is also possible to pass information obtained within one PAM module through to the next module in the PAM stack. Please refer to the documentation for your particular system implementation for details regarding the specific @@ -174,7 +164,7 @@ authentication to be configured in a single central file. The on the basis that it allows for easier administration. As with all issues in life though, every decision makes trade-offs, so you may want examine the PAM documentation for further helpful information. - + @@ -184,9 +174,9 @@ PAM documentation for further helpful information. The astute administrator will realize from this that the combination of pam_smbpass.so, -winbindd, and a distributed -passdb backend, such as ldap, will allow the establishment of a -centrally managed, distributed +winbindd, and rsync (see +http://rsync.samba.org/) +will allow the establishment of a centrally managed, distributed user/password database that can also be used by all PAM (eg: Linux) aware programs and applications. This arrangement can have particularly potent advantages compared with the @@ -206,7 +196,7 @@ The following is from the on-line help for this option in SWAT; -When Samba is configured to enable PAM support (i.e. +When Samba 2.2 is configure to enable PAM support (i.e. --with-pam), this parameter will control whether or not Samba should obey PAM's account and session management directives. The default behavior diff --git a/docs/docbook/projdoc/PolicyMgmt.sgml b/docs/docbook/projdoc/PolicyMgmt.sgml deleted file mode 100644 index 6eb3a09a977..00000000000 --- a/docs/docbook/projdoc/PolicyMgmt.sgml +++ /dev/null @@ -1,261 +0,0 @@ - - - - John HTerpstra - - Samba Team -
- jht@samba.org -
-
-
- April 3 2003 -
-Policy Management - Hows and Whys - - -System Policies - - -Under MS Windows platforms, particularly those following the release of MS Windows -NT4 and MS Windows 95) it is possible to create a type of file that would be placed -in the NETLOGON share of a domain controller. As the client logs onto the network -this file is read and the contents initiate changes to the registry of the client -machine. This file allows changes to be made to those parts of the registry that -affect users, groups of users, or machines. - - - -For MS Windows 9x/Me this file must be called Config.POL and may -be generated using a tool called poledit.exe, better known as the -Policy Editor. The policy editor was provided on the Windows 98 installation CD, but -dissappeared again with the introduction of MS Windows Me (Millenium Edition). From -comments from MS Windows network administrators it would appear that this tool became -a part of the MS Windows Me Resource Kit. - - - -MS Windows NT4 Server products include the System Policy Editor -under the Start->Programs->Administrative Tools menu item. -For MS Windows NT4 and later clients this file must be called NTConfig.POL. - - - -New with the introduction of MS Windows 2000 was the Microsoft Management Console -or MMC. This tool is the new wave in the ever changing landscape of Microsoft -methods for management of network access and security. Every new Microsoft product -or technology seems to obsolete the old rules and to introduce newer and more -complex tools and methods. To Microsoft's credit though, the MMC does appear to -be a step forward, but improved functionality comes at a great price. - - - -Before embarking on the configuration of network and system policies it is highly -advisable to read the documentation available from Microsoft's web site from - -Implementing Profiles and Policies in Windows NT 4.0 available from Microsoft. -There are a large number of documents in addition to this old one that should also -be read and understood. Try searching on the Microsoft web site for "Group Policies". - - - -What follows is a very discussion with some helpful notes. The information provided -here is incomplete - you are warned. - - - -Creating and Managing Windows 9x/Me Policies - - -You need the Win98 Group Policy Editor to set Group Profiles up under Windows 9x/Me. -It can be found on the Original full product Win98 installation CD under -tools/reskit/netadmin/poledit. You install this using the -Add/Remove Programs facility and then click on the 'Have Disk' tab. - - - -Use the Group Policy Editor to create a policy file that specifies the location of -user profiles and/or the My Documents etc. stuff. You then -save these settings in a file called Config.POL that needs to -be placed in the root of the [NETLOGON] share. If your Win98 is configured to log onto -the Samba Domain, it will automatically read this file and update the Win9x/Me registry -of the machine that is logging on. - - - -Further details are covered in the Win98 Resource Kit documentation. - - - -If you do not do it this way, then every so often Win9x/Me will check the -integrity of the registry and will restore it's settings from the back-up -copy of the registry it stores on each Win9x/Me machine. Hence, you will -occasionally notice things changing back to the original settings. - - - -Install the group policy handler for Win9x to pick up group policies. Look on the -Win98 CD in \tools\reskit\netadmin\poledit. -Install group policies on a Win9x client by double-clicking -grouppol.inf. Log off and on again a couple of times and see -if Win98 picks up group policies. Unfortunately this needs to be done on every -Win9x/Me machine that uses group policies. - - - - -Creating and Managing Windows NT4 Style Policy Files - - -To create or edit ntconfig.pol you must use the NT Server -Policy Editor, poledit.exe which is included with NT4 Server -but not NT Workstation. There is a Policy Editor on a NT4 -Workstation but it is not suitable for creating Domain Policies. -Further, although the Windows 95 Policy Editor can be installed on an NT4 -Workstation/Server, it will not work with NT clients. However, the files from -the NT Server will run happily enough on an NT4 Workstation. - - - -You need poledit.exe, common.adm and winnt.adm. -It is convenient to put the two *.adm files in the c:\winnt\inf -directory which is where the binary will look for them unless told otherwise. Note also that that -directory is normally 'hidden'. - - - -The Windows NT policy editor is also included with the Service Pack 3 (and -later) for Windows NT 4.0. Extract the files using servicepackname /x, -i.e. that's Nt4sp6ai.exe /x for service pack 6a. The policy editor, -poledit.exe and the associated template files (*.adm) should -be extracted as well. It is also possible to downloaded the policy template -files for Office97 and get a copy of the policy editor. Another possible -location is with the Zero Administration Kit available for download from Microsoft. - - - -Registry Tattoos - - -With NT4 style registry based policy changes, a large number of settings are not -automatically reversed as the user logs off. Since the settings that were in the -NTConfig.POL file were applied to the client machine registry and that apply to the -hive key HKEY_LOCAL_MACHINE are permanent until explicitly reveresd. This is known -as tattooing. It can have serious consequences down-stream and the administrator must -be extreemly careful not to lock out the ability to manage the machine at a later date. - - - - - - -Creating and Managing MS Windows 200x Policies - - -Windows NT4 System policies allows setting of registry parameters specific to -users, groups and computers (client workstations) that are members of the NT4 -style domain. Such policy file will work with MS Windows 2000 / XP clients also. - - - -New to MS Windows 2000 Microsoft introduced a new style of group policy that confers -a superset of capabilities compared with NT4 style policies. Obviously, the tool used -to create them is different, and the mechanism for implementing them is much changed. - - - -The older NT4 style registry based policies are known as Administrative Templates -in MS Windows 2000/XP Group Policy Objects (GPOs). The later includes ability to set various security -configurations, enforce Internet Explorer browser settings, change and redirect aspects of the -users' desktop (including: the location of My Documents files (directory), as -well as intrinsics of where menu items will appear in the Start menu). An additional new -feature is the ability to make available particular software Windows applications to particular -users and/or groups. - - - -Remember: NT4 policy files are named NTConfig.POL and are stored in the root -of the NETLOGON share on the domain controllers. A Windows NT4 user enters a username, a password -and selects the domain name to which the logon will attempt to take place. During the logon -process the client machine reads the NTConfig.POL file from the NETLOGON share on the authenticating -server, modifies the local registry values according to the settings in this file. - - - -Windows 2K GPOs are very feature rich. They are NOT stored in the NETLOGON share, rather part of -a Windows 200x policy file is stored in the Active Directory itself and the other part is stored -in a shared (and replicated) volume called the SYSVOL folder. This folder is present on all Active -Directory domain controllers. The part that is stored in the Active Directory itself is called the -group policy container (GPC), and the part that is stored in the replicated share called SYSVOL is -known as the group policy template (GPT). - - - -With NT4 clients the policy file is read and executed upon only aas each user log onto the network. -MS Windows 200x policies are much more complex - GPOs are processed and applied at client machine -startup (machine specific part) and when the user logs onto the network the user specific part -is applied. In MS Windows 200x style policy management each machine and/or user may be subject -to any number of concurently applicable (and applied) policy sets (GPOs). Active Directory allows -the administrator to also set filters over the policy settings. No such equivalent capability -exists with NT4 style policy files. - - - -Administration of Win2K Policies - - -Instead of using the tool called "The System Policy Editor", commonly called Poledit (from the -executable name poledit.exe), GPOs are created and managed using a Microsoft Management Console -(MMC) snap-in as follows: - - - - - - Go to the Windows 200x / XP menu Start->Programs->Adminsitrative Tools - and select the MMC snap-in called "Active Directory Users and Computers" - - - - - - Select the domain or organizational unit (OU) that you wish to manage, then right click - to open the context menu for that object, select the properties item. - - - - - - Now left click on the Group Policy tab, then left click on the New tab. Type a name - for the new policy you will create. - - - - - - Now left click on the Edit tab to commence the steps needed to create the GPO. - - - - - -All policy configuration options are controlled through the use of policy administrative -templates. These files have a .adm extension, both in NT4 as well as in Windows 200x / XP. -Beware however, since the .adm files are NOT interchangible across NT4 and Windows 200x. -The later introduces many new features as well as extended definition capabilities. It is -well beyond the scope of this documentation to explain how to program .adm files, for that -the adminsitrator is referred to the Microsoft Windows Resource Kit for your particular -version of MS Windows. - - - - -The MS Windows 2000 Resource Kit contains a tool called gpolmig.exe. This tool can be used -to migrate an NT4 NTConfig.POL file into a Windows 200x style GPO. Be VERY careful how you -use this powerful tool. Please refer to the resource kit manuals for specific usage information. - - - - - -
diff --git a/docs/docbook/projdoc/ProfileMgmt.sgml b/docs/docbook/projdoc/ProfileMgmt.sgml deleted file mode 100644 index ffbc65f7672..00000000000 --- a/docs/docbook/projdoc/ProfileMgmt.sgml +++ /dev/null @@ -1,631 +0,0 @@ - - - - John HTerpstra - - Samba Team -
- jht@samba.org -
-
-
- April 3 2003 -
- -Profile Management - - -Roaming Profiles - - - -NOTE! Roaming profiles support is different for Win9X and WinNT. - - - - -Before discussing how to configure roaming profiles, it is useful to see how -Win9X and WinNT clients implement these features. - - - -Win9X clients send a NetUserGetInfo request to the server to get the user's -profiles location. However, the response does not have room for a separate -profiles location field, only the user's home share. This means that Win9X -profiles are restricted to being in the user's home directory. - - - - -WinNT clients send a NetSAMLogon RPC request, which contains many fields, -including a separate field for the location of the user's profiles. -This means that support for profiles is different for Win9X and WinNT. - - - -Windows NT Configuration - - -To support WinNT clients, in the [global] section of smb.conf set the -following (for example): - - - -logon path = \\profileserver\profileshare\profilepath\%U\moreprofilepath - - - -The default for this option is \\%N\%U\profile, namely -\\sambaserver\username\profile. The \\N%\%U service is created -automatically by the [homes] service. -If you are using a samba server for the profiles, you _must_ make the -share specified in the logon path browseable. - - - - -MS Windows NT/2K clients at times do not disconnect a connection to a server -between logons. It is recommended to NOT use the homes -meta-service name as part of the profile share path. - - - - - - -Windows 9X Configuration - - -To support Win9X clients, you must use the "logon home" parameter. Samba has -now been fixed so that "net use /home" now works as well, and it, too, relies -on the "logon home" parameter. - - - -By using the logon home parameter, you are restricted to putting Win9X -profiles in the user's home directory. But wait! There is a trick you -can use. If you set the following in the [global] section of your -smb.conf file: - - -logon home = \\%L\%U\.profiles - - - -then your Win9X clients will dutifully put their clients in a subdirectory -of your home directory called .profiles (thus making them hidden). - - - -Not only that, but 'net use/home' will also work, because of a feature in -Win9X. It removes any directory stuff off the end of the home directory area -and only uses the server and share portion. That is, it looks like you -specified \\%L\%U for "logon home". - - - - - - -Win9X and WinNT Configuration - - -You can support profiles for both Win9X and WinNT clients by setting both the -"logon home" and "logon path" parameters. For example: - - - -logon home = \\%L\%U\.profiles -logon path = \\%L\profiles\%U - - - - -I have not checked what 'net use /home' does on NT when "logon home" is -set as above. - - - - - -Windows 9X Profile Setup - - -When a user first logs in on Windows 9X, the file user.DAT is created, -as are folders "Start Menu", "Desktop", "Programs" and "Nethood". -These directories and their contents will be merged with the local -versions stored in c:\windows\profiles\username on subsequent logins, -taking the most recent from each. You will need to use the [global] -options "preserve case = yes", "short preserve case = yes" and -"case sensitive = no" in order to maintain capital letters in shortcuts -in any of the profile folders. - - - -The user.DAT file contains all the user's preferences. If you wish to -enforce a set of preferences, rename their user.DAT file to user.MAN, -and deny them write access to this file. - - - - - - On the Windows 95 machine, go to Control Panel | Passwords and - select the User Profiles tab. Select the required level of - roaming preferences. Press OK, but do _not_ allow the computer - to reboot. - - - - - - On the Windows 95 machine, go to Control Panel | Network | - Client for Microsoft Networks | Preferences. Select 'Log on to - NT Domain'. Then, ensure that the Primary Logon is 'Client for - Microsoft Networks'. Press OK, and this time allow the computer - to reboot. - - - - - - -Under Windows 95, Profiles are downloaded from the Primary Logon. -If you have the Primary Logon as 'Client for Novell Networks', then -the profiles and logon script will be downloaded from your Novell -Server. If you have the Primary Logon as 'Windows Logon', then the -profiles will be loaded from the local machine - a bit against the -concept of roaming profiles, if you ask me. - - - -You will now find that the Microsoft Networks Login box contains -[user, password, domain] instead of just [user, password]. Type in -the samba server's domain name (or any other domain known to exist, -but bear in mind that the user will be authenticated against this -domain and profiles downloaded from it, if that domain logon server -supports it), user name and user's password. - - - -Once the user has been successfully validated, the Windows 95 machine -will inform you that 'The user has not logged on before' and asks you -if you wish to save the user's preferences? Select 'yes'. - - - -Once the Windows 95 client comes up with the desktop, you should be able -to examine the contents of the directory specified in the "logon path" -on the samba server and verify that the "Desktop", "Start Menu", -"Programs" and "Nethood" folders have been created. - - - -These folders will be cached locally on the client, and updated when -the user logs off (if you haven't made them read-only by then :-). -You will find that if the user creates further folders or short-cuts, -that the client will merge the profile contents downloaded with the -contents of the profile directory already on the local client, taking -the newest folders and short-cuts from each set. - - - -If you have made the folders / files read-only on the samba server, -then you will get errors from the w95 machine on logon and logout, as -it attempts to merge the local and the remote profile. Basically, if -you have any errors reported by the w95 machine, check the Unix file -permissions and ownership rights on the profile directory contents, -on the samba server. - - - -If you have problems creating user profiles, you can reset the user's -local desktop cache, as shown below. When this user then next logs in, -they will be told that they are logging in "for the first time". - - - - - - instead of logging in under the [user, password, domain] dialog, - press escape. - - - - - run the regedit.exe program, and look in: - - - - HKEY_LOCAL_MACHINE\Windows\CurrentVersion\ProfileList - - - - you will find an entry, for each user, of ProfilePath. Note the - contents of this key (likely to be c:\windows\profiles\username), - then delete the key ProfilePath for the required user. - - - - [Exit the registry editor]. - - - - - - WARNING - before deleting the contents of the - directory listed in - the ProfilePath (this is likely to be c:\windows\profiles\username), - ask them if they have any important files stored on their desktop - or in their start menu. delete the contents of the directory - ProfilePath (making a backup if any of the files are needed). - - - - This will have the effect of removing the local (read-only hidden - system file) user.DAT in their profile directory, as well as the - local "desktop", "nethood", "start menu" and "programs" folders. - - - - - - search for the user's .PWL password-caching file in the c:\windows - directory, and delete it. - - - - - - - log off the windows 95 client. - - - - - - check the contents of the profile path (see "logon path" described - above), and delete the user.DAT or user.MAN file for the user, - making a backup if required. - - - - - - -If all else fails, increase samba's debug log levels to between 3 and 10, -and / or run a packet trace program such as tcpdump or netmon.exe, and -look for any error reports. - - - -If you have access to an NT server, then first set up roaming profiles -and / or netlogons on the NT server. Make a packet trace, or examine -the example packet traces provided with NT server, and see what the -differences are with the equivalent samba trace. - - - - - -Windows NT Workstation 4.0 - - -When a user first logs in to a Windows NT Workstation, the profile -NTuser.DAT is created. The profile location can be now specified -through the "logon path" parameter. - - - -There is a parameter that is now available for use with NT Profiles: -"logon drive". This should be set to "h:" or any other drive, and -should be used in conjunction with the new "logon home" parameter. - - - -The entry for the NT 4.0 profile is a _directory_ not a file. The NT -help on profiles mentions that a directory is also created with a .PDS -extension. The user, while logging in, must have write permission to -create the full profile path (and the folder with the .PDS extension -for those situations where it might be created.) - - - -In the profile directory, NT creates more folders than 95. It creates -"Application Data" and others, as well as "Desktop", "Nethood", -"Start Menu" and "Programs". The profile itself is stored in a file -NTuser.DAT. Nothing appears to be stored in the .PDS directory, and -its purpose is currently unknown. - - - -You can use the System Control Panel to copy a local profile onto -a samba server (see NT Help on profiles: it is also capable of firing -up the correct location in the System Control Panel for you). The -NT Help file also mentions that renaming NTuser.DAT to NTuser.MAN -turns a profile into a mandatory one. - - - -The case of the profile is significant. The file must be called -NTuser.DAT or, for a mandatory profile, NTuser.MAN. - - - - - -Windows NT/200x Server - - -There is nothing to stop you specifying any path that you like for the -location of users' profiles. Therefore, you could specify that the -profile be stored on a samba server, or any other SMB server, as long as -that SMB server supports encrypted passwords. - - - - - -Sharing Profiles between W9x/Me and NT4/200x/XP workstations - - -Sharing of desktop profiles between Windows versions is NOT recommended. -Desktop profiles are an evolving phenomenon and profiles for later versions -of MS Windows clients add features that may interfere with earlier versions -of MS Windows clients. Probably the more salient reason to NOT mix profiles -is that when logging off an earlier version of MS Windows the older format -of profile contents may overwrite information that belongs to the newer -version resulting in loss of profile information content when that user logs -on again with the newer version of MS Windows. - - - -If you then want to share the same Start Menu / Desktop with W9x/Me, you will -need to specify a common location for the profiles. The smb.conf parameters -that need to be common are logon path and -logon home. - - - -If you have this set up correctly, you will find separate user.DAT and -NTuser.DAT files in the same profile directory. - - - - - - -Windows NT 4 - - -Unfortunately, the Resource Kit info is Win NT4 or 200x specific. - - - -Here is a quick guide: - - - - - -On your NT4 Domain Controller, right click on 'My Computer', then -select the tab labelled 'User Profiles'. - - - -Select a user profile you want to migrate and click on it. - - -I am using the term "migrate" lossely. You can copy a profile to -create a group profile. You can give the user 'Everyone' rights to the -profile you copy this to. That is what you need to do, since your samba -domain is not a member of a trust relationship with your NT4 PDC. - - -Click the 'Copy To' button. - -In the box labelled 'Copy Profile to' add your new path, eg: -c:\temp\foobar - -Click on the button labelled 'Change' in the "Permitted to use" box. - -Click on the group 'Everyone' and then click OK. This closes the -'chose user' box. - -Now click OK. - - - -Follow the above for every profile you need to migrate. - - - -Side bar Notes - - -You should obtain the SID of your NT4 domain. You can use smbpasswd to do -this. Read the man page. - - -With Samba-3.0.0 alpha code you can import all you NT4 domain accounts -using the net samsync method. This way you can retain your profile -settings as well as all your users. - - - - - -Mandatory profiles - - -The above method can be used to create mandatory profiles also. To convert -a group profile into a mandatory profile simply locate the NTUser.DAT file -in the copied profile and rename it to NTUser.MAN. - - - - - -moveuser.exe - - -The W2K professional resource kit has moveuser.exe. moveuser.exe changes -the security of a profile from one user to another. This allows the account -domain to change, and/or the user name to change. - - - - - -Get SID - - -You can identify the SID by using GetSID.exe from the Windows NT Server 4.0 -Resource Kit. - - - -Windows NT 4.0 stores the local profile information in the registry under -the following key: -HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList - - - -Under the ProfileList key, there will be subkeys named with the SIDs of the -users who have logged on to this computer. (To find the profile information -for the user whose locally cached profile you want to move, find the SID for -the user with the GetSID.exe utility.) Inside of the appropriate user's -subkey, you will see a string value named ProfileImagePath. - - - - - - - -Windows 2000/XP - - -You must first convert the profile from a local profile to a domain -profile on the MS Windows workstation as follows: - - - - -Log on as the LOCAL workstation administrator. - - - -Right click on the 'My Computer' Icon, select 'Properties' - - - -Click on the 'User Profiles' tab - - - -Select the profile you wish to convert (click on it once) - - - -Click on the button 'Copy To' - - - -In the "Permitted to use" box, click on the 'Change' button. - - - -Click on the 'Look in" area that lists the machine name, when you click -here it will open up a selection box. Click on the domain to which the -profile must be accessible. - - - -You will need to log on if a logon box opens up. Eg: In the connect -as: MIDEARTH\root, password: mypassword. - - - -To make the profile capable of being used by anyone select 'Everyone' - - - -Click OK. The Selection box will close. - - - -Now click on the 'Ok' button to create the profile in the path you -nominated. - - - - -Done. You now have a profile that can be editted using the samba-3.0.0 -profiles tool. - - - - -Under NT/2K the use of mandotory profiles forces the use of MS Exchange -storage of mail data. That keeps desktop profiles usable. - - - - - - -This is a security check new to Windows XP (or maybe only -Windows XP service pack 1). It can be disabled via a group policy in -Active Directory. The policy is: - -"Computer Configuration\Administrative Templates\System\User -Profiles\Do not check for user ownership of Roaming Profile Folders" - -...and it should be set to "Enabled". -Does the new version of samba have an Active Directory analogue? If so, -then you may be able to set the policy through this. - - - -If you cannot set group policies in samba, then you may be able to set -the policy locally on each machine. If you want to try this, then do -the following (N.B. I don't know for sure that this will work in the -same way as a domain group policy): - - - - - -On the XP workstation log in with an Administrator account. - - -Click: "Start", "Run" -Type: "mmc" -Click: "OK" - -A Microsoft Management Console should appear. -Click: File, "Add/Remove Snap-in...", "Add" -Double-Click: "Group Policy" -Click: "Finish", "Close" -Click: "OK" - -In the "Console Root" window: -Expand: "Local Computer Policy", "Computer Configuration", -"Administrative Templates", "System", "User Profiles" -Double-Click: "Do not check for user ownership of Roaming Profile -Folders" -Select: "Enabled" -Click: OK" - -Close the whole console. You do not need to save the settings (this -refers to the console settings rather than the policies you have -changed). - -Reboot - - - - - -
diff --git a/docs/docbook/projdoc/Samba-BDC-HOWTO.sgml b/docs/docbook/projdoc/Samba-BDC-HOWTO.sgml index 46e69e4ba9f..e3bee32db01 100644 --- a/docs/docbook/projdoc/Samba-BDC-HOWTO.sgml +++ b/docs/docbook/projdoc/Samba-BDC-HOWTO.sgml @@ -13,7 +13,7 @@ -Samba Backup Domain Controller to Samba Domain Control +How to Act as a Backup Domain Controller in a Purely Samba Controlled Domain diff --git a/docs/docbook/projdoc/Samba-PDC-HOWTO.sgml b/docs/docbook/projdoc/Samba-PDC-HOWTO.sgml index 7aabca948f2..53dae21775a 100644 --- a/docs/docbook/projdoc/Samba-PDC-HOWTO.sgml +++ b/docs/docbook/projdoc/Samba-PDC-HOWTO.sgml @@ -68,33 +68,27 @@ PDC functionality. - Domain logons for Windows NT 4.0 / 200x / XP Professional clients. + domain logons for Windows NT 4.0 / 200x / XP Professional clients. - Placing Windows 9x / Me clients in user level security + placing Windows 9x / Me clients in user level security - Retrieving a list of users and groups from a Samba PDC to + retrieving a list of users and groups from a Samba PDC to Windows 9x / Me / NT / 200x / XP Professional clients - Roaming Profiles + roaming user profiles - Network/System Policies + Windows NT 4.0-style system policies - - -Roaming Profiles and System/Network policies are advanced network administration topics -that are covered separately in this document. - - The following functionalities are new to the Samba 3.0 release: @@ -593,17 +587,18 @@ version of Windows. I joined the domain successfully but after upgrading to a newer version of the Samba code I get the message, "The system - can not log you on (C000019B), Please try again or consult your + can not log you on (C000019B), Please try a gain or consult your system administrator" when attempting to logon. - This occurs when the domain SID stored in the secrets.tdb database - is changed. The most common cause of a change in domain SID is when - the domain name and/or the server name (netbios name) is changed. - The only way to correct the problem is to restore the original domain - SID or remove the domain client from the domain and rejoin. The domain - SID may be reset using either the smbpasswd or rpcclient utilities. + This occurs when the domain SID stored in + private/WORKGROUP.SID is + changed. For example, you remove the file and smbd automatically + creates a new one. Or you are swapping back and forth between + versions 2.0.7, TNG and the HEAD branch code (not recommended). The + only way to correct the problem is to restore the original domain + SID or remove the domain client from the domain and rejoin. @@ -680,6 +675,128 @@ version of Windows. + + + + + + +System Policies and Profiles + + + +Much of the information necessary to implement System Policies and +Roving User Profiles in a Samba domain is the same as that for +implementing these same items in a Windows NT 4.0 domain. +You should read the white paper Implementing +Profiles and Policies in Windows NT 4.0 available from Microsoft. + + + +Here are some additional details: + + + + + + + What about Windows NT Policy Editor? + + + + To create or edit ntconfig.pol you must use + the NT Server Policy Editor, poledit.exe which + is included with NT Server but not NT Workstation. + There is a Policy Editor on a NTws + but it is not suitable for creating Domain Policies. + Further, although the Windows 95 + Policy Editor can be installed on an NT Workstation/Server, it will not + work with NT policies because the registry key that are set by the policy templates. + However, the files from the NT Server will run happily enough on an NTws. + You need poledit.exe, common.adm and winnt.adm. It is convenient + to put the two *.adm files in c:\winnt\inf which is where + the binary will look for them unless told otherwise. Note also that that + directory is 'hidden'. + + + + The Windows NT policy editor is also included with the Service Pack 3 (and + later) for Windows NT 4.0. Extract the files using servicepackname /x, + i.e. that's Nt4sp6ai.exe /x for service pack 6a. The policy editor, + poledit.exe and the associated template files (*.adm) should + be extracted as well. It is also possible to downloaded the policy template + files for Office97 and get a copy of the policy editor. Another possible + location is with the Zero Administration Kit available for download from Microsoft. + + + + + + + Can Win95 do Policies? + + + + Install the group policy handler for Win9x to pick up group + policies. Look on the Win98 CD in \tools\reskit\netadmin\poledit. + Install group policies on a Win9x client by double-clicking + grouppol.inf. Log off and on again a couple of + times and see if Win98 picks up group policies. Unfortunately this needs + to be done on every Win9x machine that uses group policies.... + + + + If group policies don't work one reports suggests getting the updated + (read: working) grouppol.dll for Windows 9x. The group list is grabbed + from /etc/group. + + + + + + + How do I get 'User Manager' and 'Server Manager' + + + + Since I don't need to buy an NT Server CD now, how do I get + the 'User Manager for Domains', the 'Server Manager'? + + + + Microsoft distributes a version of these tools called nexus for + installation on Windows 95 systems. The tools set includes + + + + Server Manager + + User Manager for Domains + + Event Viewer + + + + Click here to download the archived file ftp://ftp.microsoft.com/Softlib/MSLFILES/NEXUS.EXE + + + + The Windows NT 4.0 version of the 'User Manager for + Domains' and 'Server Manager' are available from Microsoft via ftp + from ftp://ftp.microsoft.com/Softlib/MSLFILES/SRVTOOLS.EXE + + + + + + + + + + + +DOMAIN_CONTROL.txt : Windows NT Domain Control & Samba + + + + Possibly Outdated Material + + + This appendix was originally authored by John H Terpstra of + the Samba Team and is included here for posterity. + + + + + +NOTE : +The term "Domain Controller" and those related to it refer to one specific +method of authentication that can underly an SMB domain. Domain Controllers +prior to Windows NT Server 3.1 were sold by various companies and based on +private extensions to the LAN Manager 2.1 protocol. Windows NT introduced +Microsoft-specific ways of distributing the user authentication database. +See DOMAIN.txt for examples of how Samba can participate in or create +SMB domains based on shared authentication database schemes other than the +Windows NT SAM. + + + +Windows NT Server can be installed as either a plain file and print server +(WORKGROUP workstation or server) or as a server that participates in Domain +Control (DOMAIN member, Primary Domain controller or Backup Domain controller). +The same is true for OS/2 Warp Server, Digital Pathworks and other similar +products, all of which can participate in Domain Control along with Windows NT. + + + +To many people these terms can be confusing, so let's try to clear the air. + + + +Every Windows NT system (workstation or server) has a registry database. +The registry contains entries that describe the initialization information +for all services (the equivalent of Unix Daemons) that run within the Windows +NT environment. The registry also contains entries that tell application +software where to find dynamically loadable libraries that they depend upon. +In fact, the registry contains entries that describes everything that anything +may need to know to interact with the rest of the system. + + + +The registry files can be located on any Windows NT machine by opening a +command prompt and typing: + + + +C:\WINNT\> dir %SystemRoot%\System32\config + + + +The environment variable %SystemRoot% value can be obtained by typing: + + + +C:\WINNT>echo %SystemRoot% + + + +The active parts of the registry that you may want to be familiar with are +the files called: default, system, software, sam and security. + + + +In a domain environment, Microsoft Windows NT domain controllers participate +in replication of the SAM and SECURITY files so that all controllers within +the domain have an exactly identical copy of each. + + + +The Microsoft Windows NT system is structured within a security model that +says that all applications and services must authenticate themselves before +they can obtain permission from the security manager to do what they set out +to do. + + + +The Windows NT User database also resides within the registry. This part of +the registry contains the user's security identifier, home directory, group +memberships, desktop profile, and so on. + + + +Every Windows NT system (workstation as well as server) will have its own +registry. Windows NT Servers that participate in Domain Security control +have a database that they share in common - thus they do NOT own an +independent full registry database of their own, as do Workstations and +plain Servers. + + + +The User database is called the SAM (Security Access Manager) database and +is used for all user authentication as well as for authentication of inter- +process authentication (i.e. to ensure that the service action a user has +requested is permitted within the limits of that user's privileges). + + + +The Samba team have produced a utility that can dump the Windows NT SAM into +smbpasswd format: see ENCRYPTION.txt for information on smbpasswd and +/pub/samba/pwdump on your nearest Samba mirror for the utility. This +facility is useful but cannot be easily used to implement SAM replication +to Samba systems. + + + +Windows for Workgroups, Windows 95, and Windows NT Workstations and Servers +can participate in a Domain security system that is controlled by Windows NT +servers that have been correctly configured. Almost every domain will have +ONE Primary Domain Controller (PDC). It is desirable that each domain will +have at least one Backup Domain Controller (BDC). + + + +The PDC and BDCs then participate in replication of the SAM database so that +each Domain Controlling participant will have an up to date SAM component +within its registry. + + + + diff --git a/docs/docbook/projdoc/ServerType.sgml b/docs/docbook/projdoc/ServerType.sgml index 91478740d6d..41b1c0ed2f7 100644 --- a/docs/docbook/projdoc/ServerType.sgml +++ b/docs/docbook/projdoc/ServerType.sgml @@ -44,13 +44,6 @@ discussions regarding "security mode". The smb.conf configuration parameters that control security mode are: "security = user" and "security = share".
- -No special action is needed other than to create user accounts. Stand-alone -servers do NOT provide network logon services, meaning that machines that -use this server do NOT perform a domain logon but instead make use only of -the MS Windows logon which is local to the MS Windows workstation/server. - - Samba tends to blur the distinction a little in respect of what is a stand alone server. This is because the authentication database may be diff --git a/docs/docbook/projdoc/passdb.sgml b/docs/docbook/projdoc/passdb.sgml index 8e7a409167e..fa2d75bd342 100644 --- a/docs/docbook/projdoc/passdb.sgml +++ b/docs/docbook/projdoc/passdb.sgml @@ -830,6 +830,18 @@ ntPassword: 878D8014606CDA29677A44EFA1353FC7 MySQL + +Building + +To build the plugin, run make bin/pdb_mysql.so +in the source/ directory of samba distribution. + + +Next, copy pdb_mysql.so to any location you want. I +strongly recommend installing it in $PREFIX/lib or /usr/lib/samba/ + + + Creating the database @@ -850,7 +862,7 @@ contains the correct queries to create the required tables. Use the command : Add a the following to the passdb backend variable in your smb.conf: -passdb backend = [other-plugins] mysql:identifier [other-plugins] +passdb backend = [other-plugins] plugin:/location/to/pdb_mysql.so:identifier [other-plugins] @@ -966,23 +978,35 @@ Or, set 'identifier:workstations column' to : -XML +Passdb XML plugin + + +Building This module requires libxml2 to be installed. +To build pdb_xml, run: make bin/pdb_xml.so in +the directory source/. + + + + +Usage + The usage of pdb_xml is pretty straightforward. To export data, use: -pdbedit -e xml:filename +pdbedit -e plugin:/usr/lib/samba/pdb_xml.so:filename (where filename is the name of the file to put the data in) To import data, use: -pdbedit -i xml:filename -e current-pdb +pdbedit -i plugin:/usr/lib/samba/pdb_xml.so:filename -e current-pdb Where filename is the name to read the data from and current-pdb to put it in. + diff --git a/docs/docbook/projdoc/samba-doc.sgml b/docs/docbook/projdoc/samba-doc.sgml index db421bc6907..1a2e2855967 100644 --- a/docs/docbook/projdoc/samba-doc.sgml +++ b/docs/docbook/projdoc/samba-doc.sgml @@ -22,13 +22,11 @@ + - - - ]> @@ -104,32 +102,30 @@ for various environments. -Advanced Configuration +Optional configuration Introduction Samba has several features that you might want or might not want to use. The chapters in this part each cover one specific feature. -&AdvancedNetworkAdmin; +&IntegratingWithWindows; &NT-Security; -&GROUP-MAPPING-HOWTO; &Samba-PAM; +&MS-Dfs-Setup; &PRINTER-DRIVER2; &CUPS; &WINBIND; -&PolicyMgmt; -&ProfileMgmt; -&IntegratingWithWindows; &BROWSING; -&MS-Dfs-Setup; &VFS; +&GROUP-MAPPING-HOWTO; +&SPEED; +&GroupProfiles; &SecuringSamba; &unicode; Appendixes -&SPEED; &Portability; &Other-Clients; &Compiling; @@ -137,4 +133,4 @@ part each cover one specific feature. &Diagnosis; - + diff --git a/docs/docbook/projdoc/security_level.sgml b/docs/docbook/projdoc/security_level.sgml index e3d7c6ac1fb..00dcc6e83b6 100644 --- a/docs/docbook/projdoc/security_level.sgml +++ b/docs/docbook/projdoc/security_level.sgml @@ -8,15 +8,8 @@ -Samba as Stand-Alone Server -In this section the function and purpose of Samba's security -modes are described. - - - -User and Share security level +Samba as Stand-Alone server (User and Share security level) A SMB server tells the client at startup what "security level" it is @@ -30,9 +23,6 @@ can only tell the client what is available and whether an action is allowed. - -User Level Security - I'll describe user level security first, as its simpler. In user level security the client will send a "session setup" command directly after @@ -63,11 +53,6 @@ maintain multiple authentication contexts in this way (WinDD is an example of an application that does this) - - - -Share Level Security - Ok, now for share level security. In share level security the client authenticates itself separately for each share. It will send a @@ -94,11 +79,6 @@ usernames". If a match is found then the client is authenticated as that user. - - - -Server Level Security - Finally "server level" security. In server level security the samba server reports to the client that it is in user level security. The @@ -133,204 +113,4 @@ That real authentication server can be another Samba server or can be a Windows NT server, the later natively capable of encrypted password support. - -Configuring Samba for Seemless Windows Network Integration - - -MS Windows clients may use encrypted passwords as part of a challenege/response -authentication model (a.k.a. NTLMv1) or alone, or clear text strings for simple -password based authentication. It should be realized that with the SMB protocol -the password is passed over the network either in plain text or encrypted, but -not both in the same authentication requests. - - - -When encrypted passwords are used a password that has been entered by the user -is encrypted in two ways: - - - - An MD4 hash of the UNICODE of the password - string. This is known as the NT hash. - - - The password is converted to upper case, - and then padded or trucated to 14 bytes. This string is - then appended with 5 bytes of NULL characters and split to - form two 56 bit DES keys to encrypt a "magic" 8 byte value. - The resulting 16 bytes for the LanMan hash. - - - - -MS Windows 95 pre-service pack 1, MS Windows NT versions 3.x and version 4.0 -pre-service pack 3 will use either mode of password authentication. All -versions of MS Windows that follow these versions no longer support plain -text passwords by default. - - - -MS Windows clients have a habit of dropping network mappings that have been idle -for 10 minutes or longer. When the user attempts to use the mapped drive -connection that has been dropped, the client re-establishes the connection using -a cached copy of the password. - - - -When Microsoft changed the default password mode, support was dropped for caching -of the plain text password. This means that when the registry parameter is changed -to re-enable use of plain text passwords it appears to work, but when a dropped -service connection mapping attempts to revalidate it will fail if the remote -authentication server does not support encrypted passwords. This means that it -is definitely not a good idea to re-enable plain text password support in such clients. - - - -The following parameters can be used to work around the issue of Windows 9x client -upper casing usernames and password before transmitting them to the SMB server -when using clear text authentication. - - - - passsword level = integer - username level = integer - - - -By default Samba will lower case the username before attempting to lookup the user -in the database of local system accounts. Because UNIX usernames conventionally -only contain lower case character, the username level parameter -is rarely needed. - - - -However, passwords on UNIX systems often make use of mixed case characters. -This means that in order for a user on a Windows 9x client to connect to a Samba -server using clear text authentication, the password level -must be set to the maximum number of upper case letter which could -appear is a password. Note that is the server OS uses the traditional DES version -of crypt(), then a password level of 8 will result in case -insensitive passwords as seen from Windows users. This will also result in longer -login times as Samba hash to compute the permutations of the password string and -try them one by one until a match is located (or all combinations fail). - - - -The best option to adopt is to enable support for encrypted passwords -where ever Samba is used. There are three configuration possibilities -for support of encrypted passwords: - - - - -Use MS Windows NT as an authentication server - - -This method involves the additions of the following parameters in the smb.conf file: - - - - encrypt passwords = Yes - security = server - password server = "NetBIOS_name_of_PDC" - - - - -There are two ways of identifying whether or not a username and -password pair was valid or not. One uses the reply information provided -as part of the authentication messaging process, the other uses -just and error code. - - - -The down-side of this mode of configuration is the fact that -for security reasons Samba will send the password server a bogus -username and a bogus password and if the remote server fails to -reject the username and password pair then an alternative mode -of identification of validation is used. Where a site uses password -lock out after a certain number of failed authentication attempts -this will result in user lockouts. - - - -Use of this mode of authentication does require there to be -a standard Unix account for the user, this account can be blocked -to prevent logons by other than MS Windows clients. - - - - - - -Domain Level Security - - -When samba is operating in security = domain mode this means that -the Samba server has a domain security trust account (a machine account) and will cause -all authentication requests to be passed through to the domain controllers. - - - -Samba as a member of an MS Windows NT security domain - - -This method involves additon of the following paramters in the smb.conf file: - - - - encrypt passwords = Yes - security = domain - workgroup = "name of NT domain" - password server = * - - - -The use of the "*" argument to "password server" will cause samba to locate the -domain controller in a way analogous to the way this is done within MS Windows NT. -This is the default behaviour. - - - -In order for this method to work the Samba server needs to join the -MS Windows NT security domain. This is done as follows: - - - - On the MS Windows NT domain controller using - the Server Manager add a machine account for the Samba server. - - - Next, on the Linux system execute: - smbpasswd -r PDC_NAME -j DOMAIN_NAME - - - - -Use of this mode of authentication does require there to be a standard Unix account -for the user in order to assign a uid once the account has been authenticated by -the remote Windows DC. This account can be blocked to prevent logons by other than -MS Windows clients by things such as setting an invalid shell in the -/etc/passwd entry. - - - -An alternative to assigning UIDs to Windows users on a Samba member server is -presented in the Winbind Overview chapter -in this HOWTO collection. - - - - - - -ADS Level Security - - -For information about the configuration option please refer to the entire section entitled -Samba as an ADS Domain Member. - - - - diff --git a/docs/docbook/projdoc/upgrading-to-3.0.sgml b/docs/docbook/projdoc/upgrading-to-3.0.sgml index cd0ec2064d5..f227556151d 100644 --- a/docs/docbook/projdoc/upgrading-to-3.0.sgml +++ b/docs/docbook/projdoc/upgrading-to-3.0.sgml @@ -24,12 +24,16 @@ In 3.0, the following configuration options have been removed. -printer driver (replaced by new driver procedures) -printer driver file (replaced by new driver procedures) -printer driver location (replaced by new driver procedures) +printer driver +printer driver file +printer driver location use rhosts postscript -client code page (replaced by dos charset) + +The first three options have been replaced by new driver procedures. +Please read the printing documentation. + + diff --git a/docs/docbook/smbdotconf/.cvsignore b/docs/docbook/smbdotconf/.cvsignore deleted file mode 100644 index 0f8c6cb0ed3..00000000000 --- a/docs/docbook/smbdotconf/.cvsignore +++ /dev/null @@ -1,4 +0,0 @@ -parameters.all.xml -parameters.global.xml -parameters.service.xml - diff --git a/docs/docbook/smbdotconf/README b/docs/docbook/smbdotconf/README deleted file mode 100644 index e69d30af5fd..00000000000 --- a/docs/docbook/smbdotconf/README +++ /dev/null @@ -1,159 +0,0 @@ -DocBook XML 4.2 source code for smb.conf(5) documentation for Samba 3.0 - -Author of the document: Alexander Bokovoy - -Welcome to new smb.conf(5) documentation build system! This directory -contains a new incarnation of Samba's smb.conf(5) Docbook XML 4.2 -sources. Note that the output might be unsatisfying untill all smb.conf(5) -parameters will converted to new format (see Chapter 4 for details). - -Content -------- - -0. Prerequisites -1. Structure -2. XSLT stylesheets -3. Usage -4. Current status of converted parameters - -Prerequisites -------------- - -In order to compile smb.conf(5) documentation from Docbook XML 4.2 -sources you'll need: - - - a working libxml2 and libxslt installation, together with xsltproc utility - - - a locally installed Docbook XSL 4.2 or higher - - - a working xmlcatalog to eliminate Web access for Docbook XSL - -The latter requisite is important: we do not specify local copies of -Docbook XSL stylesheets in our XSLTs because of real nightmare in their -location in most distributions. Fortunately, libxml2 provides standard -way to access locally installed external resources via so-called -'xmlcatalog' tool. It is working in RedHat, Mandrake, ALT Linux, and -some other distributions but wasn't at the moment of this writting (Late -March'03) in Debian. - -Structure ---------- - -smb.conf(5) sources consist of a number of XML files distributed across -a number of subdirectories. Each subdirectory represents a group of -smb.conf(5) parameters dedicated to one specific task as described in -Samba's loadparm.c source file (and shown in SWAT). - -Each XML file in subdirectories represents one parameter description, -together with some additional meta-information about it. Complete list -of meta-information attributes - -attribute description -------------------------------------------------------------------- -name smb.conf(5) parameter name -context G for global, S for services -basic set to 1 if loadparm.c's description -wizard includes appropriate flag for -advanced this parameter (FLAG_BASIC, -developer FLAG_ADVANCED, FLAG_WIZARD, FLAG_DEVELOPER) -------------------------------------------------------------------- - -Main XML file for smb.conf(5) is smb.conf.5.xml. It contains a general -stub for man page and several XML instructions to include: - - - a list of global parameters (auto-generated); - - - a list of service parameters (auto-generated); - - - a complete list of alphabetically sorted parameters (auto-generated). - -XSLT stylesheets ----------------- - -In order to combine and build final version of smb.conf(5) we apply a -set of XSLT stylesheets to smb.conf(5) sources. Following is the -complete description of existing stylesheets in smb.conf(5) source tree: - -1. [expand-smb.conf.xsl] Main driver, produces big XML source with all -smaller components combined. The resulted tree is then feed to Docbook -XSL for final producing. - -This stylesheet performs two main transformations: - - - Replaces tag by one; - - - Generates and tags for each . - -The latter step needs some explanation. We generate automatically - and tags based on meta-information about parameter. This -way all anchors have predictable names (capitalized parameter name with -all spaces supressed) and we really don't need to dublicate data. - -There was only one exception to the generation rule in smb.conf.5.sgml: -"use spnego" parameter had anchor SPNEGO which is now unified to -USESPNEGO. This also fixes a bug in SWAT which was unable to find SPNEGO -achnor. - -2. [generate-context.xsl] An utility stylesheet which main purpose is to -produce a list of parameters which are applicable for selected context -(global or service). - -The generate-context.xsl is run twice to generate both -parameters.global.xml and parameters.service.xml which are included then -by smb.conf.5.xml. This stylesheet relies on parameters.all.xml file -which is generated by [generate-file-list.sh] shell script. - -The parameters.all.xml file contains a complete list of include -instructions for XSLT processor to include all small XML files from -subdirectories. - -3. [man.xsl] Our local copy of Docbook XML to man(5) transformer. It -fixes some annoying errors in official Docbook XSL stylesheets and adds -our tuned parameters. This file really belongs to upper level where it -would occur later, as we'll move to Docbook XML completely. - -4. [split-original-smb.conf.xsl] This stylesheet isn't required anymore. -It was used for initial split of SGML-based smb.conf.5.sgml onto a set -of per-parameter XML files. I left it in source tree just for historical -interest. :) - -Usage ------ - -1. Generate [parameters.all.xml]: - sh generate-file-list.sh >parameters.all.xml - -2. Generate [parameters.global.xml]: - xsltproc --xinclude \ - --param smb.context "'G'" \ - --output parameters.global.xml \ - generate-context.xsl parameters.all.xml - -3. Generate [parameters.service.xml]: - xsltproc --xinclude \ - --param smb.context "'S'" \ - --output parameters.service.xml \ - generate-context.xsl parameters.all.xml - -4. Process smb.conf.5.xml (for example, to HTML): - xsltproc --xinclude expand-smb.conf.xsl smb.conf.5.xml | \ - xsltproc http://docbook.sourceforge.net/release/xsl/current/html/docbook.xsl - > smb.conf.5.html - -Note that in step 4 we are not saving preprocessed smb.conf.5.xml to -disk and directly passing it to the next XSLT processor (in this case -- -Docbook XML to HTML generator). - -For convenience, this sequence of commands is added into source tree as -process-all.sh - -Current state of converted parameters -------------------------------------- - -Only 'base' parameters converted so far to serve as example of -formatting. - -All undocumented parameters are listed in doc-status file in of Samba's -docs/ directory. - -Any help is greatly appreciated. - diff --git a/docs/docbook/smbdotconf/browse/browsable.xml b/docs/docbook/smbdotconf/browse/browsable.xml deleted file mode 100644 index 779571cff20..00000000000 --- a/docs/docbook/smbdotconf/browse/browsable.xml +++ /dev/null @@ -1,5 +0,0 @@ - - browsable (S) - See the - browseable. - diff --git a/docs/docbook/smbdotconf/browse/browseable.xml b/docs/docbook/smbdotconf/browse/browseable.xml deleted file mode 100644 index c223d6c7d7f..00000000000 --- a/docs/docbook/smbdotconf/browse/browseable.xml +++ /dev/null @@ -1,8 +0,0 @@ - - browseable (S) - This controls whether this share is seen in - the list of available shares in a net view and in the browse list. - - Default: browseable = yes - - diff --git a/docs/docbook/smbdotconf/browse/browselist.xml b/docs/docbook/smbdotconf/browse/browselist.xml deleted file mode 100644 index f15e2caf2ac..00000000000 --- a/docs/docbook/smbdotconf/browse/browselist.xml +++ /dev/null @@ -1,10 +0,0 @@ - - browse list (G) - This controls whether smbd - 8 will serve a browse list to - a client doing a NetServerEnum call. Normally - set to yes. You should never need to change - this. - - Default: browse list = yes - diff --git a/docs/docbook/smbdotconf/browse/domainmaster.xml b/docs/docbook/smbdotconf/browse/domainmaster.xml deleted file mode 100644 index cf2d504e4d8..00000000000 --- a/docs/docbook/smbdotconf/browse/domainmaster.xml +++ /dev/null @@ -1,34 +0,0 @@ - - domain master (G) - Tell smbd - 8 to enable WAN-wide browse list - collation. Setting this option causes nmbd to - claim a special domain specific NetBIOS name that identifies - it as a domain master browser for its given - workgroup. Local master browsers - in the same workgroup on broadcast-isolated - subnets will give this nmbd their local browse lists, - and then ask smbd - 8 for a complete copy of the browse - list for the whole wide area network. Browser clients will then contact - their local master browser, and will receive the domain-wide browse list, - instead of just the list for their broadcast-isolated subnet. - - Note that Windows NT Primary Domain Controllers expect to be - able to claim this workgroup specific special - NetBIOS name that identifies them as domain master browsers for - that workgroup by default (i.e. there is no - way to prevent a Windows NT PDC from attempting to do this). This - means that if this parameter is set and nmbd claims - the special name for a workgroup before a Windows - NT PDC is able to do so then cross subnet browsing will behave - strangely and may fail. - - If domain logons = yes - , then the default behavior is to enable the domain - master parameter. If domain logons is - not enabled (the default setting), then neither will domain - master be enabled by default. - - Default: domain master = auto - diff --git a/docs/docbook/smbdotconf/browse/enhancedbrowsing.xml b/docs/docbook/smbdotconf/browse/enhancedbrowsing.xml deleted file mode 100644 index cf8d3e54b99..00000000000 --- a/docs/docbook/smbdotconf/browse/enhancedbrowsing.xml +++ /dev/null @@ -1,24 +0,0 @@ - - enhanced browsing (G) - This option enables a couple of enhancements to - cross-subnet browse propagation that have been added in Samba - but which are not standard in Microsoft implementations. - - - The first enhancement to browse propagation consists of a regular - wildcard query to a Samba WINS server for all Domain Master Browsers, - followed by a browse synchronization with each of the returned - DMBs. The second enhancement consists of a regular randomised browse - synchronization with all currently known DMBs. - - You may wish to disable this option if you have a problem with empty - workgroups not disappearing from browse lists. Due to the restrictions - of the browse protocols these enhancements can cause a empty workgroup - to stay around forever which can be annoying. - - In general you should leave this option enabled as it makes - cross-subnet browse propagation much more reliable. - - Default: enhanced browsing = yes - - diff --git a/docs/docbook/smbdotconf/browse/lmannounce.xml b/docs/docbook/smbdotconf/browse/lmannounce.xml deleted file mode 100644 index 1551c0991ef..00000000000 --- a/docs/docbook/smbdotconf/browse/lmannounce.xml +++ /dev/null @@ -1,24 +0,0 @@ - - lm announce (G) - This parameter determines if nmbd - 8 will produce Lanman announce - broadcasts that are needed by OS/2 clients in order for them to see - the Samba server in their browse list. This parameter can have three - values, yes, no, or - auto. The default is auto. - If set to no Samba will never produce these - broadcasts. If set to yes Samba will produce - Lanman announce broadcasts at a frequency set by the parameter - lm interval. If set to auto - Samba will not send Lanman announce broadcasts by default but will - listen for them. If it hears such a broadcast on the wire it will - then start sending them at a frequency set by the parameter - lm interval. - - See also lm interval - . - - Default: lm announce = auto - Example: lm announce = yes - - diff --git a/docs/docbook/smbdotconf/browse/lminterval.xml b/docs/docbook/smbdotconf/browse/lminterval.xml deleted file mode 100644 index cc17dc15b05..00000000000 --- a/docs/docbook/smbdotconf/browse/lminterval.xml +++ /dev/null @@ -1,17 +0,0 @@ - - lm interval (G) - If Samba is set to produce Lanman announce - broadcasts needed by OS/2 clients (see the - lm announce parameter) then this - parameter defines the frequency in seconds with which they will be - made. If this is set to zero then no Lanman announcements will be - made despite the setting of the lm announce - parameter. - - See also lm - announce. - - Default: lm interval = 60 - Example: lm interval = 120 - - diff --git a/docs/docbook/smbdotconf/browse/localmaster.xml b/docs/docbook/smbdotconf/browse/localmaster.xml deleted file mode 100644 index dffbd3cb194..00000000000 --- a/docs/docbook/smbdotconf/browse/localmaster.xml +++ /dev/null @@ -1,18 +0,0 @@ - - local master (G) - This option allows nmbd - 8 to try and become a local master browser - on a subnet. If set to no then - nmbd will not attempt to become a local master browser - on a subnet and will also lose in all browsing elections. By - default this value is set to yes. Setting this value to yes doesn't - mean that Samba will become the local master - browser on a subnet, just that nmbd will - participate in elections for local master browser. - - Setting this value to no will cause nmbd - never to become a local master browser. - - Default: local master = yes - - diff --git a/docs/docbook/smbdotconf/browse/oslevel.xml b/docs/docbook/smbdotconf/browse/oslevel.xml deleted file mode 100644 index 927db322047..00000000000 --- a/docs/docbook/smbdotconf/browse/oslevel.xml +++ /dev/null @@ -1,21 +0,0 @@ - - os level (G) - This integer value controls what level Samba - advertises itself as for browse elections. The value of this - parameter determines whether nmbd - 8 - has a chance of becoming a local master browser for the - WORKGROUP in the local broadcast area. - - Note :By default, Samba will win - a local master browsing election over all Microsoft operating - systems except a Windows NT 4.0/2000 Domain Controller. This - means that a misconfigured Samba host can effectively isolate - a subnet for browsing purposes. See BROWSING.txt - in the Samba docs/ directory - for details. - - Default: os level = 20 - Example: os level = 65 - - diff --git a/docs/docbook/smbdotconf/browse/preferedmaster.xml b/docs/docbook/smbdotconf/browse/preferedmaster.xml deleted file mode 100644 index 8098626c510..00000000000 --- a/docs/docbook/smbdotconf/browse/preferedmaster.xml +++ /dev/null @@ -1,6 +0,0 @@ - - prefered master (G) - Synonym for - preferred master for people who cannot spell :-). - - diff --git a/docs/docbook/smbdotconf/browse/preferredmaster.xml b/docs/docbook/smbdotconf/browse/preferredmaster.xml deleted file mode 100644 index 53934fdb780..00000000000 --- a/docs/docbook/smbdotconf/browse/preferredmaster.xml +++ /dev/null @@ -1,25 +0,0 @@ - - preferred master (G) - This boolean parameter controls if nmbd(8) is a preferred master browser - for its workgroup. - - If this is set to yes, on startup, nmbd - will force an election, and it will have a slight advantage in - winning the election. It is recommended that this parameter is - used in conjunction with - domain master = yes, so that - nmbd can guarantee becoming a domain master. - - Use this option with caution, because if there are several - hosts (whether Samba servers, Windows 95 or NT) that are preferred - master browsers on the same subnet, they will each periodically - and continuously attempt to become the local master browser. - This will result in unnecessary broadcast traffic and reduced browsing - capabilities. - - See also os level - . - - Default: preferred master = auto - - diff --git a/docs/docbook/smbdotconf/domain/machinepasswordtimeout.xml b/docs/docbook/smbdotconf/domain/machinepasswordtimeout.xml deleted file mode 100644 index 14e6d9c5df2..00000000000 --- a/docs/docbook/smbdotconf/domain/machinepasswordtimeout.xml +++ /dev/null @@ -1,18 +0,0 @@ - - machine password timeout (G) - If a Samba server is a member of a Windows - NT Domain (see the security = domain) - parameter) then periodically a running - smbd(8) process will try and change the MACHINE ACCOUNT - PASSWORD stored in the TDB called private/secrets.tdb - . This parameter specifies how often this password - will be changed, in seconds. The default is one week (expressed in - seconds), the same as a Windows NT Domain member server. - - See also smbpasswd - 8, and the - security = domain) parameter. - - Default: machine password timeout = 604800 - - diff --git a/docs/docbook/smbdotconf/expand-smb.conf.xsl b/docs/docbook/smbdotconf/expand-smb.conf.xsl deleted file mode 100644 index 87b4898cf73..00000000000 --- a/docs/docbook/smbdotconf/expand-smb.conf.xsl +++ /dev/null @@ -1,74 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - Processing samba:parameter ( - - ) - - - - - - - - - - - - - - - ( - - ) - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/docs/docbook/smbdotconf/filename/casesensitive.xml b/docs/docbook/smbdotconf/filename/casesensitive.xml deleted file mode 100644 index 622aea329ea..00000000000 --- a/docs/docbook/smbdotconf/filename/casesensitive.xml +++ /dev/null @@ -1,7 +0,0 @@ - - case sensitive (S) - See the discussion in the section NAME MANGLING. - - Default: case sensitive = no - - diff --git a/docs/docbook/smbdotconf/filename/casesignames.xml b/docs/docbook/smbdotconf/filename/casesignames.xml deleted file mode 100644 index 94bcb859840..00000000000 --- a/docs/docbook/smbdotconf/filename/casesignames.xml +++ /dev/null @@ -1,5 +0,0 @@ - - casesignames (S) - Synonym for case - sensitive. - diff --git a/docs/docbook/smbdotconf/filename/defaultcase.xml b/docs/docbook/smbdotconf/filename/defaultcase.xml deleted file mode 100644 index f2bdf5db1ce..00000000000 --- a/docs/docbook/smbdotconf/filename/defaultcase.xml +++ /dev/null @@ -1,9 +0,0 @@ - - default case (S) - See the section on - NAME MANGLING. Also note the - short preserve case parameter. - - Default: default case = lower - - diff --git a/docs/docbook/smbdotconf/filename/deletevetofiles.xml b/docs/docbook/smbdotconf/filename/deletevetofiles.xml deleted file mode 100644 index 49a5e2232f9..00000000000 --- a/docs/docbook/smbdotconf/filename/deletevetofiles.xml +++ /dev/null @@ -1,25 +0,0 @@ - - delete veto files (S) - This option is used when Samba is attempting to - delete a directory that contains one or more vetoed directories - (see the veto files - option). If this option is set to no (the default) then if a vetoed - directory contains any non-vetoed files or directories then the - directory delete will fail. This is usually what you want. - - If this option is set to yes, then Samba - will attempt to recursively delete any files and directories within - the vetoed directory. This can be useful for integration with file - serving systems such as NetAtalk which create meta-files within - directories you might normally veto DOS/Windows users from seeing - (e.g. .AppleDouble) - - Setting delete veto files = yes allows these - directories to be transparently deleted when the parent directory - is deleted (so long as the user has permissions to do so). - - See also the veto - files parameter. - - Default: delete veto files = no - diff --git a/docs/docbook/smbdotconf/filename/hidedotfiles.xml b/docs/docbook/smbdotconf/filename/hidedotfiles.xml deleted file mode 100644 index 63e87d80591..00000000000 --- a/docs/docbook/smbdotconf/filename/hidedotfiles.xml +++ /dev/null @@ -1,7 +0,0 @@ - - hide dot files (S) - This is a boolean parameter that controls whether - files starting with a dot appear as hidden files. - - Default: hide dot files = yes - diff --git a/docs/docbook/smbdotconf/filename/hidefiles.xml b/docs/docbook/smbdotconf/filename/hidefiles.xml deleted file mode 100644 index 6f93a2a2397..00000000000 --- a/docs/docbook/smbdotconf/filename/hidefiles.xml +++ /dev/null @@ -1,35 +0,0 @@ - - hide files(S) - This is a list of files or directories that are not - visible but are accessible. The DOS 'hidden' attribute is applied - to any files or directories that match. - - Each entry in the list must be separated by a '/', - which allows spaces to be included in the entry. '*' - and '?' can be used to specify multiple files or directories - as in DOS wildcards. - - Each entry must be a Unix path, not a DOS path and must - not include the Unix directory separator '/'. - - Note that the case sensitivity option is applicable - in hiding files. - - Setting this parameter will affect the performance of Samba, - as it will be forced to check all files and directories for a match - as they are scanned. - - See also hide - dot files, - veto files and - case sensitive. - - Default: no file are hidden - Example: hide files = - /.*/DesktopFolderDB/TrashFor%m/resource.frk/ - - The above example is based on files that the Macintosh - SMB client (DAVE) available from - Thursby creates for internal use, and also still hides - all files beginning with a dot. - diff --git a/docs/docbook/smbdotconf/filename/hidespecialfiles.xml b/docs/docbook/smbdotconf/filename/hidespecialfiles.xml deleted file mode 100644 index 9a8c2060970..00000000000 --- a/docs/docbook/smbdotconf/filename/hidespecialfiles.xml +++ /dev/null @@ -1,10 +0,0 @@ - - hide special files (G) - This parameter prevents clients from seeing - special files such as sockets, devices and fifo's in directory - listings. - - - Default: hide special files = no - - diff --git a/docs/docbook/smbdotconf/filename/hideunreadable.xml b/docs/docbook/smbdotconf/filename/hideunreadable.xml deleted file mode 100644 index d25153f1031..00000000000 --- a/docs/docbook/smbdotconf/filename/hideunreadable.xml +++ /dev/null @@ -1,8 +0,0 @@ - - hide unreadable (G) - This parameter prevents clients from seeing the - existance of files that cannot be read. Defaults to off. - - Default: hide unreadable = no - - diff --git a/docs/docbook/smbdotconf/filename/hideunwriteablefiles.xml b/docs/docbook/smbdotconf/filename/hideunwriteablefiles.xml deleted file mode 100644 index 9e28e8de5cd..00000000000 --- a/docs/docbook/smbdotconf/filename/hideunwriteablefiles.xml +++ /dev/null @@ -1,10 +0,0 @@ - - hide unwriteable files (G) - This parameter prevents clients from seeing - the existance of files that cannot be written to. Defaults to off. - Note that unwriteable directories are shown as usual. - - - Default: hide unwriteable = no - - diff --git a/docs/docbook/smbdotconf/filename/manglecase.xml b/docs/docbook/smbdotconf/filename/manglecase.xml deleted file mode 100644 index 170d77d453e..00000000000 --- a/docs/docbook/smbdotconf/filename/manglecase.xml +++ /dev/null @@ -1,8 +0,0 @@ - - mangle case (S) - See the section on - NAME MANGLING - - Default: mangle case = no - - diff --git a/docs/docbook/smbdotconf/filename/mangledmap.xml b/docs/docbook/smbdotconf/filename/mangledmap.xml deleted file mode 100644 index abe6c031e0b..00000000000 --- a/docs/docbook/smbdotconf/filename/mangledmap.xml +++ /dev/null @@ -1,23 +0,0 @@ - - mangled map (S) - This is for those who want to directly map UNIX - file names which cannot be represented on Windows/DOS. The mangling - of names is not always what is needed. In particular you may have - documents with file extensions that differ between DOS and UNIX. - For example, under UNIX it is common to use .html - for HTML files, whereas under Windows/DOS .htm - is more commonly used. - - So to map html to htm - you would use: - - mangled map = (*.html *.htm) - - One very useful case is to remove the annoying ;1 - off the ends of filenames on some CDROMs (only visible - under some UNIXes). To do this use a map of (*;1 *;). - - Default: no mangled map - Example: mangled map = (*;1 *;) - - diff --git a/docs/docbook/smbdotconf/filename/manglednames.xml b/docs/docbook/smbdotconf/filename/manglednames.xml deleted file mode 100644 index 41592b31597..00000000000 --- a/docs/docbook/smbdotconf/filename/manglednames.xml +++ /dev/null @@ -1,58 +0,0 @@ - - mangled names (S) - This controls whether non-DOS names under UNIX - should be mapped to DOS-compatible names ("mangled") and made visible, - or whether non-DOS names should simply be ignored. - - See the section on - NAME MANGLING for details on how to control the mangling process. - - If mangling is used then the mangling algorithm is as follows: - - - The first (up to) five alphanumeric characters - before the rightmost dot of the filename are preserved, forced - to upper case, and appear as the first (up to) five characters - of the mangled name. - - A tilde "~" is appended to the first part of the mangled - name, followed by a two-character unique sequence, based on the - original root name (i.e., the original filename minus its final - extension). The final extension is included in the hash calculation - only if it contains any upper case characters or is longer than three - characters. - - Note that the character to use may be specified using - the mangling char - option, if you don't like '~'. - - The first three alphanumeric characters of the final - extension are preserved, forced to upper case and appear as the - extension of the mangled name. The final extension is defined as that - part of the original filename after the rightmost dot. If there are no - dots in the filename, the mangled name will have no extension (except - in the case of "hidden files" - see below). - - Files whose UNIX name begins with a dot will be - presented as DOS hidden files. The mangled name will be created as - for other filenames, but with the leading dot removed and "___" as - its extension regardless of actual original extension (that's three - underscores). - - - The two-digit hash value consists of upper case - alphanumeric characters. - - This algorithm can cause name collisions only if files - in a directory share the same first five alphanumeric characters. - The probability of such a clash is 1/1300. - - The name mangling (if enabled) allows a file to be - copied between UNIX directories from Windows/DOS while retaining - the long UNIX filename. UNIX files can be renamed to a new extension - from Windows/DOS and will retain the same basename. Mangled names - do not change between sessions. - - Default: mangled names = yes - - diff --git a/docs/docbook/smbdotconf/filename/mangledstack.xml b/docs/docbook/smbdotconf/filename/mangledstack.xml deleted file mode 100644 index 3e6099ba92f..00000000000 --- a/docs/docbook/smbdotconf/filename/mangledstack.xml +++ /dev/null @@ -1,23 +0,0 @@ - - mangled stack (G) - This parameter controls the number of mangled names - that should be cached in the Samba server smbd - 8. - - This stack is a list of recently mangled base names - (extensions are only maintained if they are longer than 3 characters - or contains upper case characters). - - The larger this value, the more likely it is that mangled - names can be successfully converted to correct long UNIX names. - However, large stack sizes will slow most directory accesses. Smaller - stacks save memory in the server (each stack element costs 256 bytes). - - - It is not possible to absolutely guarantee correct long - filenames, so be prepared for some surprises! - - Default: mangled stack = 50 - Example: mangled stack = 100 - - diff --git a/docs/docbook/smbdotconf/filename/mangleprefix.xml b/docs/docbook/smbdotconf/filename/mangleprefix.xml deleted file mode 100644 index 7dfd46199c8..00000000000 --- a/docs/docbook/smbdotconf/filename/mangleprefix.xml +++ /dev/null @@ -1,11 +0,0 @@ - - mangle prefix (G) - controls the number of prefix - characters from the original name used when generating - the mangled names. A larger value will give a weaker - hash and therefore more name collisions. The minimum - value is 1 and the maximum value is 6. - Default: mangle prefix = 1 - Example: mangle prefix = 4 - - diff --git a/docs/docbook/smbdotconf/filename/manglingchar.xml b/docs/docbook/smbdotconf/filename/manglingchar.xml deleted file mode 100644 index e6a90504660..00000000000 --- a/docs/docbook/smbdotconf/filename/manglingchar.xml +++ /dev/null @@ -1,11 +0,0 @@ - - mangling char (S) - This controls what character is used as - the magic character in name mangling. The default is a '~' - but this may interfere with some software. Use this option to set - it to whatever you prefer. - - Default: mangling char = ~ - Example: mangling char = ^ - - diff --git a/docs/docbook/smbdotconf/filename/manglingmethod.xml b/docs/docbook/smbdotconf/filename/manglingmethod.xml deleted file mode 100644 index 11f9e9eb018..00000000000 --- a/docs/docbook/smbdotconf/filename/manglingmethod.xml +++ /dev/null @@ -1,14 +0,0 @@ - - mangling method (G) - controls the algorithm used for the generating - the mangled names. Can take two different values, "hash" and - "hash2". "hash" is the default and is the algorithm that has been - used in Samba for many years. "hash2" is a newer and considered - a better algorithm (generates less collisions) in the names. - However, many Win32 applications store the mangled names and so - changing to the new algorithm must not be done - lightly as these applications may break unless reinstalled. - Default: mangling method = hash2 - Example: mangling method = hash - - diff --git a/docs/docbook/smbdotconf/filename/maparchive.xml b/docs/docbook/smbdotconf/filename/maparchive.xml deleted file mode 100644 index 18f39791aa4..00000000000 --- a/docs/docbook/smbdotconf/filename/maparchive.xml +++ /dev/null @@ -1,17 +0,0 @@ - - map archive (S) - This controls whether the DOS archive attribute - should be mapped to the UNIX owner execute bit. The DOS archive bit - is set when a file has been modified since its last backup. One - motivation for this option it to keep Samba/your PC from making - any file it touches from becoming executable under UNIX. This can - be quite annoying for shared source code, documents, etc... - - Note that this requires the create mask - parameter to be set such that owner execute bit is not masked out - (i.e. it must include 100). See the parameter - create mask for details. - - Default: map archive = yes - - diff --git a/docs/docbook/smbdotconf/filename/maphidden.xml b/docs/docbook/smbdotconf/filename/maphidden.xml deleted file mode 100644 index 2b0266c23e9..00000000000 --- a/docs/docbook/smbdotconf/filename/maphidden.xml +++ /dev/null @@ -1,13 +0,0 @@ - - map hidden (S) - This controls whether DOS style hidden files - should be mapped to the UNIX world execute bit. - - Note that this requires the create mask - to be set such that the world execute bit is not masked out (i.e. - it must include 001). See the parameter - create mask for details. - - Default: map hidden = no - - diff --git a/docs/docbook/smbdotconf/filename/mapsystem.xml b/docs/docbook/smbdotconf/filename/mapsystem.xml deleted file mode 100644 index ead629971a3..00000000000 --- a/docs/docbook/smbdotconf/filename/mapsystem.xml +++ /dev/null @@ -1,13 +0,0 @@ - - map system (S) - This controls whether DOS style system files - should be mapped to the UNIX group execute bit. - - Note that this requires the create mask - to be set such that the group execute bit is not masked out (i.e. - it must include 010). See the parameter - create mask for details. - - Default: map system = no - - diff --git a/docs/docbook/smbdotconf/filename/preservecase.xml b/docs/docbook/smbdotconf/filename/preservecase.xml deleted file mode 100644 index 3be458ce154..00000000000 --- a/docs/docbook/smbdotconf/filename/preservecase.xml +++ /dev/null @@ -1,13 +0,0 @@ - - preserve case (S) - This controls if new filenames are created - with the case that the client passes, or if they are forced to - be the default case - . - - Default: preserve case = yes - - See the section on NAME - MANGLING for a fuller discussion. - - diff --git a/docs/docbook/smbdotconf/filename/shortpreservecase.xml b/docs/docbook/smbdotconf/filename/shortpreservecase.xml deleted file mode 100644 index 1c8b36380de..00000000000 --- a/docs/docbook/smbdotconf/filename/shortpreservecase.xml +++ /dev/null @@ -1,16 +0,0 @@ - - short preserve case (S) - This boolean parameter controls if new files - which conform to 8.3 syntax, that is all in upper case and of - suitable length, are created upper case, or if they are forced - to be the default case - . This option can be use with preserve case = yes - to permit long filenames to retain their case, while short - names are lowered. - - See the section on - NAME MANGLING. - - Default: short preserve case = yes - - diff --git a/docs/docbook/smbdotconf/filename/statcache.xml b/docs/docbook/smbdotconf/filename/statcache.xml deleted file mode 100644 index ee940814837..00000000000 --- a/docs/docbook/smbdotconf/filename/statcache.xml +++ /dev/null @@ -1,10 +0,0 @@ - - stat cache (G) - This parameter determines if smbd - 8 will use a cache in order to - speed up case insensitive name mappings. You should never need - to change this parameter. - - Default: stat cache = yes - - diff --git a/docs/docbook/smbdotconf/filename/stripdot.xml b/docs/docbook/smbdotconf/filename/stripdot.xml deleted file mode 100644 index ff877144a62..00000000000 --- a/docs/docbook/smbdotconf/filename/stripdot.xml +++ /dev/null @@ -1,9 +0,0 @@ - - strip dot (G) - This is a boolean that controls whether to - strip trailing dots off UNIX filenames. This helps with some - CDROMs that have filenames ending in a single dot. - - Default: strip dot = no - - diff --git a/docs/docbook/smbdotconf/filename/vetofiles.xml b/docs/docbook/smbdotconf/filename/vetofiles.xml deleted file mode 100644 index faef2040b92..00000000000 --- a/docs/docbook/smbdotconf/filename/vetofiles.xml +++ /dev/null @@ -1,46 +0,0 @@ - - veto files(S) - This is a list of files and directories that - are neither visible nor accessible. Each entry in the list must - be separated by a '/', which allows spaces to be included - in the entry. '*' and '?' can be used to specify multiple files - or directories as in DOS wildcards. - - Each entry must be a unix path, not a DOS path and - must not include the unix directory - separator '/'. - - Note that the case sensitive option - is applicable in vetoing files. - - One feature of the veto files parameter that it - is important to be aware of is Samba's behaviour when - trying to delete a directory. If a directory that is - to be deleted contains nothing but veto files this - deletion will fail unless you also set - the delete veto files parameter to - yes. - - Setting this parameter will affect the performance - of Samba, as it will be forced to check all files and directories - for a match as they are scanned. - - See also hide files - and - case sensitive. - - Default: No files or directories are vetoed. - - -Examples: -; Veto any files containing the word Security, -; any ending in .tmp, and any directory containing the -; word root. -veto files = /*Security*/*.tmp/*root*/ - -; Veto the Apple specific files that a NetAtalk server -; creates. -veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ - - - diff --git a/docs/docbook/smbdotconf/filename/vetooplockfiles.xml b/docs/docbook/smbdotconf/filename/vetooplockfiles.xml deleted file mode 100644 index 0c817c97f89..00000000000 --- a/docs/docbook/smbdotconf/filename/vetooplockfiles.xml +++ /dev/null @@ -1,24 +0,0 @@ - - veto oplock files (S) - This parameter is only valid when the oplocks - parameter is turned on for a share. It allows the Samba administrator - to selectively turn off the granting of oplocks on selected files that - match a wildcarded list, similar to the wildcarded list used in the - veto files - parameter. - - Default: No files are vetoed for oplock - grants - - You might want to do this on files that you know will - be heavily contended for by clients. A good example of this - is in the NetBench SMB benchmark program, which causes heavy - client contention for files ending in .SEM. - To cause Samba not to grant oplocks on these files you would use - the line (either in the [global] section or in the section for - the particular NetBench share : - - Example: veto oplock files = /*.SEM/ - - - diff --git a/docs/docbook/smbdotconf/generate-context.xsl b/docs/docbook/smbdotconf/generate-context.xsl deleted file mode 100644 index c9ca31085cd..00000000000 --- a/docs/docbook/smbdotconf/generate-context.xsl +++ /dev/null @@ -1,56 +0,0 @@ - - - - - - - - - - - - - - - - - - - - - - - - Processing samba:parameter ( - - ) - - - - - - - - - - - - - - none - - - - - - - - - - - diff --git a/docs/docbook/smbdotconf/ldap/ldapadmindn.xml b/docs/docbook/smbdotconf/ldap/ldapadmindn.xml deleted file mode 100644 index f92e8ce310a..00000000000 --- a/docs/docbook/smbdotconf/ldap/ldapadmindn.xml +++ /dev/null @@ -1,13 +0,0 @@ - - ldap admin dn (G) - The ldap admin dn defines the Distinguished - Name (DN) name used by Samba to contact the ldap server when retreiving - user account information. The ldap - admin dn is used in conjunction with the admin dn password - stored in the private/secrets.tdb file. See the - smbpasswd - 8 man page for more information on how - to accmplish this. - - - diff --git a/docs/docbook/smbdotconf/ldap/ldapdeletedn.xml b/docs/docbook/smbdotconf/ldap/ldapdeletedn.xml deleted file mode 100644 index f4a820c16db..00000000000 --- a/docs/docbook/smbdotconf/ldap/ldapdeletedn.xml +++ /dev/null @@ -1,10 +0,0 @@ - - ldap delete dn (G) - This parameter specifies whether a delete - operation in the ldapsam deletes the complete entry or only the attributes - specific to Samba. - - - Default : ldap delete dn = no - - diff --git a/docs/docbook/smbdotconf/ldap/ldapfilter.xml b/docs/docbook/smbdotconf/ldap/ldapfilter.xml deleted file mode 100644 index 6ddf8db30fc..00000000000 --- a/docs/docbook/smbdotconf/ldap/ldapfilter.xml +++ /dev/null @@ -1,12 +0,0 @@ - - ldap filter (G) - This parameter specifies the RFC 2254 compliant LDAP search filter. - The default is to match the login name with the uid - attribute for all entries matching the sambaAccount - objectclass. Note that this filter should only return one entry. - - - - Default : ldap filter = (&(uid=%u)(objectclass=sambaAccount)) - - diff --git a/docs/docbook/smbdotconf/ldap/ldapmachinesuffix.xml b/docs/docbook/smbdotconf/ldap/ldapmachinesuffix.xml deleted file mode 100644 index e02bf9acfc5..00000000000 --- a/docs/docbook/smbdotconf/ldap/ldapmachinesuffix.xml +++ /dev/null @@ -1,11 +0,0 @@ - - ldap machine suffix (G) - It specifies where machines should be - added to the ldap tree. - - - - - Default : none - - diff --git a/docs/docbook/smbdotconf/ldap/ldappasswdsync.xml b/docs/docbook/smbdotconf/ldap/ldappasswdsync.xml deleted file mode 100644 index ce9449374d4..00000000000 --- a/docs/docbook/smbdotconf/ldap/ldappasswdsync.xml +++ /dev/null @@ -1,23 +0,0 @@ - - ldap passwd sync (G) - This option is used to define whether - or not Samba should sync the LDAP password with the NT - and LM hashes for normal accounts (NOT for - workstation, server or domain trusts) on a password - change via SAMBA. - - - - The ldap passwd sync can be set to one of three values: - - - Yes = Try to update the LDAP, NT and LM passwords and update the pwdLastSet time. - - No = Update NT and LM passwords and update the pwdLastSet time. - - Only = Only update the LDAP password and let the LDAP server do the rest. - - - Default : ldap passwd sync = no - - diff --git a/docs/docbook/smbdotconf/ldap/ldapport.xml b/docs/docbook/smbdotconf/ldap/ldapport.xml deleted file mode 100644 index 97c256d423b..00000000000 --- a/docs/docbook/smbdotconf/ldap/ldapport.xml +++ /dev/null @@ -1,20 +0,0 @@ - - ldap port (G) - This parameter is only available if Samba has been - configure to include the --with-ldapsam option - at compile time. - - - - This option is used to control the tcp port number used to contact - the ldap server. - The default is to use the stand LDAPS port 636. - - - See Also: ldap ssl - - - Default : ldap port = 636 ; if ldap ssl = on - Default : ldap port = 389 ; if ldap ssl = off - - diff --git a/docs/docbook/smbdotconf/ldap/ldapserver.xml b/docs/docbook/smbdotconf/ldap/ldapserver.xml deleted file mode 100644 index 33d5652ac9d..00000000000 --- a/docs/docbook/smbdotconf/ldap/ldapserver.xml +++ /dev/null @@ -1,15 +0,0 @@ - - ldap server (G) - This parameter is only available if Samba has been - configure to include the --with-ldapsam option - at compile time. - - - - This parameter should contain the FQDN of the ldap directory - server which should be queried to locate user account information. - - - Default : ldap server = localhost - - diff --git a/docs/docbook/smbdotconf/ldap/ldapssl.xml b/docs/docbook/smbdotconf/ldap/ldapssl.xml deleted file mode 100644 index d747d8f7df2..00000000000 --- a/docs/docbook/smbdotconf/ldap/ldapssl.xml +++ /dev/null @@ -1,30 +0,0 @@ - - ldap ssl (G) - This option is used to define whether or not Samba should - use SSL when connecting to the ldap server - This is NOT related to - Samba's previous SSL support which was enabled by specifying the - --with-ssl option to the configure - script. - - - - The ldap ssl can be set to one of three values: - - - Off = Never use SSL when querying the directory. - - Start_tls = Use the LDAPv3 StartTLS extended operation - (RFC2830) for communicating with the directory server. - - On = - Use SSL on the ldaps port when contacting the - ldap server. Only - available when the backwards-compatiblity - --with-ldapsam option is specified - to configure. See passdb backend - - - Default : ldap ssl = start_tls - - diff --git a/docs/docbook/smbdotconf/ldap/ldapsuffix.xml b/docs/docbook/smbdotconf/ldap/ldapsuffix.xml deleted file mode 100644 index dae15f81042..00000000000 --- a/docs/docbook/smbdotconf/ldap/ldapsuffix.xml +++ /dev/null @@ -1,8 +0,0 @@ - - ldap suffix (G) - - Specifies where user and machine accounts are added to the tree. Can be overriden by ldap user suffix and ldap machine suffix. It also used as the base dn for all ldap searches. - - Default : none - - diff --git a/docs/docbook/smbdotconf/ldap/ldaptrustids.xml b/docs/docbook/smbdotconf/ldap/ldaptrustids.xml deleted file mode 100644 index 8fe4a1400b5..00000000000 --- a/docs/docbook/smbdotconf/ldap/ldaptrustids.xml +++ /dev/null @@ -1,18 +0,0 @@ - - ldap trust ids (G) - Normally, Samba validates each entry - in the LDAP server against getpwnam(). This allows - LDAP to be used for Samba with the unix system using - NIS (for example) and also ensures that Samba does not - present accounts that do not otherwise exist. - This option is used to disable this functionality, and - instead to rely on the presence of the appropriate - attributes in LDAP directly, which can result in a - significant performance boost in some situations. - Setting this option to yes effectivly assumes - that the local machine is running nss_ldap against the - same LDAP server. - - Default: ldap trust ids = No - - diff --git a/docs/docbook/smbdotconf/ldap/ldapusersuffix.xml b/docs/docbook/smbdotconf/ldap/ldapusersuffix.xml deleted file mode 100644 index e4fb681e23e..00000000000 --- a/docs/docbook/smbdotconf/ldap/ldapusersuffix.xml +++ /dev/null @@ -1,10 +0,0 @@ - - ldap user suffix (G) - It specifies where users are added to the tree. - - - - - Default : none - - diff --git a/docs/docbook/smbdotconf/locking/blockinglocks.xml b/docs/docbook/smbdotconf/locking/blockinglocks.xml deleted file mode 100644 index ea5e90b5cde..00000000000 --- a/docs/docbook/smbdotconf/locking/blockinglocks.xml +++ /dev/null @@ -1,22 +0,0 @@ - - blocking locks (S) - This parameter controls the behavior - of smbd - 8 when given a request by a client - to obtain a byte range lock on a region of an open file, and the - request has a time limit associated with it. - - If this parameter is set and the lock range requested - cannot be immediately satisfied, samba will internally - queue the lock request, and periodically attempt to obtain - the lock until the timeout period expires. - - If this parameter is set to no, then - samba will behave as previous versions of Samba would and - will fail the lock request immediately if the lock range - cannot be obtained. - - Default: blocking locks = yes - - - diff --git a/docs/docbook/smbdotconf/locking/cscpolicy.xml b/docs/docbook/smbdotconf/locking/cscpolicy.xml deleted file mode 100644 index e5139bc4f3c..00000000000 --- a/docs/docbook/smbdotconf/locking/cscpolicy.xml +++ /dev/null @@ -1,18 +0,0 @@ - - csc policy (S) - This stands for client-side caching - policy, and specifies how clients capable of offline - caching will cache the files in the share. The valid values - are: manual, documents, programs, disable. - - These values correspond to those used on Windows - servers. - - For example, shares containing roaming profiles can have - offline caching disabled using csc policy = disable - . - - Default: csc policy = manual - Example: csc policy = programs - - diff --git a/docs/docbook/smbdotconf/locking/fakeoplocks.xml b/docs/docbook/smbdotconf/locking/fakeoplocks.xml deleted file mode 100644 index 16887726c0c..00000000000 --- a/docs/docbook/smbdotconf/locking/fakeoplocks.xml +++ /dev/null @@ -1,27 +0,0 @@ - - fake oplocks (S) - Oplocks are the way that SMB clients get permission - from a server to locally cache file operations. If a server grants - an oplock (opportunistic lock) then the client is free to assume - that it is the only one accessing the file and it will aggressively - cache file data. With some oplock types the client may even cache - file open/close operations. This can give enormous performance benefits. - - - When you set fake oplocks = yes, smbd(8) will - always grant oplock requests no matter how many clients are using - the file. - - It is generally much better to use the real oplocks support rather - than this parameter. - - If you enable this option on all read-only shares or - shares that you know will only be accessed from one client at a - time such as physically read-only media like CDROMs, you will see - a big performance improvement on many operations. If you enable - this option on shares where multiple clients may be accessing the - files read-write at the same time you can get data corruption. Use - this option carefully! - - Default: fake oplocks = no - diff --git a/docs/docbook/smbdotconf/locking/kerneloplocks.xml b/docs/docbook/smbdotconf/locking/kerneloplocks.xml deleted file mode 100644 index 98513fdd1e9..00000000000 --- a/docs/docbook/smbdotconf/locking/kerneloplocks.xml +++ /dev/null @@ -1,24 +0,0 @@ - - kernel oplocks (G) - For UNIXes that support kernel based oplocks - (currently only IRIX and the Linux 2.4 kernel), this parameter - allows the use of them to be turned on or off. - - Kernel oplocks support allows Samba oplocks - to be broken whenever a local UNIX process or NFS operation - accesses a file that smbd - 8 has oplocked. This allows complete - data consistency between SMB/CIFS, NFS and local file access (and is - a very cool feature :-). - - This parameter defaults to on, but is translated - to a no-op on systems that no not have the necessary kernel support. - You should never need to touch this parameter. - - See also the oplocks - and level2 oplocks - parameters. - - Default: kernel oplocks = yes - - diff --git a/docs/docbook/smbdotconf/locking/level2oplocks.xml b/docs/docbook/smbdotconf/locking/level2oplocks.xml deleted file mode 100644 index adae6d268f8..00000000000 --- a/docs/docbook/smbdotconf/locking/level2oplocks.xml +++ /dev/null @@ -1,39 +0,0 @@ - - level2 oplocks (S) - This parameter controls whether Samba supports - level2 (read-only) oplocks on a share. - - Level2, or read-only oplocks allow Windows NT clients - that have an oplock on a file to downgrade from a read-write oplock - to a read-only oplock once a second client opens the file (instead - of releasing all oplocks on a second open, as in traditional, - exclusive oplocks). This allows all openers of the file that - support level2 oplocks to cache the file for read-ahead only (ie. - they may not cache writes or lock requests) and increases performance - for many accesses of files that are not commonly written (such as - application .EXE files). - - Once one of the clients which have a read-only oplock - writes to the file all clients are notified (no reply is needed - or waited for) and told to break their oplocks to "none" and - delete any read-ahead caches. - - It is recommended that this parameter be turned on - to speed access to shared executables. - - For more discussions on level2 oplocks see the CIFS spec. - - Currently, if kernel - oplocks are supported then level2 oplocks are - not granted (even if this parameter is set to yes). - Note also, the oplocks - parameter must be set to yes on this share in order for - this parameter to have any effect. - - See also the oplocks - and kernel oplocks - parameters. - - Default: level2 oplocks = yes - - diff --git a/docs/docbook/smbdotconf/locking/locking.xml b/docs/docbook/smbdotconf/locking/locking.xml deleted file mode 100644 index aa27027a112..00000000000 --- a/docs/docbook/smbdotconf/locking/locking.xml +++ /dev/null @@ -1,25 +0,0 @@ - - locking (S) - This controls whether or not locking will be - performed by the server in response to lock requests from the - client. - - If locking = no, all lock and unlock - requests will appear to succeed and all lock queries will report - that the file in question is available for locking. - - If locking = yes, real locking will be performed - by the server. - - This option may be useful for read-only - filesystems which may not need locking (such as - CDROM drives), although setting this parameter of no - is not really recommended even in this case. - - Be careful about disabling locking either globally or in a - specific service, as lack of locking may result in data corruption. - You should never need to set this parameter. - - Default: locking = yes - - diff --git a/docs/docbook/smbdotconf/locking/lockspincount.xml b/docs/docbook/smbdotconf/locking/lockspincount.xml deleted file mode 100644 index 1ee1aab4d46..00000000000 --- a/docs/docbook/smbdotconf/locking/lockspincount.xml +++ /dev/null @@ -1,15 +0,0 @@ - - lock spin count (G) - This parameter controls the number of times - that smbd should attempt to gain a byte range lock on the - behalf of a client request. Experiments have shown that - Windows 2k servers do not reply with a failure if the lock - could not be immediately granted, but try a few more times - in case the lock could later be aquired. This behavior - is used to support PC database formats such as MS Access - and FoxPro. - - - Default: lock spin count = 2 - - diff --git a/docs/docbook/smbdotconf/locking/lockspintime.xml b/docs/docbook/smbdotconf/locking/lockspintime.xml deleted file mode 100644 index 4d3ea1bdc4c..00000000000 --- a/docs/docbook/smbdotconf/locking/lockspintime.xml +++ /dev/null @@ -1,11 +0,0 @@ - - lock spin time (G) - The time in microseconds that smbd should - pause before attempting to gain a failed lock. See - lock spin - count for more details. - - - Default: lock spin time = 10 - - diff --git a/docs/docbook/smbdotconf/locking/oplockbreakwaittime.xml b/docs/docbook/smbdotconf/locking/oplockbreakwaittime.xml deleted file mode 100644 index 5e08200a332..00000000000 --- a/docs/docbook/smbdotconf/locking/oplockbreakwaittime.xml +++ /dev/null @@ -1,16 +0,0 @@ - - oplock break wait time (G) - This is a tuning parameter added due to bugs in - both Windows 9x and WinNT. If Samba responds to a client too - quickly when that client issues an SMB that can cause an oplock - break request, then the network client can fail and not respond - to the break request. This tuning parameter (which is set in milliseconds) - is the amount of time Samba will wait before sending an oplock break - request to such (broken) clients. - - DO NOT CHANGE THIS PARAMETER UNLESS YOU HAVE READ - AND UNDERSTOOD THE SAMBA OPLOCK CODE. - - Default: oplock break wait time = 0 - - diff --git a/docs/docbook/smbdotconf/locking/oplockcontentionlimit.xml b/docs/docbook/smbdotconf/locking/oplockcontentionlimit.xml deleted file mode 100644 index fd3b45d0b14..00000000000 --- a/docs/docbook/smbdotconf/locking/oplockcontentionlimit.xml +++ /dev/null @@ -1,19 +0,0 @@ - - oplock contention limit (S) - This is a very advanced - smbd(8) tuning option to - improve the efficiency of the granting of oplocks under multiple - client contention for the same file. - - In brief it specifies a number, which causes smbd - 8not to grant an oplock even when requested - if the approximate number of clients contending for an oplock on the same file goes over this - limit. This causes smbd to behave in a similar - way to Windows NT. - - DO NOT CHANGE THIS PARAMETER UNLESS YOU HAVE READ - AND UNDERSTOOD THE SAMBA OPLOCK CODE. - - Default: oplock contention limit = 2 - - diff --git a/docs/docbook/smbdotconf/locking/oplocks.xml b/docs/docbook/smbdotconf/locking/oplocks.xml deleted file mode 100644 index 071786f35c4..00000000000 --- a/docs/docbook/smbdotconf/locking/oplocks.xml +++ /dev/null @@ -1,27 +0,0 @@ - - oplocks (S) - This boolean option tells smbd whether to - issue oplocks (opportunistic locks) to file open requests on this - share. The oplock code can dramatically (approx. 30% or more) improve - the speed of access to files on Samba servers. It allows the clients - to aggressively cache files locally and you may want to disable this - option for unreliable network environments (it is turned on by - default in Windows NT Servers). For more information see the file - Speed.txt in the Samba docs/ - directory. - - Oplocks may be selectively turned off on certain files with a - share. See the - veto oplock files parameter. On some systems - oplocks are recognized by the underlying operating system. This - allows data synchronization between all access to oplocked files, - whether it be via Samba or NFS or a local UNIX process. See the - kernel oplocks parameter for details. - - See also the kernel - oplocks and - level2 oplocks parameters. - - Default: oplocks = yes - - diff --git a/docs/docbook/smbdotconf/locking/posixlocking.xml b/docs/docbook/smbdotconf/locking/posixlocking.xml deleted file mode 100644 index 4f2e2d215b2..00000000000 --- a/docs/docbook/smbdotconf/locking/posixlocking.xml +++ /dev/null @@ -1,14 +0,0 @@ - - posix locking (S) - The smbd - 8 - daemon maintains an database of file locks obtained by SMB clients. - The default behavior is to map this internal database to POSIX - locks. This means that file locks obtained by SMB clients are - consistent with those seen by POSIX compliant applications accessing - the files via a non-SMB method (e.g. NFS or local file access). - You should never need to disable this parameter. - - Default: posix locking = yes - - diff --git a/docs/docbook/smbdotconf/locking/sharemodes.xml b/docs/docbook/smbdotconf/locking/sharemodes.xml deleted file mode 100644 index c789ed0fb2c..00000000000 --- a/docs/docbook/smbdotconf/locking/sharemodes.xml +++ /dev/null @@ -1,26 +0,0 @@ - - share modes (S) - This enables or disables the honoring of - the share modes during a file open. These - modes are used by clients to gain exclusive read or write access - to a file. - - These open modes are not directly supported by UNIX, so - they are simulated using shared memory, or lock files if your - UNIX doesn't support shared memory (almost all do). - - The share modes that are enabled by this option are - DENY_DOS, DENY_ALL, - DENY_READ, DENY_WRITE, - DENY_NONE and DENY_FCB. - - - This option gives full share compatibility and enabled - by default. - - You should NEVER turn this parameter - off as many Windows applications will break if you do so. - - Default: share modes = yes - - diff --git a/docs/docbook/smbdotconf/locking/strictlocking.xml b/docs/docbook/smbdotconf/locking/strictlocking.xml deleted file mode 100644 index b67ae477367..00000000000 --- a/docs/docbook/smbdotconf/locking/strictlocking.xml +++ /dev/null @@ -1,17 +0,0 @@ - - strict locking (S) - This is a boolean that controls the handling of - file locking in the server. When this is set to yes - the server will check every read and write access for file locks, and - deny access if locks exist. This can be slow on some systems. - - When strict locking is no the server does file - lock checks only when the client explicitly asks for them. - - Well-behaved clients always ask for lock checks when it - is important, so in the vast majority of cases strict - locking = no is preferable. - - Default: strict locking = no - - diff --git a/docs/docbook/smbdotconf/logging/debughirestimestamp.xml b/docs/docbook/smbdotconf/logging/debughirestimestamp.xml deleted file mode 100644 index a5f40b73cab..00000000000 --- a/docs/docbook/smbdotconf/logging/debughirestimestamp.xml +++ /dev/null @@ -1,14 +0,0 @@ - - debug hires timestamp (G) - Sometimes the timestamps in the log messages - are needed with a resolution of higher that seconds, this - boolean parameter adds microsecond resolution to the timestamp - message header when turned on. - - Note that the parameter - debug timestamp must be on for this to have an - effect. - - Default: debug hires timestamp = no - - diff --git a/docs/docbook/smbdotconf/logging/debuglevel.xml b/docs/docbook/smbdotconf/logging/debuglevel.xml deleted file mode 100644 index 99153fa853b..00000000000 --- a/docs/docbook/smbdotconf/logging/debuglevel.xml +++ /dev/null @@ -1,6 +0,0 @@ - - debuglevel (G) - Synonym for - log level. - - diff --git a/docs/docbook/smbdotconf/logging/debugpid.xml b/docs/docbook/smbdotconf/logging/debugpid.xml deleted file mode 100644 index 829e1684126..00000000000 --- a/docs/docbook/smbdotconf/logging/debugpid.xml +++ /dev/null @@ -1,13 +0,0 @@ - - debug pid (G) - When using only one log file for more then one - forked smbd-process there may be hard to follow which process - outputs which message. This boolean parameter is adds the process-id - to the timestamp message headers in the logfile when turned on. - - Note that the parameter - debug timestamp must be on for this to have an - effect. - - Default: debug pid = no - diff --git a/docs/docbook/smbdotconf/logging/debugtimestamp.xml b/docs/docbook/smbdotconf/logging/debugtimestamp.xml deleted file mode 100644 index 1265c1d21b9..00000000000 --- a/docs/docbook/smbdotconf/logging/debugtimestamp.xml +++ /dev/null @@ -1,10 +0,0 @@ - - debug timestamp (G) - Samba debug log messages are timestamped - by default. If you are running at a high - debug level these timestamps - can be distracting. This boolean parameter allows timestamping - to be turned off. - - Default: debug timestamp = yes - diff --git a/docs/docbook/smbdotconf/logging/debuguid.xml b/docs/docbook/smbdotconf/logging/debuguid.xml deleted file mode 100644 index 9b0786d6b3b..00000000000 --- a/docs/docbook/smbdotconf/logging/debuguid.xml +++ /dev/null @@ -1,13 +0,0 @@ - - debug uid (G) - Samba is sometimes run as root and sometime - run as the connected user, this boolean parameter inserts the - current euid, egid, uid and gid to the timestamp message headers - in the log file if turned on. - - Note that the parameter - debug timestamp must be on for this to have an - effect. - - Default: debug uid = no - diff --git a/docs/docbook/smbdotconf/logging/logfile.xml b/docs/docbook/smbdotconf/logging/logfile.xml deleted file mode 100644 index 6f176ef02b5..00000000000 --- a/docs/docbook/smbdotconf/logging/logfile.xml +++ /dev/null @@ -1,11 +0,0 @@ - - log file (G) - This option allows you to override the name - of the Samba log file (also known as the debug file). - - This option takes the standard substitutions, allowing - you to have separate log files for each user or machine. - - Example: log file = /usr/local/samba/var/log.%m - - diff --git a/docs/docbook/smbdotconf/logging/loglevel.xml b/docs/docbook/smbdotconf/logging/loglevel.xml deleted file mode 100644 index 610dc968127..00000000000 --- a/docs/docbook/smbdotconf/logging/loglevel.xml +++ /dev/null @@ -1,15 +0,0 @@ - - log level (G) - The value of the parameter (a astring) allows - the debug level (logging level) to be specified in the - smb.conf file. This parameter has been - extended since the 2.2.x series, now it allow to specify the debug - level for multiple debug classes. This is to give greater - flexibility in the configuration of the system. - - The default will be the log level specified on - the command line or level zero if none was specified. - - Example: log level = 3 passdb:5 auth:10 winbind:2 - - diff --git a/docs/docbook/smbdotconf/logging/maxlogsize.xml b/docs/docbook/smbdotconf/logging/maxlogsize.xml deleted file mode 100644 index 117410b18c9..00000000000 --- a/docs/docbook/smbdotconf/logging/maxlogsize.xml +++ /dev/null @@ -1,13 +0,0 @@ - - max log size (G) - This option (an integer in kilobytes) specifies - the max size the log file should grow to. Samba periodically checks - the size and if it is exceeded it will rename the file, adding - a .old extension. - - A size of 0 means no limit. - - Default: max log size = 5000 - Example: max log size = 1000 - - diff --git a/docs/docbook/smbdotconf/logging/syslog.xml b/docs/docbook/smbdotconf/logging/syslog.xml deleted file mode 100644 index ac098e690a5..00000000000 --- a/docs/docbook/smbdotconf/logging/syslog.xml +++ /dev/null @@ -1,17 +0,0 @@ - - syslog (G) - This parameter maps how Samba debug messages - are logged onto the system syslog logging levels. Samba debug - level zero maps onto syslog LOG_ERR, debug - level one maps onto LOG_WARNING, debug level - two maps onto LOG_NOTICE, debug level three - maps onto LOG_INFO. All higher levels are mapped to - LOG_DEBUG. - - This parameter sets the threshold for sending messages - to syslog. Only messages with debug level less than this value - will be sent to syslog. - - Default: syslog = 1 - - diff --git a/docs/docbook/smbdotconf/logging/syslogonly.xml b/docs/docbook/smbdotconf/logging/syslogonly.xml deleted file mode 100644 index a955306fe0f..00000000000 --- a/docs/docbook/smbdotconf/logging/syslogonly.xml +++ /dev/null @@ -1,9 +0,0 @@ - - syslog only (G) - If this parameter is set then Samba debug - messages are logged into the system syslog only, and not to - the debug log files. - - Default: syslog only = no - - diff --git a/docs/docbook/smbdotconf/logging/timestamplogs.xml b/docs/docbook/smbdotconf/logging/timestamplogs.xml deleted file mode 100644 index 5f5f42d7384..00000000000 --- a/docs/docbook/smbdotconf/logging/timestamplogs.xml +++ /dev/null @@ -1,6 +0,0 @@ - - timestamp logs (G) - Synonym for - debug timestamp. - - diff --git a/docs/docbook/smbdotconf/logon/abortshutdownscript.xml b/docs/docbook/smbdotconf/logon/abortshutdownscript.xml deleted file mode 100644 index 89fd9186bb5..00000000000 --- a/docs/docbook/smbdotconf/logon/abortshutdownscript.xml +++ /dev/null @@ -1,13 +0,0 @@ - - abort shutdown script (G) - This parameter only exists in the HEAD cvs branch - This a full path name to a script called by smbd - 8 that - should stop a shutdown procedure issued by the shutdown script. - - This command will be run as user. - - Default: None. - Example: abort shutdown script = /sbin/shutdown -c - - diff --git a/docs/docbook/smbdotconf/logon/addgroupscript.xml b/docs/docbook/smbdotconf/logon/addgroupscript.xml deleted file mode 100644 index 67441a16454..00000000000 --- a/docs/docbook/smbdotconf/logon/addgroupscript.xml +++ /dev/null @@ -1,14 +0,0 @@ -add group script (G) - This is the full pathname to a script that will - be run AS ROOT by smbd - 8 when a new group is - requested. It will expand any - %g to the group name passed. - This script is only useful for installations using the - Windows NT domain administration tools. The script is - free to create a group with an arbitrary name to - circumvent unix group name restrictions. In that case - the script must print the numeric gid of the created - group on stdout. - - diff --git a/docs/docbook/smbdotconf/logon/addmachinescript.xml b/docs/docbook/smbdotconf/logon/addmachinescript.xml deleted file mode 100644 index fdc69c9490f..00000000000 --- a/docs/docbook/smbdotconf/logon/addmachinescript.xml +++ /dev/null @@ -1,18 +0,0 @@ - - add machine script (G) - This is the full pathname to a script that will - be run by smbd - 8 when a machine is added - to it's domain using the administrator username and password method. - - This option is only required when using sam back-ends tied to the - Unix uid method of RID calculation such as smbpasswd. This option is only - available in Samba 3.0. - - Default: add machine script = <empty string> - - - Example: add machine script = /usr/sbin/adduser -n -g machines -c Machine -d /dev/null -s /bin/false %u - - - diff --git a/docs/docbook/smbdotconf/logon/adduserscript.xml b/docs/docbook/smbdotconf/logon/adduserscript.xml deleted file mode 100644 index 3afea231a5d..00000000000 --- a/docs/docbook/smbdotconf/logon/adduserscript.xml +++ /dev/null @@ -1,49 +0,0 @@ - - add user script (G) - This is the full pathname to a script that will - be run AS ROOT by smbd - 8 under special circumstances described below. - - Normally, a Samba server requires that UNIX users are - created for all users accessing files on this server. For sites - that use Windows NT account databases as their primary user database - creating these users and keeping the user list in sync with the - Windows NT PDC is an onerous task. This option allows smbd to create the required UNIX users - ON DEMAND when a user accesses the Samba server. - - In order to use this option, smbd - 8 must NOT be set to security = share - and add user script - must be set to a full pathname for a script that will create a UNIX - user given one argument of %u, which expands into - the UNIX user name to create. - - When the Windows user attempts to access the Samba server, - at login (session setup in the SMB protocol) time, smbd - 8 contacts the password server and - attempts to authenticate the given user with the given password. If the - authentication succeeds then smbd - attempts to find a UNIX user in the UNIX password database to map the - Windows user into. If this lookup fails, and add user script - is set then smbd will - call the specified script AS ROOT, expanding - any %u argument to be the user name to create. - - If this script successfully creates the user then smbd - will continue on as though the UNIX user - already existed. In this way, UNIX users are dynamically created to - match existing Windows NT accounts. - - See also - security, - password server, - delete user - script. - - Default: add user script = <empty string> - - - Example: add user script = /usr/local/samba/bin/add_user - %u - - diff --git a/docs/docbook/smbdotconf/logon/addusertogroupscript.xml b/docs/docbook/smbdotconf/logon/addusertogroupscript.xml deleted file mode 100644 index fe8be5b5044..00000000000 --- a/docs/docbook/smbdotconf/logon/addusertogroupscript.xml +++ /dev/null @@ -1,16 +0,0 @@ - - add user to group script (G) - Full path to the script that will be called when - a user is added to a group using the Windows NT domain administration - tools. It will be run by smbd - 8 AS ROOT. - Any %g will be replaced with the group name and - any %u will be replaced with the user name. - - - Default: add user to group script = - - Example: add user to group script = /usr/sbin/adduser %u %g - - - diff --git a/docs/docbook/smbdotconf/logon/deletegroupscript.xml b/docs/docbook/smbdotconf/logon/deletegroupscript.xml deleted file mode 100644 index 02c413115aa..00000000000 --- a/docs/docbook/smbdotconf/logon/deletegroupscript.xml +++ /dev/null @@ -1,8 +0,0 @@ -delete group script (G) - This is the full pathname to a script that will - be run AS ROOT smbd - 8 when a group is requested to be deleted. - It will expand any %g to the group name passed. - This script is only useful for installations using the Windows NT domain administration tools. - - diff --git a/docs/docbook/smbdotconf/logon/deleteuserfromgroupscript.xml b/docs/docbook/smbdotconf/logon/deleteuserfromgroupscript.xml deleted file mode 100644 index bb1c5136c1f..00000000000 --- a/docs/docbook/smbdotconf/logon/deleteuserfromgroupscript.xml +++ /dev/null @@ -1,16 +0,0 @@ - - delete user from group script (G) - Full path to the script that will be called when - a user is removed from a group using the Windows NT domain administration - tools. It will be run by smbd - 8 AS ROOT. - Any %g will be replaced with the group name and - any %u will be replaced with the user name. - - - Default: delete user from group script = - - Example: delete user from group script = /usr/sbin/deluser %u %g - - - diff --git a/docs/docbook/smbdotconf/logon/deleteuserscript.xml b/docs/docbook/smbdotconf/logon/deleteuserscript.xml deleted file mode 100644 index afb75dbe776..00000000000 --- a/docs/docbook/smbdotconf/logon/deleteuserscript.xml +++ /dev/null @@ -1,21 +0,0 @@ - - delete user script (G) - This is the full pathname to a script that will - be run by smbd - 8 when managing users - with remote RPC (NT) tools. - - - This script is called when a remote client removes a user - from the server, normally using 'User Manager for Domains' or - rpcclient. - - - This script should delete the given UNIX username. - - - Default: delete user script = <empty string> - - Example: delete user script = /usr/local/samba/bin/del_user - %u - diff --git a/docs/docbook/smbdotconf/logon/domainlogons.xml b/docs/docbook/smbdotconf/logon/domainlogons.xml deleted file mode 100644 index 9a2f432f7dc..00000000000 --- a/docs/docbook/smbdotconf/logon/domainlogons.xml +++ /dev/null @@ -1,12 +0,0 @@ - - domain logons (G) - If set to yes, the Samba server will serve - Windows 95/98 Domain logons for the - workgroup it is in. Samba 2.2 - has limited capability to act as a domain controller for Windows - NT 4 Domains. For more details on setting up this feature see - the Samba-PDC-HOWTO included in the htmldocs/ - directory shipped with the source code. - - Default: domain logons = no - diff --git a/docs/docbook/smbdotconf/logon/logondrive.xml b/docs/docbook/smbdotconf/logon/logondrive.xml deleted file mode 100644 index d0aa4d74567..00000000000 --- a/docs/docbook/smbdotconf/logon/logondrive.xml +++ /dev/null @@ -1,13 +0,0 @@ - - logon drive (G) - This parameter specifies the local path to - which the home directory will be connected (see logon home) - and is only used by NT Workstations. - - Note that this option is only useful if Samba is set up as a - logon server. - - Default: logon drive = z: - Example: logon drive = h: - - diff --git a/docs/docbook/smbdotconf/logon/logonhome.xml b/docs/docbook/smbdotconf/logon/logonhome.xml deleted file mode 100644 index ec19c54043c..00000000000 --- a/docs/docbook/smbdotconf/logon/logonhome.xml +++ /dev/null @@ -1,40 +0,0 @@ - - logon home (G) - This parameter specifies the home directory - location when a Win95/98 or NT Workstation logs into a Samba PDC. - It allows you to do - - C:\> NET USE H: /HOME - - - from a command prompt, for example. - - This option takes the standard substitutions, allowing - you to have separate logon scripts for each user or machine. - - This parameter can be used with Win9X workstations to ensure - that roaming profiles are stored in a subdirectory of the user's - home directory. This is done in the following way: - - logon home = \\%N\%U\profile - - This tells Samba to return the above string, with - substitutions made when a client requests the info, generally - in a NetUserGetInfo request. Win9X clients truncate the info to - \\server\share when a user does net use /home - but use the whole string when dealing with profiles. - - Note that in prior versions of Samba, the - logon path was returned rather than - logon home. This broke net use - /home but allowed profiles outside the home directory. - The current implementation is correct, and can be used for - profiles if you use the above trick. - - This option is only useful if Samba is set up as a logon - server. - - Default: logon home = "\\%N\%U" - Example: logon home = "\\remote_smb_server\%U" - - diff --git a/docs/docbook/smbdotconf/logon/logonpath.xml b/docs/docbook/smbdotconf/logon/logonpath.xml deleted file mode 100644 index 04a2777862b..00000000000 --- a/docs/docbook/smbdotconf/logon/logonpath.xml +++ /dev/null @@ -1,45 +0,0 @@ - - logon path (G) - This parameter specifies the home directory - where roaming profiles (NTuser.dat etc files for Windows NT) are - stored. Contrary to previous versions of these manual pages, it has - nothing to do with Win 9X roaming profiles. To find out how to - handle roaming profiles for Win 9X system, see the - logon home parameter. - - This option takes the standard substitutions, allowing you - to have separate logon scripts for each user or machine. It also - specifies the directory from which the "Application Data", - (desktop, start menu, - network neighborhood, programs - and other folders, and their contents, are loaded and displayed on - your Windows NT client. - - The share and the path must be readable by the user for - the preferences and directories to be loaded onto the Windows NT - client. The share must be writeable when the user logs in for the first - time, in order that the Windows NT client can create the NTuser.dat - and other directories. - - Thereafter, the directories and any of the contents can, - if required, be made read-only. It is not advisable that the - NTuser.dat file be made read-only - rename it to NTuser.man to - achieve the desired effect (a MANdatory - profile). - - Windows clients can sometimes maintain a connection to - the [homes] share, even though there is no user logged in. - Therefore, it is vital that the logon path does not include a - reference to the homes share (i.e. setting this parameter to - \%N\%U\profile_path will cause problems). - - This option takes the standard substitutions, allowing - you to have separate logon scripts for each user or machine. - - Note that this option is only useful if Samba is set up - as a logon server. - - Default: logon path = \\%N\%U\profile - Example: logon path = \\PROFILESERVER\PROFILE\%U - - diff --git a/docs/docbook/smbdotconf/logon/logonscript.xml b/docs/docbook/smbdotconf/logon/logonscript.xml deleted file mode 100644 index 842cf927d2d..00000000000 --- a/docs/docbook/smbdotconf/logon/logonscript.xml +++ /dev/null @@ -1,39 +0,0 @@ - - logon script (G) - This parameter specifies the batch file (.bat) or - NT command file (.cmd) to be downloaded and run on a machine when - a user successfully logs in. The file must contain the DOS - style CR/LF line endings. Using a DOS-style editor to create the - file is recommended. - - The script must be a relative path to the [netlogon] - service. If the [netlogon] service specifies a - path of /usr/local/samba/netlogon - , and logon script = STARTUP.BAT, then - the file that will be downloaded is: - - /usr/local/samba/netlogon/STARTUP.BAT - - The contents of the batch file are entirely your choice. A - suggested command would be to add NET TIME \\SERVER /SET - /YES, to force every machine to synchronize clocks with - the same time server. Another use would be to add NET USE - U: \\SERVER\UTILS for commonly used utilities, or - NET USE Q: \\SERVER\ISO9001_QA for example. - - Note that it is particularly important not to allow write - access to the [netlogon] share, or to grant users write permission - on the batch files in a secure environment, as this would allow - the batch files to be arbitrarily modified and security to be - breached. - - This option takes the standard substitutions, allowing you - to have separate logon scripts for each user or machine. - - This option is only useful if Samba is set up as a logon - server. - - Default: no logon script defined - Example: logon script = scripts\%U.bat - - diff --git a/docs/docbook/smbdotconf/logon/setprimarygroupscript.xml b/docs/docbook/smbdotconf/logon/setprimarygroupscript.xml deleted file mode 100644 index c4b2aa1d921..00000000000 --- a/docs/docbook/smbdotconf/logon/setprimarygroupscript.xml +++ /dev/null @@ -1,17 +0,0 @@ -set primary group script (G) - Thanks to the Posix subsystem in NT a - Windows User has a primary group in addition to the - auxiliary groups. This script sets the primary group - in the unix userdatase when an administrator sets the - primary group from the windows user manager or when - fetching a SAM with net rpc - vampire. %u will be - replaced with the user whose primary group is to be - set. %g will be replaced with - the group to set. - - Default: No default value - - Example: set primary group script = /usr/sbin/usermod -g '%g' '%u' - - diff --git a/docs/docbook/smbdotconf/logon/shutdownscript.xml b/docs/docbook/smbdotconf/logon/shutdownscript.xml deleted file mode 100644 index ac286393b57..00000000000 --- a/docs/docbook/smbdotconf/logon/shutdownscript.xml +++ /dev/null @@ -1,42 +0,0 @@ - - shutdown script (G) - This parameter only exists in the HEAD cvs branch - This a full path name to a script called by - smbd(8) that - should start a shutdown procedure. - - This command will be run as the user connected to the - server. - - %m %t %r %f parameters are expanded - %m will be substituted with the - shutdown message sent to the server. - %t will be substituted with the - number of seconds to wait before effectively starting the - shutdown procedure. - %r will be substituted with the - switch -r. It means reboot after shutdown - for NT. - - %f will be substituted with the - switch -f. It means force the shutdown - even if applications do not respond for NT. - - Default: None. - Example: abort shutdown script = /usr/local/samba/sbin/shutdown %m %t %r %f - Shutdown script example: - -#!/bin/bash - -$time=0 -let "time/60" -let "time++" - -/sbin/shutdown $3 $4 +$time $1 & - - Shutdown does not return so we need to launch it in background. - - - See also abort shutdown script. - - diff --git a/docs/docbook/smbdotconf/man.xsl b/docs/docbook/smbdotconf/man.xsl deleted file mode 100644 index a7ae76bbd81..00000000000 --- a/docs/docbook/smbdotconf/man.xsl +++ /dev/null @@ -1,159 +0,0 @@ - - - - - - - - - - - - - - - - - - : - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - .\"Generated by db2man.xsl. Don't modify this, modify the source. -.de Sh \" Subsection -.br -.if t .Sp -.ne 5 -.PP -\fB\\$1\fR -.PP -.. -.de Sp \" Vertical space (when we can't use .PP) -.if t .sp .5v -.if n .sp -.. -.de Ip \" List item -.br -.ie \\n(.$>=3 .ne \\$3 -.el .ne 3 -.IP "\\$1" \\$2 -.. -.TH " - - " - - " - - " " - - " " - - " - - - - - - - - - - - - - - - - .nf - - .fi - - - - \fB - - \fR - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/docs/docbook/smbdotconf/misc/addsharecommand.xml b/docs/docbook/smbdotconf/misc/addsharecommand.xml deleted file mode 100644 index 233d3e7dc41..00000000000 --- a/docs/docbook/smbdotconf/misc/addsharecommand.xml +++ /dev/null @@ -1,51 +0,0 @@ - - add share command (G) - Samba 2.2.0 introduced the ability to dynamically - add and delete shares via the Windows NT 4.0 Server Manager. The - add share command is used to define an - external program or script which will add a new service definition - to smb.conf. In order to successfully - execute the add share command, smbd - requires that the administrator be connected using a root account (i.e. - uid == 0). - - - - When executed, smbd will automatically invoke the - add share command with four parameters. - - - - configFile - the location - of the global smb.conf file. - - - shareName - the name of the new - share. - - - pathName - path to an **existing** - directory on disk. - - - comment - comment string to associate - with the new share. - - - - - This parameter is only used for add file shares. To add printer shares, - see the addprinter - command. - - - - See also change share - command, delete share - command. - - - Default: none - Example: add share command = /usr/local/bin/addshare - - diff --git a/docs/docbook/smbdotconf/misc/autoservices.xml b/docs/docbook/smbdotconf/misc/autoservices.xml deleted file mode 100644 index d137f650f83..00000000000 --- a/docs/docbook/smbdotconf/misc/autoservices.xml +++ /dev/null @@ -1,6 +0,0 @@ - - auto services (G) - This is a synonym for the - preload. - - diff --git a/docs/docbook/smbdotconf/misc/available.xml b/docs/docbook/smbdotconf/misc/available.xml deleted file mode 100644 index 025c1c06fbb..00000000000 --- a/docs/docbook/smbdotconf/misc/available.xml +++ /dev/null @@ -1,11 +0,0 @@ - - available (S) - This parameter lets you "turn off" a service. If - available = no, then ALL - attempts to connect to the service will fail. Such failures are - logged. - - Default: available = yes - - - diff --git a/docs/docbook/smbdotconf/misc/changesharecommand.xml b/docs/docbook/smbdotconf/misc/changesharecommand.xml deleted file mode 100644 index 3fb494c5131..00000000000 --- a/docs/docbook/smbdotconf/misc/changesharecommand.xml +++ /dev/null @@ -1,50 +0,0 @@ - - change share command (G) - Samba 2.2.0 introduced the ability to dynamically - add and delete shares via the Windows NT 4.0 Server Manager. The - change share command is used to define an - external program or script which will modify an existing service definition - in smb.conf. In order to successfully - execute the change share command, smbd - requires that the administrator be connected using a root account (i.e. - uid == 0). - - - - When executed, smbd will automatically invoke the - change share command with four parameters. - - - - configFile - the location - of the global smb.conf file. - - - shareName - the name of the new - share. - - - pathName - path to an **existing** - directory on disk. - - - comment - comment string to associate - with the new share. - - - - - This parameter is only used modify existing file shares definitions. To modify - printer shares, use the "Printers..." folder as seen when browsing the Samba host. - - - - See also add share - command, delete - share command. - - - Default: none - Example: change share command = /usr/local/bin/addshare - - diff --git a/docs/docbook/smbdotconf/misc/configfile.xml b/docs/docbook/smbdotconf/misc/configfile.xml deleted file mode 100644 index 3edf611b55d..00000000000 --- a/docs/docbook/smbdotconf/misc/configfile.xml +++ /dev/null @@ -1,21 +0,0 @@ - - config file (G) - This allows you to override the config file - to use, instead of the default (usually smb.conf). - There is a chicken and egg problem here as this option is set - in the config file! - - For this reason, if the name of the config file has changed - when the parameters are loaded then it will reload them from - the new config file. - - This option takes the usual substitutions, which can - be very useful. - - If the config file doesn't exist then it won't be loaded - (allowing you to special case the config files of just a few - clients). - - Example: config file = /usr/local/samba/lib/smb.conf.%m - - diff --git a/docs/docbook/smbdotconf/misc/copy.xml b/docs/docbook/smbdotconf/misc/copy.xml deleted file mode 100644 index a7945af8ae1..00000000000 --- a/docs/docbook/smbdotconf/misc/copy.xml +++ /dev/null @@ -1,15 +0,0 @@ - - copy (S) - This parameter allows you to "clone" service - entries. The specified service is simply duplicated under the - current service's name. Any parameters specified in the current - section will override those in the section being copied. - - This feature lets you set up a 'template' service and - create similar services easily. Note that the service being - copied must occur earlier in the configuration file than the - service doing the copying. - - Default: no value - Example: copy = otherservice - diff --git a/docs/docbook/smbdotconf/misc/default.xml b/docs/docbook/smbdotconf/misc/default.xml deleted file mode 100644 index c396d1947b6..00000000000 --- a/docs/docbook/smbdotconf/misc/default.xml +++ /dev/null @@ -1,5 +0,0 @@ - - default (G) - A synonym for - default service. - diff --git a/docs/docbook/smbdotconf/misc/defaultservice.xml b/docs/docbook/smbdotconf/misc/defaultservice.xml deleted file mode 100644 index 7aeedb177aa..00000000000 --- a/docs/docbook/smbdotconf/misc/defaultservice.xml +++ /dev/null @@ -1,36 +0,0 @@ - - default service (G) - This parameter specifies the name of a service - which will be connected to if the service actually requested cannot - be found. Note that the square brackets are NOT - given in the parameter value (see example below). - - There is no default value for this parameter. If this - parameter is not given, attempting to connect to a nonexistent - service results in an error. - - Typically the default service would be a - guest ok, - read-only service. - - Also note that the apparent service name will be changed - to equal that of the requested service, this is very useful as it - allows you to use macros like %S to make - a wildcard service. - - Note also that any "_" characters in the name of the service - used in the default service will get mapped to a "/". This allows for - interesting things. - - - Example: - - -[global] - default service = pub - -[pub] - path = /%S - - - diff --git a/docs/docbook/smbdotconf/misc/deletereadonly.xml b/docs/docbook/smbdotconf/misc/deletereadonly.xml deleted file mode 100644 index 8e86b5b00b8..00000000000 --- a/docs/docbook/smbdotconf/misc/deletereadonly.xml +++ /dev/null @@ -1,11 +0,0 @@ - - delete readonly (S) - This parameter allows readonly files to be deleted. - This is not normal DOS semantics, but is allowed by UNIX. - - This option may be useful for running applications such - as rcs, where UNIX file ownership prevents changing file - permissions, and DOS semantics prevent deletion of a read only file. - - Default: delete readonly = no - diff --git a/docs/docbook/smbdotconf/misc/deletesharecommand.xml b/docs/docbook/smbdotconf/misc/deletesharecommand.xml deleted file mode 100644 index c3481c86ec2..00000000000 --- a/docs/docbook/smbdotconf/misc/deletesharecommand.xml +++ /dev/null @@ -1,44 +0,0 @@ - - delete share command (G) - Samba 2.2.0 introduced the ability to dynamically - add and delete shares via the Windows NT 4.0 Server Manager. The - delete share command is used to define an - external program or script which will remove an existing service - definition from smb.conf. In order to successfully - execute the delete share command, smbd - requires that the administrator be connected using a root account (i.e. - uid == 0). - - - - When executed, smbd will automatically invoke the - delete share command with two parameters. - - - - configFile - the location - of the global smb.conf file. - - - shareName - the name of - the existing service. - - - - - This parameter is only used to remove file shares. To delete printer shares, - see the deleteprinter - command. - - - - See also add share - command, change - share command. - - - Default: none - Example: delete share command = /usr/local/bin/delshare - - - diff --git a/docs/docbook/smbdotconf/misc/dfreecommand.xml b/docs/docbook/smbdotconf/misc/dfreecommand.xml deleted file mode 100644 index c71ec8e00bd..00000000000 --- a/docs/docbook/smbdotconf/misc/dfreecommand.xml +++ /dev/null @@ -1,50 +0,0 @@ - - dfree command (G) - The dfree command setting should - only be used on systems where a problem occurs with the internal - disk space calculations. This has been known to happen with Ultrix, - but may occur with other operating systems. The symptom that was - seen was an error of "Abort Retry Ignore" at the end of each - directory listing. - - This setting allows the replacement of the internal routines to - calculate the total disk space and amount available with an external - routine. The example below gives a possible script that might fulfill - this function. - - The external program will be passed a single parameter indicating - a directory in the filesystem being queried. This will typically consist - of the string ./. The script should return two - integers in ASCII. The first should be the total disk space in blocks, - and the second should be the number of available blocks. An optional - third return value can give the block size in bytes. The default - blocksize is 1024 bytes. - - Note: Your script should NOT be setuid or - setgid and should be owned by (and writeable only by) root! - - Default: By default internal routines for - determining the disk capacity and remaining space will be used. - - - Example: dfree command = /usr/local/samba/bin/dfree - - - Where the script dfree (which must be made executable) could be: - - -#!/bin/sh -df $1 | tail -1 | awk '{print $2" "$4}' - - - or perhaps (on Sys V based systems): - - -#!/bin/sh -/usr/bin/df -k $1 | tail -1 | awk '{print $3" "$5}' - - - Note that you may have to replace the command names - with full path names on some systems. - - diff --git a/docs/docbook/smbdotconf/misc/dontdescend.xml b/docs/docbook/smbdotconf/misc/dontdescend.xml deleted file mode 100644 index 8136f293df3..00000000000 --- a/docs/docbook/smbdotconf/misc/dontdescend.xml +++ /dev/null @@ -1,18 +0,0 @@ - - dont descend (S) - There are certain directories on some systems - (e.g., the /proc tree under Linux) that are either not - of interest to clients or are infinitely deep (recursive). This - parameter allows you to specify a comma-delimited list of directories - that the server should always show as empty. - - Note that Samba can be very fussy about the exact format - of the "dont descend" entries. For example you may need - ./proc instead of just /proc. - Experimentation is the best policy :-) - - Default: none (i.e., all directories are OK - to descend) - Example: dont descend = /proc,/dev - - diff --git a/docs/docbook/smbdotconf/misc/dosfilemode.xml b/docs/docbook/smbdotconf/misc/dosfilemode.xml deleted file mode 100644 index e8aec3b78d7..00000000000 --- a/docs/docbook/smbdotconf/misc/dosfilemode.xml +++ /dev/null @@ -1,16 +0,0 @@ - - dos filemode (S) - The default behavior in Samba is to provide - UNIX-like behavior where only the owner of a file/directory is - able to change the permissions on it. However, this behavior - is often confusing to DOS/Windows users. Enabling this parameter - allows a user who has write access to the file (by whatever - means) to modify the permissions on it. Note that a user - belonging to the group owning the file will not be allowed to - change permissions if the group is only granted read access. - Ownership of the file/directory is not changed, only the permissions - are modified. - - Default: dos filemode = no - - diff --git a/docs/docbook/smbdotconf/misc/dosfiletimeresolution.xml b/docs/docbook/smbdotconf/misc/dosfiletimeresolution.xml deleted file mode 100644 index bc82582c87b..00000000000 --- a/docs/docbook/smbdotconf/misc/dosfiletimeresolution.xml +++ /dev/null @@ -1,23 +0,0 @@ - - dos filetime resolution (S) - Under the DOS and Windows FAT filesystem, the finest - granularity on time resolution is two seconds. Setting this parameter - for a share causes Samba to round the reported time down to the - nearest two second boundary when a query call that requires one second - resolution is made to smbd - 8. - - This option is mainly used as a compatibility option for Visual - C++ when used against Samba shares. If oplocks are enabled on a - share, Visual C++ uses two different time reading calls to check if a - file has changed since it was last read. One of these calls uses a - one-second granularity, the other uses a two second granularity. As - the two second call rounds any odd second down, then if the file has a - timestamp of an odd number of seconds then the two timestamps will not - match and Visual C++ will keep reporting the file has changed. Setting - this option causes the two timestamps to match, and Visual C++ is - happy. - - Default: dos filetime resolution = no - - diff --git a/docs/docbook/smbdotconf/misc/dosfiletimes.xml b/docs/docbook/smbdotconf/misc/dosfiletimes.xml deleted file mode 100644 index d9b9f3b08b8..00000000000 --- a/docs/docbook/smbdotconf/misc/dosfiletimes.xml +++ /dev/null @@ -1,14 +0,0 @@ - - dos filetimes (S) - Under DOS and Windows, if a user can write to a - file they can change the timestamp on it. Under POSIX semantics, - only the owner of the file or root may change the timestamp. By - default, Samba runs with POSIX semantics and refuses to change the - timestamp on a file if the user smbd is acting - on behalf of is not the file owner. Setting this option to - yes allows DOS semantics and smbd - 8 will change the file - timestamp as DOS requires. - - Default: dos filetimes = no - diff --git a/docs/docbook/smbdotconf/misc/exec.xml b/docs/docbook/smbdotconf/misc/exec.xml deleted file mode 100644 index 34963c90b21..00000000000 --- a/docs/docbook/smbdotconf/misc/exec.xml +++ /dev/null @@ -1,5 +0,0 @@ - - exec (S) - This is a synonym for - preexec. - diff --git a/docs/docbook/smbdotconf/misc/fakedirectorycreatetimes.xml b/docs/docbook/smbdotconf/misc/fakedirectorycreatetimes.xml deleted file mode 100644 index 81773606ee0..00000000000 --- a/docs/docbook/smbdotconf/misc/fakedirectorycreatetimes.xml +++ /dev/null @@ -1,31 +0,0 @@ - - fake directory create times (S) - NTFS and Windows VFAT file systems keep a create - time for all files and directories. This is not the same as the - ctime - status change time - that Unix keeps, so Samba by default - reports the earliest of the various times Unix does keep. Setting - this parameter for a share causes Samba to always report midnight - 1-1-1980 as the create time for directories. - - This option is mainly used as a compatibility option for - Visual C++ when used against Samba shares. Visual C++ generated - makefiles have the object directory as a dependency for each object - file, and a make rule to create the directory. Also, when NMAKE - compares timestamps it uses the creation time when examining a - directory. Thus the object directory will be created if it does not - exist, but once it does exist it will always have an earlier - timestamp than the object files it contains. - - However, Unix time semantics mean that the create time - reported by Samba will be updated whenever a file is created or - or deleted in the directory. NMAKE finds all object files in - the object directory. The timestamp of the last one built is then - compared to the timestamp of the object directory. If the - directory's timestamp if newer, then all object files - will be rebuilt. Enabling this option - ensures directories always predate their contents and an NMAKE build - will proceed as expected. - - Default: fake directory create times = no - - diff --git a/docs/docbook/smbdotconf/misc/followsymlinks.xml b/docs/docbook/smbdotconf/misc/followsymlinks.xml deleted file mode 100644 index 88526da3203..00000000000 --- a/docs/docbook/smbdotconf/misc/followsymlinks.xml +++ /dev/null @@ -1,18 +0,0 @@ - - follow symlinks (S) - This parameter allows the Samba administrator - to stop smbd - 8 from following symbolic - links in a particular share. Setting this - parameter to no prevents any file or directory - that is a symbolic link from being followed (the user will get an - error). This option is very useful to stop users from adding a - symbolic link to /etc/passwd in their home - directory for instance. However it will slow filename lookups - down slightly. - - This option is enabled (i.e. smbd will - follow symbolic links) by default. - - Default: follow symlinks = yes - diff --git a/docs/docbook/smbdotconf/misc/fstype.xml b/docs/docbook/smbdotconf/misc/fstype.xml deleted file mode 100644 index 566bccb4659..00000000000 --- a/docs/docbook/smbdotconf/misc/fstype.xml +++ /dev/null @@ -1,14 +0,0 @@ - - fstype (S) - This parameter allows the administrator to - configure the string that specifies the type of filesystem a share - is using that is reported by smbd - 8 when a client queries the filesystem type - for a share. The default type is NTFS for - compatibility with Windows NT but this can be changed to other - strings such as Samba or FAT - if required. - - Default: fstype = NTFS - Example: fstype = Samba - diff --git a/docs/docbook/smbdotconf/misc/hidelocalusers.xml b/docs/docbook/smbdotconf/misc/hidelocalusers.xml deleted file mode 100644 index d0468ead6b7..00000000000 --- a/docs/docbook/smbdotconf/misc/hidelocalusers.xml +++ /dev/null @@ -1,7 +0,0 @@ - - hide local users(G) - This parameter toggles the hiding of local UNIX - users (root, wheel, floppy, etc) from remote clients. - - Default: hide local users = no - diff --git a/docs/docbook/smbdotconf/misc/homedirmap.xml b/docs/docbook/smbdotconf/misc/homedirmap.xml deleted file mode 100644 index 41e6ca5ea17..00000000000 --- a/docs/docbook/smbdotconf/misc/homedirmap.xml +++ /dev/null @@ -1,28 +0,0 @@ - - homedir map (G) - Ifnis homedir - is yes, and smbd - 8 is also acting - as a Win95/98 logon server then this parameter - specifies the NIS (or YP) map from which the server for the user's - home directory should be extracted. At present, only the Sun - auto.home map format is understood. The form of the map is: - - username server:/some/file/system - - and the program will extract the servername from before - the first ':'. There should probably be a better parsing system - that copes with different map formats and also Amd (another - automounter) maps. - - A working NIS client is required on - the system for this option to work. - - See also nis homedir - , domain logons - . - - Default: homedir map = <empty string> - Example: homedir map = amd.homedir - - diff --git a/docs/docbook/smbdotconf/misc/include.xml b/docs/docbook/smbdotconf/misc/include.xml deleted file mode 100644 index 81230d43574..00000000000 --- a/docs/docbook/smbdotconf/misc/include.xml +++ /dev/null @@ -1,14 +0,0 @@ - - include (G) - This allows you to include one config file - inside another. The file is included literally, as though typed - in place. - - It takes the standard substitutions, except %u - , %P and %S. - - - Default: no file included - Example: include = /usr/local/samba/lib/admin_smb.conf - - diff --git a/docs/docbook/smbdotconf/misc/lockdir.xml b/docs/docbook/smbdotconf/misc/lockdir.xml deleted file mode 100644 index 2c29b9b61c4..00000000000 --- a/docs/docbook/smbdotconf/misc/lockdir.xml +++ /dev/null @@ -1,5 +0,0 @@ - - lock dir (G) - Synonym for - lock directory. - diff --git a/docs/docbook/smbdotconf/misc/lockdirectory.xml b/docs/docbook/smbdotconf/misc/lockdirectory.xml deleted file mode 100644 index 7945f198646..00000000000 --- a/docs/docbook/smbdotconf/misc/lockdirectory.xml +++ /dev/null @@ -1,11 +0,0 @@ - - lock directory (G) - This option specifies the directory where lock - files will be placed. The lock files are used to implement the - max connections - option. - - Default: lock directory = ${prefix}/var/locks - Example: lock directory = /var/run/samba/locks - - diff --git a/docs/docbook/smbdotconf/misc/magicoutput.xml b/docs/docbook/smbdotconf/misc/magicoutput.xml deleted file mode 100644 index 8208d5bd4c6..00000000000 --- a/docs/docbook/smbdotconf/misc/magicoutput.xml +++ /dev/null @@ -1,17 +0,0 @@ - - magic output (S) - This parameter specifies the name of a file - which will contain output created by a magic script (see the - magic script - parameter below). - - Warning: If two clients use the same magic script - in the same directory the output file content - is undefined. - - Default: magic output = <magic script name>.out - - - Example: magic output = myfile.txt - - diff --git a/docs/docbook/smbdotconf/misc/magicscript.xml b/docs/docbook/smbdotconf/misc/magicscript.xml deleted file mode 100644 index 73abb50fc52..00000000000 --- a/docs/docbook/smbdotconf/misc/magicscript.xml +++ /dev/null @@ -1,28 +0,0 @@ - - magic script (S) - This parameter specifies the name of a file which, - if opened, will be executed by the server when the file is closed. - This allows a UNIX script to be sent to the Samba host and - executed on behalf of the connected user. - - Scripts executed in this way will be deleted upon - completion assuming that the user has the appropriate level - of privilege and the file permissions allow the deletion. - - If the script generates output, output will be sent to - the file specified by the - magic output parameter (see above). - - Note that some shells are unable to interpret scripts - containing CR/LF instead of CR as - the end-of-line marker. Magic scripts must be executable - as is on the host, which for some hosts and - some shells will require filtering at the DOS end. - - Magic scripts are EXPERIMENTAL and - should NOT be relied upon. - - Default: None. Magic scripts disabled. - Example: magic script = user.csh - - diff --git a/docs/docbook/smbdotconf/misc/messagecommand.xml b/docs/docbook/smbdotconf/misc/messagecommand.xml deleted file mode 100644 index 199fab56106..00000000000 --- a/docs/docbook/smbdotconf/misc/messagecommand.xml +++ /dev/null @@ -1,65 +0,0 @@ - - message command (G) - This specifies what command to run when the - server receives a WinPopup style message. - - This would normally be a command that would - deliver the message somehow. How this is to be done is - up to your imagination. - - An example is: - - message command = csh -c 'xedit %s;rm %s' & - - - This delivers the message using xedit, then - removes it afterwards. NOTE THAT IT IS VERY IMPORTANT - THAT THIS COMMAND RETURN IMMEDIATELY. That's why I - have the '&' on the end. If it doesn't return immediately then - your PCs may freeze when sending messages (they should recover - after 30 seconds, hopefully). - - All messages are delivered as the global guest user. - The command takes the standard substitutions, although - %u won't work (%U may be better - in this case). - - Apart from the standard substitutions, some additional - ones apply. In particular: - - - %s = the filename containing - the message. - - %t = the destination that - the message was sent to (probably the server name). - - %f = who the message - is from. - - - You could make this command send mail, or whatever else - takes your fancy. Please let us know of any really interesting - ideas you have. - - - Here's a way of sending the messages as mail to root: - - message command = /bin/mail -s 'message from %f on - %m' root < %s; rm %s - - If you don't have a message command then the message - won't be delivered and Samba will tell the sender there was - an error. Unfortunately WfWg totally ignores the error code - and carries on regardless, saying that the message was delivered. - - - If you want to silently delete it then try: - - message command = rm %s - - Default: no message command - Example: message command = csh -c 'xedit %s; - rm %s' & - - diff --git a/docs/docbook/smbdotconf/misc/nishomedir.xml b/docs/docbook/smbdotconf/misc/nishomedir.xml deleted file mode 100644 index 5a2980d4fd2..00000000000 --- a/docs/docbook/smbdotconf/misc/nishomedir.xml +++ /dev/null @@ -1,30 +0,0 @@ - - nis homedir (G) - Get the home share server from a NIS map. For - UNIX systems that use an automounter, the user's home directory - will often be mounted on a workstation on demand from a remote - server. - - When the Samba logon server is not the actual home directory - server, but is mounting the home directories via NFS then two - network hops would be required to access the users home directory - if the logon server told the client to use itself as the SMB server - for home directories (one over SMB and one over NFS). This can - be very slow. - - This option allows Samba to return the home share as - being on a different server to the logon server and as - long as a Samba daemon is running on the home directory server, - it will be mounted on the Samba client directly from the directory - server. When Samba is returning the home share to the client, it - will consult the NIS map specified in - homedir map and return the server - listed there. - - Note that for this option to work there must be a working - NIS system and the Samba server with this option must also - be a logon server. - - Default: nis homedir = no - - diff --git a/docs/docbook/smbdotconf/misc/panicaction.xml b/docs/docbook/smbdotconf/misc/panicaction.xml deleted file mode 100644 index 6de37c2c175..00000000000 --- a/docs/docbook/smbdotconf/misc/panicaction.xml +++ /dev/null @@ -1,12 +0,0 @@ - - panic action (G) - This is a Samba developer option that allows a - system command to be called when either smbd - 8 or smbd - 8 crashes. This is usually used to - draw attention to the fact that a problem occurred. - - Default: panic action = <empty string> - Example: panic action = "/bin/sleep 90000" - - diff --git a/docs/docbook/smbdotconf/misc/piddirectory.xml b/docs/docbook/smbdotconf/misc/piddirectory.xml deleted file mode 100644 index 81c1b13e753..00000000000 --- a/docs/docbook/smbdotconf/misc/piddirectory.xml +++ /dev/null @@ -1,9 +0,0 @@ - - pid directory (G) - This option specifies the directory where pid - files will be placed. - - Default: pid directory = ${prefix}/var/locks - Example: pid directory = /var/run/ - - diff --git a/docs/docbook/smbdotconf/misc/postexec.xml b/docs/docbook/smbdotconf/misc/postexec.xml deleted file mode 100644 index 017177be3d1..00000000000 --- a/docs/docbook/smbdotconf/misc/postexec.xml +++ /dev/null @@ -1,22 +0,0 @@ - - postexec (S) - This option specifies a command to be run - whenever the service is disconnected. It takes the usual - substitutions. The command may be run as the root on some - systems. - - An interesting example may be to unmount server - resources: - - postexec = /etc/umount /cdrom - - See also preexec - . - - Default: none (no command executed) - - - Example: postexec = echo \"%u disconnected from %S - from %m (%I)\" >> /tmp/log - - diff --git a/docs/docbook/smbdotconf/misc/preexec.xml b/docs/docbook/smbdotconf/misc/preexec.xml deleted file mode 100644 index fc047e008de..00000000000 --- a/docs/docbook/smbdotconf/misc/preexec.xml +++ /dev/null @@ -1,23 +0,0 @@ - - preexec (S) - This option specifies a command to be run whenever - the service is connected to. It takes the usual substitutions. - - An interesting example is to send the users a welcome - message every time they log in. Maybe a message of the day? Here - is an example: - - preexec = csh -c 'echo \"Welcome to %S!\" | - /usr/local/samba/bin/smbclient -M %m -I %I' & - - Of course, this could get annoying after a while :-) - - See also preexec close - and postexec - . - - Default: none (no command executed) - Example: preexec = echo \"%u connected to %S from %m - (%I)\" >> /tmp/log - - diff --git a/docs/docbook/smbdotconf/misc/preexecclose.xml b/docs/docbook/smbdotconf/misc/preexecclose.xml deleted file mode 100644 index c617a7f7faa..00000000000 --- a/docs/docbook/smbdotconf/misc/preexecclose.xml +++ /dev/null @@ -1,9 +0,0 @@ - - preexec close (S) - This boolean option controls whether a non-zero - return code from preexec - should close the service being connected to. - - Default: preexec close = no - - diff --git a/docs/docbook/smbdotconf/misc/preload.xml b/docs/docbook/smbdotconf/misc/preload.xml deleted file mode 100644 index 574ed1a369a..00000000000 --- a/docs/docbook/smbdotconf/misc/preload.xml +++ /dev/null @@ -1,16 +0,0 @@ - - preload (G) - This is a list of services that you want to be - automatically added to the browse lists. This is most useful - for homes and printers services that would otherwise not be - visible. - - Note that if you just want all printers in your - printcap file loaded then the - load printers option is easier. - - Default: no preloaded services - - Example: preload = fred lp colorlp - - diff --git a/docs/docbook/smbdotconf/misc/preloadmodules.xml b/docs/docbook/smbdotconf/misc/preloadmodules.xml deleted file mode 100644 index 52b8c412e6e..00000000000 --- a/docs/docbook/smbdotconf/misc/preloadmodules.xml +++ /dev/null @@ -1,15 +0,0 @@ - - preload modules (S) - This is a list of paths to modules that should - be loaded into smbd before a client connects. This improves - the speed of smbd when reacting to new connections somewhat. - - It is recommended to only use this option on heavy-performance - servers. - - Default: preload modules = - - Example: preload modules = /usr/lib/samba/passdb/mysql.so+++ - - - diff --git a/docs/docbook/smbdotconf/misc/remoteannounce.xml b/docs/docbook/smbdotconf/misc/remoteannounce.xml deleted file mode 100644 index e6de4bdcaf1..00000000000 --- a/docs/docbook/smbdotconf/misc/remoteannounce.xml +++ /dev/null @@ -1,32 +0,0 @@ - - remote announce (G) - This option allows you to setup nmbd(8) to periodically announce itself - to arbitrary IP addresses with an arbitrary workgroup name. - - This is useful if you want your Samba server to appear - in a remote workgroup for which the normal browse propagation - rules don't work. The remote workgroup can be anywhere that you - can send IP packets to. - - For example: - - remote announce = 192.168.2.255/SERVERS - 192.168.4.255/STAFF - - the above line would cause nmbd to announce itself - to the two given IP addresses using the given workgroup names. - If you leave out the workgroup name then the one given in - the workgroup - parameter is used instead. - - The IP addresses you choose would normally be the broadcast - addresses of the remote networks, but can also be the IP addresses - of known browse masters if your network config is that stable. - - See the documentation file BROWSING - in the docs/ directory. - - Default: remote announce = <empty string> - - - diff --git a/docs/docbook/smbdotconf/misc/remotebrowsesync.xml b/docs/docbook/smbdotconf/misc/remotebrowsesync.xml deleted file mode 100644 index 8b0d863ed7c..00000000000 --- a/docs/docbook/smbdotconf/misc/remotebrowsesync.xml +++ /dev/null @@ -1,33 +0,0 @@ - - remote browse sync (G) - This option allows you to setup nmbd(8) to periodically request - synchronization of browse lists with the master browser of a Samba - server that is on a remote segment. This option will allow you to - gain browse lists for multiple workgroups across routed networks. This - is done in a manner that does not work with any non-Samba servers. - - This is useful if you want your Samba server and all local - clients to appear in a remote workgroup for which the normal browse - propagation rules don't work. The remote workgroup can be anywhere - that you can send IP packets to. - - For example: - - remote browse sync = 192.168.2.255 192.168.4.255 - - - the above line would cause nmbd to request - the master browser on the specified subnets or addresses to - synchronize their browse lists with the local server. - - The IP addresses you choose would normally be the broadcast - addresses of the remote networks, but can also be the IP addresses - of known browse masters if your network config is that stable. If - a machine IP address is given Samba makes NO attempt to validate - that the remote machine is available, is listening, nor that it - is in fact the browse master on its segment. - - Default: remote browse sync = <empty string> - - - diff --git a/docs/docbook/smbdotconf/misc/rootpostexec.xml b/docs/docbook/smbdotconf/misc/rootpostexec.xml deleted file mode 100644 index ed606466778..00000000000 --- a/docs/docbook/smbdotconf/misc/rootpostexec.xml +++ /dev/null @@ -1,14 +0,0 @@ - - root postexec (S) - This is the same as the postexec - parameter except that the command is run as root. This - is useful for unmounting filesystems - (such as CDROMs) after a connection is closed. - - See also - postexec. - - Default: root postexec = <empty string> - - - diff --git a/docs/docbook/smbdotconf/misc/rootpreexec.xml b/docs/docbook/smbdotconf/misc/rootpreexec.xml deleted file mode 100644 index 29802b6d631..00000000000 --- a/docs/docbook/smbdotconf/misc/rootpreexec.xml +++ /dev/null @@ -1,15 +0,0 @@ - - root preexec (S) - This is the same as the preexec - parameter except that the command is run as root. This - is useful for mounting filesystems (such as CDROMs) when a - connection is opened. - - See also - preexec and - preexec close. - - Default: root preexec = <empty string> - - - diff --git a/docs/docbook/smbdotconf/misc/rootpreexecclose.xml b/docs/docbook/smbdotconf/misc/rootpreexecclose.xml deleted file mode 100644 index d21b0dd7b55..00000000000 --- a/docs/docbook/smbdotconf/misc/rootpreexecclose.xml +++ /dev/null @@ -1,12 +0,0 @@ - - root preexec close (S) - This is the same as the preexec close - parameter except that the command is run as root. - - See also - preexec and - preexec close. - - Default: root preexec close = no - - diff --git a/docs/docbook/smbdotconf/misc/setdirectory.xml b/docs/docbook/smbdotconf/misc/setdirectory.xml deleted file mode 100644 index 860632cdaf0..00000000000 --- a/docs/docbook/smbdotconf/misc/setdirectory.xml +++ /dev/null @@ -1,13 +0,0 @@ - - set directory (S) - If set directory = no, then - users of the service may not use the setdir command to change - directory. - - The setdir command is only implemented - in the Digital Pathworks client. See the Pathworks documentation - for details. - - Default: set directory = no - - diff --git a/docs/docbook/smbdotconf/misc/socketaddress.xml b/docs/docbook/smbdotconf/misc/socketaddress.xml deleted file mode 100644 index e77737f18b5..00000000000 --- a/docs/docbook/smbdotconf/misc/socketaddress.xml +++ /dev/null @@ -1,14 +0,0 @@ - - socket address (G) - This option allows you to control what - address Samba will listen for connections on. This is used to - support multiple virtual interfaces on the one server, each - with a different configuration. - - By default Samba will accept connections on any - address. - - Example: socket address = 192.168.2.20 - - - diff --git a/docs/docbook/smbdotconf/misc/sourceenvironment.xml b/docs/docbook/smbdotconf/misc/sourceenvironment.xml deleted file mode 100644 index 07a8abce4d6..00000000000 --- a/docs/docbook/smbdotconf/misc/sourceenvironment.xml +++ /dev/null @@ -1,23 +0,0 @@ - - source environment (G) - This parameter causes Samba to set environment - variables as per the content of the file named. - - If the value of this parameter starts with a "|" character - then Samba will treat that value as a pipe command to open and - will set the environment variables from the output of the pipe. - - The contents of the file or the output of the pipe should - be formatted as the output of the standard Unix env(1) - command. This is of the form : - Example environment entry: - SAMBA_NETBIOS_NAME = myhostname - - Default: No default value - Examples: source environment = |/etc/smb.conf.sh - - - Example: source environment = - /usr/local/smb_env_vars - - diff --git a/docs/docbook/smbdotconf/misc/timeoffset.xml b/docs/docbook/smbdotconf/misc/timeoffset.xml deleted file mode 100644 index 0c973234c39..00000000000 --- a/docs/docbook/smbdotconf/misc/timeoffset.xml +++ /dev/null @@ -1,11 +0,0 @@ - - time offset (G) - This parameter is a setting in minutes to add - to the normal GMT to local time conversion. This is useful if - you are serving a lot of PCs that have incorrect daylight - saving time handling. - - Default: time offset = 0 - Example: time offset = 60 - - diff --git a/docs/docbook/smbdotconf/misc/utmp.xml b/docs/docbook/smbdotconf/misc/utmp.xml deleted file mode 100644 index 014b85d6bc6..00000000000 --- a/docs/docbook/smbdotconf/misc/utmp.xml +++ /dev/null @@ -1,21 +0,0 @@ - - utmp (G) - This boolean parameter is only available if - Samba has been configured and compiled with the option - --with-utmp. If set to yes then Samba will attempt - to add utmp or utmpx records (depending on the UNIX system) whenever a - connection is made to a Samba server. Sites may use this to record the - user connecting to a Samba share. - - Due to the requirements of the utmp record, we - are required to create a unique identifier for the - incoming user. Enabling this option creates an n^2 - algorithm to find this number. This may impede - performance on large installations. - - See also the - utmp directory parameter. - - Default: utmp = no - - diff --git a/docs/docbook/smbdotconf/misc/utmpdirectory.xml b/docs/docbook/smbdotconf/misc/utmpdirectory.xml deleted file mode 100644 index 9e5574fb395..00000000000 --- a/docs/docbook/smbdotconf/misc/utmpdirectory.xml +++ /dev/null @@ -1,16 +0,0 @@ - - utmp directory(G) - This parameter is only available if Samba has - been configured and compiled with the option - --with-utmp. It specifies a directory pathname that is - used to store the utmp or utmpx files (depending on the UNIX system) that - record user connections to a Samba server. See also the - utmp parameter. By default this is - not set, meaning the system will use whatever utmp file the - native system is set to use (usually - /var/run/utmp on Linux). - - Default: no utmp directory - Example: utmp directory = /var/run/utmp - - diff --git a/docs/docbook/smbdotconf/misc/volume.xml b/docs/docbook/smbdotconf/misc/volume.xml deleted file mode 100644 index f0a82c6f0c4..00000000000 --- a/docs/docbook/smbdotconf/misc/volume.xml +++ /dev/null @@ -1,9 +0,0 @@ - - volume (S) - This allows you to override the volume label - returned for a share. Useful for CDROMs with installation programs - that insist on a particular volume label. - - Default: the name of the share - - diff --git a/docs/docbook/smbdotconf/misc/widelinks.xml b/docs/docbook/smbdotconf/misc/widelinks.xml deleted file mode 100644 index b3474ce26c2..00000000000 --- a/docs/docbook/smbdotconf/misc/widelinks.xml +++ /dev/null @@ -1,15 +0,0 @@ - - wide links (S) - This parameter controls whether or not links - in the UNIX file system may be followed by the server. Links - that point to areas within the directory tree exported by the - server are always allowed; this parameter controls access only - to areas that are outside the directory tree being exported. - - Note that setting this parameter can have a negative - effect on your server performance due to the extra system calls - that Samba has to do in order to perform the link checks. - - Default: wide links = yes - - diff --git a/docs/docbook/smbdotconf/misc/wtmpdirectory.xml b/docs/docbook/smbdotconf/misc/wtmpdirectory.xml deleted file mode 100644 index bb144473ff3..00000000000 --- a/docs/docbook/smbdotconf/misc/wtmpdirectory.xml +++ /dev/null @@ -1,20 +0,0 @@ - - wtmp directory(G) - This parameter is only available if Samba has - been configured and compiled with the option - --with-utmp. It specifies a directory pathname that is - used to store the wtmp or wtmpx files (depending on the UNIX system) that - record user connections to a Samba server. The difference with - the utmp directory is the fact that user info is kept after a user - has logged out. - - See also the - utmp parameter. By default this is - not set, meaning the system will use whatever utmp file the - native system is set to use (usually - /var/run/wtmp on Linux). - - Default: no wtmp directory - Example: wtmp directory = /var/log/wtmp - - diff --git a/docs/docbook/smbdotconf/printing/addprintercommand.xml b/docs/docbook/smbdotconf/printing/addprintercommand.xml deleted file mode 100644 index abff09cda45..00000000000 --- a/docs/docbook/smbdotconf/printing/addprintercommand.xml +++ /dev/null @@ -1,60 +0,0 @@ - - addprinter command (G) - With the introduction of MS-RPC based printing - support for Windows NT/2000 clients in Samba 2.2, The MS Add - Printer Wizard (APW) icon is now also available in the - "Printers..." folder displayed a share listing. The APW - allows for printers to be add remotely to a Samba or Windows - NT/2000 print server. - - For a Samba host this means that the printer must be - physically added to the underlying printing system. The add - printer command defines a script to be run which - will perform the necessary operations for adding the printer - to the print system and to add the appropriate service definition - to the smb.conf file in order that it can be - shared by smbd - 8. - - The addprinter command is - automatically invoked with the following parameter (in - order): - - - printer name - share name - port name - driver name - location - Windows 9x driver location - - - - All parameters are filled in from the PRINTER_INFO_2 structure sent - by the Windows NT/2000 client with one exception. The "Windows 9x - driver location" parameter is included for backwards compatibility - only. The remaining fields in the structure are generated from answers - to the APW questions. - - Once the addprinter command has - been executed, smbd will reparse the - smb.conf to determine if the share defined by the APW - exists. If the sharename is still invalid, then smbd - will return an ACCESS_DENIED error to the client. - - - The "add printer command" program can output a single line of text, - which Samba will set as the port the new printer is connected to. - If this line isn't output, Samba won't reload its printer shares. - - - See also - deleteprinter command, printing, - show add - printer wizard - - Default: none - Example: addprinter command = /usr/bin/addprinter - - - diff --git a/docs/docbook/smbdotconf/printing/defaultdevmode.xml b/docs/docbook/smbdotconf/printing/defaultdevmode.xml deleted file mode 100644 index 9609038dcd9..00000000000 --- a/docs/docbook/smbdotconf/printing/defaultdevmode.xml +++ /dev/null @@ -1,34 +0,0 @@ - - default devmode (S) - This parameter is only applicable to printable services. When smbd is serving - Printer Drivers to Windows NT/2k/XP clients, each printer on the Samba - server has a Device Mode which defines things such as paper size and - orientation and duplex settings. The device mode can only correctly be - generated by the printer driver itself (which can only be executed on a - Win32 platform). Because smbd is unable to execute the driver code - to generate the device mode, the default behavior is to set this field - to NULL. - - - Most problems with serving printer drivers to Windows NT/2k/XP clients - can be traced to a problem with the generated device mode. Certain drivers - will do things such as crashing the client's Explorer.exe with a NULL devmode. - However, other printer drivers can cause the client's spooler service - (spoolsv.exe) to die if the devmode was not created by the driver itself - (i.e. smbd generates a default devmode). - - - This parameter should be used with care and tested with the printer - driver in question. It is better to leave the device mode to NULL - and let the Windows client set the correct values. Because drivers do not - do this all the time, setting default devmode = yes - will instruct smbd to generate a default one. - - - For more information on Windows NT/2k printing and Device Modes, - see the MSDN documentation. - - - Default: default devmode = no - - diff --git a/docs/docbook/smbdotconf/printing/deleteprintercommand.xml b/docs/docbook/smbdotconf/printing/deleteprintercommand.xml deleted file mode 100644 index 23f2ff76b0f..00000000000 --- a/docs/docbook/smbdotconf/printing/deleteprintercommand.xml +++ /dev/null @@ -1,35 +0,0 @@ - - deleteprinter command (G) - With the introduction of MS-RPC based printer - support for Windows NT/2000 clients in Samba 2.2, it is now - possible to delete printer at run time by issuing the - DeletePrinter() RPC call. - - For a Samba host this means that the printer must be - physically deleted from underlying printing system. The - deleteprinter command defines a script to be run which - will perform the necessary operations for removing the printer - from the print system and from smb.conf. - - - The deleteprinter command is - automatically called with only one parameter: - "printer name". - - - Once the deleteprinter command has - been executed, smbd will reparse the - smb.conf to associated printer no longer exists. - If the sharename is still valid, then smbd - will return an ACCESS_DENIED error to the client. - - See also - addprinter command, printing, - show add - printer wizard - - Default: none - Example: deleteprinter command = /usr/bin/removeprinter - - - diff --git a/docs/docbook/smbdotconf/printing/disablespoolss.xml b/docs/docbook/smbdotconf/printing/disablespoolss.xml deleted file mode 100644 index dff1e63fab2..00000000000 --- a/docs/docbook/smbdotconf/printing/disablespoolss.xml +++ /dev/null @@ -1,20 +0,0 @@ - - disable spoolss (G) - Enabling this parameter will disable Samba's support - for the SPOOLSS set of MS-RPC's and will yield identical behavior - as Samba 2.0.x. Windows NT/2000 clients will downgrade to using - Lanman style printing commands. Windows 9x/ME will be uneffected by - the parameter. However, this will also disable the ability to upload - printer drivers to a Samba server via the Windows NT Add Printer - Wizard or by using the NT printer properties dialog window. It will - also disable the capability of Windows NT/2000 clients to download - print drivers from the Samba host upon demand. - Be very careful about enabling this parameter. - - - See also use client driver - - - Default : disable spoolss = no - - diff --git a/docs/docbook/smbdotconf/printing/enumportscommand.xml b/docs/docbook/smbdotconf/printing/enumportscommand.xml deleted file mode 100644 index b1111a5e1c8..00000000000 --- a/docs/docbook/smbdotconf/printing/enumportscommand.xml +++ /dev/null @@ -1,22 +0,0 @@ - - enumports command (G) - The concept of a "port" is fairly foreign - to UNIX hosts. Under Windows NT/2000 print servers, a port - is associated with a port monitor and generally takes the form of - a local port (i.e. LPT1:, COM1:, FILE:) or a remote port - (i.e. LPD Port Monitor, etc...). By default, Samba has only one - port defined--"Samba Printer Port". Under - Windows NT/2000, all printers must have a valid port name. - If you wish to have a list of ports displayed (smbd - does not use a port name for anything) other than - the default "Samba Printer Port", you - can define enumports command to point to - a program which should generate a list of ports, one per line, - to standard output. This listing will then be used in response - to the level 1 and 2 EnumPorts() RPC. - - Default: no enumports command - Example: enumports command = /usr/bin/listports - - - diff --git a/docs/docbook/smbdotconf/printing/loadprinters.xml b/docs/docbook/smbdotconf/printing/loadprinters.xml deleted file mode 100644 index adaa8afca9a..00000000000 --- a/docs/docbook/smbdotconf/printing/loadprinters.xml +++ /dev/null @@ -1,9 +0,0 @@ - - load printers (G) - A boolean variable that controls whether all - printers in the printcap will be loaded for browsing by default. - See the printers section for - more details. - - Default: load printers = yes - diff --git a/docs/docbook/smbdotconf/printing/lppausecommand.xml b/docs/docbook/smbdotconf/printing/lppausecommand.xml deleted file mode 100644 index 34d7c7f800f..00000000000 --- a/docs/docbook/smbdotconf/printing/lppausecommand.xml +++ /dev/null @@ -1,41 +0,0 @@ - - lppause command (S) - This parameter specifies the command to be - executed on the server host in order to stop printing or spooling - a specific print job. - - This command should be a program or script which takes - a printer name and job number to pause the print job. One way - of implementing this is by using job priorities, where jobs - having a too low priority won't be sent to the printer. - - If a %p is given then the printer name - is put in its place. A %j is replaced with - the job number (an integer). On HPUX (see printing=hpux - ), if the -p%p option is added - to the lpq command, the job will show up with the correct status, i.e. - if the job priority is lower than the set fence priority it will - have the PAUSED status, whereas if the priority is equal or higher it - will have the SPOOLED or PRINTING status. - - Note that it is good practice to include the absolute path - in the lppause command as the PATH may not be available to the server. - - See also the printing - parameter. - - Default: Currently no default value is given to - this string, unless the value of the printing - parameter is SYSV, in which case the default is : - - lp -i %p-%j -H hold - - or if the value of the printing parameter - is SOFTQ, then the default is: - - qstat -s -j%j -h - - Example for HPUX: lppause command = /usr/bin/lpalt - %p-%j -p0 - - diff --git a/docs/docbook/smbdotconf/printing/lpqcachetime.xml b/docs/docbook/smbdotconf/printing/lpqcachetime.xml deleted file mode 100644 index 6f351fdaf9a..00000000000 --- a/docs/docbook/smbdotconf/printing/lpqcachetime.xml +++ /dev/null @@ -1,26 +0,0 @@ - - lpq cache time (G) - This controls how long lpq info will be cached - for to prevent the lpq command being called too - often. A separate cache is kept for each variation of the - lpq command used by the system, so if you use different - lpq commands for different users then they won't - share cache information. - - The cache files are stored in /tmp/lpq.xxxx - where xxxx is a hash of the lpq command in use. - - The default is 10 seconds, meaning that the cached results - of a previous identical lpq command will be used - if the cached data is less than 10 seconds old. A large value may - be advisable if your lpq command is very slow. - - A value of 0 will disable caching completely. - - See also the printing - parameter. - - Default: lpq cache time = 10 - Example: lpq cache time = 30 - - diff --git a/docs/docbook/smbdotconf/printing/lpqcommand.xml b/docs/docbook/smbdotconf/printing/lpqcommand.xml deleted file mode 100644 index ddcdf1ef499..00000000000 --- a/docs/docbook/smbdotconf/printing/lpqcommand.xml +++ /dev/null @@ -1,41 +0,0 @@ - - lpq command (S) - This parameter specifies the command to be - executed on the server host in order to obtain lpq - -style printer status information. - - This command should be a program or script which - takes a printer name as its only parameter and outputs printer - status information. - - Currently nine styles of printer status information - are supported; BSD, AIX, LPRNG, PLP, SYSV, HPUX, QNX, CUPS, and SOFTQ. - This covers most UNIX systems. You control which type is expected - using the printing = option. - - Some clients (notably Windows for Workgroups) may not - correctly send the connection number for the printer they are - requesting status information about. To get around this, the - server reports on the first printer service connected to by the - client. This only happens if the connection number sent is invalid. - - If a %p is given then the printer name - is put in its place. Otherwise it is placed at the end of the - command. - - Note that it is good practice to include the absolute path - in the lpq command as the $PATH - may not be available to the server. When compiled with - the CUPS libraries, no lpq command is - needed because smbd will make a library call to obtain the - print queue listing. - - See also the printing - parameter. - - Default: depends on the setting of - printing - - Example: lpq command = /usr/bin/lpq -P%p - - diff --git a/docs/docbook/smbdotconf/printing/lpresumecommand.xml b/docs/docbook/smbdotconf/printing/lpresumecommand.xml deleted file mode 100644 index fbb1ac71ad3..00000000000 --- a/docs/docbook/smbdotconf/printing/lpresumecommand.xml +++ /dev/null @@ -1,37 +0,0 @@ - - lpresume command (S) - This parameter specifies the command to be - executed on the server host in order to restart or continue - printing or spooling a specific print job. - - This command should be a program or script which takes - a printer name and job number to resume the print job. See - also the lppause command - parameter. - - If a %p is given then the printer name - is put in its place. A %j is replaced with - the job number (an integer). - - Note that it is good practice to include the absolute path - in the lpresume command as the PATH may not - be available to the server. - - See also the printing - parameter. - - Default: Currently no default value is given - to this string, unless the value of the printing - parameter is SYSV, in which case the default is : - - lp -i %p-%j -H resume - - or if the value of the printing parameter - is SOFTQ, then the default is: - - qstat -s -j%j -r - - Example for HPUX: lpresume command = /usr/bin/lpalt - %p-%j -p2 - - diff --git a/docs/docbook/smbdotconf/printing/lprmcommand.xml b/docs/docbook/smbdotconf/printing/lprmcommand.xml deleted file mode 100644 index 7f59d6c5a05..00000000000 --- a/docs/docbook/smbdotconf/printing/lprmcommand.xml +++ /dev/null @@ -1,27 +0,0 @@ - - lprm command (S) - This parameter specifies the command to be - executed on the server host in order to delete a print job. - - This command should be a program or script which takes - a printer name and job number, and deletes the print job. - - If a %p is given then the printer name - is put in its place. A %j is replaced with - the job number (an integer). - - Note that it is good practice to include the absolute - path in the lprm command as the PATH may not be - available to the server. - - See also the printing - parameter. - - Default: depends on the setting of printing - - - Example 1: lprm command = /usr/bin/lprm -P%p %j - - Example 2: lprm command = /usr/bin/cancel %p-%j - - diff --git a/docs/docbook/smbdotconf/printing/maxprintjobs.xml b/docs/docbook/smbdotconf/printing/maxprintjobs.xml deleted file mode 100644 index f0c7d83d3fb..00000000000 --- a/docs/docbook/smbdotconf/printing/maxprintjobs.xml +++ /dev/null @@ -1,14 +0,0 @@ - - max print jobs (S) - This parameter limits the maximum number of - jobs allowable in a Samba printer queue at any given moment. - If this number is exceeded, smbd - 8 will remote "Out of Space" to the client. - See all total - print jobs. - - - Default: max print jobs = 1000 - Example: max print jobs = 5000 - - diff --git a/docs/docbook/smbdotconf/printing/os2drivermap.xml b/docs/docbook/smbdotconf/printing/os2drivermap.xml deleted file mode 100644 index fdfba35a490..00000000000 --- a/docs/docbook/smbdotconf/printing/os2drivermap.xml +++ /dev/null @@ -1,22 +0,0 @@ - - os2 driver map (G) - The parameter is used to define the absolute - path to a file containing a mapping of Windows NT printer driver - names to OS/2 printer driver names. The format is: - - <nt driver name> = <os2 driver - name>.<device name> - - For example, a valid entry using the HP LaserJet 5 - printer driver would appear as HP LaserJet 5L = LASERJET.HP - LaserJet 5L. - - The need for the file is due to the printer driver namespace - problem described in the Samba - Printing HOWTO. For more details on OS/2 clients, please - refer to the OS2-Client-HOWTO containing in the Samba documentation. - - Default: os2 driver map = <empty string> - - - diff --git a/docs/docbook/smbdotconf/printing/printable.xml b/docs/docbook/smbdotconf/printing/printable.xml deleted file mode 100644 index 22d4d73b017..00000000000 --- a/docs/docbook/smbdotconf/printing/printable.xml +++ /dev/null @@ -1,15 +0,0 @@ - - printable (S) - If this parameter is yes, then - clients may open, write to and submit spool files on the directory - specified for the service. - - Note that a printable service will ALWAYS allow writing - to the service path (user privileges permitting) via the spooling - of print data. The read only - parameter controls only non-printing access to - the resource. - - Default: printable = no - - diff --git a/docs/docbook/smbdotconf/printing/printcap.xml b/docs/docbook/smbdotconf/printing/printcap.xml deleted file mode 100644 index 2f5e4af580e..00000000000 --- a/docs/docbook/smbdotconf/printing/printcap.xml +++ /dev/null @@ -1,6 +0,0 @@ - - printcap (G) - Synonym for - printcap name. - - diff --git a/docs/docbook/smbdotconf/printing/printcapname.xml b/docs/docbook/smbdotconf/printing/printcapname.xml deleted file mode 100644 index 0025624d255..00000000000 --- a/docs/docbook/smbdotconf/printing/printcapname.xml +++ /dev/null @@ -1,47 +0,0 @@ - - printcap name (G) - This parameter may be used to override the - compiled-in default printcap name used by the server (usually - /etc/printcap). See the discussion of the [printers] section above for reasons - why you might want to do this. - - To use the CUPS printing interface set printcap name = cups - . This should be supplemented by an addtional setting - printing = cups in the [global] - section. printcap name = cups will use the - "dummy" printcap created by CUPS, as specified in your CUPS - configuration file. - - - On System V systems that use lpstat to - list available printers you can use printcap name = lpstat - to automatically obtain lists of available printers. This - is the default for systems that define SYSV at configure time in - Samba (this includes most System V based systems). If - printcap name is set to lpstat on - these systems then Samba will launch lpstat -v and - attempt to parse the output to obtain a printer list. - - A minimal printcap file would look something like this: - - -print1|My Printer 1 -print2|My Printer 2 -print3|My Printer 3 -print4|My Printer 4 -print5|My Printer 5 - - - where the '|' separates aliases of a printer. The fact - that the second alias has a space in it gives a hint to Samba - that it's a comment. - - Under AIX the default printcap - name is /etc/qconfig. Samba will assume the - file is in AIX qconfig format if the string - qconfig appears in the printcap filename. - - Default: printcap name = /etc/printcap - Example: printcap name = /etc/myprintcap - - diff --git a/docs/docbook/smbdotconf/printing/printcommand.xml b/docs/docbook/smbdotconf/printing/printcommand.xml deleted file mode 100644 index c996ed6c2e2..00000000000 --- a/docs/docbook/smbdotconf/printing/printcommand.xml +++ /dev/null @@ -1,86 +0,0 @@ - - print command (S) - After a print job has finished spooling to - a service, this command will be used via a system() - call to process the spool file. Typically the command specified will - submit the spool file to the host's printing subsystem, but there - is no requirement that this be the case. The server will not remove - the spool file, so whatever command you specify should remove the - spool file when it has been processed, otherwise you will need to - manually remove old spool files. - - The print command is simply a text string. It will be used - verbatim after macro substitutions have been made: - - s, %p - the path to the spool - file name - - %p - the appropriate printer - name - - %J - the job - name as transmitted by the client. - - %c - The number of printed pages - of the spooled job (if known). - - %z - the size of the spooled - print job (in bytes) - - The print command MUST contain at least - one occurrence of %s or %f - - the %p is optional. At the time - a job is submitted, if no printer name is supplied the %p - will be silently removed from the printer command. - - If specified in the [global] section, the print command given - will be used for any printable service that does not have its own - print command specified. - - If there is neither a specified print command for a - printable service nor a global print command, spool files will - be created but not processed and (most importantly) not removed. - - Note that printing may fail on some UNIXes from the - nobody account. If this happens then create - an alternative guest account that can print and set the guest account - in the [global] section. - - You can form quite complex print commands by realizing - that they are just passed to a shell. For example the following - will log a print job, print the file, then remove it. Note that - ';' is the usual separator for command in shell scripts. - - print command = echo Printing %s >> - /tmp/print.log; lpr -P %p %s; rm %s - - You may have to vary this command considerably depending - on how you normally print files on your system. The default for - the parameter varies depending on the setting of the - printing parameter. - - Default: For printing = BSD, AIX, QNX, LPRNG - or PLP : - print command = lpr -r -P%p %s - - For printing = SYSV or HPUX : - print command = lp -c -d%p %s; rm %s - - For printing = SOFTQ : - print command = lp -d%p -s %s; rm %s - - For printing = CUPS : If SAMBA is compiled against - libcups, then printcap = cups - uses the CUPS API to - submit jobs, etc. Otherwise it maps to the System V - commands with the -oraw option for printing, i.e. it - uses lp -c -d%p -oraw; rm %s. - With printing = cups, - and if SAMBA is compiled against libcups, any manually - set print command will be ignored. - - - Example: print command = /usr/local/samba/bin/myprintscript - %p %s - - diff --git a/docs/docbook/smbdotconf/printing/printer.xml b/docs/docbook/smbdotconf/printing/printer.xml deleted file mode 100644 index 4cf90b06fab..00000000000 --- a/docs/docbook/smbdotconf/printing/printer.xml +++ /dev/null @@ -1,6 +0,0 @@ - - printer (S) - Synonym for - printer name. - - diff --git a/docs/docbook/smbdotconf/printing/printername.xml b/docs/docbook/smbdotconf/printing/printername.xml deleted file mode 100644 index 25e6afa1f26..00000000000 --- a/docs/docbook/smbdotconf/printing/printername.xml +++ /dev/null @@ -1,15 +0,0 @@ - - printer name (S) - This parameter specifies the name of the printer - to which print jobs spooled through a printable service will be sent. - - If specified in the [global] section, the printer - name given will be used for any printable service that does - not have its own printer name specified. - - Default: none (but may be lp - on many systems) - - Example: printer name = laserwriter - - diff --git a/docs/docbook/smbdotconf/printing/printing.xml b/docs/docbook/smbdotconf/printing/printing.xml deleted file mode 100644 index d49c0e2471f..00000000000 --- a/docs/docbook/smbdotconf/printing/printing.xml +++ /dev/null @@ -1,26 +0,0 @@ - - printing (S) - This parameters controls how printer status - information is interpreted on your system. It also affects the - default values for the print command, - lpq command, lppause command - , lpresume command, and - lprm command if specified in the - [global] section. - - Currently nine printing styles are supported. They are - BSD, AIX, - LPRNG, PLP, - SYSV, HPUX, - QNX, SOFTQ, - and CUPS. - - To see what the defaults are for the other print - commands when using the various options use the testparm(1) program. - - This option can be set on a per printer basis - - See also the discussion in the - [printers] section. - - diff --git a/docs/docbook/smbdotconf/printing/printok.xml b/docs/docbook/smbdotconf/printing/printok.xml deleted file mode 100644 index 7900e91bbb8..00000000000 --- a/docs/docbook/smbdotconf/printing/printok.xml +++ /dev/null @@ -1,6 +0,0 @@ - - print ok (S) - Synonym for - printable. - - diff --git a/docs/docbook/smbdotconf/printing/queuepausecommand.xml b/docs/docbook/smbdotconf/printing/queuepausecommand.xml deleted file mode 100644 index c991994f7f8..00000000000 --- a/docs/docbook/smbdotconf/printing/queuepausecommand.xml +++ /dev/null @@ -1,26 +0,0 @@ - - queuepause command (S) - This parameter specifies the command to be - executed on the server host in order to pause the printer queue. - - This command should be a program or script which takes - a printer name as its only parameter and stops the printer queue, - such that no longer jobs are submitted to the printer. - - This command is not supported by Windows for Workgroups, - but can be issued from the Printers window under Windows 95 - and NT. - - If a %p is given then the printer name - is put in its place. Otherwise it is placed at the end of the command. - - - Note that it is good practice to include the absolute - path in the command as the PATH may not be available to the - server. - - Default: depends on the setting of printing - - Example: queuepause command = disable %p - - diff --git a/docs/docbook/smbdotconf/printing/queueresumecommand.xml b/docs/docbook/smbdotconf/printing/queueresumecommand.xml deleted file mode 100644 index 7c0d60961ab..00000000000 --- a/docs/docbook/smbdotconf/printing/queueresumecommand.xml +++ /dev/null @@ -1,31 +0,0 @@ - - queueresume command (S) - This parameter specifies the command to be - executed on the server host in order to resume the printer queue. It - is the command to undo the behavior that is caused by the - previous parameter ( - queuepause command). - - This command should be a program or script which takes - a printer name as its only parameter and resumes the printer queue, - such that queued jobs are resubmitted to the printer. - - This command is not supported by Windows for Workgroups, - but can be issued from the Printers window under Windows 95 - and NT. - - If a %p is given then the printer name - is put in its place. Otherwise it is placed at the end of the - command. - - Note that it is good practice to include the absolute - path in the command as the PATH may not be available to the - server. - - Default: depends on the setting of printing - - - Example: queuepause command = enable %p - - - diff --git a/docs/docbook/smbdotconf/printing/showaddprinterwizard.xml b/docs/docbook/smbdotconf/printing/showaddprinterwizard.xml deleted file mode 100644 index 9bf5160ad59..00000000000 --- a/docs/docbook/smbdotconf/printing/showaddprinterwizard.xml +++ /dev/null @@ -1,31 +0,0 @@ - - show add printer wizard (G) - With the introduction of MS-RPC based printing support - for Windows NT/2000 client in Samba 2.2, a "Printers..." folder will - appear on Samba hosts in the share listing. Normally this folder will - contain an icon for the MS Add Printer Wizard (APW). However, it is - possible to disable this feature regardless of the level of privilege - of the connected user. - - Under normal circumstances, the Windows NT/2000 client will - open a handle on the printer server with OpenPrinterEx() asking for - Administrator privileges. If the user does not have administrative - access on the print server (i.e is not root or a member of the - printer admin group), the OpenPrinterEx() - call fails and the client makes another open call with a request for - a lower privilege level. This should succeed, however the APW - icon will not be displayed. - - Disabling the show add printer wizard - parameter will always cause the OpenPrinterEx() on the server - to fail. Thus the APW icon will never be displayed. - Note :This does not prevent the same user from having - administrative privilege on an individual printer. - - See also addprinter - command, - deleteprinter command, printer admin - - Default :show add printer wizard = yes - - diff --git a/docs/docbook/smbdotconf/printing/totalprintjobs.xml b/docs/docbook/smbdotconf/printing/totalprintjobs.xml deleted file mode 100644 index 25784a3c299..00000000000 --- a/docs/docbook/smbdotconf/printing/totalprintjobs.xml +++ /dev/null @@ -1,18 +0,0 @@ - - total print jobs (G) - This parameter accepts an integer value which defines - a limit on the maximum number of print jobs that will be accepted - system wide at any given time. If a print job is submitted - by a client which will exceed this number, then smbd - 8 will return an - error indicating that no space is available on the server. The - default value of 0 means that no such limit exists. This parameter - can be used to prevent a server from exceeding its capacity and is - designed as a printing throttle. See also - max print jobs. - - - Default: total print jobs = 0 - Example: total print jobs = 5000 - - diff --git a/docs/docbook/smbdotconf/printing/useclientdriver.xml b/docs/docbook/smbdotconf/printing/useclientdriver.xml deleted file mode 100644 index 8327d0aaa44..00000000000 --- a/docs/docbook/smbdotconf/printing/useclientdriver.xml +++ /dev/null @@ -1,35 +0,0 @@ - - use client driver (S) - This parameter applies only to Windows NT/2000 - clients. It has no affect on Windows 95/98/ME clients. When - serving a printer to Windows NT/2000 clients without first installing - a valid printer driver on the Samba host, the client will be required - to install a local printer driver. From this point on, the client - will treat the print as a local printer and not a network printer - connection. This is much the same behavior that will occur - when disable spoolss = yes. - - The differentiating - factor is that under normal circumstances, the NT/2000 client will - attempt to open the network printer using MS-RPC. The problem is that - because the client considers the printer to be local, it will attempt - to issue the OpenPrinterEx() call requesting access rights associated - with the logged on user. If the user possesses local administator rights - but not root privilegde on the Samba host (often the case), the OpenPrinterEx() - call will fail. The result is that the client will now display an "Access - Denied; Unable to connect" message in the printer queue window (even though - jobs may successfully be printed). - - If this parameter is enabled for a printer, then any attempt - to open the printer with the PRINTER_ACCESS_ADMINISTER right is mapped - to PRINTER_ACCESS_USE instead. Thus allowing the OpenPrinterEx() - call to succeed. This parameter MUST not be able enabled - on a print share which has valid print driver installed on the Samba - server. - - See also disable spoolss - - - Default: use client driver = no - - diff --git a/docs/docbook/smbdotconf/process-all.sh b/docs/docbook/smbdotconf/process-all.sh deleted file mode 100755 index 6d8c9941b4a..00000000000 --- a/docs/docbook/smbdotconf/process-all.sh +++ /dev/null @@ -1,15 +0,0 @@ -#!/bin/sh -sh generate-file-list.sh >parameters.all.xml - -xsltproc --xinclude \ - --param smb.context "'G'" \ - --output parameters.global.xml \ - generate-context.xsl parameters.all.xml - -xsltproc --xinclude \ - --param smb.context "'S'" \ - --output parameters.service.xml \ - generate-context.xsl parameters.all.xml - -xsltproc --xinclude expand-smb.conf.xsl smb.conf.5.xml | \ -xsltproc http://docbook.sourceforge.net/release/xsl/current/html/docbook.xsl - diff --git a/docs/docbook/smbdotconf/protocol/announceas.xml b/docs/docbook/smbdotconf/protocol/announceas.xml deleted file mode 100644 index 1f3169609ca..00000000000 --- a/docs/docbook/smbdotconf/protocol/announceas.xml +++ /dev/null @@ -1,18 +0,0 @@ - - announce as (G) - This specifies what type of server nmbd - 8 will announce itself as, to a network neighborhood browse - list. By default this is set to Windows NT. The valid options - are : "NT Server" (which can also be written as "NT"), - "NT Workstation", "Win95" or "WfW" meaning Windows NT Server, - Windows NT Workstation, Windows 95 and Windows for Workgroups - respectively. Do not change this parameter unless you have a - specific need to stop Samba appearing as an NT server as this - may prevent Samba servers from participating as browser servers - correctly. - - Default: announce as = NT Server - - Example: announce as = Win95 - - diff --git a/docs/docbook/smbdotconf/protocol/announceversion.xml b/docs/docbook/smbdotconf/protocol/announceversion.xml deleted file mode 100644 index 03ad429dbd5..00000000000 --- a/docs/docbook/smbdotconf/protocol/announceversion.xml +++ /dev/null @@ -1,12 +0,0 @@ - - announce version (G) - This specifies the major and minor version numbers - that nmbd will use when announcing itself as a server. The default - is 4.9. Do not change this parameter unless you have a specific - need to set a Samba server to be a downlevel server. - - Default: announce version = 4.9 - - Example: announce version = 2.0 - - diff --git a/docs/docbook/smbdotconf/protocol/disablenetbios.xml b/docs/docbook/smbdotconf/protocol/disablenetbios.xml deleted file mode 100644 index ac97cdf7c3f..00000000000 --- a/docs/docbook/smbdotconf/protocol/disablenetbios.xml +++ /dev/null @@ -1,14 +0,0 @@ - - disable netbios (G) - Enabling this parameter will disable netbios support - in Samba. Netbios is the only available form of browsing in - all windows versions except for 2000 and XP. - - Note that clients that only support netbios won't be able to - see your samba server when netbios support is disabled. - - - Default: disable netbios = no - Example: disable netbios = yes - - diff --git a/docs/docbook/smbdotconf/protocol/largereadwrite.xml b/docs/docbook/smbdotconf/protocol/largereadwrite.xml deleted file mode 100644 index 9aa28593e63..00000000000 --- a/docs/docbook/smbdotconf/protocol/largereadwrite.xml +++ /dev/null @@ -1,15 +0,0 @@ - - large readwrite (G) - This parameter determines whether or not smbd - 8 supports the new 64k streaming - read and write varient SMB requests introduced - with Windows 2000. Note that due to Windows 2000 client redirector bugs - this requires Samba to be running on a 64-bit capable operating system such - as IRIX, Solaris or a Linux 2.4 kernel. Can improve performance by 10% with - Windows 2000 clients. Defaults to on. Not as tested as some other Samba - code paths. - - - Default : large readwrite = yes - - diff --git a/docs/docbook/smbdotconf/protocol/maxmux.xml b/docs/docbook/smbdotconf/protocol/maxmux.xml deleted file mode 100644 index 51296e0747e..00000000000 --- a/docs/docbook/smbdotconf/protocol/maxmux.xml +++ /dev/null @@ -1,9 +0,0 @@ - - max mux (G) - This option controls the maximum number of - outstanding simultaneous SMB operations that Samba tells the client - it will allow. You should never need to set this parameter. - - Default: max mux = 50 - - diff --git a/docs/docbook/smbdotconf/protocol/maxprotocol.xml b/docs/docbook/smbdotconf/protocol/maxprotocol.xml deleted file mode 100644 index be859f8ee33..00000000000 --- a/docs/docbook/smbdotconf/protocol/maxprotocol.xml +++ /dev/null @@ -1,35 +0,0 @@ - - max protocol (G) - The value of the parameter (a string) is the highest - protocol level that will be supported by the server. - - Possible values are : - - CORE: Earliest version. No - concept of user names. - - COREPLUS: Slight improvements on - CORE for efficiency. - - LANMAN1: First - modern version of the protocol. Long filename - support. - - LANMAN2: Updates to Lanman1 protocol. - - - NT1: Current up to date version of - the protocol. Used by Windows NT. Known as CIFS. - - - Normally this option should not be set as the automatic - negotiation phase in the SMB protocol takes care of choosing - the appropriate protocol. - - See also min - protocol - - Default: max protocol = NT1 - Example: max protocol = LANMAN1 - - diff --git a/docs/docbook/smbdotconf/protocol/maxttl.xml b/docs/docbook/smbdotconf/protocol/maxttl.xml deleted file mode 100644 index 04c6771308f..00000000000 --- a/docs/docbook/smbdotconf/protocol/maxttl.xml +++ /dev/null @@ -1,12 +0,0 @@ - - max ttl (G) - This option tells nmbd - 8 - what the default 'time to live' of NetBIOS names should be (in seconds) - when nmbd is requesting a name using either a - broadcast packet or from a WINS server. You should never need to - change this parameter. The default is 3 days. - - Default: max ttl = 259200 - - diff --git a/docs/docbook/smbdotconf/protocol/maxwinsttl.xml b/docs/docbook/smbdotconf/protocol/maxwinsttl.xml deleted file mode 100644 index c8e2d9df8df..00000000000 --- a/docs/docbook/smbdotconf/protocol/maxwinsttl.xml +++ /dev/null @@ -1,15 +0,0 @@ - - max wins ttl (G) - This option tells smbd - 8 when acting as a WINS server ( - wins support = yes) what the maximum - 'time to live' of NetBIOS names that nmbd - will grant will be (in seconds). You should never need to change this - parameter. The default is 6 days (518400 seconds). - - See also the min - wins ttl parameter. - - Default: max wins ttl = 518400 - - diff --git a/docs/docbook/smbdotconf/protocol/maxxmit.xml b/docs/docbook/smbdotconf/protocol/maxxmit.xml deleted file mode 100644 index c16cf476552..00000000000 --- a/docs/docbook/smbdotconf/protocol/maxxmit.xml +++ /dev/null @@ -1,12 +0,0 @@ - - max xmit (G) - This option controls the maximum packet size - that will be negotiated by Samba. The default is 65535, which - is the maximum. In some cases you may find you get better performance - with a smaller value. A value below 2048 is likely to cause problems. - - - Default: max xmit = 65535 - Example: max xmit = 8192 - - diff --git a/docs/docbook/smbdotconf/protocol/minprotocol.xml b/docs/docbook/smbdotconf/protocol/minprotocol.xml deleted file mode 100644 index 6b1d420a4b7..00000000000 --- a/docs/docbook/smbdotconf/protocol/minprotocol.xml +++ /dev/null @@ -1,20 +0,0 @@ - - min protocol (G) - The value of the parameter (a string) is the - lowest SMB protocol dialect than Samba will support. Please refer - to the max protocol - parameter for a list of valid protocol names and a brief description - of each. You may also wish to refer to the C source code in - source/smbd/negprot.c for a listing of known protocol - dialects supported by clients. - - If you are viewing this parameter as a security measure, you should - also refer to the lanman - auth parameter. Otherwise, you should never need - to change this parameter. - - Default : min protocol = CORE - Example : min protocol = NT1 # disable DOS - clients - - diff --git a/docs/docbook/smbdotconf/protocol/minwinsttl.xml b/docs/docbook/smbdotconf/protocol/minwinsttl.xml deleted file mode 100644 index e67c253f2e6..00000000000 --- a/docs/docbook/smbdotconf/protocol/minwinsttl.xml +++ /dev/null @@ -1,13 +0,0 @@ - - min wins ttl (G) - This option tells nmbd - 8 - when acting as a WINS server ( - wins support = yes) what the minimum 'time to live' - of NetBIOS names that nmbd will grant will be (in - seconds). You should never need to change this parameter. The default - is 6 hours (21600 seconds). - - Default: min wins ttl = 21600 - - diff --git a/docs/docbook/smbdotconf/protocol/nameresolveorder.xml b/docs/docbook/smbdotconf/protocol/nameresolveorder.xml deleted file mode 100644 index a5dd8939029..00000000000 --- a/docs/docbook/smbdotconf/protocol/nameresolveorder.xml +++ /dev/null @@ -1,47 +0,0 @@ - - name resolve order (G) - This option is used by the programs in the Samba - suite to determine what naming services to use and in what order - to resolve host names to IP addresses. The option takes a space - separated string of name resolution options. - - The options are :"lmhosts", "host", "wins" and "bcast". They - cause names to be resolved as follows : - - - lmhosts : Lookup an IP - address in the Samba lmhosts file. If the line in lmhosts has - no name type attached to the NetBIOS name (see the lmhosts(5) for details) then - any name type matches for lookup. - - host : Do a standard host - name to IP address resolution, using the system /etc/hosts - , NIS, or DNS lookups. This method of name resolution - is operating system depended for instance on IRIX or Solaris this - may be controlled by the /etc/nsswitch.conf - file. Note that this method is only used if the NetBIOS name - type being queried is the 0x20 (server) name type, otherwise - it is ignored. - - wins : Query a name with - the IP address listed in the - wins server parameter. If no WINS server has - been specified this method will be ignored. - - bcast : Do a broadcast on - each of the known local interfaces listed in the interfaces - parameter. This is the least reliable of the name resolution - methods as it depends on the target host being on a locally - connected subnet. - - - Default: name resolve order = lmhosts host wins bcast - - Example: name resolve order = lmhosts bcast host - - - This will cause the local lmhosts file to be examined - first, followed by a broadcast attempt, followed by a normal - system hostname lookup. - - diff --git a/docs/docbook/smbdotconf/protocol/ntaclsupport.xml b/docs/docbook/smbdotconf/protocol/ntaclsupport.xml deleted file mode 100644 index df0d8dc0689..00000000000 --- a/docs/docbook/smbdotconf/protocol/ntaclsupport.xml +++ /dev/null @@ -1,11 +0,0 @@ - - nt acl support (S) - This boolean parameter controls whether - smbd(8) will attempt to map - UNIX permissions into Windows NT access control lists. - This parameter was formally a global parameter in releases - prior to 2.2.2. - - Default: nt acl support = yes - - diff --git a/docs/docbook/smbdotconf/protocol/ntpipesupport.xml b/docs/docbook/smbdotconf/protocol/ntpipesupport.xml deleted file mode 100644 index cab20328471..00000000000 --- a/docs/docbook/smbdotconf/protocol/ntpipesupport.xml +++ /dev/null @@ -1,12 +0,0 @@ - - nt pipe support (G) - This boolean parameter controls whether - smbd - 8 will allow Windows NT - clients to connect to the NT SMB specific IPC$ - pipes. This is a developer debugging option and can be left - alone. - - Default: nt pipe support = yes - - diff --git a/docs/docbook/smbdotconf/protocol/ntstatussupport.xml b/docs/docbook/smbdotconf/protocol/ntstatussupport.xml deleted file mode 100644 index 17dafa47c53..00000000000 --- a/docs/docbook/smbdotconf/protocol/ntstatussupport.xml +++ /dev/null @@ -1,14 +0,0 @@ - - nt status support (G) - This boolean parameter controls whether smbd(8) will negotiate NT specific status - support with Windows NT/2k/XP clients. This is a developer - debugging option and should be left alone. - If this option is set to no then Samba offers - exactly the same DOS error codes that versions prior to Samba 2.2.3 - reported. - - You should not need to ever disable this parameter. - - Default: nt status support = yes - - diff --git a/docs/docbook/smbdotconf/protocol/protocol.xml b/docs/docbook/smbdotconf/protocol/protocol.xml deleted file mode 100644 index 5161806cfc6..00000000000 --- a/docs/docbook/smbdotconf/protocol/protocol.xml +++ /dev/null @@ -1,5 +0,0 @@ - - protocol (G) - Synonym for - max protocol. - diff --git a/docs/docbook/smbdotconf/protocol/readbmpx.xml b/docs/docbook/smbdotconf/protocol/readbmpx.xml deleted file mode 100644 index 0bc8f1d10bf..00000000000 --- a/docs/docbook/smbdotconf/protocol/readbmpx.xml +++ /dev/null @@ -1,10 +0,0 @@ - - read bmpx (G) - This boolean parameter controls whether smbd(8) will support the "Read - Block Multiplex" SMB. This is now rarely used and defaults to - no. You should never need to set this - parameter. - - Default: read bmpx = no - - diff --git a/docs/docbook/smbdotconf/protocol/readraw.xml b/docs/docbook/smbdotconf/protocol/readraw.xml deleted file mode 100644 index b867816e842..00000000000 --- a/docs/docbook/smbdotconf/protocol/readraw.xml +++ /dev/null @@ -1,21 +0,0 @@ - - read raw (G) - This parameter controls whether or not the server - will support the raw read SMB requests when transferring data - to clients. - - If enabled, raw reads allow reads of 65535 bytes in - one packet. This typically provides a major performance benefit. - - - However, some clients either negotiate the allowable - block size incorrectly or are incapable of supporting larger block - sizes, and for these clients you may need to disable raw reads. - - In general this parameter should be viewed as a system tuning - tool and left severely alone. See also - write raw. - - Default: read raw = yes - - diff --git a/docs/docbook/smbdotconf/protocol/smbports.xml b/docs/docbook/smbdotconf/protocol/smbports.xml deleted file mode 100644 index ed088ab9d21..00000000000 --- a/docs/docbook/smbdotconf/protocol/smbports.xml +++ /dev/null @@ -1,10 +0,0 @@ - - smb ports (G) - Specifies which ports the server should listen on - for SMB traffic. - - - Default: smb ports = 445 139 - - - diff --git a/docs/docbook/smbdotconf/protocol/timeserver.xml b/docs/docbook/smbdotconf/protocol/timeserver.xml deleted file mode 100644 index eb1a720a8d7..00000000000 --- a/docs/docbook/smbdotconf/protocol/timeserver.xml +++ /dev/null @@ -1,9 +0,0 @@ - - time server (G) - This parameter determines if nmbd - 8 advertises itself as a time server to Windows - clients. - - Default: time server = no - - diff --git a/docs/docbook/smbdotconf/protocol/unicode.xml b/docs/docbook/smbdotconf/protocol/unicode.xml deleted file mode 100644 index 866dad28a05..00000000000 --- a/docs/docbook/smbdotconf/protocol/unicode.xml +++ /dev/null @@ -1,11 +0,0 @@ - - unicode (G) - Specifies whether Samba should try - to use unicode on the wire by default. Note: This does NOT - mean that samba will assume that the unix machine uses unicode! - - - Default: unicode = yes - - - diff --git a/docs/docbook/smbdotconf/protocol/unixextensions.xml b/docs/docbook/smbdotconf/protocol/unixextensions.xml deleted file mode 100644 index d0adde9d27e..00000000000 --- a/docs/docbook/smbdotconf/protocol/unixextensions.xml +++ /dev/null @@ -1,12 +0,0 @@ - - unix extensions(G) - This boolean parameter controls whether Samba - implments the CIFS UNIX extensions, as defined by HP. - These extensions enable Samba to better serve UNIX CIFS clients - by supporting features such as symbolic links, hard links, etc... - These extensions require a similarly enabled client, and are of - no current use to Windows clients. - - Default: unix extensions = no - - diff --git a/docs/docbook/smbdotconf/protocol/usespnego.xml b/docs/docbook/smbdotconf/protocol/usespnego.xml deleted file mode 100644 index 9e3c873a4b1..00000000000 --- a/docs/docbook/smbdotconf/protocol/usespnego.xml +++ /dev/null @@ -1,11 +0,0 @@ - - use spnego (G) - This variable controls controls whether samba will try - to use Simple and Protected NEGOciation (as specified by rfc2478) with - WindowsXP and Windows2000sp2 clients to agree upon an authentication mechanism. - Unless further issues are discovered with our SPNEGO - implementation, there is no reason this should ever be - disabled. - Default: use spnego = yes - - diff --git a/docs/docbook/smbdotconf/protocol/writeraw.xml b/docs/docbook/smbdotconf/protocol/writeraw.xml deleted file mode 100644 index dbaad0130ec..00000000000 --- a/docs/docbook/smbdotconf/protocol/writeraw.xml +++ /dev/null @@ -1,9 +0,0 @@ - - write raw (G) - This parameter controls whether or not the server - will support raw write SMB's when transferring data from clients. - You should never need to change this parameter. - - Default: write raw = yes - - diff --git a/docs/docbook/smbdotconf/security/adminusers.xml b/docs/docbook/smbdotconf/security/adminusers.xml deleted file mode 100644 index 2e1abaf6e15..00000000000 --- a/docs/docbook/smbdotconf/security/adminusers.xml +++ /dev/null @@ -1,15 +0,0 @@ - - admin users (S) - This is a list of users who will be granted - administrative privileges on the share. This means that they - will do all file operations as the super-user (root). - - You should use this option very carefully, as any user in - this list will be able to do anything they like on the share, - irrespective of file permissions. - - Default: no admin users - - Example: admin users = jason - - diff --git a/docs/docbook/smbdotconf/security/algorithmicridbase.xml b/docs/docbook/smbdotconf/security/algorithmicridbase.xml deleted file mode 100644 index 3c2bf8686eb..00000000000 --- a/docs/docbook/smbdotconf/security/algorithmicridbase.xml +++ /dev/null @@ -1,22 +0,0 @@ - - algorithmic rid base (G) - This determines how Samba will use its - algorithmic mapping from uids/gid to the RIDs needed to construct - NT Security Identifiers. - - Setting this option to a larger value could be useful to sites - transitioning from WinNT and Win2k, as existing user and - group rids would otherwise clash with sytem users etc. - - - All UIDs and GIDs must be able to be resolved into SIDs for - the correct operation of ACLs on the server. As such the algorithmic - mapping can't be 'turned off', but pushing it 'out of the way' should - resolve the issues. Users and groups can then be assigned 'low' RIDs - in arbitary-rid supporting backends. - - Default: algorithmic rid base = 1000 - - Example: algorithmic rid base = 100000 - - diff --git a/docs/docbook/smbdotconf/security/allowhosts.xml b/docs/docbook/smbdotconf/security/allowhosts.xml deleted file mode 100644 index 7fd2f426f8e..00000000000 --- a/docs/docbook/smbdotconf/security/allowhosts.xml +++ /dev/null @@ -1,5 +0,0 @@ - - allow hosts (S) - Synonym for - hosts allow. - diff --git a/docs/docbook/smbdotconf/security/allowtrusteddomains.xml b/docs/docbook/smbdotconf/security/allowtrusteddomains.xml deleted file mode 100644 index 35dcd76cbda..00000000000 --- a/docs/docbook/smbdotconf/security/allowtrusteddomains.xml +++ /dev/null @@ -1,22 +0,0 @@ - - allow trusted domains (G) - This option only takes effect when the security option is set to - server or domain. - If it is set to no, then attempts to connect to a resource from - a domain or workgroup other than the one which smbd is running - in will fail, even if that domain is trusted by the remote server - doing the authentication. - - This is useful if you only want your Samba server to - serve resources to users in the domain it is a member of. As - an example, suppose that there are two domains DOMA and DOMB. DOMB - is trusted by DOMA, which contains the Samba server. Under normal - circumstances, a user with an account in DOMB can then access the - resources of a UNIX account with the same account name on the - Samba server even if they do not have an account in DOMA. This - can make implementing a security boundary difficult. - - Default: allow trusted domains = yes - - - diff --git a/docs/docbook/smbdotconf/security/authmethods.xml b/docs/docbook/smbdotconf/security/authmethods.xml deleted file mode 100644 index 2e569558a09..00000000000 --- a/docs/docbook/smbdotconf/security/authmethods.xml +++ /dev/null @@ -1,16 +0,0 @@ - - auth methods (G) - This option allows the administrator to chose what - authentication methods smbd will use when authenticating - a user. This option defaults to sensible values based on - security. - - Each entry in the list attempts to authenticate the user in turn, until - the user authenticates. In practice only one method will ever actually - be able to complete the authentication. - - - Default: auth methods = <empty string> - Example: auth methods = guest sam ntdomain - - diff --git a/docs/docbook/smbdotconf/security/createmask.xml b/docs/docbook/smbdotconf/security/createmask.xml deleted file mode 100644 index 9a197bf7c31..00000000000 --- a/docs/docbook/smbdotconf/security/createmask.xml +++ /dev/null @@ -1,39 +0,0 @@ - - create mask (S) - A synonym for this parameter is - create mode - . - - When a file is created, the necessary permissions are - calculated according to the mapping from DOS modes to UNIX - permissions, and the resulting UNIX mode is then bit-wise 'AND'ed - with this parameter. This parameter may be thought of as a bit-wise - MASK for the UNIX modes of a file. Any bit not - set here will be removed from the modes set on a file when it is - created. - - The default value of this parameter removes the - 'group' and 'other' write and execute bits from the UNIX modes. - - Following this Samba will bit-wise 'OR' the UNIX mode created - from this parameter with the value of the force create mode - parameter which is set to 000 by default. - - This parameter does not affect directory modes. See the - parameter directory mode - for details. - - See also the force - create mode parameter for forcing particular mode - bits to be set on created files. See also the - directory mode parameter for masking - mode bits on created directories. See also the - inherit permissions parameter. - - Note that this parameter does not apply to permissions - set by Windows NT/2000 ACL editors. If the administrator wishes to enforce - a mask on access control lists also, they need to set the security mask. - - Default: create mask = 0744 - Example: create mask = 0775 - diff --git a/docs/docbook/smbdotconf/security/createmode.xml b/docs/docbook/smbdotconf/security/createmode.xml deleted file mode 100644 index 7e78ab01811..00000000000 --- a/docs/docbook/smbdotconf/security/createmode.xml +++ /dev/null @@ -1,5 +0,0 @@ - - create mode (S) - This is a synonym for - create mask. - diff --git a/docs/docbook/smbdotconf/security/denyhosts.xml b/docs/docbook/smbdotconf/security/denyhosts.xml deleted file mode 100644 index f50fb33d336..00000000000 --- a/docs/docbook/smbdotconf/security/denyhosts.xml +++ /dev/null @@ -1,5 +0,0 @@ - - deny hosts (S) - Synonym for hosts - deny. - diff --git a/docs/docbook/smbdotconf/security/directorymask.xml b/docs/docbook/smbdotconf/security/directorymask.xml deleted file mode 100644 index 0844733edec..00000000000 --- a/docs/docbook/smbdotconf/security/directorymask.xml +++ /dev/null @@ -1,43 +0,0 @@ - - directory mask (S) - This parameter is the octal modes which are - used when converting DOS modes to UNIX modes when creating UNIX - directories. - - When a directory is created, the necessary permissions are - calculated according to the mapping from DOS modes to UNIX permissions, - and the resulting UNIX mode is then bit-wise 'AND'ed with this - parameter. This parameter may be thought of as a bit-wise MASK for - the UNIX modes of a directory. Any bit not set - here will be removed from the modes set on a directory when it is - created. - - The default value of this parameter removes the 'group' - and 'other' write bits from the UNIX mode, allowing only the - user who owns the directory to modify it. - - Following this Samba will bit-wise 'OR' the UNIX mode - created from this parameter with the value of the force directory mode - parameter. This parameter is set to 000 by - default (i.e. no extra mode bits are added). - - Note that this parameter does not apply to permissions - set by Windows NT/2000 ACL editors. If the administrator wishes to enforce - a mask on access control lists also, they need to set the directory security mask. - - See the force - directory mode parameter to cause particular mode - bits to always be set on created directories. - - See also the create mode - parameter for masking mode bits on created files, - and the directory - security mask parameter. - - Also refer to the - inherit permissions parameter. - - Default: directory mask = 0755 - Example: directory mask = 0775 - - diff --git a/docs/docbook/smbdotconf/security/directorymode.xml b/docs/docbook/smbdotconf/security/directorymode.xml deleted file mode 100644 index 9678cd91ad4..00000000000 --- a/docs/docbook/smbdotconf/security/directorymode.xml +++ /dev/null @@ -1,5 +0,0 @@ - - directory mode (S) - Synonym for - directory mask - diff --git a/docs/docbook/smbdotconf/security/directorysecuritymask.xml b/docs/docbook/smbdotconf/security/directorysecuritymask.xml deleted file mode 100644 index 76d153f6f4d..00000000000 --- a/docs/docbook/smbdotconf/security/directorysecuritymask.xml +++ /dev/null @@ -1,32 +0,0 @@ - - directory security mask (S) - This parameter controls what UNIX permission bits - can be modified when a Windows NT client is manipulating the UNIX - permission on a directory using the native NT security dialog - box. - - This parameter is applied as a mask (AND'ed with) to - the changed permission bits, thus preventing any bits not in - this mask from being modified. Essentially, zero bits in this - mask may be treated as a set of bits the user is not allowed - to change. - - If not set explicitly this parameter is set to 0777 - meaning a user is allowed to modify all the user/group/world - permissions on a directory. - - Note that users who can access the - Samba server through other means can easily bypass this restriction, - so it is primarily useful for standalone "appliance" systems. - Administrators of most normal systems will probably want to leave - it as the default of 0777. - - See also the - force directory security mode, security mask, - force security mode - parameters. - - Default: directory security mask = 0777 - Example: directory security mask = 0700 - - diff --git a/docs/docbook/smbdotconf/security/encryptpasswords.xml b/docs/docbook/smbdotconf/security/encryptpasswords.xml deleted file mode 100644 index d7ceb8d5986..00000000000 --- a/docs/docbook/smbdotconf/security/encryptpasswords.xml +++ /dev/null @@ -1,21 +0,0 @@ - - encrypt passwords (G) - This boolean controls whether encrypted passwords - will be negotiated with the client. Note that Windows NT 4.0 SP3 and - above and also Windows 98 will by default expect encrypted passwords - unless a registry entry is changed. To use encrypted passwords in - Samba see the file ENCRYPTION.txt in the Samba documentation - directory docs/ shipped with the source code. - - In order for encrypted passwords to work correctly - smbd - 8 must either - have access to a local smbpasswd - 5 file (see the smbpasswd - 8 program for information on how to set up - and maintain this file), or set the security = [server|domain|ads] parameter which - causes smbd to authenticate against another - server. - - Default: encrypt passwords = yes - diff --git a/docs/docbook/smbdotconf/security/forcecreatemode.xml b/docs/docbook/smbdotconf/security/forcecreatemode.xml deleted file mode 100644 index 238340d7c5f..00000000000 --- a/docs/docbook/smbdotconf/security/forcecreatemode.xml +++ /dev/null @@ -1,25 +0,0 @@ - - force create mode (S) - This parameter specifies a set of UNIX mode bit - permissions that will always be set on a - file created by Samba. This is done by bitwise 'OR'ing these bits onto - the mode bits of a file that is being created or having its - permissions changed. The default for this parameter is (in octal) - 000. The modes in this parameter are bitwise 'OR'ed onto the file - mode after the mask set in the create mask - parameter is applied. - - See also the parameter create - mask for details on masking mode bits on files. - - See also the inherit - permissions parameter. - - Default: force create mode = 000 - Example: force create mode = 0755 - - would force all created files to have read and execute - permissions set for 'group' and 'other' as well as the - read/write/execute bits set for the 'user'. - - diff --git a/docs/docbook/smbdotconf/security/forcedirectorymode.xml b/docs/docbook/smbdotconf/security/forcedirectorymode.xml deleted file mode 100644 index 460a7fc6f28..00000000000 --- a/docs/docbook/smbdotconf/security/forcedirectorymode.xml +++ /dev/null @@ -1,26 +0,0 @@ - - force directory mode (S) - This parameter specifies a set of UNIX mode bit - permissions that will always be set on a directory - created by Samba. This is done by bitwise 'OR'ing these bits onto the - mode bits of a directory that is being created. The default for this - parameter is (in octal) 0000 which will not add any extra permission - bits to a created directory. This operation is done after the mode - mask in the parameter directory mask is - applied. - - See also the parameter - directory mask for details on masking mode bits - on created directories. - - See also the - inherit permissions parameter. - - Default: force directory mode = 000 - Example: force directory mode = 0755 - - would force all created directories to have read and execute - permissions set for 'group' and 'other' as well as the - read/write/execute bits set for the 'user'. - - diff --git a/docs/docbook/smbdotconf/security/forcedirectorysecuritymode.xml b/docs/docbook/smbdotconf/security/forcedirectorysecuritymode.xml deleted file mode 100644 index a01b297b055..00000000000 --- a/docs/docbook/smbdotconf/security/forcedirectorysecuritymode.xml +++ /dev/null @@ -1,32 +0,0 @@ - - force directory security mode (S) - This parameter controls what UNIX permission bits - can be modified when a Windows NT client is manipulating the UNIX - permission on a directory using the native NT security dialog box. - - This parameter is applied as a mask (OR'ed with) to the - changed permission bits, thus forcing any bits in this mask that - the user may have modified to be on. Essentially, one bits in this - mask may be treated as a set of bits that, when modifying security - on a directory, the user has always set to be 'on'. - - If not set explicitly this parameter is 000, which - allows a user to modify all the user/group/world permissions on a - directory without restrictions. - - Note that users who can access the - Samba server through other means can easily bypass this restriction, - so it is primarily useful for standalone "appliance" systems. - Administrators of most normal systems will probably want to leave - it set as 0000. - - See also the - directory security mask, - security mask, - force security mode - parameters. - - Default: force directory security mode = 0 - Example: force directory security mode = 700 - - diff --git a/docs/docbook/smbdotconf/security/forcegroup.xml b/docs/docbook/smbdotconf/security/forcegroup.xml deleted file mode 100644 index abfec79e030..00000000000 --- a/docs/docbook/smbdotconf/security/forcegroup.xml +++ /dev/null @@ -1,35 +0,0 @@ - - force group (S) - This specifies a UNIX group name that will be - assigned as the default primary group for all users connecting - to this service. This is useful for sharing files by ensuring - that all access to files on service will use the named group for - their permissions checking. Thus, by assigning permissions for this - group to the files and directories within this service the Samba - administrator can restrict or allow sharing of these files. - - In Samba 2.0.5 and above this parameter has extended - functionality in the following way. If the group name listed here - has a '+' character prepended to it then the current user accessing - the share only has the primary group default assigned to this group - if they are already assigned as a member of that group. This allows - an administrator to decide that only users who are already in a - particular group will create files with group ownership set to that - group. This gives a finer granularity of ownership assignment. For - example, the setting force group = +sys means - that only users who are already in group sys will have their default - primary group assigned to sys when accessing this Samba share. All - other users will retain their ordinary primary group. - - If the force user - parameter is also set the group specified in - force group will override the primary group - set in force user. - - See also force - user. - - Default: no forced group - Example: force group = agroup - - diff --git a/docs/docbook/smbdotconf/security/forcesecuritymode.xml b/docs/docbook/smbdotconf/security/forcesecuritymode.xml deleted file mode 100644 index 2db50f1ce3f..00000000000 --- a/docs/docbook/smbdotconf/security/forcesecuritymode.xml +++ /dev/null @@ -1,33 +0,0 @@ - - force security mode (S) - This parameter controls what UNIX permission - bits can be modified when a Windows NT client is manipulating - the UNIX permission on a file using the native NT security dialog - box. - - This parameter is applied as a mask (OR'ed with) to the - changed permission bits, thus forcing any bits in this mask that - the user may have modified to be on. Essentially, one bits in this - mask may be treated as a set of bits that, when modifying security - on a file, the user has always set to be 'on'. - - If not set explicitly this parameter is set to 0, - and allows a user to modify all the user/group/world permissions on a file, - with no restrictions. - - Note that users who can access - the Samba server through other means can easily bypass this restriction, - so it is primarily useful for standalone "appliance" systems. - Administrators of most normal systems will probably want to leave - this set to 0000. - - See also the - force directory security mode, - directory security - mask, - security mask parameters. - - Default: force security mode = 0 - Example: force security mode = 700 - - diff --git a/docs/docbook/smbdotconf/security/forceuser.xml b/docs/docbook/smbdotconf/security/forceuser.xml deleted file mode 100644 index 4747db13fea..00000000000 --- a/docs/docbook/smbdotconf/security/forceuser.xml +++ /dev/null @@ -1,25 +0,0 @@ - - force user (S) - This specifies a UNIX user name that will be - assigned as the default user for all users connecting to this service. - This is useful for sharing files. You should also use it carefully - as using it incorrectly can cause security problems. - - This user name only gets used once a connection is established. - Thus clients still need to connect as a valid user and supply a - valid password. Once connected, all file operations will be performed - as the "forced user", no matter what username the client connected - as. This can be very useful. - - In Samba 2.0.5 and above this parameter also causes the - primary group of the forced user to be used as the primary group - for all file activity. Prior to 2.0.5 the primary group was left - as the primary group of the connecting user (this was a bug). - - See also force group - - - Default: no forced user - Example: force user = auser - - diff --git a/docs/docbook/smbdotconf/security/group.xml b/docs/docbook/smbdotconf/security/group.xml deleted file mode 100644 index afc410ce340..00000000000 --- a/docs/docbook/smbdotconf/security/group.xml +++ /dev/null @@ -1,5 +0,0 @@ - - group (S) - Synonym for force - group. - diff --git a/docs/docbook/smbdotconf/security/guestaccount.xml b/docs/docbook/smbdotconf/security/guestaccount.xml deleted file mode 100644 index ab15c4460d1..00000000000 --- a/docs/docbook/smbdotconf/security/guestaccount.xml +++ /dev/null @@ -1,27 +0,0 @@ - - guest account (S) - This is a username which will be used for access - to services which are specified as - guest ok (see below). Whatever privileges this - user has will be available to any client connecting to the guest service. - Typically this user will exist in the password file, but will not - have a valid login. The user account "ftp" is often a good choice - for this parameter. If a username is specified in a given service, - the specified username overrides this one. - - One some systems the default guest account "nobody" may not - be able to print. Use another account in this case. You should test - this by trying to log in as your guest user (perhaps by using the - su - command) and trying to print using the - system print command such as lpr(1) or - lp(1). - - This parameter does not accept % macros, because - many parts of the system require this value to be - constant for correct operation. - - Default: specified at compile time, usually - "nobody" - - Example: guest account = ftp - diff --git a/docs/docbook/smbdotconf/security/guestok.xml b/docs/docbook/smbdotconf/security/guestok.xml deleted file mode 100644 index 2b7a8cee8a0..00000000000 --- a/docs/docbook/smbdotconf/security/guestok.xml +++ /dev/null @@ -1,17 +0,0 @@ - - guest ok (S) - If this parameter is yes for - a service, then no password is required to connect to the service. - Privileges will be those of the - guest account. - - This paramater nullifies the benifits of setting - restrict - anonymous = 2 - - See the section below on - security for more information about this option. - - - Default: guest ok = no - diff --git a/docs/docbook/smbdotconf/security/guestonly.xml b/docs/docbook/smbdotconf/security/guestonly.xml deleted file mode 100644 index ac7f62ad68a..00000000000 --- a/docs/docbook/smbdotconf/security/guestonly.xml +++ /dev/null @@ -1,13 +0,0 @@ - - guest only (S) - If this parameter is yes for - a service, then only guest connections to the service are permitted. - This parameter will have no effect if - guest ok is not set for the service. - - See the section below on - security for more information about this option. - - - Default: guest only = no - diff --git a/docs/docbook/smbdotconf/security/hostsallow.xml b/docs/docbook/smbdotconf/security/hostsallow.xml deleted file mode 100644 index ea91b739039..00000000000 --- a/docs/docbook/smbdotconf/security/hostsallow.xml +++ /dev/null @@ -1,60 +0,0 @@ - - hosts allow (S) - A synonym for this parameter is allow - hosts. - - This parameter is a comma, space, or tab delimited - set of hosts which are permitted to access a service. - - If specified in the [global] section then it will - apply to all services, regardless of whether the individual - service has a different setting. - - You can specify the hosts by name or IP number. For - example, you could restrict access to only the hosts on a - Class C subnet with something like allow hosts = 150.203.5. - . The full syntax of the list is described in the man - page hosts_access(5). Note that this man - page may not be present on your system, so a brief description will - be given here also. - - Note that the localhost address 127.0.0.1 will always - be allowed access unless specifically denied by a hosts deny option. - - You can also specify hosts by network/netmask pairs and - by netgroup names if your system supports netgroups. The - EXCEPT keyword can also be used to limit a - wildcard list. The following examples may provide some help: - - Example 1: allow all IPs in 150.203.*.*; except one - - hosts allow = 150.203. EXCEPT 150.203.6.66 - - Example 2: allow hosts that match the given network/netmask - - hosts allow = 150.203.15.0/255.255.255.0 - - Example 3: allow a couple of hosts - - hosts allow = lapland, arvidsjaur - - Example 4: allow only hosts in NIS netgroup "foonet", but - deny access from one particular host - - hosts allow = @foonet - - hosts deny = pirate - - Note that access still requires suitable user-level passwords. - - See testparm - 1 for a way of testing your host access - to see if it does what you expect. - - Default: none (i.e., all hosts permitted access) - - - Example: allow hosts = 150.203.5. myhost.mynet.edu.au - - - diff --git a/docs/docbook/smbdotconf/security/hostsdeny.xml b/docs/docbook/smbdotconf/security/hostsdeny.xml deleted file mode 100644 index f37e2b7e4df..00000000000 --- a/docs/docbook/smbdotconf/security/hostsdeny.xml +++ /dev/null @@ -1,14 +0,0 @@ - - hosts deny (S) - The opposite of hosts allow - - hosts listed here are NOT permitted access to - services unless the specific services have their own lists to override - this one. Where the lists conflict, the allow - list takes precedence. - - Default: none (i.e., no hosts specifically excluded) - - - Example: hosts deny = 150.203.4. badhost.mynet.edu.au - - diff --git a/docs/docbook/smbdotconf/security/hostsequiv.xml b/docs/docbook/smbdotconf/security/hostsequiv.xml deleted file mode 100644 index 084d8268ef5..00000000000 --- a/docs/docbook/smbdotconf/security/hostsequiv.xml +++ /dev/null @@ -1,26 +0,0 @@ - - hosts equiv (G) - If this global parameter is a non-null string, - it specifies the name of a file to read for the names of hosts - and users who will be allowed access without specifying a password. - - - This is not be confused with - hosts allow which is about hosts - access to services and is more useful for guest services. - hosts equiv may be useful for NT clients which will - not supply passwords to Samba. - - The use of hosts equiv - can be a major security hole. This is because you are - trusting the PC to supply the correct username. It is very easy to - get a PC to supply a false username. I recommend that the - hosts equiv option be only used if you really - know what you are doing, or perhaps on a home network where you trust - your spouse and kids. And only if you really trust - them :-). - - Default: no host equivalences - Example: hosts equiv = /etc/hosts.equiv - - diff --git a/docs/docbook/smbdotconf/security/inheritacls.xml b/docs/docbook/smbdotconf/security/inheritacls.xml deleted file mode 100644 index f70c0d91653..00000000000 --- a/docs/docbook/smbdotconf/security/inheritacls.xml +++ /dev/null @@ -1,14 +0,0 @@ - - inherit acls (S) - This parameter can be used to ensure - that if default acls exist on parent directories, - they are always honored when creating a subdirectory. - The default behavior is to use the mode specified - when creating the directory. Enabling this option - sets the mode to 0777, thus guaranteeing that - default directory acls are propagated. - - - Default: inherit acls = no - - diff --git a/docs/docbook/smbdotconf/security/inheritpermissions.xml b/docs/docbook/smbdotconf/security/inheritpermissions.xml deleted file mode 100644 index 34fade33d02..00000000000 --- a/docs/docbook/smbdotconf/security/inheritpermissions.xml +++ /dev/null @@ -1,36 +0,0 @@ - - inherit permissions (S) - The permissions on new files and directories - are normally governed by - create mask, - directory mask, force create mode - and force - directory mode but the boolean inherit - permissions parameter overrides this. - - New directories inherit the mode of the parent directory, - including bits such as setgid. - - New files inherit their read/write bits from the parent - directory. Their execute bits continue to be determined by - map archive - , map hidden - and map system - as usual. - - Note that the setuid bit is never set via - inheritance (the code explicitly prohibits this). - - This can be particularly useful on large systems with - many users, perhaps several thousand, to allow a single [homes] - share to be used flexibly by each user. - - See also create mask - , - directory mask, - force create mode and force directory mode - . - - Default: inherit permissions = no - - diff --git a/docs/docbook/smbdotconf/security/invalidusers.xml b/docs/docbook/smbdotconf/security/invalidusers.xml deleted file mode 100644 index 34e534ff286..00000000000 --- a/docs/docbook/smbdotconf/security/invalidusers.xml +++ /dev/null @@ -1,33 +0,0 @@ - - invalid users (S) - This is a list of users that should not be allowed - to login to this service. This is really a paranoid - check to absolutely ensure an improper setting does not breach - your security. - - A name starting with a '@' is interpreted as an NIS - netgroup first (if your system supports NIS), and then as a UNIX - group if the name was not found in the NIS netgroup database. - - A name starting with '+' is interpreted only - by looking in the UNIX group database. A name starting with - '&' is interpreted only by looking in the NIS netgroup database - (this requires NIS to be working on your system). The characters - '+' and '&' may be used at the start of the name in either order - so the value +&group means check the - UNIX group database, followed by the NIS netgroup database, and - the value &+group means check the NIS - netgroup database, followed by the UNIX group database (the - same as the '@' prefix). - - The current servicename is substituted for %S. - This is useful in the [homes] section. - - See also valid users - . - - Default: no invalid users - Example: invalid users = root fred admin @wheel - - - diff --git a/docs/docbook/smbdotconf/security/lanmanauth.xml b/docs/docbook/smbdotconf/security/lanmanauth.xml deleted file mode 100644 index 851b1ae4ac8..00000000000 --- a/docs/docbook/smbdotconf/security/lanmanauth.xml +++ /dev/null @@ -1,11 +0,0 @@ - - lanman auth (G) - This parameter determines whether or not smbd - 8 will attempt to authenticate users - using the LANMAN password hash. If disabled, only clients which support NT - password hashes (e.g. Windows NT/2000 clients, smbclient, etc... but not - Windows 95/98 or the MS DOS network client) will be able to connect to the Samba host. - - Default : lanman auth = yes - - diff --git a/docs/docbook/smbdotconf/security/maptoguest.xml b/docs/docbook/smbdotconf/security/maptoguest.xml deleted file mode 100644 index 966260a9b1f..00000000000 --- a/docs/docbook/smbdotconf/security/maptoguest.xml +++ /dev/null @@ -1,53 +0,0 @@ - - map to guest (G) - This parameter is only useful in - security modes other than security = share - - i.e. user, server, - and domain. - - This parameter can take three different values, which tell - smbd - 8 what to do with user - login requests that don't match a valid UNIX user in some way. - - The three settings are : - - - Never - Means user login - requests with an invalid password are rejected. This is the - default. - - Bad User - Means user - logins with an invalid password are rejected, unless the username - does not exist, in which case it is treated as a guest login and - mapped into the - guest account. - - Bad Password - Means user logins - with an invalid password are treated as a guest login and mapped - into the guest account. Note that - this can cause problems as it means that any user incorrectly typing - their password will be silently logged on as "guest" - and - will not know the reason they cannot access files they think - they should - there will have been no message given to them - that they got their password wrong. Helpdesk services will - hate you if you set the map to - guest parameter this way :-). - - - Note that this parameter is needed to set up "Guest" - share services when using security modes other than - share. This is because in these modes the name of the resource being - requested is not sent to the server until after - the server has successfully authenticated the client so the server - cannot make authentication decisions at the correct time (connection - to the share) for "Guest" shares. - - For people familiar with the older Samba releases, this - parameter maps to the old compile-time setting of the - GUEST_SESSSETUP value in local.h. - - Default: map to guest = Never - Example: map to guest = Bad User - - diff --git a/docs/docbook/smbdotconf/security/minpasswdlength.xml b/docs/docbook/smbdotconf/security/minpasswdlength.xml deleted file mode 100644 index 8e52b923fbc..00000000000 --- a/docs/docbook/smbdotconf/security/minpasswdlength.xml +++ /dev/null @@ -1,6 +0,0 @@ - - min passwd length (G) - Synonym for - min password length. - - diff --git a/docs/docbook/smbdotconf/security/minpasswordlength.xml b/docs/docbook/smbdotconf/security/minpasswordlength.xml deleted file mode 100644 index da1e65a55bc..00000000000 --- a/docs/docbook/smbdotconf/security/minpasswordlength.xml +++ /dev/null @@ -1,14 +0,0 @@ - - min password length (G) - This option sets the minimum length in characters - of a plaintext password that smbd will accept when performing - UNIX password changing. - - See also unix - password sync, - passwd program and passwd chat debug - . - - Default: min password length = 5 - - diff --git a/docs/docbook/smbdotconf/security/nonunixaccountrange.xml b/docs/docbook/smbdotconf/security/nonunixaccountrange.xml deleted file mode 100644 index baa9a783b08..00000000000 --- a/docs/docbook/smbdotconf/security/nonunixaccountrange.xml +++ /dev/null @@ -1,21 +0,0 @@ - - non unix account range (G) - The non unix account range parameter specifies - the range of 'user ids' that are allocated by the various 'non unix - account' passdb backends. These backends allow - the storage of passwords for users who don't exist in /etc/passwd. - This is most often used for machine account creation. - This range of ids should have no existing local or NIS users within - it as strange conflicts can occur otherwise. - - These userids never appear on the system and Samba will never - 'become' these users. They are used only to ensure that the algorithmic - RID mapping does not conflict with normal users. - - - Default: non unix account range = <empty string> - - - Example: non unix account range = 10000-20000 - - diff --git a/docs/docbook/smbdotconf/security/ntlmauth.xml b/docs/docbook/smbdotconf/security/ntlmauth.xml deleted file mode 100644 index a3b8caf0627..00000000000 --- a/docs/docbook/smbdotconf/security/ntlmauth.xml +++ /dev/null @@ -1,16 +0,0 @@ - - ntlm auth (G) - This parameter determines - whether or not smbd - 8 will - attempt to authenticate users using the NTLM password hash. - If disabled, only the lanman password hashes will be used. - - - Please note that at least this option or lanman auth should - be enabled in order to be able to log in. - - - Default : ntlm auth = yes - - diff --git a/docs/docbook/smbdotconf/security/nullpasswords.xml b/docs/docbook/smbdotconf/security/nullpasswords.xml deleted file mode 100644 index 40b687fceb6..00000000000 --- a/docs/docbook/smbdotconf/security/nullpasswords.xml +++ /dev/null @@ -1,11 +0,0 @@ - - null passwords (G) - Allow or disallow client access to accounts - that have null passwords. - - See also smbpasswd - 5. - - Default: null passwords = no - - diff --git a/docs/docbook/smbdotconf/security/obeypamrestrictions.xml b/docs/docbook/smbdotconf/security/obeypamrestrictions.xml deleted file mode 100644 index 92a6bce22d2..00000000000 --- a/docs/docbook/smbdotconf/security/obeypamrestrictions.xml +++ /dev/null @@ -1,15 +0,0 @@ - - obey pam restrictions (G) - When Samba 2.2 is configured to enable PAM support - (i.e. --with-pam), this parameter will control whether or not Samba - should obey PAM's account and session management directives. The - default behavior is to use PAM for clear text authentication only - and to ignore any account or session management. Note that Samba - always ignores PAM for authentication in the case of encrypt passwords = yes - . The reason is that PAM modules cannot support the challenge/response - authentication mechanism needed in the presence of SMB password encryption. - - - Default: obey pam restrictions = no - - diff --git a/docs/docbook/smbdotconf/security/onlyguest.xml b/docs/docbook/smbdotconf/security/onlyguest.xml deleted file mode 100644 index 018fa1a0b5d..00000000000 --- a/docs/docbook/smbdotconf/security/onlyguest.xml +++ /dev/null @@ -1,6 +0,0 @@ - - only guest (S) - A synonym for - guest only. - - diff --git a/docs/docbook/smbdotconf/security/onlyuser.xml b/docs/docbook/smbdotconf/security/onlyuser.xml deleted file mode 100644 index d0bbac7541b..00000000000 --- a/docs/docbook/smbdotconf/security/onlyuser.xml +++ /dev/null @@ -1,24 +0,0 @@ - - only user (S) - This is a boolean option that controls whether - connections with usernames not in the user - list will be allowed. By default this option is disabled so that a - client can supply a username to be used by the server. Enabling - this parameter will force the server to only use the login - names from the user list and is only really - useful in share level - security. - - Note that this also means Samba won't try to deduce - usernames from the service name. This can be annoying for - the [homes] section. To get around this you could use user = - %S which means your user list - will be just the service name, which for home directories is the - name of the user. - - See also the user - parameter. - - Default: only user = no - - diff --git a/docs/docbook/smbdotconf/security/pampasswordchange.xml b/docs/docbook/smbdotconf/security/pampasswordchange.xml deleted file mode 100644 index 8f0e91ae2d9..00000000000 --- a/docs/docbook/smbdotconf/security/pampasswordchange.xml +++ /dev/null @@ -1,16 +0,0 @@ - - pam password change (G) - With the addition of better PAM support in Samba 2.2, - this parameter, it is possible to use PAM's password change control - flag for Samba. If enabled, then PAM will be used for password - changes when requested by an SMB client instead of the program listed in - passwd program. - It should be possible to enable this without changing your - passwd chat - parameter for most setups. - - - Default: pam password change = no - - - diff --git a/docs/docbook/smbdotconf/security/passdbbackend.xml b/docs/docbook/smbdotconf/security/passdbbackend.xml deleted file mode 100644 index 918c802e789..00000000000 --- a/docs/docbook/smbdotconf/security/passdbbackend.xml +++ /dev/null @@ -1,91 +0,0 @@ - - passdb backend (G) - This option allows the administrator to chose which backends to retrieve and store passwords with. This allows (for example) both - smbpasswd and tdbsam to be used without a recompile. - Multiple backends can be specified, separated by spaces. The backends will be searched in the order they are specified. New users are always added to the first backend specified. - Experimental backends must still be selected - (eg --with-tdbsam) at configure time. - - - This parameter is in two parts, the backend's name, and a 'location' - string that has meaning only to that particular backed. These are separated - by a : character. - - Available backends can include: - - smbpasswd - The default smbpasswd - backend. Takes a path to the smbpasswd file as an optional argument. - - smbpasswd_nua - The smbpasswd - backend, but with support for 'not unix accounts'. - Takes a path to the smbpasswd file as an optional argument. - See also - non unix account range - - tdbsam - The TDB based password storage - backend. Takes a path to the TDB as an optional argument (defaults to passdb.tdb - in the - private dir directory. - - tdbsam_nua - The TDB based password storage - backend, with non unix account support. Takes a path to the TDB as an optional argument (defaults to passdb.tdb - in the - private dir directory. - See also - non unix account range - - ldapsam - The LDAP based passdb - backend. Takes an LDAP URL as an optional argument (defaults to - ldap://localhost) - - ldapsam_nua - The LDAP based passdb - backend, with non unix account support. Takes an LDAP URL as an optional argument (defaults to - ldap://localhost) - - Note: In this module, any account without a matching POSIX account is regarded - as 'non unix'. - - See also - non unix account - range - - LDAP connections should be secured where - possible. This may be done using either - Start-TLS (see - ldap ssl) or by - specifying ldaps:// in - the URL argument. - - - nisplussam - The NIS+ based passdb backend. Takes name NIS domain as an optional argument. Only works with sun NIS+ servers. - - plugin - Allows Samba to load an - arbitary passdb backend from the .so specified as a compulsary argument. - - - Any characters after the (optional) second : are passed to the plugin - for its own processing - - - unixsam - Allows samba to map all (other) available unix users - - This backend uses the standard unix database for retrieving users. Users included - in this pdb are NOT listed in samba user listings and users included in this pdb won't be - able to login. The use of this backend is to always be able to display the owner of a file - on the samba server - even when the user doesn't have a 'real' samba account in one of the - other passdb backends. - - - This backend should always be the last backend listed, since it contains all users in - the unix passdb and might 'override' mappings if specified earlier. It's meant to only return - accounts for users that aren't covered by the previous backends. - - - - - Default: passdb backend = smbpasswd unixsam - Example: passdb backend = tdbsam:/etc/samba/private/passdb.tdb smbpasswd:/etc/samba/smbpasswd unixsam - Example: passdb backend = ldapsam_nua:ldaps://ldap.example.com unixsam - Example: passdb backend = plugin:/usr/local/samba/lib/my_passdb.so:my_plugin_args tdbsam:/etc/samba/private/passdb.tdb - - diff --git a/docs/docbook/smbdotconf/security/passwdchat.xml b/docs/docbook/smbdotconf/security/passwdchat.xml deleted file mode 100644 index 922f1a878cb..00000000000 --- a/docs/docbook/smbdotconf/security/passwdchat.xml +++ /dev/null @@ -1,58 +0,0 @@ - - passwd chat (G) - This string controls the "chat" - conversation that takes places between smbd - 8 and the local password changing - program to change the user's password. The string describes a - sequence of response-receive pairs that smbd - 8 uses to determine what to send to the - passwd program - and what to expect back. If the expected output is not - received then the password is not changed. - - This chat sequence is often quite site specific, depending - on what local methods are used for password control (such as NIS - etc). - Note that this parameter only is only used if the unix - password sync parameter is set to yes. This - sequence is then called AS ROOT when the SMB password - in the smbpasswd file is being changed, without access to the old - password cleartext. This means that root must be able to reset the user's password - without knowing the text of the previous password. In the presence of NIS/YP, - this means that the passwd program must be - executed on the NIS master. - - - - The string can contain the macro %n which is substituted - for the new password. The chat sequence can also contain the standard - macros \\n, \\r, - \\t and \\s to give line-feed, - carriage-return, tab and space. The chat sequence string can also contain - a '*' which matches any sequence of characters. - Double quotes can be used to collect strings with spaces - in them into a single string. - - If the send string in any part of the chat sequence - is a full stop ".", then no string is sent. Similarly, - if the expect string is a full stop then no string is expected. - - If the pam - password change parameter is set to yes, the chat pairs - may be matched in any order, and success is determined by the PAM result, - not any particular output. The \n macro is ignored for PAM conversions. - - - See also unix password - sync, - passwd program , - passwd chat debug and - pam password change. - - Default: passwd chat = *new*password* %n\\n - *new*password* %n\\n *changed* - Example: passwd chat = "*Enter OLD password*" %o\\n - "*Enter NEW password*" %n\\n "*Reenter NEW password*" %n\\n "*Password - changed*" - - diff --git a/docs/docbook/smbdotconf/security/passwdchatdebug.xml b/docs/docbook/smbdotconf/security/passwdchatdebug.xml deleted file mode 100644 index a5771b72d28..00000000000 --- a/docs/docbook/smbdotconf/security/passwdchatdebug.xml +++ /dev/null @@ -1,25 +0,0 @@ - - passwd chat debug (G) - This boolean specifies if the passwd chat script - parameter is run in debug mode. In this mode the - strings passed to and received from the passwd chat are printed - in the smbd - 8 log with a - debug level - of 100. This is a dangerous option as it will allow plaintext passwords - to be seen in the smbd log. It is available to help - Samba admins debug their passwd chat scripts - when calling the passwd program and should - be turned off after this has been done. This option has no effect if the - pam password change - paramter is set. This parameter is off by default. - - - See also passwd chat - , pam password change - , passwd program - . - - Default: passwd chat debug = no - - diff --git a/docs/docbook/smbdotconf/security/passwdprogram.xml b/docs/docbook/smbdotconf/security/passwdprogram.xml deleted file mode 100644 index dae24e22a19..00000000000 --- a/docs/docbook/smbdotconf/security/passwdprogram.xml +++ /dev/null @@ -1,35 +0,0 @@ - - passwd program (G) - The name of a program that can be used to set - UNIX user passwords. Any occurrences of %u - will be replaced with the user name. The user name is checked for - existence before calling the password changing program. - - Also note that many passwd programs insist in reasonable - passwords, such as a minimum length, or the inclusion - of mixed case chars and digits. This can pose a problem as some clients - (such as Windows for Workgroups) uppercase the password before sending - it. - - Note that if the unix - password sync parameter is set to yes - then this program is called AS ROOT - before the SMB password in the smbpasswd(5) - file is changed. If this UNIX password change fails, then - smbd will fail to change the SMB password also - (this is by design). - - If the unix password sync parameter - is set this parameter MUST USE ABSOLUTE PATHS - for ALL programs called, and must be examined - for security implications. Note that by default unix - password sync is set to no. - - See also unix - password sync. - - Default: passwd program = /bin/passwd - Example: passwd program = /sbin/npasswd %u - - - diff --git a/docs/docbook/smbdotconf/security/passwordlevel.xml b/docs/docbook/smbdotconf/security/passwordlevel.xml deleted file mode 100644 index 408082f838c..00000000000 --- a/docs/docbook/smbdotconf/security/passwordlevel.xml +++ /dev/null @@ -1,40 +0,0 @@ - - password level (G) - Some client/server combinations have difficulty - with mixed-case passwords. One offending client is Windows for - Workgroups, which for some reason forces passwords to upper - case when using the LANMAN1 protocol, but leaves them alone when - using COREPLUS! Another problem child is the Windows 95/98 - family of operating systems. These clients upper case clear - text passwords even when NT LM 0.12 selected by the protocol - negotiation request/response. - - This parameter defines the maximum number of characters - that may be upper case in passwords. - - For example, say the password given was "FRED". If - password level is set to 1, the following combinations - would be tried if "FRED" failed: - - "Fred", "fred", "fRed", "frEd","freD" - - If password level was set to 2, - the following combinations would also be tried: - - "FRed", "FrEd", "FreD", "fREd", "fReD", "frED", .. - - And so on. - - The higher value this parameter is set to the more likely - it is that a mixed case password will be matched against a single - case password. However, you should be aware that use of this - parameter reduces security and increases the time taken to - process a new connection. - - A value of zero will cause only two attempts to be - made - the password as is and the password in all-lower case. - - Default: password level = 0 - Example: password level = 4 - - diff --git a/docs/docbook/smbdotconf/security/passwordserver.xml b/docs/docbook/smbdotconf/security/passwordserver.xml deleted file mode 100644 index b803816d888..00000000000 --- a/docs/docbook/smbdotconf/security/passwordserver.xml +++ /dev/null @@ -1,92 +0,0 @@ - - password server (G) - By specifying the name of another SMB server (such - as a WinNT box) with this option, and using security = domain - or security = server you can get Samba - to do all its username/password validation via a remote server. - - This option sets the name of the password server to use. - It must be a NetBIOS name, so if the machine's NetBIOS name is - different from its Internet name then you may have to add its NetBIOS - name to the lmhosts file which is stored in the same directory - as the smb.conf file. - - The name of the password server is looked up using the - parameter name - resolve order and so may resolved - by any method and order described in that parameter. - - The password server must be a machine capable of using - the "LM1.2X002" or the "NT LM 0.12" protocol, and it must be in - user level security mode. - - Using a password server - means your UNIX box (running Samba) is only as secure as your - password server. DO NOT CHOOSE A PASSWORD SERVER THAT - YOU DON'T COMPLETELY TRUST. - - Never point a Samba server at itself for password - serving. This will cause a loop and could lock up your Samba - server! - - The name of the password server takes the standard - substitutions, but probably the only useful one is %m - , which means the Samba server will use the incoming - client as the password server. If you use this then you better - trust your clients, and you had better restrict them with hosts allow! - - If the security parameter is set to - domain, then the list of machines in this - option must be a list of Primary or Backup Domain controllers for the - Domain or the character '*', as the Samba server is effectively - in that domain, and will use cryptographically authenticated RPC calls - to authenticate the user logging on. The advantage of using - security = domain is that if you list several hosts in the - password server option then smbd - will try each in turn till it finds one that responds. This - is useful in case your primary server goes down. - - If the password server option is set - to the character '*', then Samba will attempt to auto-locate the - Primary or Backup Domain controllers to authenticate against by - doing a query for the name WORKGROUP<1C> - and then contacting each server returned in the list of IP - addresses from the name resolution source. - - If the list of servers contains both names and the '*' - character, the list is treated as a list of preferred - domain controllers, but an auto lookup of all remaining DC's - will be added to the list as well. Samba will not attempt to optimize - this list by locating the closest DC. - - If the security parameter is - set to server, then there are different - restrictions that security = domain doesn't - suffer from: - - - You may list several password servers in - the password server parameter, however if an - smbd makes a connection to a password server, - and then the password server fails, no more users will be able - to be authenticated from this smbd. This is a - restriction of the SMB/CIFS protocol when in security = server - mode and cannot be fixed in Samba. - - If you are using a Windows NT server as your - password server then you will have to ensure that your users - are able to login from the Samba server, as when in - security = server mode the network logon will appear to - come from there rather than from the users workstation. - - - See also the security - parameter. - - Default: password server = <empty string> - - Example: password server = NT-PDC, NT-BDC1, NT-BDC2, * - - Example: password server = * - - diff --git a/docs/docbook/smbdotconf/security/printeradmin.xml b/docs/docbook/smbdotconf/security/printeradmin.xml deleted file mode 100644 index 7037facca07..00000000000 --- a/docs/docbook/smbdotconf/security/printeradmin.xml +++ /dev/null @@ -1,12 +0,0 @@ - - printer admin (S) - This is a list of users that can do anything to - printers via the remote administration interfaces offered by MS-RPC - (usually using a NT workstation). Note that the root user always - has admin rights. - - Default: printer admin = <empty string> - - Example: printer admin = admin, @staff - - diff --git a/docs/docbook/smbdotconf/security/privatedir.xml b/docs/docbook/smbdotconf/security/privatedir.xml deleted file mode 100644 index ca220891222..00000000000 --- a/docs/docbook/smbdotconf/security/privatedir.xml +++ /dev/null @@ -1,10 +0,0 @@ - - private dir (G) - This parameters defines the directory - smbd will use for storing such files as smbpasswd - and secrets.tdb. - - - Default :private dir = ${prefix}/private - - diff --git a/docs/docbook/smbdotconf/security/public.xml b/docs/docbook/smbdotconf/security/public.xml deleted file mode 100644 index a1f6a1ee294..00000000000 --- a/docs/docbook/smbdotconf/security/public.xml +++ /dev/null @@ -1,6 +0,0 @@ - - public (S) - Synonym for guest - ok. - - diff --git a/docs/docbook/smbdotconf/security/readlist.xml b/docs/docbook/smbdotconf/security/readlist.xml deleted file mode 100644 index 15d135d54e7..00000000000 --- a/docs/docbook/smbdotconf/security/readlist.xml +++ /dev/null @@ -1,17 +0,0 @@ - - read list (S) - This is a list of users that are given read-only - access to a service. If the connecting user is in this list then - they will not be given write access, no matter what the read only - option is set to. The list can include group names using the - syntax described in the - invalid users parameter. - - See also the - write list parameter and the invalid users - parameter. - - Default: read list = <empty string> - Example: read list = mary, @students - - diff --git a/docs/docbook/smbdotconf/security/readonly.xml b/docs/docbook/smbdotconf/security/readonly.xml deleted file mode 100644 index 02721935de7..00000000000 --- a/docs/docbook/smbdotconf/security/readonly.xml +++ /dev/null @@ -1,16 +0,0 @@ - - read only (S) - An inverted synonym is - writeable. - - If this parameter is yes, then users - of a service may not create or modify files in the service's - directory. - - Note that a printable service (printable = yes) - will ALWAYS allow writing to the directory - (user privileges permitting), but only via spooling operations. - - Default: read only = yes - - diff --git a/docs/docbook/smbdotconf/security/restrictanonymous.xml b/docs/docbook/smbdotconf/security/restrictanonymous.xml deleted file mode 100644 index 4b09b7d2bc9..00000000000 --- a/docs/docbook/smbdotconf/security/restrictanonymous.xml +++ /dev/null @@ -1,10 +0,0 @@ - - restrict anonymous (G) - This is a integer parameter, and - mirrors as much as possible the functinality the - RestrictAnonymous - registry key does on NT/Win2k. - - Default: restrict anonymous = 0 - - diff --git a/docs/docbook/smbdotconf/security/root.xml b/docs/docbook/smbdotconf/security/root.xml deleted file mode 100644 index f69c1a1ae1b..00000000000 --- a/docs/docbook/smbdotconf/security/root.xml +++ /dev/null @@ -1,6 +0,0 @@ - - root (G) - Synonym for - root directory". - - diff --git a/docs/docbook/smbdotconf/security/rootdir.xml b/docs/docbook/smbdotconf/security/rootdir.xml deleted file mode 100644 index 1f543aed6a3..00000000000 --- a/docs/docbook/smbdotconf/security/rootdir.xml +++ /dev/null @@ -1,6 +0,0 @@ - - root dir (G) - Synonym for - root directory". - - diff --git a/docs/docbook/smbdotconf/security/rootdirectory.xml b/docs/docbook/smbdotconf/security/rootdirectory.xml deleted file mode 100644 index 9efc11e3c6d..00000000000 --- a/docs/docbook/smbdotconf/security/rootdirectory.xml +++ /dev/null @@ -1,28 +0,0 @@ - - root directory (G) - The server will chroot() (i.e. - Change its root directory) to this directory on startup. This is - not strictly necessary for secure operation. Even without it the - server will deny access to files not in one of the service entries. - It may also check for, and deny access to, soft links to other - parts of the filesystem, or attempts to use ".." in file names - to access other directories (depending on the setting of the wide links - parameter). - - Adding a root directory entry other - than "/" adds an extra level of security, but at a price. It - absolutely ensures that no access is given to files not in the - sub-tree specified in the root directory - option, including some files needed for - complete operation of the server. To maintain full operability - of the server you will need to mirror some system files - into the root directory tree. In particular - you will need to mirror /etc/passwd (or a - subset of it), and any binaries or configuration files needed for - printing (if required). The set of files that must be mirrored is - operating system dependent. - - Default: root directory = / - Example: root directory = /homes/smb - - diff --git a/docs/docbook/smbdotconf/security/security.xml b/docs/docbook/smbdotconf/security/security.xml deleted file mode 100644 index 8e97d8721f0..00000000000 --- a/docs/docbook/smbdotconf/security/security.xml +++ /dev/null @@ -1,237 +0,0 @@ - - security (G) - This option affects how clients respond to - Samba and is one of the most important settings in the - smb.conf file. - - The option sets the "security mode bit" in replies to - protocol negotiations with smbd - 8 to turn share level security on or off. Clients decide - based on this bit whether (and how) to transfer user and password - information to the server. - - - The default is security = user, as this is - the most common setting needed when talking to Windows 98 and - Windows NT. - - The alternatives are security = share, - security = server or security = domain - . - - In versions of Samba prior to 2.0.0, the default was - security = share mainly because that was - the only option at one stage. - - There is a bug in WfWg that has relevance to this - setting. When in user or server level security a WfWg client - will totally ignore the password you type in the "connect - drive" dialog box. This makes it very difficult (if not impossible) - to connect to a Samba service as anyone except the user that - you are logged into WfWg as. - - If your PCs use usernames that are the same as their - usernames on the UNIX machine then you will want to use - security = user. If you mostly use usernames - that don't exist on the UNIX box then use security = - share. - - You should also use security = share if you - want to mainly setup shares without a password (guest shares). This - is commonly used for a shared printer server. It is more difficult - to setup guest shares with security = user, see - the map to guest - parameter for details. - - It is possible to use smbd in a - hybrid mode where it is offers both user and share - level security under different - NetBIOS aliases. - - The different settings will now be explained. - - - SECURITY = SHARE - - - When clients connect to a share level security server they - need not log onto the server with a valid username and password before - attempting to connect to a shared resource (although modern clients - such as Windows 95/98 and Windows NT will send a logon request with - a username but no password when talking to a security = share - server). Instead, the clients send authentication information - (passwords) on a per-share basis, at the time they attempt to connect - to that share. - - Note that smbd ALWAYS - uses a valid UNIX user to act on behalf of the client, even in - security = share level security. - - As clients are not required to send a username to the server - in share level security, smbd uses several - techniques to determine the correct UNIX user to use on behalf - of the client. - - A list of possible UNIX usernames to match with the given - client password is constructed using the following methods : - - - If the guest - only parameter is set, then all the other - stages are missed and only the - guest account username is checked. - - - Is a username is sent with the share connection - request, then this username (after mapping - see username map), - is added as a potential username. - - If the client did a previous logon - request (the SessionSetup SMB call) then the - username sent in this SMB will be added as a potential username. - - - The name of the service the client requested is - added as a potential username. - - The NetBIOS name of the client is added to - the list as a potential username. - - Any users on the - user list are added as potential usernames. - - - - If the guest only parameter is - not set, then this list is then tried with the supplied password. - The first user for whom the password matches will be used as the - UNIX user. - - If the guest only parameter is - set, or no username can be determined then if the share is marked - as available to the guest account, then this - guest user will be used, otherwise access is denied. - - Note that it can be very confusing - in share-level security as to which UNIX username will eventually - be used in granting access. - - See also the section - NOTE ABOUT USERNAME/PASSWORD VALIDATION. - - SECURITY = USER - - - This is the default security setting in Samba 3.0. - With user-level security a client must first "log-on" with a - valid username and password (which can be mapped using the username map - parameter). Encrypted passwords (see the - encrypted passwords parameter) can also - be used in this security mode. Parameters such as - user and - guest only if set are then applied and - may change the UNIX user to use on this connection, but only after - the user has been successfully authenticated. - - Note that the name of the resource being - requested is not sent to the server until after - the server has successfully authenticated the client. This is why - guest shares don't work in user level security without allowing - the server to automatically map unknown users into the guest account. - See the map to guest - parameter for details on doing this. - - See also the section - NOTE ABOUT USERNAME/PASSWORD VALIDATION. - - SECURITY = DOMAIN - - - - This mode will only work correctly if net - 8 has been used to add this - machine into a Windows NT Domain. It expects the encrypted passwords - parameter to be set to yes. In this - mode Samba will try to validate the username/password by passing - it to a Windows NT Primary or Backup Domain Controller, in exactly - the same way that a Windows NT Server would do. - - Note that a valid UNIX user must still - exist as well as the account on the Domain Controller to allow - Samba to have a valid UNIX account to map file access to. - - Note that from the client's point - of view security = domain is the same as security = user - . It only affects how the server deals with the authentication, - it does not in any way affect what the client sees. - - Note that the name of the resource being - requested is not sent to the server until after - the server has successfully authenticated the client. This is why - guest shares don't work in user level security without allowing - the server to automatically map unknown users into the guest account. - See the map to guest - parameter for details on doing this. - - See also the section - NOTE ABOUT USERNAME/PASSWORD VALIDATION. - - See also the password - server parameter and the encrypted passwords - parameter. - - SECURITY = SERVER - - - In this mode Samba will try to validate the username/password - by passing it to another SMB server, such as an NT box. If this - fails it will revert to security = - user. It expects the encrypted passwords - parameter to be set to - yes, unless the remote server - does not support them. However note - that if encrypted passwords have been negotiated then Samba cannot - revert back to checking the UNIX password file, it must have a valid - smbpasswd file to check users against. See the - documentation file in the docs/ directory - ENCRYPTION.txt for details on how to set this - up. - - Note this mode of operation - has significant pitfalls, due to the fact that is - activly initiates a man-in-the-middle attack on the - remote SMB server. In particular, this mode of - operation can cause significant resource consuption on - the PDC, as it must maintain an active connection for - the duration of the user's session. Furthermore, if - this connection is lost, there is no way to - reestablish it, and futher authenticaions to the Samba - server may fail. (From a single client, till it - disconnects). - - Note that from the client's point of - view security = server is the same as - security = user. It only affects how the server deals - with the authentication, it does not in any way affect what the - client sees. - - Note that the name of the resource being - requested is not sent to the server until after - the server has successfully authenticated the client. This is why - guest shares don't work in user level security without allowing - the server to automatically map unknown users into the guest account. - See the map to guest - parameter for details on doing this. - - See also the section - NOTE ABOUT USERNAME/PASSWORD VALIDATION. - - See also the password - server parameter and the encrypted passwords - parameter. - - Default: security = USER - Example: security = DOMAIN - - - diff --git a/docs/docbook/smbdotconf/security/securitymask.xml b/docs/docbook/smbdotconf/security/securitymask.xml deleted file mode 100644 index 9ed0adcbf44..00000000000 --- a/docs/docbook/smbdotconf/security/securitymask.xml +++ /dev/null @@ -1,33 +0,0 @@ - - security mask (S) - This parameter controls what UNIX permission - bits can be modified when a Windows NT client is manipulating - the UNIX permission on a file using the native NT security - dialog box. - - This parameter is applied as a mask (AND'ed with) to - the changed permission bits, thus preventing any bits not in - this mask from being modified. Essentially, zero bits in this - mask may be treated as a set of bits the user is not allowed - to change. - - If not set explicitly this parameter is 0777, allowing - a user to modify all the user/group/world permissions on a file. - - - Note that users who can access the - Samba server through other means can easily bypass this - restriction, so it is primarily useful for standalone - "appliance" systems. Administrators of most normal systems will - probably want to leave it set to 0777. - - See also the - force directory security mode, - directory - security mask, - force security mode parameters. - - Default: security mask = 0777 - Example: security mask = 0770 - - diff --git a/docs/docbook/smbdotconf/security/smbpasswdfile.xml b/docs/docbook/smbdotconf/security/smbpasswdfile.xml deleted file mode 100644 index 2efbd121695..00000000000 --- a/docs/docbook/smbdotconf/security/smbpasswdfile.xml +++ /dev/null @@ -1,13 +0,0 @@ - - smb passwd file (G) - This option sets the path to the encrypted - smbpasswd file. By default the path to the smbpasswd file - is compiled into Samba. - - Default: smb passwd file = ${prefix}/private/smbpasswd - - - Example: smb passwd file = /etc/samba/smbpasswd - - - diff --git a/docs/docbook/smbdotconf/security/unixpasswordsync.xml b/docs/docbook/smbdotconf/security/unixpasswordsync.xml deleted file mode 100644 index 41c6d983d02..00000000000 --- a/docs/docbook/smbdotconf/security/unixpasswordsync.xml +++ /dev/null @@ -1,18 +0,0 @@ - - unix password sync (G) - This boolean parameter controls whether Samba - attempts to synchronize the UNIX password with the SMB password - when the encrypted SMB password in the smbpasswd file is changed. - If this is set to yes the program specified in the passwd - programparameter is called AS ROOT - - to allow the new UNIX password to be set without access to the - old UNIX password (as the SMB password change code has no - access to the old password cleartext, only the new). - - See also passwd - program, - passwd chat. - - Default: unix password sync = no - - diff --git a/docs/docbook/smbdotconf/security/updateencrypted.xml b/docs/docbook/smbdotconf/security/updateencrypted.xml deleted file mode 100644 index 45c66e0de29..00000000000 --- a/docs/docbook/smbdotconf/security/updateencrypted.xml +++ /dev/null @@ -1,28 +0,0 @@ - - update encrypted (G) - This boolean parameter allows a user logging - on with a plaintext password to have their encrypted (hashed) - password in the smbpasswd file to be updated automatically as - they log on. This option allows a site to migrate from plaintext - password authentication (users authenticate with plaintext - password over the wire, and are checked against a UNIX account - database) to encrypted password authentication (the SMB - challenge/response authentication mechanism) without forcing - all users to re-enter their passwords via smbpasswd at the time the - change is made. This is a convenience option to allow the change over - to encrypted passwords to be made over a longer period. Once all users - have encrypted representations of their passwords in the smbpasswd - file this parameter should be set to no. - - In order for this parameter to work correctly the encrypt passwords - parameter must be set to no when - this parameter is set to yes. - - Note that even when this parameter is set a user - authenticating to smbd must still enter a valid - password in order to connect correctly, and to update their hashed - (smbpasswd) passwords. - - Default: update encrypted = no - - diff --git a/docs/docbook/smbdotconf/security/user.xml b/docs/docbook/smbdotconf/security/user.xml deleted file mode 100644 index 9c0502061bf..00000000000 --- a/docs/docbook/smbdotconf/security/user.xml +++ /dev/null @@ -1,6 +0,0 @@ - - user (S) - Synonym for - username. - - diff --git a/docs/docbook/smbdotconf/security/username.xml b/docs/docbook/smbdotconf/security/username.xml deleted file mode 100644 index 779f24170b6..00000000000 --- a/docs/docbook/smbdotconf/security/username.xml +++ /dev/null @@ -1,62 +0,0 @@ - - username (S) - Multiple users may be specified in a comma-delimited - list, in which case the supplied password will be tested against - each username in turn (left to right). - - The username line is needed only when - the PC is unable to supply its own username. This is the case - for the COREPLUS protocol or where your users have different WfWg - usernames to UNIX usernames. In both these cases you may also be - better using the \\server\share%user syntax instead. - - The username line is not a great - solution in many cases as it means Samba will try to validate - the supplied password against each of the usernames in the - username line in turn. This is slow and - a bad idea for lots of users in case of duplicate passwords. - You may get timeouts or security breaches using this parameter - unwisely. - - Samba relies on the underlying UNIX security. This - parameter does not restrict who can login, it just offers hints - to the Samba server as to what usernames might correspond to the - supplied password. Users can login as whoever they please and - they will be able to do no more damage than if they started a - telnet session. The daemon runs as the user that they log in as, - so they cannot do anything that user cannot do. - - To restrict a service to a particular set of users you - can use the valid users - parameter. - - If any of the usernames begin with a '@' then the name - will be looked up first in the NIS netgroups list (if Samba - is compiled with netgroup support), followed by a lookup in - the UNIX groups database and will expand to a list of all users - in the group of that name. - - If any of the usernames begin with a '+' then the name - will be looked up only in the UNIX groups database and will - expand to a list of all users in the group of that name. - - If any of the usernames begin with a '&' then the name - will be looked up only in the NIS netgroups database (if Samba - is compiled with netgroup support) and will expand to a list - of all users in the netgroup group of that name. - - Note that searching though a groups database can take - quite some time, and some clients may time out during the - search. - - See the section NOTE ABOUT - USERNAME/PASSWORD VALIDATION for more information on how - this parameter determines access to the services. - - Default: The guest account if a guest service, - else <empty string>. - - Examples:username = fred, mary, jack, jane, - @users, @pcgroup - - diff --git a/docs/docbook/smbdotconf/security/usernamelevel.xml b/docs/docbook/smbdotconf/security/usernamelevel.xml deleted file mode 100644 index a4deff3bf95..00000000000 --- a/docs/docbook/smbdotconf/security/usernamelevel.xml +++ /dev/null @@ -1,20 +0,0 @@ - - username level (G) - This option helps Samba to try and 'guess' at - the real UNIX username, as many DOS clients send an all-uppercase - username. By default Samba tries all lowercase, followed by the - username with the first letter capitalized, and fails if the - username is not found on the UNIX machine. - - If this parameter is set to non-zero the behavior changes. - This parameter is a number that specifies the number of uppercase - combinations to try while trying to determine the UNIX user name. The - higher the number the more combinations will be tried, but the slower - the discovery of usernames will be. Use this parameter when you have - strange usernames on your UNIX machine, such as AstrangeUser - . - - Default: username level = 0 - Example: username level = 5 - - diff --git a/docs/docbook/smbdotconf/security/usernamemap.xml b/docs/docbook/smbdotconf/security/usernamemap.xml deleted file mode 100644 index 37ee72c2358..00000000000 --- a/docs/docbook/smbdotconf/security/usernamemap.xml +++ /dev/null @@ -1,90 +0,0 @@ - - username map (G) - This option allows you to specify a file containing - a mapping of usernames from the clients to the server. This can be - used for several purposes. The most common is to map usernames - that users use on DOS or Windows machines to those that the UNIX - box uses. The other is to map multiple users to a single username - so that they can more easily share files. - - The map file is parsed line by line. Each line should - contain a single UNIX username on the left then a '=' followed - by a list of usernames on the right. The list of usernames on the - right may contain names of the form @group in which case they - will match any UNIX username in that group. The special client - name '*' is a wildcard and matches any name. Each line of the - map file may be up to 1023 characters long. - - The file is processed on each line by taking the - supplied username and comparing it with each username on the right - hand side of the '=' signs. If the supplied name matches any of - the names on the right hand side then it is replaced with the name - on the left. Processing then continues with the next line. - - If any line begins with a '#' or a ';' then it is - ignored - - If any line begins with an '!' then the processing - will stop after that line if a mapping was done by the line. - Otherwise mapping continues with every line being processed. - Using '!' is most useful when you have a wildcard mapping line - later in the file. - - For example to map from the name admin - or administrator to the UNIX name - root you would use: - - root = admin administrator - - Or to map anyone in the UNIX group system - to the UNIX name sys you would use: - - sys = @system - - You can have as many mappings as you like in a username - map file. - - - If your system supports the NIS NETGROUP option then - the netgroup database is checked before the /etc/group - database for matching groups. - - You can map Windows usernames that have spaces in them - by using double quotes around the name. For example: - - tridge = "Andrew Tridgell" - - would map the windows username "Andrew Tridgell" to the - unix username "tridge". - - The following example would map mary and fred to the - unix user sys, and map the rest to guest. Note the use of the - '!' to tell Samba to stop processing if it gets a match on - that line. - - -!sys = mary fred -guest = * - - - Note that the remapping is applied to all occurrences - of usernames. Thus if you connect to \\server\fred and - fred is remapped to mary then you - will actually be connecting to \\server\mary and will need to - supply a password suitable for mary not - fred. The only exception to this is the - username passed to the - password server (if you have one). The password - server will receive whatever username the client supplies without - modification. - - Also note that no reverse mapping is done. The main effect - this has is with printing. Users who have been mapped may have - trouble deleting print jobs as PrintManager under WfWg will think - they don't own the print job. - - Default: no username map - Example: username map = /usr/local/samba/lib/users.map - - - diff --git a/docs/docbook/smbdotconf/security/users.xml b/docs/docbook/smbdotconf/security/users.xml deleted file mode 100644 index e78d259f62b..00000000000 --- a/docs/docbook/smbdotconf/security/users.xml +++ /dev/null @@ -1,6 +0,0 @@ - - users (S) - Synonym for - username. - - diff --git a/docs/docbook/smbdotconf/security/validusers.xml b/docs/docbook/smbdotconf/security/validusers.xml deleted file mode 100644 index 5155a5ef343..00000000000 --- a/docs/docbook/smbdotconf/security/validusers.xml +++ /dev/null @@ -1,23 +0,0 @@ - - valid users (S) - This is a list of users that should be allowed - to login to this service. Names starting with '@', '+' and '&' - are interpreted using the same rules as described in the - invalid users parameter. - - If this is empty (the default) then any user can login. - If a username is in both this list and the invalid - users list then access is denied for that user. - - The current servicename is substituted for %S - . This is useful in the [homes] section. - - See also invalid users - - - Default: No valid users list (anyone can login) - - - Example: valid users = greg, @pcusers - - diff --git a/docs/docbook/smbdotconf/security/writable.xml b/docs/docbook/smbdotconf/security/writable.xml deleted file mode 100644 index 66ba44cc44d..00000000000 --- a/docs/docbook/smbdotconf/security/writable.xml +++ /dev/null @@ -1,6 +0,0 @@ - - writable (S) - Synonym for - writeable for people who can't spell :-). - - diff --git a/docs/docbook/smbdotconf/security/writeable.xml b/docs/docbook/smbdotconf/security/writeable.xml deleted file mode 100644 index b963410374c..00000000000 --- a/docs/docbook/smbdotconf/security/writeable.xml +++ /dev/null @@ -1,6 +0,0 @@ - - writeable (S) - Inverted synonym for - read only. - - diff --git a/docs/docbook/smbdotconf/security/writelist.xml b/docs/docbook/smbdotconf/security/writelist.xml deleted file mode 100644 index 76ee56c93af..00000000000 --- a/docs/docbook/smbdotconf/security/writelist.xml +++ /dev/null @@ -1,21 +0,0 @@ - - write list (S) - This is a list of users that are given read-write - access to a service. If the connecting user is in this list then - they will be given write access, no matter what the read only - option is set to. The list can include group names using the - @group syntax. - - Note that if a user is in both the read list and the - write list then they will be given write access. - - See also the read list - option. - - Default: write list = <empty string> - - - Example: write list = admin, root, @staff - - - diff --git a/docs/docbook/smbdotconf/security/writeok.xml b/docs/docbook/smbdotconf/security/writeok.xml deleted file mode 100644 index 103c2be9935..00000000000 --- a/docs/docbook/smbdotconf/security/writeok.xml +++ /dev/null @@ -1,6 +0,0 @@ - - write ok (S) - Inverted synonym for - read only. - - diff --git a/docs/docbook/smbdotconf/smb.conf.5.xml b/docs/docbook/smbdotconf/smb.conf.5.xml deleted file mode 100644 index edb94573dfb..00000000000 --- a/docs/docbook/smbdotconf/smb.conf.5.xml +++ /dev/null @@ -1,685 +0,0 @@ - - %globalentities; -]> - - - - smb.conf - 5 - - - - - smb.conf - The configuration file for the Samba suite - - - - SYNOPSIS - - The smb.conf file is a configuration - file for the Samba suite. smb.conf contains - runtime configuration information for the Samba programs. The smb.conf file - is designed to be configured and administered by the swat - 8 program. The complete - description of the file format and possible parameters held within - are here for reference purposes. - - - FILE FORMAT - - The file consists of sections and parameters. A section - begins with the name of the section in square brackets and continues - until the next section begins. Sections contain parameters of the - form - - name = value - - - The file is line-based - that is, each newline-terminated - line represents either a comment, a section name or a parameter. - - Section and parameter names are not case sensitive. - - Only the first equals sign in a parameter is significant. - Whitespace before or after the first equals sign is discarded. - Leading, trailing and internal whitespace in section and parameter - names is irrelevant. Leading and trailing whitespace in a parameter - value is discarded. Internal whitespace within a parameter value - is retained verbatim. - - Any line beginning with a semicolon (';') or a hash ('#') - character is ignored, as are lines containing only whitespace. - - Any line ending in a '\' is continued - on the next line in the customary UNIX fashion. - - The values following the equals sign in parameters are all - either a string (no quotes needed) or a boolean, which may be given - as yes/no, 0/1 or true/false. Case is not significant in boolean - values, but is preserved in string values. Some items such as - create modes are numeric. - - - - SECTION DESCRIPTIONS - - Each section in the configuration file (except for the - [global] section) describes a shared resource (known - as a "share"). The section name is the name of the - shared resource and the parameters within the section define - the shares attributes. - - There are three special sections, [global], - [homes] and [printers], which are - described under special sections. The - following notes apply to ordinary section descriptions. - - A share consists of a directory to which access is being - given plus a description of the access rights which are granted - to the user of the service. Some housekeeping options are - also specifiable. - - Sections are either file share services (used by the - client as an extension of their native file systems) or - printable services (used by the client to access print services - on the host running the server). - - Sections may be designated guest services, - in which case no password is required to access them. A specified - UNIX guest account is used to define access - privileges in this case. - - Sections other than guest services will require a password - to access them. The client provides the username. As older clients - only provide passwords and not usernames, you may specify a list - of usernames to check against the password using the "user =" - option in the share definition. For modern clients such as - Windows 95/98/ME/NT/2000, this should not be necessary. - - Note that the access rights granted by the server are - masked by the access rights granted to the specified or guest - UNIX user by the host system. The server does not grant more - access than the host system grants. - - The following sample section defines a file space share. - The user has write access to the path /home/bar. - The share is accessed via the share name "foo": - - - -[foo] - path = /home/bar - read only = no - - - - The following sample section defines a printable share. - The share is readonly, but printable. That is, the only write - access permitted is via calls to open, write to and close a - spool file. The guest ok parameter means - access will be permitted as the default guest user (specified - elsewhere): - - - -[aprinter] - path = /usr/spool/public - read only = yes - printable = yes - guest ok = yes - - - - - - SPECIAL SECTIONS - - - The [global] section - - parameters in this section apply to the server - as a whole, or are defaults for sections which do not - specifically define certain items. See the notes - under PARAMETERS for more information. - - - - The [homes] section - - If a section called homes is included in the - configuration file, services connecting clients to their - home directories can be created on the fly by the server. - - When the connection request is made, the existing - sections are scanned. If a match is found, it is used. If no - match is found, the requested section name is treated as a - user name and looked up in the local password file. If the - name exists and the correct password has been given, a share is - created by cloning the [homes] section. - - Some modifications are then made to the newly - created share: - - - The share name is changed from homes to - the located username. - - If no path was given, the path is set to - the user's home directory. - - - If you decide to use a path = line - in your [homes] section then you may find it useful - to use the %S macro. For example : - - path = /data/pchome/%S - - would be useful if you have different home directories - for your PCs than for UNIX access. - - This is a fast and simple way to give a large number - of clients access to their home directories with a minimum - of fuss. - - A similar process occurs if the requested section - name is "homes", except that the share name is not - changed to that of the requesting user. This method of using - the [homes] section works well if different users share - a client PC. - - The [homes] section can specify all the parameters - a normal service section can specify, though some make more sense - than others. The following is a typical and suitable [homes] - section: - - - -[homes] - read only = no - - - - An important point is that if guest access is specified - in the [homes] section, all home directories will be - visible to all clients without a password. - In the very unlikely event that this is actually desirable, it - would be wise to also specify read only - access. - - Note that the browseable flag for - auto home directories will be inherited from the global browseable - flag, not the [homes] browseable flag. This is useful as - it means setting browseable = no in - the [homes] section will hide the [homes] share but make - any auto home directories visible. - - - - The [printers] section - - This section works like [homes], - but for printers. - - If a [printers] section occurs in the - configuration file, users are able to connect to any printer - specified in the local host's printcap file. - - When a connection request is made, the existing sections - are scanned. If a match is found, it is used. If no match is found, - but a [homes] section exists, it is used as described - above. Otherwise, the requested section name is treated as a - printer name and the appropriate printcap file is scanned to see - if the requested section name is a valid printer share name. If - a match is found, a new printer share is created by cloning - the [printers] section. - - A few modifications are then made to the newly created - share: - - - The share name is set to the located printer - name - - If no printer name was given, the printer name - is set to the located printer name - - If the share does not permit guest access and - no username was given, the username is set to the located - printer name. - - - Note that the [printers] service MUST be - printable - if you specify otherwise, the server will refuse - to load the configuration file. - - Typically the path specified would be that of a - world-writeable spool directory with the sticky bit set on - it. A typical [printers] entry would look like - this: - - -[printers] - path = /usr/spool/public - guest ok = yes - printable = yes - - - All aliases given for a printer in the printcap file - are legitimate printer names as far as the server is concerned. - If your printing subsystem doesn't work like that, you will have - to set up a pseudo-printcap. This is a file consisting of one or - more lines like this: - - - -alias|alias|alias|alias... - - - - Each alias should be an acceptable printer name for - your printing subsystem. In the [global] section, specify - the new file as your printcap. The server will then only recognize - names found in your pseudo-printcap, which of course can contain - whatever aliases you like. The same technique could be used - simply to limit access to a subset of your local printers. - - An alias, by the way, is defined as any component of the - first entry of a printcap record. Records are separated by newlines, - components (if there are more than one) are separated by vertical - bar symbols ('|'). - - On SYSV systems which use lpstat to determine what - printers are defined on the system you may be able to use - "printcap name = lpstat" to automatically obtain a list - of printers. See the "printcap name" option - for more details. - - - - - PARAMETERS - - parameters define the specific attributes of sections. - - Some parameters are specific to the [global] section - (e.g., security). Some parameters are usable - in all sections (e.g., create mode). All others - are permissible only in normal sections. For the purposes of the - following descriptions the [homes] and [printers] - sections will be considered normal. The letter G - in parentheses indicates that a parameter is specific to the - [global] section. The letter S - indicates that a parameter can be specified in a service specific - section. Note that all S parameters can also be specified in - the [global] section - in which case they will define - the default behavior for all services. - - parameters are arranged here in alphabetical order - this may - not create best bedfellows, but at least you can find them! Where - there are synonyms, the preferred synonym is described, others refer - to the preferred synonym. - - - - VARIABLE SUBSTITUTIONS - - Many of the strings that are settable in the config file - can take substitutions. For example the option "path = - /tmp/%u" would be interpreted as "path = - /tmp/john" if the user connected with the username john. - - These substitutions are mostly noted in the descriptions below, - but there are some general substitutions which apply whenever they - might be relevant. These are: - - - - %U - session user name (the user name that the client - wanted, not necessarily the same as the one they got). - - - - %G - primary group name of %U. - - - - %h - the Internet hostname that Samba is running - on. - - - - %m - the NetBIOS name of the client machine - (very useful). - - - - %L - the NetBIOS name of the server. This allows you - to change your config based on what the client calls you. Your - server can have a "dual personality". - - Note that this parameter is not available when Samba listens - on port 445, as clients no longer send this information - - - - - - %M - the Internet name of the client machine. - - - - - %R - the selected protocol level after - protocol negotiation. It can be one of CORE, COREPLUS, - LANMAN1, LANMAN2 or NT1. - - - - %d - The process id of the current server - process. - - - - %a - the architecture of the remote - machine. Only some are recognized, and those may not be - 100% reliable. It currently recognizes Samba, WfWg, Win95, - WinNT and Win2k. Anything else will be known as - "UNKNOWN". If it gets it wrong then sending a level - 3 log to samba@samba.org - should allow it to be fixed. - - - - %I - The IP address of the client machine. - - - - - %T - the current date and time. - - - - %D - Name of the domain or workgroup of the current user. - - - - %$(envvar) - The value of the environment variable - envar. - - - - The following substitutes apply only to some configuration options(only those - that are used when a connection has been established): - - - - %S - the name of the current service, if any. - - - - - %P - the root directory of the current service, - if any. - - - - %u - user name of the current service, if any. - - - - - %g - primary group name of %u. - - - - %H - the home directory of the user given - by %u. - - - - %N - the name of your NIS home directory server. - This is obtained from your NIS auto.map entry. If you have - not compiled Samba with the --with-automount - option then this value will be the same as %L. - - - - - %p - the path of the service's home directory, - obtained from your NIS auto.map entry. The NIS auto.map entry - is split up as "%N:%p". - - - - There are some quite creative things that can be done - with these substitutions and other smb.conf options. - - - - NAME MANGLING - - Samba supports "name mangling" so that DOS and - Windows clients can use files that don't conform to the 8.3 format. - It can also be set to adjust the case of 8.3 format filenames. - - There are several options that control the way mangling is - performed, and they are grouped here rather than listed separately. - For the defaults look at the output of the testparm program. - - All of these options can be set separately for each service - (or globally, of course). - - The options are: - - - - - mangle case = yes/no - controls if names that have characters that - aren't of the "default" case are mangled. For example, - if this is yes then a name like "Mail" would be mangled. - Default no. - - - - case sensitive = yes/no - controls whether filenames are case sensitive. If - they aren't then Samba must do a filename search and match on passed - names. Default no. - - - - default case = upper/lower - controls what the default case is for new - filenames. Default lower. - - - - preserve case = yes/no - controls if new files are created with the - case that the client passes, or if they are forced to be the - "default" case. Default yes. - - - - - short preserve case = yes/no - controls if new files which conform to 8.3 syntax, - that is all in upper case and of suitable length, are created - upper case, or if they are forced to be the "default" - case. This option can be use with "preserve case = yes" - to permit long filenames to retain their case, while short names - are lowercased. Default yes. - - - - By default, Samba 3.0 has the same semantics as a Windows - NT server, in that it is case insensitive but case preserving. - - - - - NOTE ABOUT USERNAME/PASSWORD VALIDATION - - There are a number of ways in which a user can connect - to a service. The server uses the following steps in determining - if it will allow a connection to a specified service. If all the - steps fail, then the connection request is rejected. However, if one of the - steps succeeds, then the following steps are not checked. - - If the service is marked "guest only = yes" and the - server is running with share-level security ("security = share") - then steps 1 to 5 are skipped. - - - - If the client has passed a username/password - pair and that username/password pair is validated by the UNIX - system's password programs then the connection is made as that - username. Note that this includes the - \\server\service%username method of passing - a username. - - If the client has previously registered a username - with the system and now supplies a correct password for that - username then the connection is allowed. - - The client's NetBIOS name and any previously - used user names are checked against the supplied password, if - they match then the connection is allowed as the corresponding - user. - - If the client has previously validated a - username/password pair with the server and the client has passed - the validation token then that username is used. - - If a "user = " field is given in the - smb.conf file for the service and the client - has supplied a password, and that password matches (according to - the UNIX system's password checking) with one of the usernames - from the "user =" field then the connection is made as - the username in the "user =" line. If one - of the username in the "user =" list begins with a - '@' then that name expands to a list of names in - the group of the same name. - - If the service is a guest service then a - connection is made as the username given in the "guest - account =" for the service, irrespective of the - supplied password. - - - - - - COMPLETE LIST OF GLOBAL PARAMETERS - - Here is a list of all global parameters. See the section of - each parameter for details. Note that some are synonyms. - - - - - - - COMPLETE LIST OF SERVICE PARAMETERS - - Here is a list of all service parameters. See the section on - each parameter for details. Note that some are synonyms. - - - - - - - EXPLANATION OF EACH PARAMETER - - - - - - - WARNINGS - - Although the configuration file permits service names - to contain spaces, your client software may not. Spaces will - be ignored in comparisons anyway, so it shouldn't be a - problem - but be aware of the possibility. - - On a similar note, many clients - especially DOS clients - - limit service names to eight characters. smbd - 8 has no such limitation, but attempts to connect from such - clients will fail if they truncate the service names. For this reason - you should probably keep your service names down to eight characters - in length. - - Use of the [homes] and [printers] special sections make life - for an administrator easy, but the various combinations of default - attributes can be tricky. Take extreme care when designing these - sections. In particular, ensure that the permissions on spool - directories are correct. - - - - VERSION - - This man page is correct for version 3.0 of the Samba suite. - - - - SEE ALSO - - samba - 7, smbpasswd - 8, swat - 8, smbd - 8, nmbd - 8, smbclient - 1, nmblookup - 1, testparm - 1, testprns - 1. - - - - AUTHOR - - The original Samba software and related utilities - were created by Andrew Tridgell. Samba is now developed - by the Samba Team as an Open Source project similar - to the way the Linux kernel is developed. - - The original Samba man pages were written by Karl Auer. - The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at - ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 - release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy. - - - diff --git a/docs/docbook/smbdotconf/tuning/blocksize.xml b/docs/docbook/smbdotconf/tuning/blocksize.xml deleted file mode 100644 index da42ca9ece6..00000000000 --- a/docs/docbook/smbdotconf/tuning/blocksize.xml +++ /dev/null @@ -1,19 +0,0 @@ - - block size (S) - This parameter controls the behavior of smbd - 8 when reporting disk free - sizes. By default, this reports a disk block size of 1024 bytes. - - - Changing this parameter may have some effect on the - efficiency of client writes, this is not yet confirmed. This - parameter was added to allow advanced administrators to change - it (usually to a higher value) and test the effect it has on - client write performance without re-compiling the code. As this - is an experimental option it may be removed in a future release. - - - Changing this option does not change the disk free reporting - size, just the block size unit reported to the client. - - diff --git a/docs/docbook/smbdotconf/tuning/changenotifytimeout.xml b/docs/docbook/smbdotconf/tuning/changenotifytimeout.xml deleted file mode 100644 index 18c8b9a1764..00000000000 --- a/docs/docbook/smbdotconf/tuning/changenotifytimeout.xml +++ /dev/null @@ -1,15 +0,0 @@ - - change notify timeout (G) - This SMB allows a client to tell a server to - "watch" a particular directory for any changes and only reply to - the SMB request when a change has occurred. Such constant scanning of - a directory is expensive under UNIX, hence an smbd - 8 daemon only performs such a scan - on each requested directory once every change notify - timeout seconds. - - Default: change notify timeout = 60 - Example: change notify timeout = 300 - - Would change the scan time to every 5 minutes. - diff --git a/docs/docbook/smbdotconf/tuning/deadtime.xml b/docs/docbook/smbdotconf/tuning/deadtime.xml deleted file mode 100644 index dbad06f25bc..00000000000 --- a/docs/docbook/smbdotconf/tuning/deadtime.xml +++ /dev/null @@ -1,23 +0,0 @@ - - deadtime (G) - The value of the parameter (a decimal integer) - represents the number of minutes of inactivity before a connection - is considered dead, and it is disconnected. The deadtime only takes - effect if the number of open files is zero. - - This is useful to stop a server's resources being - exhausted by a large number of inactive connections. - - Most clients have an auto-reconnect feature when a - connection is broken so in most cases this parameter should be - transparent to users. - - Using this parameter with a timeout of a few minutes - is recommended for most systems. - - A deadtime of zero indicates that no auto-disconnection - should be performed. - - Default: deadtime = 0 - Example: deadtime = 15 - diff --git a/docs/docbook/smbdotconf/tuning/getwdcache.xml b/docs/docbook/smbdotconf/tuning/getwdcache.xml deleted file mode 100644 index c797bad414c..00000000000 --- a/docs/docbook/smbdotconf/tuning/getwdcache.xml +++ /dev/null @@ -1,11 +0,0 @@ - - getwd cache (G) - This is a tuning option. When this is enabled a - caching algorithm will be used to reduce the time taken for getwd() - calls. This can have a significant impact on performance, especially - when the wide links - parameter is set to no. - - Default: getwd cache = yes - - diff --git a/docs/docbook/smbdotconf/tuning/hostnamelookups.xml b/docs/docbook/smbdotconf/tuning/hostnamelookups.xml deleted file mode 100644 index daad09da8be..00000000000 --- a/docs/docbook/smbdotconf/tuning/hostnamelookups.xml +++ /dev/null @@ -1,14 +0,0 @@ - - hostname lookups (G) - Specifies whether samba should use (expensive) - hostname lookups or use the ip addresses instead. An example place - where hostname lookups are currently used is when checking - the hosts deny and hosts allow. - - - Default: hostname lookups = yes - - Example: hostname lookups = no - - - diff --git a/docs/docbook/smbdotconf/tuning/keepalive.xml b/docs/docbook/smbdotconf/tuning/keepalive.xml deleted file mode 100644 index 746cda929e7..00000000000 --- a/docs/docbook/smbdotconf/tuning/keepalive.xml +++ /dev/null @@ -1,16 +0,0 @@ - - keepalive (G) - The value of the parameter (an integer) represents - the number of seconds between keepalive - packets. If this parameter is zero, no keepalive packets will be - sent. Keepalive packets, if sent, allow the server to tell whether - a client is still present and responding. - - Keepalives should, in general, not be needed if the socket - being used has the SO_KEEPALIVE attribute set on it (see socket options). - Basically you should only use this option if you strike difficulties. - - Default: keepalive = 300 - Example: keepalive = 600 - - diff --git a/docs/docbook/smbdotconf/tuning/maxconnections.xml b/docs/docbook/smbdotconf/tuning/maxconnections.xml deleted file mode 100644 index 24af886b60a..00000000000 --- a/docs/docbook/smbdotconf/tuning/maxconnections.xml +++ /dev/null @@ -1,16 +0,0 @@ - - max connections (S) - This option allows the number of simultaneous - connections to a service to be limited. If max connections - is greater than 0 then connections will be refused if - this number of connections to the service are already open. A value - of zero mean an unlimited number of connections may be made. - - Record lock files are used to implement this feature. The - lock files will be stored in the directory specified by the lock directory - option. - - Default: max connections = 0 - Example: max connections = 10 - - diff --git a/docs/docbook/smbdotconf/tuning/maxdisksize.xml b/docs/docbook/smbdotconf/tuning/maxdisksize.xml deleted file mode 100644 index 8aebe919025..00000000000 --- a/docs/docbook/smbdotconf/tuning/maxdisksize.xml +++ /dev/null @@ -1,24 +0,0 @@ - - max disk size (G) - This option allows you to put an upper limit - on the apparent size of disks. If you set this option to 100 - then all shares will appear to be not larger than 100 MB in - size. - - Note that this option does not limit the amount of - data you can put on the disk. In the above case you could still - store much more than 100 MB on the disk, but if a client ever asks - for the amount of free disk space or the total disk size then the - result will be bounded by the amount specified in max - disk size. - - This option is primarily useful to work around bugs - in some pieces of software that can't handle very large disks, - particularly disks over 1GB in size. - - A max disk size of 0 means no limit. - - Default: max disk size = 0 - Example: max disk size = 1000 - - diff --git a/docs/docbook/smbdotconf/tuning/maxopenfiles.xml b/docs/docbook/smbdotconf/tuning/maxopenfiles.xml deleted file mode 100644 index 85b76a33782..00000000000 --- a/docs/docbook/smbdotconf/tuning/maxopenfiles.xml +++ /dev/null @@ -1,16 +0,0 @@ - - max open files (G) - This parameter limits the maximum number of - open files that one smbd - 8 file - serving process may have open for a client at any one time. The - default for this parameter is set very high (10,000) as Samba uses - only one bit per unopened file. - - The limit of the number of open files is usually set - by the UNIX per-process file descriptor limit rather than - this parameter so you should never need to touch this parameter. - - Default: max open files = 10000 - - diff --git a/docs/docbook/smbdotconf/tuning/maxsmbdprocesses.xml b/docs/docbook/smbdotconf/tuning/maxsmbdprocesses.xml deleted file mode 100644 index e46f0185cea..00000000000 --- a/docs/docbook/smbdotconf/tuning/maxsmbdprocesses.xml +++ /dev/null @@ -1,17 +0,0 @@ - - max smbd processes (G) - This parameter limits the maximum number of - smbd(8) - processes concurrently running on a system and is intended - as a stopgap to prevent degrading service to clients in the event - that the server has insufficient resources to handle more than this - number of connections. Remember that under normal operating - conditions, each user will have an smbd - 8 associated with him or her - to handle connections to all shares from a given host. - - - Default: max smbd processes = 0 ## no limit - Example: max smbd processes = 1000 - - diff --git a/docs/docbook/smbdotconf/tuning/minprintspace.xml b/docs/docbook/smbdotconf/tuning/minprintspace.xml deleted file mode 100644 index acbb65fa412..00000000000 --- a/docs/docbook/smbdotconf/tuning/minprintspace.xml +++ /dev/null @@ -1,14 +0,0 @@ - - min print space (S) - This sets the minimum amount of free disk - space that must be available before a user will be able to spool - a print job. It is specified in kilobytes. The default is 0, which - means a user can always spool a print job. - - See also the printing - parameter. - - Default: min print space = 0 - Example: min print space = 2000 - - diff --git a/docs/docbook/smbdotconf/tuning/namecachetimeout.xml b/docs/docbook/smbdotconf/tuning/namecachetimeout.xml deleted file mode 100644 index 0500a75c8d9..00000000000 --- a/docs/docbook/smbdotconf/tuning/namecachetimeout.xml +++ /dev/null @@ -1,12 +0,0 @@ - - name cache timeout (G) - Specifies the number of seconds it takes before - entries in samba's hostname resolve cache time out. If - the timeout is set to 0. the caching is disabled. - - - - Default: name cache timeout = 660 - Example: name cache timeout = 0 - - diff --git a/docs/docbook/smbdotconf/tuning/paranoidserversecurity.xml b/docs/docbook/smbdotconf/tuning/paranoidserversecurity.xml deleted file mode 100644 index d60f179176f..00000000000 --- a/docs/docbook/smbdotconf/tuning/paranoidserversecurity.xml +++ /dev/null @@ -1,16 +0,0 @@ - - paranoid server security (G) - Some version of NT 4.x allow non-guest - users with a bad passowrd. When this option is enabled, samba will not - use a broken NT 4.x server as password server, but instead complain - to the logs and exit. - - - Disabling this option prevents Samba from making - this check, which involves deliberatly attempting a - bad logon to the remote server. - - Default: paranoid server security = yes - - - diff --git a/docs/docbook/smbdotconf/tuning/readsize.xml b/docs/docbook/smbdotconf/tuning/readsize.xml deleted file mode 100644 index 59c6848c761..00000000000 --- a/docs/docbook/smbdotconf/tuning/readsize.xml +++ /dev/null @@ -1,25 +0,0 @@ - - read size (G) - The option read size - affects the overlap of disk reads/writes with network reads/writes. - If the amount of data being transferred in several of the SMB - commands (currently SMBwrite, SMBwriteX and SMBreadbraw) is larger - than this value then the server begins writing the data before it - has received the whole packet from the network, or in the case of - SMBreadbraw, it begins writing to the network before all the data - has been read from disk. - - This overlapping works best when the speeds of disk and - network access are similar, having very little effect when the - speed of one is much greater than the other. - - The default value is 16384, but very little experimentation - has been done yet to determine the optimal value, and it is likely - that the best value will vary greatly between systems anyway. - A value over 65536 is pointless and will cause you to allocate - memory unnecessarily. - - Default: read size = 16384 - Example: read size = 8192 - - diff --git a/docs/docbook/smbdotconf/tuning/socketoptions.xml b/docs/docbook/smbdotconf/tuning/socketoptions.xml deleted file mode 100644 index 3acc259083b..00000000000 --- a/docs/docbook/smbdotconf/tuning/socketoptions.xml +++ /dev/null @@ -1,69 +0,0 @@ - - socket options (G) - This option allows you to set socket options - to be used when talking with the client. - - Socket options are controls on the networking layer - of the operating systems which allow the connection to be - tuned. - - This option will typically be used to tune your Samba - server for optimal performance for your local network. There is - no way that Samba can know what the optimal parameters are for - your net, so you must experiment and choose them yourself. We - strongly suggest you read the appropriate documentation for your - operating system first (perhaps man setsockopt - will help). - - You may find that on some systems Samba will say - "Unknown socket option" when you supply an option. This means you - either incorrectly typed it or you need to add an include file - to includes.h for your OS. If the latter is the case please - send the patch to - samba@samba.org. - - Any of the supported socket options may be combined - in any way you like, as long as your OS allows it. - - This is the list of socket options currently settable - using this option: - - - SO_KEEPALIVE - SO_REUSEADDR - SO_BROADCAST - TCP_NODELAY - IPTOS_LOWDELAY - IPTOS_THROUGHPUT - SO_SNDBUF * - SO_RCVBUF * - SO_SNDLOWAT * - SO_RCVLOWAT * - - - Those marked with a '*' take an integer - argument. The others can optionally take a 1 or 0 argument to enable - or disable the option, by default they will be enabled if you - don't specify 1 or 0. - - To specify an argument use the syntax SOME_OPTION = VALUE - for example SO_SNDBUF = 8192. Note that you must - not have any spaces before or after the = sign. - - If you are on a local network then a sensible option - might be - socket options = IPTOS_LOWDELAY - - If you have a local network then you could try: - socket options = IPTOS_LOWDELAY TCP_NODELAY - - If you are on a wide area network then perhaps try - setting IPTOS_THROUGHPUT. - - Note that several of the options may cause your Samba - server to fail completely. Use these options with caution! - - Default: socket options = TCP_NODELAY - Example: socket options = IPTOS_LOWDELAY - - diff --git a/docs/docbook/smbdotconf/tuning/statcachesize.xml b/docs/docbook/smbdotconf/tuning/statcachesize.xml deleted file mode 100644 index fe7d3a7be26..00000000000 --- a/docs/docbook/smbdotconf/tuning/statcachesize.xml +++ /dev/null @@ -1,9 +0,0 @@ - - stat cache size (G) - This parameter determines the number of - entries in the stat cache. You should - never need to change this parameter. - - Default: stat cache size = 50 - - diff --git a/docs/docbook/smbdotconf/tuning/strictallocate.xml b/docs/docbook/smbdotconf/tuning/strictallocate.xml deleted file mode 100644 index 7b33ef3fc3a..00000000000 --- a/docs/docbook/smbdotconf/tuning/strictallocate.xml +++ /dev/null @@ -1,21 +0,0 @@ - - strict allocate (S) - This is a boolean that controls the handling of - disk space allocation in the server. When this is set to yes - the server will change from UNIX behaviour of not committing real - disk storage blocks when a file is extended to the Windows behaviour - of actually forcing the disk system to allocate real storage blocks - when a file is created or extended to be a given size. In UNIX - terminology this means that Samba will stop creating sparse files. - This can be slow on some systems. - - When strict allocate is no the server does sparse - disk block allocation when a file is extended. - - Setting this to yes can help Samba return - out of quota messages on systems that are restricting the disk quota - of users. - - Default: strict allocate = no - - diff --git a/docs/docbook/smbdotconf/tuning/strictsync.xml b/docs/docbook/smbdotconf/tuning/strictsync.xml deleted file mode 100644 index b228f7cfcb4..00000000000 --- a/docs/docbook/smbdotconf/tuning/strictsync.xml +++ /dev/null @@ -1,23 +0,0 @@ - - strict sync (S) - Many Windows applications (including the Windows - 98 explorer shell) seem to confuse flushing buffer contents to - disk with doing a sync to disk. Under UNIX, a sync call forces - the process to be suspended until the kernel has ensured that - all outstanding data in kernel disk buffers has been safely stored - onto stable storage. This is very slow and should only be done - rarely. Setting this parameter to no (the - default) means that smbd - 8 ignores the Windows applications requests for - a sync call. There is only a possibility of losing data if the - operating system itself that Samba is running on crashes, so there is - little danger in this default setting. In addition, this fixes many - performance problems that people have reported with the new Windows98 - explorer shell file copies. - - See also the sync - always> parameter. - - Default: strict sync = no - - diff --git a/docs/docbook/smbdotconf/tuning/syncalways.xml b/docs/docbook/smbdotconf/tuning/syncalways.xml deleted file mode 100644 index c5c32343a71..00000000000 --- a/docs/docbook/smbdotconf/tuning/syncalways.xml +++ /dev/null @@ -1,19 +0,0 @@ - - sync always (S) - This is a boolean parameter that controls - whether writes will always be written to stable storage before - the write call returns. If this is no then the server will be - guided by the client's request in each write call (clients can - set a bit indicating that a particular write should be synchronous). - If this is yes then every write will be followed by a fsync() - call to ensure the data is written to disk. Note that - the strict sync parameter must be set to - yes in order for this parameter to have - any affect. - - See also the strict - sync parameter. - - Default: sync always = no - - diff --git a/docs/docbook/smbdotconf/tuning/usemmap.xml b/docs/docbook/smbdotconf/tuning/usemmap.xml deleted file mode 100644 index 46fa4600de7..00000000000 --- a/docs/docbook/smbdotconf/tuning/usemmap.xml +++ /dev/null @@ -1,14 +0,0 @@ - - use mmap (G) - This global parameter determines if the tdb internals of Samba can - depend on mmap working correctly on the running system. Samba requires a coherent - mmap/read-write system memory cache. Currently only HPUX does not have such a - coherent cache, and so this parameter is set to no by - default on HPUX. On all other systems this parameter should be left alone. This - parameter is provided to help the Samba developers track down problems with - the tdb internal code. - - - Default: use mmap = yes - - diff --git a/docs/docbook/smbdotconf/tuning/usesendfile.xml b/docs/docbook/smbdotconf/tuning/usesendfile.xml deleted file mode 100644 index 5f2dcb72a94..00000000000 --- a/docs/docbook/smbdotconf/tuning/usesendfile.xml +++ /dev/null @@ -1,14 +0,0 @@ - - use sendfile (S) - If this parameter is yes, and Samba - was built with the --with-sendfile-support option, and the underlying operating - system supports sendfile system call, then some SMB read calls (mainly ReadAndX - and ReadRaw) will use the more efficient sendfile system call for files that - are exclusively oplocked. This may make more efficient use of the system CPU's - and cause Samba to be faster. This is off by default as it's effects are unknown - as yet. - - - Default: use sendfile = no - - diff --git a/docs/docbook/smbdotconf/tuning/writecachesize.xml b/docs/docbook/smbdotconf/tuning/writecachesize.xml deleted file mode 100644 index b54a0e4fd60..00000000000 --- a/docs/docbook/smbdotconf/tuning/writecachesize.xml +++ /dev/null @@ -1,27 +0,0 @@ - - write cache size (S) - If this integer parameter is set to non-zero value, - Samba will create an in-memory cache for each oplocked file - (it does not do this for - non-oplocked files). All writes that the client does not request - to be flushed directly to disk will be stored in this cache if possible. - The cache is flushed onto disk when a write comes in whose offset - would not fit into the cache or when the file is closed by the client. - Reads for the file are also served from this cache if the data is stored - within it. - - This cache allows Samba to batch client writes into a more - efficient write size for RAID disks (i.e. writes may be tuned to - be the RAID stripe size) and can improve performance on systems - where the disk subsystem is a bottleneck but there is free - memory for userspace programs. - - The integer parameter specifies the size of this cache - (per oplocked file) in bytes. - - Default: write cache size = 0 - Example: write cache size = 262144 - - for a 256k cache size per file. - - diff --git a/docs/docbook/smbdotconf/vfs/hostmsdfs.xml b/docs/docbook/smbdotconf/vfs/hostmsdfs.xml deleted file mode 100644 index 0496fd7f477..00000000000 --- a/docs/docbook/smbdotconf/vfs/hostmsdfs.xml +++ /dev/null @@ -1,17 +0,0 @@ - - host msdfs (G) - This boolean parameter is only available - if Samba has been configured and compiled with the - --with-msdfs option. If set to yes, - Samba will act as a Dfs server, and allow Dfs-aware clients - to browse Dfs trees hosted on the server. - - See also the - msdfs root share level parameter. For - more information on setting up a Dfs tree on Samba, - refer to msdfs_setup.html. - - - Default: host msdfs = no - - diff --git a/docs/docbook/smbdotconf/vfs/msdfsproxy.xml b/docs/docbook/smbdotconf/vfs/msdfsproxy.xml deleted file mode 100644 index 41b36cb91b2..00000000000 --- a/docs/docbook/smbdotconf/vfs/msdfsproxy.xml +++ /dev/null @@ -1,15 +0,0 @@ - - msdfs proxy (S) - This parameter indicates that the share is a - stand-in for another CIFS share whose location is specified by - the value of the parameter. When clients attempt to connect to - this share, they are redirected to the proxied share using - the SMB-Dfs protocol. - Only Dfs roots can act as proxy shares. Take a look at the - msdfs root - and - host msdfs - options to find out how to set up a Dfs root share. - Example: msdfs proxy = \\\\otherserver\\someshare - - diff --git a/docs/docbook/smbdotconf/vfs/msdfsroot.xml b/docs/docbook/smbdotconf/vfs/msdfsroot.xml deleted file mode 100644 index dc50ba5e578..00000000000 --- a/docs/docbook/smbdotconf/vfs/msdfsroot.xml +++ /dev/null @@ -1,19 +0,0 @@ - - msdfs root (S) - This boolean parameter is only available if - Samba is configured and compiled with the - --with-msdfs option. If set to yes, - Samba treats the share as a Dfs root and allows clients to browse - the distributed file system tree rooted at the share directory. - Dfs links are specified in the share directory by symbolic - links of the form msdfs:serverA\\shareA,serverB\\shareB - and so on. For more information on setting up a Dfs tree - on Samba, refer to "Hosting a Microsoft - Distributed File System tree on Samba" document. - - See also host msdfs - - - Default: msdfs root = no - - diff --git a/docs/docbook/smbdotconf/vfs/vfsobject.xml b/docs/docbook/smbdotconf/vfs/vfsobject.xml deleted file mode 100644 index d334552dae9..00000000000 --- a/docs/docbook/smbdotconf/vfs/vfsobject.xml +++ /dev/null @@ -1,10 +0,0 @@ - - vfs object (S) - This parameter specifies a shared object files that - are used for Samba VFS I/O operations. By default, normal - disk I/O operations are used but these can be overloaded - with one or more VFS objects. - - Default : no value - - diff --git a/docs/docbook/smbdotconf/vfs/vfsoptions.xml b/docs/docbook/smbdotconf/vfs/vfsoptions.xml deleted file mode 100644 index 28f14a09bfb..00000000000 --- a/docs/docbook/smbdotconf/vfs/vfsoptions.xml +++ /dev/null @@ -1,10 +0,0 @@ - - vfs options (S) - This parameter allows parameters to be passed - to the vfs layer at initialization time. - See also - vfs object. - - Default : no value - - diff --git a/docs/docbook/smbdotconf/vfs/vfspath.xml b/docs/docbook/smbdotconf/vfs/vfspath.xml deleted file mode 100644 index 78c27302a8a..00000000000 --- a/docs/docbook/smbdotconf/vfs/vfspath.xml +++ /dev/null @@ -1,12 +0,0 @@ - - vfs path (S) - This parameter specifies the directory - to look in for vfs modules. The name of every vfs object - will be prepended by this directory - - - Default: vfs path = - Example: vfs path = /usr/lib/samba/vfs - - - diff --git a/docs/docbook/smbdotconf/winbind/templatehomedir.xml b/docs/docbook/smbdotconf/winbind/templatehomedir.xml deleted file mode 100644 index a931e9b5a3e..00000000000 --- a/docs/docbook/smbdotconf/winbind/templatehomedir.xml +++ /dev/null @@ -1,13 +0,0 @@ - - template homedir (G) - When filling out the user information for a Windows NT - user, the winbindd(8) daemon - uses this parameter to fill in the home directory for that user. - If the string %D is present it is substituted - with the user's Windows NT domain name. If the string %U - is present it is substituted with the user's Windows - NT user name. - - Default: template homedir = /home/%D/%U - - diff --git a/docs/docbook/smbdotconf/winbind/templateshell.xml b/docs/docbook/smbdotconf/winbind/templateshell.xml deleted file mode 100644 index e0b9f1a2cab..00000000000 --- a/docs/docbook/smbdotconf/winbind/templateshell.xml +++ /dev/null @@ -1,10 +0,0 @@ - - template shell (G) - When filling out the user information for a Windows NT - user, the winbindd - 8 daemon - uses this parameter to fill in the login shell for that user. - - Default: template shell = /bin/false - - diff --git a/docs/docbook/smbdotconf/winbind/winbindcachetime.xml b/docs/docbook/smbdotconf/winbind/winbindcachetime.xml deleted file mode 100644 index adbb8b12f6c..00000000000 --- a/docs/docbook/smbdotconf/winbind/winbindcachetime.xml +++ /dev/null @@ -1,11 +0,0 @@ - - winbind cache time (G) - This parameter specifies the number of - seconds the winbindd - 8 daemon will cache - user and group information before querying a Windows NT server - again. - - Default: winbind cache type = 15 - - diff --git a/docs/docbook/smbdotconf/winbind/winbindenumgroups.xml b/docs/docbook/smbdotconf/winbind/winbindenumgroups.xml deleted file mode 100644 index 096c280fc2b..00000000000 --- a/docs/docbook/smbdotconf/winbind/winbindenumgroups.xml +++ /dev/null @@ -1,18 +0,0 @@ - - winbind enum groups (G) - On large installations using winbindd - 8 it may be necessary to suppress - the enumeration of groups through the setgrent(), - getgrent() and - endgrent() group of system calls. If - the winbind enum groups parameter is - no, calls to the getgrent() system - call will not return any data. - - Warning: Turning off group - enumeration may cause some programs to behave oddly. - - - Default: winbind enum groups = yes - - diff --git a/docs/docbook/smbdotconf/winbind/winbindenumusers.xml b/docs/docbook/smbdotconf/winbind/winbindenumusers.xml deleted file mode 100644 index 7935755f0cf..00000000000 --- a/docs/docbook/smbdotconf/winbind/winbindenumusers.xml +++ /dev/null @@ -1,20 +0,0 @@ - - winbind enum users (G) - On large installations using winbindd - 8 it may be - necessary to suppress the enumeration of users through the setpwent(), - getpwent() and - endpwent() group of system calls. If - the winbind enum users parameter is - no, calls to the getpwent system call - will not return any data. - - Warning: Turning off user - enumeration may cause some programs to behave oddly. For - example, the finger program relies on having access to the - full user list when searching for matching - usernames. - - Default: winbind enum users = yes - - diff --git a/docs/docbook/smbdotconf/winbind/winbindgid.xml b/docs/docbook/smbdotconf/winbind/winbindgid.xml deleted file mode 100644 index a8a9683b015..00000000000 --- a/docs/docbook/smbdotconf/winbind/winbindgid.xml +++ /dev/null @@ -1,14 +0,0 @@ - - winbind gid (G) - The winbind gid parameter specifies the range of group - ids that are allocated by the winbindd - 8 daemon. This range of group ids should have no - existing local or NIS groups within it as strange conflicts can - occur otherwise. - - Default: winbind gid = <empty string> - - - Example: winbind gid = 10000-20000 - - diff --git a/docs/docbook/smbdotconf/winbind/winbindseparator.xml b/docs/docbook/smbdotconf/winbind/winbindseparator.xml deleted file mode 100644 index 416adcb5315..00000000000 --- a/docs/docbook/smbdotconf/winbind/winbindseparator.xml +++ /dev/null @@ -1,17 +0,0 @@ - - winbind separator (G) - This parameter allows an admin to define the character - used when listing a username of the form of DOMAIN - \user. This parameter - is only applicable when using the pam_winbind.so - and nss_winbind.so modules for UNIX services. - - - Please note that setting this parameter to + causes problems - with group membership at least on glibc systems, as the character + - is used as a special character for NIS in /etc/group. - - Default: winbind separator = '\' - Example: winbind separator = + - - diff --git a/docs/docbook/smbdotconf/winbind/winbinduid.xml b/docs/docbook/smbdotconf/winbind/winbinduid.xml deleted file mode 100644 index ecd7848f611..00000000000 --- a/docs/docbook/smbdotconf/winbind/winbinduid.xml +++ /dev/null @@ -1,14 +0,0 @@ - - winbind uid (G) - The winbind gid parameter specifies the range of group - ids that are allocated by the winbindd - 8 daemon. This range of ids should have no - existing local or NIS users within it as strange conflicts can - occur otherwise. - - Default: winbind uid = <empty string> - - - Example: winbind uid = 10000-20000 - - diff --git a/docs/docbook/smbdotconf/winbind/winbindusedefaultdomain.xml b/docs/docbook/smbdotconf/winbind/winbindusedefaultdomain.xml deleted file mode 100644 index a6b7bcd7e52..00000000000 --- a/docs/docbook/smbdotconf/winbind/winbindusedefaultdomain.xml +++ /dev/null @@ -1,14 +0,0 @@ - - winbind use default domain (G) - This parameter specifies whether the winbindd - 8 daemon should operate on users - without domain component in their username. - Users without a domain component are treated as is part of the winbindd server's - own domain. While this does not benifit Windows users, it makes SSH, FTP and e-mail - function in a way much closer to the way they would in a native unix system. - - Default: winbind use default domain = <no> - - Example: winbind use default domain = yes - - diff --git a/docs/docbook/smbdotconf/wins/dnsproxy.xml b/docs/docbook/smbdotconf/wins/dnsproxy.xml deleted file mode 100644 index fd53ae7ded0..00000000000 --- a/docs/docbook/smbdotconf/wins/dnsproxy.xml +++ /dev/null @@ -1,21 +0,0 @@ - - dns proxy (G) - Specifies that nmbd - 8 when acting as a WINS server and - finding that a NetBIOS name has not been registered, should treat the - NetBIOS name word-for-word as a DNS name and do a lookup with the DNS server - for that name on behalf of the name-querying client. - - Note that the maximum length for a NetBIOS name is 15 - characters, so the DNS name (or DNS alias) can likewise only be - 15 characters, maximum. - - nmbd spawns a second copy of itself to do the - DNS name lookup requests, as doing a name lookup is a blocking - action. - - See also the parameter - wins support. - - Default: dns proxy = yes - diff --git a/docs/docbook/smbdotconf/wins/winshook.xml b/docs/docbook/smbdotconf/wins/winshook.xml deleted file mode 100644 index e0c4a87c5b8..00000000000 --- a/docs/docbook/smbdotconf/wins/winshook.xml +++ /dev/null @@ -1,43 +0,0 @@ - - wins hook (G) - When Samba is running as a WINS server this - allows you to call an external program for all changes to the - WINS database. The primary use for this option is to allow the - dynamic update of external name resolution databases such as - dynamic DNS. - - The wins hook parameter specifies the name of a script - or executable that will be called as follows: - - wins_hook operation name nametype ttl IP_list - - - - The first argument is the operation and is one - of "add", "delete", or "refresh". In most cases the operation can - be ignored as the rest of the parameters provide sufficient - information. Note that "refresh" may sometimes be called when the - name has not previously been added, in that case it should be treated - as an add. - - The second argument is the NetBIOS name. If the - name is not a legal name then the wins hook is not called. - Legal names contain only letters, digits, hyphens, underscores - and periods. - - The third argument is the NetBIOS name - type as a 2 digit hexadecimal number. - - The fourth argument is the TTL (time to live) - for the name in seconds. - - The fifth and subsequent arguments are the IP - addresses currently registered for that name. If this list is - empty then the name should be deleted. - - - An example script that calls the BIND dynamic DNS update - program nsupdate is provided in the examples - directory of the Samba source code. - - diff --git a/docs/docbook/smbdotconf/wins/winspartners.xml b/docs/docbook/smbdotconf/wins/winspartners.xml deleted file mode 100644 index 840435ae4e2..00000000000 --- a/docs/docbook/smbdotconf/wins/winspartners.xml +++ /dev/null @@ -1,14 +0,0 @@ - - wins partners (G) - A space separated list of partners' IP addresses for - WINS replication. WINS partners are always defined as push/pull - partners as defining only one way WINS replication is unreliable. - WINS replication is currently experimental and unreliable between - samba servers. - - - Default: wins partners = - - Example: wins partners = 192.168.0.1 172.16.1.2 - - diff --git a/docs/docbook/smbdotconf/wins/winsproxy.xml b/docs/docbook/smbdotconf/wins/winsproxy.xml deleted file mode 100644 index 31978d3b244..00000000000 --- a/docs/docbook/smbdotconf/wins/winsproxy.xml +++ /dev/null @@ -1,9 +0,0 @@ - - wins proxy (G) - This is a boolean that controls if nmbd(8) will respond to broadcast name - queries on behalf of other hosts. You may need to set this - to yes for some older clients. - - Default: wins proxy = no - - diff --git a/docs/docbook/smbdotconf/wins/winsserver.xml b/docs/docbook/smbdotconf/wins/winsserver.xml deleted file mode 100644 index ebdb3016c70..00000000000 --- a/docs/docbook/smbdotconf/wins/winsserver.xml +++ /dev/null @@ -1,32 +0,0 @@ - - wins server (G) - This specifies the IP address (or DNS name: IP - address for preference) of the WINS server that nmbd - 8 should register with. If you have a WINS server on - your network then you should set this to the WINS server's IP. - - You should point this at your WINS server if you have a - multi-subnetted network. - - If you want to work in multiple namespaces, you can - give every wins server a 'tag'. For each tag, only one - (working) server will be queried for a name. The tag should be - seperated from the ip address by a colon. - - - You need to set up Samba to point - to a WINS server if you have multiple subnets and wish cross-subnet - browsing to work correctly. - - See the documentation file Browsing in the samba howto collection. - - Default: not enabled - Example: wins server = mary:192.9.200.1 fred:192.168.3.199 mary:192.168.2.61 - For this example when querying a certain name, 192.19.200.1 will - be asked first and if that doesn't respond 192.168.2.61. If either - of those doesn't know the name 192.168.3.199 will be queried. - - - Example: wins server = 192.9.200.1 192.168.2.61 - - diff --git a/docs/docbook/smbdotconf/wins/winssupport.xml b/docs/docbook/smbdotconf/wins/winssupport.xml deleted file mode 100644 index 5ad886a9b1d..00000000000 --- a/docs/docbook/smbdotconf/wins/winssupport.xml +++ /dev/null @@ -1,12 +0,0 @@ - - wins support (G) - This boolean controls if the nmbd - 8 process in Samba will act as a WINS server. You should - not set this to yes unless you have a multi-subnetted network and - you wish a particular nmbd to be your WINS server. - Note that you should NEVER set this to yes - on more than one machine in your network. - - Default: wins support = no - - diff --git a/docs/docs-status b/docs/docs-status index 7ccaa9b9b2f..d4a7d976e53 100644 --- a/docs/docs-status +++ b/docs/docs-status @@ -1,47 +1,58 @@ If you'd like to work on any of these, please contact jerry@samba.org or jelmer@samba.org. Outdated docs: -Manifest +docs/OID/allocated-arcs.txt - does this file really belong here? +docs/OID/samba-oid.mail - does this file really belong here? docs/announce - out of date (announces 2.2.0) - should it go away? docs/history - needs updating (is current up to 1998 - merge with 10year.html ?) +docs/docbook/devdoc/* - most of these docs are outdated and need updates... docs/docbook/manpages/net.8.sgml - Still not finished +docs/docbook/manpages/rpcclient.1.sgml - Command documentation might be outdated docs/docbook/manpages/samba.7.sgml - Listing of samba programs is not complete +docs/docbook/manpages/smbclient.1.sgml - document -k (kerberos authentication) +docs/docbook/manpages/smbcontrol.1.sgml - Document -s, samsync, samrepl, pool-usage, dmalloc-mark, dmalloc-log-changed, shutdown, change_id docs/docbook/manpages/smb.conf.5.sgml - 'restrict anonymous' isn't documented properly +docs/docbook/projdoc/DOMAIN_MEMBER.sgml - Needs update to 3.0 +docs/docbook/projdoc/ADS-HOWTO.sgml - seems outdated (it says we require 'ads server' when in ads mode, though that's not true, according to the manpages...) +docs/docbook/projdoc/ENCRYPTION.sgml - contains useless old info about smbpasswd docs/docbook/projdoc/Integrating-with-Windows.sgml - Should slowly go a way. Contains a little bit information about wins, a little bit about domain membership, a little about winbind, etc +docs/docbook/projdoc/NT_Security.sgml - probably outdated +docs/docbook/projdoc/Diagnosis.sgml - Needs extension docs/docbook/projdoc/PAM-Authentication-And-Samba.sgml docs/docbook/projdoc/Printing.sgml - Cups is not documented, smbprint, printing /to/ a windows server... - Kurt Pfeifle docs/docbook/projdoc/Samba-BDC-HOWTO.sgml - Needs update to 3.0 -docs/docbook/projdoc/Samba-LDAP-HOWTO.sgml - Needs update to 3.0 ( http://www.unav.es/cti/ldap-smb/smb-ldap-3-howto.html ) +docs/docbook/projdoc/Samba-LDAP-HOWTO.sgml - Needs update to 3.0 +docs/docbook/projdoc/Samba-PDC-HOWTO.sgml - Needs update to 3.0 docs/docbook/projdoc/Speed.sgml - contains outdated and invalid information -docs/docbook/projdoc/UNIX_INSTALL.sgml - Merge locking part with oplocks.sgml +docs/docbook/projdoc/UNIX_INSTALL.sgml - Needs a lot of updating (swat, ADS, PDC, etc) docs/docbook/projdoc/printer_driver2.sgml - Needs integration with printing.sgml, still up to date? -docs/docbook/projdoc/upgrading-to-3.0.sgml - not finished yet +docs/docbook/projdoc/security_level.sgml - information about ads and domain should be added (currently only contains pointers to the ads and domain_member docs) docs/docbook/projdoc/winbind.sgml - needs documentation for ADS docs/textdocs/CUPS-PrintingInfo.txt - needs to be converted to sgml - Kurt Pfeifle docs/textdocs/PROFILES.txt - needs to be converted to sgml docs/textdocs/README.jis - Seems to need updating - possibly obsoleted by a newer japanese howto? -docs/docbook/manpages/ntlm_auth.1.sgml - Is very basic at the moment, parameters need better descriptions - abartlet +docs/textdocs/RoutedNetworks.txt - still valid, but shouldn't this go into Other_clients.sgml ? This text originally comes from microsoft, what about copyright? + +These still need to be checked: +docs/docbook/manpages/smbd.8.sgml +docs/docbook/manpages/smbmnt.8.sgml +docs/docbook/manpages/smbmount.8.sgml +docs/docbook/manpages/smbpasswd.8.sgml +docs/docbook/manpages/smbsh.1.sgml +docs/docbook/manpages/smbspool.8.sgml +docs/docbook/manpages/smbstatus.1.sgml +docs/docbook/manpages/smbtar.1.sgml +docs/docbook/manpages/smbumount.8.sgml +docs/docbook/manpages/swat.8.sgml +docs/docbook/manpages/testparm.1.sgml +docs/docbook/manpages/testprns.1.sgml +docs/docbook/manpages/wbinfo.1.sgml Stuff that needs to be documented: -wrepld +Merge the various docs about wins and browsing Windows NT 4.0 Style Trust Relationship -Winbind in a samba controlled domain One Time Migration script from a Windows NT 4.0 PDC to a Samba PDC ldap passwd sync +using rsync to get latest HEAD version -Not release-critical: -docs/docbook/devdoc/* - most of these docs are outdated and need updates... -docs/docbook/projdoc/Diagnosis.sgml - Needs extension -docs/docbook/manpages/rpcclient.1.sgml - Some commands could be documented more extensively - -Documentation for following smb.conf.5 parameters does not exist: -acl compatibility // protocol -client signing // protocol -client use spnego // protocol -profile acls // protocol -client lanman auth // security -client NTLMv2 auth // security -idmap backend // security -kernel change notify // tuning -lpq cache time // tuning --valid // misc +http://www.unav.es/cti/ldap-smb/smb-ldap-3-howto.html diff --git a/docs/faq/faq-clientapp.html b/docs/faq/clientapp.html similarity index 84% rename from docs/faq/faq-clientapp.html rename to docs/faq/clientapp.html index 3a85fb4f5a4..d24e778b2af 100644 --- a/docs/faq/faq-clientapp.html +++ b/docs/faq/clientapp.html @@ -5,16 +5,17 @@ >Specific client application problemsPrevNext

Chapter 4. Specific client application problems

Chapter 4. Specific client application problems

4.1. MS Office Setup reports "Cannot change properties of '\\MSOFFICE\\SETUP.INI'"

4.1. MS Office Setup reports "Cannot change properties of '\MSOFFICE\SETUP.INI'"

When installing MS Office on a Samba drive for which you have admin user permissions, ie. admin users = username, you will find the @@ -98,9 +95,7 @@ CLASS="SECT1" >

4.2. How to use a Samba share as an administrative share for MS Office, etc.

4.2. How to use a Samba share as an administrative share for MS Office, etc.

Microsoft Office products can be installed as an administrative installation from which the application can either be run off the administratively installed @@ -133,16 +128,16 @@ set the following parameters on the share containing it:

[MSOP95]
-	path = /where_you_put_it
-	comment = Your comment
-	volume = "The_CD_ROM_Label"
-	read only = yes
-	available = yes
-	share modes = no
-	locking = no
-	browseable = yes
-	public = yes
[MSOP95] + path = /where_you_put_it + comment = Your comment + volume = "The_CD_ROM_Label" + read only = yes + available = yes + share modes = no + locking = no + browseable = yes + public = yes

  • 4.3. Microsoft Access database opening errors

    4.3. Microsoft Access database opening errors

    Here are some notes on running MS-Access on a Samba drive from PrevNextCommon errorsPrevNext

  • Chapter 5. Common errors

    Chapter 5. Common errors

    5.1. Not listening for calling name

    5.1. Not listening for calling name

    5.2. System Error 1240

    5.2. System Error 1240

    System error 1240 means that the client is refusing to talk to a non-encrypting server. Microsoft changed WinNT in service @@ -139,9 +134,7 @@ CLASS="SECT1" >

    5.3. smbclient ignores -N !

    5.3. smbclient ignores -N !

    5.4. The data on the CD-Drive I've shared seems to be corrupted!

    5.4. The data on the CD-Drive I've shared seems to be corrupted!

    Some OSes (notably Linux) default to auto detection of file type on cdroms and do cr/lf translation. This is a very bad idea when use with @@ -190,9 +181,7 @@ CLASS="SECT1" >

    5.5. Why can users access home directories of other users?

    5.5. Why can users access home directories of other users?

    5.6. Until a few minutes after samba has started, clients get the error "Domain Controller Unavailable"

    5.6. Until a few minutes after samba has started, clients get the error "Domain Controller Unavailable"

    A domain controller has to announce on the network who it is. This usually takes a while.

    5.7. I'm getting "open_oplock_ipc: Failed to get local UDP socket for address 100007f. Error was Cannot assign requested" in the logs

    5.7. I'm getting "open_oplock_ipc: Failed to get local UDP socket for address 100007f. Error was Cannot assign requested" in the logs

    Your loopback device isn't working correctly. Make sure it's running.

    PrevNext -Features
    Samba FAQ
    PrevNext

    Chapter 6. Features

    6.1. How can I prevent my samba server from being used to distribute the Nimda worm?

    Author: HASEGAWA Yosuke (translated by TAKAHASHI Motonobu)

    Nimba Worm is infected through shared disks on a network, as well as through -Microsoft IIS, Internet Explorer and mailer of Outlook series.

    At this time, the worm copies itself by the name *.nws and *.eml on -the shared disk, moreover, by the name of Riched20.dll in the folder -where *.doc file is included.

    To prevent infection through the shared disk offered by Samba, set -up as follows:

    [global]
    -  ...
    -  # This can break Administration installations of Office2k.
    -  # in that case, don't veto the riched20.dll
    -  veto files = /*.eml/*.nws/riched20.dll/

    By setting the "veto files" parameter, matched files on the Samba -server are completely hidden from the clients and making it impossible -to access them at all.

    In addition to it, the following setting is also pointed out by the -samba-jp:09448 thread: when the -"readme.txt.{3050F4D8-98B5-11CF-BB82-00AA00BDCE0B}" file exists on -a Samba server, it is visible only as "readme.txt" and dangerous -code may be executed if this file is double-clicked.

    Setting the following, -

      veto files = /*.{*}/
    -any files having CLSID in its file extension will be inaccessible from any -clients.

    This technical article is created based on the discussion of -samba-jp:09448 and samba-jp:10900 threads.

    6.2. How can I use samba as a fax server?

    Contributor: Gerhard Zuber

    Requirements: -

    UNIX box (Linux preferred) with SAMBA and a faxmodem
    ghostscript package
    mgetty+sendfax package
    pbm package (portable bitmap tools)

    First, install and configure the required packages. Be sure to read the mgetty+sendfax -manual carefully.

    6.2.1. Tools for printing faxes

    Your incomed faxes are in: -/var/spool/fax/incoming. Print it with:

    for i in *
    -do
    -g3cat $i | g3tolj | lpr -P hp
    -done

    g3cat is in the tools-section, g3tolj is in the contrib-section -for printing to HP lasers.

    If you want to produce files for displaying and printing with Windows, use -some tools from the pbm-package like the following command: g3cat $i | g3topbm - | ppmtopcx - >$i.pcx -and view it with your favourite Windows tool (maybe paintbrush)

    6.2.2. Making the fax-server

    fetch the file mgetty+sendfax/frontends/winword/faxfilter and place it in /usr/local/etc/mgetty+sendfax/(replace /usr/local/ with whatever place you installed mgetty+sendfax)

    prepare your faxspool file as mentioned in this file -edit fax/faxspool.in and reinstall or change the final -/usr/local/bin/faxspool too.

    if [ "$user" = "root" -o "$user" = "fax" -o \
    -     "$user" = "lp" -o "$user" = "daemon" -o "$user" = "bin" ]

    find the first line and change it to the second.

    make sure you have pbmtext (from the pbm-package). This is -needed for creating the small header line on each page.

    Prepare your faxheader /usr/local/etc/mgetty+sendfax/faxheader

    Edit your /etc/printcap file: -

    # FAX 
    -lp3|fax:\
    -        :lp=/dev/null:\
    -        :sd=/usr/spool/lp3:\
    -        :if=/usr/local/etc/mgetty+sendfax/faxfilter:sh:sf:mx#0:\
    -        :lf=/usr/spool/lp3/fax-log:

    Now, edit your smb.conf so you have a smb based printer named "fax"

    6.2.3. Installing the client drivers

    Now you have a printer called "fax" which can be used via -TCP/IP-printing (lpd-system) or via SAMBA (windows printing).

    On every system you are able to produce postscript-files you -are ready to fax.

    On Windows 3.1 95 and NT:

    Install a printer wich produces postscript output, - e.g. apple laserwriter

    Connect the "fax" to your printer.

    Now write your first fax. Use your favourite wordprocessor, -write, winword, notepad or whatever you want, and start -with the headerpage.

    Usually each fax has a header page. It carries your name, -your address, your phone/fax-number.

    It carries also the recipient, his address and his *** fax -number ***. Now here is the trick:

    Use the text: -

    Fax-Nr: 123456789
    -as the recipients fax-number. Make sure this text does not -occur in regular text ! Make sure this text is not broken -by formatting information, e.g. format it as a single entity. -(Windows Write and Win95 Wordpad are functional, maybe newer - versions of Winword are breaking formatting information).

    The trick is that postscript output is human readable and -the faxfilter program scans the text for this pattern and -uses the found number as the fax-destination-number.

    Now print your fax through the fax-printer and it will be -queued for later transmission. Use faxrunq for sending the -queue out.

    6.2.4. Example smb.conf

    [global]
    - printcap name = /etc/printcap
    - print command = /usr/bin/lpr -r -P %p %s
    - lpq command = /usr/bin/lpq -P %p
    - lprm command = /usr/bin/lprm -P %p %j
    -
    -[fax]
    -    comment = FAX (mgetty+sendfax)
    -    path = /tmp
    -    printable = yes
    -    public = yes
    -    writable = no
    -    create mode = 0700
    -    browseable = yes
    -    guest ok = no

    6.3. Samba doesn't work well together with DHCP!

    We wish to help those folks who wish to use the ISC DHCP Server and provide -sample configuration settings. Most operating systems today come ship with -the ISC DHCP Server. ISC DHCP is available from: -ftp://ftp.isc.org/isc/dhcp

    Incorrect configuration of MS Windows clients (Windows9X, Windows ME, Windows -NT/2000) will lead to problems with browsing and with general network -operation. Windows 9X/ME users often report problems where the TCP/IP and related -network settings will inadvertantly become reset at machine start-up resulting -in loss of configuration settings. This results in increased maintenance -overheads as well as serious user frustration.

    In recent times users on one mailing list incorrectly attributed the cause of -network operating problems to incorrect configuration of Samba.

    One user insisted that the only way to provent Windows95 from periodically -performing a full system reset and hardware detection process on start-up was -to install the NetBEUI protocol in addition to TCP/IP. This assertion is not -correct.

    In the first place, there is NO need for NetBEUI. All Microsoft Windows clients -natively run NetBIOS over TCP/IP, and that is the only protocol that is -recognised by Samba. Installation of NetBEUI and/or NetBIOS over IPX will -cause problems with browse list operation on most networks. Even Windows NT -networks experience these problems when incorrectly configured Windows95 -systems share the same name space. It is important that only those protocols -that are strictly needed for site specific reasons should EVER be installed.

    Secondly, and totally against common opinion, DHCP is NOT an evil design but is -an extension of the BOOTP protocol that has been in use in Unix environments -for many years without any of the melt-down problems that some sensationalists -would have us believe can be experienced with DHCP. In fact, DHCP in covered by -rfc1541 and is a very safe method of keeping an MS Windows desktop environment -under control and for ensuring stable network operation.

    Please note that MS Windows systems as of MS Windows NT 3.1 and MS Windows 95 -store all network configuration settings a registry. There are a few reports -from MS Windows network administrators that warrant mention here. It would appear -that when one sets certain MS TCP/IP protocol settings (either directly or via -DHCP) that these do get written to the registry. Even though a subsequent -change of setting may occur the old value may persist in the registry. This -has been known to create serious networking problems.

    An example of this occurs when a manual TCP/IP environment is configured to -include a NetBIOS Scope. In this event, when the administrator then changes the -configuration of the MS TCP/IP protocol stack, without first deleting the -current settings, by simply checking the box to configure the MS TCP/IP stack -via DHCP then the NetBIOS Scope that is still persistent in the registry WILL be -applied to the resulting DHCP offered settings UNLESS the DHCP server also sets -a NetBIOS Scope. It may therefore be prudent to forcibly apply a NULL NetBIOS -Scope from your DHCP server. The can be done in the dhcpd.conf file with the -parameter: -option netbios-scope "";

    While it is true that the Microsoft DHCP server that comes with Windows NT -Server provides only a sub-set of rfc1533 functionality this is hardly an issue -in those sites that already have a large investment and commitment to Unix -systems and technologies. The current state of the art of the DHCP Server -specification in covered in rfc2132.

    6.4. How can I assign NetBIOS names to clients with DHCP?

    SMB network clients need to be configured so that all standard TCP/IP name to -address resolution works correctly. Once this has been achieved the SMB -environment provides additional tools and services that act as helper agents in -the translation of SMB (NetBIOS) names to their appropriate IP Addresses. One -such helper agent is the NetBIOS Name Server (NBNS) or as Microsoft called it -in their Windows NT Server implementation WINS (Windows Internet Name Server).

    A client needs to be configured so that it has a unique Machine (Computer) -Name.

    This can be done, but needs a few NT registry hacks and you need to be able to -speak UNICODE, which is of course no problem for a True Wizzard(tm) :) -Instructions on how to do this (including a small util for less capable -Wizzards) can be found at

    http://www.unixtools.org/~nneul/sw/nt/dhcp-netbios-hostname.html

    6.5. How do I convert between unix and dos text formats?

    Jim barry has written an excellent drag-and-drop cr/lf converter for -windows. Just drag your file onto the icon and it converts the file.

    The utilities unix2dos and dos2unix(in the mtools package) should do -the job under unix.

    6.6. Does samba have wins replication support?

    At the time of writing there is currently being worked on a wins replication implementation(wrepld).


    PrevHomeNext
    Common errors Printing problems
    \ No newline at end of file diff --git a/docs/faq/faq-printing.html b/docs/faq/faq-printing.html deleted file mode 100644 index a806b15de8d..00000000000 --- a/docs/faq/faq-printing.html +++ /dev/null @@ -1,181 +0,0 @@ - -Printing problems
    Samba FAQ
    Prev 

    Chapter 7. Printing problems

    7.1. setdriver or cupsaddsmb failes

    setdriver expects the following setup: - -

    you are a printer admin, or root. this is the smb.conf printer admin group, not the Printer Operators group in NT. I've not tried the latter, but I don't believe it will work based on the current code.
    printer admins has to be defined in [global]
    upload the driver files to \\server\print$\w32x86 and win40 as appropriate. DON'T put them in the 0 or 2 subdirectories.
    Make sure that the user you're connecting as is able to write to the print$ directories
    Use adddriver (with appropriate parameters) to create the driver. note, this will not just update samba's notion of drivers, it will also move the files from the w32x86 and win40 directories to an appropriate subdirectory (based on driver version, I think, but not important enough for me to find out)
    Use setdriver to associate the driver with a printer

    The setdriver call will fail if the printer doesn't already exist in -samba's view of the world. Either create the printer in cups and -restart samba, or create an add printer command (see smb.conf doco) -and use RPC calls to create a printer. NB the add printer command MUST -return a single line of text indicating which port the printer was -added on. If it doesn't, Samba won't reload the printer -definitions. Although samba doesn't really support the notion of -ports, suitable add printer command and enumport command settings can -allow you pretty good remote control of the samba printer setup.


    PrevHome 
    Features  
    \ No newline at end of file diff --git a/docs/faq/faq-general.html b/docs/faq/general.html similarity index 93% rename from docs/faq/faq-general.html rename to docs/faq/general.html index 15dce949c9d..435a2282b45 100644 --- a/docs/faq/faq-general.html +++ b/docs/faq/general.html @@ -5,7 +5,8 @@ >General InformationNext

    Chapter 1. General Information

    Chapter 1. General Information

    1.1. Where can I get it?

    1.1. Where can I get it?

    The Samba suite is available at the

    1.2. What do the version numbers mean?

    1.2. What do the version numbers mean?

    It is not recommended that you run a version of Samba with the word "alpha" in its name unless you know what you are doing and are willing @@ -166,9 +161,7 @@ CLASS="SECT1" >

    1.3. What platforms are supported?

    1.3. What platforms are supported?

    Many different platforms have run Samba successfully. The platforms most widely used and thus best tested are Linux and SunOS.

    1.4. How do I subscribe to the Samba Mailing Lists?

    1.4. How do I subscribe to the Samba Mailing Lists?

    Look at

    1.5. Pizza supply details

    1.5. Pizza supply details

    Those who have registered in the Samba survey as "Pizza Factory" will already know this, but the rest may need some help. Andrew doesn't ask @@ -421,7 +410,7 @@ WIDTH="33%" ALIGN="right" VALIGN="top" >NextCompiling and installing Samba on a Unix hostPrevNext

    Chapter 2. Compiling and installing Samba on a Unix host

    Chapter 2. Compiling and installing Samba on a Unix host

    2.1. I can't see the Samba server in any browse lists!

    2.1. I can't see the Samba server in any browse lists!

    See Browsing.html in the docs directory of the samba source for more information on browsing.

    2.2. Some files that I KNOW are on the server don't show up when I view the files from my client!

    2.2. Some files that I KNOW are on the server doesn't show up when I view the files from my client!

    See the next question.

    2.3. Some files on the server show up with really wierd filenames when I view the files from my client!

    2.3. Some files on the server show up with really wierd filenames when I view the files from my client!

    If you check what files are not showing up, you will note that they are files which contain upper case letters or which are otherwise not @@ -131,9 +124,7 @@ CLASS="SECT1" >

    2.4. My client reports "cannot locate specified computer" or similar

    2.4. My client reports "cannot locate specified computer" or similar

    This indicates one of three things: You supplied an incorrect server name, the underlying TCP/IP layer is not working correctly, or the @@ -166,9 +157,7 @@ CLASS="SECT1" >

    2.5. My client reports "cannot locate specified share name" or similar

    2.5. My client reports "cannot locate specified share name" or similar

    This message indicates that your client CAN locate the specified server, which is a good start, but that it cannot find a service of @@ -209,9 +198,7 @@ CLASS="SECT1" >

    2.6. Printing doesn't work

    2.6. Printing doesn't work

    Make sure that the specified print command for the service you are connecting to is correct and that it has a fully-qualified path (eg., @@ -245,9 +232,7 @@ CLASS="SECT1" >

    2.7. My client reports "This server is not configured to list shared resources"

    2.7. My client reports "This server is not configured to list shared resources"

    Your guest account is probably invalid for some reason. Samba uses the guest account for browsing in smbd. Check that your guest account is @@ -260,9 +245,7 @@ CLASS="SECT1" >

    2.8. Log message "you appear to have a trapdoor uid system"

    2.8. Log message "you appear to have a trapdoor uid system"

    This can have several causes. It might be because you are using a uid or gid of 65535 or -1. This is a VERY bad idea, and is a big security @@ -301,9 +284,7 @@ CLASS="SECT1" >

    2.9. Why are my file's timestamps off by an hour, or by a few hours?

    2.9. Why are my file's timestamps off by an hour, or by a few hours?

    This is from Paul Eggert eggert@twinsun.com.

    2.10. How do I set the printer driver name correctly?

    2.10. How do I set the printer driver name correctly?

    Question: PrevNextSamba FAQ

    Samba FAQ

    Samba FAQ

    Samba Team

    Samba Team

    Dedication

    Dedication

    This is the Frequently Asked Questions (FAQ) document for Samba, the free and very popular SMB server product. An SMB server @@ -63,261 +56,242 @@ CLASS="TOC" >

    1. General Information
    1.1. Where can I get it?
    1.2. What do the version numbers mean?
    1.3. What platforms are supported?
    1.4. How do I subscribe to the Samba Mailing Lists?
    1.5. Pizza supply details
    2. Compiling and installing Samba on a Unix host
    2.1. I can't see the Samba server in any browse lists!
    2.2. Some files that I KNOW are on the server don't show up when I view the files from my client!Some files that I KNOW are on the server doesn't show up when I view the files from my client!
    2.3. Some files on the server show up with really wierd filenames when I view the files from my client!
    2.4. My client reports "cannot locate specified computer" or similar
    2.5. My client reports "cannot locate specified share name" or similar
    2.6. Printing doesn't work
    2.7. My client reports "This server is not configured to list shared resources"
    2.8. Log message "you appear to have a trapdoor uid system"
    2.9. Why are my file's timestamps off by an hour, or by a few hours?
    2.10. How do I set the printer driver name correctly?
    3. Configuration problems
    3.1. I have set 'force user' and samba still makes 'root' the owner of all the files I touch!
    3.2. I have just installed samba and I'm trying to log in from Windows, but samba refuses all logins!
    4. Specific client application problems
    4.1. MS Office Setup reports "Cannot change properties of '\\MSOFFICE\\SETUP.INI'"MS Office Setup reports "Cannot change properties of '\MSOFFICE\SETUP.INI'"
    4.2. How to use a Samba share as an administrative share for MS Office, etc.
    4.3. Microsoft Access database opening errors
    5. Common errors
    5.1. Not listening for calling name
    5.2. System Error 1240
    5.3. smbclient ignores -N !
    5.4. The data on the CD-Drive I've shared seems to be corrupted!
    5.5. Why can users access home directories of other users?
    5.6. Until a few minutes after samba has started, clients get the error "Domain Controller Unavailable"
    5.7. I'm getting "open_oplock_ipc: Failed to get local UDP socket for address 100007f. Error was Cannot assign requested" in the logs
    6. Features
    6.1. How can I prevent my samba server from being used to distribute the Nimda worm?
    6.2. How can I use samba as a fax server?
    6.2.1. Tools for printing faxes
    6.2.2. Making the fax-server
    6.2.3. Installing the client drivers
    6.2.4. Example smb.conf
    6.3. Samba doesn't work well together with DHCP!
    6.4. How can I assign NetBIOS names to clients with DHCP?
    6.5. How do I convert between unix and dos text formats?
    6.6. Does samba have wins replication support?
    7. Printing problems
    7.1. setdriver or cupsaddsmb failes
    NextSAMBA Developers GuideSAMBA Developers GuideSAMBA Developers Guide

    10.4. ChangeID and Client Caching of Printer InformationChangeID & Client Caching of Printer Information
    10.5. >The smbpasswd file
    14. Modules
    14.1. Advantages
    14.2. Loading modules
    14.2.1. Static modules
    14.2.2. Shared modules
    14.3. Writing modules
    14.3.1. Static/Shared selection in configure.in
    15. RPC Pluggable Modules
    15.1. About
    15.2. General Overview
    16. Notes to packagers
    16.1. Versioning
    16.2. ModulesThe smbpasswd file
    1.1. NETBIOS

    1.1. NETBIOS

    NetBIOS runs over the following tranports: TCP/IP; NetBEUI and IPX/SPX. Samba only uses NetBIOS over TCP/IP. For details on the TCP/IP NetBIOS @@ -970,8 +885,8 @@ CLASS="SECT1" CLASS="SECT1" >1.2. BROADCAST NetBIOS1.2. BROADCAST NetBIOS

    Clients can claim names, and therefore offer services on successfully claimed @@ -993,8 +908,8 @@ CLASS="SECT1" CLASS="SECT1" >1.3. NBNS NetBIOS1.3. NBNS NetBIOS

    rfc1001.txt describes, amongst other things, the implementation and use of, a 'NetBIOS Name Service'. NT/AS offers 'Windows Internet Name Service' @@ -1053,8 +968,8 @@ CLASS="SECT1" CLASS="SECT1" >2.1. Introduction2.1. Introduction

    This document gives a general overview of how Samba works internally. The Samba Team has tried to come up with a model which is @@ -1088,8 +1003,8 @@ CLASS="SECT1" CLASS="SECT1" >2.2. Multithreading and Samba2.2. Multithreading and Samba

    People sometimes tout threads as a uniformly good thing. They are very nice in their place but are quite inappropriate for smbd. nmbd is @@ -1114,8 +1029,8 @@ CLASS="SECT1" CLASS="SECT1" >2.3. Threading smbd2.3. Threading smbd

    A few problems that would arise from a threaded smbd are:

    2.4. Threading nmbd2.4. Threading nmbd

    This would be ideal, but gets sunk by portability requirements.

    2.5. nbmd Design2.5. nbmd Design

    Originally Andrew used recursion to simulate a multi-threaded environment, which use the stack enormously and made for really @@ -1239,22 +1154,22 @@ CLASS="SECT1" CLASS="SECT1" >3.1. New Output Syntax3.1. New Output Syntax

    The syntax of a debugging log file is represented as:

      >debugfile< :== { >debugmsg< }
    +>  >debugfile< :== { >debugmsg< }
     
    -  >debugmsg<  :== >debughdr< '\n' >debugtext<
    +  >debugmsg<  :== >debughdr< '\n' >debugtext<
     
    -  >debughdr<  :== '[' TIME ',' LEVEL ']' FILE ':' [FUNCTION] '(' LINE ')'
    +  >debughdr<  :== '[' TIME ',' LEVEL ']' FILE ':' [FUNCTION] '(' LINE ')'
     
    -  >debugtext< :== { >debugline< }
    +  >debugtext< :== { >debugline< }
     
    -  >debugline< :== TEXT '\n'

    TEXT is a string of characters excluding the newline character.

    3.2. The DEBUG() Macro3.2. The DEBUG() Macro

    Use of the DEBUG() macro is unchanged. DEBUG() takes two parameters. The first is the message level, the second is the body of a function @@ -1404,8 +1319,8 @@ CLASS="SECT1" CLASS="SECT1" >3.3. The DEBUGADD() Macro3.3. The DEBUGADD() Macro

    In addition to the kludgey solution to the broken line problem described above, there is a clean solution. The DEBUGADD() macro never @@ -1435,8 +1350,8 @@ CLASS="SECT1" CLASS="SECT1" >3.4. The DEBUGLVL() Macro3.4. The DEBUGLVL() Macro

    One of the problems with the DEBUG() macro was that DEBUG() lines tended to get a bit long. Consider this example from @@ -1503,16 +1418,16 @@ CLASS="SECT1" CLASS="SECT1" >3.5. New Functions3.5. New Functions

    3.5.1. dbgtext()

    3.5.1. dbgtext()

    This function prints debug message text to the debug file (and possibly to syslog) via the format buffer. The function uses a @@ -1529,8 +1444,8 @@ CLASS="SECT2" CLASS="SECT2" >3.5.2. dbghdr()3.5.2. dbghdr()

    This is the function that writes a debug message header. Headers are not processed via the format buffer. Also note that @@ -1546,8 +1461,8 @@ CLASS="SECT2" CLASS="SECT2" >3.5.3. format_debug_text()3.5.3. format_debug_text()

    This is a static function in debug.c. It stores the output text for the body of the message in a buffer until it encounters a @@ -1792,8 +1707,8 @@ CLASS="SECT1" CLASS="SECT1" >5.1. Character Handling5.1. Character Handling

    This section describes character set handling in Samba, as implemented in Samba 3.0 and above

    5.2. The new functions5.2. The new functions

    The new system works like this:

    5.3. Macros in byteorder.h5.3. Macros in byteorder.h

    This section describes the macros defined in byteorder.h. These macros are used extensively in the Samba code.

    5.3.1. CVAL(buf,pos)5.3.1. CVAL(buf,pos)

    returns the byte at offset pos within buffer buf as an unsigned character.

    5.3.2. PVAL(buf,pos)5.3.2. PVAL(buf,pos)

    returns the value of CVAL(buf,pos) cast to type unsigned integer.

    5.3.3. SCVAL(buf,pos,val)5.3.3. SCVAL(buf,pos,val)

    sets the byte at offset pos within buffer buf to value val.

    5.3.4. SVAL(buf,pos)5.3.4. SVAL(buf,pos)

    returns the value of the unsigned short (16 bit) little-endian integer at offset pos within buffer buf. An integer of this type is sometimes @@ -1979,8 +1894,8 @@ CLASS="SECT2" CLASS="SECT2" >5.3.5. IVAL(buf,pos)5.3.5. IVAL(buf,pos)

    returns the value of the unsigned 32 bit little-endian integer at offset pos within buffer buf.

    5.3.6. SVALS(buf,pos)5.3.6. SVALS(buf,pos)

    returns the value of the signed short (16 bit) little-endian integer at offset pos within buffer buf.

    5.3.7. IVALS(buf,pos)5.3.7. IVALS(buf,pos)

    returns the value of the signed 32 bit little-endian integer at offset pos within buffer buf.

    5.3.8. SSVAL(buf,pos,val)5.3.8. SSVAL(buf,pos,val)

    sets the unsigned short (16 bit) little-endian integer at offset pos within buffer buf to value val.

    5.3.9. SIVAL(buf,pos,val)5.3.9. SIVAL(buf,pos,val)

    sets the unsigned 32 bit little-endian integer at offset pos within buffer buf to the value val.

    5.3.10. SSVALS(buf,pos,val)5.3.10. SSVALS(buf,pos,val)

    sets the short (16 bit) signed little-endian integer at offset pos within buffer buf to the value val.

    5.3.11. SIVALS(buf,pos,val)5.3.11. SIVALS(buf,pos,val)

    sets the signed 32 bit little-endian integer at offset pos withing buffer buf to the value val.

    5.3.12. RSVAL(buf,pos)5.3.12. RSVAL(buf,pos)

    returns the value of the unsigned short (16 bit) big-endian integer at offset pos within buffer buf.

    5.3.13. RIVAL(buf,pos)5.3.13. RIVAL(buf,pos)

    returns the value of the unsigned 32 bit big-endian integer at offset pos within buffer buf.

    5.3.14. RSSVAL(buf,pos,val)5.3.14. RSSVAL(buf,pos,val)

    sets the value of the unsigned short (16 bit) big-endian integer at offset pos within buffer buf to value val. @@ -2100,8 +2015,8 @@ CLASS="SECT2" CLASS="SECT2" >5.3.15. RSIVAL(buf,pos,val)5.3.15. RSIVAL(buf,pos,val)

    sets the value of the unsigned 32 bit big-endian integer at offset pos within buffer buf to value val.

    5.4. LAN Manager Samba API5.4. LAN Manager Samba API

    This section describes the functions need to make a LAN Manager RPC call. This information had been obtained by examining the Samba code and the LAN @@ -2135,8 +2050,8 @@ CLASS="SECT2" CLASS="SECT2" >5.4.1. Parameters5.4.1. Parameters

    The parameters are as follows:

    5.4.2. Return value5.4.2. Return value

    The returned parameters (pointed to by rparam), in their order of appearance are:

    5.5. Code character table5.5. Code character table

    Certain data structures are described by means of ASCIIz strings containing code characters. These are the code characters:

    6.1. Lexical Analysis6.1. Lexical Analysis

    Basically, the file is processed on a line by line basis. There are four types of lines that are recognized by the lexical analyzer @@ -2406,8 +2321,8 @@ CLASS="SECT2" CLASS="SECT2" >6.1.1. Handling of Whitespace6.1.1. Handling of Whitespace

    Whitespace is defined as all characters recognized by the isspace() function (see ctype(3C)) except for the newline character ('\n') @@ -2443,8 +2358,8 @@ CLASS="SECT2" CLASS="SECT2" >6.1.2. Handling of Line Continuation6.1.2. Handling of Line Continuation

    Long section header and parameter lines may be extended across multiple lines by use of the backslash character ('\\'). Line @@ -2483,8 +2398,8 @@ CLASS="SECT2" CLASS="SECT2" >6.1.3. Line Continuation Quirks6.1.3. Line Continuation Quirks

    Note the following example:

    6.2. Syntax6.2. Syntax

    The syntax of the smb.conf file is as follows:

      <file>            :==  { <section> } EOF
    -  <section>         :==  <section header> { <parameter line> }
    -  <section header>  :==  '[' NAME ']'
    -  <parameter line>  :==  NAME '=' VALUE NL
    <file> :== { <section> } EOF + <section> :== <section header> { <parameter line> } + <section header> :== '[' NAME ']' + <parameter line> :== NAME '=' VALUE NL

    Basically, this means that

    6.2.1. About params.c6.2.1. About params.c

    The parsing of the config file is a bit unusual if you are used to lex, yacc, bison, etc. Both lexical analysis (scanning) and parsing @@ -2613,8 +2528,8 @@ CLASS="SECT1" CLASS="SECT1" >7.1. Introduction7.1. Introduction

    This is a short document that describes some of the issues that confront a SMB implementation on unix, and how Samba copes with @@ -2630,8 +2545,8 @@ CLASS="SECT1" CLASS="SECT1" >7.2. Usernames7.2. Usernames

    The SMB protocol has only a loose username concept. Early SMB protocols (such as CORE and COREPLUS) have no username concept at @@ -2676,8 +2591,8 @@ CLASS="SECT1" CLASS="SECT1" >7.3. File Ownership7.3. File Ownership

    The commonly used SMB protocols have no way of saying "you can't do that because you don't own the file". They have, in fact, no concept @@ -2703,8 +2618,8 @@ CLASS="SECT1" CLASS="SECT1" >7.4. Passwords7.4. Passwords

    Many SMB clients uppercase passwords before sending them. I have no idea why they do this. Interestingly WfWg uppercases the password only @@ -2734,8 +2649,8 @@ CLASS="SECT1" CLASS="SECT1" >7.5. Locking7.5. Locking

    Since samba 2.2, samba supports other types of locking as well. This section is outdated.

    7.6. Deny Modes7.6. Deny Modes

    When a SMB client opens a file it asks for a particular "deny mode" to be placed on the file. These modes (DENY_NONE, DENY_READ, DENY_WRITE, @@ -2797,8 +2712,8 @@ CLASS="SECT1" CLASS="SECT1" >7.7. Trapdoor UIDs7.7. Trapdoor UIDs

    A SMB session can run with several uids on the one socket. This happens when a user connects to two shares with different @@ -2816,8 +2731,8 @@ CLASS="SECT1" CLASS="SECT1" >7.8. Port numbers7.8. Port numbers

    There is a convention that clients on sockets use high "unprivilaged" port numbers (>1000) and connect to servers on low "privilaged" port @@ -2848,8 +2763,8 @@ CLASS="SECT1" CLASS="SECT1" >7.9. Protocol Complexity7.9. Protocol Complexity

    There are many "protocol levels" in the SMB protocol. It seems that each time new functionality was added to a Microsoft operating system, @@ -3029,8 +2944,8 @@ CLASS="SECT1" CLASS="SECT1" >9.1. Introduction9.1. Introduction

    This document contains information to provide an NT workstation with login services, without the need for an NT server. It is the sgml version of 9.1.1. Sources9.1.1. Sources

    9.1.2. Credits9.1.2. Credits

    9.2. Notes and Structures9.2. Notes and Structures

    9.2.1. Notes

    9.2.1. Notes

      9.2.2. Enumerations9.2.2. Enumerations

      9.2.2.1. MSRPC Header type

      9.2.2.1. MSRPC Header type

      command number in the msrpc packet header

      9.2.2.2. MSRPC Packet info9.2.2.2. MSRPC Packet info

      The meaning of these flags is undocumented

      9.2.3. Structures9.2.3. Structures

      9.2.3.1. VOID *

      9.2.3.1. VOID *

      sizeof VOID* is 32 bits.

      9.2.3.2. char9.2.3.2. char

      sizeof char is 8 bits.

      9.2.3.3. UTIME9.2.3.3. UTIME

      UTIME is 32 bits, indicating time in seconds since 01jan1970. documented in cifs6.txt (section 3.5 page, page 30).

    9.2.3.4. NTTIME9.2.3.4. NTTIME

    NTTIME is 64 bits. documented in cifs6.txt (section 3.5 page, page 30).

    9.2.3.5. DOM_SID (domain SID structure)9.2.3.5. DOM_SID (domain SID structure)

    9.2.3.6. STR (string)9.2.3.6. STR (string)

    STR (string) is a char[] : a null-terminated string of ascii characters.

    9.2.3.7. UNIHDR (unicode string header)9.2.3.7. UNIHDR (unicode string header)

    9.2.3.8. UNIHDR2 (unicode string header plus buffer pointer)9.2.3.8. UNIHDR2 (unicode string header plus buffer pointer)

    9.2.3.9. UNISTR (unicode string)9.2.3.9. UNISTR (unicode string)

    9.2.3.10. NAME (length-indicated unicode string)9.2.3.10. NAME (length-indicated unicode string)

    9.2.3.11. UNISTR2 (aligned unicode string)9.2.3.11. UNISTR2 (aligned unicode string)

    9.2.3.12. OBJ_ATTR (object attributes)9.2.3.12. OBJ_ATTR (object attributes)

    9.2.3.13. POL_HND (LSA policy handle)9.2.3.13. POL_HND (LSA policy handle)

    9.2.3.14. DOM_SID2 (domain SID structure, SIDS stored in unicode)9.2.3.14. DOM_SID2 (domain SID structure, SIDS stored in unicode)

    9.2.3.15. DOM_RID (domain RID structure)9.2.3.15. DOM_RID (domain RID structure)

    9.2.3.16. LOG_INFO (server, account, client structure)9.2.3.16. LOG_INFO (server, account, client structure)

    9.2.3.17. CLNT_SRV (server, client names structure)9.2.3.17. CLNT_SRV (server, client names structure)

    9.2.3.18. CREDS (credentials + time stamp)9.2.3.18. CREDS (credentials + time stamp)

    9.2.3.19. CLNT_INFO2 (server, client structure, client credentials)9.2.3.19. CLNT_INFO2 (server, client structure, client credentials)

    9.2.3.20. CLNT_INFO (server, account, client structure, client credentials)9.2.3.20. CLNT_INFO (server, account, client structure, client credentials)

    9.2.3.21. ID_INFO_1 (id info structure, auth level 1)9.2.3.21. ID_INFO_1 (id info structure, auth level 1)

    9.2.3.22. SAM_INFO (sam logon/logoff id info structure)9.2.3.22. SAM_INFO (sam logon/logoff id info structure)

    9.2.3.23. GID (group id info)9.2.3.23. GID (group id info)

    9.2.3.24. DOM_REF (domain reference info)9.2.3.24. DOM_REF (domain reference info)

    9.2.3.25. DOM_INFO (domain info, levels 3 and 5 are the same))9.2.3.25. DOM_INFO (domain info, levels 3 and 5 are the same))

    9.2.3.26. USER_INFO (user logon info)9.2.3.26. USER_INFO (user logon info)

    9.2.3.27. SH_INFO_1_PTR (pointers to level 1 share info strings)9.2.3.27. SH_INFO_1_PTR (pointers to level 1 share info strings)

    9.2.3.28. SH_INFO_1_STR (level 1 share info strings)9.2.3.28. SH_INFO_1_STR (level 1 share info strings)

    9.2.3.29. SHARE_INFO_1_CTR9.2.3.29. SHARE_INFO_1_CTR

    share container with 0 entries:

    9.2.3.30. SERVER_INFO_1019.2.3.30. SERVER_INFO_101

    9.3. MSRPC over Transact Named Pipe9.3. MSRPC over Transact Named Pipe

    For details on the SMB Transact Named Pipe, see cifs6.txt

    9.3.1. MSRPC Pipes9.3.1. MSRPC Pipes

    The MSRPC is conducted over an SMB Transact Pipe with a name of 9.3.2. Header9.3.2. Header

    [section to be rewritten, following receipt of work by Duncan Stansfield]

    9.3.2.1. RPC_Packet for request, response, bind and bind acknowledgement9.3.2.1. RPC_Packet for request, response, bind and bind acknowledgement

    9.3.2.2. Interface identification9.3.2.2. Interface identification

    the interfaces are numbered. as yet I haven't seen more than one interface used on the same pipe name srvsvc

    9.3.2.3. RPC_Iface RW9.3.2.3. RPC_Iface RW

    9.3.2.4. RPC_ReqBind RW9.3.2.4. RPC_ReqBind RW

    the remainder of the packet after the header if "type" was Bind in the response header, "type" should be BindAck

    9.3.2.5. RPC_Address RW9.3.2.5. RPC_Address RW

    9.3.2.6. RPC_ResBind RW9.3.2.6. RPC_ResBind RW

    the response to place after the header in the reply packet

    9.3.2.7. RPC_ReqNorm RW9.3.2.7. RPC_ReqNorm RW

    the remainder of the packet after the header for every other other request

    9.3.2.8. RPC_ResNorm RW9.3.2.8. RPC_ResNorm RW

    9.3.3. Tail9.3.3. Tail

    The end of each of the NTLSA and NETLOGON named pipes ends with:

    9.3.4. RPC Bind / Bind Ack9.3.4. RPC Bind / Bind Ack

    RPC Binds are the process of associating an RPC pipe (e.g \PIPE\lsarpc) with a "transfer syntax" (see RPC_Iface structure). The purpose for doing @@ -5802,8 +5717,8 @@ CLASS="SECT2" CLASS="SECT2" >9.3.5. NTLSA Transact Named Pipe9.3.5. NTLSA Transact Named Pipe

    The sequence of actions taken on this pipe are:

    9.3.6. LSA Open Policy9.3.6. LSA Open Policy

    9.3.6.1. Request9.3.6.1. Request

    9.3.6.2. Response9.3.6.2. Response

    9.3.7. LSA Query Info Policy9.3.7. LSA Query Info Policy

    9.3.7.1. Request9.3.7.1. Request

    9.3.7.2. Response9.3.7.2. Response

    9.3.8. LSA Enumerate Trusted Domains9.3.8. LSA Enumerate Trusted Domains

    9.3.8.1. Request

    9.3.8.1. Request

    no extra data

    9.3.8.2. Response9.3.8.2. Response

    9.3.9. LSA Open Secret9.3.9. LSA Open Secret

    9.3.9.1. Request

    9.3.9.1. Request

    no extra data

    9.3.9.2. Response9.3.9.2. Response

    9.3.10. LSA Close9.3.10. LSA Close

    9.3.10.1. Request

    9.3.10.1. Request

    9.3.10.2. Response9.3.10.2. Response

    9.3.11. LSA Lookup SIDS9.3.11. LSA Lookup SIDS

    9.3.11.1. Request9.3.11.1. Request

    9.3.11.2. Response9.3.11.2. Response

    9.3.12. LSA Lookup Names9.3.12. LSA Lookup Names

    9.3.12.1. Request9.3.12.1. Request

    9.3.12.2. Response9.3.12.2. Response

    9.4. NETLOGON rpc Transact Named Pipe9.4. NETLOGON rpc Transact Named Pipe

    The sequence of actions taken on this pipe are:

    9.4.1. LSA Request Challenge9.4.1. LSA Request Challenge

    9.4.1.1. Request9.4.1.1. Request

    9.4.1.2. Response9.4.1.2. Response

    9.4.2. LSA Authenticate 29.4.2. LSA Authenticate 2

    9.4.2.1. Request9.4.2.1. Request

    9.4.2.2. Response9.4.2.2. Response

    9.4.3. LSA Server Password Set9.4.3. LSA Server Password Set

    9.4.3.1. Request9.4.3.1. Request

    9.4.3.2. Response9.4.3.2. Response

    9.4.4. LSA SAM Logon9.4.4. LSA SAM Logon

    9.4.4.1. Request9.4.4.1. Request

    9.4.4.2. Response9.4.4.2. Response

    9.4.5. LSA SAM Logoff9.4.5. LSA SAM Logoff

    9.4.5.1. Request9.4.5.1. Request

    9.4.5.2. Response9.4.5.2. Response

    9.5. \\MAILSLOT\NET\NTLOGON9.5. \\MAILSLOT\NET\NTLOGON

    9.5.1. Query for PDC9.5.1. Query for PDC

    9.5.1.1. Request9.5.1.1. Request

    9.5.1.2. Response9.5.1.2. Response

    9.5.2. SAM Logon9.5.2. SAM Logon

    9.5.2.1. Request9.5.2.1. Request

    9.5.2.2. Response9.5.2.2. Response

    9.6. SRVSVC Transact Named Pipe9.6. SRVSVC Transact Named Pipe

    Defines for this pipe, identifying the query are:

    9.6.1. Net Share Enum9.6.1. Net Share Enum

    9.6.1.1. Request9.6.1.1. Request

    9.6.1.2. Response9.6.1.2. Response

    9.6.2. Net Server Get Info9.6.2. Net Server Get Info

    9.6.2.1. Request9.6.2.1. Request

    9.6.2.2. Response9.6.2.2. Response

    9.7. Cryptographic side of NT Domain Authentication9.7. Cryptographic side of NT Domain Authentication

    9.7.1. Definitions

    9.7.1. Definitions

    9.7.2. Protocol
    C->S ReqChal,Cc
    -S->C Cs
    C & S compute session key Ks = E(PW[9..15],E(PW[0..6],Add(Cc,Cs)))
    C: Rc = Cred(Ks,Cc)
    -C->S Authenticate,Rc
    -S: Rs = Cred(Ks,Cs), assert(Rc == Cred(Ks,Cc))
    -S->C Rs
    -C: assert(Rs == Cred(Ks,Cs))
    9.7.2. Protocol

    C->S ReqChal,Cc S->C Cs

    C & S compute session key Ks = E(PW[9..15],E(PW[0..6],Add(Cc,Cs)))

    C: Rc = Cred(Ks,Cc) C->S Authenticate,Rc S: Rs = Cred(Ks,Cs), +assert(Rc == Cred(Ks,Cc)) S->C Rs C: assert(Rs == Cred(Ks,Cs))

    On joining the domain the client will optionally attempt to change its password and the domain controller may refuse to update it depending on registry settings. This will also occur weekly afterwards.

    C: Tc = Time(), Rc' = Cred(Ks,Rc+Tc)
    -C->S ServerPasswordSet,Rc',Tc,arc4(Ks[0..7,16],lmowf(randompassword())
    -C: Rc = Cred(Ks,Rc+Tc+1)
    -S: assert(Rc' == Cred(Ks,Rc+Tc)), Ts = Time()
    -S: Rs' = Cred(Ks,Rs+Tc+1)
    -S->C Rs',Ts
    -C: assert(Rs' == Cred(Ks,Rs+Tc+1))
    -S: Rs = Rs'

    C: Tc = Time(), Rc' = Cred(Ks,Rc+Tc) C->S ServerPasswordSet,Rc',Tc, +arc4(Ks[0..7,16],lmowf(randompassword()) C: Rc = Cred(Ks,Rc+Tc+1) S: +assert(Rc' == Cred(Ks,Rc+Tc)), Ts = Time() S: Rs' = Cred(Ks,Rs+Tc+1) +S->C Rs',Ts C: assert(Rs' == Cred(Ks,Rs+Tc+1)) S: Rs = Rs'

    User: U with password P wishes to login to the domain (incidental data such as workstation and domain omitted)

    C: Tc = Time(), Rc' = Cred(Ks,Rc+Tc)
    -C->S NetLogonSamLogon,Rc',Tc,U,arc4(Ks[0..7,16],16,ntowf(P),16), arc4(Ks[0..7,16],16,lmowf(P),16)
    -S: assert(Rc' == Cred(Ks,Rc+Tc)) assert(passwords match those in SAM)
    -S: Ts = Time()
    S->C Cred(Ks,Cred(Ks,Rc+Tc+1)),userinfo(logon script,UID,SIDs,etc)
    -C: assert(Rs == Cred(Ks,Cred(Rc+Tc+1))
    -C: Rc = Cred(Ks,Rc+Tc+1)

    C: Tc = Time(), Rc' = Cred(Ks,Rc+Tc) C->S NetLogonSamLogon,Rc',Tc,U, +arc4(Ks[0..7,16],16,ntowf(P),16), arc4(Ks[0..7,16],16,lmowf(P),16) S: +assert(Rc' == Cred(Ks,Rc+Tc)) assert(passwords match those in SAM) S: +Ts = Time()

    S->C Cred(Ks,Cred(Ks,Rc+Tc+1)),userinfo(logon script,UID,SIDs,etc) C: +assert(Rs == Cred(Ks,Cred(Rc+Tc+1)) C: Rc = Cred(Ks,Rc+Tc+1)

    9.7.3. Comments9.7.3. Comments

    On first joining the domain the session key could be computed by anyone listening in on the network as the machine password has a well @@ -7814,8 +7714,8 @@ CLASS="SECT1" CLASS="SECT1" >9.8. SIDs and RIDs9.8. SIDs and RIDs

    SIDs and RIDs are well documented elsewhere.

    9.8.1. Well-known SIDs9.8.1. Well-known SIDs

    9.8.1.1. Universal well-known SIDs

    9.8.1.1. Universal well-known SIDs

    9.8.1.2. NT well-known SIDs9.8.1.2. NT well-known SIDs

    9.8.2. Well-known RIDS9.8.2. Well-known RIDS

    A RID is a sub-authority value, as part of either a SID, or in the case of Group RIDs, part of the DOM_GID structure, in the USER_INFO_1 @@ -8019,8 +7919,8 @@ CLASS="SECT3" CLASS="SECT3" >9.8.2.1. Well-known RID users9.8.2.1. Well-known RID users

    Groupname: 9.8.2.2. Well-known RID groups9.8.2.2. Well-known RID groups

    Groupname: 9.8.2.3. Well-known RID aliases9.8.2.3. Well-known RID aliases

    Groupname: 10.1. Abstract10.1. Abstract

    The purpose of this document is to provide some insight into Samba's printing functionality and also to describe the semantics @@ -8237,13 +8137,13 @@ CLASS="SECT1" CLASS="SECT1" >10.2. Printing Interface to Various Back ends10.2. Printing Interface to Various Back ends

    Samba uses a table of function pointers to seven functions. The -function prototypes are defined in the printifprintif structure declared in 10.3. Print Queue TDB's10.3. Print Queue TDB's

    Samba provides periodic caching of the output from the "lpq command" for performance reasons. This cache time is configurable in seconds. @@ -8355,7 +8255,7 @@ struct printjob { for the UNIX job id returned from the "lpq command" and a Windows job ID (32-bit bounded by PRINT_MAX_JOBID). When a print job is returned by the "lpq command" that does not match an existing job in the queue's -TDB, a 32-bit job ID above the <*vance doesn't know what word is missing here*> is generating by adding UNIX_JOB_START to +TDB, a 32-bit job ID above the <*vance doesn't know what word is missing here*> is generating by adding UNIX_JOB_START to the id reported by lpq.

    In order to match a 32-bit Windows jobid onto a 16-bit lanman print job @@ -8375,12 +8275,14 @@ TYPE="1" >

    Check to see if another smbd is currently in the process of updating the queue contents by checking the pid - stored in LOCK/LOCK/printer_nameprinter_name. If so, then do not update the TDB.

    10.4. ChangeID and Client Caching of Printer Information10.4. ChangeID & Client Caching of Printer Information

    [To be filled in later]

    10.5. Windows NT/2K Printer Change Notify10.5. Windows NT/2K Printer Change Notify

    When working with Windows NT+ clients, it is possible for a print server to use RPC to send asynchronous change notification @@ -8534,7 +8436,7 @@ C: Send a RFFPCN request with the previously obtained to monitor, or (b) a PRINTER_NOTIFY_OPTIONS structure containing the event information to monitor. The windows spooler has only been observed to use (b). -S: The <* another missing word*> opens a new TCP session to the client (thus requiring +S: The <* another missing word*> opens a new TCP session to the client (thus requiring all print clients to be CIFS servers as well) and sends a ReplyOpenPrinter() request to the client. C: The client responds with a printer handle that can be used to @@ -8612,9 +8514,9 @@ information

    A A SPOOL_NOTIFY_INFOSPOOL_NOTIFY_INFO contains:

    The The SPOOL_NOTIFY_INFO_DATASPOOL_NOTIFY_INFO_DATA entries contain:

    11.1. WINS Failover11.1. WINS Failover

    The current Samba codebase possesses the capability to use groups of WINS servers that share a common namespace for NetBIOS name registration and @@ -8699,7 +8601,7 @@ resolution. The formal parameter syntax is

    	WINS_SERVER_PARAM 	= SERVER [ SEPARATOR SERVER_LIST ]
    -	WINS_SERVER_PARAM 	= "wins server"
    +	WINS_SERVER_PARAM 	= "wins server"
     	SERVER 			= ADDR[:TAG]
     	ADDR 			= ip_addr | fqdn
     	TAG 			= string
    @@ -8716,7 +8618,7 @@ CLASS="PROGRAMLISTING"
     >

    In the event that no TAG is defined in for a SERVER in the list, smbd assigns a default -TAG of "*". A TAG is used to group servers of a shared NetBIOS namespace together. Upon +TAG of "*". A TAG is used to group servers of a shared NetBIOS namespace together. Upon startup, nmbd will attempt to register the netbios name value with one server in each tagged group.

    Using this configuration, nmbd would attempt to register the server's NetBIOS name -with one WINS server in each group. Because the "eth0" group has two servers, the +with one WINS server in each group. Because the "eth0" group has two servers, the second server would only be used when a registration (or resolution) request to the first server in that group timed out.

    12.1. Security in the 'new SAM'12.1. Security in the 'new SAM'

    One of the biggest problems with passdb is it's implementation of 'security'. Access control is on a 'are you root at the moment' basis, @@ -8774,7 +8676,8 @@ accessed.

    For example, when you call

    NTSTATUS sam_get_account_by_name(const SAM_CONTEXT *context, const
    +><
    +NTSTATUS sam_get_account_by_name(const SAM_CONTEXT *context, const
     NT_USER_TOKEN *access_token, uint32 access_desired, const char *domain,
     const char *name, SAM_ACCOUNT_HANDLE **account)

    12.2. Standalone from UNIX12.2. Standalone from UNIX

    One of the primary tenants of the 'new SAM' is that it would not attempt to deal with 'what unix id for that'. This would be left to the 'SMS' @@ -8850,8 +8753,8 @@ CLASS="SECT1" CLASS="SECT1" >12.3. Handles and Races in the new SAM12.3. Handles and Races in the new SAM

    One of the things that the 'new SAM' work has tried to face is both compatibility with existing code, and a closer alignment to the SAMR @@ -8893,16 +8796,16 @@ CLASS="SECT1" CLASS="SECT1" >12.4. Layers12.4. Layers

    12.4.1. Application

    12.4.1. Application

    This is where smbd, samtest and whatever end-user replacement we have for pdbedit sits. They use only the SAM interface, and do not get @@ -8914,8 +8817,8 @@ CLASS="SECT2" CLASS="SECT2" >12.4.2. SAM Interface12.4.2. SAM Interface

    This level 'owns' the various handle structures, the get/set routines on those structures and provides the public interface. The application @@ -8934,8 +8837,8 @@ CLASS="SECT2" CLASS="SECT2" >12.4.3. SAM Modules12.4.3. SAM Modules

    These do not communicate with the application directly, only by setting values in the handles, and receiving requests from the interface. These @@ -8952,16 +8855,16 @@ CLASS="SECT1" CLASS="SECT1" >12.5. SAM Modules12.5. SAM Modules

    12.5.1. Special Module: sam_passdb

    12.5.1. Special Module: sam_passdb

    In order for there to be a smooth transition, kai is writing a module that reads existing passdb backends, and translates them into SAM @@ -8975,8 +8878,8 @@ CLASS="SECT2" CLASS="SECT2" >12.5.2. sam_ads12.5.2. sam_ads

    This is the first of the SAM modules to be committed to the tree - mainly because I needed to coordinate work with metze (who authored most @@ -8997,8 +8900,8 @@ CLASS="SECT1" CLASS="SECT1" >12.6. Memory Management12.6. Memory Management

    The 'new SAM' development effort also concerned itself with getting a @@ -9053,8 +8956,8 @@ CLASS="SECT1" CLASS="SECT1" >12.7. Testing12.7. Testing

    Testing is vital in any piece of software, and Samba is certainly no exception. In designing this new subsystem, we have taken care to ensure @@ -9073,9 +8976,9 @@ it particularly valuable.

    Example useage:

    $$ bin/samtest13.1. Introduction13.1. Introduction

    With the development of LanManager and Windows NT compatible password encryption for Samba, it is now able @@ -9130,8 +9033,8 @@ CLASS="SECT1" CLASS="SECT1" >13.2. How does it work?13.2. How does it work?

    LanManager encryption is somewhat similar to UNIX password encryption. The server uses a file containing a @@ -9195,11 +9098,11 @@ CLASS="SECT1" CLASS="SECT1" >13.3. >The smbpasswd fileThe smbpasswd file

    In order for Samba to participate in the above protocol it must be able to look up the 16 byte hashed values given a user name. @@ -9228,26 +9131,30 @@ CLASS="FILENAME" CLASS="FILENAME" >/etc/passwd file use the following command:

    file use the following command :

    $ $ cat /etc/passwd | mksmbpasswd.sh - > /usr/local/samba/private/smbpasswd

    If you are running on a system that uses NIS, use

    $ $ ypcat passwd | mksmbpasswd.sh - > /usr/local/samba/private/smbpasswd

    The

    username:uid:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:
    -	[Account type]:LCT-<last-change-time>:Long name
    +	[Account type]:LCT-<last-change-time>:Long name
     	

    Although only the Although only the usernameusername, - uid, uid, XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX, - [Account type] and Account type] and last-change-time last-change-time sections are significant and are looked at in the Samba code.

    To set a user to have no password (not recommended), edit the file using vi, and replace the first 11 characters with the ascii text - "NO PASSWORD""NO PASSWORD" (minus the quotes).

    For example, to clear the password for user bob, his smbpasswd file @@ -9385,374 +9302,6 @@ CLASS="FILENAME" > file.


    Chapter 14. Modules

    14.1. Advantages

    The new modules system has the following advantages:

    Transparent loading of static and shared modules (no need -for a subsystem to know about modules)
    Simple selection between shared and static modules at configure time
    "preload modules" option for increasing performance for stable modules
    No nasty #define stuff anymore
    All backends are available as plugin now (including pdb_ldap and pdb_tdb)


    14.2. Loading modules

    Some subsystems in samba use different backends. These backends can be -either statically linked in to samba or available as a plugin. A subsystem -should have a function that allows a module to register itself. For example, -the passdb subsystem has:

    BOOL smb_register_passdb(const char *name, pdb_init_function init, int version);

    This function will be called by the initialisation function of the module to -register itself.


    14.2.1. Static modules

    The modules system compiles a list of initialisation functions for the -static modules of each subsystem. This is a define. For example, -it is here currently (from include/config.h):

    /* Static init functions */
    -#define static_init_pdb { pdb_mysql_init(); pdb_ldap_init(); pdb_smbpasswd_init(); pdb_tdbsam_init(); pdb_guest_init();}

    These functions should be called before the subsystem is used. That -should be done when the subsystem is initialised or first used.


    14.2.2. Shared modules

    If a subsystem needs a certain backend, it should check if it has -already been registered. If the backend hasn't been registered already, -the subsystem should call smb_probe_module(char *subsystem, char *backend). -This function tries to load the correct module from a certain path -($LIBDIR/subsystem/backend.so). If the first character in 'backend' -is a slash, smb_probe_module() tries to load the module from the -absolute path specified in 'backend'.

    After smb_probe_module() has been executed, the subsystem -should check again if the module has been registered.


    14.3. Writing modules

    Each module has an initialisation function. For modules that are -included with samba this name is 'subsystem_backend_init'. For external modules (that will never be built-in, but only available as a module) this name is always 'init_module'. (In the case of modules included with samba, the configure system will add a #define subsystem_backend_init() init_module()). -The prototype for these functions is:

    int init_module(void);

    This function should call one or more -registration functions. The function should return non-zero on success and zero on -failure.

    For example, pdb_ldap_init() contains:

    int pdb_ldap_init(void)
    -{
    -    smb_register_passdb("ldapsam", pdb_init_ldapsam, PASSDB_INTERFACE_VERSION);
    -    smb_register_passdb("ldapsam_nua", pdb_init_ldapsam_nua, PASSDB_INTERFACE_VERSION);
    -	return TRUE;
    -}


    14.3.1. Static/Shared selection in configure.in

    Some macros in configure.in generate the various defines and substs that -are necessary for the system to work correct. All modules that should -be built by default have to be added to the variable 'default_modules'. -For example, if ldap is found, pdb_ldap is added to this variable.

    On the bottom of configure.in, SMB_MODULE() should be called -for each module and SMB_SUBSYSTEM() for each subsystem.

    Syntax:

    SMB_MODULE(subsystem_backend, object files, plugin name, subsystem name, static_action, shared_action)
    -SMB_SUBSYSTEM(subsystem)

    Also, make sure to add the correct directives to -Makefile.in. @SUBSYSTEM_STATIC@ -will be replaced with a list of objects files of the modules that need to -be linked in statically. @SUBSYSTEM_MODULES@ will -be replaced with the names of the plugins to build.

    You must make sure all .c files that contain defines that can -be changed by ./configure are rebuilded in the 'modules_clean' make target. -Practically, this means all c files that contain static_init_subsystem; calls need to be rebuilded.


    Chapter 15. RPC Pluggable Modules

    15.1. About

    This document describes how to make use the new RPC Pluggable Modules features -of Samba 3.0. This architecture was added to increase the maintainability of -Samba allowing RPC Pipes to be worked on separately from the main CVS branch. -The RPM architecture will also allow third-party vendors to add functionality -to Samba through plug-ins.


    15.2. General Overview

    When an RPC call is sent to smbd, smbd tries to load a shared library by the -name librpc_<pipename>.so to handle the call if -it doesn't know how to handle the call internally. For instance, LSA calls -are handled by librpc_lsass.so.. -These shared libraries should be located in the <sambaroot>/lib/rpc. smbd then attempts to call the init_module function within -the shared library. Check the chapter on modules for more information.

    In the init_module function, the library should call -rpc_pipe_register_commands(). This function takes the following arguments:

    int rpc_pipe_register_commands(const char *clnt, const char *srv,
    -                               const struct api_struct *cmds, int size);

    clnt

    the Client name of the named pipe

    srv

    the Server name of the named pipe

    cmds

    a list of api_structs that map RPC ordinal numbers to function calls

    size

    the number of api_structs contained in cmds

    See rpc_server/srv_reg.c and rpc_server/srv_reg_nt.c for a small example of -how to use this library.


    Chapter 16. Notes to packagers

    16.1. Versioning

    Please, please update the version number in -source/include/version.h to include the versioning of your package. This makes it easier to distinguish standard samba builds -from custom-build samba builds (distributions often patch packages). For -example, a good version would be:

    Version 2.999+3.0.alpha21-5 for Debian


    16.2. Modules

    Samba now has support for building parts of samba as plugins. This -makes it possible to, for example, put ldap or mysql support in a seperate -package, thus making it possible to have a normal samba package not -depending on ldap or mysql. To build as much parts of samba -as a plugin, run:

    ./configure --with-shared-modules=rpc,vfs,auth,pdb,charset

    -SAMBA Project Documentation

    Abstract

    Last Update : Wed Jan 15

    This book is a collection of HOWTOs added to Samba documentation over the years. -I try to ensure that all are current, but sometimes the is a larger job -than one person can maintain. The most recent version of this document -can be found at http://www.samba.org/ -on the "Documentation" page. Please send updates to jerry@samba.org or -jelmer@samba.org.

    This documentation is distributed under the GNU General Public License (GPL) -version 2. A copy of the license is included with the Samba source -distribution. A copy can be found on-line at http://www.fsf.org/licenses/gpl.txt

    Cheers, jerry

    Table of Contents
    I. General installation
    1. How to Install and Test SAMBA
    1.1. Obtaining and installing samba
    1.2. Configuring samba
    1.3. Try listing the shares available on your - server
    1.4. Try connecting with the unix client
    1.5. Try connecting from a DOS, WfWg, Win9x, WinNT, - Win2k, OS/2, etc... client
    1.6. What If Things Don't Work?
    2. Quick Cross Subnet Browsing / Cross Workgroup Browsing guide
    2.1. Discussion
    2.2. How browsing functions and how to deploy stable and -dependable browsing using Samba
    2.3. Use of the "Remote Announce" parameter
    2.4. Use of the "Remote Browse Sync" parameter
    2.5. Use of WINS
    2.6. Do NOT use more than one (1) protocol on MS Windows machines
    2.7. Name Resolution Order
    3. User information database
    3.1. Introduction
    3.2. Important Notes About Security
    3.3. The smbpasswd Command
    3.4. Plain text
    3.5. TDB
    3.6. LDAP
    3.7. MySQL
    3.8. XML
    II. Type of installation
    4. Nomenclature of Server Types
    4.1. Stand Alone Server
    4.2. Domain Member Server
    4.3. Domain Controller
    5. Samba as Stand-Alone Server
    5.1. User and Share security level
    6. Samba as an NT4 or Win2k Primary Domain Controller
    6.1. Prerequisite Reading
    6.2. Background
    6.3. Configuring the Samba Domain Controller
    6.4. Creating Machine Trust Accounts and Joining Clients to the Domain
    6.5. Common Problems and Errors
    6.6. What other help can I get?
    6.7. Domain Control for Windows 9x/ME
    7. Samba Backup Domain Controller to Samba Domain Control
    7.1. Prerequisite Reading
    7.2. Background
    7.3. What qualifies a Domain Controller on the network?
    7.4. Can Samba be a Backup Domain Controller to an NT PDC?
    7.5. How do I set up a Samba BDC?
    8. Samba as a ADS domain member
    8.1. Setup your smb.conf
    8.2. Setup your /etc/krb5.conf
    8.3. Create the computer account
    8.4. Test your server setup
    8.5. Testing with smbclient
    8.6. Notes
    9. Samba as a NT4 or Win2k domain member
    9.1. Joining an NT Domain with Samba 3.0
    9.2. Why is this better than security = server?
    III. Advanced Configuration
    10. Advanced Network Manangement Information
    10.1. Remote Server Administration
    11. UNIX Permission Bits and Windows NT Access Control Lists
    11.1. Viewing and changing UNIX permissions using the NT - security dialogs
    11.2. How to view file security on a Samba share
    11.3. Viewing file ownership
    11.4. Viewing file or directory permissions
    11.5. Modifying file or directory permissions
    11.6. Interaction with the standard Samba create mask - parameters
    11.7. Interaction with the standard Samba file attribute - mapping
    12. Group mapping HOWTO
    13. Configuring PAM for distributed but centrally -managed authentication
    13.1. Samba and PAM
    13.2. Distributed Authentication
    13.3. PAM Configuration in smb.conf
    14. Printing Support
    14.1. Introduction
    14.2. Configuration
    14.3. The Imprints Toolset
    14.4. Diagnosis
    15. CUPS Printing Support
    15.1. Introduction
    15.2. CUPS - RAW Print Through Mode
    15.3. The CUPS Filter Chains
    15.4. CUPS Print Drivers and Devices
    15.5. Limiting the number of pages users can print
    15.6. Advanced Postscript Printing from MS Windows
    15.7. Auto-Deletion of CUPS spool files
    16. Unified Logons between Windows NT and UNIX using Winbind
    16.1. Abstract
    16.2. Introduction
    16.3. What Winbind Provides
    16.4. How Winbind Works
    16.5. Installation and Configuration
    16.6. Limitations
    16.7. Conclusion
    17. Policy Management - Hows and Whys
    17.1. System Policies
    18. Profile Management
    18.1. Roaming Profiles
    19. Integrating MS Windows networks with Samba
    19.1. Name Resolution in a pure Unix/Linux world
    19.2. Name resolution as used within MS Windows networking
    20. Improved browsing in samba
    20.1. Overview of browsing
    20.2. Browsing support in samba
    20.3. Problem resolution
    20.4. Browsing across subnets
    20.5. Setting up a WINS server
    20.6. Setting up Browsing in a WORKGROUP
    20.7. Setting up Browsing in a DOMAIN
    20.8. Forcing samba to be the master
    20.9. Making samba the domain master
    20.10. Note about broadcast addresses
    20.11. Multiple interfaces
    21. Hosting a Microsoft Distributed File System tree on Samba
    21.1. Instructions
    22. Stackable VFS modules
    22.1. Introduction and configuration
    22.2. Included modules
    22.3. VFS modules available elsewhere
    23. Securing Samba
    23.1. Introduction
    23.2. Using host based protection
    23.3. Using interface protection
    23.4. Using a firewall
    23.5. Using a IPC$ share deny
    23.6. Upgrading Samba
    24. Unicode/Charsets
    24.1. What are charsets and unicode?
    24.2. Samba and charsets
    IV. Appendixes
    25. Samba performance issues
    25.1. Comparisons
    25.2. Socket options
    25.3. Read size
    25.4. Max xmit
    25.5. Log level
    25.6. Read raw
    25.7. Write raw
    25.8. Slow Clients
    25.9. Slow Logins
    25.10. Client tuning
    26. Portability
    26.1. HPUX
    26.2. SCO Unix
    26.3. DNIX
    26.4. RedHat Linux Rembrandt-II
    26.5. AIX
    27. Samba and other CIFS clients
    27.1. Macintosh clients?
    27.2. OS2 Client
    27.3. Windows for Workgroups
    27.4. Windows '95/'98
    27.5. Windows 2000 Service Pack 2
    28. How to compile SAMBA
    28.1. Access Samba source code via CVS
    28.2. Accessing the samba sources via rsync and ftp
    28.3. Building the Binaries
    28.4. Starting the smbd and nmbd
    29. Reporting Bugs
    29.1. Introduction
    29.2. General info
    29.3. Debug levels
    29.4. Internal errors
    29.5. Attaching to a running process
    29.6. Patches
    30. The samba checklist
    30.1. Introduction
    30.2. Assumptions
    30.3. Tests
    30.4. Still having troubles?

    I. General installation

    Introduction

    This part contains general info on how to install samba -and how to configure the parts of samba you will most likely need. -PLEASE read this.

    Table of Contents
    1. How to Install and Test SAMBA
    1.1. Obtaining and installing samba
    1.2. Configuring samba
    1.2.1. Editing the smb.conf file
    1.2.2. SWAT
    1.3. Try listing the shares available on your - server
    1.4. Try connecting with the unix client
    1.5. Try connecting from a DOS, WfWg, Win9x, WinNT, - Win2k, OS/2, etc... client
    1.6. What If Things Don't Work?
    1.6.1. Scope IDs
    1.6.2. Locking
    2. Quick Cross Subnet Browsing / Cross Workgroup Browsing guide
    2.1. Discussion
    2.2. How browsing functions and how to deploy stable and -dependable browsing using Samba
    2.3. Use of the "Remote Announce" parameter
    2.4. Use of the "Remote Browse Sync" parameter
    2.5. Use of WINS
    2.6. Do NOT use more than one (1) protocol on MS Windows machines
    2.7. Name Resolution Order
    3. User information database
    3.1. Introduction
    3.2. Important Notes About Security
    3.2.1. Advantages of SMB Encryption
    3.2.2. Advantages of non-encrypted passwords
    3.3. The smbpasswd Command
    3.4. Plain text
    3.5. TDB
    3.6. LDAP
    3.6.1. Introduction
    3.6.2. Introduction
    3.6.3. Supported LDAP Servers
    3.6.4. Schema and Relationship to the RFC 2307 posixAccount
    3.6.5. Configuring Samba with LDAP
    3.6.6. Accounts and Groups management
    3.6.7. Security and sambaAccount
    3.6.8. LDAP specials attributes for sambaAccounts
    3.6.9. Example LDIF Entries for a sambaAccount
    3.7. MySQL
    3.7.1. Creating the database
    3.7.2. Configuring
    3.7.3. Using plaintext passwords or encrypted password
    3.7.4. Getting non-column data from the table
    3.8. XML

    Chapter 1. How to Install and Test SAMBA

    1.1. Obtaining and installing samba

    Binary packages of samba are included in almost any Linux or - Unix distribution. There are also some packages available at - the samba homepage -

    If you need to compile samba from source, check the - appropriate appendix chapter.


    1.2. Configuring samba

    Samba's configuration is stored in the smb.conf file, - that usually resides in /etc/samba/smb.conf - or /usr/local/samba/lib/smb.conf. You can either - edit this file yourself or do it using one of the many graphical - tools that are available, such as the web-based interface swat, that - is included with samba.


    1.2.1. Editing the smb.conf file

    There are sample configuration files in the examples - subdirectory in the distribution. I suggest you read them - carefully so you can see how the options go together in - practice. See the man page for all the options.

    The simplest useful configuration file would be - something like this:

    	[global]
    -	   workgroup = MYGROUP
    -
    -	   [homes]
    -	      guest ok = no
    -	      read only = no
    -	

    which would allow connections by anyone with an - account on the server, using either their login name or - "homes" as the service name. (Note that I also set the - workgroup that Samba is part of. See BROWSING.txt for details)

    Note that make install will not install - a smb.conf file. You need to create it - yourself.

    Make sure you put the smb.conf file in the same place - you specified in theMakefile (the default is to - look for it in /usr/local/samba/lib/).

    For more information about security settings for the - [homes] share please refer to the document UNIX_SECURITY.txt.


    1.2.1.1. Test your config file with - testparm

    It's important that you test the validity of your - smb.conf file using the testparm program. - If testparm runs OK then it will list the loaded services. If - not it will give an error message.

    Make sure it runs OK and that the services look - reasonable before proceeding.

    Always run testparm again when you change - smb.conf!


    1.2.2. SWAT

    SWAT is a web-based interface that helps you configure samba. - SWAT might not be available in the samba package on your platform, - but in a seperate package. Please read the swat manpage - on compiling, installing and configuring swat from source. -

    To launch SWAT just run your favorite web browser and - point it at "http://localhost:901/". Replace localhost with the name of the computer you are running samba on if you - are running samba on a different computer then your browser.

    Note that you can attach to SWAT from any IP connected - machine but connecting from a remote machine leaves your - connection open to password sniffing as passwords will be sent - in the clear over the wire.


    1.3. Try listing the shares available on your - server

    $ smbclient -L - yourhostname

    You should get back a list of shares available on - your server. If you don't then something is incorrectly setup. - Note that this method can also be used to see what shares - are available on other LanManager clients (such as WfWg).

    If you choose user level security then you may find - that Samba requests a password before it will list the shares. - See the smbclient man page for details. (you - can force it to list the shares without a password by - adding the option -U% to the command line. This will not work - with non-Samba servers)


    1.4. Try connecting with the unix client

    $ smbclient //yourhostname/aservice

    Typically the yourhostname - would be the name of the host where you installed smbd. The aservice is - any service you have defined in the smb.conf - file. Try your user name if you just have a [homes] section - in smb.conf.

    For example if your unix host is bambi and your login - name is fred you would type:

    $ smbclient //bambi/fred -


    1.5. Try connecting from a DOS, WfWg, Win9x, WinNT, - Win2k, OS/2, etc... client

    Try mounting disks. eg:

    C:\WINDOWS\> net use d: \\servername\service -

    Try printing. eg:

    C:\WINDOWS\> net use lpt1: - \\servername\spoolservice

    C:\WINDOWS\> print filename -

    Celebrate, or send me a bug report!


    1.6. What If Things Don't Work?

    Then you might read the file HOWTO chapter Diagnosis and the - FAQ. If you are still stuck then try the mailing list or - newsgroup (look in the README for details). Samba has been - successfully installed at thousands of sites worldwide, so maybe - someone else has hit your problem and has overcome it. You could - also use the WWW site to scan back issues of the samba-digest.

    When you fix the problem please send some - updates of the documentation (or source code) to one of - the documentation maintainers or the list. -


    1.6.1. Scope IDs

    By default Samba uses a blank scope ID. This means - all your windows boxes must also have a blank scope ID. - If you really want to use a non-blank scope ID then you will - need to use the 'netbios scope' smb.conf option. - All your PCs will need to have the same setting for - this to work. I do not recommend scope IDs.


    1.6.2. Locking

    One area which sometimes causes trouble is locking.

    There are two types of locking which need to be - performed by a SMB server. The first is "record locking" - which allows a client to lock a range of bytes in a open file. - The second is the "deny modes" that are specified when a file - is open.

    Record locking semantics under Unix is very - different from record locking under Windows. Versions - of Samba before 2.2 have tried to use the native - fcntl() unix system call to implement proper record - locking between different Samba clients. This can not - be fully correct due to several reasons. The simplest - is the fact that a Windows client is allowed to lock a - byte range up to 2^32 or 2^64, depending on the client - OS. The unix locking only supports byte ranges up to - 2^31. So it is not possible to correctly satisfy a - lock request above 2^31. There are many more - differences, too many to be listed here.

    Samba 2.2 and above implements record locking - completely independent of the underlying unix - system. If a byte range lock that the client requests - happens to fall into the range 0-2^31, Samba hands - this request down to the Unix system. All other locks - can not be seen by unix anyway.

    Strictly a SMB server should check for locks before - every read and write call on a file. Unfortunately with the - way fcntl() works this can be slow and may overstress the - rpc.lockd. It is also almost always unnecessary as clients - are supposed to independently make locking calls before reads - and writes anyway if locking is important to them. By default - Samba only makes locking calls when explicitly asked - to by a client, but if you set "strict locking = yes" then it will - make lock checking calls on every read and write.

    You can also disable by range locking completely - using "locking = no". This is useful for those shares that - don't support locking or don't need it (such as cdroms). In - this case Samba fakes the return codes of locking calls to - tell clients that everything is OK.

    The second class of locking is the "deny modes". These - are set by an application when it opens a file to determine - what types of access should be allowed simultaneously with - its open. A client may ask for DENY_NONE, DENY_READ, DENY_WRITE - or DENY_ALL. There are also special compatibility modes called - DENY_FCB and DENY_DOS.


    Chapter 2. Quick Cross Subnet Browsing / Cross Workgroup Browsing guide

    This document should be read in conjunction with Browsing and may -be taken as the fast track guide to implementing browsing across subnets -and / or across workgroups (or domains). WINS is the best tool for resolution -of NetBIOS names to IP addesses. WINS is NOT involved in browse list handling -except by way of name to address mapping.

    Note: MS Windows 2000 and later can be configured to operate with NO NetBIOS -over TCP/IP. Samba-3 and later also supports this mode of operation.


    2.1. Discussion

    Firstly, all MS Windows networking is based on SMB (Server Message -Block) based messaging. SMB messaging may be implemented using NetBIOS or -without NetBIOS. Samba implements NetBIOS by encapsulating it over TCP/IP. -MS Windows products can do likewise. NetBIOS based networking uses broadcast -messaging to affect browse list management. When running NetBIOS over -TCP/IP this uses UDP based messaging. UDP messages can be broadcast or unicast.

    Normally, only unicast UDP messaging can be forwarded by routers. The -"remote announce" parameter to smb.conf helps to project browse announcements -to remote network segments via unicast UDP. Similarly, the "remote browse sync" -parameter of smb.conf implements browse list collation using unicast UDP.

    Secondly, in those networks where Samba is the only SMB server technology -wherever possible nmbd should be configured on one (1) machine as the WINS -server. This makes it easy to manage the browsing environment. If each network -segment is configured with it's own Samba WINS server, then the only way to -get cross segment browsing to work is by using the "remote announce" and -the "remote browse sync" parameters to your smb.conf file.

    If only one WINS server is used for an entire multi-segment network then -the use of the "remote announce" and the "remote browse sync" parameters -should NOT be necessary.

    As of Samba-3 WINS replication is being worked on. The bulk of the code has -been committed, but it still needs maturation.

    Right now samba WINS does not support MS-WINS replication. This means that -when setting up Samba as a WINS server there must only be one nmbd configured -as a WINS server on the network. Some sites have used multiple Samba WINS -servers for redundancy (one server per subnet) and then used "remote browse -sync" and "remote announce" to affect browse list collation across all -segments. Note that this means clients will only resolve local names, -and must be configured to use DNS to resolve names on other subnets in -order to resolve the IP addresses of the servers they can see on other -subnets. This setup is not recommended, but is mentioned as a practical -consideration (ie: an 'if all else fails' scenario).

    Lastly, take note that browse lists are a collection of unreliable broadcast -messages that are repeated at intervals of not more than 15 minutes. This means -that it will take time to establish a browse list and it can take up to 45 -minutes to stabilise, particularly across network segments.


    2.2. How browsing functions and how to deploy stable and -dependable browsing using Samba

    As stated above, MS Windows machines register their NetBIOS names -(i.e.: the machine name for each service type in operation) on start -up. Also, as stated above, the exact method by which this name registration -takes place is determined by whether or not the MS Windows client/server -has been given a WINS server address, whether or not LMHOSTS lookup -is enabled, or if DNS for NetBIOS name resolution is enabled, etc.

    In the case where there is no WINS server all name registrations as -well as name lookups are done by UDP broadcast. This isolates name -resolution to the local subnet, unless LMHOSTS is used to list all -names and IP addresses. In such situations Samba provides a means by -which the samba server name may be forcibly injected into the browse -list of a remote MS Windows network (using the "remote announce" parameter).

    Where a WINS server is used, the MS Windows client will use UDP -unicast to register with the WINS server. Such packets can be routed -and thus WINS allows name resolution to function across routed networks.

    During the startup process an election will take place to create a -local master browser if one does not already exist. On each NetBIOS network -one machine will be elected to function as the domain master browser. This -domain browsing has nothing to do with MS security domain control. -Instead, the domain master browser serves the role of contacting each local -master browser (found by asking WINS or from LMHOSTS) and exchanging browse -list contents. This way every master browser will eventually obtain a complete -list of all machines that are on the network. Every 11-15 minutes an election -is held to determine which machine will be the master browser. By the nature of -the election criteria used, the machine with the highest uptime, or the -most senior protocol version, or other criteria, will win the election -as domain master browser.

    Clients wishing to browse the network make use of this list, but also depend -on the availability of correct name resolution to the respective IP -address/addresses.

    Any configuration that breaks name resolution and/or browsing intrinsics -will annoy users because they will have to put up with protracted -inability to use the network services.

    Samba supports a feature that allows forced synchonisation -of browse lists across routed networks using the "remote -browse sync" parameter in the smb.conf file. This causes Samba -to contact the local master browser on a remote network and -to request browse list synchronisation. This effectively bridges -two networks that are separated by routers. The two remote -networks may use either broadcast based name resolution or WINS -based name resolution, but it should be noted that the "remote -browse sync" parameter provides browse list synchronisation - and -that is distinct from name to address resolution, in other -words, for cross subnet browsing to function correctly it is -essential that a name to address resolution mechanism be provided. -This mechanism could be via DNS, /etc/hosts, -and so on.


    2.3. Use of the "Remote Announce" parameter

    The "remote announce" parameter of smb.conf can be used to forcibly ensure -that all the NetBIOS names on a network get announced to a remote network. -The syntax of the "remote announce" parameter is: -

    	remote announce = a.b.c.d [e.f.g.h] ...
    -_or_ -
    	remote announce = a.b.c.d/WORKGROUP [e.f.g.h/WORKGROUP] ...
    - -where: -

    a.b.c.d and e.f.g.h

    is either the LMB (Local Master Browser) IP address -or the broadcst address of the remote network. -ie: the LMB is at 192.168.1.10, or the address -could be given as 192.168.1.255 where the netmask -is assumed to be 24 bits (255.255.255.0). -When the remote announcement is made to the broadcast -address of the remote network every host will receive -our announcements. This is noisy and therefore -undesirable but may be necessary if we do NOT know -the IP address of the remote LMB.

    WORKGROUP

    is optional and can be either our own workgroup -or that of the remote network. If you use the -workgroup name of the remote network then our -NetBIOS machine names will end up looking like -they belong to that workgroup, this may cause -name resolution problems and should be avoided.


    2.4. Use of the "Remote Browse Sync" parameter

    The "remote browse sync" parameter of smb.conf is used to announce to -another LMB that it must synchronise it's NetBIOS name list with our -Samba LMB. It works ONLY if the Samba server that has this option is -simultaneously the LMB on it's network segment.

    The syntax of the "remote browse sync" parameter is: - -

    remote browse sync = a.b.c.d
    - -where a.b.c.d is either the IP address of the remote LMB or else is the network broadcast address of the remote segment.


    2.5. Use of WINS

    Use of WINS (either Samba WINS _or_ MS Windows NT Server WINS) is highly -recommended. Every NetBIOS machine registers it's name together with a -name_type value for each of of several types of service it has available. -eg: It registers it's name directly as a unique (the type 0x03) name. -It also registers it's name if it is running the lanmanager compatible -server service (used to make shares and printers available to other users) -by registering the server (the type 0x20) name.

    All NetBIOS names are up to 15 characters in length. The name_type variable -is added to the end of the name - thus creating a 16 character name. Any -name that is shorter than 15 characters is padded with spaces to the 15th -character. ie: All NetBIOS names are 16 characters long (including the -name_type information).

    WINS can store these 16 character names as they get registered. A client -that wants to log onto the network can ask the WINS server for a list -of all names that have registered the NetLogon service name_type. This saves -broadcast traffic and greatly expedites logon processing. Since broadcast -name resolution can not be used across network segments this type of -information can only be provided via WINS _or_ via statically configured -"lmhosts" files that must reside on all clients in the absence of WINS.

    WINS also serves the purpose of forcing browse list synchronisation by all -LMB's. LMB's must synchronise their browse list with the DMB (domain master -browser) and WINS helps the LMB to identify it's DMB. By definition this -will work only within a single workgroup. Note that the domain master browser -has NOTHING to do with what is referred to as an MS Windows NT Domain. The -later is a reference to a security environment while the DMB refers to the -master controller for browse list information only.

    Use of WINS will work correctly only if EVERY client TCP/IP protocol stack -has been configured to use the WINS server/s. Any client that has not been -configured to use the WINS server will continue to use only broadcast based -name registration so that WINS may NEVER get to know about it. In any case, -machines that have not registered with a WINS server will fail name to address -lookup attempts by other clients and will therefore cause workstation access -errors.

    To configure Samba as a WINS server just add "wins support = yes" to the -smb.conf file [globals] section.

    To configure Samba to register with a WINS server just add -"wins server = a.b.c.d" to your smb.conf file [globals] section.

    DO NOT EVER use both "wins support = yes" together -with "wins server = a.b.c.d" particularly not using it's own IP address. -Specifying both will cause nmbd to refuse to start!


    2.6. Do NOT use more than one (1) protocol on MS Windows machines

    A very common cause of browsing problems results from installing more than -one protocol on an MS Windows machine.

    Every NetBIOS machine takes part in a process of electing the LMB (and DMB) -every 15 minutes. A set of election criteria is used to determine the order -of precidence for winning this election process. A machine running Samba or -Windows NT will be biased so that the most suitable machine will predictably -win and thus retain it's role.

    The election process is "fought out" so to speak over every NetBIOS network -interface. In the case of a Windows 9x machine that has both TCP/IP and IPX -installed and has NetBIOS enabled over both protocols the election will be -decided over both protocols. As often happens, if the Windows 9x machine is -the only one with both protocols then the LMB may be won on the NetBIOS -interface over the IPX protocol. Samba will then lose the LMB role as Windows -9x will insist it knows who the LMB is. Samba will then cease to function -as an LMB and thus browse list operation on all TCP/IP only machines will -fail.

    Windows 95, 98, 98se, Me are referred to generically as Windows 9x. -The Windows NT4, 2000, XP and 2003 use common protocols. These are roughly -referred to as the WinNT family, but it should be recognised that 2000 and -XP/2003 introduce new protocol extensions that cause them to behave -differently from MS Windows NT4. Generally, where a server does NOT support -the newer or extended protocol, these will fall back to the NT4 protocols.

    The safest rule of all to follow it this - USE ONLY ONE PROTOCOL!


    2.7. Name Resolution Order

    Resolution of NetBIOS names to IP addresses can take place using a number -of methods. The only ones that can provide NetBIOS name_type information -are:

    WINS: the best tool!
    LMHOSTS: is static and hard to maintain.
    Broadcast: uses UDP and can not resolve names across remote segments.

    Alternative means of name resolution includes:

    /etc/hosts: is static, hard to maintain, and lacks name_type info
    DNS: is a good choice but lacks essential name_type info.

    Many sites want to restrict DNS lookups and want to avoid broadcast name -resolution traffic. The "name resolve order" parameter is of great help here. -The syntax of the "name resolve order" parameter is: -

    name resolve order = wins lmhosts bcast host
    -_or_ -
    name resolve order = wins lmhosts  	(eliminates bcast and host)
    -The default is: -
    name  resolve order = host lmhost wins bcast
    . -where "host" refers the the native methods used by the Unix system -to implement the gethostbyname() function call. This is normally -controlled by /etc/host.conf, /etc/nsswitch.conf and /etc/resolv.conf.


    Chapter 3. User information database

    3.1. Introduction

    Old windows clients send plain text passwords over the wire. - Samba can check these passwords by crypting them and comparing them - to the hash stored in the unix user database. -

    Newer windows clients send encrypted passwords (so-called - Lanman and NT hashes) over - the wire, instead of plain text passwords. The newest clients - will only send encrypted passwords and refuse to send plain text - passwords, unless their registry is tweaked. -

    These passwords can't be converted to unix style encrypted - passwords. Because of that you can't use the standard unix - user database, and you have to store the Lanman and NT hashes - somewhere else.

    Next to a differently encrypted passwords, - windows also stores certain data for each user - that is not stored in a unix user database, e.g. - workstations the user may logon from, the location where his/her - profile is stored, etc. - Samba retrieves and stores this information using a "passdb backend". - Commonly - available backends are LDAP, plain text file, MySQL and nisplus. - For more information, see the documentation about the - passdb backend = parameter. -


    3.2. Important Notes About Security

    The unix and SMB password encryption techniques seem similar - on the surface. This similarity is, however, only skin deep. The unix - scheme typically sends clear text passwords over the network when - logging in. This is bad. The SMB encryption scheme never sends the - cleartext password over the network but it does store the 16 byte - hashed values on disk. This is also bad. Why? Because the 16 byte hashed - values are a "password equivalent". You cannot derive the user's - password from them, but they could potentially be used in a modified - client to gain access to a server. This would require considerable - technical knowledge on behalf of the attacker but is perfectly possible. - You should thus treat the data stored in whatever - passdb backend you use (smbpasswd file, ldap, mysql) as though it contained the - cleartext passwords of all your users. Its contents must be kept - secret, and the file should be protected accordingly.

    Ideally we would like a password scheme which neither requires - plain text passwords on the net or on disk. Unfortunately this - is not available as Samba is stuck with being compatible with - other SMB systems (WinNT, WfWg, Win95 etc).

    Note that Windows NT 4.0 Service pack 3 changed the - default for permissible authentication so that plaintext - passwords are never sent over the wire. - The solution to this is either to switch to encrypted passwords - with Samba or edit the Windows NT registry to re-enable plaintext - passwords. See the document WinNT.txt for details on how to do - this.

    Other Microsoft operating systems which also exhibit - this behavior includes

    These versions of MS Windows do not support full domain - security protocols, although they may log onto a domain environment. - Of these Only MS Windows XP Home does NOT support domain logons.

    MS DOS Network client 3.0 with - the basic network redirector installed
    Windows 95 with the network redirector - update installed
    Windows 98 [se]
    Windows Me
    Windows XP Home

    The following versions of MS Windows fully support domain - security protocols.

    Windows NT 3.5x
    Windows NT 4.0
    Windows 2000 Professional
    Windows 200x Server/Advanced Server
    Windows XP Professional

    Note :All current release of - Microsoft SMB/CIFS clients support authentication via the - SMB Challenge/Response mechanism described here. Enabling - clear text authentication does not disable the ability - of the client to participate in encrypted authentication.

    MS Windows clients will cache the encrypted password alone. - Even when plain text passwords are re-enabled, through the appropriate - registry change, the plain text password is NEVER cached. This means that - in the event that a network connections should become disconnected (broken) - only the cached (encrypted) password will be sent to the resource server - to affect a auto-reconnect. If the resource server does not support encrypted - passwords the auto-reconnect will fail. USE OF ENCRYPTED PASSWORDS - IS STRONGLY ADVISED.


    3.2.1. Advantages of SMB Encryption

    Plain text passwords are not passed across - the network. Someone using a network sniffer cannot just - record passwords going to the SMB server.
    WinNT doesn't like talking to a server - that SM not support encrypted passwords. It will refuse - to browse the server if the server is also in user level - security mode. It will insist on prompting the user for the - password on each connection, which is very annoying. The - only things you can do to stop this is to use SMB encryption. -
    Encrypted password support allows auto-matic share - (resource) reconnects.


    3.2.2. Advantages of non-encrypted passwords

    Plain text passwords are not kept - on disk, and are NOT cached in memory.
    Uses same password file as other unix - services such as login and ftp
    Use of other services (such as telnet and ftp) which - send plain text passwords over the net, so sending them for SMB - isn't such a big deal.


    3.3. The smbpasswd Command

    The smbpasswd utility is a utility similar to the - passwd or yppasswd programs. - It maintains the two 32 byte password fields in the passdb backend.

    smbpasswd works in a client-server mode - where it contacts the local smbd to change the user's password on its - behalf. This has enormous benefits - as follows.

    smbpasswd has the capability - to change passwords on Windows NT servers (this only works when - the request is sent to the NT Primary Domain Controller if you - are changing an NT Domain user's password).

    To run smbpasswd as a normal user just type :

    $ smbpasswd

    Old SMB password: <type old value here - - or hit return if there was no old password>

    New SMB Password: <type new value> -

    Repeat New SMB Password: <re-type new value -

    If the old value does not match the current value stored for - that user, or the two new values do not match each other, then the - password will not be changed.

    If invoked by an ordinary user it will only allow the user - to change his or her own Samba password.

    If run by the root user smbpasswd may take an optional - argument, specifying the user name whose SMB password you wish to - change. Note that when run as root smbpasswd does not prompt for - or check the old password value, thus allowing root to set passwords - for users who have forgotten their passwords.

    smbpasswd is designed to work in the same way - and be familiar to UNIX users who use the passwd or - yppasswd commands.

    For more details on using smbpasswd refer - to the man page which will always be the definitive reference.


    3.4. Plain text

    Older versions of samba retrieved user information from the unix user database -and eventually some other fields from the file /etc/samba/smbpasswd -or /etc/smbpasswd. When password encryption is disabled, no -data is stored at all.


    3.5. TDB

    Samba can also store the user data in a "TDB" (Trivial Database). Using this backend -doesn't require any additional configuration. This backend is recommended for new installations who -don't require LDAP.


    3.6. LDAP

    3.6.1. Introduction

    This document describes how to use an LDAP directory for storing Samba user -account information traditionally stored in the smbpasswd(5) file. It is -assumed that the reader already has a basic understanding of LDAP concepts -and has a working directory server already installed. For more information -on LDAP architectures and Directories, please refer to the following sites.

    Note that O'Reilly Publishing is working on -a guide to LDAP for System Administrators which has a planned release date of -early summer, 2002.

    Two additional Samba resources which may prove to be helpful are

    • The Samba-PDC-LDAP-HOWTO - maintained by Ignacio Coupeau.

    • The NT migration scripts from IDEALX that are - geared to manage users and group in such a Samba-LDAP Domain Controller configuration. -


    3.6.2. Introduction

    Traditionally, when configuring "encrypt -passwords = yes" in Samba's smb.conf file, user account -information such as username, LM/NT password hashes, password change times, and account -flags have been stored in the smbpasswd(5) file. There are several -disadvantages to this approach for sites with very large numbers of users (counted -in the thousands).

    • The first is that all lookups must be performed sequentially. Given that -there are approximately two lookups per domain logon (one for a normal -session connection such as when mapping a network drive or printer), this -is a performance bottleneck for lareg sites. What is needed is an indexed approach -such as is used in databases.

    • The second problem is that administrators who desired to replicate a -smbpasswd file to more than one Samba server were left to use external -tools such as rsync(1) and ssh(1) -and wrote custom, in-house scripts.

    • And finally, the amount of information which is stored in an -smbpasswd entry leaves no room for additional attributes such as -a home directory, password expiration time, or even a Relative -Identified (RID).

    As a result of these defeciencies, a more robust means of storing user attributes -used by smbd was developed. The API which defines access to user accounts -is commonly referred to as the samdb interface (previously this was called the passdb -API, and is still so named in the CVS trees). In Samba 2.2.3, enabling support -for a samdb backend (e.g. --with-ldapsam or ---with-tdbsam) requires compile time support.

    When compiling Samba to include the --with-ldapsam autoconf -option, smbd (and associated tools) will store and lookup user accounts in -an LDAP directory. In reality, this is very easy to understand. If you are -comfortable with using an smbpasswd file, simply replace "smbpasswd" with -"LDAP directory" in all the documentation.

    There are a few points to stress about what the --with-ldapsam -does not provide. The LDAP support referred to in the this documentation does not -include:

    • A means of retrieving user account information from - an Windows 2000 Active Directory server.

    • A means of replacing /etc/passwd.

    The second item can be accomplished by using LDAP NSS and PAM modules. LGPL -versions of these libraries can be obtained from PADL Software -(http://www.padl.com/). However, -the details of configuring these packages are beyond the scope of this document.


    3.6.3. Supported LDAP Servers

    The LDAP samdb code in 2.2.3 (and later) has been developed and tested -using the OpenLDAP 2.0 server and client libraries. -The same code should be able to work with Netscape's Directory Server -and client SDK. However, due to lack of testing so far, there are bound -to be compile errors and bugs. These should not be hard to fix. -If you are so inclined, please be sure to forward all patches to -samba-patches@samba.org and -jerry@samba.org.


    3.6.4. Schema and Relationship to the RFC 2307 posixAccount

    Samba 3.0 includes the necessary schema file for OpenLDAP 2.0 in -examples/LDAP/samba.schema. The sambaAccount objectclass is given here:

    objectclass ( 1.3.1.5.1.4.1.7165.2.2.2 NAME 'sambaAccount' SUP top STRUCTURAL
    -     DESC 'Samba Account'
    -     MUST ( uid $ rid )
    -     MAY  ( cn $ lmPassword $ ntPassword $ pwdLastSet $ logonTime $
    -            logoffTime $ kickoffTime $ pwdCanChange $ pwdMustChange $ acctFlags $
    -            displayName $ smbHome $ homeDrive $ scriptPath $ profilePath $
    -            description $ userWorkstations $ primaryGroupID $ domain ))

    The samba.schema file has been formatted for OpenLDAP 2.0. The OID's are -owned by the Samba Team and as such is legal to be openly published. -If you translate the schema to be used with Netscape DS, please -submit the modified schema file as a patch to jerry@samba.org

    Just as the smbpasswd file is mean to store information which supplements a -user's /etc/passwd entry, so is the sambaAccount object -meant to supplement the UNIX user account information. A sambaAccount is a -STRUCTURAL objectclass so it can be stored individually -in the directory. However, there are several fields (e.g. uid) which overlap -with the posixAccount objectclass outlined in RFC2307. This is by design.

    In order to store all user account information (UNIX and Samba) in the directory, -it is necessary to use the sambaAccount and posixAccount objectclasses in -combination. However, smbd will still obtain the user's UNIX account -information via the standard C library calls (e.g. getpwnam(), et. al.). -This means that the Samba server must also have the LDAP NSS library installed -and functioning correctly. This division of information makes it possible to -store all Samba account information in LDAP, but still maintain UNIX account -information in NIS while the network is transitioning to a full LDAP infrastructure.


    3.6.5. Configuring Samba with LDAP

    3.6.5.1. OpenLDAP configuration

    To include support for the sambaAccount object in an OpenLDAP directory -server, first copy the samba.schema file to slapd's configuration directory.

    root# cp samba.schema /etc/openldap/schema/

    Next, include the samba.schema file in slapd.conf. -The sambaAccount object contains two attributes which depend upon other schema -files. The 'uid' attribute is defined in cosine.schema and -the 'displayName' attribute is defined in the inetorgperson.schema -file. Both of these must be included before the samba.schema file.

    ## /etc/openldap/slapd.conf
    -
    -## schema files (core.schema is required by default)
    -include	           /etc/openldap/schema/core.schema
    -
    -## needed for sambaAccount
    -include            /etc/openldap/schema/cosine.schema
    -include            /etc/openldap/schema/inetorgperson.schema
    -include            /etc/openldap/schema/samba.schema
    -
    -## uncomment this line if you want to support the RFC2307 (NIS) schema
    -## include         /etc/openldap/schema/nis.schema
    -
    -....

    It is recommended that you maintain some indices on some of the most usefull attributes, -like in the following example, to speed up searches made on sambaAccount objectclasses -(and possibly posixAccount and posixGroup as well).

    # Indices to maintain
    -## required by OpenLDAP 2.0
    -index objectclass   eq
    -
    -## support pb_getsampwnam()
    -index uid           pres,eq
    -## support pdb_getsambapwrid()
    -index rid           eq
    -
    -## uncomment these if you are storing posixAccount and
    -## posixGroup entries in the directory as well
    -##index uidNumber     eq
    -##index gidNumber     eq
    -##index cn            eq
    -##index memberUid     eq


    3.6.5.2. Configuring Samba

    The following parameters are available in smb.conf only with --with-ldapsam -was included with compiling Samba.

    These are described in the smb.conf(5) man -page and so will not be repeated here. However, a sample smb.conf file for -use with an LDAP directory could appear as

    ## /usr/local/samba/lib/smb.conf
    -[global]
    -     security = user
    -     encrypt passwords = yes
    -
    -     netbios name = TASHTEGO
    -     workgroup = NARNIA
    -
    -     # ldap related parameters
    -
    -     # define the DN to use when binding to the directory servers
    -     # The password for this DN is not stored in smb.conf.  Rather it
    -     # must be set by using 'smbpasswd -w secretpw' to store the
    -     # passphrase in the secrets.tdb file.  If the "ldap admin dn" values
    -     # changes, this password will need to be reset.
    -     ldap admin dn = "cn=Samba Manager,ou=people,dc=samba,dc=org"
    -
    -     #  specify the LDAP server's hostname (defaults to locahost)
    -     ldap server = ahab.samba.org
    -
    -     # Define the SSL option when connecting to the directory
    -     # ('off', 'start tls', or 'on' (default))
    -     ldap ssl = start tls
    -
    -     # define the port to use in the LDAP session (defaults to 636 when
    -     # "ldap ssl = on")
    -     ldap port = 389
    -
    -     # specify the base DN to use when searching the directory
    -     ldap suffix = "ou=people,dc=samba,dc=org"
    -
    -     # generally the default ldap search filter is ok
    -     # ldap filter = "(&(uid=%u)(objectclass=sambaAccount))"


    3.6.6. Accounts and Groups management

    As users accounts are managed thru the sambaAccount objectclass, you should -modify you existing administration tools to deal with sambaAccount attributes.

    Machines accounts are managed with the sambaAccount objectclass, just -like users accounts. However, it's up to you to stored thoses accounts -in a different tree of you LDAP namespace: you should use -"ou=Groups,dc=plainjoe,dc=org" to store groups and -"ou=People,dc=plainjoe,dc=org" to store users. Just configure your -NSS and PAM accordingly (usually, in the /etc/ldap.conf configuration -file).

    In Samba release 3.0, the group management system is based on posix -groups. This means that Samba make usage of the posixGroup objectclass. -For now, there is no NT-like group system management (global and local -groups).


    3.6.7. Security and sambaAccount

    There are two important points to remember when discussing the security -of sambaAccount entries in the directory.

    • Never retrieve the lmPassword or - ntPassword attribute values over an unencrypted LDAP session.

    • Never allow non-admin users to - view the lmPassword or ntPassword attribute values.

    These password hashes are clear text equivalents and can be used to impersonate -the user without deriving the original clear text strings. For more information -on the details of LM/NT password hashes, refer to the ENCRYPTION chapter of the Samba-HOWTO-Collection.

    To remedy the first security issue, the "ldap ssl" smb.conf parameter defaults -to require an encrypted session (ldap ssl = on) using -the default port of 636 -when contacting the directory server. When using an OpenLDAP 2.0 server, it -is possible to use the use the StartTLS LDAP extended operation in the place of -LDAPS. In either case, you are strongly discouraged to disable this security -(ldap ssl = off).

    Note that the LDAPS protocol is deprecated in favor of the LDAPv3 StartTLS -extended operation. However, the OpenLDAP library still provides support for -the older method of securing communication between clients and servers.

    The second security precaution is to prevent non-administrative users from -harvesting password hashes from the directory. This can be done using the -following ACL in slapd.conf:

    ## allow the "ldap admin dn" access, but deny everyone else
    -access to attrs=lmPassword,ntPassword
    -     by dn="cn=Samba Admin,ou=people,dc=plainjoe,dc=org" write
    -     by * none


    3.6.8. LDAP specials attributes for sambaAccounts

    The sambaAccount objectclass is composed of the following attributes:

    • lmPassword: the LANMAN password 16-byte hash stored as a character - representation of a hexidecimal string.

    • ntPassword: the NT password hash 16-byte stored as a character - representation of a hexidecimal string.

    • pwdLastSet: The integer time in seconds since 1970 when the - lmPassword and ntPassword attributes were last set. -

    • acctFlags: string of 11 characters surrounded by square brackets [] - representing account flags such as U (user), W(workstation), X(no password expiration), and - D(disabled).

    • logonTime: Integer value currently unused

    • logoffTime: Integer value currently unused

    • kickoffTime: Integer value currently unused

    • pwdCanChange: Integer value currently unused

    • pwdMustChange: Integer value currently unused

    • homeDrive: specifies the drive letter to which to map the - UNC path specified by homeDirectory. The drive letter must be specified in the form "X:" - where X is the letter of the drive to map. Refer to the "logon drive" parameter in the - smb.conf(5) man page for more information.

    • scriptPath: The scriptPath property specifies the path of - the user's logon script, .CMD, .EXE, or .BAT file. The string can be null. The path - is relative to the netlogon share. Refer to the "logon script" parameter in the - smb.conf(5) man page for more information.

    • profilePath: specifies a path to the user's profile. - This value can be a null string, a local absolute path, or a UNC path. Refer to the - "logon path" parameter in the smb.conf(5) man page for more information.

    • smbHome: The homeDirectory property specifies the path of - the home directory for the user. The string can be null. If homeDrive is set and specifies - a drive letter, homeDirectory should be a UNC path. The path must be a network - UNC path of the form \\server\share\directory. This value can be a null string. - Refer to the "logon home" parameter in the smb.conf(5) man page for more information. -

    • userWorkstation: character string value currently unused. -

    • rid: the integer representation of the user's relative identifier - (RID).

    • primaryGroupID: the relative identifier (RID) of the primary group - of the user.

    The majority of these parameters are only used when Samba is acting as a PDC of -a domain (refer to the Samba-PDC-HOWTO for details on -how to configure Samba as a Primary Domain Controller). The following four attributes -are only stored with the sambaAccount entry if the values are non-default values:

    • smbHome

    • scriptPath

    • logonPath

    • homeDrive

    These attributes are only stored with the sambaAccount entry if -the values are non-default values. For example, assume TASHTEGO has now been -configured as a PDC and that logon home = \\%L\%u was defined in -its smb.conf file. When a user named "becky" logons to the domain, -the logon home string is expanded to \\TASHTEGO\becky. -If the smbHome attribute exists in the entry "uid=becky,ou=people,dc=samba,dc=org", -this value is used. However, if this attribute does not exist, then the value -of the logon home parameter is used in its place. Samba -will only write the attribute value to the directory entry is the value is -something other than the default (e.g. \\MOBY\becky).


    3.6.9. Example LDIF Entries for a sambaAccount

    The following is a working LDIF with the inclusion of the posixAccount objectclass:

    dn: uid=guest2, ou=people,dc=plainjoe,dc=org
    -ntPassword: 878D8014606CDA29677A44EFA1353FC7
    -pwdMustChange: 2147483647
    -primaryGroupID: 1201
    -lmPassword: 552902031BEDE9EFAAD3B435B51404EE
    -pwdLastSet: 1010179124
    -logonTime: 0
    -objectClass: sambaAccount
    -uid: guest2
    -kickoffTime: 2147483647
    -acctFlags: [UX         ]
    -logoffTime: 2147483647
    -rid: 19006
    -pwdCanChange: 0

    The following is an LDIF entry for using both the sambaAccount and -posixAccount objectclasses:

    dn: uid=gcarter, ou=people,dc=plainjoe,dc=org
    -logonTime: 0
    -displayName: Gerald Carter
    -lmPassword: 552902031BEDE9EFAAD3B435B51404EE
    -primaryGroupID: 1201
    -objectClass: posixAccount
    -objectClass: sambaAccount
    -acctFlags: [UX         ]
    -userPassword: {crypt}BpM2ej8Rkzogo
    -uid: gcarter
    -uidNumber: 9000
    -cn: Gerald Carter
    -loginShell: /bin/bash
    -logoffTime: 2147483647
    -gidNumber: 100
    -kickoffTime: 2147483647
    -pwdLastSet: 1010179230
    -rid: 19000
    -homeDirectory: /home/tashtego/gcarter
    -pwdCanChange: 0
    -pwdMustChange: 2147483647
    -ntPassword: 878D8014606CDA29677A44EFA1353FC7


    3.7. MySQL

    3.7.1. Creating the database

    You either can set up your own table and specify the field names to pdb_mysql (see below -for the column names) or use the default table. The file examples/pdb/mysql/mysql.dump -contains the correct queries to create the required tables. Use the command : - -mysql -uusername -hhostname -ppassword databasename < /path/to/samba/examples/pdb/mysql/mysql.dump


    3.7.2. Configuring

    This plugin lacks some good documentation, but here is some short info:

    Add a the following to the passdb backend variable in your smb.conf: -

    passdb backend = [other-plugins] mysql:identifier [other-plugins]

    The identifier can be any string you like, as long as it doesn't collide with -the identifiers of other plugins or other instances of pdb_mysql. If you -specify multiple pdb_mysql.so entries in 'passdb backend', you also need to -use different identifiers!

    Additional options can be given thru the smb.conf file in the [global] section.

    identifier:mysql host                     - host name, defaults to 'localhost'
    -identifier:mysql password
    -identifier:mysql user                     - defaults to 'samba'
    -identifier:mysql database                 - defaults to 'samba'
    -identifier:mysql port                     - defaults to 3306
    -identifier:table                          - Name of the table containing users

    Since the password for the mysql user is stored in the -smb.conf file, you should make the the smb.conf file -readable only to the user that runs samba. This is considered a security -bug and will be fixed soon.

    Names of the columns in this table(I've added column types those columns should have first):

    identifier:logon time column             - int(9)
    -identifier:logoff time column            - int(9)
    -identifier:kickoff time column           - int(9)
    -identifier:pass last set time column     - int(9)
    -identifier:pass can change time column   - int(9)
    -identifier:pass must change time column  - int(9)
    -identifier:username column               - varchar(255) - unix username
    -identifier:domain column                 - varchar(255) - NT domain user is part of
    -identifier:nt username column            - varchar(255) - NT username
    -identifier:fullname column            - varchar(255) - Full name of user
    -identifier:home dir column               - varchar(255) - Unix homedir path
    -identifier:dir drive column              - varchar(2) - Directory drive path (eg: 'H:')
    -identifier:logon script column           - varchar(255) - Batch file to run on client side when logging on
    -identifier:profile path column           - varchar(255) - Path of profile
    -identifier:acct desc column              - varchar(255) - Some ASCII NT user data
    -identifier:workstations column           - varchar(255) - Workstations user can logon to (or NULL for all)
    -identifier:unknown string column         - varchar(255) - unknown string
    -identifier:munged dial column            - varchar(255) - ?
    -identifier:uid column                    - int(9) - Unix user ID (uid)
    -identifier:gid column                    - int(9) - Unix user group (gid)
    -identifier:user sid column               - varchar(255) - NT user SID
    -identifier:group sid column              - varchar(255) - NT group ID
    -identifier:lanman pass column            - varchar(255) - encrypted lanman password
    -identifier:nt pass column                - varchar(255) - encrypted nt passwd
    -identifier:plain pass column             - varchar(255) - plaintext password
    -identifier:acct control column           - int(9) - nt user data
    -identifier:unknown 3 column              - int(9) - unknown
    -identifier:logon divs column             - int(9) - ?
    -identifier:hours len column              - int(9) - ?
    -identifier:unknown 5 column              - int(9) - unknown
    -identifier:unknown 6 column              - int(9) - unknown

    Eventually, you can put a colon (:) after the name of each column, which -should specify the column to update when updating the table. You can also -specify nothing behind the colon - then the data from the field will not be -updated.


    3.7.3. Using plaintext passwords or encrypted password

    I strongly discourage the use of plaintext passwords, however, you can use them:

    If you would like to use plaintext passwords, set 'identifier:lanman pass column' and 'identifier:nt pass column' to 'NULL' (without the quotes) and 'identifier:plain pass column' to the name of the column containing the plaintext passwords.

    If you use encrypted passwords, set the 'identifier:plain pass column' to 'NULL' (without the quotes). This is the default.


    3.7.4. Getting non-column data from the table

    It is possible to have not all data in the database and making some 'constant'.

    For example, you can set 'identifier:fullname column' to : -CONCAT(First_name,' ',Sur_name)

    Or, set 'identifier:workstations column' to : -NULL

    See the MySQL documentation for more language constructs.


    3.8. XML

    This module requires libxml2 to be installed.

    The usage of pdb_xml is pretty straightforward. To export data, use: - -pdbedit -e xml:filename - -(where filename is the name of the file to put the data in)

    To import data, use: -pdbedit -i xml:filename -e current-pdb - -Where filename is the name to read the data from and current-pdb to put it in.

    II. Type of installation

    Introduction

    Samba can operate in various SMB networks. This part contains information on configuring samba -for various environments.

    Table of Contents
    4. Nomenclature of Server Types
    4.1. Stand Alone Server
    4.2. Domain Member Server
    4.3. Domain Controller
    4.3.1. Domain Controller Types
    5. Samba as Stand-Alone Server
    5.1. User and Share security level
    5.1.1. User Level Security
    5.1.2. Share Level Security
    5.1.3. Server Level Security
    5.1.4. Domain Level Security
    5.1.5. ADS Level Security
    6. Samba as an NT4 or Win2k Primary Domain Controller
    6.1. Prerequisite Reading
    6.2. Background
    6.3. Configuring the Samba Domain Controller
    6.4. Creating Machine Trust Accounts and Joining Clients to the Domain
    6.4.1. Manual Creation of Machine Trust Accounts
    6.4.2. "On-the-Fly" Creation of Machine Trust Accounts
    6.4.3. Joining the Client to the Domain
    6.5. Common Problems and Errors
    6.6. What other help can I get?
    6.7. Domain Control for Windows 9x/ME
    6.7.1. Configuration Instructions: Network Logons
    7. Samba Backup Domain Controller to Samba Domain Control
    7.1. Prerequisite Reading
    7.2. Background
    7.3. What qualifies a Domain Controller on the network?
    7.3.1. How does a Workstation find its domain controller?
    7.3.2. When is the PDC needed?
    7.4. Can Samba be a Backup Domain Controller to an NT PDC?
    7.5. How do I set up a Samba BDC?
    7.5.1. How do I replicate the smbpasswd file?
    7.5.2. Can I do this all with LDAP?
    8. Samba as a ADS domain member
    8.1. Setup your smb.conf
    8.2. Setup your /etc/krb5.conf
    8.3. Create the computer account
    8.3.1. Possible errors
    8.4. Test your server setup
    8.5. Testing with smbclient
    8.6. Notes
    9. Samba as a NT4 or Win2k domain member
    9.1. Joining an NT Domain with Samba 3.0
    9.2. Why is this better than security = server?

    Chapter 4. Nomenclature of Server Types

    Adminstrators of Microsoft networks often refer to there being three -different type of servers:

    • Stand Alone Server

    • Domain Member Server

    • Domain Controller

      • Primary Domain Controller

      • Backup Domain Controller

      • ADS Domain Controller

    A network administrator who is familiar with these terms and who -wishes to migrate to or use Samba will want to know what these terms mean -within a Samba context.


    4.1. Stand Alone Server

    The term stand alone server means that the server -will provide local authentication and access control for all resources -that are available from it. In general this means that there will be a -local user database. In more technical terms, it means that resources -on the machine will either be made available in either SHARE mode or in -USER mode. SHARE mode and USER mode security are documented under -discussions regarding "security mode". The smb.conf configuration parameters -that control security mode are: "security = user" and "security = share".

    No special action is needed other than to create user accounts. Stand-alone -servers do NOT provide network logon services, meaning that machines that -use this server do NOT perform a domain logon but instead make use only of -the MS Windows logon which is local to the MS Windows workstation/server.

    Samba tends to blur the distinction a little in respect of what is -a stand alone server. This is because the authentication database may be -local or on a remote server, even if from the samba protocol perspective -the samba server is NOT a member of a domain security context.

    Through the use of PAM (Pluggable Authentication Modules) and nsswitch -(the name service switcher) the source of authentication may reside on -another server. We would be inclined to call this the authentication server. -This means that the samba server may use the local Unix/Linux system -password database (/etc/passwd or /etc/shadow), may use a local smbpasswd -file (/etc/samba/smbpasswd or /usr/local/samba/lib/private/smbpasswd), or -may use an LDAP back end, or even via PAM and Winbind another CIFS/SMB -server for authentication.


    4.2. Domain Member Server

    This mode of server operation involves the samba machine being made a member -of a domain security context. This means by definition that all user authentication -will be done from a centrally defined authentication regime. The authentication -regime may come from an NT3/4 style (old domain technology) server, or it may be -provided from an Active Directory server (ADS) running on MS Windows 2000 or later. ->/para>

    Of course it should be clear that the authentication back end itself could be from any -distributed directory architecture server that is supported by Samba. This can be -LDAP (from OpenLDAP), or Sun's iPlanet, of NetWare Directory Server, etc.

    Please refer to the section on Howto configure Samba as a Primary Domain Controller -and for more information regarding how to create a domain machine account for a -domain member server as well as for information regading how to enable the samba -domain member machine to join the domain and to be fully trusted by it.


    4.3. Domain Controller

    Over the years public perceptions of what Domain Control really is has taken on an -almost mystical nature. Before we branch into a brief overview of what Domain Control -is the following types of controller are known:


    4.3.1. Domain Controller Types

    Primary Domain Controller
    Backup Domain Controller
    ADS Domain Controller

    The Primary Domain Controller or PDC plays an important role in the MS -Windows NT3 and NT4 Domain Control architecture, but not in the manner that so many -expect. The PDC seeds the Domain Control database (a part of the Windows registry) and -it plays a key part in synchronisation of the domain authentication database.

    New to Samba-3.0.0 is the ability to use a back-end file that holds the same type of data as -the NT4 style SAM (Security Account Manager) database (one of the registry files). -The samba-3.0.0 SAM can be specified via the smb.conf file parameter "passwd backend" and -valid options include smbpasswd tdbsam ldapsam nisplussam plugin unixsam. -The smbpasswd, tdbsam and ldapsam options can have a "_nua" suffix to indicate that No Unix -Accounts need to be created. In other words, the Samba SAM will be independant of Unix/Linux -system accounts, provided a uid range is defined from which SAM accounts can be created.

    The Backup Domain Controller or BDC plays a key role in servicing network -authentication requests. The BDC is biased to answer logon requests so that on a network segment -that has a BDC and a PDC the BDC will be most likely to service network logon requests. The PDC will -answer network logon requests when the BDC is too busy (high load). A BDC can be promoted to -a PDC. If the PDC is on line at the time that the BDC is promoted to PDC the previous PDC is -automatically demoted to a BDC.

    At this time Samba is NOT capable of acting as an ADS Domain Controller.


    Chapter 5. Samba as Stand-Alone Server

    In this section the function and purpose of Samba's security -modes are described.


    5.1. User and Share security level

    A SMB server tells the client at startup what "security level" it is -running. There are two options "share level" and "user level". Which -of these two the client receives affects the way the client then tries -to authenticate itself. It does not directly affect (to any great -extent) the way the Samba server does security. I know this is -strange, but it fits in with the client/server approach of SMB. In SMB -everything is initiated and controlled by the client, and the server -can only tell the client what is available and whether an action is -allowed.


    5.1.1. User Level Security

    I'll describe user level security first, as its simpler. In user level -security the client will send a "session setup" command directly after -the protocol negotiation. This contains a username and password. The -server can either accept or reject that username/password -combination. Note that at this stage the server has no idea what -share the client will eventually try to connect to, so it can't base -the "accept/reject" on anything other than:

    1. the username/password

    2. the machine that the client is coming from

    If the server accepts the username/password then the client expects to -be able to mount any share (using a "tree connection") without -specifying a password. It expects that all access rights will be as -the username/password specified in the "session setup".

    It is also possible for a client to send multiple "session setup" -requests. When the server responds it gives the client a "uid" to use -as an authentication tag for that username/password. The client can -maintain multiple authentication contexts in this way (WinDD is an -example of an application that does this)


    5.1.2. Share Level Security

    Ok, now for share level security. In share level security the client -authenticates itself separately for each share. It will send a -password along with each "tree connection" (share mount). It does not -explicitly send a username with this operation. The client is -expecting a password to be associated with each share, independent of -the user. This means that samba has to work out what username the -client probably wants to use. It is never explicitly sent the -username. Some commercial SMB servers such as NT actually associate -passwords directly with shares in share level security, but samba -always uses the unix authentication scheme where it is a -username/password that is authenticated, not a "share/password".

    Many clients send a "session setup" even if the server is in share -level security. They normally send a valid username but no -password. Samba records this username in a list of "possible -usernames". When the client then does a "tree connection" it also adds -to this list the name of the share they try to connect to (useful for -home directories) and any users listed in the "user =" smb.conf -line. The password is then checked in turn against these "possible -usernames". If a match is found then the client is authenticated as -that user.


    5.1.3. Server Level Security

    Finally "server level" security. In server level security the samba -server reports to the client that it is in user level security. The -client then does a "session setup" as described earlier. The samba -server takes the username/password that the client sends and attempts -to login to the "password server" by sending exactly the same -username/password that it got from the client. If that server is in -user level security and accepts the password then samba accepts the -clients connection. This allows the samba server to use another SMB -server as the "password server".

    You should also note that at the very start of all this, where the -server tells the client what security level it is in, it also tells -the client if it supports encryption. If it does then it supplies the -client with a random "cryptkey". The client will then send all -passwords in encrypted form. You have to compile samba with encryption -enabled to support this feature, and you have to maintain a separate -smbpasswd file with SMB style encrypted passwords. It is -cryptographically impossible to translate from unix style encryption -to SMB style encryption, although there are some fairly simple management -schemes by which the two could be kept in sync.

    "security = server" means that Samba reports to clients that -it is running in "user mode" but actually passes off all authentication -requests to another "user mode" server. This requires an additional -parameter "password server =" that points to the real authentication server. -That real authentication server can be another Samba server or can be a -Windows NT server, the later natively capable of encrypted password support.


    5.1.3.1. Configuring Samba for Seemless Windows Network Integration

    MS Windows clients may use encrypted passwords as part of a challenege/response -authentication model (a.k.a. NTLMv1) or alone, or clear text strings for simple -password based authentication. It should be realized that with the SMB protocol -the password is passed over the network either in plain text or encrypted, but -not both in the same authentication requests.

    When encrypted passwords are used a password that has been entered by the user -is encrypted in two ways:

    • An MD4 hash of the UNICODE of the password - string. This is known as the NT hash. -

    • The password is converted to upper case, - and then padded or trucated to 14 bytes. This string is - then appended with 5 bytes of NULL characters and split to - form two 56 bit DES keys to encrypt a "magic" 8 byte value. - The resulting 16 bytes for the LanMan hash. -

    MS Windows 95 pre-service pack 1, MS Windows NT versions 3.x and version 4.0 -pre-service pack 3 will use either mode of password authentication. All -versions of MS Windows that follow these versions no longer support plain -text passwords by default.

    MS Windows clients have a habit of dropping network mappings that have been idle -for 10 minutes or longer. When the user attempts to use the mapped drive -connection that has been dropped, the client re-establishes the connection using -a cached copy of the password.

    When Microsoft changed the default password mode, support was dropped for caching -of the plain text password. This means that when the registry parameter is changed -to re-enable use of plain text passwords it appears to work, but when a dropped -service connection mapping attempts to revalidate it will fail if the remote -authentication server does not support encrypted passwords. This means that it -is definitely not a good idea to re-enable plain text password support in such clients.

    The following parameters can be used to work around the issue of Windows 9x client -upper casing usernames and password before transmitting them to the SMB server -when using clear text authentication.

    	passsword level = integer
    -	username level = integer

    By default Samba will lower case the username before attempting to lookup the user -in the database of local system accounts. Because UNIX usernames conventionally -only contain lower case character, the username level parameter -is rarely needed.

    However, passwords on UNIX systems often make use of mixed case characters. -This means that in order for a user on a Windows 9x client to connect to a Samba -server using clear text authentication, the password level -must be set to the maximum number of upper case letter which could -appear is a password. Note that is the server OS uses the traditional DES version -of crypt(), then a password level of 8 will result in case -insensitive passwords as seen from Windows users. This will also result in longer -login times as Samba hash to compute the permutations of the password string and -try them one by one until a match is located (or all combinations fail).

    The best option to adopt is to enable support for encrypted passwords -where ever Samba is used. There are three configuration possibilities -for support of encrypted passwords:


    5.1.3.2. Use MS Windows NT as an authentication server

    This method involves the additions of the following parameters in the smb.conf file:

    	encrypt passwords = Yes
    -	security = server
    -	password server = "NetBIOS_name_of_PDC"

    There are two ways of identifying whether or not a username and -password pair was valid or not. One uses the reply information provided -as part of the authentication messaging process, the other uses -just and error code.

    The down-side of this mode of configuration is the fact that -for security reasons Samba will send the password server a bogus -username and a bogus password and if the remote server fails to -reject the username and password pair then an alternative mode -of identification of validation is used. Where a site uses password -lock out after a certain number of failed authentication attempts -this will result in user lockouts.

    Use of this mode of authentication does require there to be -a standard Unix account for the user, this account can be blocked -to prevent logons by other than MS Windows clients.


    5.1.4. Domain Level Security

    When samba is operating in security = domain mode this means that -the Samba server has a domain security trust account (a machine account) and will cause -all authentication requests to be passed through to the domain controllers.


    5.1.4.1. Samba as a member of an MS Windows NT security domain

    This method involves additon of the following paramters in the smb.conf file:

    	encrypt passwords = Yes
    -	security = domain
    -	workgroup = "name of NT domain"
    -	password server = *

    The use of the "*" argument to "password server" will cause samba to locate the -domain controller in a way analogous to the way this is done within MS Windows NT. -This is the default behaviour.

    In order for this method to work the Samba server needs to join the -MS Windows NT security domain. This is done as follows:

    • On the MS Windows NT domain controller using - the Server Manager add a machine account for the Samba server. -

    • Next, on the Linux system execute: - smbpasswd -r PDC_NAME -j DOMAIN_NAME -

    Use of this mode of authentication does require there to be a standard Unix account -for the user in order to assign a uid once the account has been authenticated by -the remote Windows DC. This account can be blocked to prevent logons by other than -MS Windows clients by things such as setting an invalid shell in the -/etc/passwd entry.

    An alternative to assigning UIDs to Windows users on a Samba member server is -presented in the Winbind Overview chapter -in this HOWTO collection.


    5.1.5. ADS Level Security

    For information about the configuration option please refer to the entire section entitled -Samba as an ADS Domain Member.


    Chapter 6. Samba as an NT4 or Win2k Primary Domain Controller

    6.1. Prerequisite Reading

    Before you continue reading in this chapter, please make sure -that you are comfortable with configuring basic files services -in smb.conf and how to enable and administer password -encryption in Samba. Theses two topics are covered in the -smb.conf(5) -manpage.


    6.2. Background

    This article outlines the steps necessary for configuring Samba as a PDC. -It is necessary to have a working Samba server prior to implementing the -PDC functionality.

    • Domain logons for Windows NT 4.0 / 200x / XP Professional clients. -

    • Placing Windows 9x / Me clients in user level security -

    • Retrieving a list of users and groups from a Samba PDC to - Windows 9x / Me / NT / 200x / XP Professional clients -

    • Roaming Profiles -

    • Network/System Policies -

    Roaming Profiles and System/Network policies are advanced network administration topics -that are covered separately in this document.

    The following functionalities are new to the Samba 3.0 release:

    • Windows NT 4 domain trusts -

    • Adding users via the User Manager for Domains -

    The following functionalities are NOT provided by Samba 3.0:

    • SAM replication with Windows NT 4.0 Domain Controllers - (i.e. a Samba PDC and a Windows NT BDC or vice versa) -

    • Acting as a Windows 2000 Domain Controller (i.e. Kerberos and - Active Directory) -

    Please note that Windows 9x / Me / XP Home clients are not true members of a domain -for reasons outlined in this article. Therefore the protocol for -support Windows 9x-style domain logons is completely different -from NT4 / Win2k type domain logons and has been officially supported for some -time.

    MS Windows XP Home edition is NOT able to join a domain and does not permit -the use of domain logons.

    Implementing a Samba PDC can basically be divided into 3 broad -steps.

    1. Configuring the Samba PDC -

    2. Creating machine trust accounts and joining clients to the domain -

    3. Adding and managing domain user accounts -

    There are other minor details such as user profiles, system -policies, etc... However, these are not necessarily specific -to a Samba PDC as much as they are related to Windows NT networking -concepts.


    6.3. Configuring the Samba Domain Controller

    The first step in creating a working Samba PDC is to -understand the parameters necessary in smb.conf. Here we -attempt to explain the parameters that are covered in - the smb.conf -man page.

    Here is an example smb.conf for acting as a PDC:

    [global]
    -    ; Basic server settings
    -    netbios name = POGO
    -    workgroup = NARNIA
    -
    -    ; we should act as the domain and local master browser
    -    os level = 64
    -    preferred master = yes
    -    domain master = yes
    -    local master = yes
    -    
    -    ; security settings (must user security = user)
    -    security = user
    -    
    -    ; encrypted passwords are a requirement for a PDC
    -    encrypt passwords = yes
    -    
    -    ; support domain logons
    -    domain logons = yes
    -    
    -    ; where to store user profiles?
    -    logon path = \\%N\profiles\%u
    -    
    -    ; where is a user's home directory and where should it be mounted at?
    -    logon drive = H:
    -    logon home = \\homeserver\%u
    -    
    -    ; specify a generic logon script for all users
    -    ; this is a relative **DOS** path to the [netlogon] share
    -    logon script = logon.cmd
    -
    -; necessary share for domain controller
    -[netlogon]
    -    path = /usr/local/samba/lib/netlogon
    -    read only = yes
    -    write list = ntadmin
    -    
    -; share for storing user profiles
    -[profiles]
    -    path = /export/smb/ntprofile
    -    read only = no
    -    create mask = 0600
    -    directory mask = 0700

    There are a couple of points to emphasize in the above configuration.

    • Encrypted passwords must be enabled. For more details on how - to do this, refer to ENCRYPTION.html. -

    • The server must support domain logons and a - [netlogon] share -

    • The server must be the domain master browser in order for Windows - client to locate the server as a DC. Please refer to the various - Network Browsing documentation included with this distribution for - details. -

    Samba 3.0 offers a complete implementation of group mapping -between Windows NT groups and Unix groups (this is really quite -complicated to explain in a short space).


    6.4. Creating Machine Trust Accounts and Joining Clients to the Domain

    A machine trust account is a Samba account that is used to -authenticate a client machine (rather than a user) to the Samba -server. In Windows terminology, this is known as a "Computer -Account."

    The password of a machine trust account acts as the shared secret for -secure communication with the Domain Controller. This is a security -feature to prevent an unauthorized machine with the same NetBIOS name -from joining the domain and gaining access to domain user/group -accounts. Windows NT, 200x, XP Professional clients use machine trust -accounts, but Windows 9x / Me / XP Home clients do not. Hence, a -Windows 9x / Me / XP Home client is never a true member of a domain -because it does not possess a machine trust account, and thus has no -shared secret with the domain controller.

    A Windows PDC stores each machine trust account in the Windows -Registry. A Samba-3 PDC also has to stoe machine trust account information -in a suitable back-end data store. With Samba-3 there can be multiple back-ends -for this including:

    • smbpaswd - the plain ascii file stored used by - earlier versions of Samba. This file configuration option requires - a Unix/Linux system account for EVERY entry (ie: both for user and for - machine accounts). This file will be located in the private - directory (default is /usr/local/samba/lib/private or on linux /etc/samba). -

    • smbpasswd_nua - This file is independant of the - system wide user accounts. The use of this back-end option requires - specification of the "non unix account range" option also. It is called - smbpasswd and will be located in the private directory. -

    • tdbsam - a binary database backend that will be - stored in the private directory in a file called - passwd.tdb. The key benefit of this binary format - file is that it can store binary objects that can not be accomodated - in the traditional plain text smbpasswd file. -

    • tdbsam_nua like the smbpasswd_nua option above, this - file allows the creation of arbitrary user and machine accounts without - requiring that account to be added to the system (/etc/passwd) file. It - too requires the specification of the "non unix account range" option - in the [globals] section of the smb.conf file. -

    • ldapsam - An LDAP based back-end. Permits the - LDAP server to be specified. eg: ldap://localhost or ldap://frodo.murphy.com -

    • ldapsam_nua - LDAP based back-end with no unix - account requirement, like smbpasswd_nua and tdbsam_nua above. -

    A Samba PDC, however, stores each machine trust account in two parts, -as follows: - -

    • A Samba account, stored in the same location as user - LanMan and NT password hashes (currently - smbpasswd). The Samba account - possesses and uses only the NT password hash.

    • A corresponding Unix account, typically stored in - /etc/passwd. (Future releases will alleviate the need to - create /etc/passwd entries.)

    There are two ways to create machine trust accounts:

    • Manual creation. Both the Samba and corresponding - Unix account are created by hand.

    • "On-the-fly" creation. The Samba machine trust - account is automatically created by Samba at the time the client - is joined to the domain. (For security, this is the - recommended method.) The corresponding Unix account may be - created automatically or manually.


    6.4.1. Manual Creation of Machine Trust Accounts

    The first step in manually creating a machine trust account is to -manually create the corresponding Unix account in -/etc/passwd. This can be done using -vipw or other 'add user' command that is normally -used to create new Unix accounts. The following is an example for a -Linux based Samba server:

    root# /usr/sbin/useradd -g 100 -d /dev/null -c "machine -nickname" -s /bin/false machine_name$

    root# passwd -l machine_name$

    On *BSD systems, this can be done using the 'chpass' utility:

    root# chpass -a "machine_name$:*:101:100::0:0:Workstation machine_name:/dev/null:/sbin/nologin"

    The /etc/passwd entry will list the machine name -with a "$" appended, won't have a password, will have a null shell and no -home directory. For example a machine named 'doppy' would have an -/etc/passwd entry like this:

    doppy$:x:505:501:machine_nickname:/dev/null:/bin/false

    Above, machine_nickname can be any -descriptive name for the client, i.e., BasementComputer. -machine_name absolutely must be the NetBIOS -name of the client to be joined to the domain. The "$" must be -appended to the NetBIOS name of the client or Samba will not recognize -this as a machine trust account.

    Now that the corresponding Unix account has been created, the next step is to create -the Samba account for the client containing the well-known initial -machine trust account password. This can be done using the smbpasswd(8) command -as shown here:

    root# smbpasswd -a -m machine_name

    where machine_name is the machine's NetBIOS -name. The RID of the new machine account is generated from the UID of -the corresponding Unix account.

    Join the client to the domain immediately
     

    Manually creating a machine trust account using this method is the - equivalent of creating a machine trust account on a Windows NT PDC using - the "Server Manager". From the time at which the account is created - to the time which the client joins the domain and changes the password, - your domain is vulnerable to an intruder joining your domain using a - a machine with the same NetBIOS name. A PDC inherently trusts - members of the domain and will serve out a large degree of user - information to such clients. You have been warned! -


    6.4.2. "On-the-Fly" Creation of Machine Trust Accounts

    The second (and recommended) way of creating machine trust accounts is -simply to allow the Samba server to create them as needed when the client -is joined to the domain.

    Since each Samba machine trust account requires a corresponding -Unix account, a method for automatically creating the -Unix account is usually supplied; this requires configuration of the -add user script -option in smb.conf. This -method is not required, however; corresponding Unix accounts may also -be created manually.

    Below is an example for a RedHat 6.2 Linux system.

    [global]
    -   # <...remainder of parameters...>
    -   add user script = /usr/sbin/useradd -d /dev/null -g 100 -s /bin/false -M %u 


    6.4.3. Joining the Client to the Domain

    The procedure for joining a client to the domain varies with the -version of Windows.

    • Windows 2000

      When the user elects to join the client to a domain, Windows prompts for - an account and password that is privileged to join the domain. A - Samba administrative account (i.e., a Samba account that has root - privileges on the Samba server) must be entered here; the - operation will fail if an ordinary user account is given. - The password for this account should be - set to a different password than the associated - /etc/passwd entry, for security - reasons.

      The session key of the Samba administrative account acts as an - encryption key for setting the password of the machine trust - account. The machine trust account will be created on-the-fly, or - updated if it already exists.

    • Windows NT

      If the machine trust account was created manually, on the - Identification Changes menu enter the domain name, but do not - check the box "Create a Computer Account in the Domain." In this case, - the existing machine trust account is used to join the machine to - the domain.

      If the machine trust account is to be created - on-the-fly, on the Identification Changes menu enter the domain - name, and check the box "Create a Computer Account in the Domain." In - this case, joining the domain proceeds as above for Windows 2000 - (i.e., you must supply a Samba administrative account when - prompted).


    6.5. Common Problems and Errors

    • I cannot include a '$' in a machine name. -

      A 'machine name' in (typically) /etc/passwd - of the machine name with a '$' appended. FreeBSD (and other BSD - systems?) won't create a user with a '$' in their name. -

      The problem is only in the program used to make the entry, once - made, it works perfectly. So create a user without the '$' and - use vipw to edit the entry, adding the '$'. Or create - the whole entry with vipw if you like, make sure you use a - unique User ID ! -

    • I get told "You already have a connection to the Domain...." - or "Cannot join domain, the credentials supplied conflict with an - existing set.." when creating a machine trust account. -

      This happens if you try to create a machine trust account from the - machine itself and already have a connection (e.g. mapped drive) - to a share (or IPC$) on the Samba PDC. The following command - will remove all network drive connections: -

      C:\WINNT\> net use * /d -

      Further, if the machine is a already a 'member of a workgroup' that - is the same name as the domain you are joining (bad idea) you will - get this message. Change the workgroup name to something else, it - does not matter what, reboot, and try again. -

    • The system can not log you on (C000019B).... -

      I joined the domain successfully but after upgrading - to a newer version of the Samba code I get the message, "The system - can not log you on (C000019B), Please try again or consult your - system administrator" when attempting to logon. -

      This occurs when the domain SID stored in the secrets.tdb database - is changed. The most common cause of a change in domain SID is when - the domain name and/or the server name (netbios name) is changed. - The only way to correct the problem is to restore the original domain - SID or remove the domain client from the domain and rejoin. The domain - SID may be reset using either the smbpasswd or rpcclient utilities. -

    • The machine trust account for this computer either does not - exist or is not accessible. -

      When I try to join the domain I get the message "The machine account - for this computer either does not exist or is not accessible". What's - wrong? -

      This problem is caused by the PDC not having a suitable machine trust account. - If you are using the add user script method to create - accounts then this would indicate that it has not worked. Ensure the domain - admin user system is working. -

      Alternatively if you are creating account entries manually then they - have not been created correctly. Make sure that you have the entry - correct for the machine trust account in smbpasswd file on the Samba PDC. - If you added the account using an editor rather than using the smbpasswd - utility, make sure that the account name is the machine NetBIOS name - with a '$' appended to it ( i.e. computer_name$ ). There must be an entry - in both /etc/passwd and the smbpasswd file. Some people have reported - that inconsistent subnet masks between the Samba server and the NT - client have caused this problem. Make sure that these are consistent - for both client and server. -

    • When I attempt to login to a Samba Domain from a NT4/W2K workstation, - I get a message about my account being disabled. -

      This problem is caused by a PAM related bug in Samba 2.2.0. This bug is - fixed in 2.2.1. Other symptoms could be unaccessible shares on - NT/W2K member servers in the domain or the following error in your smbd.log: - passdb/pampass.c:pam_account(268) PAM: UNKNOWN ERROR for User: %user% -

      At first be ensure to enable the useraccounts with smbpasswd -e - %user%, this is normally done, when you create an account. -

      In order to work around this problem in 2.2.0, configure the - account control flag in - /etc/pam.d/samba file as follows: -

      	account required        pam_permit.so
      -	

      If you want to remain backward compatibility to samba 2.0.x use - pam_permit.so, it's also possible to use - pam_pwdb.so. There are some bugs if you try to - use pam_unix.so, if you need this, be ensure to use - the most recent version of this file. -


    6.6. What other help can I get?

    There are many sources of information available in the form -of mailing lists, RFC's and documentation. The docs that come -with the samba distribution contain very good explanations of -general SMB topics such as browsing.

    • What are some diagnostics tools I can use to debug the domain logon - process and where can I find them? -

      One of the best diagnostic tools for debugging problems is Samba itself. - You can use the -d option for both smbd and nmbd to specify what - 'debug level' at which to run. See the man pages on smbd, nmbd and - smb.conf for more information on debugging options. The debug - level can range from 1 (the default) to 10 (100 for debugging passwords). -

      Another helpful method of debugging is to compile samba using the - gcc -g flag. This will include debug - information in the binaries and allow you to attach gdb to the - running smbd / nmbd process. In order to attach gdb to an smbd - process for an NT workstation, first get the workstation to make the - connection. Pressing ctrl-alt-delete and going down to the domain box - is sufficient (at least, on the first time you join the domain) to - generate a 'LsaEnumTrustedDomains'. Thereafter, the workstation - maintains an open connection, and therefore there will be an smbd - process running (assuming that you haven't set a really short smbd - idle timeout) So, in between pressing ctrl alt delete, and actually - typing in your password, you can gdb attach and continue. -

      Some useful samba commands worth investigating: -

      • testparam | more

      • smbclient -L //{netbios name of server}

      An SMB enabled version of tcpdump is available from - http://www.tcpdup.org/. - Ethereal, another good packet sniffer for Unix and Win32 - hosts, can be downloaded from http://www.ethereal.com. -

      For tracing things on the Microsoft Windows NT, Network Monitor - (aka. netmon) is available on the Microsoft Developer Network CD's, - the Windows NT Server install CD and the SMS CD's. The version of - netmon that ships with SMS allows for dumping packets between any two - computers (i.e. placing the network interface in promiscuous mode). - The version on the NT Server install CD will only allow monitoring - of network traffic directed to the local NT box and broadcasts on the - local subnet. Be aware that Ethereal can read and write netmon - formatted files. -

    • How do I install 'Network Monitor' on an NT Workstation - or a Windows 9x box? -

      Installing netmon on an NT workstation requires a couple - of steps. The following are for installing Netmon V4.00.349, which comes - with Microsoft Windows NT Server 4.0, on Microsoft Windows NT - Workstation 4.0. The process should be similar for other version of - Windows NT / Netmon. You will need both the Microsoft Windows - NT Server 4.0 Install CD and the Workstation 4.0 Install CD. -

      Initially you will need to install 'Network Monitor Tools and Agent' - on the NT Server. To do this -

      • Goto Start - Settings - Control Panel - - Network - Services - Add

      • Select the 'Network Monitor Tools and Agent' and - click on 'OK'.

      • Click 'OK' on the Network Control Panel. -

      • Insert the Windows NT Server 4.0 install CD - when prompted.

      At this point the Netmon files should exist in - %SYSTEMROOT%\System32\netmon\*.*. - Two subdirectories exist as well, parsers\ - which contains the necessary DLL's for parsing the netmon packet - dump, and captures\. -

      In order to install the Netmon tools on an NT Workstation, you will - first need to install the 'Network Monitor Agent' from the Workstation - install CD. -

      • Goto Start - Settings - Control Panel - - Network - Services - Add

      • Select the 'Network Monitor Agent' and click - on 'OK'.

      • Click 'OK' on the Network Control Panel. -

      • Insert the Windows NT Workstation 4.0 install - CD when prompted.

      Now copy the files from the NT Server in %SYSTEMROOT%\System32\netmon\*.* - to %SYSTEMROOT%\System32\netmon\*.* on the Workstation and set - permissions as you deem appropriate for your site. You will need - administrative rights on the NT box to run netmon. -

      To install Netmon on a Windows 9x box install the network monitor agent - from the Windows 9x CD (\admin\nettools\netmon). There is a readme - file located with the netmon driver files on the CD if you need - information on how to do this. Copy the files from a working - Netmon installation. -

    • The following is a list if helpful URLs and other links: -

    • How do I get help from the mailing lists? -

      There are a number of Samba related mailing lists. Go to http://samba.org, click on your nearest mirror - and then click on Support and then click on Samba related mailing lists. -

      For questions relating to Samba TNG go to - http://www.samba-tng.org/ - It has been requested that you don't post questions about Samba-TNG to the - main stream Samba lists.

      If you post a message to one of the lists please observe the following guide lines : -

      • Always remember that the developers are volunteers, they are - not paid and they never guarantee to produce a particular feature at - a particular time. Any time lines are 'best guess' and nothing more. -

      • Always mention what version of samba you are using and what - operating system its running under. You should probably list the - relevant sections of your smb.conf file, at least the options - in [global] that affect PDC support.

      • In addition to the version, if you obtained Samba via - CVS mention the date when you last checked it out.

      • Try and make your question clear and brief, lots of long, - convoluted questions get deleted before they are completely read ! - Don't post html encoded messages (if you can select colour or font - size its html).

      • If you run one of those nifty 'I'm on holidays' things when - you are away, make sure its configured to not answer mailing lists. -

      • Don't cross post. Work out which is the best list to post to - and see what happens, i.e. don't post to both samba-ntdom and samba-technical. - Many people active on the lists subscribe to more - than one list and get annoyed to see the same message two or more times. - Often someone will see a message and thinking it would be better dealt - with on another, will forward it on for you.

      • You might include partial - log files written at a debug level set to as much as 20. - Please don't send the entire log but enough to give the context of the - error messages.

      • (Possibly) If you have a complete netmon trace ( from the opening of - the pipe to the error ) you can send the *.CAP file as well.

      • Please think carefully before attaching a document to an email. - Consider pasting the relevant parts into the body of the message. The samba - mailing lists go to a huge number of people, do they all need a copy of your - smb.conf in their attach directory?

    • How do I get off the mailing lists? -

      To have your name removed from a samba mailing list, go to the - same place you went to to get on it. Go to http://lists.samba.org, - click on your nearest mirror and then click on Support and - then click on Samba related mailing lists. Or perhaps see - here -

      Please don't post messages to the list asking to be removed, you will just - be referred to the above address (unless that process failed in some way...) -


    6.7. Domain Control for Windows 9x/ME

    A domain and a workgroup are exactly the same thing in terms of network -browsing. The difference is that a distributable authentication -database is associated with a domain, for secure login access to a -network. Also, different access rights can be granted to users if they -successfully authenticate against a domain logon server. Samba-3 does this -now in the same way that MS Windows NT/2K.

    The SMB client logging on to a domain has an expectation that every other -server in the domain should accept the same authentication information. -Network browsing functionality of domains and workgroups is identical and -is explained in this documentation under the browsing discussions. -It should be noted, that browsing is totally orthogonal to logon support.

    Issues related to the single-logon network model are discussed in this -section. Samba supports domain logons, network logon scripts, and user -profiles for MS Windows for workgroups and MS Windows 9X/ME clients -which are the focus of this section.

    When an SMB client in a domain wishes to logon it broadcast requests for a -logon server. The first one to reply gets the job, and validates its -password using whatever mechanism the Samba administrator has installed. -It is possible (but very stupid) to create a domain where the user -database is not shared between servers, i.e. they are effectively workgroup -servers advertising themselves as participating in a domain. This -demonstrates how authentication is quite different from but closely -involved with domains.

    Using these features you can make your clients verify their logon via -the Samba server; make clients run a batch file when they logon to -the network and download their preferences, desktop and start menu.

    Before launching into the configuration instructions, it is -worthwhile lookingat how a Windows 9x/ME client performs a logon:

    1. The client broadcasts (to the IP broadcast address of the subnet it is in) - a NetLogon request. This is sent to the NetBIOS name DOMAIN<1c> at the - NetBIOS layer. The client chooses the first response it receives, which - contains the NetBIOS name of the logon server to use in the format of - \\SERVER. -

    2. The client then connects to that server, logs on (does an SMBsessetupX) and - then connects to the IPC$ share (using an SMBtconX). -

    3. The client then does a NetWkstaUserLogon request, which retrieves the name - of the user's logon script. -

    4. The client then connects to the NetLogon share and searches for this - and if it is found and can be read, is retrieved and executed by the client. - After this, the client disconnects from the NetLogon share. -

    5. The client then sends a NetUserGetInfo request to the server, to retrieve - the user's home share, which is used to search for profiles. Since the - response to the NetUserGetInfo request does not contain much more - the user's home share, profiles for Win9X clients MUST reside in the user - home directory. -

    6. The client then connects to the user's home share and searches for the - user's profile. As it turns out, you can specify the user's home share as - a sharename and path. For example, \\server\fred\.profile. - If the profiles are found, they are implemented. -

    7. The client then disconnects from the user's home share, and reconnects to - the NetLogon share and looks for CONFIG.POL, the policies file. If this is - found, it is read and implemented. -


    6.7.1. Configuration Instructions: Network Logons

    The main difference between a PDC and a Windows 9x logon -server configuration is that

    • Password encryption is not required for a Windows 9x logon server.

    • Windows 9x/ME clients do not possess machine trust accounts.

    Therefore, a Samba PDC will also act as a Windows 9x logon -server.

    security mode and master browsers
     

    There are a few comments to make in order to tie up some -loose ends. There has been much debate over the issue of whether -or not it is ok to configure Samba as a Domain Controller in security -modes other than USER. The only security mode -which will not work due to technical reasons is SHARE -mode security. DOMAIN and SERVER -mode security is really just a variation on SMB user level security.

    Actually, this issue is also closely tied to the debate on whether -or not Samba must be the domain master browser for its workgroup -when operating as a DC. While it may technically be possible -to configure a server as such (after all, browsing and domain logons -are two distinctly different functions), it is not a good idea to -so. You should remember that the DC must register the DOMAIN#1b NetBIOS -name. This is the name used by Windows clients to locate the DC. -Windows clients do not distinguish between the DC and the DMB. -For this reason, it is very wise to configure the Samba DC as the DMB.

    Now back to the issue of configuring a Samba DC to use a mode other -than "security = user". If a Samba host is configured to use -another SMB server or DC in order to validate user connection -requests, then it is a fact that some other machine on the network -(the "password server") knows more about user than the Samba host. -99% of the time, this other host is a domain controller. Now -in order to operate in domain mode security, the "workgroup" parameter -must be set to the name of the Windows NT domain (which already -has a domain controller, right?)

    Therefore configuring a Samba box as a DC for a domain that -already by definition has a PDC is asking for trouble. -Therefore, you should always configure the Samba DC to be the DMB -for its domain.


    Chapter 7. Samba Backup Domain Controller to Samba Domain Control

    7.1. Prerequisite Reading

    Before you continue reading in this chapter, please make sure -that you are comfortable with configuring a Samba PDC -as described in the Samba-PDC-HOWTO.


    7.2. Background

    What is a Domain Controller? It is a machine that is able to answer -logon requests from workstations in a Windows NT Domain. Whenever a -user logs into a Windows NT Workstation, the workstation connects to a -Domain Controller and asks him whether the username and password the -user typed in is correct. The Domain Controller replies with a lot of -information about the user, for example the place where the users -profile is stored, the users full name of the user. All this -information is stored in the NT user database, the so-called SAM.

    There are two kinds of Domain Controller in a NT 4 compatible Domain: -A Primary Domain Controller (PDC) and one or more Backup Domain -Controllers (BDC). The PDC contains the master copy of the -SAM. Whenever the SAM has to change, for example when a user changes -his password, this change has to be done on the PDC. A Backup Domain -Controller is a machine that maintains a read-only copy of the -SAM. This way it is able to reply to logon requests and authenticate -users in case the PDC is not available. During this time no changes to -the SAM are possible. Whenever changes to the SAM are done on the PDC, -all BDC receive the changes from the PDC.

    Since version 2.2 Samba officially supports domain logons for all -current Windows Clients, including Windows 2000 and XP. This text -assumes the domain to be named SAMBA. To be able to act as a PDC, some -parameters in the [global]-section of the smb.conf have to be set:

    workgroup = SAMBA
    -domain master = yes
    -domain logons = yes

    Several other things like a [homes] and a [netlogon] share also may be -set along with settings for the profile path, the users home drive and -others. This will not be covered in this document.


    7.3. What qualifies a Domain Controller on the network?

    Every machine that is a Domain Controller for the domain SAMBA has to -register the NetBIOS group name SAMBA#1c with the WINS server and/or -by broadcast on the local network. The PDC also registers the unique -NetBIOS name SAMBA#1b with the WINS server. The name type #1b is -normally reserved for the domain master browser, a role that has -nothing to do with anything related to authentication, but the -Microsoft Domain implementation requires the domain master browser to -be on the same machine as the PDC.


    7.3.1. How does a Workstation find its domain controller?

    A NT workstation in the domain SAMBA that wants a local user to be -authenticated has to find the domain controller for SAMBA. It does -this by doing a NetBIOS name query for the group name SAMBA#1c. It -assumes that each of the machines it gets back from the queries is a -domain controller and can answer logon requests. To not open security -holes both the workstation and the selected (TODO: How is the DC -chosen) domain controller authenticate each other. After that the -workstation sends the user's credentials (his name and password) to -the domain controller, asking for approval.


    7.3.2. When is the PDC needed?

    Whenever a user wants to change his password, this has to be done on -the PDC. To find the PDC, the workstation does a NetBIOS name query -for SAMBA#1b, assuming this machine maintains the master copy of the -SAM. The workstation contacts the PDC, both mutually authenticate and -the password change is done.


    7.4. Can Samba be a Backup Domain Controller to an NT PDC?

    With version 2.2, no. The native NT SAM replication protocols have -not yet been fully implemented. The Samba Team is working on -understanding and implementing the protocols, but this work has not -been finished for version 2.2.

    With version 3.0, the work on both the replication protocols and a -suitable storage mechanism has progressed, and some form of NT4 BDC -support is expected soon.

    Can I get the benefits of a BDC with Samba? Yes. The main reason for -implementing a BDC is availability. If the PDC is a Samba machine, -a second Samba machine can be set up to -service logon requests whenever the PDC is down.


    7.5. How do I set up a Samba BDC?

    Several things have to be done:

    • The domain SID has to be the same on the PDC and the BDC. This used to -be stored in the file private/MACHINE.SID. This file is not created -anymore since Samba 2.2.5 or even earlier. Nowadays the domain SID is -stored in the file private/secrets.tdb. Simply copying the secrets.tdb -from the PDC to the BDC does not work, as the BDC would -generate a new SID for itself and override the domain SID with this -new BDC SID.

      To retrieve the domain SID from the PDC or an existing BDC and store it in the -secrets.tdb, execute 'net rpc getsid' on the BDC.

    • The Unix user database has to be synchronized from the PDC to the -BDC. This means that both the /etc/passwd and /etc/group have to be -replicated from the PDC to the BDC. This can be done manually -whenever changes are made, or the PDC is set up as a NIS master -server and the BDC as a NIS slave server. To set up the BDC as a -mere NIS client would not be enough, as the BDC would not be able to -access its user database in case of a PDC failure.

    • The Samba password database in the file private/smbpasswd has to be -replicated from the PDC to the BDC. This is a bit tricky, see the -next section.

    • Any netlogon share has to be replicated from the PDC to the -BDC. This can be done manually whenever login scripts are changed, -or it can be done automatically together with the smbpasswd -synchronization.

    Finally, the BDC has to be found by the workstations. This can be done -by setting

    workgroup = samba
    -domain master = no
    -domain logons = yes

    in the [global]-section of the smb.conf of the BDC. This makes the BDC -only register the name SAMBA#1c with the WINS server. This is no -problem as the name SAMBA#1c is a NetBIOS group name that is meant to -be registered by more than one machine. The parameter 'domain master = -no' forces the BDC not to register SAMBA#1b which as a unique NetBIOS -name is reserved for the Primary Domain Controller.


    7.5.1. How do I replicate the smbpasswd file?

    Replication of the smbpasswd file is sensitive. It has to be done -whenever changes to the SAM are made. Every user's password change is -done in the smbpasswd file and has to be replicated to the BDC. So -replicating the smbpasswd file very often is necessary.

    As the smbpasswd file contains plain text password equivalents, it -must not be sent unencrypted over the wire. The best way to set up -smbpasswd replication from the PDC to the BDC is to use the utility -rsync. rsync can use ssh as a transport. ssh itself can be set up to -accept *only* rsync transfer without requiring the user to type a -password.


    7.5.2. Can I do this all with LDAP?

    The simple answer is YES. Samba's pdb_ldap code supports -binding to a replica LDAP server, and will also follow referrals and -rebind to the master if it ever needs to make a modification to the -database. (Normally BDCs are read only, so this will not occur -often).


    Chapter 8. Samba as a ADS domain member

    This is a rough guide to setting up Samba 3.0 with kerberos authentication against a -Windows2000 KDC.


    8.1. Setup your smb.conf

    You must use at least the following 3 options in smb.conf:

      realm = YOUR.KERBEROS.REALM
    -  security = ADS
    -  encrypt passwords = yes

    In case samba can't figure out your ads server using your realm name, use the -ads server option in smb.conf: -

      ads server = your.kerberos.server

    You do *not* need a smbpasswd file, and older clients will - be authenticated as if "security = domain", although it won't do any harm - and allows you to have local users not in the domain. - I expect that the above required options will change soon when we get better - active directory integration.


    8.2. Setup your /etc/krb5.conf

    The minimal configuration for krb5.conf is:

    [realms]
    -    YOUR.KERBEROS.REALM = {
    -	kdc = your.kerberos.server
    -    }

    Test your config by doing a "kinit USERNAME@REALM" and making sure that - your password is accepted by the Win2000 KDC.

    NOTE: The realm must be uppercase.

    You also must ensure that you can do a reverse DNS lookup on the IP -address of your KDC. Also, the name that this reverse lookup maps to -must either be the netbios name of the KDC (ie. the hostname with no -domain attached) or it can alternatively be the netbios name -followed by the realm.

    The easiest way to ensure you get this right is to add a /etc/hosts -entry mapping the IP address of your KDC to its netbios name. If you -don't get this right then you will get a "local error" when you try -to join the realm.

    If all you want is kerberos support in smbclient then you can skip -straight to step 5 now. Step 3 is only needed if you want kerberos -support for smbd and winbindd.


    8.3. Create the computer account

    As a user that has write permission on the Samba private directory -(usually root) run: -net ads join


    8.3.1. Possible errors

    "ADS support not compiled in"

    Samba must be reconfigured (remove config.cache) and recompiled (make clean all install) after the kerberos libs and headers are installed.


    8.4. Test your server setup

    On a Windows 2000 client try net use * \\server\share. You should -be logged in with kerberos without needing to know a password. If -this fails then run klist tickets. Did you get a ticket for the -server? Does it have an encoding type of DES-CBC-MD5 ?


    8.5. Testing with smbclient

    On your Samba server try to login to a Win2000 server or your Samba -server using smbclient and kerberos. Use smbclient as usual, but -specify the -k option to choose kerberos authentication.


    8.6. Notes

    You must change administrator password at least once after DC -install, to create the right encoding types

    w2k doesn't seem to create the _kerberos._udp and _ldap._tcp in - their defaults DNS setup. Maybe fixed in service packs?


    Chapter 9. Samba as a NT4 or Win2k domain member

    9.1. Joining an NT Domain with Samba 3.0

    Assume you have a Samba 3.0 server with a NetBIOS name of - SERV1 and are joining an or Win2k NT domain called - DOM, which has a PDC with a NetBIOS name - of DOMPDC and two backup domain controllers - with NetBIOS names DOMBDC1 and DOMBDC2 - .

    Firstly, you must edit your smb.conf(5) - file to tell Samba it should now use domain security.

    Change (or add) your security = line in the [global] section - of your smb.conf to read:

    security = domain

    Next change the workgroup = line in the [global] section to read:

    workgroup = DOM

    as this is the name of the domain we are joining.

    You must also have the parameter encrypt passwords set to yes - in order for your users to authenticate to the NT PDC.

    Finally, add (or modify) a password server = line in the [global] - section to read:

    password server = DOMPDC DOMBDC1 DOMBDC2

    These are the primary and backup domain controllers Samba - will attempt to contact in order to authenticate users. Samba will - try to contact each of these servers in order, so you may want to - rearrange this list in order to spread out the authentication load - among domain controllers.

    Alternatively, if you want smbd to automatically determine - the list of Domain controllers to use for authentication, you may - set this line to be :

    password server = *

    This method, allows Samba to use exactly the same - mechanism that NT does. This - method either broadcasts or uses a WINS database in order to - find domain controllers to authenticate against.

    In order to actually join the domain, you must run this - command:

    root# net rpc join -S DOMPDC - -UAdministrator%password

    as we are joining the domain DOM and the PDC for that domain - (the only machine that has write access to the domain SAM database) - is DOMPDC. The Administrator%password is - the login name and password for an account which has the necessary - privilege to add machines to the domain. If this is successful - you will see the message:

    Joined domain DOM. - or Joined 'SERV1' to realm 'MYREALM' -

    in your terminal window. See the net(8) man page for more details.

    This process joins the server to thedomain - without having to create the machine trust account on the PDC - beforehand.

    This command goes through the machine account password - change protocol, then writes the new (random) machine account - password for this Samba server into a file in the same directory - in which an smbpasswd file would be stored - normally :

    /usr/local/samba/private/secrets.tdb

    This file is created and owned by root and is not - readable by any other user. It is the key to the domain-level - security for your system, and should be treated as carefully - as a shadow password file.

    Finally, restart your Samba daemons and get ready for - clients to begin using domain security!


    9.2. Why is this better than security = server?

    Currently, domain security in Samba doesn't free you from - having to create local Unix users to represent the users attaching - to your server. This means that if domain user DOM\fred - attaches to your domain security Samba server, there needs - to be a local Unix user fred to represent that user in the Unix - filesystem. This is very similar to the older Samba security mode - security = server, - where Samba would pass through the authentication request to a Windows - NT server in the same way as a Windows 95 or Windows 98 server would. -

    Please refer to the Winbind - paper for information on a system to automatically - assign UNIX uids and gids to Windows NT Domain users and groups. - This code is available in development branches only at the moment, - but will be moved to release branches soon.

    The advantage to domain-level security is that the - authentication in domain-level security is passed down the authenticated - RPC channel in exactly the same way that an NT server would do it. This - means Samba servers now participate in domain trust relationships in - exactly the same way NT servers do (i.e., you can add Samba servers into - a resource domain and have the authentication passed on from a resource - domain PDC to an account domain PDC.

    In addition, with security = server every Samba - daemon on a server has to keep a connection open to the - authenticating server for as long as that daemon lasts. This can drain - the connection resources on a Microsoft NT server and cause it to run - out of available connections. With security = domain, - however, the Samba daemons connect to the PDC/BDC only for as long - as is necessary to authenticate the user, and then drop the connection, - thus conserving PDC connection resources.

    And finally, acting in the same manner as an NT server - authenticating to a PDC means that as part of the authentication - reply, the Samba server gets the user identification information such - as the user SID, the list of NT groups the user belongs to, etc.

    Much of the text of this document - was first published in the Web magazine - LinuxWorld as the article Doing - the NIS/NT Samba.

    III. Advanced Configuration

    Introduction

    Samba has several features that you might want or might not want to use. The chapters in this -part each cover one specific feature.

    Table of Contents
    10. Advanced Network Manangement Information
    10.1. Remote Server Administration
    11. UNIX Permission Bits and Windows NT Access Control Lists
    11.1. Viewing and changing UNIX permissions using the NT - security dialogs
    11.2. How to view file security on a Samba share
    11.3. Viewing file ownership
    11.4. Viewing file or directory permissions
    11.4.1. File Permissions
    11.4.2. Directory Permissions
    11.5. Modifying file or directory permissions
    11.6. Interaction with the standard Samba create mask - parameters
    11.7. Interaction with the standard Samba file attribute - mapping
    12. Group mapping HOWTO
    13. Configuring PAM for distributed but centrally -managed authentication
    13.1. Samba and PAM
    13.2. Distributed Authentication
    13.3. PAM Configuration in smb.conf
    14. Printing Support
    14.1. Introduction
    14.2. Configuration
    14.2.1. Creating [print$]
    14.2.2. Setting Drivers for Existing Printers
    14.2.3. Support a large number of printers
    14.2.4. Adding New Printers via the Windows NT APW
    14.2.5. Samba and Printer Ports
    14.3. The Imprints Toolset
    14.3.1. What is Imprints?
    14.3.2. Creating Printer Driver Packages
    14.3.3. The Imprints server
    14.3.4. The Installation Client
    14.4. Diagnosis
    14.4.1. Introduction
    14.4.2. Debugging printer problems
    14.4.3. What printers do I have?
    14.4.4. Setting up printcap and print servers
    14.4.5. Job sent, no output
    14.4.6. Job sent, strange output
    14.4.7. Raw PostScript printed
    14.4.8. Advanced Printing
    14.4.9. Real debugging
    15. CUPS Printing Support
    15.1. Introduction
    15.2. CUPS - RAW Print Through Mode
    15.3. The CUPS Filter Chains
    15.4. CUPS Print Drivers and Devices
    15.4.1. Further printing steps
    15.5. Limiting the number of pages users can print
    15.6. Advanced Postscript Printing from MS Windows
    15.7. Auto-Deletion of CUPS spool files
    16. Unified Logons between Windows NT and UNIX using Winbind
    16.1. Abstract
    16.2. Introduction
    16.3. What Winbind Provides
    16.3.1. Target Uses
    16.4. How Winbind Works
    16.4.1. Microsoft Remote Procedure Calls
    16.4.2. Microsoft Active Directory Services
    16.4.3. Name Service Switch
    16.4.4. Pluggable Authentication Modules
    16.4.5. User and Group ID Allocation
    16.4.6. Result Caching
    16.5. Installation and Configuration
    16.5.1. Introduction
    16.5.2. Requirements
    16.5.3. Testing Things Out
    16.6. Limitations
    16.7. Conclusion
    17. Policy Management - Hows and Whys
    17.1. System Policies
    17.1.1. Creating and Managing Windows 9x/Me Policies
    17.1.2. Creating and Managing Windows NT4 Style Policy Files
    17.1.3. Creating and Managing MS Windows 200x Policies
    18. Profile Management
    18.1. Roaming Profiles
    18.1.1. Windows NT Configuration
    18.1.2. Windows 9X Configuration
    18.1.3. Win9X and WinNT Configuration
    18.1.4. Windows 9X Profile Setup
    18.1.5. Windows NT Workstation 4.0
    18.1.6. Windows NT/200x Server
    18.1.7. Sharing Profiles between W9x/Me and NT4/200x/XP workstations
    18.1.8. Windows NT 4
    18.1.9. Windows 2000/XP
    19. Integrating MS Windows networks with Samba
    19.1. Name Resolution in a pure Unix/Linux world
    19.1.1. /etc/hosts
    19.1.2. /etc/resolv.conf
    19.1.3. /etc/host.conf
    19.1.4. /etc/nsswitch.conf
    19.2. Name resolution as used within MS Windows networking
    19.2.1. The NetBIOS Name Cache
    19.2.2. The LMHOSTS file
    19.2.3. HOSTS file
    19.2.4. DNS Lookup
    19.2.5. WINS Lookup
    20. Improved browsing in samba
    20.1. Overview of browsing
    20.2. Browsing support in samba
    20.3. Problem resolution
    20.4. Browsing across subnets
    20.4.1. How does cross subnet browsing work ?
    20.5. Setting up a WINS server
    20.6. Setting up Browsing in a WORKGROUP
    20.7. Setting up Browsing in a DOMAIN
    20.8. Forcing samba to be the master
    20.9. Making samba the domain master
    20.10. Note about broadcast addresses
    20.11. Multiple interfaces
    21. Hosting a Microsoft Distributed File System tree on Samba
    21.1. Instructions
    21.1.1. Notes
    22. Stackable VFS modules
    22.1. Introduction and configuration
    22.2. Included modules
    22.2.1. audit
    22.2.2. recycle
    22.2.3. netatalk
    22.3. VFS modules available elsewhere
    22.3.1. DatabaseFS
    22.3.2. vscan
    23. Securing Samba
    23.1. Introduction
    23.2. Using host based protection
    23.3. Using interface protection
    23.4. Using a firewall
    23.5. Using a IPC$ share deny
    23.6. Upgrading Samba
    24. Unicode/Charsets
    24.1. What are charsets and unicode?
    24.2. Samba and charsets

    Chapter 10. Advanced Network Manangement Information

    10.1. Remote Server Administration

    How do I get 'User Manager' and 'Server Manager'

    Since I don't need to buy an NT Server CD now, how do I get the 'User Manager for Domains', -the 'Server Manager'?

    Microsoft distributes a version of these tools called nexus for installation on Windows 95 -systems. The tools set includes:

    • Server Manager

    • User Manager for Domains

    • Event Viewer

    Click here to download the archived file ftp://ftp.microsoft.com/Softlib/MSLFILES/NEXUS.EXE

    The Windows NT 4.0 version of the 'User Manager for -Domains' and 'Server Manager' are available from Microsoft via ftp -from ftp://ftp.microsoft.com/Softlib/MSLFILES/SRVTOOLS.EXE


    Chapter 11. UNIX Permission Bits and Windows NT Access Control Lists

    11.1. Viewing and changing UNIX permissions using the NT - security dialogs

    Windows NT clients can use their native security settings - dialog box to view and modify the underlying UNIX permissions.

    Note that this ability is careful not to compromise - the security of the UNIX host Samba is running on, and - still obeys all the file permission rules that a Samba - administrator can set.


    11.2. How to view file security on a Samba share

    From an NT4/2000/XP client, single-click with the right - mouse button on any file or directory in a Samba mounted - drive letter or UNC path. When the menu pops-up, click - on the Properties entry at the bottom of - the menu. This brings up the file properties dialog - box. Click on the tab Security and you - will see three buttons, Permissions, - Auditing, and Ownership. - The Auditing button will cause either - an error message A requested privilege is not held - by the client to appear if the user is not the - NT Administrator, or a dialog which is intended to allow an - Administrator to add auditing requirements to a file if the - user is logged on as the NT Administrator. This dialog is - non-functional with a Samba share at this time, as the only - useful button, the Add button will not currently - allow a list of users to be seen.


    11.3. Viewing file ownership

    Clicking on the "Ownership" button - brings up a dialog box telling you who owns the given file. The - owner name will be of the form :

    "SERVER\user (Long name)"

    Where SERVER is the NetBIOS name of - the Samba server, user is the user name of - the UNIX user who owns the file, and (Long name) - is the descriptive string identifying the user (normally found in the - GECOS field of the UNIX password database). Click on the Close - button to remove this dialog.

    If the parameter nt acl support - is set to false then the file owner will - be shown as the NT user "Everyone".

    The Take Ownership button will not allow - you to change the ownership of this file to yourself (clicking on - it will display a dialog box complaining that the user you are - currently logged onto the NT client cannot be found). The reason - for this is that changing the ownership of a file is a privileged - operation in UNIX, available only to the root - user. As clicking on this button causes NT to attempt to change - the ownership of a file to the current user logged into the NT - client this will not work with Samba at this time.

    There is an NT chown command that will work with Samba - and allow a user with Administrator privilege connected - to a Samba server as root to change the ownership of - files on both a local NTFS filesystem or remote mounted NTFS - or Samba drive. This is available as part of the Seclib - NT security library written by Jeremy Allison of - the Samba Team, available from the main Samba ftp site.


    11.4. Viewing file or directory permissions

    The third button is the "Permissions" - button. Clicking on this brings up a dialog box that shows both - the permissions and the UNIX owner of the file or directory. - The owner is displayed in the form :

    "SERVER\user (Long name)"

    Where SERVER is the NetBIOS name of - the Samba server, user is the user name of - the UNIX user who owns the file, and (Long name) - is the descriptive string identifying the user (normally found in the - GECOS field of the UNIX password database).

    If the parameter nt acl support - is set to false then the file owner will - be shown as the NT user "Everyone" and the - permissions will be shown as NT "Full Control".

    The permissions field is displayed differently for files - and directories, so I'll describe the way file permissions - are displayed first.


    11.4.1. File Permissions

    The standard UNIX user/group/world triple and - the corresponding "read", "write", "execute" permissions - triples are mapped by Samba into a three element NT ACL - with the 'r', 'w', and 'x' bits mapped into the corresponding - NT permissions. The UNIX world permissions are mapped into - the global NT group Everyone, followed - by the list of permissions allowed for UNIX world. The UNIX - owner and group permissions are displayed as an NT - user icon and an NT local - group icon respectively followed by the list - of permissions allowed for the UNIX user and group.

    As many UNIX permission sets don't map into common - NT names such as "read", "change" or "full control" then - usually the permissions will be prefixed by the words "Special Access" in the NT display list.

    But what happens if the file has no permissions allowed - for a particular UNIX user group or world component ? In order - to allow "no permissions" to be seen and modified then Samba - overloads the NT "Take Ownership" ACL attribute - (which has no meaning in UNIX) and reports a component with - no permissions as having the NT "O" bit set. - This was chosen of course to make it look like a zero, meaning - zero permissions. More details on the decision behind this will - be given below.


    11.4.2. Directory Permissions

    Directories on an NT NTFS file system have two - different sets of permissions. The first set of permissions - is the ACL set on the directory itself, this is usually displayed - in the first set of parentheses in the normal "RW" - NT style. This first set of permissions is created by Samba in - exactly the same way as normal file permissions are, described - above, and is displayed in the same way.

    The second set of directory permissions has no real meaning - in the UNIX permissions world and represents the "inherited" permissions that any file created within - this directory would inherit.

    Samba synthesises these inherited permissions for NT by - returning as an NT ACL the UNIX permission mode that a new file - created by Samba on this share would receive.


    11.5. Modifying file or directory permissions

    Modifying file and directory permissions is as simple - as changing the displayed permissions in the dialog box, and - clicking the OK button. However, there are - limitations that a user needs to be aware of, and also interactions - with the standard Samba permission masks and mapping of DOS - attributes that need to also be taken into account.

    If the parameter nt acl support - is set to false then any attempt to set - security permissions will fail with an "Access Denied" - message.

    The first thing to note is that the "Add" - button will not return a list of users in Samba (it will give - an error message of "The remote procedure call failed - and did not execute"). This means that you can only - manipulate the current user/group/world permissions listed in - the dialog box. This actually works quite well as these are the - only permissions that UNIX actually has.

    If a permission triple (either user, group, or world) - is removed from the list of permissions in the NT dialog box, - then when the "OK" button is pressed it will - be applied as "no permissions" on the UNIX side. If you then - view the permissions again the "no permissions" entry will appear - as the NT "O" flag, as described above. This - allows you to add permissions back to a file or directory once - you have removed them from a triple component.

    As UNIX supports only the "r", "w" and "x" bits of - an NT ACL then if other NT security attributes such as "Delete - access" are selected then they will be ignored when applied on - the Samba server.

    When setting permissions on a directory the second - set of permissions (in the second set of parentheses) is - by default applied to all files within that directory. If this - is not what you want you must uncheck the "Replace - permissions on existing files" checkbox in the NT - dialog before clicking "OK".

    If you wish to remove all permissions from a - user/group/world component then you may either highlight the - component and click the "Remove" button, - or set the component to only have the special "Take - Ownership" permission (displayed as "O" - ) highlighted.


    11.6. Interaction with the standard Samba create mask - parameters

    There are four parameters - to control interaction with the standard Samba create mask parameters. - These are :

    security mask

    force security mode

    directory security mask

    force directory security mode

    Once a user clicks "OK" to apply the - permissions Samba maps the given permissions into a user/group/world - r/w/x triple set, and then will check the changed permissions for a - file against the bits set in the - security mask parameter. Any bits that - were changed that are not set to '1' in this parameter are left alone - in the file permissions.

    Essentially, zero bits in the security mask - mask may be treated as a set of bits the user is not - allowed to change, and one bits are those the user is allowed to change. -

    If not set explicitly this parameter is set to the same value as - the create mask - parameter. To allow a user to modify all the - user/group/world permissions on a file, set this parameter - to 0777.

    Next Samba checks the changed permissions for a file against - the bits set in the force security mode parameter. Any bits - that were changed that correspond to bits set to '1' in this parameter - are forced to be set.

    Essentially, bits set in the force security mode - parameter may be treated as a set of bits that, when - modifying security on a file, the user has always set to be 'on'.

    If not set explicitly this parameter is set to the same value - as the force - create mode parameter. - To allow a user to modify all the user/group/world permissions on a file - with no restrictions set this parameter to 000.

    The security mask and force - security mode parameters are applied to the change - request in that order.

    For a directory Samba will perform the same operations as - described above for a file except using the parameter directory security mask instead of security - mask, and force directory security mode - parameter instead of force security mode - .

    The directory security mask parameter - by default is set to the same value as the directory mask - parameter and the force directory security - mode parameter by default is set to the same value as - the force directory mode parameter.

    In this way Samba enforces the permission restrictions that - an administrator can set on a Samba share, whilst still allowing users - to modify the permission bits within that restriction.

    If you want to set up a share that allows users full control - in modifying the permission bits on their files and directories and - doesn't force any particular bits to be set 'on', then set the following - parameters in the smb.conf(5) - file in that share specific section :

    security mask = 0777

    force security mode = 0

    directory security mask = 0777

    force directory security mode = 0


    11.7. Interaction with the standard Samba file attribute - mapping

    Samba maps some of the DOS attribute bits (such as "read - only") into the UNIX permissions of a file. This means there can - be a conflict between the permission bits set via the security - dialog and the permission bits set by the file attribute mapping. -

    One way this can show up is if a file has no UNIX read access - for the owner it will show up as "read only" in the standard - file attributes tabbed dialog. Unfortunately this dialog is - the same one that contains the security info in another tab.

    What this can mean is that if the owner changes the permissions - to allow themselves read access using the security dialog, clicks - "OK" to get back to the standard attributes tab - dialog, and then clicks "OK" on that dialog, then - NT will set the file permissions back to read-only (as that is what - the attributes still say in the dialog). This means that after setting - permissions and clicking "OK" to get back to the - attributes dialog you should always hit "Cancel" - rather than "OK" to ensure that your changes - are not overridden.


    Chapter 12. Group mapping HOWTO

    -Starting with Samba 3.0 alpha 2, a new group mapping function is available. The -current method (likely to change) to manage the groups is a new command called -smbgroupedit.

    The first immediate reason to use the group mapping on a PDC, is that -the domain admin group of smb.conf is -now gone. This parameter was used to give the listed users local admin rights -on their workstations. It was some magic stuff that simply worked but didn't -scale very well for complex setups.

    Let me explain how it works on NT/W2K, to have this magic fade away. -When installing NT/W2K on a computer, the installer program creates some users -and groups. Notably the 'Administrators' group, and gives to that group some -privileges like the ability to change the date and time or to kill any process -(or close too) running on the local machine. The 'Administrator' user is a -member of the 'Administrators' group, and thus 'inherit' the 'Administrators' -group privileges. If a 'joe' user is created and become a member of the -'Administrator' group, 'joe' has exactly the same rights as 'Administrator'.

    When a NT/W2K machine is joined to a domain, during that phase, the "Domain -Administrators' group of the PDC is added to the 'Administrators' group of the -workstation. Every members of the 'Domain Administrators' group 'inherit' the -rights of the 'Administrators' group when logging on the workstation.

    You are now wondering how to make some of your samba PDC users members of the -'Domain Administrators' ? That's really easy.

    1. create a unix group (usually in /etc/group), let's call it domadm

    2. add to this group the users that must be Administrators. For example if you want joe,john and mary, your entry in /etc/group will look like:

      domadm:x:502:joe,john,mary

    3. Map this domadm group to the domain admins group by running the command:

      smbgroupedit -c "Domain Admins" -u domadm

    You're set, joe, john and mary are domain administrators !

    Like the Domain Admins group, you can map any arbitrary Unix group to any NT -group. You can also make any Unix group a domain group. For example, on a domain -member machine (an NT/W2K or a samba server running winbind), you would like to -give access to a certain directory to some users who are member of a group on -your samba PDC. Flag that group as a domain group by running:

    smbgroupedit -a unixgroup -td

    You can list the various groups in the mapping database like this

    smbgroupedit -v


    Chapter 13. Configuring PAM for distributed but centrally -managed authentication

    13.1. Samba and PAM

    A number of Unix systems (eg: Sun Solaris), as well as the -xxxxBSD family and Linux, now utilize the Pluggable Authentication -Modules (PAM) facility to provide all authentication, -authorization and resource control services. Prior to the -introduction of PAM, a decision to use an alternative to -the system password database (/etc/passwd) -would require the provision of alternatives for all programs that provide -security services. Such a choice would involve provision of -alternatives to such programs as: login, -passwd, chown, etc.

    PAM provides a mechanism that disconnects these security programs -from the underlying authentication/authorization infrastructure. -PAM is configured either through one file /etc/pam.conf (Solaris), -or by editing individual files that are located in /etc/pam.d.

    If the PAM authentication module (loadable link library file) is located in the - default location then it is not necessary to specify the path. In the case of - Linux, the default location is /lib/security. If the module - is located other than default then the path may be specified as: - -

    	eg: "auth       required      /other_path/pam_strange_module.so"
    -	
    -

    The following is an example /etc/pam.d/login configuration file. -This example had all options been uncommented is probably not usable -as it stacks many conditions before allowing successful completion -of the login process. Essentially all conditions can be disabled -by commenting them out except the calls to pam_pwdb.so.

    	#%PAM-1.0
    -	# The PAM configuration file for the `login' service
    -	#
    -	auth 		required	pam_securetty.so
    -	auth 		required	pam_nologin.so
    -	# auth 		required	pam_dialup.so
    -	# auth 		optional	pam_mail.so
    -	auth		required	pam_pwdb.so shadow md5
    -	# account    	requisite  	pam_time.so
    -	account		required	pam_pwdb.so
    -	session		required	pam_pwdb.so
    -	# session 	optional	pam_lastlog.so
    -	# password   	required   	pam_cracklib.so retry=3
    -	password	required	pam_pwdb.so shadow md5

    PAM allows use of replacable modules. Those available on a -sample system include:

    	$ /bin/ls /lib/security
    -	pam_access.so    pam_ftp.so          pam_limits.so     
    -	pam_ncp_auth.so  pam_rhosts_auth.so  pam_stress.so     
    -	pam_cracklib.so  pam_group.so        pam_listfile.so   
    -	pam_nologin.so   pam_rootok.so       pam_tally.so      
    -	pam_deny.so      pam_issue.so        pam_mail.so       
    -	pam_permit.so    pam_securetty.so    pam_time.so       
    -	pam_dialup.so    pam_lastlog.so      pam_mkhomedir.so  
    -	pam_pwdb.so      pam_shells.so       pam_unix.so       
    -	pam_env.so       pam_ldap.so         pam_motd.so       
    -	pam_radius.so    pam_smbpass.so      pam_unix_acct.so  
    -	pam_wheel.so     pam_unix_auth.so    pam_unix_passwd.so
    -	pam_userdb.so    pam_warn.so         pam_unix_session.so

    The following example for the login program replaces the use of -the pam_pwdb.so module which uses the system -password database (/etc/passwd, -/etc/shadow, /etc/group) with -the module pam_smbpass.so which uses the Samba -database which contains the Microsoft MD4 encrypted password -hashes. This database is stored in either -/usr/local/samba/private/smbpasswd, -/etc/samba/smbpasswd, or in -/etc/samba.d/smbpasswd, depending on the -Samba implementation for your Unix/Linux system. The -pam_smbpass.so module is provided by -Samba version 2.2.1 or later. It can be compiled by specifying the ---with-pam_smbpass options when running Samba's -configure script. For more information -on the pam_smbpass module, see the documentation -in the source/pam_smbpass directory of the Samba -source distribution.

    	#%PAM-1.0
    -	# The PAM configuration file for the `login' service
    -	#
    -	auth		required	pam_smbpass.so nodelay
    -	account		required	pam_smbpass.so nodelay
    -	session		required	pam_smbpass.so nodelay
    -	password	required	pam_smbpass.so nodelay

    The following is the PAM configuration file for a particular -Linux system. The default condition uses pam_pwdb.so.

    	#%PAM-1.0
    -	# The PAM configuration file for the `samba' service
    -	#
    -	auth       required     /lib/security/pam_pwdb.so nullok nodelay shadow audit
    -	account    required     /lib/security/pam_pwdb.so audit nodelay
    -	session    required     /lib/security/pam_pwdb.so nodelay
    -	password   required     /lib/security/pam_pwdb.so shadow md5

    In the following example the decision has been made to use the -smbpasswd database even for basic samba authentication. Such a -decision could also be made for the passwd program and would -thus allow the smbpasswd passwords to be changed using the passwd -program.

    	#%PAM-1.0
    -	# The PAM configuration file for the `samba' service
    -	#
    -	auth       required     /lib/security/pam_smbpass.so nodelay
    -	account    required     /lib/security/pam_pwdb.so audit nodelay
    -	session    required     /lib/security/pam_pwdb.so nodelay
    -	password   required     /lib/security/pam_smbpass.so nodelay smbconf=/etc/samba.d/smb.conf

    PAM allows stacking of authentication mechanisms. It is -also possible to pass information obtained within one PAM module through -to the next module in the PAM stack. Please refer to the documentation for -your particular system implementation for details regarding the specific -capabilities of PAM in this environment. Some Linux implmentations also -provide the pam_stack.so module that allows all -authentication to be configured in a single central file. The -pam_stack.so method has some very devoted followers -on the basis that it allows for easier administration. As with all issues in -life though, every decision makes trade-offs, so you may want examine the -PAM documentation for further helpful information.


    13.2. Distributed Authentication

    The astute administrator will realize from this that the -combination of pam_smbpass.so, -winbindd, and a distributed -passdb backend, such as ldap, will allow the establishment of a -centrally managed, distributed -user/password database that can also be used by all -PAM (eg: Linux) aware programs and applications. This arrangement -can have particularly potent advantages compared with the -use of Microsoft Active Directory Service (ADS) in so far as -reduction of wide area network authentication traffic.


    13.3. PAM Configuration in smb.conf

    There is an option in smb.conf called obey pam restrictions. -The following is from the on-line help for this option in SWAT;

    When Samba is configured to enable PAM support (i.e. ---with-pam), this parameter will -control whether or not Samba should obey PAM's account -and session management directives. The default behavior -is to use PAM for clear text authentication only and to -ignore any account or session management. Note that Samba always -ignores PAM for authentication in the case of -encrypt passwords = yes. -The reason is that PAM modules cannot support the challenge/response -authentication mechanism needed in the presence of SMB -password encryption.

    Default: obey pam restrictions = no


    Chapter 14. Printing Support

    14.1. Introduction

    Beginning with the 2.2.0 release, Samba supports -the native Windows NT printing mechanisms implemented via -MS-RPC (i.e. the SPOOLSS named pipe). Previous versions of -Samba only supported LanMan printing calls.

    The additional functionality provided by the new -SPOOLSS support includes:

    • Support for downloading printer driver - files to Windows 95/98/NT/2000 clients upon demand. -

    • Uploading of printer drivers via the - Windows NT Add Printer Wizard (APW) or the - Imprints tool set (refer to http://imprints.sourceforge.net). -

    • Support for the native MS-RPC printing - calls such as StartDocPrinter, EnumJobs(), etc... (See - the MSDN documentation at http://msdn.microsoft.com/ - for more information on the Win32 printing API) -

    • Support for NT Access Control Lists (ACL) - on printer objects

    • Improved support for printer queue manipulation - through the use of an internal databases for spooled job - information

    There has been some initial confusion about what all this means -and whether or not it is a requirement for printer drivers to be -installed on a Samba host in order to support printing from Windows -clients. As a side note, Samba does not use these drivers in any way to process -spooled files. They are utilized entirely by the clients.

    The following MS KB article, may be of some help if you are dealing with -Windows 2000 clients: How to Add Printers with No User -Interaction in Windows 2000

    http://support.microsoft.com/support/kb/articles/Q189/1/05.ASP


    14.2. Configuration

    [print$] vs. [printer$]
     

    Previous versions of Samba recommended using a share named [printer$]. -This name was taken from the printer$ service created by Windows 9x -clients when a printer was shared. Windows 9x printer servers always have -a printer$ service which provides read-only access via no -password in order to support printer driver downloads.

    However, the initial implementation allowed for a -parameter named printer driver location -to be used on a per share basis to specify the location of -the driver files associated with that printer. Another -parameter named printer driver provided -a means of defining the printer driver name to be sent to -the client.


    14.2.1. Creating [print$]

    In order to support the uploading of printer driver -files, you must first configure a file share named [print$]. -The name of this share is hard coded in Samba's internals so -the name is very important (print$ is the service used by -Windows NT print servers to provide support for printer driver -download).

    You should modify the server's smb.conf file to add the global -parameters and to create the -following file share (of course, some of the parameter values, -such as 'path' are arbitrary and should be replaced with -appropriate values for your site):

    [global]
    -    ; members of the ntadmin group should be able
    -    ; to add drivers and set printer properties
    -    ; root is implicitly a 'printer admin'
    -    printer admin = @ntadmin
    -
    -[print$]
    -    path = /usr/local/samba/printers
    -    guest ok = yes
    -    browseable = yes
    -    read only = yes
    -    ; since this share is configured as read only, then we need
    -    ; a 'write list'.  Check the file system permissions to make
    -    ; sure this account can copy files to the share.  If this
    -    ; is setup to a non-root account, then it should also exist
    -    ; as a 'printer admin'
    -    write list = @ntadmin,root

    The write list is used to allow administrative -level user accounts to have write access in order to update files -on the share. See the smb.conf(5) -man page for more information on configuring file shares.

    The requirement for guest -ok = yes depends upon how your -site is configured. If users will be guaranteed to have -an account on the Samba host, then this is a non-issue.

    Author's Note
     

    The non-issue is that if all your Windows NT users are guaranteed to be -authenticated by the Samba server (such as a domain member server and the NT -user has already been validated by the Domain Controller in -order to logon to the Windows NT console), then guest access -is not necessary. Of course, in a workgroup environment where -you just want to be able to print without worrying about -silly accounts and security, then configure the share for -guest access. You'll probably want to add map to guest = Bad User in the [global] section as well. Make sure -you understand what this parameter does before using it -though. --jerry

    In order for a Windows NT print server to support -the downloading of driver files by multiple client architectures, -it must create subdirectories within the [print$] service -which correspond to each of the supported client architectures. -Samba follows this model as well.

    Next create the directory tree below the [print$] share -for each architecture you wish to support.

    [print$]-----
    -        |-W32X86           ; "Windows NT x86"
    -        |-WIN40            ; "Windows 95/98"
    -        |-W32ALPHA         ; "Windows NT Alpha_AXP"
    -        |-W32MIPS          ; "Windows NT R4000"
    -        |-W32PPC           ; "Windows NT PowerPC"

    ATTENTION! REQUIRED PERMISSIONS
     

    In order to currently add a new driver to you Samba host, -one of two conditions must hold true:

    • The account used to connect to the Samba host - must have a uid of 0 (i.e. a root account)

    • The account used to connect to the Samba host - must be a member of the printer - admin list.

    Of course, the connected account must still possess access -to add files to the subdirectories beneath [print$]. Remember -that all file shares are set to 'read only' by default.

    Once you have created the required [print$] service and -associated subdirectories, simply log onto the Samba server using -a root (or printer admin) account -from a Windows NT 4.0/2k client. Open "Network Neighbourhood" or -"My Network Places" and browse for the Samba host. Once you have located -the server, navigate to the "Printers..." folder. -You should see an initial listing of printers -that matches the printer shares defined on your Samba host.


    14.2.2. Setting Drivers for Existing Printers

    The initial listing of printers in the Samba host's -Printers folder will have no real printer driver assigned -to them. This defaults to a NULL string to allow the use -of the local Add Printer Wizard on NT/2000 clients. -Attempting to view the printer properties for a printer -which has this default driver assigned will result in -the error message:

    Device settings cannot be displayed. The driver -for the specified printer is not installed, only spooler -properties will be displayed. Do you want to install the -driver now?

    Click "No" in the error dialog and you will be presented with -the printer properties window. The way to assign a driver to a -printer is to either

    • Use the "New Driver..." button to install - a new printer driver, or

    • Select a driver from the popup list of - installed drivers. Initially this list will be empty.

    If you wish to install printer drivers for client -operating systems other than "Windows NT x86", you will need -to use the "Sharing" tab of the printer properties dialog.

    Assuming you have connected with a root account, you -will also be able modify other printer properties such as -ACLs and device settings using this dialog box.

    A few closing comments for this section, it is possible -on a Windows NT print server to have printers -listed in the Printers folder which are not shared. Samba does -not make this distinction. By definition, the only printers of -which Samba is aware are those which are specified as shares in -smb.conf.

    Another interesting side note is that Windows NT clients do -not use the SMB printer share, but rather can print directly -to any printer on another Windows NT host using MS-RPC. This -of course assumes that the printing client has the necessary -privileges on the remote host serving the printer. The default -permissions assigned by Windows NT to a printer gives the "Print" -permissions to the "Everyone" well-known group.


    14.2.3. Support a large number of printers

    One issue that has arisen during the development -phase of Samba 2.2 is the need to support driver downloads for -100's of printers. Using the Windows NT APW is somewhat -awkward to say the list. If more than one printer are using the -same driver, the rpcclient's -setdriver command can be used to set the driver -associated with an installed driver. The following is example -of how this could be accomplished:

     
    -$ rpcclient pogo -U root%secret -c "enumdrivers"
    -Domain=[NARNIA] OS=[Unix] Server=[Samba 2.2.0-alpha3]
    - 
    -[Windows NT x86]
    -Printer Driver Info 1:
    -     Driver Name: [HP LaserJet 4000 Series PS]
    - 
    -Printer Driver Info 1:
    -     Driver Name: [HP LaserJet 2100 Series PS]
    - 
    -Printer Driver Info 1:
    -     Driver Name: [HP LaserJet 4Si/4SiMX PS]
    -				  
    -$ rpcclient pogo -U root%secret -c "enumprinters"
    -Domain=[NARNIA] OS=[Unix] Server=[Samba 2.2.0-alpha3]
    -     flags:[0x800000]
    -     name:[\\POGO\hp-print]
    -     description:[POGO\\POGO\hp-print,NO DRIVER AVAILABLE FOR THIS PRINTER,]
    -     comment:[]
    -				  
    -$ rpcclient pogo -U root%secret \
    ->  -c "setdriver hp-print \"HP LaserJet 4000 Series PS\""
    -Domain=[NARNIA] OS=[Unix] Server=[Samba 2.2.0-alpha3]
    -Successfully set hp-print to driver HP LaserJet 4000 Series PS.


    14.2.4. Adding New Printers via the Windows NT APW

    By default, Samba offers all printer shares defined in smb.conf -in the "Printers..." folder. Also existing in this folder is the Windows NT -Add Printer Wizard icon. The APW will be show only if

    • The connected user is able to successfully - execute an OpenPrinterEx(\\server) with administrative - privileges (i.e. root or printer admin). -

    • show - add printer wizard = yes (the default). -

    In order to be able to use the APW to successfully add a printer to a Samba -server, the add -printer command must have a defined value. The program -hook must successfully add the printer to the system (i.e. -/etc/printcap or appropriate files) and -smb.conf if necessary.

    When using the APW from a client, if the named printer share does -not exist, smbd will execute the add printer -command and reparse to the smb.conf -to attempt to locate the new printer share. If the share is still not defined, -an error of "Access Denied" is returned to the client. Note that the -add printer program is executed under the context -of the connected user, not necessarily a root account.

    There is a complementary delete -printer command for removing entries from the "Printers..." -folder.

    The following is an example add printer command script. It adds the appropriate entries to /etc/printcap.local (change that to what you need) and returns a line of 'Done' which is needed for the whole process to work.

    #!/bin/sh
    -
    -# Script to insert a new printer entry into printcap.local
    -#
    -# $1, printer name, used as the descriptive name
    -# $2, share name, used as the printer name for Linux
    -# $3, port name
    -# $4, driver name
    -# $5, location, used for the device file of the printer
    -# $6, win9x location
    -
    -#
    -# Make sure we use the location that RedHat uses for local printer defs
    -PRINTCAP=/etc/printcap.local
    -DATE=`date +%Y%m%d-%H%M%S`
    -LP=lp
    -RESTART="service lpd restart"
    -
    -# Keep a copy
    -cp $PRINTCAP $PRINTCAP.$DATE
    -# Add the printer to $PRINTCAP
    -echo ""				 			>> $PRINTCAP
    -echo "$2|$1:\\" 					>> $PRINTCAP
    -echo "  :sd=/var/spool/lpd/$2:\\" 			>> $PRINTCAP
    -echo "  :mx=0:ml=0:sh:\\" 				>> $PRINTCAP
    -echo "  :lp=/usr/local/samba/var/print/$5.prn:" 	>> $PRINTCAP
    -
    -touch "/usr/local/samba/var/print/$5.prn" >> /tmp/printadd.$$ 2>&1
    -chown $LP "/usr/local/samba/var/print/$5.prn" >> /tmp/printadd.$$ 2>&1
    -
    -mkdir /var/spool/lpd/$2
    -chmod 700 /var/spool/lpd/$2
    -chown $LP /var/spool/lpd/$2
    -#echo $1 >> "/usr/local/samba/var/print/$5.prn"
    -#echo $2 >> "/usr/local/samba/var/print/$5.prn"
    -#echo $3 >> "/usr/local/samba/var/print/$5.prn"
    -#echo $4 >> "/usr/local/samba/var/print/$5.prn"
    -#echo $5 >> "/usr/local/samba/var/print/$5.prn"
    -#echo $6 >> "/usr/local/samba/var/print/$5.prn"
    -$RESTART >> "/usr/local/samba/var/print/$5.prn"
    -# Not sure if this is needed
    -touch /usr/local/samba/lib/smb.conf
    -#
    -# You need to return a value, but I am not sure what it means.
    -#
    -echo "Done"
    -exit 0

    14.2.5. Samba and Printer Ports

    Windows NT/2000 print servers associate a port with each printer. These normally -take the form of LPT1:, COM1:, FILE:, etc... Samba must also support the -concept of ports associated with a printer. By default, only one printer port, -named "Samba Printer Port", exists on a system. Samba does not really a port in -order to print, rather it is a requirement of Windows clients.

    Note that Samba does not support the concept of "Printer Pooling" internally -either. This is when a logical printer is assigned to multiple ports as -a form of load balancing or fail over.

    If you require that multiple ports be defined for some reason, -smb.conf possesses a enumports -command which can be used to define an external program -that generates a listing of ports on a system.


    14.3. The Imprints Toolset

    The Imprints tool set provides a UNIX equivalent of the - Windows NT Add Printer Wizard. For complete information, please - refer to the Imprints web site at http://imprints.sourceforge.net/ as well as the documentation - included with the imprints source distribution. This section will - only provide a brief introduction to the features of Imprints.


    14.3.1. What is Imprints?

    Imprints is a collection of tools for supporting the goals - of

    • Providing a central repository information - regarding Windows NT and 95/98 printer driver packages

    • Providing the tools necessary for creating - the Imprints printer driver packages.

    • Providing an installation client which - will obtain and install printer drivers on remote Samba - and Windows NT 4 print servers.


    14.3.2. Creating Printer Driver Packages

    The process of creating printer driver packages is beyond - the scope of this document (refer to Imprints.txt also included - with the Samba distribution for more information). In short, - an Imprints driver package is a gzipped tarball containing the - driver files, related INF files, and a control file needed by the - installation client.


    14.3.3. The Imprints server

    The Imprints server is really a database server that - may be queried via standard HTTP mechanisms. Each printer - entry in the database has an associated URL for the actual - downloading of the package. Each package is digitally signed - via GnuPG which can be used to verify that package downloaded - is actually the one referred in the Imprints database. It is - not recommended that this security check - be disabled.


    14.3.4. The Installation Client

    More information regarding the Imprints installation client - is available in the Imprints-Client-HOWTO.ps - file included with the imprints source package.

    The Imprints installation client comes in two forms.

    • a set of command line Perl scripts

    • a GTK+ based graphical interface to - the command line perl scripts

    The installation client (in both forms) provides a means - of querying the Imprints database server for a matching - list of known printer model names as well as a means to - download and install the drivers on remote Samba and Windows - NT print servers.

    The basic installation process is in four steps and - perl code is wrapped around smbclient - and rpcclient.

    	
    -foreach (supported architecture for a given driver)
    -{
    -     1.  rpcclient: Get the appropriate upload directory 
    -         on the remote server
    -     2.  smbclient: Upload the driver files
    -     3.  rpcclient: Issues an AddPrinterDriver() MS-RPC
    -}
    -	
    -4.  rpcclient: Issue an AddPrinterEx() MS-RPC to actually
    -    create the printer

    One of the problems encountered when implementing - the Imprints tool set was the name space issues between - various supported client architectures. For example, Windows - NT includes a driver named "Apple LaserWriter II NTX v51.8" - and Windows 95 calls its version of this driver "Apple - LaserWriter II NTX"

    The problem is how to know what client drivers have - been uploaded for a printer. As astute reader will remember - that the Windows NT Printer Properties dialog only includes - space for one printer driver name. A quick look in the - Windows NT 4.0 system registry at

    HKLM\System\CurrentControlSet\Control\Print\Environment -

    will reveal that Windows NT always uses the NT driver - name. This is ok as Windows NT always requires that at least - the Windows NT version of the printer driver is present. - However, Samba does not have the requirement internally. - Therefore, how can you use the NT driver name if is has not - already been installed?

    The way of sidestepping this limitation is to require - that all Imprints printer driver packages include both the Intel - Windows NT and 95/98 printer drivers and that NT driver is - installed first.


    14.4. Diagnosis

    14.4.1. Introduction

    This is a short description of how to debug printing problems with -Samba. This describes how to debug problems with printing from a SMB -client to a Samba server, not the other way around. For the reverse -see the examples/printing directory.

    Ok, so you want to print to a Samba server from your PC. The first -thing you need to understand is that Samba does not actually do any -printing itself, it just acts as a middleman between your PC client -and your Unix printing subsystem. Samba receives the file from the PC -then passes the file to a external "print command". What print command -you use is up to you.

    The whole things is controlled using options in smb.conf. The most -relevant options (which you should look up in the smb.conf man page) -are:

          [global]
    -        print command     - send a file to a spooler
    -        lpq command       - get spool queue status
    -        lprm command      - remove a job
    -      [printers]
    -        path = /var/spool/lpd/samba

    The following are nice to know about:

            queuepause command   - stop a printer or print queue
    -        queueresume command  - start a printer or print queue

    Example:

            print command = /usr/bin/lpr -r -P%p %s
    -        lpq command   = /usr/bin/lpq    -P%p %s
    -        lprm command  = /usr/bin/lprm   -P%p %j
    -        queuepause command = /usr/sbin/lpc -P%p stop
    -        queuepause command = /usr/sbin/lpc -P%p start

    Samba should set reasonable defaults for these depending on your -system type, but it isn't clairvoyant. It is not uncommon that you -have to tweak these for local conditions. The commands should -always have fully specified pathnames, as the smdb may not have -the correct PATH values.

    When you send a job to Samba to be printed, it will make a temporary -copy of it in the directory specified in the [printers] section. -and it should be periodically cleaned out. The lpr -r option -requests that the temporary copy be removed after printing; If -printing fails then you might find leftover files in this directory, -and it should be periodically cleaned out. Samba used the lpq -command to determine the "job number" assigned to your print job -by the spooler.

    The %>letter< are "macros" that get dynamically replaced with appropriate -values when they are used. The %s gets replaced with the name of the spool -file that Samba creates and the %p gets replaced with the name of the -printer. The %j gets replaced with the "job number" which comes from -the lpq output.


    14.4.2. Debugging printer problems

    One way to debug printing problems is to start by replacing these -command with shell scripts that record the arguments and the contents -of the print file. A simple example of this kind of things might -be:

    	print command = /tmp/saveprint %p %s
    -
    -    #!/bin/saveprint
    -    # we make sure that we are the right user
    -    /usr/bin/id -p >/tmp/tmp.print
    -    # we run the command and save the error messages
    -    # replace the command with the one appropriate for your system
    -    /usr/bin/lpr -r -P$1 $2 2>>&/tmp/tmp.print

    Then you print a file and try removing it. You may find that the -print queue needs to be stopped in order to see the queue status -and remove the job:

    
h4: {42} % echo hi >/tmp/hi
    -h4: {43} % smbclient //localhost/lw4
    -added interface ip=10.0.0.4 bcast=10.0.0.255 nmask=255.255.255.0
    -Password: 
    -Domain=[ASTART] OS=[Unix] Server=[Samba 2.0.7]
    -smb: \> print /tmp/hi
    -putting file /tmp/hi as hi-17534 (0.0 kb/s) (average 0.0 kb/s)
    -smb: \> queue
    -1049     3            hi-17534
    -smb: \> cancel 1049
    -Error cancelling job 1049 : code 0
    -smb: \> cancel 1049
    -Job 1049 cancelled
    -smb: \> queue
    -smb: \> exit

    The 'code 0' indicates that the job was removed. The comment -by the smbclient is a bit misleading on this. -You can observe the command output and then and look at the -/tmp/tmp.print file to see what the results are. You can quickly -find out if the problem is with your printing system. Often people -have problems with their /etc/printcap file or permissions on -various print queues.


    14.4.3. What printers do I have?

    You can use the 'testprns' program to check to see if the printer -name you are using is recognized by Samba. For example, you can -use:

        testprns printer /etc/printcap

    Samba can get its printcap information from a file or from a program. -You can try the following to see the format of the extracted -information:

        testprns -a printer /etc/printcap
    -
    -    testprns -a printer '|/bin/cat printcap'


    14.4.4. Setting up printcap and print servers

    You may need to set up some printcaps for your Samba system to use. -It is strongly recommended that you use the facilities provided by -the print spooler to set up queues and printcap information.

    Samba requires either a printcap or program to deliver printcap -information. This printcap information has the format:

      name|alias1|alias2...:option=value:...

    For almost all printing systems, the printer 'name' must be composed -only of alphanumeric or underscore '_' characters. Some systems also -allow hyphens ('-') as well. An alias is an alternative name for the -printer, and an alias with a space in it is used as a 'comment' -about the printer. The printcap format optionally uses a \ at the end of lines -to extend the printcap to multiple lines.

    Here are some examples of printcap files:

    1. pr just printer name

    2. pr|alias printer name and alias

    3. pr|My Printer printer name, alias used as comment

    4. pr:sh:\ Same as pr:sh:cm= testing - :cm= \ - testing

    5. pr:sh Same as pr:sh:cm= testing - :cm= testing

    Samba reads the printcap information when first started. If you make -changes in the printcap information, then you must do the following:

    1. make sure that the print spooler is aware of these changes. -The LPRng system uses the 'lpc reread' command to do this.

    2. make sure that the spool queues, etc., exist and have the -correct permissions. The LPRng system uses the 'checkpc -f' -command to do this.

    3. You now should send a SIGHUP signal to the smbd server to have -it reread the printcap information.


    14.4.5. Job sent, no output

    This is the most frustrating part of printing. You may have sent the -job, verified that the job was forwarded, set up a wrapper around -the command to send the file, but there was no output from the printer.

    First, check to make sure that the job REALLY is getting to the -right print queue. If you are using a BSD or LPRng print spooler, -you can temporarily stop the printing of jobs. Jobs can still be -submitted, but they will not be printed. Use:

      lpc -Pprinter stop

    Now submit a print job and then use 'lpq -Pprinter' to see if the -job is in the print queue. If it is not in the print queue then -you will have to find out why it is not being accepted for printing.

    Next, you may want to check to see what the format of the job really -was. With the assistance of the system administrator you can view -the submitted jobs files. You may be surprised to find that these -are not in what you would expect to call a printable format. -You can use the UNIX 'file' utitily to determine what the job -format actually is:

        cd /var/spool/lpd/printer   # spool directory of print jobs
    -    ls                          # find job files
    -    file dfA001myhost

    You should make sure that your printer supports this format OR that -your system administrator has installed a 'print filter' that will -convert the file to a format appropriate for your printer.


    14.4.6. Job sent, strange output

    Once you have the job printing, you can then start worrying about -making it print nicely.

    The most common problem is extra pages of output: banner pages -OR blank pages at the end.

    If you are getting banner pages, check and make sure that the -printcap option or printer option is configured for no banners. -If you have a printcap, this is the :sh (suppress header or banner -page) option. You should have the following in your printer.

       printer: ... :sh

    If you have this option and are still getting banner pages, there -is a strong chance that your printer is generating them for you -automatically. You should make sure that banner printing is disabled -for the printer. This usually requires using the printer setup software -or procedures supplied by the printer manufacturer.

    If you get an extra page of output, this could be due to problems -with your job format, or if you are generating PostScript jobs, -incorrect setting on your printer driver on the MicroSoft client. -For example, under Win95 there is a option:

      Printers|Printer Name|(Right Click)Properties|Postscript|Advanced|

    that allows you to choose if a Ctrl-D is appended to all jobs. -This is a very bad thing to do, as most spooling systems will -automatically add a ^D to the end of the job if it is detected as -PostScript. The multiple ^D may cause an additional page of output.


    14.4.7. Raw PostScript printed

    This is a problem that is usually caused by either the print spooling -system putting information at the start of the print job that makes -the printer think the job is a text file, or your printer simply -does not support PostScript. You may need to enable 'Automatic -Format Detection' on your printer.


    14.4.8. Advanced Printing

    Note that you can do some pretty magic things by using your -imagination with the "print command" option and some shell scripts. -Doing print accounting is easy by passing the %U option to a print -command shell script. You could even make the print command detect -the type of output and its size and send it to an appropriate -printer.


    14.4.9. Real debugging

    If the above debug tips don't help, then maybe you need to bring in -the bug guns, system tracing. See Tracing.txt in this directory.


    Chapter 15. CUPS Printing Support

    15.1. Introduction

    The Common Unix Print System (CUPS) has become very popular, but to many it is -a very mystical tool. There is a great deal of uncertainty regarding CUPS and how -it works. The result is seen in a large number of posting on the samba mailing lists -expressing frustration when MS Windows printers appear not to work with a CUPS -backr-end. -/para>

    This is a good time to point out how CUPS can be used and what it does. CUPS is more -than just a print spooling system - it is a complete printer management system that -complies with HTTP and IPP protocols. It can be managed remotely via a web browser -and it can print using http and ipp protocols.

    CUPS allows to creation of RAW printers (ie: NO file format translation) as well as -SMART printers (ie: CUPS does file format conversion as required for the printer). In -many ways this gives CUPS similar capabilities to the MS Windows print monitoring -system. Of course, if you are a CUPS advocate, you would agrue that CUPS is better! -In any case, let us now move on to explore how one may configure CUPS for interfacing -with MS Windows print clients via Samba.


    15.2. CUPS - RAW Print Through Mode

    When CUPS printers are configured for RAW print-through mode operation it is the -responsibility of the Samba client to fully render the print job (file) in a format -that is suitable for direct delivery to the printer. In this case CUPS will NOT -do any print file format conversion work.

    The CUPS files that need to be correctly set for RAW mode printers to work are: - -

    • /etc/cups/mime.types

    • /etc/cups/mime.convs

    - -Both contain entries that must be uncommented to allow RAW mode -operation.

    Firstly, to enable CUPS based printing from Samba the following options must be -enabled in your smb.conf file [globals] section: - -

    • printing = CUPS

    • printcap = CUPS

    - -When these parameters are specified the print directives in smb.conf (as well as in -samba itself) will be ignored because samba will directly interface with CUPS through -it's application program interface (API) - so long as Samba has been compiled with -CUPS library (libcups) support. If samba has NOT been compiled with CUPS support then -printing will use the System V AT&T command set with the -oraw -option automatically passing through.

    Cupsomatic (an enhanced printing utility that is part of some CUPS implementations) -on the Samba/CUPS server does *not* add any features if a file is really -printed "raw". However, if you have loaded the driver for the Windows client from -the CUPS server, using the "cupsaddsmb" utility, and if this driver is one using -a "Foomatic" PPD, the PJL header in question is already added on the Windows client, -at the time when the driver initially generated the PostScript data and CUPS in true -"-oraw" manner doesn't remove this PJL header and passes the file "as is" to its -printer communication backend.

    NOTE: editing in the "mime.convs" and the "mime.types" file does not *enforce* -"raw" printing, it only *allows* it.

    Print files that arrive from MS Windows printing are "auto-typed" by CUPS. This aids -the process of determining proper treatment while in the print queue system. - -

    • Files generated by PCL drivers and directed at PCK printers get auto-typed as - application/octet-stream. Unknown file format types also - get auto-typed with this tag. -

    • Files generated by a Postscript driver and directed at a Postscript printer - are auto-typed depending on the auto-detected most suitable MIME type as: - -

      • * application/postscript

      • * application/vnd.cups-postscript

      -

    "application/postscript" first goes thru the "pstops" filter (where the page counting -and accounting takes place). The outcome will be of MIME type -"application/vnd.cups-postscript". The pstopsfilter reads and uses information from -the PPD and inserts user-provided options into the PostScript file. As a consequence, -the filtered file could possibly have an unwanted PJL header.

    "application/postscript" will be all files with a ".ps", ".ai", ".eps" suffix or which -have as their first character string one of "%!" or "<04>%".

    "application/vnd.cups-postscript" will files which contain the string -"LANGUAGE=POSTSCRIPT" (or similar variations with different capitalization) in the -first 512 bytes, and also contain the "PJL super escape code" in the first 128 bytes -("<1B>%-12345X"). Very likely, most PostScript files generated on Windows using a CUPS -or other PPD, will have to be auto-typed as "vnd.cups-postscript". A file produced -with a "Generic PostScript driver" will just be tagged "application/postscript".

    Once the file is in "application/vnd.cups-postscript" format, either "pstoraster" -or "cupsomatic" will take over (depending on the printer configuration, as -determined by the PPD in use).

    A printer queue with *no* PPD associated to it is a "raw" printer and all files -will go directly there as received by the spooler. The exeptions are file types -"application/octet-stream" which need "passthrough feature" enabled. -"Raw" queues don't do any filtering at all, they hand the file directly to the -CUPS backend. This backend is responsible for the sending of the data to the device -(as in the "device URI" notation as lpd://, socket://, smb://, ipp://, http://, -parallel:/, serial:/, usb:/ etc.)

    "cupsomatic"/Foomatic are *not* native CUPS drivers and they don't ship with CUPS. -They are a Third Party add-on, developed at Linuxprinting.org. As such, they are -a brilliant hack to make all models (driven by Ghostscript drivers/filters in -traditional spoolers) also work via CUPS, with the same (good or bad!) quality -as in these other spoolers. "cupsomatic" is only a vehicle to execute a ghostscript -commandline at that stage in the CUPS filtering chain, where "normally" the native -CUPS "pstoraster" filter would kick in. cupsomatic by-passes pstoraster, "kidnaps" -the printfile from CUPS away and re-directs it to go through Ghostscipt. CUPS accepts this, -because the associated CUPS-O-Matic-/Foomatic-PPD specifies:

       *cupsFilter:  "application/vnd.cups-postscript 0 cupsomatic"

    This line persuades CUPS to hand the file to cupsomatic, once it has successfully -converted it to the MIME type "application/vnd.cups-postscript". This conversion will not -happen for Jobs arriving from Windows which are auto-typed "application/octet-stream", -with the according changes in "/etc/cups/mime.types" in place.

    CUPS is widely configurable and flexible, even regarding its filtering mechanism. -Another workaround in some situations would be to have -in "/etc/cups/mime.types" entries as follows:

       application/postscript           application/vnd.cups-raw  0  -
    -   application/vnd.cups-postscript  application/vnd.cups-raw  0  -

    This would prevent all Postscript files from being filtered (rather, they will go -thru the virtual "nullfilter" denoted with "-"). This could only be useful for -PS printers. If you want to print PS code on non-PS printers an entry as follows -could be useful:

       */*           application/vnd.cups-raw  0  -

    and would effectively send *all* files to the backend without further processing.

    Lastly, you could have the following entry:

       application/vnd.cups-postscript  application/vnd.cups-raw  0  my_PJL_stripping_filter

    You will need to write a "my_PJL_stripping_filter" (could be a shellscript) that -parses the PostScript and removes the unwanted PJL. This would need to conform to -CUPS filter design (mainly, receive and pass the parameters printername, job-id, -username, jobtitle, copies, print options and possibly the filename). It would -be installed as world executable into "/usr/lib/cups/filters/" and will be called -by CUPS if it encounters a MIME type "application/vnd.cups-postscript".

    CUPS can handle "-o job-hold-until=indefinite". This keeps the job in the queue -"on hold". It will only be printed upon manual release by the printer operator. -This is a requirement in many "central reproduction departments", where a few -operators manage the jobs of hundreds of users on some big machine, where no -user is allowed to have direct access. (The operators often need to load the -proper paper type before running the 10.000 page job requested by marketing -for the mailing, etc.).


    15.3. The CUPS Filter Chains

    The following diagrams reveal how CUPS handles print jobs.

    #########################################################################
    -#
    -# CUPS in and of itself has this (general) filter chain (CAPITAL
    -# letters are FILE-FORMATS or MIME types, other are filters (this is
    -# true for pre-1.1.15 of pre-4.3 versions of CUPS and ESP PrintPro):
    -#
    -# SOMETHNG-FILEFORMAT
    -#      |
    -#      |
    -#      V
    -#     somethingtops
    -#      |
    -#      |
    -#      V
    -# APPLICATION/POSTSCRIPT
    -#      |
    -#      |
    -#      V
    -#     pstops
    -#      |
    -#      |
    -#      V
    -# APPLICATION/VND.CUPS-POSTSCRIPT
    -#      |
    -#      |
    -#      V
    -#     pstoraster   # as shipped with CUPS, independent from any Ghostscipt
    -#      |           # installation on the system
    -#      |  (= "postscipt interpreter")
    -#      |
    -#      V
    -# APPLICATION/VND.CUPS-RASTER
    -#      |
    -#      |
    -#      V
    -#     rastertosomething  (f.e. Gimp-Print filters may be plugged in here)
    -#      |   (= "raster driver")
    -#      |
    -#      V
    -# SOMETHING-DEVICE-SPECIFIC
    -#      |
    -#      |
    -#      V
    -#     backend
    -#
    -#
    -# ESP PrintPro has some enhanced "rastertosomething" filters as compared to
    -# CUPS, and also a somewhat improved "pstoraster" filter.
    -#
    -# NOTE: Gimp-Print and some other 3rd-Party-Filters (like TurboPrint) to
    -#       CUPS and ESP PrintPro plug-in where rastertosomething is noted.
    -#
    -#########################################################################
    #########################################################################
    -#
    -# This is how "cupsomatic" comes into play:
    -# =========================================
    -#
    -# SOMETHNG-FILEFORMAT
    -#      |
    -#      |
    -#      V
    -#    somethingtops
    -#      |
    -#      |
    -#      V
    -# APPLICATION/POSTSCRIPT
    -#      |
    -#      |
    -#      V
    -#    pstops
    -#      |
    -#      |
    -#      V
    -# APPLICATION/VND.CUPS-POSTSCRIPT ----------------+
    -#      |                                          |
    -#      |                                          V
    -#      V                                         cupsomatic
    -#    pstoraster                                  (constructs complicated
    -#      |  (= "postscipt interpreter")            Ghostscript commandline
    -#      |                                         to let the file be
    -#      V                                         processed by a
    -# APPLICATION/VND.CUPS-RASTER                    "-sDEVICE=s.th."
    -#      |                                         call...)
    -#      |                                          |
    -#      V                                          |
    -#    rastertosomething                          V
    -#      |    (= "raster driver")     +-------------------------+
    -#      |                            | Ghostscript at work.... |
    -#      V                            |                         |
    -# SOMETHING-DEVICE-SPECIFIC         *-------------------------+
    -#      |                                          |
    -#      |                                          |
    -#      V                                          |
    -#    backend >------------------------------------+
    -#      |
    -#      |
    -#      V
    -#    THE PRINTER
    -#
    -#
    -# Note, that cupsomatic "kidnaps" the printfile after the
    -# "APPLICATION/VND.CUPS-POSTSCRPT" stage and deviates it through
    -# the CUPS-external, systemwide Ghostscript installation, bypassing the
    -# "pstoraster" filter (therefor also bypassing the CUPS-raster-drivers
    -# "rastertosomething", and hands the rasterized file directly to the CUPS
    -# backend...
    -#
    -# cupsomatic is not made by the CUPS developers. It is an independent
    -# contribution to printing development, made by people from
    -# Linuxprinting.org. (see also http://www.cups.org/cups-help.html)
    -#
    -# NOTE: Gimp-Print and some other 3rd-Party-Filters (like TurboPrint) to
    -#       CUPS and ESP PrintPro plug-in where rastertosomething is noted.
    -#
    -#########################################################################
    #########################################################################
    -#
    -# And this is how it works for ESP PrintPro from 4.3:
    -# ===================================================
    -#
    -# SOMETHNG-FILEFORMAT
    -#      |
    -#      |
    -#      V
    -#     somethingtops
    -#      |
    -#      |
    -#      V
    -# APPLICATION/POSTSCRIPT
    -#      |
    -#      |
    -#      V
    -#     pstops
    -#      |
    -#      |
    -#      V
    -# APPLICATION/VND.CUPS-POSTSCRIPT
    -#      |
    -#      |
    -#      V
    -#     gsrip
    -#      |  (= "postscipt interpreter")
    -#      |
    -#      V
    -# APPLICATION/VND.CUPS-RASTER
    -#      |
    -#      |
    -#      V
    -#     rastertosomething  (f.e. Gimp-Print filters may be plugged in here)
    -#      |   (= "raster driver")
    -#      |
    -#      V
    -# SOMETHING-DEVICE-SPECIFIC
    -#      |
    -#      |
    -#      V
    -#     backend
    -#
    -# NOTE: Gimp-Print and some other 3rd-Party-Filters (like TurboPrint) to
    -#       CUPS and ESP PrintPro plug-in where rastertosomething is noted.
    -#
    -#########################################################################
    #########################################################################
    -#
    -# This is how "cupsomatic" would come into play with ESP PrintPro:
    -# ================================================================
    -#
    -#
    -# SOMETHNG-FILEFORMAT
    -#      |
    -#      |
    -#      V
    -#    somethingtops
    -#      |
    -#      |
    -#      V
    -# APPLICATION/POSTSCRIPT
    -#      |
    -#      |
    -#      V
    -#    pstops
    -#      |
    -#      |
    -#      V
    -# APPLICATION/VND.CUPS-POSTSCRIPT ----------------+
    -#      |                                          |
    -#      |                                          V
    -#      V                                         cupsomatic
    -#    gsrip                                       (constructs complicated
    -#      |  (= "postscipt interpreter")            Ghostscript commandline
    -#      |                                         to let the file be
    -#      V                                         processed by a
    -# APPLICATION/VND.CUPS-RASTER                    "-sDEVICE=s.th."
    -#      |                                         call...)
    -#      |                                          |
    -#      V                                          |
    -#    rastertosomething                          V
    -#      |   (= "raster driver")      +-------------------------+
    -#      |                            | Ghostscript at work.... |
    -#      V                            |                         |
    -# SOMETHING-DEVICE-SPECIFIC         *-------------------------+
    -#      |                                          |
    -#      |                                          |
    -#      V                                          |
    -#    backend >------------------------------------+
    -#      |
    -#      |
    -#      V
    -#    THE PRINTER
    -#
    -# NOTE: Gimp-Print and some other 3rd-Party-Filters (like TurboPrint) to
    -#       CUPS and ESP PrintPro plug-in where rastertosomething is noted.
    -#
    -#########################################################################
    #########################################################################
    -#
    -# And this is how it works for CUPS from 1.1.15:
    -# ==============================================
    -#
    -# SOMETHNG-FILEFORMAT
    -#      |
    -#      |
    -#      V
    -#     somethingtops
    -#      |
    -#      |
    -#      V
    -# APPLICATION/POSTSCRIPT
    -#      |
    -#      |
    -#      V
    -#     pstops
    -#      |
    -#      |
    -#      V
    -# APPLICATION/VND.CUPS-POSTSCRIPT-----+
    -#                                     |
    -#                  +------------------v------------------------------+
    -#                  | Ghostscript                                     |
    -#                  | at work...                                      |
    -#                  | (with                                           |
    -#                  | "-sDEVICE=cups")                                |
    -#                  |                                                 |
    -#                  |         (= "postscipt interpreter")             |
    -#                  |                                                 |
    -#                  +------------------v------------------------------+
    -#                                     |
    -#                                     |
    -# APPLICATION/VND.CUPS-RASTER >-------+
    -#      |
    -#      |
    -#      V
    -#     rastertosomething
    -#      |   (= "raster driver")
    -#      |
    -#      V
    -# SOMETHING-DEVICE-SPECIFIC
    -#      |
    -#      |
    -#      V
    -#     backend
    -#
    -#
    -# NOTE: since version 1.1.15 CUPS "outsourced" the pstoraster process to
    -#       Ghostscript. GNU Ghostscript needs to be patched to handle the
    -#       CUPS requirement; ESP Ghostscript has this builtin. In any case,
    -#       "gs -h" needs to show up a "cups" device. pstoraster is now a
    -#       calling an appropriate "gs -sDEVICE=cups..." commandline to do
    -#       the job. It will output "application/vnd.cup-raster", which will
    -#       be finally processed by a CUPS raster driver "rastertosomething"
    -#       Note the difference to "cupsomatic", which will *not* output
    -#       CUPS-raster, but a final version of the printfile, ready to be
    -#       sent to the printer. cupsomatic also doesn't use the "cups"
    -#       devicemode in Ghostscript, but one of the classical devicemodes....
    -#
    -# NOTE: Gimp-Print and some other 3rd-Party-Filters (like TurboPrint) to
    -#       CUPS and ESP PrintPro plug-in where rastertosomething is noted.
    -#
    -#########################################################################
    #########################################################################
    -#
    -# And this is how it works for CUPS from 1.1.15, with cupsomatic included:
    -# ========================================================================
    -#
    -# SOMETHNG-FILEFORMAT
    -#      |
    -#      |
    -#      V
    -#     somethingtops
    -#      |
    -#      |
    -#      V
    -# APPLICATION/POSTSCRIPT
    -#      |
    -#      |
    -#      V
    -#     pstops
    -#      |
    -#      |
    -#      V
    -# APPLICATION/VND.CUPS-POSTSCRIPT-----+
    -#                                     |
    -#                  +------------------v------------------------------+
    -#                  | Ghostscript        . Ghostscript at work....    |
    -#                  | at work...         . (with "-sDEVICE=           |
    -#                  | (with              .            s.th."        |
    -#                  | "-sDEVICE=cups")   .                            |
    -#                  |                    .                            |
    -#                  | (CUPS standard)    .      (cupsomatic)          |
    -#                  |                    .                            |
    -#                  |          (= "postscript interpreter")           |
    -#                  |                    .                            |
    -#                  +------------------v--------------v---------------+
    -#                                     |              |
    -#                                     |              |
    -# APPLICATION/VND.CUPS-RASTER >-------+              |
    -#      |                                             |
    -#      |                                             |
    -#      V                                             |
    -#     rastertosomething                            |
    -#      |   (= "raster driver")                       |
    -#      |                                             |
    -#      V                                             |
    -# SOMETHING-DEVICE-SPECIFIC >------------------------+
    -#      |
    -#      |
    -#      V
    -#     backend
    -#
    -#
    -# NOTE: Gimp-Print and some other 3rd-Party-Filters (like TurboPrint) to
    -#       CUPS and ESP PrintPro plug-in where rastertosomething is noted.
    -#
    -##########################################################################

    15.4. CUPS Print Drivers and Devices

    CUPS ships with good support for HP LaserJet type printers. You can install -the driver as follows: - -

    • lpadmin -p laserjet4plus -v parallel:/dev/lp0 -E -m laserjet.ppd -

    - -(The "-m" switch will retrieve the "laserjet.ppd" from the standard repository -for not-yet-installed-PPDs, which CUPS typically stores in -/usr/share/cups/model. Alternatively, you may use -"-P /absolute/filesystem/path/to/where/there/is/PPD/your.ppd").


    15.4.1. Further printing steps

    Always also consult the database on linuxprinting.org for all recommendations -about which driver is best used for each printer:

    http://www.linuxprinting.org/printer_list.cgi

    There select your model and click on "Show". You'll arrive at a page listing -all drivers working with your model. There will always be *one* -recommended one. Try this one first. In your case -("HP LaserJet 4 Plus"), you'll arrive here:

    http://www.linuxprinting.org/show_printer.cgi?recnum=75104

    The recommended driver is "ljet4". It has a link to the page for the ljet4 -driver too:

    http://www.linuxprinting.org/show_driver.cgi?driver=ljet4

    On the driver's page, you'll find important and detailed info about how to use -that driver within the various available spoolers. You can generate a PPD for -CUPS. The PPD contains all the info about how to use your model and the driver; -this is, once installed, working transparently for the user -- you'll only -need to choose resolution, paper size etc. from the web-based menu or from -the print dialog GUI or from the commandline...

    On the driver's page, choose to use the "PPD-O-Matic" online PPD generator -program. Select your model and click "Generate PPD file". When you safe the -appearing ASCII text file, don't use "cut'n'past" (as it could possiblly corrupt -line endings and tabs), but use "Save as..." in your browser's menu. Save it -at "/some/path/on/your/filesystem/somewhere/my-name-for-my-printer.ppd"

    Then install the printer:

        "lpadmin -p laserjet4plus -v parallel:/dev/lp0 -E -P /some/path/on/your/filesystem/somewhere/my-name-for-my-printer.ppd"

    Note, that for all the "Foomatic-PPDs" from Linuxprinting.org, you also need -a special "CUPS filter" named "cupsomatic". Get the latest version of -"cupsomatic" from:

    http://www.linuxprinting.org/cupsomatic

    This needs to be copied to /usr/lib/cups/filter/cupsomatic -and be made world executable. This filter is needed to read and act upon the -specially encoded Foomatic comments, embedded in the printfile, which in turn -are used to construct (transparently for you, the user) the complicated -ghostscript command line needed for your printer/driver combo.

    You can have a look at all the options for the Ghostscript commandline supported -by your printer and the ljet4 driver by going to the section "Execution details", -selecting your model (Laserjet 4 Plus) and clicking on "Show execution details". -This will bring up this web page:

    http://www.linuxprinting.org/execution.cgi?driver=ljet4&printer=75104&.submit=Show+execution+details

    The ingenious thing is that the database is kept current. If there -is a bug fix and an improvement somewhere in the database, you will -always get the most current and stable and feature-rich driver by following -the steps described above.

    Till Kamppeter from MandrakeSoft is doing an excellent job here that too few -people are aware of. (So if you use it often, please send him a note showing -your appreciation).

    The latest and greatest improvement now is support for "custom page sizes" -for all those printers which support it.

    "cupsomatic" is documented here:

    http://www.linuxprinting.org/cups-doc.html

    More printing tutorial info may be found here:

    http://www.linuxprinting.org/kpfeifle/LinuxKongress2002/Tutorial/

    Note, that *all* the Foomatic drivers listed on Linuxprinting.org (now -approaching the "all-time high" number of 1.000 for the supported models) -are using a special filtering chain involving Ghostscript, as described -in this document.

    Summary - You need:

    A "foomatic+something" PPD is not enough to print with CUPS (but it is *one* important component)
    The "cupsomatic" filter script (Perl) in /usr/lib/cups/filters/
    Perl to make cupsomatic run
    Ghostscript (because it is called and controlled by the PPD/cupsomatic combo in a way to fit your printermodel/driver combo.
    Ghostscript *must*, depending on the driver/model, contain support for a certain "device" (as shown by "gs -h")

    In the case of the "hpijs" driver, you need a Ghostscript version, which -has "ijs" amongst its supported devices in "gs -h". In the case of -"hpijs+foomatic", a valid ghostscript commandline would be reading like this:

           gs -q -dBATCH -dPARANOIDSAFER -dQUIET -dNOPAUSE -sDEVICE=ijs       \
    -             -sIjsServer=hpijsPageSize -dDuplex=Duplex Model        \
    -             -rResolution,PS:MediaPosition=InputSlot -dIjsUseOutputFD \
    -             -sOutputFile=- -

    Note, that with CUPS and the "hpijs+foomatic" PPD (plus Perl and cupsomatic) -you don't need to remember this. You can choose the available print options -thru a GUI print command (like "glp" from ESP's commercially supported -PrintPro software, or KDE's "kprinter", or GNOME's "gtklp" or the independent -"xpp") or the CUPS web interface via human-readable drop-down selection -menus.

    If you use "ESP Ghostscript" (also under the GPL, provided by Easy Software -Products, the makers of CUPS, downloadable from -http://www.cups.org/software.html, -co-maintained by the developers of linuxprinting.org), you are guaranteed to -have in use the most uptodate, bug-fixed, enhanced and stable version of a Free -Ghostscript. It contains support for ~300 devices, whereas plain vanilla -GNU Ghostscript 7.05 only has ~200.

    If you print only one CUPS test page, from the web interface and when you try to -print a windows test page, it acts like the job was never sent: - -

    Can you print "standard" jobs from the CUPS machine?
    Are the jobs from Windows visible in the Web interface on CUPS (http://localhost:631/)?
    Most important: What kind of printer driver are you using on the Windows clients?

    - -You can try to get a more detailed debugging info by setting "LogLevel debug" in -/etc/cups/cupsd.conf, re-start cupsd and investigate /var/log/cups/error_log -for the whereabouts of your Windows-originating printjobs:

    what does the "auto-typing" line say? which is the "MIME type" CUPS thinks is arriving from the Windows clients?
    are there "filter" available for this MIME type?
    are there "filter rules" defined in "/etc/cups/mime.convs" for this MIME type?


    15.5. Limiting the number of pages users can print

    The feature you want is dependent on the real print subsystem you're using. -Samba's part is always to receive the job files from the clients (filtered -*or* unfiltered) and hand it over to this printing subsystem.

    Of course one could "hack" things with one's own scripts.

    But there is CUPS (Common Unix Printing System). CUPS supports "quotas". -Quotas can be based on sizes of jobs or on the number of pages or both, -and are spanning any time period you want.

    This is an example command how root would set a print quota in CUPS, -assuming an existing printer named "quotaprinter":

      lpadmin -p quotaprinter -o job-quota-period=604800 -o job-k-limit=1024 -o job-page-limit=100

    This would limit every single user to print 100 pages or 1024 KB of -data (whichever comes first) within the last 604.800 seconds ( = 1 week).

    For CUPS to count correctly, the printfile needs to pass the CUPS "pstops" filter, -otherwise it uses a "dummy" count of "1". Some printfiles don't pass it -(eg: image files) but then those are mostly 1 page jobs anyway. This also means, -proprietary drivers for the target printer running on the client computers and -CUPS/Samba then spooling these files as "raw" (i.e. leaving them untouched, not -filtering them), will be counted as "1-pagers" too!

    You need to send PostScript from the clients (i.e. run a PostScript driver there) -for having the chance to get accounting done. If the printer is a non-PostScript model, -you need to let CUPS do the job to convert the file to a print-ready format for the -target printer. This will be working for currently ~1.000 different printer models, see

         http://www.linuxprinting.org/printer_list.cgi

    Before CUPS-1.1.16 your only option was to use the Adobe PostScript -Driver on the Windows clients. The output of this driver was not always -passed thru the "pstops" filter on the CUPS/Samba side, and therefor was -not counted correctly (the reason is that it often --- depending on the -"PPD" being used --- did write a "PJL"-header in front of the real -PostScript which made CUPS to skip the pstops and go directy to -the "pstoraster" stage).

    From CUPS-1.1.16 onward you can use the "CUPS PostScript Driver -for Windows NT/2K/XP clients" (it is tagged in the download area of -http://www.cups.org/ as the "cups-samba-1.1.16.tar.gz" package). -It is *not* working for Win9x/ME clients. But it:

    >it guarantees to not write an PJL-header
    it guarantees to still read and support all PJL-options named in the driver PPD with its own means
    it guarantees the file going thru the "pstops" filter on the CUPS/Samba server
    it guarantees to page-count correctly the printfile

    You can read more about the setup of this combination in the -manpage for "cupsaddsmb" (only present with CUPS installed, only -current with CUPS 1.1.16).

    These are the items CUPS logs in the "page_log" for every single *page* of a job:

    	* Printer name
    -	* User name
    -	* Job ID
    -	* Time of printing
    -	* the page number
    -	* the number of copies
    -	* a billing info string (optional)

    Here is an extract of my CUPS server's page_log file to illustrate -the format and included items:

    	infotec_IS2027 kurt 40 [22/Nov/2002:13:18:03 +0100] 1 2  #marketing
    -	infotec_IS2027 kurt 40 [22/Nov/2002:13:18:03 +0100] 2 2  #marketing
    -	infotec_IS2027 kurt 40 [22/Nov/2002:13:18:03 +0100] 3 2  #marketing
    -	infotec_IS2027 kurt 40 [22/Nov/2002:13:18:03 +0100] 4 2  #marketing
    -	infotec_IS2027 kurt 40 [22/Nov/2002:13:18:03 +0100] 5 2  #marketing
    -	infotec_IS2027 kurt 40 [22/Nov/2002:13:18:03 +0100] 6 2  #marketing

    This was Job ID "40", printed on "infotec_IS2027" by user "kurt", a 6-page job -printed in 2 copies and billed to "#marketing"...

    What flaws or shortcomings are there?

    the ones named above
    CUPS really counts the job pages being *processsed in software* - (going thru the "RIP") rather than the physical sheets successfully - leaving the printing device -- if there is a jam while printing - the 5th sheet out of 1000 and the job is aborted by the printer, - the "page count" will still show the figure of 1000 for that job -
    all quotas are the same for all users (no flexibility to give the - boss a higher quota than the clerk) no support for groups -
    no means to read out the current balance or "used-up" number of current quota -
    a user having used up 99 sheets of 100 quota will still be able to send and print a 1.000 sheet job -
    a user being denied a job because of a filled-up quota doesn't get a meaningful - error message from CUPS other than "client-error-not-possible". -

    But this is the best system out there currently. And there are -huge improvements under development:

    page counting will go into the "backends" (these talk - directly to the printer and will increase the count in sync with the - actual printing process -- a jam at the 5th sheet will lead to a stop in the counting)
    quotas will be handled more flexibly
    probably there will be support for users to inquire their "accounts" in advance
    probably there will be support for some other tools around this topic

    Other than the current stage of the CUPS development, I don't -know any other ready-to-use tool which you could consider.

    You can download the driver files from -http://www.cups.org/software.html. -It is a separate package from the CUPS base software files, tagged as "CUPS 1.1.16 -Windows NT/2k/XP Printer Driver for SAMBA (tar.gz, 192k)". The filename to -download is "cups-samba-1.1.16.tar.gz". Upon untar-/unzip-ping it will reveal -the files:

       cups-samba.install
    -   cups-samba.license
    -   cups-samba.readme
    -   cups-samba.remove
    -   cups-samba.ss

    These have been packaged with the ESP meta packager software "EPM". The -*.install and *.remove files are simple shell script, which untars the -*.ss (which is nothing else than a tar-archive) and puts its contents -into /usr/share/cups/drivers/. Its contents are 3 files:

       cupsdrvr.dll
    -   cupsui.dll
    -   cups.hlp

    ATTENTION: due to a bug one CUPS release puts the cups.hlp -into /usr/share/drivers/ instead of -/usr/share/cups/drivers/. To work around this, copy/move -the file after running the "./cups-samba.install" script manually to the right place:

          cp /usr/share/drivers/cups.hlp /usr/share/cups/drivers/

    This new CUPS PostScript driver is currently binary-only, but free -no source code is provided (yet). The reason is this: it has -been developed with the help of the Microsoft Driver Developer Kit (DDK) -and compiled with Microsoft Visual Studio 6. It is not clear to the driver -developers if they are allowed to distribute the whole of the source code -as Free Software. However, they will likely release the "diff" in source -code under the GPL, so anybody with a license of Visual Studio and a DDK -will be able to compile for him/herself.

    Once you have run the install script (and possibly manually moved the -"cups.hlp" file to "/usr/share/cups/drivers/"), the driver is ready to be -put into Samba's [print$] share (which often maps to "/etc/samba/drivers/" -and contains a subdir tree with WIN40 and W32X86 branches), by running -"cupsaddsmb" (see also "man cupsaddsmb" for CUPS 1.1.16). [Don't forget to -put root into the smbpasswd file by running "smbpasswd" should you run -this whole procedure for the first time.] Once the driver files are in the -[print$] share, they are ready to be downloaded and installed by the -Win NT/2k/XP clients.

    NOTE 1: Win 9x/ME clients won't work with this driver. For these you'd -still need to use the ADOBE*.* drivers as previously.

    NOTE 2: It is not harming if you've still the ADOBE*.* driver files from -previous installations in the "/usr/share/cups/drivers/" directory. -The new cupsaddsmb (from 1.1.16) will automatically use the -"newest" installed driver (which here then is the CUPS drivers).

    NOTE 3: Should your Win clients have had the old ADOBE*.* files and the -Adobe PostScript drivers installed, the download and installation -of the new CUPS PostScript driver for Windows NT/2k/XP will fail -at first.

    It is not enough to "delete" the printer (as the driver files -will still be kept by the clients and re-used if you try to -re-install the printer). To really get rid of the Adobe driver -files on the clients, open the "Printers" folder (possibly via -"Start --> Settings --> Control Panel --> Printers"), right-click -onto the folder background and select "Server Properties". A -new dialog opens; select the "Drivers" tab; on the list select -the driver you want to delete and click on the "Delete" button. -(This will only work if there is no single printer left which -uses that particular driver -- you need to "delete" all printers -using this driver in the "Printers" folder first.)

    Once you have successfully downloaded the CUPS PostScript driver -to a client, you can easily switch all printers to this one -by proceeding as described elsewhere in the "Samba HOWTO -Collection" to change a driver for an existing printer.

    What are the benefits with the "CUPS PostScript driver for Windows NT/2k/XP" -as compared to the Adobe drivers?

    • no hassle with the Adobe EULA -

    • no hassle with the question "where do I get the ADOBE*.* driver files from?" -

    • the Adobe drivers (depending on the printer PPD associated with them) - often put a PJL header in front of the core PostScript part of the print - file (thus the file starts with "1B%-12345X" or "escape%-12345X" - instead of "%!PS"). This leads to the CUPS daemon autotyping the - arriving file as a print-ready file, not requiring a pass thru the - "pstops" filter (to speak more technical, it is not regarded as the - generic MIME type "application/postscript", but as the more special - MIME type "application/cups.vnd-postscript"), which therefore also - leads to the page accounting in "/var/log/cups/page_log" not receiving - the exact mumber of pages; instead the dummy page number of "1" is - logged in a standard setup) -

    • the Adobe driver has more options to "mis-configure" the PostScript - generated by it (like setting it inadvertedly to "Optimize for Speed", - instead of "Optimize for Portability", which could lead to CUPS being - unable to process it) -

    • the CUPS PostScript driver output sent by Windows clients to the CUPS - server will be guaranteed to be auto-typed as generic MIME type - "application/postscript", thusly passing thru the CUPS "pstops" filter - and logging the correct number of pages in the page_log for accounting - and quota purposes -

    • the CUPS PostScript driver supports the sending of additional print - options by the Win NT/2k/XP clients, such as naming the CUPS standard - banner pages (or the custom ones, should they be installed at the time - of driver download), using the CUPS "page-label" option, setting a - job-priority and setting the scheduled time of printing (with the option - to support additional useful IPP job attributes in the future). -

    • the CUPS PostScript driver supports the inclusion of the new - "*cupsJobTicket" comments at the beginnig of the PostScript file (which - could be used in the future for all sort of beneficial extensions on - the CUPS side, but which will not disturb any other application as those - will regard it as a comment and simply ignore it). -

    • the CUPS PostScript driver will be the heart of the fully fledged CUPS - IPP client for Windows NT/2k/XP to be released soon (probably alongside - the first Beta release for CUPS 1.2). -


    15.6. Advanced Postscript Printing from MS Windows

    Let the Windows Clients use a PostScript driver to deliver poistscript to -the samba print server (just like any Linux or Unix Client would also use -PostScript to send to the server)

    Make the Unix printing subsystem to which Samba sends the job convert the -incoming PostScript files to the native print format of the target printers -(would be PCL if you have an HP printer)

    Now if you are afraid that this would just mean using a *Generic* PostScript -driver for the clients that has no Simplex/Duplex selection, and no paper tray -choice, but you need them to be able to set up print jobs, with all the bells -and whistles of your printers:-

    Not possible with traditional spooling systems
    But perfectly supported by CUPS (which uses "PPD" files to - describe how to control the print options for PostScript and - non-PostScript devices alike... -

    CUPS PPDs are working perfectly on Windows clients who use Adobe PostScript -drivers (or the new CUPS PostScript driver for Windows NT/2K/XP). Clients can use -them to setup the job to their liking and CUPS will use the received job options -to make the (PCL-, ESC/P- or PostScript-) printer behave as required.

    If you want to have the additional benefit of page count logging and accounting -then the CUPS PostScript driver is the best choice (better than the Adobe one).

    If you want to make the drivers downloadable for the clients then "cupsaddsmb" is -your friend. It will setup the [print$] share on the Samba host to be ready to serve -the clients for a "point and print" driver installation.

    What strings are attached?

    There are some. But, given the sheer CPU power you can buy nowadays, -these can be overcome easily. The strings:

    Well, if the CUPS/Samba side will have to print to many printers serving many users, -you probably will need to set up a second server (which can do automatic load balancing -with the first one, plus a degree of fail-over mechanism). Converting the incoming -PostScript jobs, "interpreting" them for non-PostScript printers, amounts to the work -of a "RIP" (Raster Image Processor) done in software. This requires more CPU and RAM -than for the mere "raw spooling" task your current setup is solving. It all depends -on the avarage and peak printing load the server should be able to handle.


    15.7. Auto-Deletion of CUPS spool files

    Samba print files pass thru two "spool" directories. One the incoming directory -managed by Samba, (set eg: in the "path = /var/spool/samba" directive in the [printers] -section of "smb.conf"). Second is the spool directory of your UNIX print subsystem. -For CUPS it is normally "/var/spool/cups/", as set by the cupsd.conf directive -"RequestRoot /var/spool/cups".

    I am not sure, which one of your directories keeps the files. From what you say, -it is most likely the Samba part.

    For the CUPS part, you may want to consult:

       http://localhost:631/sam.html#PreserveJobFiles and
    -   http://localhost:631/sam.html#PreserveJobHistory and
    -   http://localhost:631/sam.html#MaxJobs

    There are the settings described for your CUPS daemon, which could lead to completed -job files not being deleted.

    "PreserveJobHistory Yes" -- keeps some details of jobs in -cupsd's mind (well it keeps the "c12345", "c12346" etc. files -in the CUPS spool directory, which do a similar job as the -old-fashioned BSD-LPD control files). This is set to "Yes" -as a default.

    "PreserveJobFiles Yes" -- keeps the job files themselves in -cupsd's mind (well it keeps the "d12345", "d12346" etc. files -in the CUPS spool directory...). This is set to "No" as the -CUPS default.

    "MaxJobs 500" -- this directive controls the maximum number -of jobs that are kept in memory. Once the number of jobs -reaches the limit, the oldest completed job is automatically -purged from the system to make room for the new one. If all -of the known jobs are still pending or active then the new -job will be rejected. Setting the maximum to 0 disables this -functionality. The default setting is 0.

    (There are also additional settings for "MaxJobsPerUser" and -"MaxJobsPerPrinter"...)

    For everything to work as announced, you need to have three things:

    a Samba-smbd which is compiled against "libcups" (Check on Linux by running "ldd `which smbd`") -
    a Samba-smb.conf setting of "printing = cups" -
    another Samba-smb.conf setting of "printcap = cups" -

    Note, that in this case all other manually set printing-related -commands (like "print command", "lpq command", "lprm command", -"lppause command" or "lpresume command") are ignored and they -should normally have no influence what-so-ever on your printing.

    If you want to do things manually, replace the "printing = cups" -by "printing = bsd". Then your manually set commands may work -(haven't tested this), and a "print command = lp -d %P %s; rm %s" -may do what you need.

    You forgot to mention the CUPS version you're using. If you did -set things up as described in the man pages, then the Samba -spool files should be deleted. Otherwise it may be a bug. On -the CUPS side, you can control the behaviour as described -above.

    If you have more problems, post the output of these commands:

       grep -v ^# /etc/cups/cupsd.conf | grep -v ^$
    -   grep -v ^# /etc/samba/smb.conf | grep -v ^$ | grep -v "^;"

    (adapt paths as needed). These commands sanitize the files -and cut out the empty lines and lines with comments, providing -the "naked settings" in a compact way.


    Chapter 16. Unified Logons between Windows NT and UNIX using Winbind

    16.1. Abstract

    Integration of UNIX and Microsoft Windows NT through - a unified logon has been considered a "holy grail" in heterogeneous - computing environments for a long time. We present - winbind, a component of the Samba suite - of programs as a solution to the unified logon problem. Winbind - uses a UNIX implementation - of Microsoft RPC calls, Pluggable Authentication Modules, and the Name - Service Switch to allow Windows NT domain users to appear and operate - as UNIX users on a UNIX machine. This paper describes the winbind - system, explaining the functionality it provides, how it is configured, - and how it works internally.


    16.2. Introduction

    It is well known that UNIX and Microsoft Windows NT have - different models for representing user and group information and - use different technologies for implementing them. This fact has - made it difficult to integrate the two systems in a satisfactory - manner.

    One common solution in use today has been to create - identically named user accounts on both the UNIX and Windows systems - and use the Samba suite of programs to provide file and print services - between the two. This solution is far from perfect however, as - adding and deleting users on both sets of machines becomes a chore - and two sets of passwords are required both of which - can lead to synchronization problems between the UNIX and Windows - systems and confusion for users.

    We divide the unified logon problem for UNIX machines into - three smaller problems:

    • Obtaining Windows NT user and group information -

    • Authenticating Windows NT users -

    • Password changing for Windows NT users -

    Ideally, a prospective solution to the unified logon problem - would satisfy all the above components without duplication of - information on the UNIX machines and without creating additional - tasks for the system administrator when maintaining users and - groups on either system. The winbind system provides a simple - and elegant solution to all three components of the unified logon - problem.


    16.3. What Winbind Provides

    Winbind unifies UNIX and Windows NT account management by - allowing a UNIX box to become a full member of a NT domain. Once - this is done the UNIX box will see NT users and groups as if - they were native UNIX users and groups, allowing the NT domain - to be used in much the same manner that NIS+ is used within - UNIX-only environments.

    The end result is that whenever any - program on the UNIX machine asks the operating system to lookup - a user or group name, the query will be resolved by asking the - NT domain controller for the specified domain to do the lookup. - Because Winbind hooks into the operating system at a low level - (via the NSS name resolution modules in the C library) this - redirection to the NT domain controller is completely - transparent.

    Users on the UNIX machine can then use NT user and group - names as they would use "native" UNIX names. They can chown files - so that they are owned by NT domain users or even login to the - UNIX machine and run a UNIX X-Window session as a domain user.

    The only obvious indication that Winbind is being used is - that user and group names take the form DOMAIN\user and - DOMAIN\group. This is necessary as it allows Winbind to determine - that redirection to a domain controller is wanted for a particular - lookup and which trusted domain is being referenced.

    Additionally, Winbind provides an authentication service - that hooks into the Pluggable Authentication Modules (PAM) system - to provide authentication via a NT domain to any PAM enabled - applications. This capability solves the problem of synchronizing - passwords between systems since all passwords are stored in a single - location (on the domain controller).


    16.3.1. Target Uses

    Winbind is targeted at organizations that have an - existing NT based domain infrastructure into which they wish - to put UNIX workstations or servers. Winbind will allow these - organizations to deploy UNIX workstations without having to - maintain a separate account infrastructure. This greatly - simplifies the administrative overhead of deploying UNIX - workstations into a NT based organization.

    Another interesting way in which we expect Winbind to - be used is as a central part of UNIX based appliances. Appliances - that provide file and print services to Microsoft based networks - will be able to use Winbind to provide seamless integration of - the appliance into the domain.


    16.4. How Winbind Works

    The winbind system is designed around a client/server - architecture. A long running winbindd daemon - listens on a UNIX domain socket waiting for requests - to arrive. These requests are generated by the NSS and PAM - clients and processed sequentially.

    The technologies used to implement winbind are described - in detail below.


    16.4.1. Microsoft Remote Procedure Calls

    Over the last few years, efforts have been underway - by various Samba Team members to decode various aspects of - the Microsoft Remote Procedure Call (MSRPC) system. This - system is used for most network related operations between - Windows NT machines including remote management, user authentication - and print spooling. Although initially this work was done - to aid the implementation of Primary Domain Controller (PDC) - functionality in Samba, it has also yielded a body of code which - can be used for other purposes.

    Winbind uses various MSRPC calls to enumerate domain users - and groups and to obtain detailed information about individual - users or groups. Other MSRPC calls can be used to authenticate - NT domain users and to change user passwords. By directly querying - a Windows PDC for user and group information, winbind maps the - NT account information onto UNIX user and group names.


    16.4.2. Microsoft Active Directory Services

    Since late 2001, Samba has gained the ability to - interact with Microsoft Windows 2000 using its 'Native - Mode' protocols, rather than the NT4 RPC services. - Using LDAP and Kerberos, a domain member running - winbind can enumerate users and groups in exactly the - same way as a Win2k client would, and in so doing - provide a much more efficient and - effective winbind implementation. -


    16.4.3. Name Service Switch

    The Name Service Switch, or NSS, is a feature that is - present in many UNIX operating systems. It allows system - information such as hostnames, mail aliases and user information - to be resolved from different sources. For example, a standalone - UNIX workstation may resolve system information from a series of - flat files stored on the local filesystem. A networked workstation - may first attempt to resolve system information from local files, - and then consult a NIS database for user information or a DNS server - for hostname information.

    The NSS application programming interface allows winbind - to present itself as a source of system information when - resolving UNIX usernames and groups. Winbind uses this interface, - and information obtained from a Windows NT server using MSRPC - calls to provide a new source of account enumeration. Using standard - UNIX library calls, one can enumerate the users and groups on - a UNIX machine running winbind and see all users and groups in - a NT domain plus any trusted domain as though they were local - users and groups.

    The primary control file for NSS is - /etc/nsswitch.conf. - When a UNIX application makes a request to do a lookup - the C library looks in /etc/nsswitch.conf - for a line which matches the service type being requested, for - example the "passwd" service type is used when user or group names - are looked up. This config line species which implementations - of that service should be tried and in what order. If the passwd - config line is:

    passwd: files example

    then the C library will first load a module called - /lib/libnss_files.so followed by - the module /lib/libnss_example.so. The - C library will dynamically load each of these modules in turn - and call resolver functions within the modules to try to resolve - the request. Once the request is resolved the C library returns the - result to the application.

    This NSS interface provides a very easy way for Winbind - to hook into the operating system. All that needs to be done - is to put libnss_winbind.so in /lib/ - then add "winbind" into /etc/nsswitch.conf at - the appropriate place. The C library will then call Winbind to - resolve user and group names.


    16.4.4. Pluggable Authentication Modules

    Pluggable Authentication Modules, also known as PAM, - is a system for abstracting authentication and authorization - technologies. With a PAM module it is possible to specify different - authentication methods for different system applications without - having to recompile these applications. PAM is also useful - for implementing a particular policy for authorization. For example, - a system administrator may only allow console logins from users - stored in the local password file but only allow users resolved from - a NIS database to log in over the network.

    Winbind uses the authentication management and password - management PAM interface to integrate Windows NT users into a - UNIX system. This allows Windows NT users to log in to a UNIX - machine and be authenticated against a suitable Primary Domain - Controller. These users can also change their passwords and have - this change take effect directly on the Primary Domain Controller. -

    PAM is configured by providing control files in the directory - /etc/pam.d/ for each of the services that - require authentication. When an authentication request is made - by an application the PAM code in the C library looks up this - control file to determine what modules to load to do the - authentication check and in what order. This interface makes adding - a new authentication service for Winbind very easy, all that needs - to be done is that the pam_winbind.so module - is copied to /lib/security/ and the PAM - control files for relevant services are updated to allow - authentication via winbind. See the PAM documentation - for more details.


    16.4.5. User and Group ID Allocation

    When a user or group is created under Windows NT - is it allocated a numerical relative identifier (RID). This is - slightly different to UNIX which has a range of numbers that are - used to identify users, and the same range in which to identify - groups. It is winbind's job to convert RIDs to UNIX id numbers and - vice versa. When winbind is configured it is given part of the UNIX - user id space and a part of the UNIX group id space in which to - store Windows NT users and groups. If a Windows NT user is - resolved for the first time, it is allocated the next UNIX id from - the range. The same process applies for Windows NT groups. Over - time, winbind will have mapped all Windows NT users and groups - to UNIX user ids and group ids.

    The results of this mapping are stored persistently in - an ID mapping database held in a tdb database). This ensures that - RIDs are mapped to UNIX IDs in a consistent way.


    16.4.6. Result Caching

    An active system can generate a lot of user and group - name lookups. To reduce the network cost of these lookups winbind - uses a caching scheme based on the SAM sequence number supplied - by NT domain controllers. User or group information returned - by a PDC is cached by winbind along with a sequence number also - returned by the PDC. This sequence number is incremented by - Windows NT whenever any user or group information is modified. If - a cached entry has expired, the sequence number is requested from - the PDC and compared against the sequence number of the cached entry. - If the sequence numbers do not match, then the cached information - is discarded and up to date information is requested directly - from the PDC.


    16.5. Installation and Configuration

    Many thanks to John Trostel jtrostel@snapserver.com -for providing the HOWTO for this section.

    This HOWTO describes how to get winbind services up and running -to control access and authenticate users on your Linux box using -the winbind services which come with SAMBA 2.2.2.


    16.5.1. Introduction

    This HOWTO describes the procedures used to get winbind up and -running on my RedHat 7.1 system. Winbind is capable of providing access -and authentication control for Windows Domain users through an NT -or Win2K PDC for 'regular' services, such as telnet a nd ftp, as -well for SAMBA services.

    This HOWTO has been written from a 'RedHat-centric' perspective, so if -you are using another distribution, you may have to modify the instructions -somewhat to fit the way your distribution works.

    • Why should I to this? -

      This allows the SAMBA administrator to rely on the - authentication mechanisms on the NT/Win2K PDC for the authentication - of domain members. NT/Win2K users no longer need to have separate - accounts on the SAMBA server. -

    • Who should be reading this document? -

      This HOWTO is designed for system administrators. If you are - implementing SAMBA on a file server and wish to (fairly easily) - integrate existing NT/Win2K users from your PDC onto the - SAMBA server, this HOWTO is for you. That said, I am no NT or PAM - expert, so you may find a better or easier way to accomplish - these tasks. -


    16.5.2. Requirements

    If you have a samba configuration file that you are currently -using... BACK IT UP! If your system already uses PAM, -back up the /etc/pam.d directory -contents! If you haven't already made a boot disk, -MAKE ONE NOW!

    Messing with the pam configuration files can make it nearly impossible -to log in to yourmachine. That's why you want to be able to boot back -into your machine in single user mode and restore your -/etc/pam.d back to the original state they were in if -you get frustrated with the way things are going. ;-)

    The latest version of SAMBA (version 3.0 as of this writing), now -includes a functioning winbindd daemon. Please refer to the -main SAMBA web page or, -better yet, your closest SAMBA mirror site for instructions on -downloading the source code.

    To allow Domain users the ability to access SAMBA shares and -files, as well as potentially other services provided by your -SAMBA machine, PAM (pluggable authentication modules) must -be setup properly on your machine. In order to compile the -winbind modules, you should have at least the pam libraries resident -on your system. For recent RedHat systems (7.1, for instance), that -means pam-0.74-22. For best results, it is helpful to also -install the development packages in pam-devel-0.74-22.


    16.5.3. Testing Things Out

    Before starting, it is probably best to kill off all the SAMBA -related daemons running on your server. Kill off all smbd, -nmbd, and winbindd processes that may -be running. To use PAM, you will want to make sure that you have the -standard PAM package (for RedHat) which supplies the /etc/pam.d -directory structure, including the pam modules are used by pam-aware -services, several pam libraries, and the /usr/doc -and /usr/man entries for pam. Winbind built better -in SAMBA if the pam-devel package was also installed. This package includes -the header files needed to compile pam-aware applications. For instance, -my RedHat system has both pam-0.74-22 and -pam-devel-0.74-22 RPMs installed.


    16.5.3.1. Configure and compile SAMBA

    The configuration and compilation of SAMBA is pretty straightforward. -The first three steps may not be necessary depending upon -whether or not you have previously built the Samba binaries.

    root# autoconf
    -root# make clean
    -root# rm config.cache
    -root# ./configure
    -root# make
    -root# make install

    This will, by default, install SAMBA in /usr/local/samba. -See the main SAMBA documentation if you want to install SAMBA somewhere else. -It will also build the winbindd executable and libraries.


    16.5.3.2. Configure nsswitch.conf and the -winbind libraries

    The libraries needed to run the winbindd daemon -through nsswitch need to be copied to their proper locations, so

    root# cp ../samba/source/nsswitch/libnss_winbind.so /lib

    I also found it necessary to make the following symbolic link:

    root# ln -s /lib/libnss_winbind.so /lib/libnss_winbind.so.2

    And, in the case of Sun solaris:

    root# ln -s /usr/lib/libnss_winbind.so /usr/lib/libnss_winbind.so.1 -root# ln -s /usr/lib/libnss_winbind.so /usr/lib/nss_winbind.so.1 -root# ln -s /usr/lib/libnss_winbind.so /usr/lib/nss_winbind.so.2

    Now, as root you need to edit /etc/nsswitch.conf to -allow user and group entries to be visible from the winbindd -daemon. My /etc/nsswitch.conf file look like -this after editing:

    	passwd:     files winbind
    -	shadow:     files 
    -	group:      files winbind

    -The libraries needed by the winbind daemon will be automatically -entered into the ldconfig cache the next time -your system reboots, but it -is faster (and you don't need to reboot) if you do it manually:

    root# /sbin/ldconfig -v | grep winbind

    This makes libnss_winbind available to winbindd -and echos back a check to you.


    16.5.3.3. Configure smb.conf

    Several parameters are needed in the smb.conf file to control -the behavior of winbindd. Configure -smb.conf These are described in more detail in -the winbindd(8) man page. My -smb.conf file was modified to -include the following entries in the [global] section:

    [global]
    -     <...>
    -     # separate domain and username with '+', like DOMAIN+username
    -     winbind separator = +
    -     # use uids from 10000 to 20000 for domain users
    -     winbind uid = 10000-20000
    -     # use gids from 10000 to 20000 for domain groups
    -     winbind gid = 10000-20000
    -     # allow enumeration of winbind users and groups
    -     winbind enum users = yes
    -     winbind enum groups = yes
    -     # give winbind users a real shell (only needed if they have telnet access)
    -     template homedir = /home/winnt/%D/%U
    -     template shell = /bin/bash


    16.5.3.4. Join the SAMBA server to the PDC domain

    Enter the following command to make the SAMBA server join the -PDC domain, where DOMAIN is the name of -your Windows domain and Administrator is -a domain user who has administrative privileges in the domain.

    root# /usr/local/samba/bin/net join -S PDC -U Administrator

    The proper response to the command should be: "Joined the domain -DOMAIN" where DOMAIN -is your DOMAIN name.


    16.5.3.5. Start up the winbindd daemon and test it!

    Eventually, you will want to modify your smb startup script to -automatically invoke the winbindd daemon when the other parts of -SAMBA start, but it is possible to test out just the winbind -portion first. To start up winbind services, enter the following -command as root:

    root# /usr/local/samba/bin/winbindd

    Winbindd can now also run in 'dual daemon mode'. This will make it -run as 2 processes. The first will answer all requests from the cache, -thus making responses to clients faster. The other will -update the cache for the query that the first has just responded. -Advantage of this is that responses stay accurate and are faster. -You can enable dual daemon mode by adding '-B' to the commandline:

    root# /usr/local/samba/bin/winbindd -B

    I'm always paranoid and like to make sure the daemon -is really running...

    root# ps -ae | grep winbindd

    This command should produce output like this, if the daemon is running

    3025 ? 00:00:00 winbindd

    Now... for the real test, try to get some information about the -users on your PDC

    root# /usr/local/samba/bin/wbinfo -u

    -This should echo back a list of users on your Windows users on -your PDC. For example, I get the following response:

    CEO+Administrator
    -CEO+burdell
    -CEO+Guest
    -CEO+jt-ad
    -CEO+krbtgt
    -CEO+TsInternetUser

    Obviously, I have named my domain 'CEO' and my winbind -separator is '+'.

    You can do the same sort of thing to get group information from -the PDC:

    root# /usr/local/samba/bin/wbinfo -g
    -CEO+Domain Admins
    -CEO+Domain Users
    -CEO+Domain Guests
    -CEO+Domain Computers
    -CEO+Domain Controllers
    -CEO+Cert Publishers
    -CEO+Schema Admins
    -CEO+Enterprise Admins
    -CEO+Group Policy Creator Owners

    The function 'getent' can now be used to get unified -lists of both local and PDC users and groups. -Try the following command:

    root# getent passwd

    You should get a list that looks like your /etc/passwd -list followed by the domain users with their new uids, gids, home -directories and default shells.

    The same thing can be done for groups with the command

    root# getent group


    16.5.3.6. Fix the init.d startup scripts

    16.5.3.6.1. Linux

    The winbindd daemon needs to start up after the -smbd and nmbd daemons are running. -To accomplish this task, you need to modify the startup scripts of your system. They are located at /etc/init.d/smb in RedHat and -/etc/init.d/samba in Debian. -script to add commands to invoke this daemon in the proper sequence. My -startup script starts up smbd, -nmbd, and winbindd from the -/usr/local/samba/bin directory directly. The 'start' -function in the script looks like this:

    start() {
    -        KIND="SMB"
    -        echo -n $"Starting $KIND services: "
    -        daemon /usr/local/samba/bin/smbd $SMBDOPTIONS
    -        RETVAL=$?
    -        echo
    -        KIND="NMB"
    -        echo -n $"Starting $KIND services: "
    -        daemon /usr/local/samba/bin/nmbd $NMBDOPTIONS
    -        RETVAL2=$?
    -        echo
    -        KIND="Winbind"
    -        echo -n $"Starting $KIND services: "
    -        daemon /usr/local/samba/bin/winbindd
    -        RETVAL3=$?
    -        echo
    -        [ $RETVAL -eq 0 -a $RETVAL2 -eq 0 -a $RETVAL3 -eq 0 ] && touch /var/lock/subsys/smb || \
    -           RETVAL=1
    -        return $RETVAL
    -}

    If you would like to run winbindd in dual daemon mode, replace -the line -

            daemon /usr/local/samba/bin/winbindd
    - -in the example above with: - -
            daemon /usr/local/samba/bin/winbindd -B
    .

    The 'stop' function has a corresponding entry to shut down the -services and looks like this:

    stop() {
    -        KIND="SMB"
    -        echo -n $"Shutting down $KIND services: "
    -        killproc smbd
    -        RETVAL=$?
    -        echo
    -        KIND="NMB"
    -        echo -n $"Shutting down $KIND services: "
    -        killproc nmbd
    -        RETVAL2=$?
    -        echo
    -        KIND="Winbind"
    -        echo -n $"Shutting down $KIND services: "
    -        killproc winbindd
    -        RETVAL3=$?
    -        [ $RETVAL -eq 0 -a $RETVAL2 -eq 0 -a $RETVAL3 -eq 0 ] && rm -f /var/lock/subsys/smb
    -        echo ""
    -        return $RETVAL
    -}


    16.5.3.6.2. Solaris

    On solaris, you need to modify the -/etc/init.d/samba.server startup script. It usually -only starts smbd and nmbd but should now start winbindd too. If you -have samba installed in /usr/local/samba/bin, -the file could contains something like this:

    ##
    -## samba.server
    -##
    -
    -if [ ! -d /usr/bin ]
    -then                    # /usr not mounted
    -        exit
    -fi
    -
    -killproc() {            # kill the named process(es)
    -        pid=`/usr/bin/ps -e |
    -             /usr/bin/grep -w $1 |
    -             /usr/bin/sed -e 's/^  *//' -e 's/ .*//'`
    -        [ "$pid" != "" ] && kill $pid
    -}
    - 
    -# Start/stop processes required for samba server
    -
    -case "$1" in
    -
    -'start')
    -#
    -# Edit these lines to suit your installation (paths, workgroup, host)
    -#
    -echo Starting SMBD
    -   /usr/local/samba/bin/smbd -D -s \
    -	/usr/local/samba/smb.conf
    -
    -echo Starting NMBD
    -   /usr/local/samba/bin/nmbd -D -l \
    -	/usr/local/samba/var/log -s /usr/local/samba/smb.conf
    -
    -echo Starting Winbind Daemon
    -   /usr/local/samba/bin/winbindd
    -   ;;
    -
    -'stop')
    -   killproc nmbd
    -   killproc smbd
    -   killproc winbindd
    -   ;;
    -
    -*)
    -   echo "Usage: /etc/init.d/samba.server { start | stop }"
    -   ;;
    -esac

    Again, if you would like to run samba in dual daemon mode, replace -

       /usr/local/samba/bin/winbindd
    - -in the script above with: - -
       /usr/local/samba/bin/winbindd -B


    16.5.3.6.3. Restarting

    If you restart the smbd, nmbd, -and winbindd daemons at this point, you -should be able to connect to the samba server as a domain member just as -if you were a local user.


    16.5.3.7. Configure Winbind and PAM

    If you have made it this far, you know that winbindd and samba are working -together. If you want to use winbind to provide authentication for other -services, keep reading. The pam configuration files need to be altered in -this step. (Did you remember to make backups of your original -/etc/pam.d files? If not, do it now.)

    You will need a pam module to use winbindd with these other services. This -module will be compiled in the ../source/nsswitch directory -by invoking the command

    root# make nsswitch/pam_winbind.so

    from the ../source directory. The -pam_winbind.so file should be copied to the location of -your other pam security modules. On my RedHat system, this was the -/lib/security directory. On Solaris, the pam security -modules reside in /usr/lib/security.

    root# cp ../samba/source/nsswitch/pam_winbind.so /lib/security


    16.5.3.7.1. Linux/FreeBSD-specific PAM configuration

    The /etc/pam.d/samba file does not need to be changed. I -just left this fileas it was:

    auth    required        /lib/security/pam_stack.so service=system-auth
    -account required        /lib/security/pam_stack.so service=system-auth

    The other services that I modified to allow the use of winbind -as an authentication service were the normal login on the console (or a terminal -session), telnet logins, and ftp service. In order to enable these -services, you may first need to change the entries in -/etc/xinetd.d (or /etc/inetd.conf). -RedHat 7.1 uses the new xinetd.d structure, in this case you need -to change the lines in /etc/xinetd.d/telnet -and /etc/xinetd.d/wu-ftp from

    enable = no

    to

    enable = yes

    -For ftp services to work properly, you will also need to either -have individual directories for the domain users already present on -the server, or change the home directory template to a general -directory for all domain users. These can be easily set using -the smb.conf global entry -template homedir.

    The /etc/pam.d/ftp file can be changed -to allow winbind ftp access in a manner similar to the -samba file. My /etc/pam.d/ftp file was -changed to look like this:

    auth       required     /lib/security/pam_listfile.so item=user sense=deny file=/etc/ftpusers onerr=succeed
    -auth       sufficient   /lib/security/pam_winbind.so
    -auth       required     /lib/security/pam_stack.so service=system-auth
    -auth       required     /lib/security/pam_shells.so
    -account    sufficient   /lib/security/pam_winbind.so
    -account    required     /lib/security/pam_stack.so service=system-auth
    -session    required     /lib/security/pam_stack.so service=system-auth

    The /etc/pam.d/login file can be changed nearly the -same way. It now looks like this:

    auth       required     /lib/security/pam_securetty.so
    -auth       sufficient   /lib/security/pam_winbind.so
    -auth       sufficient   /lib/security/pam_unix.so use_first_pass
    -auth       required     /lib/security/pam_stack.so service=system-auth
    -auth       required     /lib/security/pam_nologin.so
    -account    sufficient   /lib/security/pam_winbind.so
    -account    required     /lib/security/pam_stack.so service=system-auth
    -password   required     /lib/security/pam_stack.so service=system-auth
    -session    required     /lib/security/pam_stack.so service=system-auth
    -session    optional     /lib/security/pam_console.so

    In this case, I added the auth sufficient /lib/security/pam_winbind.so -lines as before, but also added the required pam_securetty.so -above it, to disallow root logins over the network. I also added a -sufficient /lib/security/pam_unix.so use_first_pass -line after the winbind.so line to get rid of annoying -double prompts for passwords.


    16.5.3.7.2. Solaris-specific configuration

    The /etc/pam.conf needs to be changed. I changed this file so that my Domain -users can logon both locally as well as telnet.The following are the changes -that I made.You can customize the pam.conf file as per your requirements,but -be sure of those changes because in the worst case it will leave your system -nearly impossible to boot.

    #
    -#ident	"@(#)pam.conf	1.14	99/09/16 SMI"
    -#
    -# Copyright (c) 1996-1999, Sun Microsystems, Inc.
    -# All Rights Reserved.
    -#
    -# PAM configuration
    -#
    -# Authentication management
    -#
    -login   auth required   /usr/lib/security/pam_winbind.so
    -login	auth required 	/usr/lib/security/$ISA/pam_unix.so.1 try_first_pass 
    -login	auth required 	/usr/lib/security/$ISA/pam_dial_auth.so.1 try_first_pass 
    -#
    -rlogin  auth sufficient /usr/lib/security/pam_winbind.so
    -rlogin  auth sufficient /usr/lib/security/$ISA/pam_rhosts_auth.so.1
    -rlogin	auth required 	/usr/lib/security/$ISA/pam_unix.so.1 try_first_pass
    -#
    -dtlogin auth sufficient /usr/lib/security/pam_winbind.so
    -dtlogin	auth required 	/usr/lib/security/$ISA/pam_unix.so.1 try_first_pass
    -#
    -rsh	auth required	/usr/lib/security/$ISA/pam_rhosts_auth.so.1
    -other   auth sufficient /usr/lib/security/pam_winbind.so
    -other	auth required	/usr/lib/security/$ISA/pam_unix.so.1 try_first_pass
    -#
    -# Account management
    -#
    -login   account sufficient      /usr/lib/security/pam_winbind.so
    -login	account requisite	/usr/lib/security/$ISA/pam_roles.so.1 
    -login	account required	/usr/lib/security/$ISA/pam_unix.so.1 
    -#
    -dtlogin account sufficient      /usr/lib/security/pam_winbind.so
    -dtlogin	account requisite	/usr/lib/security/$ISA/pam_roles.so.1 
    -dtlogin	account required	/usr/lib/security/$ISA/pam_unix.so.1 
    -#
    -other   account sufficient      /usr/lib/security/pam_winbind.so
    -other	account requisite	/usr/lib/security/$ISA/pam_roles.so.1 
    -other	account required	/usr/lib/security/$ISA/pam_unix.so.1 
    -#
    -# Session management
    -#
    -other	session required	/usr/lib/security/$ISA/pam_unix.so.1 
    -#
    -# Password management
    -#
    -#other   password sufficient     /usr/lib/security/pam_winbind.so
    -other	password required	/usr/lib/security/$ISA/pam_unix.so.1 
    -dtsession auth required	/usr/lib/security/$ISA/pam_unix.so.1
    -#
    -# Support for Kerberos V5 authentication (uncomment to use Kerberos)
    -#
    -#rlogin	auth optional	/usr/lib/security/$ISA/pam_krb5.so.1 try_first_pass
    -#login	auth optional	/usr/lib/security/$ISA/pam_krb5.so.1 try_first_pass
    -#dtlogin	auth optional	/usr/lib/security/$ISA/pam_krb5.so.1 try_first_pass
    -#other	auth optional	/usr/lib/security/$ISA/pam_krb5.so.1 try_first_pass
    -#dtlogin	account optional /usr/lib/security/$ISA/pam_krb5.so.1
    -#other	account optional /usr/lib/security/$ISA/pam_krb5.so.1
    -#other	session optional /usr/lib/security/$ISA/pam_krb5.so.1
    -#other	password optional /usr/lib/security/$ISA/pam_krb5.so.1 try_first_pass

    I also added a try_first_pass line after the winbind.so line to get rid of -annoying double prompts for passwords.

    Now restart your Samba and try connecting through your application that you -configured in the pam.conf.


    16.6. Limitations

    Winbind has a number of limitations in its current - released version that we hope to overcome in future - releases:

    • Winbind is currently only available for - the Linux, Solaris and IRIX operating systems, although ports to other operating - systems are certainly possible. For such ports to be feasible, - we require the C library of the target operating system to - support the Name Service Switch and Pluggable Authentication - Modules systems. This is becoming more common as NSS and - PAM gain support among UNIX vendors.

    • The mappings of Windows NT RIDs to UNIX ids - is not made algorithmically and depends on the order in which - unmapped users or groups are seen by winbind. It may be difficult - to recover the mappings of rid to UNIX id mapping if the file - containing this information is corrupted or destroyed.

    • Currently the winbind PAM module does not take - into account possible workstation and logon time restrictions - that may be been set for Windows NT users, this is - instead up to the PDC to enforce.


    16.7. Conclusion

    The winbind system, through the use of the Name Service - Switch, Pluggable Authentication Modules, and appropriate - Microsoft RPC calls have allowed us to provide seamless - integration of Microsoft Windows NT domain users on a - UNIX system. The result is a great reduction in the administrative - cost of running a mixed UNIX and NT network.


    Chapter 17. Policy Management - Hows and Whys

    17.1. System Policies

    Under MS Windows platforms, particularly those following the release of MS Windows -NT4 and MS Windows 95) it is possible to create a type of file that would be placed -in the NETLOGON share of a domain controller. As the client logs onto the network -this file is read and the contents initiate changes to the registry of the client -machine. This file allows changes to be made to those parts of the registry that -affect users, groups of users, or machines.

    For MS Windows 9x/Me this file must be called Config.POL and may -be generated using a tool called poledit.exe, better known as the -Policy Editor. The policy editor was provided on the Windows 98 installation CD, but -dissappeared again with the introduction of MS Windows Me (Millenium Edition). From -comments from MS Windows network administrators it would appear that this tool became -a part of the MS Windows Me Resource Kit.

    MS Windows NT4 Server products include the System Policy Editor -under the Start->Programs->Administrative Tools menu item. -For MS Windows NT4 and later clients this file must be called NTConfig.POL.

    New with the introduction of MS Windows 2000 was the Microsoft Management Console -or MMC. This tool is the new wave in the ever changing landscape of Microsoft -methods for management of network access and security. Every new Microsoft product -or technology seems to obsolete the old rules and to introduce newer and more -complex tools and methods. To Microsoft's credit though, the MMC does appear to -be a step forward, but improved functionality comes at a great price.

    Before embarking on the configuration of network and system policies it is highly -advisable to read the documentation available from Microsoft's web site from -Implementing Profiles and Policies in Windows NT 4.0 available from Microsoft. -There are a large number of documents in addition to this old one that should also -be read and understood. Try searching on the Microsoft web site for "Group Policies".

    What follows is a very discussion with some helpful notes. The information provided -here is incomplete - you are warned.


    17.1.1. Creating and Managing Windows 9x/Me Policies

    You need the Win98 Group Policy Editor to set Group Profiles up under Windows 9x/Me. -It can be found on the Original full product Win98 installation CD under -tools/reskit/netadmin/poledit. You install this using the -Add/Remove Programs facility and then click on the 'Have Disk' tab.

    Use the Group Policy Editor to create a policy file that specifies the location of -user profiles and/or the My Documents etc. stuff. You then -save these settings in a file called Config.POL that needs to -be placed in the root of the [NETLOGON] share. If your Win98 is configured to log onto -the Samba Domain, it will automatically read this file and update the Win9x/Me registry -of the machine that is logging on.

    Further details are covered in the Win98 Resource Kit documentation.

    If you do not do it this way, then every so often Win9x/Me will check the -integrity of the registry and will restore it's settings from the back-up -copy of the registry it stores on each Win9x/Me machine. Hence, you will -occasionally notice things changing back to the original settings.

    Install the group policy handler for Win9x to pick up group policies. Look on the -Win98 CD in \tools\reskit\netadmin\poledit. -Install group policies on a Win9x client by double-clicking -grouppol.inf. Log off and on again a couple of times and see -if Win98 picks up group policies. Unfortunately this needs to be done on every -Win9x/Me machine that uses group policies.


    17.1.2. Creating and Managing Windows NT4 Style Policy Files

    To create or edit ntconfig.pol you must use the NT Server -Policy Editor, poledit.exe which is included with NT4 Server -but not NT Workstation. There is a Policy Editor on a NT4 -Workstation but it is not suitable for creating Domain Policies. -Further, although the Windows 95 Policy Editor can be installed on an NT4 -Workstation/Server, it will not work with NT clients. However, the files from -the NT Server will run happily enough on an NT4 Workstation.

    You need poledit.exe, common.adm and winnt.adm. -It is convenient to put the two *.adm files in the c:\winnt\inf -directory which is where the binary will look for them unless told otherwise. Note also that that -directory is normally 'hidden'.

    The Windows NT policy editor is also included with the Service Pack 3 (and -later) for Windows NT 4.0. Extract the files using servicepackname /x, -i.e. that's Nt4sp6ai.exe /x for service pack 6a. The policy editor, -poledit.exe and the associated template files (*.adm) should -be extracted as well. It is also possible to downloaded the policy template -files for Office97 and get a copy of the policy editor. Another possible -location is with the Zero Administration Kit available for download from Microsoft.


    17.1.2.1. Registry Tattoos

    With NT4 style registry based policy changes, a large number of settings are not -automatically reversed as the user logs off. Since the settings that were in the -NTConfig.POL file were applied to the client machine registry and that apply to the -hive key HKEY_LOCAL_MACHINE are permanent until explicitly reveresd. This is known -as tattooing. It can have serious consequences down-stream and the administrator must -be extreemly careful not to lock out the ability to manage the machine at a later date.


    17.1.3. Creating and Managing MS Windows 200x Policies

    Windows NT4 System policies allows setting of registry parameters specific to -users, groups and computers (client workstations) that are members of the NT4 -style domain. Such policy file will work with MS Windows 2000 / XP clients also.

    New to MS Windows 2000 Microsoft introduced a new style of group policy that confers -a superset of capabilities compared with NT4 style policies. Obviously, the tool used -to create them is different, and the mechanism for implementing them is much changed.

    The older NT4 style registry based policies are known as Administrative Templates -in MS Windows 2000/XP Group Policy Objects (GPOs). The later includes ability to set various security -configurations, enforce Internet Explorer browser settings, change and redirect aspects of the -users' desktop (including: the location of My Documents files (directory), as -well as intrinsics of where menu items will appear in the Start menu). An additional new -feature is the ability to make available particular software Windows applications to particular -users and/or groups.

    Remember: NT4 policy files are named NTConfig.POL and are stored in the root -of the NETLOGON share on the domain controllers. A Windows NT4 user enters a username, a password -and selects the domain name to which the logon will attempt to take place. During the logon -process the client machine reads the NTConfig.POL file from the NETLOGON share on the authenticating -server, modifies the local registry values according to the settings in this file.

    Windows 2K GPOs are very feature rich. They are NOT stored in the NETLOGON share, rather part of -a Windows 200x policy file is stored in the Active Directory itself and the other part is stored -in a shared (and replicated) volume called the SYSVOL folder. This folder is present on all Active -Directory domain controllers. The part that is stored in the Active Directory itself is called the -group policy container (GPC), and the part that is stored in the replicated share called SYSVOL is -known as the group policy template (GPT).

    With NT4 clients the policy file is read and executed upon only aas each user log onto the network. -MS Windows 200x policies are much more complex - GPOs are processed and applied at client machine -startup (machine specific part) and when the user logs onto the network the user specific part -is applied. In MS Windows 200x style policy management each machine and/or user may be subject -to any number of concurently applicable (and applied) policy sets (GPOs). Active Directory allows -the administrator to also set filters over the policy settings. No such equivalent capability -exists with NT4 style policy files.


    17.1.3.1. Administration of Win2K Policies

    Instead of using the tool called "The System Policy Editor", commonly called Poledit (from the -executable name poledit.exe), GPOs are created and managed using a Microsoft Management Console -(MMC) snap-in as follows:

    • Go to the Windows 200x / XP menu Start->Programs->Adminsitrative Tools - and select the MMC snap-in called "Active Directory Users and Computers" -

    • Select the domain or organizational unit (OU) that you wish to manage, then right click - to open the context menu for that object, select the properties item. -

    • Now left click on the Group Policy tab, then left click on the New tab. Type a name - for the new policy you will create. -

    • Now left click on the Edit tab to commence the steps needed to create the GPO. -

    All policy configuration options are controlled through the use of policy administrative -templates. These files have a .adm extension, both in NT4 as well as in Windows 200x / XP. -Beware however, since the .adm files are NOT interchangible across NT4 and Windows 200x. -The later introduces many new features as well as extended definition capabilities. It is -well beyond the scope of this documentation to explain how to program .adm files, for that -the adminsitrator is referred to the Microsoft Windows Resource Kit for your particular -version of MS Windows.

    The MS Windows 2000 Resource Kit contains a tool called gpolmig.exe. This tool can be used -to migrate an NT4 NTConfig.POL file into a Windows 200x style GPO. Be VERY careful how you -use this powerful tool. Please refer to the resource kit manuals for specific usage information.


    Chapter 18. Profile Management

    18.1. Roaming Profiles

    NOTE! Roaming profiles support is different for Win9X and WinNT.

    Before discussing how to configure roaming profiles, it is useful to see how -Win9X and WinNT clients implement these features.

    Win9X clients send a NetUserGetInfo request to the server to get the user's -profiles location. However, the response does not have room for a separate -profiles location field, only the user's home share. This means that Win9X -profiles are restricted to being in the user's home directory.

    WinNT clients send a NetSAMLogon RPC request, which contains many fields, -including a separate field for the location of the user's profiles. -This means that support for profiles is different for Win9X and WinNT.


    18.1.1. Windows NT Configuration

    To support WinNT clients, in the [global] section of smb.conf set the -following (for example):

    logon path = \\profileserver\profileshare\profilepath\%U\moreprofilepath

    The default for this option is \\%N\%U\profile, namely -\\sambaserver\username\profile. The \\N%\%U service is created -automatically by the [homes] service. -If you are using a samba server for the profiles, you _must_ make the -share specified in the logon path browseable.

    MS Windows NT/2K clients at times do not disconnect a connection to a server -between logons. It is recommended to NOT use the homes -meta-service name as part of the profile share path.


    18.1.2. Windows 9X Configuration

    To support Win9X clients, you must use the "logon home" parameter. Samba has -now been fixed so that "net use /home" now works as well, and it, too, relies -on the "logon home" parameter.

    By using the logon home parameter, you are restricted to putting Win9X -profiles in the user's home directory. But wait! There is a trick you -can use. If you set the following in the [global] section of your -smb.conf file:

    logon home = \\%L\%U\.profiles

    then your Win9X clients will dutifully put their clients in a subdirectory -of your home directory called .profiles (thus making them hidden).

    Not only that, but 'net use/home' will also work, because of a feature in -Win9X. It removes any directory stuff off the end of the home directory area -and only uses the server and share portion. That is, it looks like you -specified \\%L\%U for "logon home".


    18.1.3. Win9X and WinNT Configuration

    You can support profiles for both Win9X and WinNT clients by setting both the -"logon home" and "logon path" parameters. For example:

    logon home = \\%L\%U\.profiles
    -logon path = \\%L\profiles\%U

    I have not checked what 'net use /home' does on NT when "logon home" is -set as above.


    18.1.4. Windows 9X Profile Setup

    When a user first logs in on Windows 9X, the file user.DAT is created, -as are folders "Start Menu", "Desktop", "Programs" and "Nethood". -These directories and their contents will be merged with the local -versions stored in c:\windows\profiles\username on subsequent logins, -taking the most recent from each. You will need to use the [global] -options "preserve case = yes", "short preserve case = yes" and -"case sensitive = no" in order to maintain capital letters in shortcuts -in any of the profile folders.

    The user.DAT file contains all the user's preferences. If you wish to -enforce a set of preferences, rename their user.DAT file to user.MAN, -and deny them write access to this file.

    1. On the Windows 95 machine, go to Control Panel | Passwords and - select the User Profiles tab. Select the required level of - roaming preferences. Press OK, but do _not_ allow the computer - to reboot. -

    2. On the Windows 95 machine, go to Control Panel | Network | - Client for Microsoft Networks | Preferences. Select 'Log on to - NT Domain'. Then, ensure that the Primary Logon is 'Client for - Microsoft Networks'. Press OK, and this time allow the computer - to reboot. -

    Under Windows 95, Profiles are downloaded from the Primary Logon. -If you have the Primary Logon as 'Client for Novell Networks', then -the profiles and logon script will be downloaded from your Novell -Server. If you have the Primary Logon as 'Windows Logon', then the -profiles will be loaded from the local machine - a bit against the -concept of roaming profiles, if you ask me.

    You will now find that the Microsoft Networks Login box contains -[user, password, domain] instead of just [user, password]. Type in -the samba server's domain name (or any other domain known to exist, -but bear in mind that the user will be authenticated against this -domain and profiles downloaded from it, if that domain logon server -supports it), user name and user's password.

    Once the user has been successfully validated, the Windows 95 machine -will inform you that 'The user has not logged on before' and asks you -if you wish to save the user's preferences? Select 'yes'.

    Once the Windows 95 client comes up with the desktop, you should be able -to examine the contents of the directory specified in the "logon path" -on the samba server and verify that the "Desktop", "Start Menu", -"Programs" and "Nethood" folders have been created.

    These folders will be cached locally on the client, and updated when -the user logs off (if you haven't made them read-only by then :-). -You will find that if the user creates further folders or short-cuts, -that the client will merge the profile contents downloaded with the -contents of the profile directory already on the local client, taking -the newest folders and short-cuts from each set.

    If you have made the folders / files read-only on the samba server, -then you will get errors from the w95 machine on logon and logout, as -it attempts to merge the local and the remote profile. Basically, if -you have any errors reported by the w95 machine, check the Unix file -permissions and ownership rights on the profile directory contents, -on the samba server.

    If you have problems creating user profiles, you can reset the user's -local desktop cache, as shown below. When this user then next logs in, -they will be told that they are logging in "for the first time".

    1. instead of logging in under the [user, password, domain] dialog, - press escape. -

    2. run the regedit.exe program, and look in: -

      HKEY_LOCAL_MACHINE\Windows\CurrentVersion\ProfileList -

      you will find an entry, for each user, of ProfilePath. Note the - contents of this key (likely to be c:\windows\profiles\username), - then delete the key ProfilePath for the required user. -

      [Exit the registry editor]. -

    3. WARNING - before deleting the contents of the - directory listed in - the ProfilePath (this is likely to be c:\windows\profiles\username), - ask them if they have any important files stored on their desktop - or in their start menu. delete the contents of the directory - ProfilePath (making a backup if any of the files are needed). -

      This will have the effect of removing the local (read-only hidden - system file) user.DAT in their profile directory, as well as the - local "desktop", "nethood", "start menu" and "programs" folders. -

    4. search for the user's .PWL password-caching file in the c:\windows - directory, and delete it. -

    5. log off the windows 95 client. -

    6. check the contents of the profile path (see "logon path" described - above), and delete the user.DAT or user.MAN file for the user, - making a backup if required. -

    If all else fails, increase samba's debug log levels to between 3 and 10, -and / or run a packet trace program such as tcpdump or netmon.exe, and -look for any error reports.

    If you have access to an NT server, then first set up roaming profiles -and / or netlogons on the NT server. Make a packet trace, or examine -the example packet traces provided with NT server, and see what the -differences are with the equivalent samba trace.


    18.1.5. Windows NT Workstation 4.0

    When a user first logs in to a Windows NT Workstation, the profile -NTuser.DAT is created. The profile location can be now specified -through the "logon path" parameter.

    There is a parameter that is now available for use with NT Profiles: -"logon drive". This should be set to "h:" or any other drive, and -should be used in conjunction with the new "logon home" parameter.

    The entry for the NT 4.0 profile is a _directory_ not a file. The NT -help on profiles mentions that a directory is also created with a .PDS -extension. The user, while logging in, must have write permission to -create the full profile path (and the folder with the .PDS extension -for those situations where it might be created.)

    In the profile directory, NT creates more folders than 95. It creates -"Application Data" and others, as well as "Desktop", "Nethood", -"Start Menu" and "Programs". The profile itself is stored in a file -NTuser.DAT. Nothing appears to be stored in the .PDS directory, and -its purpose is currently unknown.

    You can use the System Control Panel to copy a local profile onto -a samba server (see NT Help on profiles: it is also capable of firing -up the correct location in the System Control Panel for you). The -NT Help file also mentions that renaming NTuser.DAT to NTuser.MAN -turns a profile into a mandatory one.

    The case of the profile is significant. The file must be called -NTuser.DAT or, for a mandatory profile, NTuser.MAN.


    18.1.6. Windows NT/200x Server

    There is nothing to stop you specifying any path that you like for the -location of users' profiles. Therefore, you could specify that the -profile be stored on a samba server, or any other SMB server, as long as -that SMB server supports encrypted passwords.


    18.1.7. Sharing Profiles between W9x/Me and NT4/200x/XP workstations

    Sharing of desktop profiles between Windows versions is NOT recommended. -Desktop profiles are an evolving phenomenon and profiles for later versions -of MS Windows clients add features that may interfere with earlier versions -of MS Windows clients. Probably the more salient reason to NOT mix profiles -is that when logging off an earlier version of MS Windows the older format -of profile contents may overwrite information that belongs to the newer -version resulting in loss of profile information content when that user logs -on again with the newer version of MS Windows.

    If you then want to share the same Start Menu / Desktop with W9x/Me, you will -need to specify a common location for the profiles. The smb.conf parameters -that need to be common are logon path and -logon home.

    If you have this set up correctly, you will find separate user.DAT and -NTuser.DAT files in the same profile directory.


    18.1.8. Windows NT 4

    Unfortunately, the Resource Kit info is Win NT4 or 200x specific.

    Here is a quick guide:

    • On your NT4 Domain Controller, right click on 'My Computer', then -select the tab labelled 'User Profiles'.

    • Select a user profile you want to migrate and click on it.

      I am using the term "migrate" lossely. You can copy a profile to -create a group profile. You can give the user 'Everyone' rights to the -profile you copy this to. That is what you need to do, since your samba -domain is not a member of a trust relationship with your NT4 PDC.

    • Click the 'Copy To' button.

    • In the box labelled 'Copy Profile to' add your new path, eg: -c:\temp\foobar

    • Click on the button labelled 'Change' in the "Permitted to use" box.

    • Click on the group 'Everyone' and then click OK. This closes the -'chose user' box.

    • Now click OK.

    Follow the above for every profile you need to migrate.


    18.1.8.1. Side bar Notes

    You should obtain the SID of your NT4 domain. You can use smbpasswd to do -this. Read the man page.

    With Samba-3.0.0 alpha code you can import all you NT4 domain accounts -using the net samsync method. This way you can retain your profile -settings as well as all your users.


    18.1.8.2. Mandatory profiles

    The above method can be used to create mandatory profiles also. To convert -a group profile into a mandatory profile simply locate the NTUser.DAT file -in the copied profile and rename it to NTUser.MAN.


    18.1.8.3. moveuser.exe

    The W2K professional resource kit has moveuser.exe. moveuser.exe changes -the security of a profile from one user to another. This allows the account -domain to change, and/or the user name to change.


    18.1.8.4. Get SID

    You can identify the SID by using GetSID.exe from the Windows NT Server 4.0 -Resource Kit.

    Windows NT 4.0 stores the local profile information in the registry under -the following key: -HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList

    Under the ProfileList key, there will be subkeys named with the SIDs of the -users who have logged on to this computer. (To find the profile information -for the user whose locally cached profile you want to move, find the SID for -the user with the GetSID.exe utility.) Inside of the appropriate user's -subkey, you will see a string value named ProfileImagePath.


    18.1.9. Windows 2000/XP

    You must first convert the profile from a local profile to a domain -profile on the MS Windows workstation as follows:

    • Log on as the LOCAL workstation administrator.

    • Right click on the 'My Computer' Icon, select 'Properties'

    • Click on the 'User Profiles' tab

    • Select the profile you wish to convert (click on it once)

    • Click on the button 'Copy To'

    • In the "Permitted to use" box, click on the 'Change' button.

    • Click on the 'Look in" area that lists the machine name, when you click -here it will open up a selection box. Click on the domain to which the -profile must be accessible.

      You will need to log on if a logon box opens up. Eg: In the connect -as: MIDEARTH\root, password: mypassword.

    • To make the profile capable of being used by anyone select 'Everyone'

    • Click OK. The Selection box will close.

    • Now click on the 'Ok' button to create the profile in the path you -nominated.

    Done. You now have a profile that can be editted using the samba-3.0.0 -profiles tool.

    Under NT/2K the use of mandotory profiles forces the use of MS Exchange -storage of mail data. That keeps desktop profiles usable.

    • This is a security check new to Windows XP (or maybe only -Windows XP service pack 1). It can be disabled via a group policy in -Active Directory. The policy is:

      "Computer Configuration\Administrative Templates\System\User -Profiles\Do not check for user ownership of Roaming Profile Folders"

      ...and it should be set to "Enabled". -Does the new version of samba have an Active Directory analogue? If so, -then you may be able to set the policy through this.

      If you cannot set group policies in samba, then you may be able to set -the policy locally on each machine. If you want to try this, then do -the following (N.B. I don't know for sure that this will work in the -same way as a domain group policy):

    • On the XP workstation log in with an Administrator account.

    • Click: "Start", "Run"

    • Type: "mmc"

    • Click: "OK"

    • A Microsoft Management Console should appear.

    • Click: File, "Add/Remove Snap-in...", "Add"

    • Double-Click: "Group Policy"

    • Click: "Finish", "Close"

    • Click: "OK"

    • In the "Console Root" window:

    • Expand: "Local Computer Policy", "Computer Configuration",

    • "Administrative Templates", "System", "User Profiles"

    • Double-Click: "Do not check for user ownership of Roaming Profile

    • Folders"

    • Select: "Enabled"

    • Click: OK"

    • Close the whole console. You do not need to save the settings (this -refers to the console settings rather than the policies you have -changed).

    • Reboot


    Chapter 19. Integrating MS Windows networks with Samba

    This section deals with NetBIOS over TCP/IP name to IP address resolution. If you -your MS Windows clients are NOT configured to use NetBIOS over TCP/IP then this -section does not apply to your installation. If your installation involves use of -NetBIOS over TCP/IP then this section may help you to resolve networking problems.

    NetBIOS over TCP/IP has nothing to do with NetBEUI. NetBEUI is NetBIOS - over Logical Link Control (LLC). On modern networks it is highly advised - to NOT run NetBEUI at all. Note also that there is NO such thing as - NetBEUI over TCP/IP - the existence of such a protocol is a complete - and utter mis-apprehension.

    Since the introduction of MS Windows 2000 it is possible to run MS Windows networking -without the use of NetBIOS over TCP/IP. NetBIOS over TCP/IP uses UDP port 137 for NetBIOS -name resolution and uses TCP port 139 for NetBIOS session services. When NetBIOS over -TCP/IP is disabled on MS Windows 2000 and later clients then only TCP port 445 will be -used and UDP port 137 and TCP port 139 will not.

    When using Windows 2000 or later clients, if NetBIOS over TCP/IP is NOT disabled, then -the client will use UDP port 137 (NetBIOS Name Service, also known as the Windows Internet -Name Service or WINS), TCP port 139 AND TCP port 445 (for actual file and print traffic).

    When NetBIOS over TCP/IP is disabled the use of DNS is essential. Most installations that -disable NetBIOS over TCP/IP today use MS Active Directory Service (ADS). ADS requires -Dynamic DNS with Service Resource Records (SRV RR) and with Incremental Zone Transfers (IXFR). -Use of DHCP with ADS is recommended as a further means of maintaining central control -over client workstation network configuration.


    19.1. Name Resolution in a pure Unix/Linux world

    The key configuration files covered in this section are:

    • /etc/hosts

    • /etc/resolv.conf

    • /etc/host.conf

    • /etc/nsswitch.conf


    19.1.1. /etc/hosts

    Contains a static list of IP Addresses and names. -eg:

    	127.0.0.1	localhost localhost.localdomain
    -	192.168.1.1	bigbox.caldera.com	bigbox	alias4box

    The purpose of /etc/hosts is to provide a -name resolution mechanism so that uses do not need to remember -IP addresses.

    Network packets that are sent over the physical network transport -layer communicate not via IP addresses but rather using the Media -Access Control address, or MAC address. IP Addresses are currently -32 bits in length and are typically presented as four (4) decimal -numbers that are separated by a dot (or period). eg: 168.192.1.1

    MAC Addresses use 48 bits (or 6 bytes) and are typically represented -as two digit hexadecimal numbers separated by colons. eg: -40:8e:0a:12:34:56

    Every network interfrace must have an MAC address. Associated with -a MAC address there may be one or more IP addresses. There is NO -relationship between an IP address and a MAC address, all such assignments -are arbitary or discretionary in nature. At the most basic level all -network communications takes place using MAC addressing. Since MAC -addresses must be globally unique, and generally remains fixed for -any particular interface, the assignment of an IP address makes sense -from a network management perspective. More than one IP address can -be assigned per MAC address. One address must be the primary IP address, -this is the address that will be returned in the ARP reply.

    When a user or a process wants to communicate with another machine -the protocol implementation ensures that the "machine name" or "host -name" is resolved to an IP address in a manner that is controlled -by the TCP/IP configuration control files. The file -/etc/hosts is one such file.

    When the IP address of the destination interface has been -determined a protocol called ARP/RARP is used to identify -the MAC address of the target interface. ARP stands for Address -Resolution Protocol, and is a broadcast oriented method that -uses UDP (User Datagram Protocol) to send a request to all -interfaces on the local network segment using the all 1's MAC -address. Network interfaces are programmed to respond to two -MAC addresses only; their own unique address and the address -ff:ff:ff:ff:ff:ff. The reply packet from an ARP request will -contain the MAC address and the primary IP address for each -interface.

    The /etc/hosts file is foundational to all -Unix/Linux TCP/IP installations and as a minumum will contain -the localhost and local network interface IP addresses and the -primary names by which they are known within the local machine. -This file helps to prime the pump so that a basic level of name -resolution can exist before any other method of name resolution -becomes available.


    19.1.2. /etc/resolv.conf

    This file tells the name resolution libraries:

    • The name of the domain to which the machine - belongs -

    • The name(s) of any domains that should be - automatically searched when trying to resolve unqualified - host names to their IP address -

    • The name or IP address of available Domain - Name Servers that may be asked to perform name to address - translation lookups -


    19.1.3. /etc/host.conf

    /etc/host.conf is the primary means by -which the setting in /etc/resolv.conf may be affected. It is a -critical configuration file. This file controls the order by -which name resolution may procede. The typical structure is:

    	order hosts,bind
    -	multi on

    then both addresses should be returned. Please refer to the -man page for host.conf for further details.


    19.1.4. /etc/nsswitch.conf

    This file controls the actual name resolution targets. The -file typically has resolver object specifications as follows:

    	# /etc/nsswitch.conf
    -	#
    -	# Name Service Switch configuration file.
    -	#
    -
    -	passwd:		compat
    -	# Alternative entries for password authentication are:
    -	# passwd:	compat files nis ldap winbind
    -	shadow:		compat
    -	group:		compat
    -
    -	hosts:		files nis dns
    -	# Alternative entries for host name resolution are:
    -	# hosts:	files dns nis nis+ hesoid db compat ldap wins
    -	networks:	nis files dns
    -
    -	ethers:		nis files
    -	protocols:	nis files
    -	rpc:		nis files
    -	services:	nis files

    Of course, each of these mechanisms requires that the appropriate -facilities and/or services are correctly configured.

    It should be noted that unless a network request/message must be -sent, TCP/IP networks are silent. All TCP/IP communications assumes a -principal of speaking only when necessary.

    Starting with version 2.2.0 samba has Linux support for extensions to -the name service switch infrastructure so that linux clients will -be able to obtain resolution of MS Windows NetBIOS names to IP -Addresses. To gain this functionality Samba needs to be compiled -with appropriate arguments to the make command (ie: make -nsswitch/libnss_wins.so). The resulting library should -then be installed in the /lib directory and -the "wins" parameter needs to be added to the "hosts:" line in -the /etc/nsswitch.conf file. At this point it -will be possible to ping any MS Windows machine by it's NetBIOS -machine name, so long as that machine is within the workgroup to -which both the samba machine and the MS Windows machine belong.


    19.2. Name resolution as used within MS Windows networking

    MS Windows networking is predicated about the name each machine -is given. This name is known variously (and inconsistently) as -the "computer name", "machine name", "networking name", "netbios name", -"SMB name". All terms mean the same thing with the exception of -"netbios name" which can apply also to the name of the workgroup or the -domain name. The terms "workgroup" and "domain" are really just a -simply name with which the machine is associated. All NetBIOS names -are exactly 16 characters in length. The 16th character is reserved. -It is used to store a one byte value that indicates service level -information for the NetBIOS name that is registered. A NetBIOS machine -name is therefore registered for each service type that is provided by -the client/server.

    The following are typical NetBIOS name/service type registrations:

    	Unique NetBIOS Names:
    -		MACHINENAME<00>	= Server Service is running on MACHINENAME
    -		MACHINENAME<03> = Generic Machine Name (NetBIOS name)
    -		MACHINENAME<20> = LanMan Server service is running on MACHINENAME
    -		WORKGROUP<1b> = Domain Master Browser
    -
    -	Group Names:
    -		WORKGROUP<03> = Generic Name registered by all members of WORKGROUP
    -		WORKGROUP<1c> = Domain Controllers / Netlogon Servers
    -		WORKGROUP<1d> = Local Master Browsers
    -		WORKGROUP<1e> = Internet Name Resolvers

    It should be noted that all NetBIOS machines register their own -names as per the above. This is in vast contrast to TCP/IP -installations where traditionally the system administrator will -determine in the /etc/hosts or in the DNS database what names -are associated with each IP address.

    One further point of clarification should be noted, the /etc/hosts -file and the DNS records do not provide the NetBIOS name type information -that MS Windows clients depend on to locate the type of service that may -be needed. An example of this is what happens when an MS Windows client -wants to locate a domain logon server. It find this service and the IP -address of a server that provides it by performing a lookup (via a -NetBIOS broadcast) for enumeration of all machines that have -registered the name type *<1c>. A logon request is then sent to each -IP address that is returned in the enumerated list of IP addresses. Which -ever machine first replies then ends up providing the logon services.

    The name "workgroup" or "domain" really can be confusing since these -have the added significance of indicating what is the security -architecture of the MS Windows network. The term "workgroup" indicates -that the primary nature of the network environment is that of a -peer-to-peer design. In a WORKGROUP all machines are responsible for -their own security, and generally such security is limited to use of -just a password (known as SHARE MODE security). In most situations -with peer-to-peer networking the users who control their own machines -will simply opt to have no security at all. It is possible to have -USER MODE security in a WORKGROUP environment, thus requiring use -of a user name and a matching password.

    MS Windows networking is thus predetermined to use machine names -for all local and remote machine message passing. The protocol used is -called Server Message Block (SMB) and this is implemented using -the NetBIOS protocol (Network Basic Input Output System). NetBIOS can -be encapsulated using LLC (Logical Link Control) protocol - in which case -the resulting protocol is called NetBEUI (Network Basic Extended User -Interface). NetBIOS can also be run over IPX (Internetworking Packet -Exchange) protocol as used by Novell NetWare, and it can be run -over TCP/IP protocols - in which case the resulting protocol is called -NBT or NetBT, the NetBIOS over TCP/IP.

    MS Windows machines use a complex array of name resolution mechanisms. -Since we are primarily concerned with TCP/IP this demonstration is -limited to this area.


    19.2.1. The NetBIOS Name Cache

    All MS Windows machines employ an in memory buffer in which is -stored the NetBIOS names and IP addresses for all external -machines that that machine has communicated with over the -past 10-15 minutes. It is more efficient to obtain an IP address -for a machine from the local cache than it is to go through all the -configured name resolution mechanisms.

    If a machine whose name is in the local name cache has been shut -down before the name had been expired and flushed from the cache, then -an attempt to exchange a message with that machine will be subject -to time-out delays. i.e.: Its name is in the cache, so a name resolution -lookup will succeed, but the machine can not respond. This can be -frustrating for users - but it is a characteristic of the protocol.

    The MS Windows utility that allows examination of the NetBIOS -name cache is called "nbtstat". The Samba equivalent of this -is called "nmblookup".


    19.2.2. The LMHOSTS file

    This file is usually located in MS Windows NT 4.0 or -2000 in C:\WINNT\SYSTEM32\DRIVERS\ETC and contains -the IP Address and the machine name in matched pairs. The -LMHOSTS file performs NetBIOS name -to IP address mapping oriented.

    It typically looks like:

    	# Copyright (c) 1998 Microsoft Corp.
    -	#
    -	# This is a sample LMHOSTS file used by the Microsoft Wins Client (NetBIOS
    -	# over TCP/IP) stack for Windows98
    -	#
    -	# This file contains the mappings of IP addresses to NT computernames
    -	# (NetBIOS) names.  Each entry should be kept on an individual line.
    -	# The IP address should be placed in the first column followed by the
    -	# corresponding computername. The address and the comptername
    -	# should be separated by at least one space or tab. The "#" character
    -	# is generally used to denote the start of a comment (see the exceptions
    -	# below).
    -	#
    -	# This file is compatible with Microsoft LAN Manager 2.x TCP/IP lmhosts
    -	# files and offers the following extensions:
    -	#
    -	#      #PRE
    -	#      #DOM:<domain>
    -	#      #INCLUDE <filename>
    -	#      #BEGIN_ALTERNATE
    -	#      #END_ALTERNATE
    -	#      \0xnn (non-printing character support)
    -	#
    -	# Following any entry in the file with the characters "#PRE" will cause
    -	# the entry to be preloaded into the name cache. By default, entries are
    -	# not preloaded, but are parsed only after dynamic name resolution fails.
    -	#
    -	# Following an entry with the "#DOM:<domain>" tag will associate the
    -	# entry with the domain specified by <domain>. This affects how the
    -	# browser and logon services behave in TCP/IP environments. To preload
    -	# the host name associated with #DOM entry, it is necessary to also add a
    -	# #PRE to the line. The <domain> is always preloaded although it will not
    -	# be shown when the name cache is viewed.
    -	#
    -	# Specifying "#INCLUDE <filename>" will force the RFC NetBIOS (NBT)
    -	# software to seek the specified <filename> and parse it as if it were
    -	# local. <filename> is generally a UNC-based name, allowing a
    -	# centralized lmhosts file to be maintained on a server.
    -	# It is ALWAYS necessary to provide a mapping for the IP address of the
    -	# server prior to the #INCLUDE. This mapping must use the #PRE directive.
    -	# In addtion the share "public" in the example below must be in the
    -	# LanManServer list of "NullSessionShares" in order for client machines to
    -	# be able to read the lmhosts file successfully. This key is under
    -	# \machine\system\currentcontrolset\services\lanmanserver\parameters\nullsessionshares
    -	# in the registry. Simply add "public" to the list found there.
    -	#
    -	# The #BEGIN_ and #END_ALTERNATE keywords allow multiple #INCLUDE
    -	# statements to be grouped together. Any single successful include
    -	# will cause the group to succeed.
    -	#
    -	# Finally, non-printing characters can be embedded in mappings by
    -	# first surrounding the NetBIOS name in quotations, then using the
    -	# \0xnn notation to specify a hex value for a non-printing character.
    -	#
    -	# The following example illustrates all of these extensions:
    -	#
    -	# 102.54.94.97     rhino         #PRE #DOM:networking  #net group's DC
    -	# 102.54.94.102    "appname  \0x14"                    #special app server
    -	# 102.54.94.123    popular            #PRE             #source server
    -	# 102.54.94.117    localsrv           #PRE             #needed for the include
    -	#
    -	# #BEGIN_ALTERNATE
    -	# #INCLUDE \\localsrv\public\lmhosts
    -	# #INCLUDE \\rhino\public\lmhosts
    -	# #END_ALTERNATE
    -	#
    -	# In the above example, the "appname" server contains a special
    -	# character in its name, the "popular" and "localsrv" server names are
    -	# preloaded, and the "rhino" server name is specified so it can be used
    -	# to later #INCLUDE a centrally maintained lmhosts file if the "localsrv"
    -	# system is unavailable.
    -	#
    -	# Note that the whole file is parsed including comments on each lookup,
    -	# so keeping the number of comments to a minimum will improve performance.
    -	# Therefore it is not advisable to simply add lmhosts file entries onto the
    -	# end of this file.


    19.2.3. HOSTS file

    This file is usually located in MS Windows NT 4.0 or 2000 in -C:\WINNT\SYSTEM32\DRIVERS\ETC and contains -the IP Address and the IP hostname in matched pairs. It can be -used by the name resolution infrastructure in MS Windows, depending -on how the TCP/IP environment is configured. This file is in -every way the equivalent of the Unix/Linux /etc/hosts file.


    19.2.4. DNS Lookup

    This capability is configured in the TCP/IP setup area in the network -configuration facility. If enabled an elaborate name resolution sequence -is followed the precise nature of which isdependant on what the NetBIOS -Node Type parameter is configured to. A Node Type of 0 means use -NetBIOS broadcast (over UDP broadcast) is first used if the name -that is the subject of a name lookup is not found in the NetBIOS name -cache. If that fails then DNS, HOSTS and LMHOSTS are checked. If set to -Node Type 8, then a NetBIOS Unicast (over UDP Unicast) is sent to the -WINS Server to obtain a lookup before DNS, HOSTS, LMHOSTS, or broadcast -lookup is used.


    19.2.5. WINS Lookup

    A WINS (Windows Internet Name Server) service is the equivaent of the -rfc1001/1002 specified NBNS (NetBIOS Name Server). A WINS server stores -the names and IP addresses that are registered by a Windows client -if the TCP/IP setup has been given at least one WINS Server IP Address.

    To configure Samba to be a WINS server the following parameter needs -to be added to the smb.conf file:

    	wins support = Yes

    To configure Samba to use a WINS server the following parameters are -needed in the smb.conf file:

    	wins support = No
    -	wins server = xxx.xxx.xxx.xxx

    where xxx.xxx.xxx.xxx is the IP address -of the WINS server.


    Chapter 20. Improved browsing in samba

    20.1. Overview of browsing

    SMB networking provides a mechanism by which clients can access a list -of machines in a network, a so-called "browse list". This list -contains machines that are ready to offer file and/or print services -to other machines within the network. Thus it does not include -machines which aren't currently able to do server tasks. The browse -list is heavily used by all SMB clients. Configuration of SMB -browsing has been problematic for some Samba users, hence this -document.

    MS Windows 2000 and later, as with Samba-3 and later, can be -configured to not use NetBIOS over TCP/IP. When configured this way -it is imperative that name resolution (using DNS/LDAP/ADS) be correctly -configured and operative. Browsing will NOT work if name resolution -from SMB machine names to IP addresses does not function correctly.

    Where NetBIOS over TCP/IP is enabled use of a WINS server is highly -recommended to aid the resolution of NetBIOS (SMB) names to IP addresses. -WINS allows remote segment clients to obtain NetBIOS name_type information -that can NOT be provided by any other means of name resolution.


    20.2. Browsing support in samba

    Samba facilitates browsing. The browsing is supported by nmbd -and is also controlled by options in the smb.conf file (see smb.conf(5)). -Samba can act as a local browse master for a workgroup and the ability -for samba to support domain logons and scripts is now available.

    Samba can also act as a domain master browser for a workgroup. This -means that it will collate lists from local browse masters into a -wide area network server list. In order for browse clients to -resolve the names they may find in this list, it is recommended that -both samba and your clients use a WINS server.

    Note that you should NOT set Samba to be the domain master for a -workgroup that has the same name as an NT Domain: on each wide area -network, you must only ever have one domain master browser per workgroup, -regardless of whether it is NT, Samba or any other type of domain master -that is providing this service.

    [Note that nmbd can be configured as a WINS server, but it is not -necessary to specifically use samba as your WINS server. MS Windows -NT4, Server or Advanced Server 2000 or 2003 can be configured as -your WINS server. In a mixed NT/2000/2003 server and samba environment on -a Wide Area Network, it is recommended that you use the Microsoft -WINS server capabilities. In a samba-only environment, it is -recommended that you use one and only one Samba server as your WINS server.

    To get browsing to work you need to run nmbd as usual, but will need -to use the "workgroup" option in smb.conf to control what workgroup -Samba becomes a part of.

    Samba also has a useful option for a Samba server to offer itself for -browsing on another subnet. It is recommended that this option is only -used for 'unusual' purposes: announcements over the internet, for -example. See "remote announce" in the smb.conf man page.


    20.3. Problem resolution

    If something doesn't work then hopefully the log.nmb file will help -you track down the problem. Try a debug level of 2 or 3 for finding -problems. Also note that the current browse list usually gets stored -in text form in a file called browse.dat.

    Note that if it doesn't work for you, then you should still be able to -type the server name as \\SERVER in filemanager then hit enter and -filemanager should display the list of available shares.

    Some people find browsing fails because they don't have the global -"guest account" set to a valid account. Remember that the IPC$ -connection that lists the shares is done as guest, and thus you must -have a valid guest account.

    MS Windows 2000 and upwards (as with Samba) can be configured to disallow -anonymous (ie: Guest account) access to the IPC$ share. In that case, the -MS Windows 2000/XP/2003 machine acting as an SMB/CIFS client will use the -name of the currently logged in user to query the IPC$ share. MS Windows -9X clients are not able to do this and thus will NOT be able to browse -server resources.

    Also, a lot of people are getting bitten by the problem of too many -parameters on the command line of nmbd in inetd.conf. This trick is to -not use spaces between the option and the parameter (eg: -d2 instead -of -d 2), and to not use the -B and -N options. New versions of nmbd -are now far more likely to correctly find your broadcast and network -address, so in most cases these aren't needed.

    The other big problem people have is that their broadcast address, -netmask or IP address is wrong (specified with the "interfaces" option -in smb.conf)


    20.4. Browsing across subnets

    Since the release of Samba 1.9.17(alpha1) Samba has been -updated to enable it to support the replication of browse lists -across subnet boundaries. New code and options have been added to -achieve this. This section describes how to set this feature up -in different settings.

    To see browse lists that span TCP/IP subnets (ie. networks separated -by routers that don't pass broadcast traffic) you must set up at least -one WINS server. The WINS server acts as a DNS for NetBIOS names, allowing -NetBIOS name to IP address translation to be done by doing a direct -query of the WINS server. This is done via a directed UDP packet on -port 137 to the WINS server machine. The reason for a WINS server is -that by default, all NetBIOS name to IP address translation is done -by broadcasts from the querying machine. This means that machines -on one subnet will not be able to resolve the names of machines on -another subnet without using a WINS server.

    Remember, for browsing across subnets to work correctly, all machines, -be they Windows 95, Windows NT, or Samba servers must have the IP address -of a WINS server given to them by a DHCP server, or by manual configuration -(for Win95 and WinNT, this is in the TCP/IP Properties, under Network -settings) for Samba this is in the smb.conf file.


    20.4.1. How does cross subnet browsing work ?

    Cross subnet browsing is a complicated dance, containing multiple -moving parts. It has taken Microsoft several years to get the code -that achieves this correct, and Samba lags behind in some areas. -Samba is capable of cross subnet browsing when configured correctly.

    Consider a network set up as follows :

                                       (DMB)
    -             N1_A      N1_B        N1_C       N1_D        N1_E
    -              |          |           |          |           |
    -          -------------------------------------------------------
    -            |          subnet 1                       |
    -          +---+                                      +---+
    -          |R1 | Router 1                  Router 2   |R2 |
    -          +---+                                      +---+
    -            |                                          |
    -            |  subnet 2              subnet 3          |
    -  --------------------------       ------------------------------------
    -  |     |     |      |               |        |         |           |
    - N2_A  N2_B  N2_C   N2_D           N3_A     N3_B      N3_C        N3_D 
    -                    (WINS)

    Consisting of 3 subnets (1, 2, 3) connected by two routers -(R1, R2) - these do not pass broadcasts. Subnet 1 has 5 machines -on it, subnet 2 has 4 machines, subnet 3 has 4 machines. Assume -for the moment that all these machines are configured to be in the -same workgroup (for simplicities sake). Machine N1_C on subnet 1 -is configured as Domain Master Browser (ie. it will collate the -browse lists for the workgroup). Machine N2_D is configured as -WINS server and all the other machines are configured to register -their NetBIOS names with it.

    As all these machines are booted up, elections for master browsers -will take place on each of the three subnets. Assume that machine -N1_C wins on subnet 1, N2_B wins on subnet 2, and N3_D wins on -subnet 3 - these machines are known as local master browsers for -their particular subnet. N1_C has an advantage in winning as the -local master browser on subnet 1 as it is set up as Domain Master -Browser.

    On each of the three networks, machines that are configured to -offer sharing services will broadcast that they are offering -these services. The local master browser on each subnet will -receive these broadcasts and keep a record of the fact that -the machine is offering a service. This list of records is -the basis of the browse list. For this case, assume that -all the machines are configured to offer services so all machines -will be on the browse list.

    For each network, the local master browser on that network is -considered 'authoritative' for all the names it receives via -local broadcast. This is because a machine seen by the local -master browser via a local broadcast must be on the same -network as the local master browser and thus is a 'trusted' -and 'verifiable' resource. Machines on other networks that -the local master browsers learn about when collating their -browse lists have not been directly seen - these records are -called 'non-authoritative'.

    At this point the browse lists look as follows (these are -the machines you would see in your network neighborhood if -you looked in it on a particular network right now).

    Subnet           Browse Master   List
    -------           -------------   ----
    -Subnet1          N1_C            N1_A, N1_B, N1_C, N1_D, N1_E
    -
    -Subnet2          N2_B            N2_A, N2_B, N2_C, N2_D
    -
    -Subnet3          N3_D            N3_A, N3_B, N3_C, N3_D

    Note that at this point all the subnets are separate, no -machine is seen across any of the subnets.

    Now examine subnet 2. As soon as N2_B has become the local -master browser it looks for a Domain master browser to synchronize -its browse list with. It does this by querying the WINS server -(N2_D) for the IP address associated with the NetBIOS name -WORKGROUP>1B<. This name was registerd by the Domain master -browser (N1_C) with the WINS server as soon as it was booted.

    Once N2_B knows the address of the Domain master browser it -tells it that is the local master browser for subnet 2 by -sending a MasterAnnouncement packet as a UDP port 138 packet. -It then synchronizes with it by doing a NetServerEnum2 call. This -tells the Domain Master Browser to send it all the server -names it knows about. Once the domain master browser receives -the MasterAnnouncement packet it schedules a synchronization -request to the sender of that packet. After both synchronizations -are done the browse lists look like :

    Subnet           Browse Master   List
    -------           -------------   ----
    -Subnet1          N1_C            N1_A, N1_B, N1_C, N1_D, N1_E, 
    -                                 N2_A(*), N2_B(*), N2_C(*), N2_D(*)
    -
    -Subnet2          N2_B            N2_A, N2_B, N2_C, N2_D
    -                                 N1_A(*), N1_B(*), N1_C(*), N1_D(*), N1_E(*)
    -
    -Subnet3          N3_D            N3_A, N3_B, N3_C, N3_D
    -
    -Servers with a (*) after them are non-authoritative names.

    At this point users looking in their network neighborhood on -subnets 1 or 2 will see all the servers on both, users on -subnet 3 will still only see the servers on their own subnet.

    The same sequence of events that occured for N2_B now occurs -for the local master browser on subnet 3 (N3_D). When it -synchronizes browse lists with the domain master browser (N1_A) -it gets both the server entries on subnet 1, and those on -subnet 2. After N3_D has synchronized with N1_C and vica-versa -the browse lists look like.

    Subnet           Browse Master   List
    -------           -------------   ----
    -Subnet1          N1_C            N1_A, N1_B, N1_C, N1_D, N1_E, 
    -                                 N2_A(*), N2_B(*), N2_C(*), N2_D(*),
    -                                 N3_A(*), N3_B(*), N3_C(*), N3_D(*)
    -
    -Subnet2          N2_B            N2_A, N2_B, N2_C, N2_D
    -                                 N1_A(*), N1_B(*), N1_C(*), N1_D(*), N1_E(*)
    -
    -Subnet3          N3_D            N3_A, N3_B, N3_C, N3_D
    -                                 N1_A(*), N1_B(*), N1_C(*), N1_D(*), N1_E(*),
    -                                 N2_A(*), N2_B(*), N2_C(*), N2_D(*)
    -
    -Servers with a (*) after them are non-authoritative names.

    At this point users looking in their network neighborhood on -subnets 1 or 3 will see all the servers on all sunbets, users on -subnet 2 will still only see the servers on subnets 1 and 2, but not 3.

    Finally, the local master browser for subnet 2 (N2_B) will sync again -with the domain master browser (N1_C) and will recieve the missing -server entries. Finally - and as a steady state (if no machines -are removed or shut off) the browse lists will look like :

    Subnet           Browse Master   List
    -------           -------------   ----
    -Subnet1          N1_C            N1_A, N1_B, N1_C, N1_D, N1_E, 
    -                                 N2_A(*), N2_B(*), N2_C(*), N2_D(*),
    -                                 N3_A(*), N3_B(*), N3_C(*), N3_D(*)
    -
    -Subnet2          N2_B            N2_A, N2_B, N2_C, N2_D
    -                                 N1_A(*), N1_B(*), N1_C(*), N1_D(*), N1_E(*)
    -                                 N3_A(*), N3_B(*), N3_C(*), N3_D(*)
    -
    -Subnet3          N3_D            N3_A, N3_B, N3_C, N3_D
    -                                 N1_A(*), N1_B(*), N1_C(*), N1_D(*), N1_E(*),
    -                                 N2_A(*), N2_B(*), N2_C(*), N2_D(*)
    -	
    -Servers with a (*) after them are non-authoritative names.

    Synchronizations between the domain master browser and local -master browsers will continue to occur, but this should be a -steady state situation.

    If either router R1 or R2 fails the following will occur:

    1. Names of computers on each side of the inaccessible network fragments - will be maintained for as long as 36 minutes, in the network neighbourhood - lists. -

    2. Attempts to connect to these inaccessible computers will fail, but the - names will not be removed from the network neighbourhood lists. -

    3. If one of the fragments is cut off from the WINS server, it will only - be able to access servers on its local subnet, by using subnet-isolated - broadcast NetBIOS name resolution. The effects are similar to that of - losing access to a DNS server. -


    20.5. Setting up a WINS server

    Either a Samba machine or a Windows NT Server machine may be set up -as a WINS server. To set a Samba machine to be a WINS server you must -add the following option to the smb.conf file on the selected machine : -in the [globals] section add the line

    wins support = yes

    Versions of Samba prior to 1.9.17 had this parameter default to -yes. If you have any older versions of Samba on your network it is -strongly suggested you upgrade to a recent version, or at the very -least set the parameter to 'no' on all these machines.

    Machines with "wins support = yes" will keep a list of -all NetBIOS names registered with them, acting as a DNS for NetBIOS names.

    You should set up only ONE wins server. Do NOT set the -"wins support = yes" option on more than one Samba -server.

    To set up a Windows NT Server as a WINS server you need to set up -the WINS service - see your NT documentation for details. Note that -Windows NT WINS Servers can replicate to each other, allowing more -than one to be set up in a complex subnet environment. As Microsoft -refuse to document these replication protocols Samba cannot currently -participate in these replications. It is possible in the future that -a Samba->Samba WINS replication protocol may be defined, in which -case more than one Samba machine could be set up as a WINS server -but currently only one Samba server should have the "wins support = yes" -parameter set.

    After the WINS server has been configured you must ensure that all -machines participating on the network are configured with the address -of this WINS server. If your WINS server is a Samba machine, fill in -the Samba machine IP address in the "Primary WINS Server" field of -the "Control Panel->Network->Protocols->TCP->WINS Server" dialogs -in Windows 95 or Windows NT. To tell a Samba server the IP address -of the WINS server add the following line to the [global] section of -all smb.conf files :

    wins server = >name or IP address<

    where >name or IP address< is either the DNS name of the WINS server -machine or its IP address.

    Note that this line MUST NOT BE SET in the smb.conf file of the Samba -server acting as the WINS server itself. If you set both the -"wins support = yes" option and the -"wins server = <name>" option then -nmbd will fail to start.

    There are two possible scenarios for setting up cross subnet browsing. -The first details setting up cross subnet browsing on a network containing -Windows 95, Samba and Windows NT machines that are not configured as -part of a Windows NT Domain. The second details setting up cross subnet -browsing on networks that contain NT Domains.


    20.6. Setting up Browsing in a WORKGROUP

    To set up cross subnet browsing on a network containing machines -in up to be in a WORKGROUP, not an NT Domain you need to set up one -Samba server to be the Domain Master Browser (note that this is *NOT* -the same as a Primary Domain Controller, although in an NT Domain the -same machine plays both roles). The role of a Domain master browser is -to collate the browse lists from local master browsers on all the -subnets that have a machine participating in the workgroup. Without -one machine configured as a domain master browser each subnet would -be an isolated workgroup, unable to see any machines on any other -subnet. It is the presense of a domain master browser that makes -cross subnet browsing possible for a workgroup.

    In an WORKGROUP environment the domain master browser must be a -Samba server, and there must only be one domain master browser per -workgroup name. To set up a Samba server as a domain master browser, -set the following option in the [global] section of the smb.conf file :

    domain master = yes

    The domain master browser should also preferrably be the local master -browser for its own subnet. In order to achieve this set the following -options in the [global] section of the smb.conf file :

    domain master = yes
    -local master = yes
    -preferred master = yes
    -os level = 65

    The domain master browser may be the same machine as the WINS -server, if you require.

    Next, you should ensure that each of the subnets contains a -machine that can act as a local master browser for the -workgroup. Any MS Windows NT/2K/XP/2003 machine should be -able to do this, as will Windows 9x machines (although these -tend to get rebooted more often, so it's not such a good idea -to use these). To make a Samba server a local master browser -set the following options in the [global] section of the -smb.conf file :

    domain master = no
    -local master = yes
    -preferred master = yes
    -os level = 65

    Do not do this for more than one Samba server on each subnet, -or they will war with each other over which is to be the local -master browser.

    The "local master" parameter allows Samba to act as a local master -browser. The "preferred master" causes nmbd to force a browser -election on startup and the "os level" parameter sets Samba high -enough so that it should win any browser elections.

    If you have an NT machine on the subnet that you wish to -be the local master browser then you can disable Samba from -becoming a local master browser by setting the following -options in the [global] section of the smb.conf file :

    domain master = no
    -local master = no
    -preferred master = no
    -os level = 0


    20.7. Setting up Browsing in a DOMAIN

    If you are adding Samba servers to a Windows NT Domain then -you must not set up a Samba server as a domain master browser. -By default, a Windows NT Primary Domain Controller for a Domain -name is also the Domain master browser for that name, and many -things will break if a Samba server registers the Domain master -browser NetBIOS name (DOMAIN<1B>) with WINS instead of the PDC.

    For subnets other than the one containing the Windows NT PDC -you may set up Samba servers as local master browsers as -described. To make a Samba server a local master browser set -the following options in the [global] section of the smb.conf -file :

    domain master = no
    -local master = yes
    -preferred master = yes
    -os level = 65

    If you wish to have a Samba server fight the election with machines -on the same subnet you may set the "os level" parameter to lower -levels. By doing this you can tune the order of machines that -will become local master browsers if they are running. For -more details on this see the section "FORCING SAMBA TO BE THE MASTER" -below.

    If you have Windows NT machines that are members of the domain -on all subnets, and you are sure they will always be running then -you can disable Samba from taking part in browser elections and -ever becoming a local master browser by setting following options -in the [global] section of the smb.conf file :

    domain master = no - local master = no - preferred master = no - os level = 0


    20.8. Forcing samba to be the master

    Who becomes the "master browser" is determined by an election process -using broadcasts. Each election packet contains a number of parameters -which determine what precedence (bias) a host should have in the -election. By default Samba uses a very low precedence and thus loses -elections to just about anyone else.

    If you want Samba to win elections then just set the "os level" global -option in smb.conf to a higher number. It defaults to 0. Using 34 -would make it win all elections over every other system (except other -samba systems!)

    A "os level" of 2 would make it beat WfWg and Win95, but not MS Windows -NT/2K Server. A MS Windows NT/2K Server domain controller uses level 32.

    The maximum os level is 255

    If you want samba to force an election on startup, then set the -"preferred master" global option in smb.conf to "yes". Samba will -then have a slight advantage over other potential master browsers -that are not preferred master browsers. Use this parameter with -care, as if you have two hosts (whether they are windows 95 or NT or -samba) on the same local subnet both set with "preferred master" to -"yes", then periodically and continually they will force an election -in order to become the local master browser.

    If you want samba to be a "domain master browser", then it is -recommended that you also set "preferred master" to "yes", because -samba will not become a domain master browser for the whole of your -LAN or WAN if it is not also a local master browser on its own -broadcast isolated subnet.

    It is possible to configure two samba servers to attempt to become -the domain master browser for a domain. The first server that comes -up will be the domain master browser. All other samba servers will -attempt to become the domain master browser every 5 minutes. They -will find that another samba server is already the domain master -browser and will fail. This provides automatic redundancy, should -the current domain master browser fail.


    20.9. Making samba the domain master

    The domain master is responsible for collating the browse lists of -multiple subnets so that browsing can occur between subnets. You can -make samba act as the domain master by setting "domain master = yes" -in smb.conf. By default it will not be a domain master.

    Note that you should NOT set Samba to be the domain master for a -workgroup that has the same name as an NT Domain.

    When samba is the domain master and the master browser it will listen -for master announcements (made roughly every twelve minutes) from local -master browsers on other subnets and then contact them to synchronise -browse lists.

    If you want samba to be the domain master then I suggest you also set -the "os level" high enough to make sure it wins elections, and set -"preferred master" to "yes", to get samba to force an election on -startup.

    Note that all your servers (including samba) and clients should be -using a WINS server to resolve NetBIOS names. If your clients are only -using broadcasting to resolve NetBIOS names, then two things will occur:

    1. your local master browsers will be unable to find a domain master - browser, as it will only be looking on the local subnet. -

    2. if a client happens to get hold of a domain-wide browse list, and - a user attempts to access a host in that list, it will be unable to - resolve the NetBIOS name of that host. -

    If, however, both samba and your clients are using a WINS server, then:

    1. your local master browsers will contact the WINS server and, as long as - samba has registered that it is a domain master browser with the WINS - server, your local master browser will receive samba's ip address - as its domain master browser. -

    2. when a client receives a domain-wide browse list, and a user attempts - to access a host in that list, it will contact the WINS server to - resolve the NetBIOS name of that host. as long as that host has - registered its NetBIOS name with the same WINS server, the user will - be able to see that host. -


    20.10. Note about broadcast addresses

    If your network uses a "0" based broadcast address (for example if it -ends in a 0) then you will strike problems. Windows for Workgroups -does not seem to support a 0's broadcast and you will probably find -that browsing and name lookups won't work.


    20.11. Multiple interfaces

    Samba now supports machines with multiple network interfaces. If you -have multiple interfaces then you will need to use the "interfaces" -option in smb.conf to configure them. See smb.conf(5) for details.


    Chapter 21. Hosting a Microsoft Distributed File System tree on Samba

    21.1. Instructions

    The Distributed File System (or Dfs) provides a means of - separating the logical view of files and directories that users - see from the actual physical locations of these resources on the - network. It allows for higher availability, smoother storage expansion, - load balancing etc. For more information about Dfs, refer to Microsoft documentation.

    This document explains how to host a Dfs tree on a Unix - machine (for Dfs-aware clients to browse) using Samba.

    To enable SMB-based DFS for Samba, configure it with the - --with-msdfs option. Once built, a - Samba server can be made a Dfs server by setting the global - boolean host msdfs parameter in the smb.conf - file. You designate a share as a Dfs root using the share - level boolean msdfs root parameter. A Dfs root directory on - Samba hosts Dfs links in the form of symbolic links that point - to other servers. For example, a symbolic link - junction->msdfs:storage1\share1 in - the share directory acts as the Dfs junction. When Dfs-aware - clients attempt to access the junction link, they are redirected - to the storage location (in this case, \\storage1\share1).

    Dfs trees on Samba work with all Dfs-aware clients ranging - from Windows 95 to 2000.

    Here's an example of setting up a Dfs tree on a Samba - server.

    # The smb.conf file:
    -[global]
    -	netbios name = SAMBA
    -	host msdfs   = yes
    -
    -[dfs]
    -	path = /export/dfsroot
    -	msdfs root = yes
    -	

    In the /export/dfsroot directory we set up our dfs links to - other servers on the network.

    root# cd /export/dfsroot

    root# chown root /export/dfsroot

    root# chmod 755 /export/dfsroot

    root# ln -s msdfs:storageA\\shareA linka

    root# ln -s msdfs:serverB\\share,serverC\\share linkb

    You should set up the permissions and ownership of - the directory acting as the Dfs root such that only designated - users can create, delete or modify the msdfs links. Also note - that symlink names should be all lowercase. This limitation exists - to have Samba avoid trying all the case combinations to get at - the link name. Finally set up the symbolic links to point to the - network shares you want, and start Samba.

    Users on Dfs-aware clients can now browse the Dfs tree - on the Samba server at \\samba\dfs. Accessing - links linka or linkb (which appear as directories to the client) - takes users directly to the appropriate shares on the network.


    21.1.1. Notes

    • Windows clients need to be rebooted - if a previously mounted non-dfs share is made a dfs - root or vice versa. A better way is to introduce a - new share and make it the dfs root.

    • Currently there's a restriction that msdfs - symlink names should all be lowercase.

    • For security purposes, the directory - acting as the root of the Dfs tree should have ownership - and permissions set so that only designated users can - modify the symbolic links in the directory.


    Chapter 22. Stackable VFS modules

    22.1. Introduction and configuration

    Since samba 3.0, samba supports stackable VFS(Virtual File System) modules. -Samba passes each request to access the unix file system thru the loaded VFS modules. -This chapter covers all the modules that come with the samba source and references to -some external modules.

    You may have problems to compile these modules, as shared libraries are -compiled and linked in different ways on different systems. -They currently have been tested against GNU/linux and IRIX.

    To use the VFS modules, create a share similar to the one below. The -important parameter is the vfs object parameter which must point to -the exact pathname of the shared library objects. For example, to log all access -to files and use a recycle bin: - -

           [audit]
    -                comment = Audited /data directory
    -                path = /data
    -                vfs object = /path/to/audit.so /path/to/recycle.so
    -                writeable = yes
    -                browseable = yes

    The modules are used in the order they are specified.

    Further documentation on writing VFS modules for Samba can be found in -the Samba Developers Guide.


    22.2. Included modules

    22.2.1. audit

    A simple module to audit file access to the syslog -facility. The following operations are logged: -

    share
    connect/disconnect
    directory opens/create/remove
    file open/close/rename/unlink/chmod


    22.2.2. recycle

    A recycle-bin like modules. When used any unlink call -will be intercepted and files moved to the recycle -directory instead of beeing deleted.

    Supported options: -

    vfs_recycle_bin:repository

    FIXME

    vfs_recycle_bin:keeptree

    FIXME

    vfs_recycle_bin:versions

    FIXME

    vfs_recycle_bin:touch

    FIXME

    vfs_recycle_bin:maxsize

    FIXME

    vfs_recycle_bin:exclude

    FIXME

    vfs_recycle_bin:exclude_dir

    FIXME

    vfs_recycle_bin:noversions

    FIXME


    22.2.3. netatalk

    A netatalk module, that will ease co-existence of samba and -netatalk file sharing services.

    Advantages compared to the old netatalk module: -

    it doesn't care about creating of .AppleDouble forks, just keeps ones in sync
    if share in smb.conf doesn't contain .AppleDouble item in hide or veto list, it will be added automatically


    22.3. VFS modules available elsewhere

    This section contains a listing of various other VFS modules that -have been posted but don't currently reside in the Samba CVS -tree for one reason ot another (e.g. it is easy for the maintainer -to have his or her own CVS tree).

    No statemets about the stability or functionality any module -should be implied due to its presence here.


    22.3.1. DatabaseFS

    URL: http://www.css.tayloru.edu/~elorimer/databasefs/index.php

    By Eric Lorimer.

    I have created a VFS module which implements a fairly complete read-only -filesystem. It presents information from a database as a filesystem in -a modular and generic way to allow different databases to be used -(originally designed for organizing MP3s under directories such as -"Artists," "Song Keywords," etc... I have since applied it to a student -roster database very easily). The directory structure is stored in the -database itself and the module makes no assumptions about the database -structure beyond the table it requires to run.

    Any feedback would be appreciated: comments, suggestions, patches, -etc... If nothing else, hopefully it might prove useful for someone -else who wishes to create a virtual filesystem.


    22.3.2. vscan

    URL: http://www.openantivirus.org/

    samba-vscan is a proof-of-concept module for Samba, which -uses the VFS (virtual file system) features of Samba 2.2.x/3.0 -alphaX. Of couse, Samba has to be compiled with VFS support. -samba-vscan supports various virus scanners and is maintained -by Rainer Link.


    Chapter 23. Securing Samba

    23.1. Introduction

    This note was attached to the Samba 2.2.8 release notes as it contained an -important security fix. The information contained here applies to Samba -installations in general.


    23.2. Using host based protection

    In many installations of Samba the greatest threat comes for outside -your immediate network. By default Samba will accept connections from -any host, which means that if you run an insecure version of Samba on -a host that is directly connected to the Internet you can be -especially vulnerable.

    One of the simplest fixes in this case is to use the 'hosts allow' and -'hosts deny' options in the Samba smb.conf configuration file to only -allow access to your server from a specific range of hosts. An example -might be:

      hosts allow = 127.0.0.1 192.168.2.0/24 192.168.3.0/24
    -  hosts deny = 0.0.0.0/0

    The above will only allow SMB connections from 'localhost' (your own -computer) and from the two private networks 192.168.2 and -192.168.3. All other connections will be refused connections as soon -as the client sends its first packet. The refusal will be marked as a -'not listening on called name' error.


    23.3. Using interface protection

    By default Samba will accept connections on any network interface that -it finds on your system. That means if you have a ISDN line or a PPP -connection to the Internet then Samba will accept connections on those -links. This may not be what you want.

    You can change this behaviour using options like the following:

      interfaces = eth* lo
    -  bind interfaces only = yes

    This tells Samba to only listen for connections on interfaces with a -name starting with 'eth' such as eth0, eth1, plus on the loopback -interface called 'lo'. The name you will need to use depends on what -OS you are using, in the above I used the common name for Ethernet -adapters on Linux.

    If you use the above and someone tries to make a SMB connection to -your host over a PPP interface called 'ppp0' then they will get a TCP -connection refused reply. In that case no Samba code is run at all as -the operating system has been told not to pass connections from that -interface to any process.


    23.4. Using a firewall

    Many people use a firewall to deny access to services that they don't -want exposed outside their network. This can be a very good idea, -although I would recommend using it in conjunction with the above -methods so that you are protected even if your firewall is not active -for some reason.

    If you are setting up a firewall then you need to know what TCP and -UDP ports to allow and block. Samba uses the following:

    UDP/137    - used by nmbd
    -UDP/138    - used by nmbd
    -TCP/139    - used by smbd
    -TCP/445    - used by smbd

    The last one is important as many older firewall setups may not be -aware of it, given that this port was only added to the protocol in -recent years.


    23.5. Using a IPC$ share deny

    If the above methods are not suitable, then you could also place a -more specific deny on the IPC$ share that is used in the recently -discovered security hole. This allows you to offer access to other -shares while denying access to IPC$ from potentially untrustworthy -hosts.

    To do that you could use:

      [ipc$]
    -     hosts allow = 192.168.115.0/24 127.0.0.1
    -     hosts deny = 0.0.0.0/0

    this would tell Samba that IPC$ connections are not allowed from -anywhere but the two listed places (localhost and a local -subnet). Connections to other shares would still be allowed. As the -IPC$ share is the only share that is always accessible anonymously -this provides some level of protection against attackers that do not -know a username/password for your host.

    If you use this method then clients will be given a 'access denied' -reply when they try to access the IPC$ share. That means that those -clients will not be able to browse shares, and may also be unable to -access some other resources.

    This is not recommended unless you cannot use one of the other -methods listed above for some reason.


    23.6. Upgrading Samba

    Please check regularly on http://www.samba.org/ for updates and -important announcements. Occasionally security releases are made and -it is highly recommended to upgrade Samba when a security vulnerability -is discovered.


    Chapter 24. Unicode/Charsets

    24.1. What are charsets and unicode?

    Computers communicate in numbers. In texts, each number will be -translated to a corresponding letter. The meaning that will be assigned -to a certain number depends on the character set(charset) that is used. -A charset can be seen as a table that is used to translate numbers to -letters. Not all computers use the same charset (there are charsets -with German umlauts, Japanese characters, etc). Usually a charset contains -256 characters, which means that storing a character with it takes -exactly one byte.

    There are also charsets that support even more characters, -but those need twice(or even more) as much storage space. These -charsets can contain 256 * 256 = 65536 characters, which -is more then all possible characters one could think of. They are called -multibyte charsets (because they use more then one byte to -store one character).

    A standardised multibyte charset is unicode, info available at -www.unicode.org. -Big advantage of using a multibyte charset is that you only need one; no -need to make sure two computers use the same charset when they are -communicating.

    Old windows clients used to use single-byte charsets, named -'codepages' by microsoft. However, there is no support for -negotiating the charset to be used in the smb protocol. Thus, you -have to make sure you are using the same charset when talking to an old client. -Newer clients (Windows NT, 2K, XP) talk unicode over the wire.


    24.2. Samba and charsets

    As of samba 3.0, samba can (and will) talk unicode over the wire. Internally, -samba knows of three kinds of character sets:

    unix charset

    This is the charset used internally by your operating system. - The default is ASCII, which is fine for most - systems. -

    display charset

    This is the charset samba will use to print messages - on your screen. It should generally be the same as the unix charset. -

    dos charset

    This is the charset samba uses when communicating with - DOS and Windows 9x clients. It will talk unicode to all newer clients. - The default depends on the charsets you have installed on your system. - Run testparm -v | grep "dos charset" to see - what the default is on your system. -

    IV. Appendixes

    Table of Contents
    25. Samba performance issues
    25.1. Comparisons
    25.2. Socket options
    25.3. Read size
    25.4. Max xmit
    25.5. Log level
    25.6. Read raw
    25.7. Write raw
    25.8. Slow Clients
    25.9. Slow Logins
    25.10. Client tuning
    26. Portability
    26.1. HPUX
    26.2. SCO Unix
    26.3. DNIX
    26.4. RedHat Linux Rembrandt-II
    26.5. AIX
    26.5.1. Sequential Read Ahead
    27. Samba and other CIFS clients
    27.1. Macintosh clients?
    27.2. OS2 Client
    27.2.1. How can I configure OS/2 Warp Connect or - OS/2 Warp 4 as a client for Samba?
    27.2.2. How can I configure OS/2 Warp 3 (not Connect), - OS/2 1.2, 1.3 or 2.x for Samba?
    27.2.3. Are there any other issues when OS/2 (any version) - is used as a client?
    27.2.4. How do I get printer driver download working - for OS/2 clients?
    27.3. Windows for Workgroups
    27.3.1. Use latest TCP/IP stack from Microsoft
    27.3.2. Delete .pwl files after password change
    27.3.3. Configure WfW password handling
    27.3.4. Case handling of passwords
    27.3.5. Use TCP/IP as default protocol
    27.4. Windows '95/'98
    27.5. Windows 2000 Service Pack 2
    28. How to compile SAMBA
    28.1. Access Samba source code via CVS
    28.1.1. Introduction
    28.1.2. CVS Access to samba.org
    28.2. Accessing the samba sources via rsync and ftp
    28.3. Building the Binaries
    28.3.1. Compiling samba with Active Directory support
    28.4. Starting the smbd and nmbd
    28.4.1. Starting from inetd.conf
    28.4.2. Alternative: starting it as a daemon
    29. Reporting Bugs
    29.1. Introduction
    29.2. General info
    29.3. Debug levels
    29.4. Internal errors
    29.5. Attaching to a running process
    29.6. Patches
    30. The samba checklist
    30.1. Introduction
    30.2. Assumptions
    30.3. Tests
    30.3.1. Test 1
    30.3.2. Test 2
    30.3.3. Test 3
    30.3.4. Test 4
    30.3.5. Test 5
    30.3.6. Test 6
    30.3.7. Test 7
    30.3.8. Test 8
    30.3.9. Test 9
    30.3.10. Test 10
    30.3.11. Test 11
    30.4. Still having troubles?

    Chapter 25. Samba performance issues

    25.1. Comparisons

    The Samba server uses TCP to talk to the client. Thus if you are -trying to see if it performs well you should really compare it to -programs that use the same protocol. The most readily available -programs for file transfer that use TCP are ftp or another TCP based -SMB server.

    If you want to test against something like a NT or WfWg server then -you will have to disable all but TCP on either the client or -server. Otherwise you may well be using a totally different protocol -(such as Netbeui) and comparisons may not be valid.

    Generally you should find that Samba performs similarly to ftp at raw -transfer speed. It should perform quite a bit faster than NFS, -although this very much depends on your system.

    Several people have done comparisons between Samba and Novell, NFS or -WinNT. In some cases Samba performed the best, in others the worst. I -suspect the biggest factor is not Samba vs some other system but the -hardware and drivers used on the various systems. Given similar -hardware Samba should certainly be competitive in speed with other -systems.


    25.2. Socket options

    There are a number of socket options that can greatly affect the -performance of a TCP based server like Samba.

    The socket options that Samba uses are settable both on the command -line with the -O option, or in the smb.conf file.

    The "socket options" section of the smb.conf manual page describes how -to set these and gives recommendations.

    Getting the socket options right can make a big difference to your -performance, but getting them wrong can degrade it by just as -much. The correct settings are very dependent on your local network.

    The socket option TCP_NODELAY is the one that seems to make the -biggest single difference for most networks. Many people report that -adding "socket options = TCP_NODELAY" doubles the read performance of -a Samba drive. The best explanation I have seen for this is that the -Microsoft TCP/IP stack is slow in sending tcp ACKs.


    25.3. Read size

    The option "read size" affects the overlap of disk reads/writes with -network reads/writes. If the amount of data being transferred in -several of the SMB commands (currently SMBwrite, SMBwriteX and -SMBreadbraw) is larger than this value then the server begins writing -the data before it has received the whole packet from the network, or -in the case of SMBreadbraw, it begins writing to the network before -all the data has been read from disk.

    This overlapping works best when the speeds of disk and network access -are similar, having very little effect when the speed of one is much -greater than the other.

    The default value is 16384, but very little experimentation has been -done yet to determine the optimal value, and it is likely that the best -value will vary greatly between systems anyway. A value over 65536 is -pointless and will cause you to allocate memory unnecessarily.


    25.4. Max xmit

    At startup the client and server negotiate a "maximum transmit" size, -which limits the size of nearly all SMB commands. You can set the -maximum size that Samba will negotiate using the "max xmit = " option -in smb.conf. Note that this is the maximum size of SMB request that -Samba will accept, but not the maximum size that the *client* will accept. -The client maximum receive size is sent to Samba by the client and Samba -honours this limit.

    It defaults to 65536 bytes (the maximum), but it is possible that some -clients may perform better with a smaller transmit unit. Trying values -of less than 2048 is likely to cause severe problems.

    In most cases the default is the best option.


    25.5. Log level

    If you set the log level (also known as "debug level") higher than 2 -then you may suffer a large drop in performance. This is because the -server flushes the log file after each operation, which can be very -expensive.


    25.6. Read raw

    The "read raw" operation is designed to be an optimised, low-latency -file read operation. A server may choose to not support it, -however. and Samba makes support for "read raw" optional, with it -being enabled by default.

    In some cases clients don't handle "read raw" very well and actually -get lower performance using it than they get using the conventional -read operations.

    So you might like to try "read raw = no" and see what happens on your -network. It might lower, raise or not affect your performance. Only -testing can really tell.


    25.7. Write raw

    The "write raw" operation is designed to be an optimised, low-latency -file write operation. A server may choose to not support it, -however. and Samba makes support for "write raw" optional, with it -being enabled by default.

    Some machines may find "write raw" slower than normal write, in which -case you may wish to change this option.


    25.8. Slow Clients

    One person has reported that setting the protocol to COREPLUS rather -than LANMAN2 gave a dramatic speed improvement (from 10k/s to 150k/s).

    I suspect that his PC's (386sx16 based) were asking for more data than -they could chew. I suspect a similar speed could be had by setting -"read raw = no" and "max xmit = 2048", instead of changing the -protocol. Lowering the "read size" might also help.


    25.9. Slow Logins

    Slow logins are almost always due to the password checking time. Using -the lowest practical "password level" will improve things a lot. You -could also enable the "UFC crypt" option in the Makefile.


    25.10. Client tuning

    Often a speed problem can be traced to the client. The client (for -example Windows for Workgroups) can often be tuned for better TCP -performance.

    See your client docs for details. In particular, I have heard rumours -that the WfWg options TCPWINDOWSIZE and TCPSEGMENTSIZE can have a -large impact on performance.

    Also note that some people have found that setting DefaultRcvWindow in -the [MSTCP] section of the SYSTEM.INI file under WfWg to 3072 gives a -big improvement. I don't know why.

    My own experience wth DefaultRcvWindow is that I get much better -performance with a large value (16384 or larger). Other people have -reported that anything over 3072 slows things down enourmously. One -person even reported a speed drop of a factor of 30 when he went from -3072 to 8192. I don't know why.

    It probably depends a lot on your hardware, and the type of unix box -you have at the other end of the link.

    Paul Cochrane has done some testing on client side tuning and come -to the following conclusions:

    Install the W2setup.exe file from www.microsoft.com. This is an -update for the winsock stack and utilities which improve performance.

    Configure the win95 TCPIP registry settings to give better -perfomance. I use a program called MTUSPEED.exe which I got off the -net. There are various other utilities of this type freely available. -The setting which give the best performance for me are:

    1. MaxMTU Remove

    2. RWIN Remove

    3. MTUAutoDiscover Disable

    4. MTUBlackHoleDetect Disable

    5. Time To Live Enabled

    6. Time To Live - HOPS 32

    7. NDI Cache Size 0

    I tried virtually all of the items mentioned in the document and -the only one which made a difference to me was the socket options. It -turned out I was better off without any!!!!!

    In terms of overall speed of transfer, between various win95 clients -and a DX2-66 20MB server with a crappy NE2000 compatible and old IDE -drive (Kernel 2.0.30). The transfer rate was reasonable for 10 baseT.

    The figures are:          Put              Get 
    -P166 client 3Com card:    420-440kB/s      500-520kB/s
    -P100 client 3Com card:    390-410kB/s      490-510kB/s
    -DX4-75 client NE2000:     370-380kB/s      330-350kB/s

    I based these test on transfer two files a 4.5MB text file and a 15MB -textfile. The results arn't bad considering the hardware Samba is -running on. It's a crap machine!!!!

    The updates mentioned in 1 and 2 brought up the transfer rates from -just over 100kB/s in some clients.

    A new client is a P333 connected via a 100MB/s card and hub. The -transfer rates from this were good: 450-500kB/s on put and 600+kB/s -on get.

    Looking at standard FTP throughput, Samba is a bit slower (100kB/s -upwards). I suppose there is more going on in the samba protocol, but -if it could get up to the rate of FTP the perfomance would be quite -staggering.


    Chapter 26. Portability

    Samba works on a wide range of platforms but the interface all the -platforms provide is not always compatible. This chapter contains -platform-specific information about compiling and using samba.


    26.1. HPUX

    HP's implementation of supplementary groups is, er, non-standard (for -hysterical reasons). There are two group files, /etc/group and -/etc/logingroup; the system maps UIDs to numbers using the former, but -initgroups() reads the latter. Most system admins who know the ropes -symlink /etc/group to /etc/logingroup (hard link doesn't work for reasons -too stupid to go into here). initgroups() will complain if one of the -groups you're in in /etc/logingroup has what it considers to be an invalid -ID, which means outside the range [0..UID_MAX], where UID_MAX is (I think) -60000 currently on HP-UX. This precludes -2 and 65534, the usual 'nobody' -GIDs.

    If you encounter this problem, make sure that the programs that are failing -to initgroups() be run as users not in any groups with GIDs outside the -allowed range.

    This is documented in the HP manual pages under setgroups(2) and passwd(4).

    On HPUX you must use gcc or the HP Ansi compiler. The free compiler -that comes with HP-UX is not Ansi compliant and cannot compile -Samba.


    26.2. SCO Unix

    -If you run an old version of SCO Unix then you may need to get important -TCP/IP patches for Samba to work correctly. Without the patch, you may -encounter corrupt data transfers using samba.

    The patch you need is UOD385 Connection Drivers SLS. It is available from -SCO (ftp.sco.com, directory SLS, files uod385a.Z and uod385a.ltr.Z).


    26.3. DNIX

    DNIX has a problem with seteuid() and setegid(). These routines are -needed for Samba to work correctly, but they were left out of the DNIX -C library for some reason.

    For this reason Samba by default defines the macro NO_EID in the DNIX -section of includes.h. This works around the problem in a limited way, -but it is far from ideal, some things still won't work right.

    -To fix the problem properly you need to assemble the following two -functions and then either add them to your C library or link them into -Samba.

    -put this in the file setegid.s:

            .globl  _setegid
    -_setegid:
    -        moveq   #47,d0
    -        movl    #100,a0
    -        moveq   #1,d1
    -        movl    4(sp),a1
    -        trap    #9
    -        bccs    1$
    -        jmp     cerror
    -1$:
    -        clrl    d0
    -        rts

    put this in the file seteuid.s:

            .globl  _seteuid
    -_seteuid:
    -        moveq   #47,d0
    -        movl    #100,a0
    -        moveq   #0,d1
    -        movl    4(sp),a1
    -        trap    #9
    -        bccs    1$
    -        jmp     cerror
    -1$:
    -        clrl    d0
    -        rts

    after creating the above files you then assemble them using

    as seteuid.s

    as setegid.s

    that should produce the files seteuid.o and -setegid.o

    then you need to add these to the LIBSM line in the DNIX section of -the Samba Makefile. Your LIBSM line will then look something like this:

    LIBSM = setegid.o seteuid.o -ln

    -You should then remove the line:

    #define NO_EID

    from the DNIX section of includes.h


    26.4. RedHat Linux Rembrandt-II

    By default RedHat Rembrandt-II during installation adds an -entry to /etc/hosts as follows: -

    	127.0.0.1 loopback "hostname"."domainname"

    This causes Samba to loop back onto the loopback interface. -The result is that Samba fails to communicate correctly with -the world and therefor may fail to correctly negotiate who -is the master browse list holder and who is the master browser.

    Corrective Action: Delete the entry after the word loopback - in the line starting 127.0.0.1


    26.5. AIX

    26.5.1. Sequential Read Ahead

    Disabling Sequential Read Ahead using "vmtune -r 0" improves -samba performance significally.


    Chapter 27. Samba and other CIFS clients

    This chapter contains client-specific information.


    27.1. Macintosh clients?

    Yes. Thursby now have a CIFS Client / Server called DAVE - see

    They test it against Windows 95, Windows NT and samba for -compatibility issues. At the time of writing, DAVE was at version -1.0.1. The 1.0.0 to 1.0.1 update is available as a free download from -the Thursby web site (the speed of finder copies has been greatly -enhanced, and there are bug-fixes included).

    -Alternatives - There are two free implementations of AppleTalk for -several kinds of UNIX machnes, and several more commercial ones. -These products allow you to run file services and print services -natively to Macintosh users, with no additional support required on -the Macintosh. The two free omplementations are -Netatalk, and -CAP. -What Samba offers MS -Windows users, these packages offer to Macs. For more info on these -packages, Samba, and Linux (and other UNIX-based systems) see -http://www.eats.com/linux_mac_win.html


    27.2. OS2 Client

    27.2.1. How can I configure OS/2 Warp Connect or - OS/2 Warp 4 as a client for Samba?

    A more complete answer to this question can be - found on http://carol.wins.uva.nl/~leeuw/samba/warp.html.

    Basically, you need three components:

    • The File and Print Client ('IBM Peer') -

    • TCP/IP ('Internet support') -

    • The "NetBIOS over TCP/IP" driver ('TCPBEUI') -

    Installing the first two together with the base operating - system on a blank system is explained in the Warp manual. If Warp - has already been installed, but you now want to install the - networking support, use the "Selective Install for Networking" - object in the "System Setup" folder.

    Adding the "NetBIOS over TCP/IP" driver is not described - in the manual and just barely in the online documentation. Start - MPTS.EXE, click on OK, click on "Configure LAPS" and click - on "IBM OS/2 NETBIOS OVER TCP/IP" in 'Protocols'. This line - is then moved to 'Current Configuration'. Select that line, - click on "Change number" and increase it from 0 to 1. Save this - configuration.

    If the Samba server(s) is not on your local subnet, you - can optionally add IP names and addresses of these servers - to the "Names List", or specify a WINS server ('NetBIOS - Nameserver' in IBM and RFC terminology). For Warp Connect you - may need to download an update for 'IBM Peer' to bring it on - the same level as Warp 4. See the webpage mentioned above.


    27.2.2. How can I configure OS/2 Warp 3 (not Connect), - OS/2 1.2, 1.3 or 2.x for Samba?

    You can use the free Microsoft LAN Manager 2.2c Client - for OS/2 from - ftp://ftp.microsoft.com/BusSys/Clients/LANMAN.OS2/. - See http://carol.wins.uva.nl/~leeuw/lanman.html for - more information on how to install and use this client. In - a nutshell, edit the file \OS2VER in the root directory of - the OS/2 boot partition and add the lines:

    		20=setup.exe
    -		20=netwksta.sys
    -		20=netvdd.sys
    -		

    before you install the client. Also, don't use the - included NE2000 driver because it is buggy. Try the NE2000 - or NS2000 driver from - ftp://ftp.cdrom.com/pub/os2/network/ndis/ instead. -


    27.2.3. Are there any other issues when OS/2 (any version) - is used as a client?

    When you do a NET VIEW or use the "File and Print - Client Resource Browser", no Samba servers show up. This can - be fixed by a patch from http://carol.wins.uva.nl/~leeuw/samba/fix.html. - The patch will be included in a later version of Samba. It also - fixes a couple of other problems, such as preserving long - filenames when objects are dragged from the Workplace Shell - to the Samba server.


    27.2.4. How do I get printer driver download working - for OS/2 clients?

    First, create a share called [PRINTDRV] that is - world-readable. Copy your OS/2 driver files there. Note - that the .EA_ files must still be separate, so you will need - to use the original install files, and not copy an installed - driver from an OS/2 system.

    Install the NT driver first for that printer. Then, - add to your smb.conf a parameter, os2 driver map = - filename". Then, in the file - specified by filename, map the - name of the NT driver name to the OS/2 driver name as - follows:

    nt driver name = os2 "driver - name"."device name", e.g.: - HP LaserJet 5L = LASERJET.HP LaserJet 5L

    You can have multiple drivers mapped in this file.

    If you only specify the OS/2 driver name, and not the - device name, the first attempt to download the driver will - actually download the files, but the OS/2 client will tell - you the driver is not available. On the second attempt, it - will work. This is fixed simply by adding the device name - to the mapping, after which it will work on the first attempt. -


    27.3. Windows for Workgroups

    27.3.1. Use latest TCP/IP stack from Microsoft

    Use the latest TCP/IP stack from microsoft if you use Windows -for workgroups.

    The early TCP/IP stacks had lots of bugs.

    -Microsoft has released an incremental upgrade to their TCP/IP 32-Bit -VxD drivers. The latest release can be found on their ftp site at -ftp.microsoft.com, located in /peropsys/windows/public/tcpip/wfwt32.exe. -There is an update.txt file there that describes the problems that were -fixed. New files include WINSOCK.DLL, TELNET.EXE, WSOCK.386, VNBT.386, -WSTCP.386, TRACERT.EXE, NETSTAT.EXE, and NBTSTAT.EXE.


    27.3.2. Delete .pwl files after password change

    WfWg does a lousy job with passwords. I find that if I change my -password on either the unix box or the PC the safest thing to do is to -delete the .pwl files in the windows directory. The PC will complain about not finding the files, but will soon get over it, allowing you to enter the new password.

    -If you don't do this you may find that WfWg remembers and uses the old -password, even if you told it a new one.

    -Often WfWg will totally ignore a password you give it in a dialog box.


    27.3.3. Configure WfW password handling

    There is a program call admincfg.exe -on the last disk (disk 8) of the WFW 3.11 disk set. To install it -type EXPAND A:\ADMINCFG.EX_ C:\WINDOWS\ADMINCFG.EXE Then add an icon -for it via the "Progam Manager" "New" Menu. This program allows you -to control how WFW handles passwords. ie disable Password Caching etc -for use with security = user


    27.3.4. Case handling of passwords

    Windows for Workgroups uppercases the password before sending it to the server. Unix passwords can be case-sensitive though. Check the smb.conf(5) information on password level to specify what characters samba should try to uppercase when checking.


    27.3.5. Use TCP/IP as default protocol

    To support print queue reporting you may find -that you have to use TCP/IP as the default protocol under -WfWg. For some reason if you leave Netbeui as the default -it may break the print queue reporting on some systems. -It is presumably a WfWg bug.


    27.4. Windows '95/'98

    When using Windows 95 OEM SR2 the following updates are recommended where Samba -is being used. Please NOTE that the above change will affect you once these -updates have been installed.

    -There are more updates than the ones mentioned here. You are referred to the -Microsoft Web site for all currently available updates to your specific version -of Windows 95.

    1. Kernel Update: KRNLUPD.EXE

    2. Ping Fix: PINGUPD.EXE

    3. RPC Update: RPCRTUPD.EXE

    4. TCP/IP Update: VIPUPD.EXE

    5. Redirector Update: VRDRUPD.EXE

    Also, if using MS OutLook it is desirable to install the OLEUPD.EXE fix. This -fix may stop your machine from hanging for an extended period when exiting -OutLook and you may also notice a significant speedup when accessing network -neighborhood services.


    27.5. Windows 2000 Service Pack 2

    -There are several annoyances with Windows 2000 SP2. One of which -only appears when using a Samba server to host user profiles -to Windows 2000 SP2 clients in a Windows domain. This assumes -that Samba is a member of the domain, but the problem will -likely occur if it is not.

    -In order to server profiles successfully to Windows 2000 SP2 -clients (when not operating as a PDC), Samba must have -nt acl support = no -added to the file share which houses the roaming profiles. -If this is not done, then the Windows 2000 SP2 client will -complain about not being able to access the profile (Access -Denied) and create multiple copies of it on disk (DOMAIN.user.001, -DOMAIN.user.002, etc...). See the -smb.conf(5) man page -for more details on this option. Also note that the -nt acl support parameter was formally a global parameter in -releases prior to Samba 2.2.2.

    -The following is a minimal profile share:

    	[profile]
    -		path = /export/profile
    -		create mask = 0600
    -		directory mask = 0700
    -		nt acl support = no
    -		read only = no

    The reason for this bug is that the Win2k SP2 client copies -the security descriptor for the profile which contains -the Samba server's SID, and not the domain SID. The client -compares the SID for SAMBA\user and realizes it is -different that the one assigned to DOMAIN\user. Hence the reason -for the "access denied" message.

    By disabling the nt acl support parameter, Samba will send -the Win2k client a response to the QuerySecurityDescriptor -trans2 call which causes the client to set a default ACL -for the profile. This default ACL includes

    DOMAIN\user "Full Control"

    NOTE : This bug does not occur when using winbind to -create accounts on the Samba host for Domain users.


    Chapter 28. How to compile SAMBA

    You can obtain the samba source from the samba website. To obtain a development version, -you can download samba from CVS or using rsync.


    28.1. Access Samba source code via CVS

    28.1.1. Introduction

    Samba is developed in an open environment. Developers use CVS -(Concurrent Versioning System) to "checkin" (also known as -"commit") new source code. Samba's various CVS branches can -be accessed via anonymous CVS using the instructions -detailed in this chapter.

    This chapter is a modified version of the instructions found at -http://samba.org/samba/cvs.html


    28.1.2. CVS Access to samba.org

    The machine samba.org runs a publicly accessible CVS -repository for access to the source code of several packages, -including samba, rsync and jitterbug. There are two main ways of -accessing the CVS server on this host.


    28.1.2.1. Access via CVSweb

    You can access the source code via your -favourite WWW browser. This allows you to access the contents of -individual files in the repository and also to look at the revision -history and commit logs of individual files. You can also ask for a diff -listing between any two versions on the repository.

    Use the URL : http://samba.org/cgi-bin/cvsweb


    28.1.2.2. Access via cvs

    You can also access the source code via a -normal cvs client. This gives you much more control over you can -do with the repository and allows you to checkout whole source trees -and keep them up to date via normal cvs commands. This is the -preferred method of access if you are a developer and not -just a casual browser.

    To download the latest cvs source code, point your -browser at the URL : http://www.cyclic.com/. -and click on the 'How to get cvs' link. CVS is free software under -the GNU GPL (as is Samba). Note that there are several graphical CVS clients -which provide a graphical interface to the sometimes mundane CVS commands. -Links to theses clients are also available from http://www.cyclic.com.

    To gain access via anonymous cvs use the following steps. -For this example it is assumed that you want a copy of the -samba source code. For the other source code repositories -on this system just substitute the correct package name

    1. Install a recent copy of cvs. All you really need is a - copy of the cvs client binary. -

    2. Run the command -

      cvs -d :pserver:cvs@samba.org:/cvsroot login -

      When it asks you for a password type cvs. -

    3. Run the command -

      cvs -d :pserver:cvs@samba.org:/cvsroot co samba -

      This will create a directory called samba containing the - latest samba source code (i.e. the HEAD tagged cvs branch). This - currently corresponds to the 3.0 development tree. -

      CVS branches other HEAD can be obtained by using the -r - and defining a tag name. A list of branch tag names can be found on the - "Development" page of the samba web site. A common request is to obtain the - latest 2.2 release code. This could be done by using the following command. -

      cvs -d :pserver:cvs@samba.org:/cvsroot co -r SAMBA_2_2 samba -

    4. Whenever you want to merge in the latest code changes use - the following command from within the samba directory: -

      cvs update -d -P -


    28.2. Accessing the samba sources via rsync and ftp

    pserver.samba.org also exports unpacked copies of most parts of the CVS tree at ftp://pserver.samba.org/pub/unpacked and also via anonymous rsync at rsync://pserver.samba.org/ftp/unpacked/. I recommend using rsync rather than ftp. - See the rsync homepage for more info on rsync. -

    The disadvantage of the unpacked trees - is that they do not support automatic - merging of local changes like CVS does. - rsync access is most convenient for an - initial install. -


    28.3. Building the Binaries

    To do this, first run the program ./configure - in the source directory. This should automatically - configure Samba for your operating system. If you have unusual - needs then you may wish to run

    root# ./configure --help -

    first to see what special options you can enable. - Then executing

    root# make

    will create the binaries. Once it's successfully - compiled you can use

    root# make install

    to install the binaries and manual pages. You can - separately install the binaries and/or man pages using

    root# make installbin -

    and

    root# make installman -

    Note that if you are upgrading for a previous version - of Samba you might like to know that the old versions of - the binaries will be renamed with a ".old" extension. You - can go back to the previous version with

    root# make revert -

    if you find this version a disaster!


    28.3.1. Compiling samba with Active Directory support

    In order to compile samba with ADS support, you need to have installed - on your system: -

    the MIT kerberos development libraries (either install from the sources or use a package). The heimdal libraries will not work.
    the OpenLDAP development libraries.

    - -

    If your kerberos libraries are in a non-standard location then - remember to add the configure option --with-krb5=DIR.

    After you run configure make sure that include/config.h it generates contains lines like this:

    #define HAVE_KRB5 1
    -#define HAVE_LDAP 1
    -		  

    If it doesn't then configure did not find your krb5 libraries or - your ldap libraries. Look in config.log to figure out why and fix - it.


    28.3.1.1. Installing the required packages for Debian

    On Debian you need to install the following packages:

    libkrb5-dev
    krb5-user

    -


    28.3.1.2. Installing the required packages for RedHat

    On RedHat this means you should have at least:

    krb5-workstation (for kinit)
    krb5-libs (for linking with)
    krb5-devel (because you are compiling from source)

    -

    in addition to the standard development environment.

    Note that these are not standard on a RedHat install, and you may need - to get them off CD2.


    28.4. Starting the smbd and nmbd

    You must choose to start smbd and nmbd either - as daemons or from inetd. Don't try - to do both! Either you can put them in inetd.conf and have them started on demand - by inetd, or you can start them as - daemons either from the command line or in /etc/rc.local. See the man pages for details - on the command line options. Take particular care to read - the bit about what user you need to be in order to start - Samba. In many cases you must be root.

    The main advantage of starting smbd - and nmbd using the recommended daemon method - is that they will respond slightly more quickly to an initial connection - request.


    28.4.1. Starting from inetd.conf

    NOTE; The following will be different if - you use NIS, NIS+ or LDAP to distribute services maps.

    Look at your /etc/services. - What is defined at port 139/tcp. If nothing is defined - then add a line like this:

    netbios-ssn 139/tcp

    similarly for 137/udp you should have an entry like:

    netbios-ns 137/udp

    Next edit your /etc/inetd.conf - and add two lines something like this:

    		netbios-ssn stream tcp nowait root /usr/local/samba/bin/smbd smbd 
    -		netbios-ns dgram udp wait root /usr/local/samba/bin/nmbd nmbd 
    -		

    The exact syntax of /etc/inetd.conf - varies between unixes. Look at the other entries in inetd.conf - for a guide.

    NOTE: Some unixes already have entries like netbios_ns - (note the underscore) in /etc/services. - You must either edit /etc/services or - /etc/inetd.conf to make them consistent.

    NOTE: On many systems you may need to use the - "interfaces" option in smb.conf to specify the IP address - and netmask of your interfaces. Run ifconfig - as root if you don't know what the broadcast is for your - net. nmbd tries to determine it at run - time, but fails on some unixes. See the section on "testing nmbd" - for a method of finding if you need to do this.

    !!!WARNING!!! Many unixes only accept around 5 - parameters on the command line in inetd.conf. - This means you shouldn't use spaces between the options and - arguments, or you should use a script, and start the script - from inetd.

    Restart inetd, perhaps just send - it a HUP. If you have installed an earlier version of nmbd then you may need to kill nmbd as well.


    28.4.2. Alternative: starting it as a daemon

    To start the server as a daemon you should create - a script something like this one, perhaps calling - it startsmb.

    		#!/bin/sh
    -		/usr/local/samba/bin/smbd -D 
    -		/usr/local/samba/bin/nmbd -D 
    -		

    then make it executable with chmod - +x startsmb

    You can then run startsmb by - hand or execute it from /etc/rc.local -

    To kill it send a kill signal to the processes - nmbd and smbd.

    NOTE: If you use the SVR4 style init system then - you may like to look at the examples/svr4-startup - script to make Samba fit into that system.


    Chapter 29. Reporting Bugs

    29.1. Introduction

    The email address for bug reports for stable releases is samba@samba.org. -Bug reports for alpha releases should go to samba-technical@samba.org.

    Please take the time to read this file before you submit a bug -report. Also, please see if it has changed between releases, as we -may be changing the bug reporting mechanism at some time.

    Please also do as much as you can yourself to help track down the -bug. Samba is maintained by a dedicated group of people who volunteer -their time, skills and efforts. We receive far more mail about it than -we can possibly answer, so you have a much higher chance of an answer -and a fix if you send us a "developer friendly" bug report that lets -us fix it fast.

    Do not assume that if you post the bug to the comp.protocols.smb -newsgroup or the mailing list that we will read it. If you suspect that your -problem is not a bug but a configuration problem then it is better to send -it to the Samba mailing list, as there are (at last count) 5000 other users on -that list that may be able to help you.

    You may also like to look though the recent mailing list archives, -which are conveniently accessible on the Samba web pages -at http://samba.org/samba/.


    29.2. General info

    Before submitting a bug report check your config for silly -errors. Look in your log files for obvious messages that tell you that -you've misconfigured something and run testparm to test your config -file for correct syntax.

    Have you run through the diagnosis? -This is very important.

    If you include part of a log file with your bug report then be sure to -annotate it with exactly what you were doing on the client at the -time, and exactly what the results were.


    29.3. Debug levels

    If the bug has anything to do with Samba behaving incorrectly as a -server (like refusing to open a file) then the log files will probably -be very useful. Depending on the problem a log level of between 3 and -10 showing the problem may be appropriate. A higher level givesmore -detail, but may use too much disk space.

    To set the debug level use log level = in your -smb.conf. You may also find it useful to set the log -level higher for just one machine and keep separate logs for each machine. -To do this use:

    log level = 10
    -log file = /usr/local/samba/lib/log.%m
    -include = /usr/local/samba/lib/smb.conf.%m

    then create a file -/usr/local/samba/lib/smb.conf.machine where -"machine" is the name of the client you wish to debug. In that file -put any smb.conf commands you want, for example -log level= may be useful. This also allows you to -experiment with different security systems, protocol levels etc on just -one machine.

    The smb.conf entry log level = -is synonymous with the entry debuglevel = that has been -used in older versions of Samba and is being retained for backwards -compatibility of smb.conf files.

    As the log level = value is increased you will record -a significantly increasing level of debugging information. For most -debugging operations you may not need a setting higher than 3. Nearly -all bugs can be tracked at a setting of 10, but be prepared for a VERY -large volume of log data.


    29.4. Internal errors

    If you get a "INTERNAL ERROR" message in your log files it means that -Samba got an unexpected signal while running. It is probably a -segmentation fault and almost certainly means a bug in Samba (unless -you have faulty hardware or system software)

    If the message came from smbd then it will probably be accompanied by -a message which details the last SMB message received by smbd. This -info is often very useful in tracking down the problem so please -include it in your bug report.

    You should also detail how to reproduce the problem, if -possible. Please make this reasonably detailed.

    You may also find that a core file appeared in a "corefiles" -subdirectory of the directory where you keep your samba log -files. This file is the most useful tool for tracking down the bug. To -use it you do this:

    gdb smbd core

    adding appropriate paths to smbd and core so gdb can find them. If you -don't have gdb then try "dbx". Then within the debugger use the -command "where" to give a stack trace of where the problem -occurred. Include this in your mail.

    If you known any assembly language then do a "disass" of the routine -where the problem occurred (if its in a library routine then -disassemble the routine that called it) and try to work out exactly -where the problem is by looking at the surrounding code. Even if you -don't know assembly then incuding this info in the bug report can be -useful.


    29.5. Attaching to a running process

    Unfortunately some unixes (in particular some recent linux kernels) -refuse to dump a core file if the task has changed uid (which smbd -does often). To debug with this sort of system you could try to attach -to the running process using "gdb smbd PID" where you get PID from -smbstatus. Then use "c" to continue and try to cause the core dump -using the client. The debugger should catch the fault and tell you -where it occurred.


    29.6. Patches

    The best sort of bug report is one that includes a fix! If you send us -patches please use diff -u format if your version of -diff supports it, otherwise use diff -c4. Make sure -your do the diff against a clean version of the source and let me know -exactly what version you used.


    Chapter 30. The samba checklist

    30.1. Introduction

    This file contains a list of tests you can perform to validate your -Samba server. It also tells you what the likely cause of the problem -is if it fails any one of these steps. If it passes all these tests -then it is probably working fine.

    You should do ALL the tests, in the order shown. We have tried to -carefully choose them so later tests only use capabilities verified in -the earlier tests.

    If you send one of the samba mailing lists an email saying "it doesn't work" -and you have not followed this test procedure then you should not be surprised -your email is ignored.


    30.2. Assumptions

    In all of the tests it is assumed you have a Samba server called -BIGSERVER and a PC called ACLIENT both in workgroup TESTGROUP.

    The procedure is similar for other types of clients.

    It is also assumed you know the name of an available share in your -smb.conf. I will assume this share is called "tmp". You can add a -"tmp" share like by adding the following to smb.conf:

    
[tmp]
    - comment = temporary files 
    - path = /tmp
    - read only = yes

    THESE TESTS ASSUME VERSION 3.0.0 OR LATER OF THE SAMBA SUITE. SOME -COMMANDS SHOWN DID NOT EXIST IN EARLIER VERSIONS

    Please pay attention to the error messages you receive. If any error message -reports that your server is being unfriendly you should first check that you -IP name resolution is correctly set up. eg: Make sure your /etc/resolv.conf -file points to name servers that really do exist.

    Also, if you do not have DNS server access for name resolution please check -that the settings for your smb.conf file results in "dns proxy = no". The -best way to check this is with "testparm smb.conf"


    30.3. Tests

    30.3.1. Test 1

    In the directory in which you store your smb.conf file, run the command -"testparm smb.conf". If it reports any errors then your smb.conf -configuration file is faulty.

    Note: Your smb.conf file may be located in: /etc/samba - Or in: /usr/local/samba/lib


    30.3.2. Test 2

    Run the command "ping BIGSERVER" from the PC and "ping ACLIENT" from -the unix box. If you don't get a valid response then your TCP/IP -software is not correctly installed.

    Note that you will need to start a "dos prompt" window on the PC to -run ping.

    If you get a message saying "host not found" or similar then your DNS -software or /etc/hosts file is not correctly setup. It is possible to -run samba without DNS entries for the server and client, but I assume -you do have correct entries for the remainder of these tests.

    Another reason why ping might fail is if your host is running firewall -software. You will need to relax the rules to let in the workstation -in question, perhaps by allowing access from another subnet (on Linux -this is done via the ipfwadm program.)


    30.3.3. Test 3

    Run the command "smbclient -L BIGSERVER" on the unix box. You -should get a list of available shares back.

    If you get a error message containing the string "Bad password" then -you probably have either an incorrect "hosts allow", "hosts deny" or -"valid users" line in your smb.conf, or your guest account is not -valid. Check what your guest account is using "testparm" and -temporarily remove any "hosts allow", "hosts deny", "valid users" or -"invalid users" lines.

    If you get a "connection refused" response then the smbd server may -not be running. If you installed it in inetd.conf then you probably edited -that file incorrectly. If you installed it as a daemon then check that -it is running, and check that the netbios-ssn port is in a LISTEN -state using "netstat -a".

    If you get a "session request failed" then the server refused the -connection. If it says "Your server software is being unfriendly" then -its probably because you have invalid command line parameters to smbd, -or a similar fatal problem with the initial startup of smbd. Also -check your config file (smb.conf) for syntax errors with "testparm" -and that the various directories where samba keeps its log and lock -files exist.

    There are a number of reasons for which smbd may refuse or decline -a session request. The most common of these involve one or more of -the following smb.conf file entries:

    	hosts deny = ALL
    -	hosts allow = xxx.xxx.xxx.xxx/yy
    -	bind interfaces only = Yes

    In the above, no allowance has been made for any session requests that -will automatically translate to the loopback adaptor address 127.0.0.1. -To solve this problem change these lines to:

    	hosts deny = ALL
    -	hosts allow = xxx.xxx.xxx.xxx/yy 127.

    Do NOT use the "bind interfaces only" parameter where you may wish to -use the samba password change facility, or where smbclient may need to -access local service for name resolution or for local resource -connections. (Note: the "bind interfaces only" parameter deficiency -where it will not allow connections to the loopback address will be -fixed soon).

    Another common cause of these two errors is having something already running -on port 139, such as Samba (ie: smbd is running from inetd already) or -something like Digital's Pathworks. Check your inetd.conf file before trying -to start smbd as a daemon, it can avoid a lot of frustration!

    And yet another possible cause for failure of TEST 3 is when the subnet mask -and / or broadcast address settings are incorrect. Please check that the -network interface IP Address / Broadcast Address / Subnet Mask settings are -correct and that Samba has correctly noted these in the log.nmb file.


    30.3.4. Test 4

    Run the command "nmblookup -B BIGSERVER __SAMBA__". You should get the -IP address of your Samba server back.

    If you don't then nmbd is incorrectly installed. Check your inetd.conf -if you run it from there, or that the daemon is running and listening -to udp port 137.

    One common problem is that many inetd implementations can't take many -parameters on the command line. If this is the case then create a -one-line script that contains the right parameters and run that from -inetd.


    30.3.5. Test 5

    run the command nmblookup -B ACLIENT '*'

    You should get the PCs IP address back. If you don't then the client -software on the PC isn't installed correctly, or isn't started, or you -got the name of the PC wrong.

    If ACLIENT doesn't resolve via DNS then use the IP address of the -client in the above test.


    30.3.6. Test 6

    Run the command nmblookup -d 2 '*'

    This time we are trying the same as the previous test but are trying -it via a broadcast to the default broadcast address. A number of -Netbios/TCPIP hosts on the network should respond, although Samba may -not catch all of the responses in the short time it listens. You -should see "got a positive name query response" messages from several -hosts.

    If this doesn't give a similar result to the previous test then -nmblookup isn't correctly getting your broadcast address through its -automatic mechanism. In this case you should experiment use the -"interfaces" option in smb.conf to manually configure your IP -address, broadcast and netmask.

    If your PC and server aren't on the same subnet then you will need to -use the -B option to set the broadcast address to the that of the PCs -subnet.

    This test will probably fail if your subnet mask and broadcast address are -not correct. (Refer to TEST 3 notes above).


    30.3.7. Test 7

    Run the command smbclient //BIGSERVER/TMP. You should -then be prompted for a password. You should use the password of the account -you are logged into the unix box with. If you want to test with -another account then add the -U >accountname< option to the end of -the command line. eg: -smbclient //bigserver/tmp -Ujohndoe

    Note: It is possible to specify the password along with the username -as follows: -smbclient //bigserver/tmp -Ujohndoe%secret

    Once you enter the password you should get the "smb>" prompt. If you -don't then look at the error message. If it says "invalid network -name" then the service "tmp" is not correctly setup in your smb.conf.

    If it says "bad password" then the likely causes are:

    1. you have shadow passords (or some other password system) but didn't - compile in support for them in smbd -

    2. your "valid users" configuration is incorrect -

    3. you have a mixed case password and you haven't enabled the "password - level" option at a high enough level -

    4. the "path =" line in smb.conf is incorrect. Check it with testparm -

    5. you enabled password encryption but didn't create the SMB encrypted - password file -

    Once connected you should be able to use the commands -dir get put etc. -Type help >command< for instructions. You should -especially check that the amount of free disk space shown is correct -when you type dir.


    30.3.8. Test 8

    On the PC type the command net view \\BIGSERVER. You will -need to do this from within a "dos prompt" window. You should get back a -list of available shares on the server.

    If you get a "network name not found" or similar error then netbios -name resolution is not working. This is usually caused by a problem in -nmbd. To overcome it you could do one of the following (you only need -to choose one of them):

    1. fixup the nmbd installation

    2. add the IP address of BIGSERVER to the "wins server" box in the - advanced tcp/ip setup on the PC.

    3. enable windows name resolution via DNS in the advanced section of - the tcp/ip setup

    4. add BIGSERVER to your lmhosts file on the PC.

    If you get a "invalid network name" or "bad password error" then the -same fixes apply as they did for the "smbclient -L" test above. In -particular, make sure your "hosts allow" line is correct (see the man -pages)

    Also, do not overlook that fact that when the workstation requests the -connection to the samba server it will attempt to connect using the -name with which you logged onto your Windows machine. You need to make -sure that an account exists on your Samba server with that exact same -name and password.

    If you get "specified computer is not receiving requests" or similar -it probably means that the host is not contactable via tcp services. -Check to see if the host is running tcp wrappers, and if so add an entry in -the hosts.allow file for your client (or subnet, etc.)


    30.3.9. Test 9

    Run the command net use x: \\BIGSERVER\TMP. You should -be prompted for a password then you should get a "command completed -successfully" message. If not then your PC software is incorrectly -installed or your smb.conf is incorrect. make sure your "hosts allow" -and other config lines in smb.conf are correct.

    It's also possible that the server can't work out what user name to -connect you as. To see if this is the problem add the line "user = -USERNAME" to the [tmp] section of smb.conf where "USERNAME" is the -username corresponding to the password you typed. If you find this -fixes things you may need the username mapping option.

    It might also be the case that your client only sends encrypted passwords -and you have encrypt passwords = no in smb.conf. -Turn it back on to fix.


    30.3.10. Test 10

    Run the command nmblookup -M TESTGROUP where -TESTGROUP is the name of the workgroup that your Samba server and -Windows PCs belong to. You should get back the IP address of the -master browser for that workgroup.

    If you don't then the election process has failed. Wait a minute to -see if it is just being slow then try again. If it still fails after -that then look at the browsing options you have set in smb.conf. Make -sure you have preferred master = yes to ensure that -an election is held at startup.


    30.3.11. Test 11

    From file manager try to browse the server. Your samba server should -appear in the browse list of your local workgroup (or the one you -specified in smb.conf). You should be able to double click on the name -of the server and get a list of shares. If you get a "invalid -password" error when you do then you are probably running WinNT and it -is refusing to browse a server that has no encrypted password -capability and is in user level security mode. In this case either set -security = server AND -password server = Windows_NT_Machine in your -smb.conf file, or enable encrypted passwords AFTER compiling in support -for encrypted passwords (refer to the Makefile).


    30.4. Still having troubles?

    Try the mailing list or newsgroup, or use the ethereal utility to -sniff the problem. The official samba mailing list can be reached at -samba@samba.org. To find -out more about samba and how to subscribe to the mailing list check -out the samba web page at -http://samba.org/samba

    Also look at the other docs in the Samba package!

    \ No newline at end of file diff --git a/docs/htmldocs/ads.html b/docs/htmldocs/ads.html index f37bbf0abc6..26ec1d04a79 100644 --- a/docs/htmldocs/ads.html +++ b/docs/htmldocs/ads.html @@ -5,7 +5,8 @@ >Samba as a ADS domain member

    Chapter 8. Samba as a ADS domain member

    Chapter 8. Samba as a ADS domain member

    This is a rough guide to setting up Samba 3.0 with kerberos authentication against a Windows2000 KDC.

    Pieces you need before you begin: +

    a Windows 2000 server.
    samba 3.0 or higher.
    the MIT kerberos development libraries (either install from the above sources or use a package). The heimdal libraries will not work.
    the OpenLDAP development libraries.

    8.1. Setup your smb.conf

    8.1. Installing the required packages for Debian

    You must use at least the following 3 options in smb.conf:

    On Debian you need to install the following packages: +

    libkrb5-dev
    krb5-user

    8.3. Compile Samba

    If your kerberos libraries are in a non-standard location then + remember to add the configure option --with-krb5=DIR.

    After you run configure make sure that include/config.h contains + lines like this:

    #define HAVE_KRB5 1
    +#define HAVE_LDAP 1

    If it doesn't then configure did not find your krb5 libraries or + your ldap libraries. Look in config.log to figure out why and fix + it.

    Then compile and install Samba as usual. You must use at least the + following 3 options in smb.conf:

      ads server = your.kerberos.server

    You do *not* need a smbpasswd file, and older clients will - be authenticated as if "security = domain", although it won't do any harm - and allows you to have local users not in the domain. - I expect that the above required options will change soon when we get better - active directory integration.

    You do *not* need a smbpasswd file, although it won't do any harm + and if you have one then Samba will be able to fall back to normal + password security for older clients. I expect that the above + required options will change soon when we get better active + directory integration.

    8.2. Setup your /etc/krb5.conf

    8.4. Setup your /etc/krb5.conf

    The minimal configuration for krb5.conf is:

    [realms]
    +>	[realms]
         YOUR.KERBEROS.REALM = {
     	kdc = your.kerberos.server
         }

    If all you want is kerberos support in smbclient then you can skip straight to step 5 now. Step 3 is only needed if you want kerberos -support for smbd and winbindd.

    8.3. Create the computer account

    8.5. Create the computer account

    As a user that has write permission on the Samba private directory +>Do a "kinit" as a user that has authority to change arbitrary +passwords on the KDC ("Administrator" is a good choice). Then as a +user that has write permission on the Samba private directory (usually root) run:

    8.3.1. Possible errors

    8.5.1. Possible errors

    "bash: kinit: command not found"

    kinit is in the krb5-workstation RPM on RedHat systems, and is in /usr/kerberos/bin, so it won't be in the path until you log in again (or open a new terminal)

    "ADS support not compiled in"

    8.4. Test your server setup

    8.6. Test your server setup

    On a Windows 2000 client try

    8.5. Testing with smbclient

    8.7. Testing with smbclient

    On your Samba server try to login to a Win2000 server or your Samba server using smbclient and kerberos. Use smbclient as usual, but @@ -238,12 +335,10 @@ CLASS="SECT1" >

    8.6. Notes

    8.8. Notes

    You must change administrator password at least once after DC -install, to create the right encoding types

    You must change administrator password at least once after DC install, + to create the right encoding types

    w2k doesn't seem to create the _kerberos._udp and _ldap._tcp in their defaults DNS setup. Maybe fixed in service packs?

    Samba Backup Domain Controller to Samba Domain ControlHow to Act as a Backup Domain Controller in a Purely Samba Controlled DomainSamba as a NT4 or Win2k domain memberSamba as a NT4 domain member
    AppendixesPrevNext

    23. Samba performance issues
    23.1. Comparisons
    23.2. Socket options
    23.3. Read size
    23.4. Max xmit
    23.5. Log level
    23.6. Read raw
    23.7. Write raw
    23.8. Slow Clients
    23.9. Slow Logins
    23.10. Client tuning
    24. Portability
    24.1. 23.1. HPUX
    24.2. 23.2. SCO Unix
    24.3. 23.3. DNIX
    24.4. 23.4. RedHat Linux Rembrandt-II
    24.5. AIX
    24.5.1. Sequential Read Ahead
    25. 24. Samba and other CIFS clients
    25.1. 24.1. Macintosh clients?
    25.2. 24.2. OS2 Client
    25.2.1. 24.2.1. How can I configure OS/2 Warp Connect or OS/2 Warp 4 as a client for Samba?
    25.2.2. 24.2.2. How can I configure OS/2 Warp 3 (not Connect), OS/2 1.2, 1.3 or 2.x for Samba?
    25.2.3. 24.2.3. Are there any other issues when OS/2 (any version) is used as a client?
    25.2.4. 24.2.4. How do I get printer driver download working for OS/2 clients?
    25.3. 24.3. Windows for Workgroups
    25.3.1. 24.3.1. Use latest TCP/IP stack from Microsoft
    25.3.2. 24.3.2. Delete .pwl files after password change
    25.3.3. 24.3.3. Configure WfW password handling
    25.3.4. 24.3.4. Case handling of passwords
    25.3.5. Use TCP/IP as default protocol
    25.4. 24.4. Windows '95/'98
    25.5. 24.5. Windows 2000 Service Pack 2
    26. How to compile SAMBA
    26.1. Access Samba source code via CVS
    26.1.1. Introduction
    26.1.2. CVS Access to samba.org
    26.2. Accessing the samba sources via rsync and ftp
    26.3. Building the Binaries
    26.3.1. Compiling samba with Active Directory support
    26.4. Starting the smbd and nmbd
    26.4.1. Starting from inetd.conf
    26.4.2. Alternative: starting it as a daemon
    27. 25. Reporting Bugs
    27.1. 25.1. Introduction
    27.2. 25.2. General info
    27.3. 25.3. Debug levels
    27.4. 25.4. Internal errors
    27.5. 25.5. Attaching to a running process
    27.6. 25.6. Patches
    28. 26. The samba checklistDiagnosing your samba server
    28.1. 26.1. Introduction
    28.2. 26.2. Assumptions
    28.3. 26.3. Tests
    28.3.1. 26.3.1. Test 1
    28.3.2. 26.3.2. Test 2
    28.3.3. 26.3.3. Test 3
    28.3.4. 26.3.4. Test 4
    28.3.5. 26.3.5. Test 5
    28.3.6. 26.3.6. Test 6
    28.3.7. 26.3.7. Test 7
    28.3.8. 26.3.8. Test 8
    28.3.9. 26.3.9. Test 9
    28.3.10. 26.3.10. Test 10
    28.3.11. 26.3.11. Test 11
    28.4. 26.4. Still having troubles?
    PrevNextUnicode/CharsetsSamba performance issuesSamba performance issuesPortability

    Quick Cross Subnet Browsing / Cross Workgroup Browsing guidePrevNext

    Chapter 2. Quick Cross Subnet Browsing / Cross Workgroup Browsing guide

    Chapter 3. Quick Cross Subnet Browsing / Cross Workgroup Browsing guide

    This document should be read in conjunction with Browsing and may be taken as the fast track guide to implementing browsing across subnets and / or across workgroups (or domains). WINS is the best tool for resolution of NetBIOS names to IP addesses. WINS is NOT involved in browse list handling except by way of name to address mapping.

    Note: MS Windows 2000 and later can be configured to operate with NO NetBIOS -over TCP/IP. Samba-3 and later also supports this mode of operation.

    2.1. Discussion

    3.1. Discussion

    Firstly, all MS Windows networking is based on SMB (Server Message -Block) based messaging. SMB messaging may be implemented using NetBIOS or -without NetBIOS. Samba implements NetBIOS by encapsulating it over TCP/IP. -MS Windows products can do likewise. NetBIOS based networking uses broadcast -messaging to affect browse list management. When running NetBIOS over -TCP/IP this uses UDP based messaging. UDP messages can be broadcast or unicast.

    Normally, only unicast UDP messaging can be forwarded by routers. The "remote announce" parameter to smb.conf helps to project browse announcements @@ -112,23 +106,18 @@ segment is configured with it's own Samba WINS server, then the only way to get cross segment browsing to work is by using the "remote announce" and the "remote browse sync" parameters to your smb.conf file.

    If only one WINS server is used for an entire multi-segment network then -the use of the "remote announce" and the "remote browse sync" parameters -should NOT be necessary.

    As of Samba-3 WINS replication is being worked on. The bulk of the code has -been committed, but it still needs maturation.

    If only one WINS server is used then the use of the "remote announce" and the +"remote browse sync" parameters should NOT be necessary.

    Right now samba WINS does not support MS-WINS replication. This means that -when setting up Samba as a WINS server there must only be one nmbd configured -as a WINS server on the network. Some sites have used multiple Samba WINS -servers for redundancy (one server per subnet) and then used "remote browse -sync" and "remote announce" to affect browse list collation across all -segments. Note that this means clients will only resolve local names, -and must be configured to use DNS to resolve names on other subnets in -order to resolve the IP addresses of the servers they can see on other -subnets. This setup is not recommended, but is mentioned as a practical -consideration (ie: an 'if all else fails' scenario).

    Samba WINS does not support MS-WINS replication. This means that when setting up +Samba as a WINS server there must only be one nmbd configured as a WINS server +on the network. Some sites have used multiple Samba WINS servers for redundancy +(one server per subnet) and then used "remote browse sync" and "remote announce" +to affect browse list collation across all segments. Note that this means +clients will only resolve local names, and must be configured to use DNS to +resolve names on other subnets in order to resolve the IP addresses of the +servers they can see on other subnets. This setup is not recommended, but is +mentioned as a practical consideration (ie: an 'if all else fails' scenario).

    Lastly, take note that browse lists are a collection of unreliable broadcast messages that are repeated at intervals of not more than 15 minutes. This means @@ -140,76 +129,7 @@ CLASS="SECT1" >

    2.2. How browsing functions and how to deploy stable and -dependable browsing using Samba

    As stated above, MS Windows machines register their NetBIOS names -(i.e.: the machine name for each service type in operation) on start -up. Also, as stated above, the exact method by which this name registration -takes place is determined by whether or not the MS Windows client/server -has been given a WINS server address, whether or not LMHOSTS lookup -is enabled, or if DNS for NetBIOS name resolution is enabled, etc.

    In the case where there is no WINS server all name registrations as -well as name lookups are done by UDP broadcast. This isolates name -resolution to the local subnet, unless LMHOSTS is used to list all -names and IP addresses. In such situations Samba provides a means by -which the samba server name may be forcibly injected into the browse -list of a remote MS Windows network (using the "remote announce" parameter).

    Where a WINS server is used, the MS Windows client will use UDP -unicast to register with the WINS server. Such packets can be routed -and thus WINS allows name resolution to function across routed networks.

    During the startup process an election will take place to create a -local master browser if one does not already exist. On each NetBIOS network -one machine will be elected to function as the domain master browser. This -domain browsing has nothing to do with MS security domain control. -Instead, the domain master browser serves the role of contacting each local -master browser (found by asking WINS or from LMHOSTS) and exchanging browse -list contents. This way every master browser will eventually obtain a complete -list of all machines that are on the network. Every 11-15 minutes an election -is held to determine which machine will be the master browser. By the nature of -the election criteria used, the machine with the highest uptime, or the -most senior protocol version, or other criteria, will win the election -as domain master browser.

    Clients wishing to browse the network make use of this list, but also depend -on the availability of correct name resolution to the respective IP -address/addresses.

    Any configuration that breaks name resolution and/or browsing intrinsics -will annoy users because they will have to put up with protracted -inability to use the network services.

    Samba supports a feature that allows forced synchonisation -of browse lists across routed networks using the "remote -browse sync" parameter in the smb.conf file. This causes Samba -to contact the local master browser on a remote network and -to request browse list synchronisation. This effectively bridges -two networks that are separated by routers. The two remote -networks may use either broadcast based name resolution or WINS -based name resolution, but it should be noted that the "remote -browse sync" parameter provides browse list synchronisation - and -that is distinct from name to address resolution, in other -words, for cross subnet browsing to function correctly it is -essential that a name to address resolution mechanism be provided. -This mechanism could be via DNS, /etc/hosts, -and so on.

    2.3. Use of the "Remote Announce" parameter

    3.2. Use of the "Remote Announce" parameter

    The "remote announce" parameter of smb.conf can be used to forcibly ensure that all the NetBIOS names on a network get announced to a remote network. @@ -265,9 +185,7 @@ CLASS="SECT1" >

    2.4. Use of the "Remote Browse Sync" parameter

    3.3. Use of the "Remote Browse Sync" parameter

    The "remote browse sync" parameter of smb.conf is used to announce to another LMB that it must synchronise it's NetBIOS name list with our @@ -275,10 +193,9 @@ Samba LMB. It works ONLY if the Samba server that has this option is simultaneously the LMB on it's network segment.

    The syntax of the "remote browse sync" parameter is: -

    remote browse sync = a.b.c.d
    remote browse sync = a.b.c.d where a.b.c.d is either the IP address of the remote LMB or else is the network broadcast address of the remote segment.

    2.5. Use of WINS

    3.4. Use of WINS

    Use of WINS (either Samba WINS _or_ MS Windows NT Server WINS) is highly recommended. Every NetBIOS machine registers it's name together with a @@ -342,23 +257,20 @@ CLASS="emphasis" CLASS="EMPHASIS" >DO NOT EVER use both "wins support = yes" together -with "wins server = a.b.c.d" particularly not using it's own IP address. -Specifying both will cause nmbd to refuse to start!

    use both "wins support = yes" together with "wins server = a.b.c.d" +particularly not using it's own IP address.

    2.6. Do NOT use more than one (1) protocol on MS Windows machines

    3.5. Do NOT use more than one (1) protocol on MS Windows machines

    A very common cause of browsing problems results from installing more than one protocol on an MS Windows machine.

    Every NetBIOS machine takes part in a process of electing the LMB (and DMB) +>Every NetBIOS machine take part in a process of electing the LMB (and DMB) every 15 minutes. A set of election criteria is used to determine the order of precidence for winning this election process. A machine running Samba or Windows NT will be biased so that the most suitable machine will predictably @@ -374,19 +286,6 @@ interface over the IPX protocol. Samba will then lose the LMB role as Windows as an LMB and thus browse list operation on all TCP/IP only machines will fail.

    Windows 95, 98, 98se, Me are referred to generically as Windows 9x. -The Windows NT4, 2000, XP and 2003 use common protocols. These are roughly -referred to as the WinNT family, but it should be recognised that 2000 and -XP/2003 introduce new protocol extensions that cause them to behave -differently from MS Windows NT4. Generally, where a server does NOT support -the newer or extended protocol, these will fall back to the NT4 protocols.

    The safest rule of all to follow it this - USE ONLY ONE PROTOCOL!

    2.7. Name Resolution Order

    3.6. Name Resolution Order

    Resolution of NetBIOS names to IP addresses can take place using a number of methods. The only ones that can provide NetBIOS name_type information -are:

    Alternative means of name resolution includes:

    Alternative means of name resolution includes: +

    Many sites want to restrict DNS lookups and want to avoid broadcast name resolution traffic. The "name resolve order" parameter is of great help here. The syntax of the "name resolve order" parameter is:

    name resolve order = wins lmhosts bcast host
    name resolve order = wins lmhosts bcast host _or_
    name resolve order = wins lmhosts  	(eliminates bcast and host)
    name resolve order = wins lmhosts (eliminates bcast and host) The default is:
    name  resolve order = host lmhost wins bcast
    name resolve order = host lmhost wins bcast. where "host" refers the the native methods used by the Unix system to implement the gethostbyname() function call. This is normally @@ -489,7 +388,7 @@ WIDTH="33%" ALIGN="left" VALIGN="top" >PrevNextHow to Install and Test SAMBAImproved browsing in sambaUser information databaseLanMan and NT Password Encryption in Samba
    Reporting BugsPrev

    Chapter 27. Reporting Bugs

    Chapter 25. Reporting Bugs

    27.1. Introduction

    25.1. Introduction

    The email address for bug reports for stable releases is

    27.2. General info

    25.2. General info

    Before submitting a bug report check your config for silly errors. Look in your log files for obvious messages that tell you that @@ -150,9 +145,7 @@ CLASS="SECT1" >

    27.3. Debug levels

    25.3. Debug levels

    If the bug has anything to do with Samba behaving incorrectly as a server (like refusing to open a file) then the log files will probably @@ -220,9 +213,7 @@ CLASS="SECT1" >

    27.4. Internal errors

    25.4. Internal errors

    If you get a "INTERNAL ERROR" message in your log files it means that Samba got an unexpected signal while running. It is probably a @@ -264,9 +255,7 @@ CLASS="SECT1" >

    27.5. Attaching to a running process

    25.5. Attaching to a running process

    Unfortunately some unixes (in particular some recent linux kernels) refuse to dump a core file if the task has changed uid (which smbd @@ -281,9 +270,7 @@ CLASS="SECT1" >

    27.6. Patches

    25.6. Patches

    The best sort of bug report is one that includes a fix! If you send us patches please use PrevHow to compile SAMBASamba and other CIFS clientsThe samba checklistDiagnosing your samba server

    -How to compile SAMBA
    SAMBA Project Documentation
    PrevNext

    Chapter 26. How to compile SAMBA

    You can obtain the samba source from the samba website. To obtain a development version, -you can download samba from CVS or using rsync.

    26.1. Access Samba source code via CVS

    26.1.1. Introduction

    Samba is developed in an open environment. Developers use CVS -(Concurrent Versioning System) to "checkin" (also known as -"commit") new source code. Samba's various CVS branches can -be accessed via anonymous CVS using the instructions -detailed in this chapter.

    This chapter is a modified version of the instructions found at -http://samba.org/samba/cvs.html

    26.1.2. CVS Access to samba.org

    The machine samba.org runs a publicly accessible CVS -repository for access to the source code of several packages, -including samba, rsync and jitterbug. There are two main ways of -accessing the CVS server on this host.

    26.1.2.1. Access via CVSweb

    You can access the source code via your -favourite WWW browser. This allows you to access the contents of -individual files in the repository and also to look at the revision -history and commit logs of individual files. You can also ask for a diff -listing between any two versions on the repository.

    Use the URL : http://samba.org/cgi-bin/cvsweb

    26.1.2.2. Access via cvs

    You can also access the source code via a -normal cvs client. This gives you much more control over you can -do with the repository and allows you to checkout whole source trees -and keep them up to date via normal cvs commands. This is the -preferred method of access if you are a developer and not -just a casual browser.

    To download the latest cvs source code, point your -browser at the URL : http://www.cyclic.com/. -and click on the 'How to get cvs' link. CVS is free software under -the GNU GPL (as is Samba). Note that there are several graphical CVS clients -which provide a graphical interface to the sometimes mundane CVS commands. -Links to theses clients are also available from http://www.cyclic.com.

    To gain access via anonymous cvs use the following steps. -For this example it is assumed that you want a copy of the -samba source code. For the other source code repositories -on this system just substitute the correct package name

    1. Install a recent copy of cvs. All you really need is a - copy of the cvs client binary. -

    2. Run the command -

      cvs -d :pserver:cvs@samba.org:/cvsroot login -

      When it asks you for a password type cvs. -

    3. Run the command -

      cvs -d :pserver:cvs@samba.org:/cvsroot co samba -

      This will create a directory called samba containing the - latest samba source code (i.e. the HEAD tagged cvs branch). This - currently corresponds to the 3.0 development tree. -

      CVS branches other HEAD can be obtained by using the -r - and defining a tag name. A list of branch tag names can be found on the - "Development" page of the samba web site. A common request is to obtain the - latest 2.2 release code. This could be done by using the following command. -

      cvs -d :pserver:cvs@samba.org:/cvsroot co -r SAMBA_2_2 samba -

    4. Whenever you want to merge in the latest code changes use - the following command from within the samba directory: -

      cvs update -d -P -

    26.2. Accessing the samba sources via rsync and ftp

    pserver.samba.org also exports unpacked copies of most parts of the CVS tree at ftp://pserver.samba.org/pub/unpacked and also via anonymous rsync at rsync://pserver.samba.org/ftp/unpacked/. I recommend using rsync rather than ftp. - See the rsync homepage for more info on rsync. -

    The disadvantage of the unpacked trees - is that they do not support automatic - merging of local changes like CVS does. - rsync access is most convenient for an - initial install. -

    26.3. Building the Binaries

    To do this, first run the program ./configure - in the source directory. This should automatically - configure Samba for your operating system. If you have unusual - needs then you may wish to run

    root# ./configure --help -

    first to see what special options you can enable. - Then executing

    root# make

    will create the binaries. Once it's successfully - compiled you can use

    root# make install

    to install the binaries and manual pages. You can - separately install the binaries and/or man pages using

    root# make installbin -

    and

    root# make installman -

    Note that if you are upgrading for a previous version - of Samba you might like to know that the old versions of - the binaries will be renamed with a ".old" extension. You - can go back to the previous version with

    root# make revert -

    if you find this version a disaster!

    26.3.1. Compiling samba with Active Directory support

    In order to compile samba with ADS support, you need to have installed - on your system: -

    the MIT kerberos development libraries (either install from the sources or use a package). The heimdal libraries will not work.
    the OpenLDAP development libraries.

    - -

    If your kerberos libraries are in a non-standard location then - remember to add the configure option --with-krb5=DIR.

    After you run configure make sure that include/config.h it generates contains lines like this:

    #define HAVE_KRB5 1
    -#define HAVE_LDAP 1
    -		  

    If it doesn't then configure did not find your krb5 libraries or - your ldap libraries. Look in config.log to figure out why and fix - it.

    26.3.1.1. Installing the required packages for Debian

    On Debian you need to install the following packages:

    libkrb5-dev
    krb5-user

    -

    26.3.1.2. Installing the required packages for RedHat

    On RedHat this means you should have at least:

    krb5-workstation (for kinit)
    krb5-libs (for linking with)
    krb5-devel (because you are compiling from source)

    -

    in addition to the standard development environment.

    Note that these are not standard on a RedHat install, and you may need - to get them off CD2.

    26.4. Starting the smbd and nmbd

    You must choose to start smbd and nmbd either - as daemons or from inetd. Don't try - to do both! Either you can put them in inetd.conf and have them started on demand - by inetd, or you can start them as - daemons either from the command line or in /etc/rc.local. See the man pages for details - on the command line options. Take particular care to read - the bit about what user you need to be in order to start - Samba. In many cases you must be root.

    The main advantage of starting smbd - and nmbd using the recommended daemon method - is that they will respond slightly more quickly to an initial connection - request.

    26.4.1. Starting from inetd.conf

    NOTE; The following will be different if - you use NIS, NIS+ or LDAP to distribute services maps.

    Look at your /etc/services. - What is defined at port 139/tcp. If nothing is defined - then add a line like this:

    netbios-ssn 139/tcp

    similarly for 137/udp you should have an entry like:

    netbios-ns 137/udp

    Next edit your /etc/inetd.conf - and add two lines something like this:

    		netbios-ssn stream tcp nowait root /usr/local/samba/bin/smbd smbd 
    -		netbios-ns dgram udp wait root /usr/local/samba/bin/nmbd nmbd 
    -		

    The exact syntax of /etc/inetd.conf - varies between unixes. Look at the other entries in inetd.conf - for a guide.

    NOTE: Some unixes already have entries like netbios_ns - (note the underscore) in /etc/services. - You must either edit /etc/services or - /etc/inetd.conf to make them consistent.

    NOTE: On many systems you may need to use the - "interfaces" option in smb.conf to specify the IP address - and netmask of your interfaces. Run ifconfig - as root if you don't know what the broadcast is for your - net. nmbd tries to determine it at run - time, but fails on some unixes. See the section on "testing nmbd" - for a method of finding if you need to do this.

    !!!WARNING!!! Many unixes only accept around 5 - parameters on the command line in inetd.conf. - This means you shouldn't use spaces between the options and - arguments, or you should use a script, and start the script - from inetd.

    Restart inetd, perhaps just send - it a HUP. If you have installed an earlier version of nmbd then you may need to kill nmbd as well.

    26.4.2. Alternative: starting it as a daemon

    To start the server as a daemon you should create - a script something like this one, perhaps calling - it startsmb.

    		#!/bin/sh
    -		/usr/local/samba/bin/smbd -D 
    -		/usr/local/samba/bin/nmbd -D 
    -		

    then make it executable with chmod - +x startsmb

    You can then run startsmb by - hand or execute it from /etc/rc.local -

    To kill it send a kill signal to the processes - nmbd and smbd.

    NOTE: If you use the SVR4 style init system then - you may like to look at the examples/svr4-startup - script to make Samba fit into that system.


    PrevHomeNext
    Samba and other CIFS clientsUpReporting Bugs
    \ No newline at end of file diff --git a/docs/htmldocs/cvs-access.html b/docs/htmldocs/cvs-access.html new file mode 100644 index 00000000000..73cd3338054 --- /dev/null +++ b/docs/htmldocs/cvs-access.html @@ -0,0 +1,298 @@ + +HOWTO Access Samba source code via CVS
    SAMBA Project Documentation
    PrevNext

    Chapter 20. HOWTO Access Samba source code via CVS

    20.2. CVS Access to samba.org

    The machine samba.org runs a publicly accessible CVS +repository for access to the source code of several packages, +including samba, rsync and jitterbug. There are two main ways of +accessing the CVS server on this host.

    20.2.2. Access via cvs

    You can also access the source code via a +normal cvs client. This gives you much more control over you can +do with the repository and allows you to checkout whole source trees +and keep them up to date via normal cvs commands. This is the +preferred method of access if you are a developer and not +just a casual browser.

    To download the latest cvs source code, point your +browser at the URL : http://www.cyclic.com/. +and click on the 'How to get cvs' link. CVS is free software under +the GNU GPL (as is Samba). Note that there are several graphical CVS clients +which provide a graphical interface to the sometimes mundane CVS commands. +Links to theses clients are also available from http://www.cyclic.com.

    To gain access via anonymous cvs use the following steps. +For this example it is assumed that you want a copy of the +samba source code. For the other source code repositories +on this system just substitute the correct package name

    1. Install a recent copy of cvs. All you really need is a + copy of the cvs client binary. +

    2. Run the command +

      cvs -d :pserver:cvs@samba.org:/cvsroot login +

      When it asks you for a password type cvs. +

    3. Run the command +

      cvs -d :pserver:cvs@samba.org:/cvsroot co samba +

      This will create a directory called samba containing the + latest samba source code (i.e. the HEAD tagged cvs branch). This + currently corresponds to the 3.0 development tree. +

      CVS branches other HEAD can be obtained by using the -r + and defining a tag name. A list of branch tag names can be found on the + "Development" page of the samba web site. A common request is to obtain the + latest 2.2 release code. This could be done by using the following command. +

      cvs -d :pserver:cvs@samba.org:/cvsroot co -r SAMBA_2_2 samba +

    4. Whenever you want to merge in the latest code changes use + the following command from within the samba directory: +

      cvs update -d -P +


    PrevHomeNext
    Storing Samba's User/Machine Account information in an LDAP DirectoryUpGroup mapping HOWTO
    \ No newline at end of file diff --git a/docs/htmldocs/diagnosis.html b/docs/htmldocs/diagnosis.html index 070bc0562a5..a7b2e59436e 100644 --- a/docs/htmldocs/diagnosis.html +++ b/docs/htmldocs/diagnosis.html @@ -2,10 +2,11 @@ The samba checklistDiagnosing your samba server

    Chapter 28. The samba checklist

    Chapter 26. Diagnosing your samba server

    Introduction

    This part contains general info on how to install samba @@ -104,263 +101,257 @@ HREF="install.html" >

    1.1. Obtaining and installing sambaRead the man pages
    1.2. Configuring sambaBuilding the Binaries
    1.3. The all important step
    1.4. Create the smb configuration file.
    1.5. Test your config file with + testparm
    1.6. Starting the smbd and nmbd
    1.2.1. Editing the smb.conf file1.6.1. Starting from inetd.conf
    1.2.2. SWAT1.6.2. Alternative: starting it as a daemon
    1.3. 1.7. Try listing the shares available on your server
    1.4. 1.8. Try connecting with the unix client
    1.5. 1.9. Try connecting from a DOS, WfWg, Win9x, WinNT, Win2k, OS/2, etc... client
    1.6. 1.10. What If Things Don't Work?
    1.6.1. 1.10.1. Diagnosing Problems
    1.10.2. Scope IDs
    1.6.2. 1.10.3. Choosing the Protocol Level
    1.10.4. Printing from UNIX to a Client PC
    1.10.5. Locking
    1.10.6. Mapping Usernames
    2. Quick Cross Subnet Browsing / Cross Workgroup Browsing guideImproved browsing in samba
    2.1. DiscussionOverview of browsing
    2.2. How browsing functions and how to deploy stable and -dependable browsing using SambaBrowsing support in samba
    2.3. Use of the "Remote Announce" parameterProblem resolution
    2.4. Use of the "Remote Browse Sync" parameterBrowsing across subnets
    2.4.1. How does cross subnet browsing work ?
    2.5. Use of WINSSetting up a WINS server
    2.6. Do NOT use more than one (1) protocol on MS Windows machinesSetting up Browsing in a WORKGROUP
    2.7. Name Resolution OrderSetting up Browsing in a DOMAIN
    3. User information database2.8. Forcing samba to be the master
    3.1. Introduction2.9. Making samba the domain master
    3.2. Important Notes About Security
    3.2.1. Advantages of SMB Encryption2.10. Note about broadcast addresses
    3.2.2. Advantages of non-encrypted passwords2.11. Multiple interfaces
    3.3. The smbpasswd Command
    3.4. Plain text
    3.5. TDB
    3.6. LDAP3. Quick Cross Subnet Browsing / Cross Workgroup Browsing guide
    3.6.1. Introduction
    3.6.2. Introduction
    3.6.3. Supported LDAP Servers
    3.6.4. Schema and Relationship to the RFC 2307 posixAccount3.1. Discussion
    3.6.5. Configuring Samba with LDAP3.2. Use of the "Remote Announce" parameter
    3.6.6. Accounts and Groups management3.3. Use of the "Remote Browse Sync" parameter
    3.6.7. Security and sambaAccount3.4. Use of WINS
    3.6.8. LDAP specials attributes for sambaAccounts3.5. Do NOT use more than one (1) protocol on MS Windows machines
    3.6.9. Example LDIF Entries for a sambaAccount3.6. Name Resolution Order
    3.7. MySQL4. LanMan and NT Password Encryption in Samba
    3.7.1. Building
    3.7.2. Creating the database
    3.7.3. Configuring
    3.7.4. Using plaintext passwords or encrypted password
    3.7.5. Getting non-column data from the table4.1. Introduction
    3.8. Passdb XML plugin4.2. Important Notes About Security
    3.8.1. Building4.2.1. Advantages of SMB Encryption
    3.8.2. Usage4.2.2. Advantages of non-encrypted passwords
    4.3. The smbpasswd Command
    lmhosts

    lmhosts

    lmhosts is the Samba(7) is the Samba NetBIOS name to IP address mapping file.

    DESCRIPTION

    This file is part of the Samba(7)This file is part of the Samba suite.

    FILE FORMAT

    It is an ASCII file containing one line for NetBIOS name. The two fields on each line are separated from each other by white space. Any entry beginning with '#' is ignored. Each line - in the lmhosts file contains the following information:

      An example follows:

      An example follows :

      #
      @@ -121,6 +118,7 @@ CLASS="PROGRAMLISTING"
       192.9.200.20	NTSERVER#20
       192.9.200.21	SAMBASERVER
       	

      Contains three IP to NetBIOS name mappings. The first and third will be returned for any queries for the names "TESTPC" @@ -135,57 +133,58 @@ CLASS="PROGRAMLISTING" CLASS="FILENAME" >lmhosts file - is in the same directory as the smb.conf(5) + smb.conf(5)> file.

      VERSION

      This man page is correct for version 3.0 of the Samba suite.

      This man page is correct for version 2.2 of + the Samba suite.

      SEE ALSO

      smbclient(1), smb.conf(5), and smbpasswd(8)smbclient(1) + , smb.conf(5), and smbpasswd(8)

      AUTHOR

      ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook - XML 4.2 was done by Alexander Bokovoy.

      Hosting a Microsoft Distributed File System tree on SambaPrevNext

      Chapter 19. Hosting a Microsoft Distributed File System tree on Samba

      Chapter 13. Hosting a Microsoft Distributed File System tree on Samba

      19.1. Instructions

      13.1. Instructions

      The Distributed File System (or Dfs) provides a means of separating the logical view of files and directories that users @@ -98,17 +96,21 @@ TARGET="_top" machine (for Dfs-aware clients to browse) using Samba.

      To enable SMB-based DFS for Samba, configure it with the - --with-msdfs--with-msdfs option. Once built, a Samba server can be made a Dfs server by setting the global boolean host msdfs host msdfs parameter in the msdfs root msdfs root parameter. A Dfs root directory on Samba hosts Dfs links in the form of symbolic links that point to other servers. For example, a symbolic link junction->msdfs:storage1\share1junction->msdfs:storage1\share1 in the share directory acts as the Dfs junction. When Dfs-aware clients attempt to access the junction link, they are redirected @@ -155,44 +159,54 @@ CLASS="PROGRAMLISTING" >In the /export/dfsroot directory we set up our dfs links to other servers on the network.

      root# root# cd /export/dfsrootcd /export/dfsroot

      root# root# chown root /export/dfsrootchown root /export/dfsroot

      root# root# chmod 755 /export/dfsrootchmod 755 /export/dfsroot

      root# root# ln -s msdfs:storageA\\shareA linkaln -s msdfs:storageA\\shareA linka

      root# root# ln -s msdfs:serverB\\share,serverC\\share linkbln -s msdfs:serverB\\share,serverC\\share linkb

      You should set up the permissions and ownership of @@ -212,9 +226,7 @@ CLASS="SECT2" >

      19.1.1. Notes

      13.1.1. Notes

        PrevNextImproved browsing in sambaConfiguring PAM for distributed but centrally +managed authenticationStackable VFS modulesPrinting Support
      net

      net

      net {<ads|rap|rpc>} [-h] [-w workgroup] [-W myworkgroup] [-U user] [-I ip-address] [-p port] [-n myname] [-s conffile] [-S server] [-C comment] [-M maxusers] [-F flags] [-j jobid] [-l] [-r] [-f] [-t timeout] [-P] [-D debuglevel]

      {<ads|rap|rpc>} [-h] [-w workgroup] [-W myworkgroup] [-U user] [-I ip-address] [-p port] [-n myname] [-s conffile] [-S server] [-C comment] [-M maxusers] [-F flags] [-j jobid] [-l] [-r] [-f] [-t timeout] [-P] [-D debuglevel]

      DESCRIPTION

      This tool is part of the Samba(7)This tool is part of the Samba suite.

      The samba net utility is meant to work just like the net utility @@ -62,7 +60,7 @@ CLASS="REFENTRYTITLE" >

      OPTIONS

      -w target-workgroup

      Sets target workgroup or domain. You have to specify - either this option or the IP address or the name of a server. +> Sets target workgroup or domain. You have to specify either this option or the IP address or the name of a server.

      -I ip-address

      IP address of target server to use. You have to - specify either this option or a target workgroup or a target server. +> IP address of target server to use. You have to specify either this option or a target workgroup or a target server.

      -S server

      Name of target server. You should specify either - this option or a target workgroup or a target IP address. +> Name of target server. You should specify either this option or a target workgroup or a target IP address.

      TIME

      SYSTEM

      Displays the time on the remote server in a format ready for /bin/date +> Displays the time on the remote server in a format ready for /bin/date

      Tries to set the date and time of the local server to that on - the remote server using /bin/date. + the remote server using /bin/date.

      RPC

      USER DELETE <name> [misc options]
      USER DELETE <name> [misc options]

      delete specified user

      USER INFO <name> [misc options]
      USER INFO <name> [misc options]

      list the domain groups of the specified user

      USER ADD <name> [password] [-F user flags] [misc. options]
      USER ADD <name> [password] [-F user flags] [misc. options

      Add specified user @@ -345,14 +334,14 @@ CLASS="VARIABLELIST"

      GROUP DELETE <name> [misc. options] [targets]
      GROUP DELETE <name> [misc. options] [targets]

      Delete specified group

      GROUP ADD <name> [-C comment]
      GROUP ADD <name> [-C comment]

      Create specified group @@ -366,14 +355,14 @@ CLASS="VARIABLELIST"

      SHARE ADD <name=serverpath> [misc. options] [targets]
      SHARE ADD <name=serverpath> [misc. options] [targets]

      Adds a share from a server (makes the export active)

      SHARE DELETE <sharenam
      SHARE DELETE <sharenam

      VERSION

      AUTHOR

      + nmbd

      nmbd

      nmbd

      Synopsis

      nmbd [-D] [-F] [-S] [-a] [-i] [-o] [-h] [-V] [-d <debug level>] [-H <lmhosts file>] [-l <log directory>] [-n <primary netbios name>] [-p <port number>] [-s <configuration file>]

      [-D] [-F] [-S] [-a] [-i] [-o] [-h] [-V] [-d <debug level>] [-H <lmhosts file>] [-l <log directory>] [-n <primary netbios name>] [-p <port number>] [-s <configuration file>]

      DESCRIPTION

      This program is part of the Samba(7) suite.

      This program is part of the Samba suite.

      -n option (see OPTIONS below). Thus nmbd to respond on can be set - via parameters in the smb.conf(5) smb.conf(5) configuration file.

      OPTIONS

      nmbd
      also logs to standard - output, as if the -S-S
      parameter had been given.

      name resolve - order name resolve order described in smb.conf(5) described in smb.conf(5) to resolve any - NetBIOS name queries needed by the server. Note - that the contents of this file are + to resolve any NetBIOS name queries needed by the server. Note + that the contents of this file are NOT used by nmbd to answer any name queries. Adding a line to this file affects name NetBIOS resolution - from this host ONLY.

      The default path to this file is compiled into @@ -298,14 +278,17 @@ CLASS="FILENAME" > or /etc/samba/lmhosts. See the lmhosts(5) man page for details on the contents of this file.

      /etc/lmhosts
      . See the + lmhosts(5) + man page for details on the contents of this file.

      -V
      log levellog level - parameter in the smb.conf(5) smb.conf(5) file.

      /var/log/log.nmb. . Beware: If the directory specified does not exist, NetBIOS - name NetBIOS name parameter in the + smb.conf parameter in the smb.conf(5) file. However, a command line setting will take precedence over settings in - smb.conf(5)smb.conf.

      The file specified contains the configuration details - required by the server. See smb.conf(5) smb.conf(5) for more information.

      FILES

      meta-daemon, this file must contain suitable startup information for the meta-daemon. See the installUNIX_INSTALL.html document for details.

      If running the server as a daemon at startup, this file will need to contain an appropriate startup sequence for the server. See the "How to Install and Test SAMBA"UNIX_INSTALL.html document for details.

      "How to Install and Test SAMBA"UNIX_INSTALL.html document for details.

      This is the default location of - the smb.conf(5) server - configuration file. Other common places that systems +>This is the default location of the + smb.conf + server configuration file. Other common places that systems install this file are /usr/samba/lib/smb.conf and /etc/samba/smb.conf/etc/smb.conf.

      When run as a WINS server (see the wins supportwins support - parameter in the smb.conf(5)smb.conf(5) man page), If nmbd is acting as a is acting as a browse master (see the local masterlocal master - parameter in the smb.conf(5) man page, smb.conf(5) man page, + nmbd @@ -629,7 +590,7 @@ CLASS="FILENAME" >

      SIGNALS

      nmbd
      process it is recommended - that SIGKILL (-9) NOT be used, except as a last resort, as this may leave the name database in an inconsistent state. The correct way to terminate log.nmb
      file.

      The debug log level of nmbd may be raised or lowered - using smbcontrol(1) (SIGUSR[1|2] signals - are no longer used since Samba 2.2). This is to allow - transient problems to be diagnosed, whilst still running +>The debug log level of nmbd may be raised or lowered using + smbcontrol(1) + (SIGUSR[1|2] signals are no longer used in Samba 2.2). This is + to allow transient problems to be diagnosed, whilst still running at a normally low log level.

      VERSION

      SEE ALSO

      inetd(8), smbd(8), smb.conf(5), smbclient(1), testparm(1), testprns(1), and the Internet - RFC's inetd(8), smbd(8), + smb.conf(5) + , smbclient(1) + , testparm(1), testprns(1), and the Internet RFC's + rfc1001.txt,

      AUTHOR

      The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook - XML 4.2 for Samba 3.0 was done by Alexander Bokovoy.

      nmblookupnmblookup [-M] [-R] [-S] [-r] [-A] [-h] [-B <broadcast address>] [-U <unicast address>] [-d <debug level>] [-s <smb config file>] [-i <NetBIOS scope>] [-T] [-f] {name}

      [-M] [-R] [-S] [-r] [-A] [-h] [-B <broadcast address>] [-U <unicast address>] [-d <debug level>] [-s <smb config file>] [-i <NetBIOS scope>] [-T] [-f] {name}

      DESCRIPTION

      This tool is part of the Samba(7)This tool is part of the Samba suite.

      OPTIONS

      Searches for a master browser by looking - up the NetBIOS name namename with a - type of 0x1d. If 0x1d. If name name is "-" then it does a lookup on the special name - __MSBROWSE____MSBROWSE__.

      nmbd(8) daemon is running on this machine it also binds to this port. + in addition, if the nmbd(8) + daemon is running on this machine it also binds to this port.

      -A

      Interpret Interpret namename as an IP Address and do a node status query on this address.

      Print a help (usage) message.

      -B <broadcast address>
      -B <broadcast address>

      Send the query to the given broadcast address. Without @@ -163,37 +166,40 @@ CLASS="REPLACEABLE" either auto-detected or defined in the interfacesinterfaces parameter of the smb.conf(5) parameter of the smb.conf (5) file.

      -U <unicast address>
      -U <unicast address>

      Do a unicast query to the specified address or - host unicast addressunicast address. This option - (along with the -R-R option) is needed to query a WINS server.

      -d <debuglevel>
      -d <debuglevel>

      debuglevel is an integer from 0 to 10.

      log level log level parameter in the file.

      -s <smb.conf>
      -s <smb.conf>

      This parameter specifies the pathname to @@ -239,7 +247,7 @@ TARGET="_top" the Samba setup on the machine.

      -i <scope>
      -i <scope>

      This specifies a NetBIOS scope that @@ -293,7 +301,7 @@ CLASS="EMPHASIS" >This is the NetBIOS name being queried. Depending upon the previous options this may be a NetBIOS name or IP address. If a NetBIOS name then the different name types may be specified - by appending '#<type>' to the name. This name may also be + by appending '#<type>' to the name. This name may also be '*', which will return all registered names within a broadcast area.

      EXAMPLES

      nslookup
      is - used to query DNS servers). To query a WINS server, nmblookup - must be called like this:

      must be called like this:

      VERSION

      SEE ALSO

      nmbd(8), samba(7), and smb.conf(5).

      nmbd(8), + samba(7), and smb.conf(5) +

      AUTHOR

      The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook - XML 4.2 for Samba 3.0 was done by Alexander Bokovoy.

      +Oplocks
      SAMBA Project Documentation
      PrevNext

      Chapter 3. Oplocks

      3.1. What are oplocks?

      When a client opens a file it can request an "oplock" or file +lease. This is (to simplify a bit) a guarentee that no one else +has the file open simultaneously. It allows the client to not +send any updates on the file to the server, thus reducing a +network file access to local access (once the file is in +client cache). An "oplock break" is when the server sends +a request to the client to flush all its changes back to +the server, so the file is in a consistent state for other +opens to succeed. If a client fails to respond to this +asynchronous request then the file can be corrupted. Hence +the "turn off oplocks" answer if people are having multi-user +file access problems.

      Unless the kernel is "oplock aware" (SGI IRIX and Linux are +the only two UNIXes that are at the moment) then if a local +UNIX process accesses the file simultaneously then Samba +has no way of telling this is occuring, so the guarentee +to the client is broken. This can corrupt the file. Short +answer - it you have UNIX clients accessing the same file +as smbd locally or via NFS and you're not running Linux or +IRIX then turn off oplocks for that file or share.

      "Share modes". These are modes of opening a file, that +guarentee an invarient - such as DENY_WRITE - which means +that if any other opens are requested with write access after +this current open has succeeded then they should be denied +with a "sharing violation" error message. Samba handles these +internally inside smbd. UNIX clients accessing the same file +ignore these invarients. Just proving that if you need simultaneous +file access from a Windows and UNIX client you *must* have an +application that is written to lock records correctly on both +sides. Few applications are written like this, and even fewer +are cross platform (UNIX and Windows) so in practice this isn't +much of a problem.

      "Locking". This really means "byte range locking" - such as +lock 10 bytes at file offset 24 for write access. This is the +area in which well written UNIX and Windows apps will cooperate. +Windows locks (at least from NT or above) are 64-bit unsigned +offsets. UNIX locks are either 31 bit or 63 bit and are signed +(the top bit is used for the sign). Samba handles these by +first ensuring that all the Windows locks don't conflict (ie. +if other Windows clients have competing locks then just reject +immediately) - this allows us to support 64-bit Windows locks +on 32-bit filesystems. Secondly any locks that are valid are +then mapped onto UNIX fcntl byte range locks. These are the +locks that will be seen by UNIX processes. If there is a conflict +here the lock is rejected.

      Note that if a client has an oplock then it "knows" that no +other client can have the file open so usually doesn't bother +to send to lock request to the server - this means once again +if you need to share files between UNIX and Windows processes +either use IRIX or Linux, or turn off oplocks for these +files/shares.


      PrevHomeNext
      Improved browsing in sambaUpQuick Cross Subnet Browsing / Cross Workgroup Browsing guide
      \ No newline at end of file diff --git a/docs/htmldocs/optional.html b/docs/htmldocs/optional.html index 15e2e998a0c..b15515ddab6 100644 --- a/docs/htmldocs/optional.html +++ b/docs/htmldocs/optional.html @@ -2,19 +2,20 @@ Advanced ConfigurationOptional configurationNext

      III. Advanced Configuration

      III. Optional configuration

      Introduction

      Samba has several features that you might want or might not want to use. The chapters in this @@ -95,79 +92,127 @@ CLASS="TOC" >

      10. System PoliciesIntegrating MS Windows networks with Samba
      10.1. Basic System Policy InfoAgenda
      10.2. Name Resolution in a pure Unix/Linux world
      10.1.1. Creating Group Prolicy Files10.2.1. /etc/hosts
      10.2.2. /etc/resolv.conf
      10.2.3. /etc/host.conf
      10.2.4. /etc/nsswitch.conf
      10.2. Roaming Profiles10.3. Name resolution as used within MS Windows networking
      10.2.1. Windows NT Configuration10.3.1. The NetBIOS Name Cache
      10.2.2. Windows 9X Configuration10.3.2. The LMHOSTS file
      10.2.3. Win9X and WinNT Configuration10.3.3. HOSTS file
      10.2.4. Windows 9X Profile Setup10.3.4. DNS Lookup
      10.3.5. WINS Lookup
      10.2.5. Windows NT Workstation 4.010.4. How browsing functions and how to deploy stable and +dependable browsing using Samba
      10.2.6. Windows NT/200x Server10.5. MS Windows security options and how to configure +Samba for seemless integration
      10.2.7. Sharing Profiles between W9x/Me and NT4/200x/XP workstations10.5.1. Use MS Windows NT as an authentication server
      10.2.8. Windows NT 410.5.2. Make Samba a member of an MS Windows NT security domain
      10.2.9. Windows 2000/XP10.5.3. Configure Samba as an authentication server
      10.6. Conclusions
      11.1. Viewing and changing UNIX permissions using the NT security dialogs
      11.2. How to view file security on a Samba share
      11.3. Viewing file ownership
      11.4. Viewing file or directory permissions
      11.4.1. File Permissions
      11.4.2. Directory Permissions
      11.5. Modifying file or directory permissions
      11.6. Interaction with the standard Samba create mask parameters
      11.7. Interaction with the standard Samba file attribute mapping
      12. Group mapping HOWTO
      13. Configuring PAM for distributed but centrally managed authentication
      13.1. 12.1. Samba and PAM
      13.2. 12.2. Distributed Authentication
      13.3. 12.3. PAM Configuration in smb.conf
      13. Hosting a Microsoft Distributed File System tree on Samba
      13.1. Instructions
      13.1.1. Notes
      14. Printing Support
      14.1. Introduction
      14.2. Configuration
      14.2.1. Creating [print$]
      14.2.2. Setting Drivers for Existing Printers
      14.2.3. Support a large number of printers
      14.2.4. Adding New Printers via the Windows NT APW
      14.2.5. Samba and Printer Ports
      14.3. The Imprints Toolset
      14.3.1. What is Imprints?
      14.3.2. Creating Printer Driver Packages
      14.3.3. The Imprints server
      14.3.4. The Installation Client
      14.4. Diagnosis
      14.4.1. Introduction
      14.4.2. Debugging printer problems
      14.4.3. What printers do I have?
      14.4.4. Setting up printcap and print servers
      14.4.5. Job sent, no output
      14.4.6. Job sent, strange output
      14.4.7. Raw PostScript printed
      14.4.8. Advanced Printing
      14.4.9. Real debugging
      15. CUPS Printing Support
      15.1. Introduction
      15.2. CUPS - RAW Print Through Mode
      15.3. The CUPS Filter Chains
      15.4. CUPS Print Drivers and Devices
      15.4.1. Further printing steps
      15.5. Limiting the number of pages users can print
      15.6. Advanced Postscript Printing from MS Windows
      15.7. Auto-Deletion of CUPS spool files
      16. Unified Logons between Windows NT and UNIX using Winbind
      16.1. 15.1. Abstract
      16.2. 15.2. Introduction
      16.3. 15.3. What Winbind Provides
      16.3.1. 15.3.1. Target Uses
      16.4. 15.4. How Winbind Works
      16.4.1. 15.4.1. Microsoft Remote Procedure Calls
      16.4.2. Microsoft Active Directory Services
      16.4.3. 15.4.2. Name Service Switch
      16.4.4. 15.4.3. Pluggable Authentication Modules
      16.4.5. 15.4.4. User and Group ID Allocation
      16.4.6. 15.4.5. Result Caching
      16.5. 15.5. Installation and Configuration
      16.5.1. 15.5.1. Introduction
      16.5.2. 15.5.2. Requirements
      16.5.3. 15.5.3. Testing Things Out
      16.6. 15.6. Limitations
      16.7. 15.7. Conclusion
      17. Integrating MS Windows networks with Samba
      17.1. Name Resolution in a pure Unix/Linux world16. Passdb MySQL plugin
      17.1.1. /etc/hosts16.1. Building
      17.1.2. /etc/resolv.conf16.2. Configuring
      17.1.3. /etc/host.conf16.3. Using plaintext passwords or encrypted password
      17.1.4. /etc/nsswitch.conf16.4. Getting non-column data from the table
      17.2. Name resolution as used within MS Windows networking17. Passdb XML plugin
      17.2.1. The NetBIOS Name Cache
      17.2.2. The LMHOSTS file
      17.2.3. HOSTS file
      17.2.4. DNS Lookup17.1. Building
      17.2.5. WINS Lookup17.2. Usage
      18. Improved browsing in sambaStackable VFS modules
      18.1. Overview of browsingIntroduction and configuration
      18.2. Browsing support in sambaIncluded modules
      18.3. Problem resolution18.2.1. audit
      18.4. Browsing across subnets18.2.2. recycle
      18.4.1. How does cross subnet browsing work ?18.2.3. netatalk
      18.5. Setting up a WINS server18.3. VFS modules available elsewhere
      18.6. Setting up Browsing in a WORKGROUP18.3.1. DatabaseFS
      18.7. Setting up Browsing in a DOMAIN18.3.2. vscan
      18.8. Forcing samba to be the master19. Storing Samba's User/Machine Account information in an LDAP Directory
      18.9. Making samba the domain master19.1. Purpose
      18.10. Note about broadcast addresses19.2. Introduction
      18.11. Multiple interfaces19.3. Supported LDAP Servers
      19. Hosting a Microsoft Distributed File System tree on Samba19.4. Schema and Relationship to the RFC 2307 posixAccount
      19.1. Instructions19.5. Configuring Samba with LDAP
      19.1.1. Notes19.5.1. OpenLDAP configuration
      19.5.2. Configuring Samba
      19.6. Accounts and Groups management
      19.7. Security and sambaAccount
      19.8. LDAP specials attributes for sambaAccounts
      19.9. Example LDIF Entries for a sambaAccount
      19.10. Comments
      20. Stackable VFS modulesHOWTO Access Samba source code via CVS
      20.1. Introduction and configurationIntroduction
      20.2. Included modulesCVS Access to samba.org
      20.2.1. auditAccess via CVSweb
      20.2.2. recycle
      20.2.3. netatalk
      20.3. VFS modules available elsewhere
      20.3.1. DatabaseFS
      20.3.2. vscanAccess via cvs
      21. Securing SambaGroup mapping HOWTO
      22. Samba performance issues
      21.1. Introduction22.1. Comparisons
      21.2. Using host based protection22.2. Socket options
      21.3. Using interface protection22.3. Read size
      21.4. Using a firewall22.4. Max xmit
      21.5. Using a IPC$ share deny22.5. Log level
      21.6. Upgrading Samba22.6. Read raw
      22. Unicode/Charsets22.7. Write raw
      22.1. What are charsets and unicode?22.8. Slow Clients
      22.2. Samba and charsets22.9. Slow Logins
      22.10. Client tuning
      NextSamba as a NT4 or Win2k domain memberSamba as a NT4 domain memberSystem PoliciesIntegrating MS Windows networks with Samba
      Samba and other CIFS clientsNext

      Chapter 25. Samba and other CIFS clients

      Chapter 24. Samba and other CIFS clients

      This chapter contains client-specific information.

      25.1. Macintosh clients?

      24.1. Macintosh clients?

      Yes.

      25.2. OS2 Client

      24.2. OS2 Client

      25.2.1. How can I configure OS/2 Warp Connect or - OS/2 Warp 4 as a client for Samba?

      24.2.1. How can I configure OS/2 Warp Connect or + OS/2 Warp 4 as a client for Samba?

      A more complete answer to this question can be found on

      25.2.2. How can I configure OS/2 Warp 3 (not Connect), - OS/2 1.2, 1.3 or 2.x for Samba?

      24.2.2. How can I configure OS/2 Warp 3 (not Connect), + OS/2 1.2, 1.3 or 2.x for Samba?

      You can use the free Microsoft LAN Manager 2.2c Client for OS/2 from @@ -239,10 +230,8 @@ CLASS="SECT2" >

      25.2.3. Are there any other issues when OS/2 (any version) - is used as a client?

      24.2.3. Are there any other issues when OS/2 (any version) + is used as a client?

      When you do a NET VIEW or use the "File and Print Client Resource Browser", no Samba servers show up. This can @@ -261,10 +250,8 @@ CLASS="SECT2" >

      25.2.4. How do I get printer driver download working - for OS/2 clients?

      24.2.4. How do I get printer driver download working + for OS/2 clients?

      First, create a share called [PRINTDRV] that is world-readable. Copy your OS/2 driver files there. Note @@ -274,13 +261,17 @@ NAME="AEN3629" >

      Install the NT driver first for that printer. Then, add to your smb.conf a parameter, os2 driver map = - filenamefilename". Then, in the file - specified by filenamefilename, map the name of the NT driver name to the OS/2 driver name as follows:

      25.3. Windows for Workgroups

      24.3. Windows for Workgroups

      25.3.1. Use latest TCP/IP stack from Microsoft

      24.3.1. Use latest TCP/IP stack from Microsoft

      Use the latest TCP/IP stack from microsoft if you use Windows for workgroups.

      25.3.2. Delete .pwl files after password change

      24.3.2. Delete .pwl files after password change

      WfWg does a lousy job with passwords. I find that if I change my password on either the unix box or the PC the safest thing to do is to @@ -358,9 +343,7 @@ CLASS="SECT2" >

      25.3.3. Configure WfW password handling

      24.3.3. Configure WfW password handling

      There is a program call admincfg.exe on the last disk (disk 8) of the WFW 3.11 disk set. To install it @@ -377,9 +360,7 @@ CLASS="SECT2" >

      25.3.4. Case handling of passwords

      24.3.4. Case handling of passwords

      Windows for Workgroups uppercases the password before sending it to the server. Unix passwords can be case-sensitive though. Check the password level to specify what characters samba should try to uppercase when checking.

      25.3.5. Use TCP/IP as default protocol

      To support print queue reporting you may find -that you have to use TCP/IP as the default protocol under -WfWg. For some reason if you leave Netbeui as the default -it may break the print queue reporting on some systems. -It is presumably a WfWg bug.

      25.4. Windows '95/'98

      24.4. Windows '95/'98

      When using Windows 95 OEM SR2 the following updates are recommended where Samba is being used. Please NOTE that the above change will affect you once these @@ -459,9 +423,7 @@ CLASS="SECT1" >

      25.5. Windows 2000 Service Pack 2

      24.5. Windows 2000 Service Pack 2

      There are several annoyances with Windows 2000 SP2. One of which @@ -571,7 +533,7 @@ WIDTH="33%" ALIGN="right" VALIGN="top" >NextHow to compile SAMBAReporting Bugs

      +Optional configuration
      SAMBA Project Documentation
      PrevNext

      III. Optional configuration

      Introduction

      Samba has several features that you might want or might not want to use. The chapters in this +part each cover one specific feature.

      Table of Contents
      10. Integrating MS Windows networks with Samba
      10.1. Agenda
      10.2. Name Resolution in a pure Unix/Linux world
      10.2.1. /etc/hosts
      10.2.2. /etc/resolv.conf
      10.2.3. /etc/host.conf
      10.2.4. /etc/nsswitch.conf
      10.3. Name resolution as used within MS Windows networking
      10.3.1. The NetBIOS Name Cache
      10.3.2. The LMHOSTS file
      10.3.3. HOSTS file
      10.3.4. DNS Lookup
      10.3.5. WINS Lookup
      10.4. How browsing functions and how to deploy stable and +dependable browsing using Samba
      10.5. MS Windows security options and how to configure +Samba for seemless integration
      10.5.1. Use MS Windows NT as an authentication server
      10.5.2. Make Samba a member of an MS Windows NT security domain
      10.5.3. Configure Samba as an authentication server
      10.6. Conclusions
      11. UNIX Permission Bits and Windows NT Access Control Lists
      11.1. Viewing and changing UNIX permissions using the NT + security dialogs
      11.2. How to view file security on a Samba share
      11.3. Viewing file ownership
      11.4. Viewing file or directory permissions
      11.4.1. File Permissions
      11.4.2. Directory Permissions
      11.5. Modifying file or directory permissions
      11.6. Interaction with the standard Samba create mask + parameters
      11.7. Interaction with the standard Samba file attribute + mapping
      12. Configuring PAM for distributed but centrally +managed authentication
      12.1. Samba and PAM
      12.2. Distributed Authentication
      12.3. PAM Configuration in smb.conf
      13. Hosting a Microsoft Distributed File System tree on Samba
      13.1. Instructions
      13.1.1. Notes
      14. Printing Support
      14.1. Introduction
      14.2. Configuration
      14.2.1. Creating [print$]
      14.2.2. Setting Drivers for Existing Printers
      14.2.3. Support a large number of printers
      14.2.4. Adding New Printers via the Windows NT APW
      14.2.5. Samba and Printer Ports
      14.3. The Imprints Toolset
      14.3.1. What is Imprints?
      14.3.2. Creating Printer Driver Packages
      14.3.3. The Imprints server
      14.3.4. The Installation Client
      14.4. Diagnosis
      14.4.1. Introduction
      14.4.2. Debugging printer problems
      14.4.3. What printers do I have?
      14.4.4. Setting up printcap and print servers
      14.4.5. Job sent, no output
      14.4.6. Job sent, strange output
      14.4.7. Raw PostScript printed
      14.4.8. Advanced Printing
      14.4.9. Real debugging
      15. Security levels
      15.1. Introduction
      15.2. More complete description of security levels
      16. Unified Logons between Windows NT and UNIX using Winbind
      16.1. Abstract
      16.2. Introduction
      16.3. What Winbind Provides
      16.3.1. Target Uses
      16.4. How Winbind Works
      16.4.1. Microsoft Remote Procedure Calls
      16.4.2. Name Service Switch
      16.4.3. Pluggable Authentication Modules
      16.4.4. User and Group ID Allocation
      16.4.5. Result Caching
      16.5. Installation and Configuration
      16.5.1. Introduction
      16.5.2. Requirements
      16.5.3. Testing Things Out
      16.6. Limitations
      16.7. Conclusion
      17. Passdb MySQL plugin
      17.1. Building
      17.2. Configuring
      17.3. Using plaintext passwords or encrypted password
      17.4. Getting non-column data from the table
      18. Passdb XML plugin
      18.1. Building
      18.2. Usage
      19. Storing Samba's User/Machine Account information in an LDAP Directory
      19.1. Purpose
      19.2. Introduction
      19.3. Supported LDAP Servers
      19.4. Schema and Relationship to the RFC 2307 posixAccount
      19.5. Configuring Samba with LDAP
      19.5.1. OpenLDAP configuration
      19.5.2. Configuring Samba
      19.6. Accounts and Groups management
      19.7. Security and sambaAccount
      19.8. LDAP specials attributes for sambaAccounts
      19.9. Example LDIF Entries for a sambaAccount
      19.10. Comments
      20. HOWTO Access Samba source code via CVS
      20.1. Introduction
      20.2. CVS Access to samba.org
      20.2.1. Access via CVSweb
      20.2.2. Access via cvs
      21. Group mapping HOWTO
      22. Samba performance issues
      22.1. Comparisons
      22.2. Oplocks
      22.2.1. Overview
      22.2.2. Level2 Oplocks
      22.2.3. Old 'fake oplocks' option - deprecated
      22.3. Socket options
      22.4. Read size
      22.5. Max xmit
      22.6. Locking
      22.7. Share modes
      22.8. Log level
      22.9. Wide lines
      22.10. Read raw
      22.11. Write raw
      22.12. Read prediction
      22.13. Memory mapping
      22.14. Slow Clients
      22.15. Slow Logins
      22.16. Client tuning
      22.17. My Results

      PrevHomeNext
      Samba as a NT4 domain member Integrating MS Windows networks with Samba
      \ No newline at end of file diff --git a/docs/htmldocs/p18.html b/docs/htmldocs/p18.html new file mode 100644 index 00000000000..a8f2a3c53c8 --- /dev/null +++ b/docs/htmldocs/p18.html @@ -0,0 +1,438 @@ + +General installation
      SAMBA Project Documentation
      PrevNext

      I. General installation

      Introduction

      This part contains general info on how to install samba +and how to configure the parts of samba you will most likely need. +PLEASE read this.

      Table of Contents
      1. How to Install and Test SAMBA
      1.1. Read the man pages
      1.2. Building the Binaries
      1.3. The all important step
      1.4. Create the smb configuration file.
      1.5. Test your config file with + testparm
      1.6. Starting the smbd and nmbd
      1.6.1. Starting from inetd.conf
      1.6.2. Alternative: starting it as a daemon
      1.7. Try listing the shares available on your + server
      1.8. Try connecting with the unix client
      1.9. Try connecting from a DOS, WfWg, Win9x, WinNT, + Win2k, OS/2, etc... client
      1.10. What If Things Don't Work?
      1.10.1. Diagnosing Problems
      1.10.2. Scope IDs
      1.10.3. Choosing the Protocol Level
      1.10.4. Printing from UNIX to a Client PC
      1.10.5. Locking
      1.10.6. Mapping Usernames
      2. Improved browsing in samba
      2.1. Overview of browsing
      2.2. Browsing support in samba
      2.3. Problem resolution
      2.4. Browsing across subnets
      2.4.1. How does cross subnet browsing work ?
      2.5. Setting up a WINS server
      2.6. Setting up Browsing in a WORKGROUP
      2.7. Setting up Browsing in a DOMAIN
      2.8. Forcing samba to be the master
      2.9. Making samba the domain master
      2.10. Note about broadcast addresses
      2.11. Multiple interfaces
      3. Oplocks
      3.1. What are oplocks?
      4. Quick Cross Subnet Browsing / Cross Workgroup Browsing guide
      4.1. Discussion
      4.2. Use of the "Remote Announce" parameter
      4.3. Use of the "Remote Browse Sync" parameter
      4.4. Use of WINS
      4.5. Do NOT use more than one (1) protocol on MS Windows machines
      4.6. Name Resolution Order
      5. LanMan and NT Password Encryption in Samba
      5.1. Introduction
      5.2. Important Notes About Security
      5.2.1. Advantages of SMB Encryption
      5.2.2. Advantages of non-encrypted passwords
      5.3. The smbpasswd Command

      PrevHomeNext
      SAMBA Project Documentation How to Install and Test SAMBA
      \ No newline at end of file diff --git a/docs/htmldocs/p3106.html b/docs/htmldocs/p3106.html new file mode 100644 index 00000000000..9967d8fb594 --- /dev/null +++ b/docs/htmldocs/p3106.html @@ -0,0 +1,391 @@ + +Appendixes
      SAMBA Project Documentation
      PrevNext

      IV. Appendixes

      Table of Contents
      23. Portability
      23.1. HPUX
      23.2. SCO Unix
      23.3. DNIX
      23.4. RedHat Linux Rembrandt-II
      24. Samba and other CIFS clients
      24.1. Macintosh clients?
      24.2. OS2 Client
      24.2.1. How can I configure OS/2 Warp Connect or + OS/2 Warp 4 as a client for Samba?
      24.2.2. How can I configure OS/2 Warp 3 (not Connect), + OS/2 1.2, 1.3 or 2.x for Samba?
      24.2.3. Are there any other issues when OS/2 (any version) + is used as a client?
      24.2.4. How do I get printer driver download working + for OS/2 clients?
      24.3. Windows for Workgroups
      24.3.1. Use latest TCP/IP stack from Microsoft
      24.3.2. Delete .pwl files after password change
      24.3.3. Configure WfW password handling
      24.3.4. Case handling of passwords
      24.4. Windows '95/'98
      24.5. Windows 2000 Service Pack 2
      25. Reporting Bugs
      25.1. Introduction
      25.2. General info
      25.3. Debug levels
      25.4. Internal errors
      25.5. Attaching to a running process
      25.6. Patches
      26. Diagnosing your samba server
      26.1. Introduction
      26.2. Assumptions
      26.3. Tests
      26.3.1. Test 1
      26.3.2. Test 2
      26.3.3. Test 3
      26.3.4. Test 4
      26.3.5. Test 5
      26.3.6. Test 6
      26.3.7. Test 7
      26.3.8. Test 8
      26.3.9. Test 9
      26.3.10. Test 10
      26.3.11. Test 11
      26.4. Still having troubles?

      PrevHomeNext
      Samba performance issues Portability
      \ No newline at end of file diff --git a/docs/htmldocs/p544.html b/docs/htmldocs/p544.html new file mode 100644 index 00000000000..502d978b5f8 --- /dev/null +++ b/docs/htmldocs/p544.html @@ -0,0 +1,388 @@ + +Type of installation
      SAMBA Project Documentation
      PrevNext

      II. Type of installation

      Introduction

      This part contains information on using samba in a (NT 4 or ADS) domain. +If you wish to run samba as a domain member or DC, read the appropriate chapter in +this part.

      Table of Contents
      6. How to Configure Samba as a NT4 Primary Domain Controller
      6.1. Prerequisite Reading
      6.2. Background
      6.3. Configuring the Samba Domain Controller
      6.4. Creating Machine Trust Accounts and Joining Clients to the +Domain
      6.4.1. Manual Creation of Machine Trust Accounts
      6.4.2. "On-the-Fly" Creation of Machine Trust Accounts
      6.4.3. Joining the Client to the Domain
      6.5. Common Problems and Errors
      6.6. System Policies and Profiles
      6.7. What other help can I get?
      6.8. Domain Control for Windows 9x/ME
      6.8.1. Configuration Instructions: Network Logons
      6.8.2. Configuration Instructions: Setting up Roaming User Profiles
      6.9. DOMAIN_CONTROL.txt : Windows NT Domain Control & Samba
      7. How to Act as a Backup Domain Controller in a Purely Samba Controlled Domain
      7.1. Prerequisite Reading
      7.2. Background
      7.3. What qualifies a Domain Controller on the network?
      7.3.1. How does a Workstation find its domain controller?
      7.3.2. When is the PDC needed?
      7.4. Can Samba be a Backup Domain Controller?
      7.5. How do I set up a Samba BDC?
      7.5.1. How do I replicate the smbpasswd file?
      8. Samba as a ADS domain member
      8.1. Installing the required packages for Debian
      8.2. Installing the required packages for RedHat
      8.3. Compile Samba
      8.4. Setup your /etc/krb5.conf
      8.5. Create the computer account
      8.5.1. Possible errors
      8.6. Test your server setup
      8.7. Testing with smbclient
      8.8. Notes
      9. Samba as a NT4 domain member
      9.1. Joining an NT Domain with Samba 2.2
      9.2. Samba and Windows 2000 Domains
      9.3. Why is this better than security = server?

      PrevHomeNext
      LanMan and NT Password Encryption in Samba How to Configure Samba as a NT4 Primary Domain Controller
      \ No newline at end of file diff --git a/docs/htmldocs/pam.html b/docs/htmldocs/pam.html index 85e080167e6..ba2bf6c9223 100644 --- a/docs/htmldocs/pam.html +++ b/docs/htmldocs/pam.html @@ -6,19 +6,20 @@ managed authenticationPrevNext

      Chapter 13. Configuring PAM for distributed but centrally +NAME="PAM">Chapter 12. Configuring PAM for distributed but centrally managed authentication

      13.1. Samba and PAM

      12.1. Samba and PAM

      A number of Unix systems (eg: Sun Solaris), as well as the xxxxBSD family and Linux, now utilize the Pluggable Authentication @@ -119,45 +116,6 @@ or by editing individual files that are located in /etc/pam.d.

      If the PAM authentication module (loadable link library file) is located in the - default location then it is not necessary to specify the path. In the case of - Linux, the default location is /lib/security. If the module - is located other than default then the path may be specified as: - -

      	eg: "auth       required      /other_path/pam_strange_module.so"
      -	
      -

      The following is an example

      	#%PAM-1.0
      -	# The PAM configuration file for the `login' service
      -	#
      -	auth 		required	pam_securetty.so
      -	auth 		required	pam_nologin.so
      -	# auth 		required	pam_dialup.so
      -	# auth 		optional	pam_mail.so
      -	auth		required	pam_pwdb.so shadow md5
      -	# account    	requisite  	pam_time.so
      -	account		required	pam_pwdb.so
      -	session		required	pam_pwdb.so
      -	# session 	optional	pam_lastlog.so
      -	# password   	required   	pam_cracklib.so retry=3
      -	password	required	pam_pwdb.so shadow md5
      #%PAM-1.0 +# The PAM configuration file for the `login' service +# +auth required pam_securetty.so +auth required pam_nologin.so +# auth required pam_dialup.so +# auth optional pam_mail.so +auth required pam_pwdb.so shadow md5 +# account requisite pam_time.so +account required pam_pwdb.so +session required pam_pwdb.so +# session optional pam_lastlog.so +# password required pam_cracklib.so retry=3 +password required pam_pwdb.so shadow md5

      PAM allows use of replacable modules. Those available on a @@ -194,19 +152,19 @@ sample system include:

      	$ /bin/ls /lib/security
      -	pam_access.so    pam_ftp.so          pam_limits.so     
      -	pam_ncp_auth.so  pam_rhosts_auth.so  pam_stress.so     
      -	pam_cracklib.so  pam_group.so        pam_listfile.so   
      -	pam_nologin.so   pam_rootok.so       pam_tally.so      
      -	pam_deny.so      pam_issue.so        pam_mail.so       
      -	pam_permit.so    pam_securetty.so    pam_time.so       
      -	pam_dialup.so    pam_lastlog.so      pam_mkhomedir.so  
      -	pam_pwdb.so      pam_shells.so       pam_unix.so       
      -	pam_env.so       pam_ldap.so         pam_motd.so       
      -	pam_radius.so    pam_smbpass.so      pam_unix_acct.so  
      -	pam_wheel.so     pam_unix_auth.so    pam_unix_passwd.so
      -	pam_userdb.so    pam_warn.so         pam_unix_session.so
      $ /bin/ls /lib/security +pam_access.so pam_ftp.so pam_limits.so +pam_ncp_auth.so pam_rhosts_auth.so pam_stress.so +pam_cracklib.so pam_group.so pam_listfile.so +pam_nologin.so pam_rootok.so pam_tally.so +pam_deny.so pam_issue.so pam_mail.so +pam_permit.so pam_securetty.so pam_time.so +pam_dialup.so pam_lastlog.so pam_mkhomedir.so +pam_pwdb.so pam_shells.so pam_unix.so +pam_env.so pam_ldap.so pam_motd.so +pam_radius.so pam_smbpass.so pam_unix_acct.so +pam_wheel.so pam_unix_auth.so pam_unix_passwd.so +pam_userdb.so pam_warn.so pam_unix_session.so

      The following example for the login program replaces the use of @@ -269,13 +227,13 @@ source distribution.

      	#%PAM-1.0
      -	# The PAM configuration file for the `login' service
      -	#
      -	auth		required	pam_smbpass.so nodelay
      -	account		required	pam_smbpass.so nodelay
      -	session		required	pam_smbpass.so nodelay
      -	password	required	pam_smbpass.so nodelay
      #%PAM-1.0 +# The PAM configuration file for the `login' service +# +auth required pam_smbpass.so nodelay +account required pam_smbpass.so nodelay +session required pam_smbpass.so nodelay +password required pam_smbpass.so nodelay

      The following is the PAM configuration file for a particular @@ -286,13 +244,13 @@ CLASS="FILENAME" >

      	#%PAM-1.0
      -	# The PAM configuration file for the `samba' service
      -	#
      -	auth       required     /lib/security/pam_pwdb.so nullok nodelay shadow audit
      -	account    required     /lib/security/pam_pwdb.so audit nodelay
      -	session    required     /lib/security/pam_pwdb.so nodelay
      -	password   required     /lib/security/pam_pwdb.so shadow md5
      #%PAM-1.0 +# The PAM configuration file for the `samba' service +# +auth required /lib/security/pam_pwdb.so nullok nodelay shadow audit +account required /lib/security/pam_pwdb.so audit nodelay +session required /lib/security/pam_pwdb.so nodelay +password required /lib/security/pam_pwdb.so shadow md5

      In the following example the decision has been made to use the @@ -303,36 +261,16 @@ program.

      	#%PAM-1.0
      -	# The PAM configuration file for the `samba' service
      -	#
      -	auth       required     /lib/security/pam_smbpass.so nodelay
      -	account    required     /lib/security/pam_pwdb.so audit nodelay
      -	session    required     /lib/security/pam_pwdb.so nodelay
      -	password   required     /lib/security/pam_smbpass.so nodelay smbconf=/etc/samba.d/smb.conf
      #%PAM-1.0 +# The PAM configuration file for the `samba' service +# +auth required /lib/security/pam_smbpass.so nodelay +account required /lib/security/pam_pwdb.so audit nodelay +session required /lib/security/pam_pwdb.so nodelay +password required /lib/security/pam_smbpass.so nodelay smbconf=/etc/samba.d/smb.conf

      PAM allows stacking of authentication mechanisms. It is +>Note: PAM allows stacking of authentication mechanisms. It is also possible to pass information obtained within one PAM module through to the next module in the PAM stack. Please refer to the documentation for your particular system implementation for details regarding the specific @@ -349,19 +287,13 @@ CLASS="FILENAME" on the basis that it allows for easier administration. As with all issues in life though, every decision makes trade-offs, so you may want examine the PAM documentation for further helpful information.

      13.2. Distributed Authentication

      12.2. Distributed Authentication

      The astute administrator will realize from this that the combination of winbindd, and a distributed -passdb backend, such as ldap, will allow the establishment of a -centrally managed, distributed +>, and rsync (see +http://rsync.samba.org/) +will allow the establishment of a centrally managed, distributed user/password database that can also be used by all PAM (eg: Linux) aware programs and applications. This arrangement can have particularly potent advantages compared with the @@ -385,9 +324,7 @@ CLASS="SECT1" >

      13.3. PAM Configuration in smb.conf

      12.3. PAM Configuration in smb.conf

      There is an option in smb.conf called . The following is from the on-line help for this option in SWAT;

      When Samba is configured to enable PAM support (i.e. -When Samba 2.2 is configure to enable PAM support (i.e. +--with-pam--with-pam), this parameter will control whether or not Samba should obey PAM's account and session management directives. The default behavior @@ -437,7 +374,7 @@ WIDTH="33%" ALIGN="left" VALIGN="top" >PrevNextGroup mapping HOWTOUNIX Permission Bits and Windows NT Access Control ListsPrinting SupportHosting a Microsoft Distributed File System tree on Samba

      -User information database
      SAMBA Project Documentation
      PrevNext

      Chapter 3. User information database

      3.1. Introduction

      Old windows clients send plain text passwords over the wire. - Samba can check these passwords by crypting them and comparing them - to the hash stored in the unix user database. -

      Newer windows clients send encrypted passwords (so-called - Lanman and NT hashes) over - the wire, instead of plain text passwords. The newest clients - will only send encrypted passwords and refuse to send plain text - passwords, unless their registry is tweaked. -

      These passwords can't be converted to unix style encrypted - passwords. Because of that you can't use the standard unix - user database, and you have to store the Lanman and NT hashes - somewhere else.

      Next to a differently encrypted passwords, - windows also stores certain data for each user - that is not stored in a unix user database, e.g. - workstations the user may logon from, the location where his/her - profile is stored, etc. - Samba retrieves and stores this information using a "passdb backend". - Commonly - available backends are LDAP, plain text file, MySQL and nisplus. - For more information, see the documentation about the - passdb backend = parameter. -

      3.2. Important Notes About Security

      The unix and SMB password encryption techniques seem similar - on the surface. This similarity is, however, only skin deep. The unix - scheme typically sends clear text passwords over the network when - logging in. This is bad. The SMB encryption scheme never sends the - cleartext password over the network but it does store the 16 byte - hashed values on disk. This is also bad. Why? Because the 16 byte hashed - values are a "password equivalent". You cannot derive the user's - password from them, but they could potentially be used in a modified - client to gain access to a server. This would require considerable - technical knowledge on behalf of the attacker but is perfectly possible. - You should thus treat the data stored in whatever - passdb backend you use (smbpasswd file, ldap, mysql) as though it contained the - cleartext passwords of all your users. Its contents must be kept - secret, and the file should be protected accordingly.

      Ideally we would like a password scheme which neither requires - plain text passwords on the net or on disk. Unfortunately this - is not available as Samba is stuck with being compatible with - other SMB systems (WinNT, WfWg, Win95 etc).

      Note that Windows NT 4.0 Service pack 3 changed the - default for permissible authentication so that plaintext - passwords are never sent over the wire. - The solution to this is either to switch to encrypted passwords - with Samba or edit the Windows NT registry to re-enable plaintext - passwords. See the document WinNT.txt for details on how to do - this.

      Other Microsoft operating systems which also exhibit - this behavior includes

      These versions of MS Windows do not support full domain - security protocols, although they may log onto a domain environment. - Of these Only MS Windows XP Home does NOT support domain logons.

      MS DOS Network client 3.0 with - the basic network redirector installed
      Windows 95 with the network redirector - update installed
      Windows 98 [se]
      Windows Me
      Windows XP Home

      The following versions of MS Windows fully support domain - security protocols.

      Windows NT 3.5x
      Windows NT 4.0
      Windows 2000 Professional
      Windows 200x Server/Advanced Server
      Windows XP Professional

      Note :All current release of - Microsoft SMB/CIFS clients support authentication via the - SMB Challenge/Response mechanism described here. Enabling - clear text authentication does not disable the ability - of the client to participate in encrypted authentication.

      MS Windows clients will cache the encrypted password alone. - Even when plain text passwords are re-enabled, through the appropriate - registry change, the plain text password is NEVER cached. This means that - in the event that a network connections should become disconnected (broken) - only the cached (encrypted) password will be sent to the resource server - to affect a auto-reconnect. If the resource server does not support encrypted - passwords the auto-reconnect will fail. USE OF ENCRYPTED PASSWORDS - IS STRONGLY ADVISED.

      3.2.1. Advantages of SMB Encryption

      Plain text passwords are not passed across - the network. Someone using a network sniffer cannot just - record passwords going to the SMB server.
      WinNT doesn't like talking to a server - that SM not support encrypted passwords. It will refuse - to browse the server if the server is also in user level - security mode. It will insist on prompting the user for the - password on each connection, which is very annoying. The - only things you can do to stop this is to use SMB encryption. -
      Encrypted password support allows auto-matic share - (resource) reconnects.

      3.2.2. Advantages of non-encrypted passwords

      Plain text passwords are not kept - on disk, and are NOT cached in memory.
      Uses same password file as other unix - services such as login and ftp
      Use of other services (such as telnet and ftp) which - send plain text passwords over the net, so sending them for SMB - isn't such a big deal.

      3.3. The smbpasswd Command

      The smbpasswd utility is a utility similar to the - passwd or yppasswd programs. - It maintains the two 32 byte password fields in the passdb backend.

      smbpasswd works in a client-server mode - where it contacts the local smbd to change the user's password on its - behalf. This has enormous benefits - as follows.

      smbpasswd has the capability - to change passwords on Windows NT servers (this only works when - the request is sent to the NT Primary Domain Controller if you - are changing an NT Domain user's password).

      To run smbpasswd as a normal user just type :

      $ smbpasswd

      Old SMB password: <type old value here - - or hit return if there was no old password>

      New SMB Password: <type new value> -

      Repeat New SMB Password: <re-type new value -

      If the old value does not match the current value stored for - that user, or the two new values do not match each other, then the - password will not be changed.

      If invoked by an ordinary user it will only allow the user - to change his or her own Samba password.

      If run by the root user smbpasswd may take an optional - argument, specifying the user name whose SMB password you wish to - change. Note that when run as root smbpasswd does not prompt for - or check the old password value, thus allowing root to set passwords - for users who have forgotten their passwords.

      smbpasswd is designed to work in the same way - and be familiar to UNIX users who use the passwd or - yppasswd commands.

      For more details on using smbpasswd refer - to the man page which will always be the definitive reference.

      3.4. Plain text

      Older versions of samba retrieved user information from the unix user database -and eventually some other fields from the file /etc/samba/smbpasswd -or /etc/smbpasswd. When password encryption is disabled, no -data is stored at all.

      3.5. TDB

      Samba can also store the user data in a "TDB" (Trivial Database). Using this backend -doesn't require any additional configuration. This backend is recommended for new installations who -don't require LDAP.

      3.6. LDAP

      3.6.1. Introduction

      This document describes how to use an LDAP directory for storing Samba user -account information traditionally stored in the smbpasswd(5) file. It is -assumed that the reader already has a basic understanding of LDAP concepts -and has a working directory server already installed. For more information -on LDAP architectures and Directories, please refer to the following sites.

      Note that O'Reilly Publishing is working on -a guide to LDAP for System Administrators which has a planned release date of -early summer, 2002.

      Two additional Samba resources which may prove to be helpful are

      • The Samba-PDC-LDAP-HOWTO - maintained by Ignacio Coupeau.

      • The NT migration scripts from IDEALX that are - geared to manage users and group in such a Samba-LDAP Domain Controller configuration. -

      3.6.2. Introduction

      Traditionally, when configuring "encrypt -passwords = yes" in Samba's smb.conf file, user account -information such as username, LM/NT password hashes, password change times, and account -flags have been stored in the smbpasswd(5) file. There are several -disadvantages to this approach for sites with very large numbers of users (counted -in the thousands).

      • The first is that all lookups must be performed sequentially. Given that -there are approximately two lookups per domain logon (one for a normal -session connection such as when mapping a network drive or printer), this -is a performance bottleneck for lareg sites. What is needed is an indexed approach -such as is used in databases.

      • The second problem is that administrators who desired to replicate a -smbpasswd file to more than one Samba server were left to use external -tools such as rsync(1) and ssh(1) -and wrote custom, in-house scripts.

      • And finally, the amount of information which is stored in an -smbpasswd entry leaves no room for additional attributes such as -a home directory, password expiration time, or even a Relative -Identified (RID).

      As a result of these defeciencies, a more robust means of storing user attributes -used by smbd was developed. The API which defines access to user accounts -is commonly referred to as the samdb interface (previously this was called the passdb -API, and is still so named in the CVS trees). In Samba 2.2.3, enabling support -for a samdb backend (e.g. --with-ldapsam or ---with-tdbsam) requires compile time support.

      When compiling Samba to include the --with-ldapsam autoconf -option, smbd (and associated tools) will store and lookup user accounts in -an LDAP directory. In reality, this is very easy to understand. If you are -comfortable with using an smbpasswd file, simply replace "smbpasswd" with -"LDAP directory" in all the documentation.

      There are a few points to stress about what the --with-ldapsam -does not provide. The LDAP support referred to in the this documentation does not -include:

      • A means of retrieving user account information from - an Windows 2000 Active Directory server.

      • A means of replacing /etc/passwd.

      The second item can be accomplished by using LDAP NSS and PAM modules. LGPL -versions of these libraries can be obtained from PADL Software -(http://www.padl.com/). However, -the details of configuring these packages are beyond the scope of this document.

      3.6.3. Supported LDAP Servers

      The LDAP samdb code in 2.2.3 (and later) has been developed and tested -using the OpenLDAP 2.0 server and client libraries. -The same code should be able to work with Netscape's Directory Server -and client SDK. However, due to lack of testing so far, there are bound -to be compile errors and bugs. These should not be hard to fix. -If you are so inclined, please be sure to forward all patches to -samba-patches@samba.org and -jerry@samba.org.

      3.6.4. Schema and Relationship to the RFC 2307 posixAccount

      Samba 3.0 includes the necessary schema file for OpenLDAP 2.0 in -examples/LDAP/samba.schema. The sambaAccount objectclass is given here:

      objectclass ( 1.3.1.5.1.4.1.7165.2.2.2 NAME 'sambaAccount' SUP top STRUCTURAL
      -     DESC 'Samba Account'
      -     MUST ( uid $ rid )
      -     MAY  ( cn $ lmPassword $ ntPassword $ pwdLastSet $ logonTime $
      -            logoffTime $ kickoffTime $ pwdCanChange $ pwdMustChange $ acctFlags $
      -            displayName $ smbHome $ homeDrive $ scriptPath $ profilePath $
      -            description $ userWorkstations $ primaryGroupID $ domain ))

      The samba.schema file has been formatted for OpenLDAP 2.0. The OID's are -owned by the Samba Team and as such is legal to be openly published. -If you translate the schema to be used with Netscape DS, please -submit the modified schema file as a patch to jerry@samba.org

      Just as the smbpasswd file is mean to store information which supplements a -user's /etc/passwd entry, so is the sambaAccount object -meant to supplement the UNIX user account information. A sambaAccount is a -STRUCTURAL objectclass so it can be stored individually -in the directory. However, there are several fields (e.g. uid) which overlap -with the posixAccount objectclass outlined in RFC2307. This is by design.

      In order to store all user account information (UNIX and Samba) in the directory, -it is necessary to use the sambaAccount and posixAccount objectclasses in -combination. However, smbd will still obtain the user's UNIX account -information via the standard C library calls (e.g. getpwnam(), et. al.). -This means that the Samba server must also have the LDAP NSS library installed -and functioning correctly. This division of information makes it possible to -store all Samba account information in LDAP, but still maintain UNIX account -information in NIS while the network is transitioning to a full LDAP infrastructure.

      3.6.5. Configuring Samba with LDAP

      3.6.5.1. OpenLDAP configuration

      To include support for the sambaAccount object in an OpenLDAP directory -server, first copy the samba.schema file to slapd's configuration directory.

      root# cp samba.schema /etc/openldap/schema/

      Next, include the samba.schema file in slapd.conf. -The sambaAccount object contains two attributes which depend upon other schema -files. The 'uid' attribute is defined in cosine.schema and -the 'displayName' attribute is defined in the inetorgperson.schema -file. Both of these must be included before the samba.schema file.

      ## /etc/openldap/slapd.conf
      -
      -## schema files (core.schema is required by default)
      -include	           /etc/openldap/schema/core.schema
      -
      -## needed for sambaAccount
      -include            /etc/openldap/schema/cosine.schema
      -include            /etc/openldap/schema/inetorgperson.schema
      -include            /etc/openldap/schema/samba.schema
      -
      -## uncomment this line if you want to support the RFC2307 (NIS) schema
      -## include         /etc/openldap/schema/nis.schema
      -
      -....

      It is recommended that you maintain some indices on some of the most usefull attributes, -like in the following example, to speed up searches made on sambaAccount objectclasses -(and possibly posixAccount and posixGroup as well).

      # Indices to maintain
      -## required by OpenLDAP 2.0
      -index objectclass   eq
      -
      -## support pb_getsampwnam()
      -index uid           pres,eq
      -## support pdb_getsambapwrid()
      -index rid           eq
      -
      -## uncomment these if you are storing posixAccount and
      -## posixGroup entries in the directory as well
      -##index uidNumber     eq
      -##index gidNumber     eq
      -##index cn            eq
      -##index memberUid     eq

      3.6.5.2. Configuring Samba

      The following parameters are available in smb.conf only with --with-ldapsam -was included with compiling Samba.

      These are described in the smb.conf(5) man -page and so will not be repeated here. However, a sample smb.conf file for -use with an LDAP directory could appear as

      ## /usr/local/samba/lib/smb.conf
      -[global]
      -     security = user
      -     encrypt passwords = yes
      -
      -     netbios name = TASHTEGO
      -     workgroup = NARNIA
      -
      -     # ldap related parameters
      -
      -     # define the DN to use when binding to the directory servers
      -     # The password for this DN is not stored in smb.conf.  Rather it
      -     # must be set by using 'smbpasswd -w secretpw' to store the
      -     # passphrase in the secrets.tdb file.  If the "ldap admin dn" values
      -     # changes, this password will need to be reset.
      -     ldap admin dn = "cn=Samba Manager,ou=people,dc=samba,dc=org"
      -
      -     #  specify the LDAP server's hostname (defaults to locahost)
      -     ldap server = ahab.samba.org
      -
      -     # Define the SSL option when connecting to the directory
      -     # ('off', 'start tls', or 'on' (default))
      -     ldap ssl = start tls
      -
      -     # define the port to use in the LDAP session (defaults to 636 when
      -     # "ldap ssl = on")
      -     ldap port = 389
      -
      -     # specify the base DN to use when searching the directory
      -     ldap suffix = "ou=people,dc=samba,dc=org"
      -
      -     # generally the default ldap search filter is ok
      -     # ldap filter = "(&(uid=%u)(objectclass=sambaAccount))"

      3.6.6. Accounts and Groups management

      As users accounts are managed thru the sambaAccount objectclass, you should -modify you existing administration tools to deal with sambaAccount attributes.

      Machines accounts are managed with the sambaAccount objectclass, just -like users accounts. However, it's up to you to stored thoses accounts -in a different tree of you LDAP namespace: you should use -"ou=Groups,dc=plainjoe,dc=org" to store groups and -"ou=People,dc=plainjoe,dc=org" to store users. Just configure your -NSS and PAM accordingly (usually, in the /etc/ldap.conf configuration -file).

      In Samba release 3.0, the group management system is based on posix -groups. This means that Samba make usage of the posixGroup objectclass. -For now, there is no NT-like group system management (global and local -groups).

      3.6.7. Security and sambaAccount

      There are two important points to remember when discussing the security -of sambaAccount entries in the directory.

      • Never retrieve the lmPassword or - ntPassword attribute values over an unencrypted LDAP session.

      • Never allow non-admin users to - view the lmPassword or ntPassword attribute values.

      These password hashes are clear text equivalents and can be used to impersonate -the user without deriving the original clear text strings. For more information -on the details of LM/NT password hashes, refer to the ENCRYPTION chapter of the Samba-HOWTO-Collection.

      To remedy the first security issue, the "ldap ssl" smb.conf parameter defaults -to require an encrypted session (ldap ssl = on) using -the default port of 636 -when contacting the directory server. When using an OpenLDAP 2.0 server, it -is possible to use the use the StartTLS LDAP extended operation in the place of -LDAPS. In either case, you are strongly discouraged to disable this security -(ldap ssl = off).

      Note that the LDAPS protocol is deprecated in favor of the LDAPv3 StartTLS -extended operation. However, the OpenLDAP library still provides support for -the older method of securing communication between clients and servers.

      The second security precaution is to prevent non-administrative users from -harvesting password hashes from the directory. This can be done using the -following ACL in slapd.conf:

      ## allow the "ldap admin dn" access, but deny everyone else
      -access to attrs=lmPassword,ntPassword
      -     by dn="cn=Samba Admin,ou=people,dc=plainjoe,dc=org" write
      -     by * none

      3.6.8. LDAP specials attributes for sambaAccounts

      The sambaAccount objectclass is composed of the following attributes:

      • lmPassword: the LANMAN password 16-byte hash stored as a character - representation of a hexidecimal string.

      • ntPassword: the NT password hash 16-byte stored as a character - representation of a hexidecimal string.

      • pwdLastSet: The integer time in seconds since 1970 when the - lmPassword and ntPassword attributes were last set. -

      • acctFlags: string of 11 characters surrounded by square brackets [] - representing account flags such as U (user), W(workstation), X(no password expiration), and - D(disabled).

      • logonTime: Integer value currently unused

      • logoffTime: Integer value currently unused

      • kickoffTime: Integer value currently unused

      • pwdCanChange: Integer value currently unused

      • pwdMustChange: Integer value currently unused

      • homeDrive: specifies the drive letter to which to map the - UNC path specified by homeDirectory. The drive letter must be specified in the form "X:" - where X is the letter of the drive to map. Refer to the "logon drive" parameter in the - smb.conf(5) man page for more information.

      • scriptPath: The scriptPath property specifies the path of - the user's logon script, .CMD, .EXE, or .BAT file. The string can be null. The path - is relative to the netlogon share. Refer to the "logon script" parameter in the - smb.conf(5) man page for more information.

      • profilePath: specifies a path to the user's profile. - This value can be a null string, a local absolute path, or a UNC path. Refer to the - "logon path" parameter in the smb.conf(5) man page for more information.

      • smbHome: The homeDirectory property specifies the path of - the home directory for the user. The string can be null. If homeDrive is set and specifies - a drive letter, homeDirectory should be a UNC path. The path must be a network - UNC path of the form \\server\share\directory. This value can be a null string. - Refer to the "logon home" parameter in the smb.conf(5) man page for more information. -

      • userWorkstation: character string value currently unused. -

      • rid: the integer representation of the user's relative identifier - (RID).

      • primaryGroupID: the relative identifier (RID) of the primary group - of the user.

      The majority of these parameters are only used when Samba is acting as a PDC of -a domain (refer to the Samba-PDC-HOWTO for details on -how to configure Samba as a Primary Domain Controller). The following four attributes -are only stored with the sambaAccount entry if the values are non-default values:

      • smbHome

      • scriptPath

      • logonPath

      • homeDrive

      These attributes are only stored with the sambaAccount entry if -the values are non-default values. For example, assume TASHTEGO has now been -configured as a PDC and that logon home = \\%L\%u was defined in -its smb.conf file. When a user named "becky" logons to the domain, -the logon home string is expanded to \\TASHTEGO\becky. -If the smbHome attribute exists in the entry "uid=becky,ou=people,dc=samba,dc=org", -this value is used. However, if this attribute does not exist, then the value -of the logon home parameter is used in its place. Samba -will only write the attribute value to the directory entry is the value is -something other than the default (e.g. \\MOBY\becky).

      3.6.9. Example LDIF Entries for a sambaAccount

      The following is a working LDIF with the inclusion of the posixAccount objectclass:

      dn: uid=guest2, ou=people,dc=plainjoe,dc=org
      -ntPassword: 878D8014606CDA29677A44EFA1353FC7
      -pwdMustChange: 2147483647
      -primaryGroupID: 1201
      -lmPassword: 552902031BEDE9EFAAD3B435B51404EE
      -pwdLastSet: 1010179124
      -logonTime: 0
      -objectClass: sambaAccount
      -uid: guest2
      -kickoffTime: 2147483647
      -acctFlags: [UX         ]
      -logoffTime: 2147483647
      -rid: 19006
      -pwdCanChange: 0

      The following is an LDIF entry for using both the sambaAccount and -posixAccount objectclasses:

      dn: uid=gcarter, ou=people,dc=plainjoe,dc=org
      -logonTime: 0
      -displayName: Gerald Carter
      -lmPassword: 552902031BEDE9EFAAD3B435B51404EE
      -primaryGroupID: 1201
      -objectClass: posixAccount
      -objectClass: sambaAccount
      -acctFlags: [UX         ]
      -userPassword: {crypt}BpM2ej8Rkzogo
      -uid: gcarter
      -uidNumber: 9000
      -cn: Gerald Carter
      -loginShell: /bin/bash
      -logoffTime: 2147483647
      -gidNumber: 100
      -kickoffTime: 2147483647
      -pwdLastSet: 1010179230
      -rid: 19000
      -homeDirectory: /home/tashtego/gcarter
      -pwdCanChange: 0
      -pwdMustChange: 2147483647
      -ntPassword: 878D8014606CDA29677A44EFA1353FC7

      3.7. MySQL

      3.7.1. Building

      To build the plugin, run make bin/pdb_mysql.so -in the source/ directory of samba distribution.

      Next, copy pdb_mysql.so to any location you want. I -strongly recommend installing it in $PREFIX/lib or /usr/lib/samba/

      3.7.2. Creating the database

      You either can set up your own table and specify the field names to pdb_mysql (see below -for the column names) or use the default table. The file examples/pdb/mysql/mysql.dump -contains the correct queries to create the required tables. Use the command : - -mysql -uusername -hhostname -ppassword databasename < /path/to/samba/examples/pdb/mysql/mysql.dump

      3.7.3. Configuring

      This plugin lacks some good documentation, but here is some short info:

      Add a the following to the passdb backend variable in your smb.conf: -

      passdb backend = [other-plugins] plugin:/location/to/pdb_mysql.so:identifier [other-plugins]

      The identifier can be any string you like, as long as it doesn't collide with -the identifiers of other plugins or other instances of pdb_mysql. If you -specify multiple pdb_mysql.so entries in 'passdb backend', you also need to -use different identifiers!

      Additional options can be given thru the smb.conf file in the [global] section.

      identifier:mysql host                     - host name, defaults to 'localhost'
      -identifier:mysql password
      -identifier:mysql user                     - defaults to 'samba'
      -identifier:mysql database                 - defaults to 'samba'
      -identifier:mysql port                     - defaults to 3306
      -identifier:table                          - Name of the table containing users

      Since the password for the mysql user is stored in the -smb.conf file, you should make the the smb.conf file -readable only to the user that runs samba. This is considered a security -bug and will be fixed soon.

      Names of the columns in this table(I've added column types those columns should have first):

      identifier:logon time column             - int(9)
      -identifier:logoff time column            - int(9)
      -identifier:kickoff time column           - int(9)
      -identifier:pass last set time column     - int(9)
      -identifier:pass can change time column   - int(9)
      -identifier:pass must change time column  - int(9)
      -identifier:username column               - varchar(255) - unix username
      -identifier:domain column                 - varchar(255) - NT domain user is part of
      -identifier:nt username column            - varchar(255) - NT username
      -identifier:fullname column            - varchar(255) - Full name of user
      -identifier:home dir column               - varchar(255) - Unix homedir path
      -identifier:dir drive column              - varchar(2) - Directory drive path (eg: 'H:')
      -identifier:logon script column           - varchar(255) - Batch file to run on client side when logging on
      -identifier:profile path column           - varchar(255) - Path of profile
      -identifier:acct desc column              - varchar(255) - Some ASCII NT user data
      -identifier:workstations column           - varchar(255) - Workstations user can logon to (or NULL for all)
      -identifier:unknown string column         - varchar(255) - unknown string
      -identifier:munged dial column            - varchar(255) - ?
      -identifier:uid column                    - int(9) - Unix user ID (uid)
      -identifier:gid column                    - int(9) - Unix user group (gid)
      -identifier:user sid column               - varchar(255) - NT user SID
      -identifier:group sid column              - varchar(255) - NT group ID
      -identifier:lanman pass column            - varchar(255) - encrypted lanman password
      -identifier:nt pass column                - varchar(255) - encrypted nt passwd
      -identifier:plain pass column             - varchar(255) - plaintext password
      -identifier:acct control column           - int(9) - nt user data
      -identifier:unknown 3 column              - int(9) - unknown
      -identifier:logon divs column             - int(9) - ?
      -identifier:hours len column              - int(9) - ?
      -identifier:unknown 5 column              - int(9) - unknown
      -identifier:unknown 6 column              - int(9) - unknown

      Eventually, you can put a colon (:) after the name of each column, which -should specify the column to update when updating the table. You can also -specify nothing behind the colon - then the data from the field will not be -updated.

      3.7.4. Using plaintext passwords or encrypted password

      I strongly discourage the use of plaintext passwords, however, you can use them:

      If you would like to use plaintext passwords, set 'identifier:lanman pass column' and 'identifier:nt pass column' to 'NULL' (without the quotes) and 'identifier:plain pass column' to the name of the column containing the plaintext passwords.

      If you use encrypted passwords, set the 'identifier:plain pass column' to 'NULL' (without the quotes). This is the default.

      3.7.5. Getting non-column data from the table

      It is possible to have not all data in the database and making some 'constant'.

      For example, you can set 'identifier:fullname column' to : -CONCAT(First_name,' ',Sur_name)

      Or, set 'identifier:workstations column' to : -NULL

      See the MySQL documentation for more language constructs.

      3.8. Passdb XML plugin

      3.8.1. Building

      This module requires libxml2 to be installed.

      To build pdb_xml, run: make bin/pdb_xml.so in -the directory source/.

      3.8.2. Usage

      The usage of pdb_xml is pretty straightforward. To export data, use: - -pdbedit -e plugin:/usr/lib/samba/pdb_xml.so:filename - -(where filename is the name of the file to put the data in)

      To import data, use: -pdbedit -i plugin:/usr/lib/samba/pdb_xml.so:filename -e current-pdb - -Where filename is the name to read the data from and current-pdb to put it in.


      PrevHomeNext
      Quick Cross Subnet Browsing / Cross Workgroup Browsing guideUpType of installation
      \ No newline at end of file diff --git a/docs/htmldocs/pdb-mysql.html b/docs/htmldocs/pdb-mysql.html new file mode 100644 index 00000000000..abca946f6f1 --- /dev/null +++ b/docs/htmldocs/pdb-mysql.html @@ -0,0 +1,288 @@ + +Passdb MySQL plugin
      SAMBA Project Documentation
      PrevNext

      Chapter 16. Passdb MySQL plugin

      16.2. Configuring

      This plugin lacks some good documentation, but here is some short info:

      Add a the following to the passdb backend variable in your smb.conf: +

      passdb backend = [other-plugins] plugin:/location/to/pdb_mysql.so:identifier [other-plugins]

      The identifier can be any string you like, as long as it doesn't collide with +the identifiers of other plugins or other instances of pdb_mysql. If you +specify multiple pdb_mysql.so entries in 'passdb backend', you also need to +use different identifiers!

      Additional options can be given thru the smb.conf file in the [global] section.

      identifier:mysql host                     - host name, defaults to 'localhost'
      +identifier:mysql password
      +identifier:mysql user                     - defaults to 'samba'
      +identifier:mysql database                 - defaults to 'samba'
      +identifier:mysql port                     - defaults to 3306
      +identifier:table                          - Name of the table containing users

      WARNING: since the password for the mysql user is stored in the +smb.conf file, you should make the the smb.conf file +readable only to the user that runs samba. This is considered a security +bug and will be fixed soon.

      Names of the columns in this table(I've added column types those columns should have first):

      identifier:logon time column             - int(9)
      +identifier:logoff time column            - int(9)
      +identifier:kickoff time column           - int(9)
      +identifier:pass last set time column     - int(9)
      +identifier:pass can change time column   - int(9)
      +identifier:pass must change time column  - int(9)
      +identifier:username column               - varchar(255) - unix username
      +identifier:domain column                 - varchar(255) - NT domain user is part of
      +identifier:nt username column            - varchar(255) - NT username
      +identifier:fullname column            - varchar(255) - Full name of user
      +identifier:home dir column               - varchar(255) - Unix homedir path
      +identifier:dir drive column              - varchar(2) - Directory drive path (eg: 'H:')
      +identifier:logon script column           - varchar(255) - Batch file to run on client side when logging on
      +identifier:profile path column           - varchar(255) - Path of profile
      +identifier:acct desc column              - varchar(255) - Some ASCII NT user data
      +identifier:workstations column           - varchar(255) - Workstations user can logon to (or NULL for all)
      +identifier:unknown string column         - varchar(255) - unknown string
      +identifier:munged dial column            - varchar(255) - ?
      +identifier:uid column                    - int(9) - Unix user ID (uid)
      +identifier:gid column                    - int(9) - Unix user group (gid)
      +identifier:user sid column               - varchar(255) - NT user SID
      +identifier:group sid column              - varchar(255) - NT group ID
      +identifier:lanman pass column            - varchar(255) - encrypted lanman password
      +identifier:nt pass column                - varchar(255) - encrypted nt passwd
      +identifier:plain pass column             - varchar(255) - plaintext password
      +identifier:acct control column           - int(9) - nt user data
      +identifier:unknown 3 column              - int(9) - unknown
      +identifier:logon divs column             - int(9) - ?
      +identifier:hours len column              - int(9) - ?
      +identifier:unknown 5 column              - int(9) - unknown
      +identifier:unknown 6 column              - int(9) - unknown

      Eventually, you can put a colon (:) after the name of each column, which +should specify the column to update when updating the table. You can also +specify nothing behind the colon - then the data from the field will not be +updated.


      PrevHomeNext
      Unified Logons between Windows NT and UNIX using WinbindUpPassdb XML plugin
      \ No newline at end of file diff --git a/docs/faq/faq-config.html b/docs/htmldocs/pdb-xml.html similarity index 51% rename from docs/faq/faq-config.html rename to docs/htmldocs/pdb-xml.html index 67b5ca2b35a..4d300d7be01 100644 --- a/docs/faq/faq-config.html +++ b/docs/htmldocs/pdb-xml.html @@ -2,19 +2,23 @@ Configuration problemsPassdb XML pluginSamba FAQSAMBA Project DocumentationPrevNext

      Chapter 3. Configuration problems

      Chapter 17. Passdb XML plugin

      3.1. I have set 'force user' and samba still makes 'root' the owner of all the files I touch!

      17.1. Building

      When you have a user in 'admin users', samba will always do file operations for -this user as 'root', even if 'force user' has been set.

      This module requires libxml2 to be installed.

      To build pdb_xml, run: make bin/pdb_xml.so in +the directory source/.

      3.2. I have just installed samba and I'm trying to log in from Windows, but samba refuses all logins!

      17.2. Usage

      Newer windows clients(NT4, 2000, XP) send encrypted passwords. Samba can't compare these -passwords to the unix password database, so it needs it's own user database. You can -add users to this database using "smbpasswd -a user-name".

      The usage of pdb_xml is pretty straightforward. To export data, use: + +pdbedit -e plugin:/usr/lib/samba/pdb_xml.so:filename + +(where filename is the name of the file to put the data in)

      See also the "User database" chapter of the samba HOWTO Collection.

      To import data, use: +pdbedit -i plugin:/usr/lib/samba/pdb_xml.so:filename -e current-pdb + +Where filename is the name to read the data from and current-pdb to put it in.

      PrevHomeNextCompiling and installing Samba on a Unix hostPassdb MySQL plugin UpSpecific client application problemsStackable VFS modules
      + pdbedit

      pdbedit

      pdbedit

      Synopsis

      pdbedit [-l] [-v] [-w] [-u username] [-f fullname] [-h homedir] [-D drive] [-S script] [-p profile] [-a] [-m] [-x] [-i passdb-backend] [-e passdb-backend] [-b passdb-backend] [-d debuglevel] [-s configfile] [-P account-policy] [-V value]

      [-l] [-v] [-w] [-u username] [-f fullname] [-h homedir] [-D drive] [-S script] [-p profile] [-a] [-m] [-x] [-i passdb-backend] [-e passdb-backend] [-g] [-b passdb-backend] [-d debuglevel] [-s configfile] [-P account-policy] [-V value]

      DESCRIPTION

      This tool is part of the Samba(7)This tool is part of the Samba suite.

      The pdbedit program is used to manage the users accounts @@ -70,7 +65,7 @@ CLASS="REFENTRYTITLE" >

      OPTIONS

      pdbedit -l

      sorce:500:Simo Sorce
      -samba:45:Test User
      sorce:500:Simo Sorce + samba:45:Test User +

      pdbedit -l -v

      ---------------
      -username:       sorce
      -user ID/Group:  500/500
      -user RID/GRID:  2000/2001
      -Full Name:      Simo Sorce
      -Home Directory: \\BERSERKER\sorce
      -HomeDir Drive:  H:
      -Logon Script:   \\BERSERKER\netlogon\sorce.bat
      -Profile Path:   \\BERSERKER\profile
      ----------------
      -username:       samba
      -user ID/Group:  45/45
      -user RID/GRID:  1090/1091
      -Full Name:      Test User
      -Home Directory: \\BERSERKER\samba
      -HomeDir Drive:  
      -Logon Script:   
      -Profile Path:   \\BERSERKER\profile
      --------------- + username: sorce + user ID/Group: 500/500 + user RID/GRID: 2000/2001 + Full Name: Simo Sorce + Home Directory: \\BERSERKER\sorce + HomeDir Drive: H: + Logon Script: \\BERSERKER\netlogon\sorce.bat + Profile Path: \\BERSERKER\profile + --------------- + username: samba + user ID/Group: 45/45 + user RID/GRID: 1090/1091 + Full Name: Test User + Home Directory: \\BERSERKER\samba + HomeDir Drive: + Logon Script: + Profile Path: \\BERSERKER\profile +

      smbpasswd file format. (see the - smbpasswd(5) file format. (see the smbpasswd(5) for details)

      Example: pdbedit -l -w

      sorce:500:508818B733CE64BEAAD3B435B51404EE:D2A2418EFC466A8A0F6B1DBB5C3DB80C:[UX         ]:LCT-00000000:
      -samba:45:0F2B255F7B67A7A9AAD3B435B51404EE:BC281CE3F53B6A5146629CD4751D3490:[UX         ]:LCT-3BFA1E8D:
      sorce:500:508818B733CE64BEAAD3B435B51404EE:D2A2418EFC466A8A0F6B1DBB5C3DB80C:[UX ]:LCT-00000000: + samba:45:0F2B255F7B67A7A9AAD3B435B51404EE:BC281CE3F53B6A5146629CD4751D3490:[UX ]:LCT-3BFA1E8D: +

      -u username

      This option specifies the username to be used for the operation requested (listing, adding, removing). - It is required in add, remove and modify - operations and optional in list operations.

      pdbedit -a -u sorce -
      new password:
      -retype new password

      +

      -m

      This option may only be used in conjunction - with the -a-a option. It will make pdbedit to add a machine trust account instead of a user account (-u username will provide the machine name).

      -g

      If you specify -g, + then -i in-backend -e out-backend + applies to the group mapping instead of the user database. +

      This option will ease migration from one passdb backend to + another and will ease backing up.

      -b passdb-backend

      pdbedit -P "bad lockout attempt"

      account policy value for bad lockout attempt is 0
      account policy value for bad lockout attempt is 0 +

      Sets an account policy to a specified value. This option may only be used in conjunction - with the -P-P option.

      pdbedit -P "bad lockout attempt" -V 3

      account policy value for bad lockout attempt was 0
      -account policy value for bad lockout attempt is now 3
      account policy value for bad lockout attempt was 0 + account policy value for bad lockout attempt is now 3 +

      -d|--debug=debuglevel

      debugleveldebuglevel is an integer from 0 to 10. The default value if this parameter is not specified is zero.

      NOTES

      VERSION

      SEE ALSO

      smbpasswd(5), samba(7)

      smbpasswd(8), + samba(7) +

      AUTHOR

      The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook - XML 4.2 for Samba 3.0 was done by Alexander Bokovoy.

      PortabilityPrev

      Chapter 24. Portability

      Chapter 23. Portability

      Samba works on a wide range of platforms but the interface all the platforms provide is not always compatible. This chapter contains @@ -84,9 +83,7 @@ CLASS="SECT1" >

      24.1. HPUX

      23.1. HPUX

      HP's implementation of supplementary groups is, er, non-standard (for hysterical reasons). There are two group files, /etc/group and @@ -114,9 +111,7 @@ CLASS="SECT1" >

      24.2. SCO Unix

      23.2. SCO Unix

      If you run an old version of SCO Unix then you may need to get important @@ -131,9 +126,7 @@ CLASS="SECT1" >

      24.3. DNIX

      23.3. DNIX

      DNIX has a problem with seteuid() and setegid(). These routines are needed for Samba to work correctly, but they were left out of the DNIX @@ -238,9 +231,7 @@ CLASS="SECT1" >

      24.4. RedHat Linux Rembrandt-II

      23.4. RedHat Linux Rembrandt-II

      By default RedHat Rembrandt-II during installation adds an entry to /etc/hosts as follows: @@ -257,27 +248,6 @@ is the master browse list holder and who is the master browser.

      Corrective Action: Delete the entry after the word loopback in the line starting 127.0.0.1

      24.5. AIX

      24.5.1. Sequential Read Ahead

      Disabling Sequential Read Ahead using "vmtune -r 0" improves -samba performance significally.

      Chapter 14. Printing Support

      Chapter 14. Printing Support

      14.1. Introduction

      14.1. Introduction

      Beginning with the 2.2.0 release, Samba supports the native Windows NT printing mechanisms implemented via @@ -164,9 +160,7 @@ CLASS="SECT1" >

      14.2. Configuration

      14.2. Configuration

      Warning

      However, the initial implementation allowed for a -parameter named printer driver locationprinter driver location to be used on a per share basis to specify the location of the driver files associated with that printer. Another -parameter named printer driverprinter driver provided a means of defining the printer driver name to be sent to the client.

      14.2.1. Creating [print$]

      14.2.1. Creating [print$]

      In order to support the uploading of printer driver files, you must first configure a file share named [print$]. @@ -267,9 +263,11 @@ CLASS="PROGRAMLISTING" >The write listwrite list is used to allow administrative level user accounts to have write access in order to update files @@ -305,7 +303,7 @@ WIDTH="25" ALIGN="CENTER" VALIGN="TOP" >NoteWarningprinter - admin list.

      Once you have created the required [print$] service and associated subdirectories, simply log onto the Samba server using -a root (or printer adminprinter admin) account from a Windows NT 4.0/2k client. Open "Network Neighbourhood" or "My Network Places" and browse for the Samba host. Once you have located @@ -443,9 +445,7 @@ CLASS="SECT2" >

      14.2.2. Setting Drivers for Existing Printers

      14.2.2. Setting Drivers for Existing Printers

      The initial listing of printers in the Samba host's Printers folder will have no real printer driver assigned @@ -515,9 +515,7 @@ CLASS="SECT2" >

      14.2.3. Support a large number of printers

      14.2.3. Support a large number of printers

      One issue that has arisen during the development phase of Samba 2.2 is the need to support driver downloads for @@ -538,9 +536,9 @@ of how this could be accomplished:

       
      -$ $ rpcclient pogo -U root%secret -c "enumdrivers"
       Domain=[NARNIA] OS=[Unix] Server=[Samba 2.2.0-alpha3]
        
      @@ -554,9 +552,9 @@ Printer Driver Info 1:
       Printer Driver Info 1:
            Driver Name: [HP LaserJet 4Si/4SiMX PS]
       				  
      -$ $ rpcclient pogo -U root%secret -c "enumprinters"
       Domain=[NARNIA] OS=[Unix] Server=[Samba 2.2.0-alpha3]
            flags:[0x800000]
      @@ -564,13 +562,13 @@ Domain=[NARNIA] OS=[Unix] Server=[Samba 2.2.0-alpha3]
            description:[POGO\\POGO\hp-print,NO DRIVER AVAILABLE FOR THIS PRINTER,]
            comment:[]
       				  
      -$ $ rpcclient pogo -U root%secret \
      -> >  -c "setdriver hp-print \"HP LaserJet 4000 Series PS\""
       Domain=[NARNIA] OS=[Unix] Server=[Samba 2.2.0-alpha3]
       Successfully set hp-print to driver HP LaserJet 4000 Series PS.

      14.2.4. Adding New Printers via the Windows NT APW

      14.2.4. Adding New Printers via the Windows NT APW

      By default, Samba offers all printer shares defined in

      The connected user is able to successfully execute an OpenPrinterEx(\\server) with administrative - privileges (i.e. root or printer adminprinter admin).

      show - add printer wizard = yes (the default).

      add -printer command must have a defined value. The program hook must successfully add the printer to the system (i.e. @@ -643,29 +645,35 @@ CLASS="FILENAME" not exist, smbd will execute the will execute the add printer -command and reparse to the smb.conf to attempt to locate the new printer share. If the share is still not defined, an error of "Access Denied" is returned to the client. Note that the -add printer programadd printer program is executed under the context of the connected user, not necessarily a root account.

      There is a complementary delete -printer command for removing entries from the "Printers..." folder.

      The following is an example add printer commandadd printer command script. It adds the appropriate entries to

      14.2.5. Samba and Printer Ports

      14.2.5. Samba and Printer Ports

      Windows NT/2000 print servers associate a port with each printer. These normally take the form of LPT1:, COM1:, FILE:, etc... Samba must also support the @@ -757,10 +765,12 @@ CLASS="FILENAME" > possesses a enumports -command which can be used to define an external program that generates a listing of ports on a system.

      14.3. The Imprints Toolset

      14.3. The Imprints Toolset

      The Imprints tool set provides a UNIX equivalent of the Windows NT Add Printer Wizard. For complete information, please @@ -789,9 +797,7 @@ CLASS="SECT2" >

      14.3.1. What is Imprints?

      14.3.1. What is Imprints?

      Imprints is a collection of tools for supporting the goals of

      14.3.2. Creating Printer Driver Packages

      14.3.2. Creating Printer Driver Packages

      The process of creating printer driver packages is beyond the scope of this document (refer to Imprints.txt also included @@ -837,9 +841,7 @@ CLASS="SECT2" >

      14.3.3. The Imprints server

      14.3.3. The Imprints server

      The Imprints server is really a database server that may be queried via standard HTTP mechanisms. Each printer @@ -861,9 +863,7 @@ CLASS="SECT2" >

      14.3.4. The Installation Client

      14.3.4. The Installation Client

      More information regarding the Imprints installation client is available in the

      14.4. Diagnosis

      14.4. Diagnosis

      14.4.1. Introduction

      14.4.1. Introduction

      This is a short description of how to debug printing problems with Samba. This describes how to debug problems with printing from a SMB @@ -1027,7 +1023,7 @@ and it should be periodically cleaned out. Samba used the lpq command to determine the "job number" assigned to your print job by the spooler.

      The %>letter< are "macros" that get dynamically replaced with appropriate +>The %>letter< are "macros" that get dynamically replaced with appropriate values when they are used. The %s gets replaced with the name of the spool file that Samba creates and the %p gets replaced with the name of the printer. The %j gets replaced with the "job number" which comes from @@ -1038,9 +1034,7 @@ CLASS="SECT2" >

      14.4.2. Debugging printer problems

      14.4.2. Debugging printer problems

      One way to debug printing problems is to start by replacing these command with shell scripts that record the arguments and the contents @@ -1095,9 +1089,7 @@ CLASS="SECT2" >

      14.4.3. What printers do I have?

      14.4.3. What printers do I have?

      You can use the 'testprns' program to check to see if the printer name you are using is recognized by Samba. For example, you can @@ -1124,9 +1116,7 @@ CLASS="SECT2" >

      14.4.4. Setting up printcap and print servers

      14.4.4. Setting up printcap and print servers

      You may need to set up some printcaps for your Samba system to use. It is strongly recommended that you use the facilities provided by @@ -1208,9 +1198,7 @@ CLASS="SECT2" >

      14.4.5. Job sent, no output

      14.4.5. Job sent, no output

      This is the most frustrating part of printing. You may have sent the job, verified that the job was forwarded, set up a wrapper around @@ -1253,9 +1241,7 @@ CLASS="SECT2" >

      14.4.6. Job sent, strange output

      14.4.6. Job sent, strange output

      Once you have the job printing, you can then start worrying about making it print nicely.

      14.4.7. Raw PostScript printed

      14.4.7. Raw PostScript printed

      This is a problem that is usually caused by either the print spooling system putting information at the start of the print job that makes @@ -1314,9 +1298,7 @@ CLASS="SECT2" >

      14.4.8. Advanced Printing

      14.4.8. Advanced Printing

      Note that you can do some pretty magic things by using your imagination with the "print command" option and some shell scripts. @@ -1330,9 +1312,7 @@ CLASS="SECT2" >

      14.4.9. Real debugging

      14.4.9. Real debugging

      If the above debug tips don't help, then maybe you need to bring in the bug guns, system tracing. See Tracing.txt in this directory.

      PrevNextConfiguring PAM for distributed but centrally -managed authenticationHosting a Microsoft Distributed File System tree on SambaCUPS Printing SupportUnified Logons between Windows NT and UNIX using Winbind
      +LanMan and NT Password Encryption in Samba
      SAMBA Project Documentation
      PrevNext

      Chapter 4. LanMan and NT Password Encryption in Samba

      4.2. Important Notes About Security

      The unix and SMB password encryption techniques seem similar + on the surface. This similarity is, however, only skin deep. The unix + scheme typically sends clear text passwords over the network when + logging in. This is bad. The SMB encryption scheme never sends the + cleartext password over the network but it does store the 16 byte + hashed values on disk. This is also bad. Why? Because the 16 byte hashed + values are a "password equivalent". You cannot derive the user's + password from them, but they could potentially be used in a modified + client to gain access to a server. This would require considerable + technical knowledge on behalf of the attacker but is perfectly possible. + You should thus treat the smbpasswd file as though it contained the + cleartext passwords of all your users. Its contents must be kept + secret, and the file should be protected accordingly.

      Ideally we would like a password scheme which neither requires + plain text passwords on the net or on disk. Unfortunately this + is not available as Samba is stuck with being compatible with + other SMB systems (WinNT, WfWg, Win95 etc).

      Note that Windows NT 4.0 Service pack 3 changed the + default for permissible authentication so that plaintext + passwords are never sent over the wire. + The solution to this is either to switch to encrypted passwords + with Samba or edit the Windows NT registry to re-enable plaintext + passwords. See the document WinNT.txt for details on how to do + this.

      Other Microsoft operating systems which also exhibit + this behavior includes

      • MS DOS Network client 3.0 with + the basic network redirector installed

      • Windows 95 with the network redirector + update installed

      • Windows 98 [se]

      • Windows 2000

      Note :All current release of + Microsoft SMB/CIFS clients support authentication via the + SMB Challenge/Response mechanism described here. Enabling + clear text authentication does not disable the ability + of the client to participate in encrypted authentication.

      4.3. The smbpasswd Command

      The smbpasswd command maintains the two 32 byte password fields + in the smbpasswd file. If you wish to make it similar to the unix + passwd or yppasswd programs, + install it in /usr/local/samba/bin/ (or your + main Samba binary directory).

      smbpasswd now works in a client-server mode + where it contacts the local smbd to change the user's password on its + behalf. This has enormous benefits - as follows.

      smbpasswd now has the capability + to change passwords on Windows NT servers (this only works when + the request is sent to the NT Primary Domain Controller if you + are changing an NT Domain user's password).

      To run smbpasswd as a normal user just type :

      $ smbpasswd

      Old SMB password: <type old value here - + or hit return if there was no old password>

      New SMB Password: <type new value> +

      Repeat New SMB Password: <re-type new value +

      If the old value does not match the current value stored for + that user, or the two new values do not match each other, then the + password will not be changed.

      If invoked by an ordinary user it will only allow the user + to change his or her own Samba password.

      If run by the root user smbpasswd may take an optional + argument, specifying the user name whose SMB password you wish to + change. Note that when run as root smbpasswd does not prompt for + or check the old password value, thus allowing root to set passwords + for users who have forgotten their passwords.

      smbpasswd is designed to work in the same way + and be familiar to UNIX users who use the passwd or + yppasswd commands.

      For more details on using smbpasswd refer + to the man page which will always be the definitive reference.


      PrevHomeNext
      Quick Cross Subnet Browsing / Cross Workgroup Browsing guideUpType of installation
      \ No newline at end of file diff --git a/docs/htmldocs/rpcclient.1.html b/docs/htmldocs/rpcclient.1.html index 6e71ddeb14d..e695663c8a5 100644 --- a/docs/htmldocs/rpcclient.1.html +++ b/docs/htmldocs/rpcclient.1.html @@ -5,7 +5,7 @@ >rpcclient

      rpcclient

      rpcclient [-A authfile] [-c <command string>] [-d debuglevel] [-h] [-l logfile] [-N] [-s <smb config file>] [-U username[%password]] [-W workgroup] [-N] [-I destinationIP] {server}

      [-A authfile] [-c <command string>] [-d debuglevel] [-h] [-l logfile] [-N] [-s <smb config file>] [-U username[%password]] [-W workgroup] [-N] [-I destinationIP] {server}

      DESCRIPTION

      This tool is part of the Samba(7)This tool is part of the Samba suite.

      OPTIONS

      name resolve ordername resolve order line from smb.conf(5) line from + smb.conf(5).

      username = <value> 
      -password = <value>
      -domain   = <value>
      username = <value> + password = <value> + domain = <value> +

      Make certain that the permissions on the file restrict @@ -125,18 +124,14 @@ domain = <value>

      -h|--help

      Print a summary of command line options.

      -d|--debug=debuglevel

      debugleveldebuglevel is an integer from 0 to 10. The default value if this parameter is not specified is zero.

      file.

      -h|--help

      Print a summary of command line options.

      -I IP-address

      IP addressIP address is the address of the server to connect to. It should be specified in standard "a.b.c.d" notation.

      Normally the client would attempt to locate a named SMB/CIFS server by looking it up via the NetBIOS name resolution - mechanism described above in the name resolve ordername resolve order parameter above. Using this parameter will force the client to assume that the server is on the machine with the specified IP @@ -199,9 +204,9 @@ CLASS="PARAMETER" >

      File name for log/debug files. The extension - '.client''.client' will be appended. The log file is never removed by the client.

      rpcclient
      will - prompt for a password. See also the -U-U option.

      Sets the SMB username or username and password.

      If %password is not specified, the user will be prompted. The - client will first check the USERUSER environment variable, then the - LOGNAMELOGNAME variable and if either exists, the string is uppercased. If these environmental variables are not - found, the username GUESTGUEST is used.

      A third option is to use a credentials file which @@ -261,9 +268,11 @@ CLASS="CONSTANT" wish to pass the credentials on the command line or via environment variables. If this method is used, make certain that the permissions on the file restrict access from unwanted users. See the - -A-A for more details.

      Be cautious about including passwords in scripts. Also, on @@ -294,7 +303,7 @@ CLASS="COMMAND" >

      COMMANDS

      adddriver <arch> <config>adddriver <arch> <config> - Execute an AddPrinterDriver() RPC to install the printer driver information on the server. Note that the driver files should @@ -438,30 +447,35 @@ CLASS="COMMAND" CLASS="COMMAND" >getdriverdir. Possible values for - archarch are the same as those for the getdriverdir command. - The configconfig parameter is defined as follows:

      Long Printer Name:\
      -Driver File Name:\
      -Data File Name:\
      -Config File Name:\
      -Help File Name:\
      -Language Monitor Name:\
      -Default Data Type:\
      -Comma Separated list of Files
      Long Printer Name:\ + Driver File Name:\ + Data File Name:\ + Config File Name:\ + Help File Name:\ + Language Monitor Name:\ + Default Data Type:\ + Comma Separated list of Files +

      Any empty fields should be enter as the string "NULL".

      addprinter <printername> - <sharename> <drivername> <port>addprinter <printername> + <sharename> <drivername> <port> - Add a printer on the remote server. This printer will be automatically shared. Be aware that the printer driver @@ -486,9 +500,11 @@ CLASS="COMMAND" CLASS="COMMAND" >adddriver) - and the portportmust be a valid port name (see

      enumjobs <printer>enumjobs <printer> - List the jobs and status of a given printer. This command corresponds to the MS Platform SDK EnumJobs() @@ -564,7 +580,7 @@ CLASS="COMMAND" >

      getdata <printername>getdata <printername> - Retrieve the data for a given printer setting. See the

      getdriver <printername>getdriver <printername> - Retrieve the printer driver information (such as driver file, config file, dependent files, etc...) for @@ -590,14 +606,16 @@ CLASS="COMMAND" >

      getdriverdir <arch>getdriverdir <arch> - Execute a GetPrinterDriverDirectory() RPC to retrieve the SMB share name and subdirectory for storing printer driver files for a given architecture. Possible - values for archarch are "Windows 4.0" (for Windows 95/98), "Windows NT x86", "Windows NT PowerPC", "Windows Alpha_AXP", and "Windows NT R4000".

      getprinter <printername>getprinter <printername> - Retrieve the current printer information. This command corresponds to the GetPrinter() MS Platform SDK function. @@ -616,7 +634,7 @@ CLASS="COMMAND" >

      openprinter <printername>openprinter <printername> - Execute an OpenPrinterEx() and ClosePrinter() RPC against a given printer.

      setdriver <printername> - <drivername>setdriver <printername> + <drivername> - Execute a SetPrinter() command to update the printer driver associated with an installed printer. The printer driver must @@ -687,7 +705,7 @@ CLASS="COMMAND" >

      BUGS

      WARNING!"WARNING!
      The MSRPC over SMB code has been developed from examining Network traces. No documentation is @@ -716,28 +734,23 @@ CLASS="EMPHASIS" to be... a bit flaky in places.

      The development of Samba's implementation is also a bit rough, - and as more of the services are understood, it can even result in - versions of smbd(8) and rpcclient(1) that are incompatible for some commands or services. Additionally, + and as more of the services are understood, it can even result in + versions of smbd(8) and rpcclient(1) + that are incompatible for some commands or services. Additionally, the developers are sending reports to Microsoft, and problems found or reported to Microsoft are fixed in Service Packs, which may - result in incompatibilities.

      VERSION

      AUTHOR

      The original rpcclient man page was written by Matthew Geddes, Luke Kenneth Casson Leighton, and rewritten by Gerald Carter. The conversion to DocBook for Samba 2.2 was done by Gerald - Carter. The conversion to DocBook XML 4.2 for Samba 3.0 was - done by Alexander Bokovoy.

      Samba Backup Domain Controller to Samba Domain ControlHow to Act as a Backup Domain Controller in a Purely Samba Controlled Domain

      Chapter 7. Samba Backup Domain Controller to Samba Domain Control

      Chapter 7. How to Act as a Backup Domain Controller in a Purely Samba Controlled Domain

      7.1. Prerequisite Reading

      7.1. Prerequisite Reading

      Before you continue reading in this chapter, please make sure that you are comfortable with configuring a Samba PDC @@ -97,9 +94,7 @@ CLASS="SECT1" >

      7.2. Background

      7.2. Background

      What is a Domain Controller? It is a machine that is able to answer logon requests from workstations in a Windows NT Domain. Whenever a @@ -142,9 +137,7 @@ CLASS="SECT1" >

      7.3. What qualifies a Domain Controller on the network?

      7.3. What qualifies a Domain Controller on the network?

      Every machine that is a Domain Controller for the domain SAMBA has to register the NetBIOS group name SAMBA#1c with the WINS server and/or @@ -159,9 +152,7 @@ CLASS="SECT2" >

      7.3.1. How does a Workstation find its domain controller?

      7.3.1. How does a Workstation find its domain controller?

      A NT workstation in the domain SAMBA that wants a local user to be authenticated has to find the domain controller for SAMBA. It does @@ -178,9 +169,7 @@ CLASS="SECT2" >

      7.3.2. When is the PDC needed?

      7.3.2. When is the PDC needed?

      Whenever a user wants to change his password, this has to be done on the PDC. To find the PDC, the workstation does a NetBIOS name query @@ -194,19 +183,13 @@ CLASS="SECT1" >

      7.4. Can Samba be a Backup Domain Controller to an NT PDC?

      7.4. Can Samba be a Backup Domain Controller?

      With version 2.2, no. The native NT SAM replication protocols have not yet been fully implemented. The Samba Team is working on understanding and implementing the protocols, but this work has not been finished for version 2.2.

      With version 3.0, the work on both the replication protocols and a -suitable storage mechanism has progressed, and some form of NT4 BDC -support is expected soon.

      Can I get the benefits of a BDC with Samba? Yes. The main reason for implementing a BDC is availability. If the PDC is a Samba machine, a second Samba machine can be set up to @@ -217,9 +200,7 @@ CLASS="SECT1" >

      7.5. How do I set up a Samba BDC?

      7.5. How do I set up a Samba BDC?

      Several things have to be done:

      7.5.1. How do I replicate the smbpasswd file?

      7.5.1. How do I replicate the smbpasswd file?

      Replication of the smbpasswd file is sensitive. It has to be done whenever changes to the SAM are made. Every user's password change is @@ -300,21 +279,6 @@ rsync. rsync can use ssh as a transport. ssh itself can be set up to accept *only* rsync transfer without requiring the user to type a password.

      7.5.2. Can I do this all with LDAP?

      The simple answer is YES. Samba's pdb_ldap code supports -binding to a replica LDAP server, and will also follow referrals and -rebind to the master if it ever needs to make a modification to the -database. (Normally BDCs are read only, so this will not occur -often).

      Samba as an NT4 or Win2k Primary Domain ControllerHow to Configure Samba as a NT4 Primary Domain ControllerSAMBA Project Documentation

      SAMBA Project Documentation

      SAMBA Project Documentation

      SAMBA Team

      SAMBA Team

      Abstract

      Abstract

      1.1. Obtaining and installing sambaRead the man pages
      1.2. Configuring sambaBuilding the Binaries
      1.3. The all important step
      1.4. Create the smb configuration file.
      1.5. Test your config file with + testparm
      1.6. Starting the smbd and nmbd
      1.7. Try listing the shares available on your server
      1.4. 1.8. Try connecting with the unix client
      1.5. 1.9. Try connecting from a DOS, WfWg, Win9x, WinNT, Win2k, OS/2, etc... client
      1.6. 1.10. What If Things Don't Work?
      2. Quick Cross Subnet Browsing / Cross Workgroup Browsing guideImproved browsing in samba
      2.1. DiscussionOverview of browsing
      2.2. How browsing functions and how to deploy stable and -dependable browsing using SambaBrowsing support in samba
      2.3. Use of the "Remote Announce" parameterProblem resolution
      2.4. Use of the "Remote Browse Sync" parameterBrowsing across subnets
      2.5. Use of WINSSetting up a WINS server
      2.6. Do NOT use more than one (1) protocol on MS Windows machinesSetting up Browsing in a WORKGROUP
      2.7. Name Resolution OrderSetting up Browsing in a DOMAIN
      2.8. Forcing samba to be the master
      2.9. Making samba the domain master
      2.10. Note about broadcast addresses
      2.11. Multiple interfaces
      3. User information databaseQuick Cross Subnet Browsing / Cross Workgroup Browsing guide
      3.1. IntroductionDiscussion
      3.2. Important Notes About SecurityUse of the "Remote Announce" parameter
      3.3. The smbpasswd CommandUse of the "Remote Browse Sync" parameter
      3.4. Plain textUse of WINS
      3.5. TDBDo NOT use more than one (1) protocol on MS Windows machines
      3.6. LDAP
      3.7. MySQL
      3.8. Passdb XML pluginName Resolution Order
      II. Type of installation
      4. Nomenclature of Server TypesLanMan and NT Password Encryption in Samba
      4.1. Stand Alone ServerIntroduction
      4.2. Domain Member ServerImportant Notes About Security
      4.3. Domain ControllerThe smbpasswd Command
      5. Samba as Stand-Alone ServerII. Type of installation
      5.1. User and Share security level5. User and Share security level (for servers not in a domain)
      6. Samba as an NT4 or Win2k Primary Domain ControllerHow to Configure Samba as a NT4 Primary Domain Controller
      6.1. Prerequisite Reading
      6.2. Background
      6.3. Configuring the Samba Domain Controller
      6.4. Creating Machine Trust Accounts and Joining Clients to the DomainCreating Machine Trust Accounts and Joining Clients to the +Domain
      6.5. Common Problems and Errors
      6.6. What other help can I get?System Policies and Profiles
      6.7. What other help can I get?
      6.8. Domain Control for Windows 9x/ME
      6.9. DOMAIN_CONTROL.txt : Windows NT Domain Control & Samba
      7. Samba Backup Domain Controller to Samba Domain ControlHow to Act as a Backup Domain Controller in a Purely Samba Controlled Domain
      7.1. Prerequisite Reading
      7.2. Background
      7.3. What qualifies a Domain Controller on the network?
      7.4. Can Samba be a Backup Domain Controller to an NT PDC?Can Samba be a Backup Domain Controller?
      7.5. How do I set up a Samba BDC?
      8.1. Setup your smb.confInstalling the required packages for Debian
      8.2. Setup your /etc/krb5.confInstalling the required packages for RedHat
      8.3. Create the computer accountCompile Samba
      8.4. Test your server setupSetup your /etc/krb5.conf
      8.5. Testing with smbclientCreate the computer account
      8.6. Test your server setup
      8.7. Testing with smbclient
      8.8. Notes
      9. Samba as a NT4 or Win2k domain memberSamba as a NT4 domain member
      9.1. Joining an NT Domain with Samba 3.0Joining an NT Domain with Samba 2.2
      9.2. Samba and Windows 2000 Domains
      9.3. Why is this better than security = server?
      III. Advanced ConfigurationOptional configuration
      10. System PoliciesIntegrating MS Windows networks with Samba
      10.1. Basic System Policy InfoAgenda
      10.2. Roaming ProfilesName Resolution in a pure Unix/Linux world
      10.3. Name resolution as used within MS Windows networking
      10.4. How browsing functions and how to deploy stable and +dependable browsing using Samba
      10.5. MS Windows security options and how to configure +Samba for seemless integration
      10.6. Conclusions
      11.1. Viewing and changing UNIX permissions using the NT security dialogs
      11.2. How to view file security on a Samba share
      11.3. Viewing file ownership
      11.4. Viewing file or directory permissions
      11.5. Modifying file or directory permissions
      11.6. Interaction with the standard Samba create mask parameters
      11.7. Interaction with the standard Samba file attribute mapping
      12. Group mapping HOWTO
      13. Configuring PAM for distributed but centrally managed authentication
      13.1. 12.1. Samba and PAM
      13.2. 12.2. Distributed Authentication
      13.3. 12.3. PAM Configuration in smb.conf
      13. Hosting a Microsoft Distributed File System tree on Samba
      13.1. Instructions
      14. Printing Support
      14.1. Introduction
      14.2. Configuration
      14.3. The Imprints Toolset
      14.4. Diagnosis
      15. CUPS Printing SupportUnified Logons between Windows NT and UNIX using Winbind
      15.1. IntroductionAbstract
      15.2. CUPS - RAW Print Through ModeIntroduction
      15.3. The CUPS Filter ChainsWhat Winbind Provides
      15.4. CUPS Print Drivers and DevicesHow Winbind Works
      15.5. Limiting the number of pages users can printInstallation and Configuration
      15.6. Advanced Postscript Printing from MS WindowsLimitations
      15.7. Auto-Deletion of CUPS spool filesConclusion
      16. Unified Logons between Windows NT and UNIX using WinbindPassdb MySQL plugin
      16.1. AbstractBuilding
      16.2. IntroductionConfiguring
      16.3. What Winbind ProvidesUsing plaintext passwords or encrypted password
      16.4. How Winbind Works
      16.5. Installation and Configuration
      16.6. Limitations
      16.7. ConclusionGetting non-column data from the table
      17. Integrating MS Windows networks with SambaPassdb XML plugin
      17.1. Name Resolution in a pure Unix/Linux worldBuilding
      17.2. Name resolution as used within MS Windows networkingUsage
      18. Improved browsing in sambaStackable VFS modules
      18.1. Overview of browsingIntroduction and configuration
      18.2. Browsing support in sambaIncluded modules
      18.3. Problem resolution
      18.4. Browsing across subnets
      18.5. Setting up a WINS server
      18.6. Setting up Browsing in a WORKGROUP
      18.7. Setting up Browsing in a DOMAIN
      18.8. Forcing samba to be the master
      18.9. Making samba the domain master
      18.10. Note about broadcast addresses
      18.11. Multiple interfacesVFS modules available elsewhere
      19. Hosting a Microsoft Distributed File System tree on SambaStoring Samba's User/Machine Account information in an LDAP Directory
      19.1. Instructions
      20. Stackable VFS modules
      20.1. Introduction and configurationPurpose
      20.2. Included modules19.2. Introduction
      20.3. VFS modules available elsewhere19.3. Supported LDAP Servers
      21. Securing Samba19.4. Schema and Relationship to the RFC 2307 posixAccount
      21.1. Introduction19.5. Configuring Samba with LDAP
      21.2. Using host based protection19.6. Accounts and Groups management
      21.3. Using interface protection19.7. Security and sambaAccount
      21.4. Using a firewall19.8. LDAP specials attributes for sambaAccounts
      21.5. Using a IPC$ share deny19.9. Example LDIF Entries for a sambaAccount
      21.6. Upgrading Samba19.10. Comments
      22. Unicode/Charsets20. HOWTO Access Samba source code via CVS
      22.1. What are charsets and unicode?20.1. Introduction
      22.2. Samba and charsets20.2. CVS Access to samba.org
      IV. Appendixes21. Group mapping HOWTO
      23. 22. Samba performance issues
      23.1. 22.1. Comparisons
      23.2. 22.2. Socket options
      23.3. 22.3. Read size
      23.4. 22.4. Max xmit
      23.5. 22.5. Log level
      23.6. 22.6. Read raw
      23.7. 22.7. Write raw
      23.8. 22.8. Slow Clients
      23.9. 22.9. Slow Logins
      23.10. 22.10. Client tuning
      24. IV. Appendixes
      23. Portability
      24.1. 23.1. HPUX
      24.2. 23.2. SCO Unix
      24.3. 23.3. DNIX
      24.4. 23.4. RedHat Linux Rembrandt-II
      24.5. AIX
      25. 24. Samba and other CIFS clients
      25.1. 24.1. Macintosh clients?
      25.2. 24.2. OS2 Client
      25.3. 24.3. Windows for Workgroups
      25.4. 24.4. Windows '95/'98
      25.5. 24.5. Windows 2000 Service Pack 2
      26. How to compile SAMBA
      26.1. Access Samba source code via CVS
      26.2. Accessing the samba sources via rsync and ftp
      26.3. Building the Binaries
      26.4. Starting the smbd and nmbd
      27. 25. Reporting Bugs
      27.1. 25.1. Introduction
      27.2. 25.2. General info
      27.3. 25.3. Debug levels
      27.4. 25.4. Internal errors
      27.5. 25.5. Attaching to a running process
      27.6. 25.6. Patches
      28. 26. The samba checklistDiagnosing your samba server
      28.1. 26.1. Introduction
      28.2. 26.2. Assumptions
      28.3. 26.3. Tests
      28.4. 26.4. Still having troubles?
      +Storing Samba's User/Machine Account information in an LDAP Directory
      SAMBA Project Documentation
      PrevNext

      Chapter 19. Storing Samba's User/Machine Account information in an LDAP Directory

      19.1. Purpose

      This document describes how to use an LDAP directory for storing Samba user +account information traditionally stored in the smbpasswd(5) file. It is +assumed that the reader already has a basic understanding of LDAP concepts +and has a working directory server already installed. For more information +on LDAP architectures and Directories, please refer to the following sites.

      Note that O'Reilly Publishing is working on +a guide to LDAP for System Administrators which has a planned release date of +early summer, 2002.

      Two additional Samba resources which may prove to be helpful are

      • The Samba-PDC-LDAP-HOWTO + maintained by Ignacio Coupeau.

      • The NT migration scripts from IDEALX that are + geared to manage users and group in such a Samba-LDAP Domain Controller configuration. +

      19.2. Introduction

      Traditionally, when configuring "encrypt +passwords = yes" in Samba's smb.conf file, user account +information such as username, LM/NT password hashes, password change times, and account +flags have been stored in the smbpasswd(5) file. There are several +disadvantages to this approach for sites with very large numbers of users (counted +in the thousands).

      • The first is that all lookups must be performed sequentially. Given that +there are approximately two lookups per domain logon (one for a normal +session connection such as when mapping a network drive or printer), this +is a performance bottleneck for lareg sites. What is needed is an indexed approach +such as is used in databases.

      • The second problem is that administrators who desired to replicate a +smbpasswd file to more than one Samba server were left to use external +tools such as rsync(1) and ssh(1) +and wrote custom, in-house scripts.

      • And finally, the amount of information which is stored in an +smbpasswd entry leaves no room for additional attributes such as +a home directory, password expiration time, or even a Relative +Identified (RID).

      As a result of these defeciencies, a more robust means of storing user attributes +used by smbd was developed. The API which defines access to user accounts +is commonly referred to as the samdb interface (previously this was called the passdb +API, and is still so named in the CVS trees). In Samba 2.2.3, enabling support +for a samdb backend (e.g. --with-ldapsam or +--with-tdbsam) requires compile time support.

      When compiling Samba to include the --with-ldapsam autoconf +option, smbd (and associated tools) will store and lookup user accounts in +an LDAP directory. In reality, this is very easy to understand. If you are +comfortable with using an smbpasswd file, simply replace "smbpasswd" with +"LDAP directory" in all the documentation.

      There are a few points to stress about what the --with-ldapsam +does not provide. The LDAP support referred to in the this documentation does not +include:

      • A means of retrieving user account information from + an Windows 2000 Active Directory server.

      • A means of replacing /etc/passwd.

      The second item can be accomplished by using LDAP NSS and PAM modules. LGPL +versions of these libraries can be obtained from PADL Software +(http://www.padl.com/). However, +the details of configuring these packages are beyond the scope of this document.

      19.4. Schema and Relationship to the RFC 2307 posixAccount

      Samba 2.2.3 includes the necessary schema file for OpenLDAP 2.0 in +examples/LDAP/samba.schema. (Note that this schema +file has been modified since the experimental support initially included +in 2.2.2). The sambaAccount objectclass is given here:

      objectclass ( 1.3.1.5.1.4.1.7165.2.2.2 NAME 'sambaAccount' SUP top STRUCTURAL
      +     DESC 'Samba Account'
      +     MUST ( uid $ rid )
      +     MAY  ( cn $ lmPassword $ ntPassword $ pwdLastSet $ logonTime $
      +            logoffTime $ kickoffTime $ pwdCanChange $ pwdMustChange $ acctFlags $
      +            displayName $ smbHome $ homeDrive $ scriptPath $ profilePath $
      +            description $ userWorkstations $ primaryGroupID $ domain ))

      The samba.schema file has been formatted for OpenLDAP 2.0. The OID's are +owned by the Samba Team and as such is legal to be openly published. +If you translate the schema to be used with Netscape DS, please +submit the modified schema file as a patch to jerry@samba.org

      Just as the smbpasswd file is mean to store information which supplements a +user's /etc/passwd entry, so is the sambaAccount object +meant to supplement the UNIX user account information. A sambaAccount is a +STRUCTURAL objectclass so it can be stored individually +in the directory. However, there are several fields (e.g. uid) which overlap +with the posixAccount objectclass outlined in RFC2307. This is by design.

      In order to store all user account information (UNIX and Samba) in the directory, +it is necessary to use the sambaAccount and posixAccount objectclasses in +combination. However, smbd will still obtain the user's UNIX account +information via the standard C library calls (e.g. getpwnam(), et. al.). +This means that the Samba server must also have the LDAP NSS library installed +and functioning correctly. This division of information makes it possible to +store all Samba account information in LDAP, but still maintain UNIX account +information in NIS while the network is transitioning to a full LDAP infrastructure.

      19.5. Configuring Samba with LDAP

      19.5.1. OpenLDAP configuration

      To include support for the sambaAccount object in an OpenLDAP directory +server, first copy the samba.schema file to slapd's configuration directory.

      root# cp samba.schema /etc/openldap/schema/

      Next, include the samba.schema file in slapd.conf. +The sambaAccount object contains two attributes which depend upon other schema +files. The 'uid' attribute is defined in cosine.schema and +the 'displayName' attribute is defined in the inetorgperson.schema +file. Both of these must be included before the samba.schema file.

      ## /etc/openldap/slapd.conf
      +
      +## schema files (core.schema is required by default)
      +include	           /etc/openldap/schema/core.schema
      +
      +## needed for sambaAccount
      +include            /etc/openldap/schema/cosine.schema
      +include            /etc/openldap/schema/inetorgperson.schema
      +include            /etc/openldap/schema/samba.schema
      +
      +## uncomment this line if you want to support the RFC2307 (NIS) schema
      +## include         /etc/openldap/schema/nis.schema
      +
      +....

      It is recommended that you maintain some indices on some of the most usefull attributes, +like in the following example, to speed up searches made on sambaAccount objectclasses +(and possibly posixAccount and posixGroup as well).

      # Indices to maintain
      +## required by OpenLDAP 2.0
      +index objectclass   eq
      +
      +## support pb_getsampwnam()
      +index uid           pres,eq
      +## support pdb_getsambapwrid()
      +index rid           eq
      +
      +## uncomment these if you are storing posixAccount and
      +## posixGroup entries in the directory as well
      +##index uidNumber     eq
      +##index gidNumber     eq
      +##index cn            eq
      +##index memberUid     eq

      19.5.2. Configuring Samba

      The following parameters are available in smb.conf only with --with-ldapsam +was included with compiling Samba.

      These are described in the smb.conf(5) man +page and so will not be repeated here. However, a sample smb.conf file for +use with an LDAP directory could appear as

      ## /usr/local/samba/lib/smb.conf
      +[global]
      +     security = user
      +     encrypt passwords = yes
      +
      +     netbios name = TASHTEGO
      +     workgroup = NARNIA
      +
      +     # ldap related parameters
      +
      +     # define the DN to use when binding to the directory servers
      +     # The password for this DN is not stored in smb.conf.  Rather it
      +     # must be set by using 'smbpasswd -w secretpw' to store the
      +     # passphrase in the secrets.tdb file.  If the "ldap admin dn" values
      +     # changes, this password will need to be reset.
      +     ldap admin dn = "cn=Samba Manager,ou=people,dc=samba,dc=org"
      +
      +     #  specify the LDAP server's hostname (defaults to locahost)
      +     ldap server = ahab.samba.org
      +
      +     # Define the SSL option when connecting to the directory
      +     # ('off', 'start tls', or 'on' (default))
      +     ldap ssl = start tls
      +
      +     # define the port to use in the LDAP session (defaults to 636 when
      +     # "ldap ssl = on")
      +     ldap port = 389
      +
      +     # specify the base DN to use when searching the directory
      +     ldap suffix = "ou=people,dc=samba,dc=org"
      +
      +     # generally the default ldap search filter is ok
      +     # ldap filter = "(&(uid=%u)(objectclass=sambaAccount))"

      19.6. Accounts and Groups management

      As users accounts are managed thru the sambaAccount objectclass, you should +modify you existing administration tools to deal with sambaAccount attributes.

      Machines accounts are managed with the sambaAccount objectclass, just +like users accounts. However, it's up to you to stored thoses accounts +in a different tree of you LDAP namespace: you should use +"ou=Groups,dc=plainjoe,dc=org" to store groups and +"ou=People,dc=plainjoe,dc=org" to store users. Just configure your +NSS and PAM accordingly (usually, in the /etc/ldap.conf configuration +file).

      In Samba release 2.2.3, the group management system is based on posix +groups. This meand that Samba make usage of the posixGroup objectclass. +For now, there is no NT-like group system management (global and local +groups).

      19.7. Security and sambaAccount

      There are two important points to remember when discussing the security +of sambaAccount entries in the directory.

      These password hashes are clear text equivalents and can be used to impersonate +the user without deriving the original clear text strings. For more information +on the details of LM/NT password hashes, refer to the ENCRYPTION chapter of the Samba-HOWTO-Collection.

      To remedy the first security issue, the "ldap ssl" smb.conf parameter defaults +to require an encrypted session (ldap ssl = on) using +the default port of 636 +when contacting the directory server. When using an OpenLDAP 2.0 server, it +is possible to use the use the StartTLS LDAP extended operation in the place of +LDAPS. In either case, you are strongly discouraged to disable this security +(ldap ssl = off).

      Note that the LDAPS protocol is deprecated in favor of the LDAPv3 StartTLS +extended operation. However, the OpenLDAP library still provides support for +the older method of securing communication between clients and servers.

      The second security precaution is to prevent non-administrative users from +harvesting password hashes from the directory. This can be done using the +following ACL in slapd.conf:

      ## allow the "ldap admin dn" access, but deny everyone else
      +access to attrs=lmPassword,ntPassword
      +     by dn="cn=Samba Admin,ou=people,dc=plainjoe,dc=org" write
      +     by * none

      19.8. LDAP specials attributes for sambaAccounts

      The sambaAccount objectclass is composed of the following attributes:

      The majority of these parameters are only used when Samba is acting as a PDC of +a domain (refer to the Samba-PDC-HOWTO for details on +how to configure Samba as a Primary Domain Controller). The following four attributes +are only stored with the sambaAccount entry if the values are non-default values:

      • smbHome

      • scriptPath

      • logonPath

      • homeDrive

      These attributes are only stored with the sambaAccount entry if +the values are non-default values. For example, assume TASHTEGO has now been +configured as a PDC and that logon home = \\%L\%u was defined in +its smb.conf file. When a user named "becky" logons to the domain, +the logon home string is expanded to \\TASHTEGO\becky. +If the smbHome attribute exists in the entry "uid=becky,ou=people,dc=samba,dc=org", +this value is used. However, if this attribute does not exist, then the value +of the logon home parameter is used in its place. Samba +will only write the attribute value to the directory entry is the value is +something other than the default (e.g. \\MOBY\becky).

      19.9. Example LDIF Entries for a sambaAccount

      The following is a working LDIF with the inclusion of the posixAccount objectclass:

      dn: uid=guest2, ou=people,dc=plainjoe,dc=org
      +ntPassword: 878D8014606CDA29677A44EFA1353FC7
      +pwdMustChange: 2147483647
      +primaryGroupID: 1201
      +lmPassword: 552902031BEDE9EFAAD3B435B51404EE
      +pwdLastSet: 1010179124
      +logonTime: 0
      +objectClass: sambaAccount
      +uid: guest2
      +kickoffTime: 2147483647
      +acctFlags: [UX         ]
      +logoffTime: 2147483647
      +rid: 19006
      +pwdCanChange: 0

      The following is an LDIF entry for using both the sambaAccount and +posixAccount objectclasses:

      dn: uid=gcarter, ou=people,dc=plainjoe,dc=org
      +logonTime: 0
      +displayName: Gerald Carter
      +lmPassword: 552902031BEDE9EFAAD3B435B51404EE
      +primaryGroupID: 1201
      +objectClass: posixAccount
      +objectClass: sambaAccount
      +acctFlags: [UX         ]
      +userPassword: {crypt}BpM2ej8Rkzogo
      +uid: gcarter
      +uidNumber: 9000
      +cn: Gerald Carter
      +loginShell: /bin/bash
      +logoffTime: 2147483647
      +gidNumber: 100
      +kickoffTime: 2147483647
      +pwdLastSet: 1010179230
      +rid: 19000
      +homeDirectory: /home/tashtego/gcarter
      +pwdCanChange: 0
      +pwdMustChange: 2147483647
      +ntPassword: 878D8014606CDA29677A44EFA1353FC7

      19.10. Comments

      Please mail all comments regarding this HOWTO to jerry@samba.org. This documents was +last updated to reflect the Samba 2.2.3 release.


      PrevHomeNext
      Stackable VFS modulesUpHOWTO Access Samba source code via CVS
      \ No newline at end of file diff --git a/docs/htmldocs/samba-pdc.html b/docs/htmldocs/samba-pdc.html index b61931e770d..93bbc727d4b 100644 --- a/docs/htmldocs/samba-pdc.html +++ b/docs/htmldocs/samba-pdc.html @@ -2,10 +2,11 @@ Samba as an NT4 or Win2k Primary Domain ControllerHow to Configure Samba as a NT4 Primary Domain Controller

      Chapter 6. Samba as an NT4 or Win2k Primary Domain Controller

      Chapter 6. How to Configure Samba as a NT4 Primary Domain Controller

      6.1. Prerequisite Reading

      6.1. Prerequisite Reading

      Before you continue reading in this chapter, please make sure that you are comfortable with configuring basic files services @@ -96,50 +93,19 @@ CLASS="FILENAME" >smb.conf(5) -manpage.

      Encryption chapter +of this HOWTO Collection.

      6.2. Background

      This article outlines the steps necessary for configuring Samba as a PDC. -It is necessary to have a working Samba server prior to implementing the -PDC functionality.

      • Domain logons for Windows NT 4.0 / 200x / XP Professional clients. -

      • Placing Windows 9x / Me clients in user level security -

      • Retrieving a list of users and groups from a Samba PDC to - Windows 9x / Me / NT / 200x / XP Professional clients -

      • Roaming Profiles -

      • Network/System Policies -

      6.2. Background

      Note

      Roaming Profiles and System/Network policies are advanced network administration topics -that are covered separately in this document.

      Author's Note: This document is a combination +of David Bannon's "Samba 2.2 PDC HOWTO" and "Samba NT Domain FAQ". +Both documents are superseded by this one.

      The following functionalities are new to the Samba 3.0 release:

      Versions of Samba prior to release 2.2 had marginal capabilities to act +as a Windows NT 4.0 Primary Domain Controller + +(PDC). With Samba 2.2.0, we are proud to announce official support for +Windows NT 4.0-style domain logons from Windows NT 4.0 and Windows +2000 clients. This article outlines the steps +necessary for configuring Samba as a PDC. It is necessary to have a +working Samba server prior to implementing the PDC functionality. If +you have not followed the steps outlined in UNIX_INSTALL.html, please make sure +that your server is configured correctly before proceeding. Another +good resource in the smb.conf(5) man +page. The following functionality should work in 2.2:

      • Windows NT 4 domain trusts +> domain logons for Windows NT 4.0/2000 clients.

      • Adding users via the User Manager for Domains +> placing a Windows 9x client in user level security +

      • retrieving a list of users and groups from a Samba PDC to + Windows 9x/NT/2000 clients +

      • roving (roaming) user profiles +

      • Windows NT 4.0-style system policies

      The following functionalities are NOT provided by Samba 3.0:

      The following pieces of functionality are not included in the 2.2 release:

      • Windows NT 4 domain trusts +

      • SAM replication with Windows NT 4.0 Domain Controllers (i.e. a Samba PDC and a Windows NT BDC or vice versa)

      • Adding users via the User Manager for Domains +

      • Acting as a Windows 2000 Domain Controller (i.e. Kerberos and Active Directory)

      Please note that Windows 9x / Me / XP Home clients are not true members of a domain +>Please note that Windows 9x clients are not true members of a domain for reasons outlined in this article. Therefore the protocol for support Windows 9x-style domain logons is completely different -from NT4 / Win2k type domain logons and has been officially supported for some +from NT4 domain logons and has been officially supported for some time.

      MS Windows XP Home edition is NOT able to join a domain and does not permit -the use of domain logons.

      Implementing a Samba PDC can basically be divided into 3 broad +>Implementing a Samba PDC can basically be divided into 2 broad steps.

    • Creating machine trust accounts and joining clients to the domain -

    • Adding and managing domain user accounts +> Creating machine trust accounts and joining clients + to the domain

    • There are other minor details such as user profiles, system policies, etc... However, these are not necessarily specific to a Samba PDC as much as they are related to Windows NT networking -concepts.

      6.3. Configuring the Samba Domain Controller

      6.3. Configuring the Samba Domain Controller

      The first step in creating a working Samba PDC is to -understand the parameters necessary in smb.conf. Here we -attempt to explain the parameters that are covered in - the smb.conf man page.

      . For convenience, the parameters have been +linked with the actual smb.conf description.

      Here is an example netbios name = = POGOPOGO workgroup = = NARNIANARNIA ; we should act as the domain and local master browser @@ -340,7 +348,8 @@ TARGET="_top" >logon path = \\%N\profiles\%u - ; where is a user's home directory and where should it be mounted at? + ; where is a user's home directory and where should it + ; be mounted at? write list = = ntadminntadmin ; share for storing user profiles @@ -438,18 +449,24 @@ CLASS="FILENAME" >

      Samba 3.0 offers a complete implementation of group mapping +>As Samba 2.2 does not offer a complete implementation of group mapping between Windows NT groups and Unix groups (this is really quite -complicated to explain in a short space).

      domain admin +group smb.conf parameter for information of creating "Domain +Admins" style accounts.

      6.4. Creating Machine Trust Accounts and Joining Clients to the Domain

      6.4. Creating Machine Trust Accounts and Joining Clients to the +Domain

      A machine trust account is a Samba account that is used to authenticate a client machine (rather than a user) to the Samba @@ -460,127 +477,14 @@ Account."

      A Windows PDC stores each machine trust account in the Windows -Registry. A Samba-3 PDC also has to stoe machine trust account information -in a suitable back-end data store. With Samba-3 there can be multiple back-ends -for this including:

      • smbpaswd - the plain ascii file stored used by - earlier versions of Samba. This file configuration option requires - a Unix/Linux system account for EVERY entry (ie: both for user and for - machine accounts). This file will be located in the private - directory (default is /usr/local/samba/lib/private or on linux /etc/samba). -

      • smbpasswd_nua - This file is independant of the - system wide user accounts. The use of this back-end option requires - specification of the "non unix account range" option also. It is called - smbpasswd and will be located in the private directory. -

      • tdbsam - a binary database backend that will be - stored in the private directory in a file called - passwd.tdb. The key benefit of this binary format - file is that it can store binary objects that can not be accomodated - in the traditional plain text smbpasswd file. -

      • tdbsam_nua like the smbpasswd_nua option above, this - file allows the creation of arbitrary user and machine accounts without - requiring that account to be added to the system (/etc/passwd) file. It - too requires the specification of the "non unix account range" option - in the [globals] section of the smb.conf file. -

      • ldapsam - An LDAP based back-end. Permits the - LDAP server to be specified. eg: ldap://localhost or ldap://frodo.murphy.com -

      • ldapsam_nua - LDAP based back-end with no unix - account requirement, like smbpasswd_nua and tdbsam_nua above. -

      A Samba PDC, however, stores each machine trust account in two parts, -as follows: +Registry. A Samba PDC, however, stores each machine trust account +in two parts, as follows:

      6.4.1. Manual Creation of Machine Trust Accounts

      6.4.1. Manual Creation of Machine Trust Accounts

      The first step in manually creating a machine trust account is to manually create the corresponding Unix account in @@ -650,45 +552,55 @@ CLASS="COMMAND" used to create new Unix accounts. The following is an example for a Linux based Samba server:

      root# root# /usr/sbin/useradd -g 100 -d /dev/null -c /usr/sbin/useradd -g 100 -d /dev/null -c "machine -nickname" -s /bin/false -s /bin/false machine_namemachine_name$

      root# root# passwd -l passwd -l machine_namemachine_name$

      On *BSD systems, this can be done using the 'chpass' utility:

      root# root# chpass -a "chpass -a "machine_name$:*:101:100::0:0:Workstation machine_name$:*:101:100::0:0:Workstation machine_namemachine_name:/dev/null:/sbin/nologin"

      doppy$:x:505:501:doppy$:x:505:501:machine_nicknamemachine_nickname:/dev/null:/bin/false

      Above, Above, machine_nicknamemachine_nickname can be any descriptive name for the client, i.e., BasementComputer. -machine_namemachine_name absolutely must be the NetBIOS name of the client to be joined to the domain. The "$" must be appended to the NetBIOS name of the client or Samba will not recognize @@ -736,20 +654,24 @@ CLASS="COMMAND" > command as shown here:

      root# root# smbpasswd -a -m smbpasswd -a -m machine_namemachine_name

      where where machine_namemachine_name is the machine's NetBIOS name. The RID of the new machine account is generated from the UID of the corresponding Unix account.

      Warning

      6.4.2. "On-the-Fly" Creation of Machine Trust Accounts

      6.4.2. "On-the-Fly" Creation of Machine Trust Accounts

      The second (and recommended) way of creating machine trust accounts is simply to allow the Samba server to create them as needed when the client @@ -840,9 +760,7 @@ CLASS="SECT2" >

      6.4.3. Joining the Client to the Domain

      6.4.3. Joining the Client to the Domain

      The procedure for joining a client to the domain varies with the version of Windows.

      6.5. Common Problems and Errors

      6.5. Common Problems and Errors

      C:\WINNT\>C:\WINNT\> net use * /d

      I joined the domain successfully but after upgrading to a newer version of the Samba code I get the message, "The system - can not log you on (C000019B), Please try again or consult your + can not log you on (C000019B), Please try a gain or consult your system administrator" when attempting to logon.

      This occurs when the domain SID stored in the secrets.tdb database - is changed. The most common cause of a change in domain SID is when - the domain name and/or the server name (netbios name) is changed. - The only way to correct the problem is to restore the original domain - SID or remove the domain client from the domain and rejoin. The domain - SID may be reset using either the smbpasswd or rpcclient utilities. +> This occurs when the domain SID stored in + private/WORKGROUP.SID is + changed. For example, you remove the file and smbd automatically + creates a new one. Or you are swapping back and forth between + versions 2.0.7, TNG and the HEAD branch code (not recommended). The + only way to correct the problem is to restore the original domain + SID or remove the domain client from the domain and rejoin.

    • This problem is caused by the PDC not having a suitable machine trust account. - If you are using the add user scriptadd user script method to create accounts then this would indicate that it has not worked. Ensure the domain admin user system is working. @@ -1068,9 +993,11 @@ CLASS="COMMAND"

      In order to work around this problem in 2.2.0, configure the - accountaccount control flag in

      6.6. What other help can I get?

      6.6. System Policies and Profiles

      There are many sources of information available in the form -of mailing lists, RFC's and documentation. The docs that come -with the samba distribution contain very good explanations of -general SMB topics such as browsing.

      Much of the information necessary to implement System Policies and +Roving User Profiles in a Samba domain is the same as that for +implementing these same items in a Windows NT 4.0 domain. +You should read the white paper Implementing +Profiles and Policies in Windows NT 4.0 available from Microsoft.

      Here are some additional details:

        What are some diagnostics tools I can use to debug the domain logon - process and where can I find them?What about Windows NT Policy Editor?

        One of the best diagnostic tools for debugging problems is Samba itself. - You can use the -d option for both smbd and nmbd to specify what - 'debug level' at which to run. See the man pages on smbd, nmbd and - smb.conf for more information on debugging options. The debug - level can range from 1 (the default) to 10 (100 for debugging passwords). +> To create or edit ntconfig.pol you must use + the NT Server Policy Editor, poledit.exe which + is included with NT Server but not NT Workstation. + There is a Policy Editor on a NTws + but it is not suitable for creating Domain Policies. + Further, although the Windows 95 + Policy Editor can be installed on an NT Workstation/Server, it will not + work with NT policies because the registry key that are set by the policy templates. + However, the files from the NT Server will run happily enough on an NTws. + You need poledit.exe, common.adm and winnt.adm. It is convenient + to put the two *.adm files in c:\winnt\inf which is where + the binary will look for them unless told otherwise. Note also that that + directory is 'hidden'.

        Another helpful method of debugging is to compile samba using the +> The Windows NT policy editor is also included with the Service Pack 3 (and + later) for Windows NT 4.0. Extract the files using servicepackname /x, + i.e. that's Nt4sp6ai.exe /x for service pack 6a. The policy editor, gcc -g flag. This will include debug - information in the binaries and allow you to attach gdb to the - running smbd / nmbd process. In order to attach gdb to an smbd - process for an NT workstation, first get the workstation to make the - connection. Pressing ctrl-alt-delete and going down to the domain box - is sufficient (at least, on the first time you join the domain) to - generate a 'LsaEnumTrustedDomains'. Thereafter, the workstation - maintains an open connection, and therefore there will be an smbd - process running (assuming that you haven't set a really short smbd - idle timeout) So, in between pressing ctrl alt delete, and actually - typing in your password, you can gdb attach and continue. +>poledit.exe and the associated template files (*.adm) should + be extracted as well. It is also possible to downloaded the policy template + files for Office97 and get a copy of the policy editor. Another possible + location is with the Zero Administration Kit available for download from Microsoft.

      • Some useful samba commands worth investigating: +> Can Win95 do Policies? +

        Install the group policy handler for Win9x to pick up group + policies. Look on the Win98 CD in \tools\reskit\netadmin\poledit. + Install group policies on a Win9x client by double-clicking + grouppol.inf. Log off and on again a couple of + times and see if Win98 picks up group policies. Unfortunately this needs + to be done on every Win9x machine that uses group policies.... +

        If group policies don't work one reports suggests getting the updated + (read: working) grouppol.dll for Windows 9x. The group list is grabbed + from /etc/group. +

      • How do I get 'User Manager' and 'Server Manager' +

        Since I don't need to buy an NT Server CD now, how do I get + the 'User Manager for Domains', the 'Server Manager'? +

        Microsoft distributes a version of these tools called nexus for + installation on Windows 95 systems. The tools set includes

        • testparam | more

          Server Manager

        • smbclient -L //{netbios name of server}

          User Manager for Domains

        • Event Viewer

        An SMB enabled version of tcpdump is available from - Click here to download the archived file http://www.tcpdup.org/. - Ethereal, another good packet sniffer for Unix and Win32 - hosts, can be downloaded from ftp://ftp.microsoft.com/Softlib/MSLFILES/NEXUS.EXE +

        The Windows NT 4.0 version of the 'User Manager for + Domains' and 'Server Manager' are available from Microsoft via ftp + from ftp://ftp.microsoft.com/Softlib/MSLFILES/SRVTOOLS.EXE +

    • 6.7. What other help can I get?

      There are many sources of information available in the form +of mailing lists, RFC's and documentation. The docs that come +with the samba distribution contain very good explanations of +general SMB topics such as browsing.

      6.8.2. Configuration Instructions: Setting up Roaming User Profiles

      NOTE! Roaming profiles support is different +for Win9X and WinNT.

      Before discussing how to configure roaming profiles, it is useful to see how +Win9X and WinNT clients implement these features.

      Win9X clients send a NetUserGetInfo request to the server to get the user's +profiles location. However, the response does not have room for a separate +profiles location field, only the user's home share. This means that Win9X +profiles are restricted to being in the user's home directory.

      WinNT clients send a NetSAMLogon RPC request, which contains many fields, +including a separate field for the location of the user's profiles. +This means that support for profiles is different for Win9X and WinNT.

      6.8.2.2. Windows 9X Configuration

      To support Win9X clients, you must use the "logon home" parameter. Samba has +now been fixed so that "net use/home" now works as well, and it, too, relies +on the "logon home" parameter.

      By using the logon home parameter, you are restricted to putting Win9X +profiles in the user's home directory. But wait! There is a trick you +can use. If you set the following in the [global] section of your +smb.conf file:

      logon home = \\%L\%U\.profiles

      then your Win9X clients will dutifully put their clients in a subdirectory +of your home directory called .profiles (thus making them hidden).

      Not only that, but 'net use/home' will also work, because of a feature in +Win9X. It removes any directory stuff off the end of the home directory area +and only uses the server and share portion. That is, it looks like you +specified \\%L\%U for "logon home".

      6.8.2.4. Windows 9X Profile Setup

      When a user first logs in on Windows 9X, the file user.DAT is created, +as are folders "Start Menu", "Desktop", "Programs" and "Nethood". +These directories and their contents will be merged with the local +versions stored in c:\windows\profiles\username on subsequent logins, +taking the most recent from each. You will need to use the [global] +options "preserve case = yes", "short preserve case = yes" and +"case sensitive = no" in order to maintain capital letters in shortcuts +in any of the profile folders.

      The user.DAT file contains all the user's preferences. If you wish to +enforce a set of preferences, rename their user.DAT file to user.MAN, +and deny them write access to this file.

      1. On the Windows 95 machine, go to Control Panel | Passwords and + select the User Profiles tab. Select the required level of + roaming preferences. Press OK, but do _not_ allow the computer + to reboot. +

      2. On the Windows 95 machine, go to Control Panel | Network | + Client for Microsoft Networks | Preferences. Select 'Log on to + NT Domain'. Then, ensure that the Primary Logon is 'Client for + Microsoft Networks'. Press OK, and this time allow the computer + to reboot. +

      Under Windows 95, Profiles are downloaded from the Primary Logon. +If you have the Primary Logon as 'Client for Novell Networks', then +the profiles and logon script will be downloaded from your Novell +Server. If you have the Primary Logon as 'Windows Logon', then the +profiles will be loaded from the local machine - a bit against the +concept of roaming profiles, if you ask me.

      You will now find that the Microsoft Networks Login box contains +[user, password, domain] instead of just [user, password]. Type in +the samba server's domain name (or any other domain known to exist, +but bear in mind that the user will be authenticated against this +domain and profiles downloaded from it, if that domain logon server +supports it), user name and user's password.

      Once the user has been successfully validated, the Windows 95 machine +will inform you that 'The user has not logged on before' and asks you +if you wish to save the user's preferences? Select 'yes'.

      Once the Windows 95 client comes up with the desktop, you should be able +to examine the contents of the directory specified in the "logon path" +on the samba server and verify that the "Desktop", "Start Menu", +"Programs" and "Nethood" folders have been created.

      These folders will be cached locally on the client, and updated when +the user logs off (if you haven't made them read-only by then :-). +You will find that if the user creates further folders or short-cuts, +that the client will merge the profile contents downloaded with the +contents of the profile directory already on the local client, taking +the newest folders and short-cuts from each set.

      If you have made the folders / files read-only on the samba server, +then you will get errors from the w95 machine on logon and logout, as +it attempts to merge the local and the remote profile. Basically, if +you have any errors reported by the w95 machine, check the Unix file +permissions and ownership rights on the profile directory contents, +on the samba server.

      If you have problems creating user profiles, you can reset the user's +local desktop cache, as shown below. When this user then next logs in, +they will be told that they are logging in "for the first time".

      1. instead of logging in under the [user, password, domain] dialog, + press escape. +

      2. run the regedit.exe program, and look in: +

        HKEY_LOCAL_MACHINE\Windows\CurrentVersion\ProfileList +

        you will find an entry, for each user, of ProfilePath. Note the + contents of this key (likely to be c:\windows\profiles\username), + then delete the key ProfilePath for the required user. +

        [Exit the registry editor]. +

      3. WARNING - before deleting the contents of the + directory listed in + the ProfilePath (this is likely to be c:\windows\profiles\username), + ask them if they have any important files stored on their desktop + or in their start menu. delete the contents of the directory + ProfilePath (making a backup if any of the files are needed). +

        This will have the effect of removing the local (read-only hidden + system file) user.DAT in their profile directory, as well as the + local "desktop", "nethood", "start menu" and "programs" folders. +

      4. search for the user's .PWL password-caching file in the c:\windows + directory, and delete it. +

      5. log off the windows 95 client. +

      6. check the contents of the profile path (see "logon path" described + above), and delete the user.DAT or user.MAN file for the user, + making a backup if required. +

      If all else fails, increase samba's debug log levels to between 3 and 10, +and / or run a packet trace program such as tcpdump or netmon.exe, and +look for any error reports.

      If you have access to an NT server, then first set up roaming profiles +and / or netlogons on the NT server. Make a packet trace, or examine +the example packet traces provided with NT server, and see what the +differences are with the equivalent samba trace.

      6.8.2.5. Windows NT Workstation 4.0

      When a user first logs in to a Windows NT Workstation, the profile +NTuser.DAT is created. The profile location can be now specified +through the "logon path" parameter.

      [lkcl 10aug97 - i tried setting the path to +\\samba-server\homes\profile, and discovered that this fails because +a background process maintains the connection to the [homes] share +which does _not_ close down in between user logins. you have to +have \\samba-server\%L\profile, where user is the username created +from the [homes] share].

      There is a parameter that is now available for use with NT Profiles: +"logon drive". This should be set to "h:" or any other drive, and +should be used in conjunction with the new "logon home" parameter.

      The entry for the NT 4.0 profile is a _directory_ not a file. The NT +help on profiles mentions that a directory is also created with a .PDS +extension. The user, while logging in, must have write permission to +create the full profile path (and the folder with the .PDS extension) +[lkcl 10aug97 - i found that the creation of the .PDS directory failed, +and had to create these manually for each user, with a shell script. +also, i presume, but have not tested, that the full profile path must +be browseable just as it is for w95, due to the manner in which they +attempt to create the full profile path: test existence of each path +component; create path component].

      In the profile directory, NT creates more folders than 95. It creates +"Application Data" and others, as well as "Desktop", "Nethood", +"Start Menu" and "Programs". The profile itself is stored in a file +NTuser.DAT. Nothing appears to be stored in the .PDS directory, and +its purpose is currently unknown.

      You can use the System Control Panel to copy a local profile onto +a samba server (see NT Help on profiles: it is also capable of firing +up the correct location in the System Control Panel for you). The +NT Help file also mentions that renaming NTuser.DAT to NTuser.MAN +turns a profile into a mandatory one.

      [lkcl 10aug97 - i notice that NT Workstation tells me that it is +downloading a profile from a slow link. whether this is actually the +case, or whether there is some configuration issue, as yet unknown, +that makes NT Workstation _think_ that the link is a slow one is a +matter to be resolved].

      [lkcl 20aug97 - after samba digest correspondence, one user found, and +another confirmed, that profiles cannot be loaded from a samba server +unless "security = user" and "encrypt passwords = yes" (see the file +ENCRYPTION.txt) or "security = server" and "password server = ip.address. +of.yourNTserver" are used. Either of these options will allow the NT +workstation to access the samba server using LAN manager encrypted +passwords, without the user intervention normally required by NT +workstation for clear-text passwords].

      [lkcl 25aug97 - more comments received about NT profiles: the case of +the profile _matters_. the file _must_ be called NTuser.DAT or, for +a mandatory profile, NTuser.MAN].

      6.8.2.7. Sharing Profiles between W95 and NT Workstation 4.0

      Potentially outdated or incorrect material follows
       

      I think this is all bogus, but have not deleted it. (Richard Sharpe)

      The default logon path is \\%N\%U. NT Workstation will attempt to create +a directory "\\samba-server\username.PDS" if you specify the logon path +as "\\samba-server\username" with the NT User Manager. Therefore, you +will need to specify (for example) "\\samba-server\username\profile". +NT 4.0 will attempt to create "\\samba-server\username\profile.PDS", which +is more likely to succeed.

      If you then want to share the same Start Menu / Desktop with W95, you will +need to specify "logon path = \\samba-server\username\profile" [lkcl 10aug97 +this has its drawbacks: i created a shortcut to telnet.exe, which attempts +to run from the c:\winnt\system32 directory. this directory is obviously +unlikely to exist on a Win95-only host].

      If you have this set up correctly, you will find separate user.DAT and +NTuser.DAT files in the same profile directory.

      [lkcl 25aug97 - there are some issues to resolve with downloading of +NT profiles, probably to do with time/date stamps. i have found that +NTuser.DAT is never updated on the workstation after the first time that +it is copied to the local workstation profile directory. this is in +contrast to w95, where it _does_ transfer / update profiles correctly].

      6.9. DOMAIN_CONTROL.txt : Windows NT Domain Control & Samba

      Possibly Outdated Material
       

      This appendix was originally authored by John H Terpstra of + the Samba Team and is included here for posterity. +

      NOTE : +The term "Domain Controller" and those related to it refer to one specific +method of authentication that can underly an SMB domain. Domain Controllers +prior to Windows NT Server 3.1 were sold by various companies and based on +private extensions to the LAN Manager 2.1 protocol. Windows NT introduced +Microsoft-specific ways of distributing the user authentication database. +See DOMAIN.txt for examples of how Samba can participate in or create +SMB domains based on shared authentication database schemes other than the +Windows NT SAM.

      Windows NT Server can be installed as either a plain file and print server +(WORKGROUP workstation or server) or as a server that participates in Domain +Control (DOMAIN member, Primary Domain controller or Backup Domain controller). +The same is true for OS/2 Warp Server, Digital Pathworks and other similar +products, all of which can participate in Domain Control along with Windows NT.

      To many people these terms can be confusing, so let's try to clear the air.

      Every Windows NT system (workstation or server) has a registry database. +The registry contains entries that describe the initialization information +for all services (the equivalent of Unix Daemons) that run within the Windows +NT environment. The registry also contains entries that tell application +software where to find dynamically loadable libraries that they depend upon. +In fact, the registry contains entries that describes everything that anything +may need to know to interact with the rest of the system.

      The registry files can be located on any Windows NT machine by opening a +command prompt and typing:

      C:\WINNT\> dir %SystemRoot%\System32\config

      The environment variable %SystemRoot% value can be obtained by typing:

      C:\WINNT>echo %SystemRoot%

      The active parts of the registry that you may want to be familiar with are +the files called: default, system, software, sam and security.

      In a domain environment, Microsoft Windows NT domain controllers participate +in replication of the SAM and SECURITY files so that all controllers within +the domain have an exactly identical copy of each.

      The Microsoft Windows NT system is structured within a security model that +says that all applications and services must authenticate themselves before +they can obtain permission from the security manager to do what they set out +to do.

      The Windows NT User database also resides within the registry. This part of +the registry contains the user's security identifier, home directory, group +memberships, desktop profile, and so on.

      Every Windows NT system (workstation as well as server) will have its own +registry. Windows NT Servers that participate in Domain Security control +have a database that they share in common - thus they do NOT own an +independent full registry database of their own, as do Workstations and +plain Servers.

      The User database is called the SAM (Security Access Manager) database and +is used for all user authentication as well as for authentication of inter- +process authentication (i.e. to ensure that the service action a user has +requested is permitted within the limits of that user's privileges).

      The Samba team have produced a utility that can dump the Windows NT SAM into +smbpasswd format: see ENCRYPTION.txt for information on smbpasswd and +/pub/samba/pwdump on your nearest Samba mirror for the utility. This +facility is useful but cannot be easily used to implement SAM replication +to Samba systems.

      Windows for Workgroups, Windows 95, and Windows NT Workstations and Servers +can participate in a Domain security system that is controlled by Windows NT +servers that have been correctly configured. Almost every domain will have +ONE Primary Domain Controller (PDC). It is desirable that each domain will +have at least one Backup Domain Controller (BDC).

      The PDC and BDCs then participate in replication of the SAM database so that +each Domain Controlling participant will have an up to date SAM component +within its registry.

      samba

      samba

      Name

      Samba -- A Windows SMB/CIFS fileserver for UNIX
      SAMBA -- A Windows SMB/CIFS fileserver for UNIX
      smbd(8)smbd

      The smbd daemon provides the file and print services to +>smbd + daemon provides the file and print services to SMB clients, such as Windows 95/98, Windows NT, Windows for Workgroups or LanManager. The configuration file - for this daemon is described in smb.conf(5)smb.conf

      nmbd(8)nmbd

      daemon provides NetBIOS nameservice and browsing support. The configuration file for this daemon - is described in smb.conf(5)smb.conf

      smbclient(1)smbclient

      testparm(1)testparm

      testparm - utility is a simple syntax checker for Samba's smb.conf(5) configuration file.

      smb.confconfiguration file.

      testprns(1)testprns

      smbstatus(1)smbstatus

      .

      nmblookup(1)nmblookup

      smbgroupedit(8)make_smbcodepage

      The smbgroupeditmake_smbcodepage - tool allows for mapping unix groups to NT Builtin, - Domain, or Local groups. Also it allows setting - priviledges for that group, such as saAddUser, etc.

      smbd server.

      smbpasswd(8)smbpasswd

      COMPONENTS

      AVAILABILITY

      If you have access to a WWW viewer (such as Mozilla - or Konqueror) then you will also find lots of useful information, +>If you have access to a WWW viewer (such as Netscape + or Mosaic) then you will also find lots of useful information, including back issues of the Samba mailing list, at

      VERSION

      This man page is correct for version 3.0 of the +>This man page is correct for version 2.2 of the Samba suite.

      CONTRIBUTIONS

      http://devel.samba.org/ - for information on how to do it properly. We prefer patches - in diff -u format.

      CONTRIBUTORS

      AUTHOR

      The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML - 4.2 for Samba 3.0 was done by Alexander Bokovoy.

      -Securing Samba
      SAMBA Project Documentation
      PrevNext

      Chapter 21. Securing Samba

      21.1. Introduction

      This note was attached to the Samba 2.2.8 release notes as it contained an -important security fix. The information contained here applies to Samba -installations in general.

      21.2. Using host based protection

      In many installations of Samba the greatest threat comes for outside -your immediate network. By default Samba will accept connections from -any host, which means that if you run an insecure version of Samba on -a host that is directly connected to the Internet you can be -especially vulnerable.

      One of the simplest fixes in this case is to use the 'hosts allow' and -'hosts deny' options in the Samba smb.conf configuration file to only -allow access to your server from a specific range of hosts. An example -might be:

        hosts allow = 127.0.0.1 192.168.2.0/24 192.168.3.0/24
      -  hosts deny = 0.0.0.0/0

      The above will only allow SMB connections from 'localhost' (your own -computer) and from the two private networks 192.168.2 and -192.168.3. All other connections will be refused connections as soon -as the client sends its first packet. The refusal will be marked as a -'not listening on called name' error.

      21.3. Using interface protection

      By default Samba will accept connections on any network interface that -it finds on your system. That means if you have a ISDN line or a PPP -connection to the Internet then Samba will accept connections on those -links. This may not be what you want.

      You can change this behaviour using options like the following:

        interfaces = eth* lo
      -  bind interfaces only = yes

      This tells Samba to only listen for connections on interfaces with a -name starting with 'eth' such as eth0, eth1, plus on the loopback -interface called 'lo'. The name you will need to use depends on what -OS you are using, in the above I used the common name for Ethernet -adapters on Linux.

      If you use the above and someone tries to make a SMB connection to -your host over a PPP interface called 'ppp0' then they will get a TCP -connection refused reply. In that case no Samba code is run at all as -the operating system has been told not to pass connections from that -interface to any process.

      21.4. Using a firewall

      Many people use a firewall to deny access to services that they don't -want exposed outside their network. This can be a very good idea, -although I would recommend using it in conjunction with the above -methods so that you are protected even if your firewall is not active -for some reason.

      If you are setting up a firewall then you need to know what TCP and -UDP ports to allow and block. Samba uses the following:

      UDP/137    - used by nmbd
      -UDP/138    - used by nmbd
      -TCP/139    - used by smbd
      -TCP/445    - used by smbd

      The last one is important as many older firewall setups may not be -aware of it, given that this port was only added to the protocol in -recent years.

      21.5. Using a IPC$ share deny

      If the above methods are not suitable, then you could also place a -more specific deny on the IPC$ share that is used in the recently -discovered security hole. This allows you to offer access to other -shares while denying access to IPC$ from potentially untrustworthy -hosts.

      To do that you could use:

        [ipc$]
      -     hosts allow = 192.168.115.0/24 127.0.0.1
      -     hosts deny = 0.0.0.0/0

      this would tell Samba that IPC$ connections are not allowed from -anywhere but the two listed places (localhost and a local -subnet). Connections to other shares would still be allowed. As the -IPC$ share is the only share that is always accessible anonymously -this provides some level of protection against attackers that do not -know a username/password for your host.

      If you use this method then clients will be given a 'access denied' -reply when they try to access the IPC$ share. That means that those -clients will not be able to browse shares, and may also be unable to -access some other resources.

      This is not recommended unless you cannot use one of the other -methods listed above for some reason.

      21.6. Upgrading Samba

      Please check regularly on http://www.samba.org/ for updates and -important announcements. Occasionally security releases are made and -it is highly recommended to upgrade Samba when a security vulnerability -is discovered.


      PrevHomeNext
      Stackable VFS modulesUpUnicode/Charsets
      \ No newline at end of file diff --git a/docs/htmldocs/securitylevels.html b/docs/htmldocs/securitylevels.html index 3d25e4d4413..f1b9967540e 100644 --- a/docs/htmldocs/securitylevels.html +++ b/docs/htmldocs/securitylevels.html @@ -2,10 +2,11 @@ Samba as Stand-Alone ServerUser and Share security level (for servers not in a domain)Prev

      Chapter 5. Samba as Stand-Alone Server

      In this section the function and purpose of Samba's security -modes are described.

      5.1. User and Share security level

      Chapter 5. User and Share security level (for servers not in a domain)

      A SMB server tells the client at startup what "security level" it is running. There are two options "share level" and "user level". Which @@ -102,14 +84,6 @@ strange, but it fits in with the client/server approach of SMB. In SMB everything is initiated and controlled by the client, and the server can only tell the client what is available and whether an action is allowed.

      5.1.1. User Level Security

      I'll describe user level security first, as its simpler. In user level security the client will send a "session setup" command directly after @@ -142,15 +116,6 @@ requests. When the server responds it gives the client a "uid" to use as an authentication tag for that username/password. The client can maintain multiple authentication contexts in this way (WinDD is an example of an application that does this)

      5.1.2. Share Level Security

      Ok, now for share level security. In share level security the client authenticates itself separately for each share. It will send a @@ -173,15 +138,6 @@ home directories) and any users listed in the "user =" smb.conf line. The password is then checked in turn against these "possible usernames". If a match is found then the client is authenticated as that user.

      5.1.3. Server Level Security

      Finally "server level" security. In server level security the samba server reports to the client that it is in user level security. The @@ -210,254 +166,6 @@ requests to another "user mode" server. This requires an additional parameter "password server =" that points to the real authentication server. That real authentication server can be another Samba server or can be a Windows NT server, the later natively capable of encrypted password support.

      5.1.3.1. Configuring Samba for Seemless Windows Network Integration

      MS Windows clients may use encrypted passwords as part of a challenege/response -authentication model (a.k.a. NTLMv1) or alone, or clear text strings for simple -password based authentication. It should be realized that with the SMB protocol -the password is passed over the network either in plain text or encrypted, but -not both in the same authentication requests.

      When encrypted passwords are used a password that has been entered by the user -is encrypted in two ways:

      • An MD4 hash of the UNICODE of the password - string. This is known as the NT hash. -

      • The password is converted to upper case, - and then padded or trucated to 14 bytes. This string is - then appended with 5 bytes of NULL characters and split to - form two 56 bit DES keys to encrypt a "magic" 8 byte value. - The resulting 16 bytes for the LanMan hash. -

      MS Windows 95 pre-service pack 1, MS Windows NT versions 3.x and version 4.0 -pre-service pack 3 will use either mode of password authentication. All -versions of MS Windows that follow these versions no longer support plain -text passwords by default.

      MS Windows clients have a habit of dropping network mappings that have been idle -for 10 minutes or longer. When the user attempts to use the mapped drive -connection that has been dropped, the client re-establishes the connection using -a cached copy of the password.

      When Microsoft changed the default password mode, support was dropped for caching -of the plain text password. This means that when the registry parameter is changed -to re-enable use of plain text passwords it appears to work, but when a dropped -service connection mapping attempts to revalidate it will fail if the remote -authentication server does not support encrypted passwords. This means that it -is definitely not a good idea to re-enable plain text password support in such clients.

      The following parameters can be used to work around the issue of Windows 9x client -upper casing usernames and password before transmitting them to the SMB server -when using clear text authentication.

      	passsword level = integer
      -	username level = integer

      By default Samba will lower case the username before attempting to lookup the user -in the database of local system accounts. Because UNIX usernames conventionally -only contain lower case character, the username level parameter -is rarely needed.

      However, passwords on UNIX systems often make use of mixed case characters. -This means that in order for a user on a Windows 9x client to connect to a Samba -server using clear text authentication, the password level -must be set to the maximum number of upper case letter which could -appear is a password. Note that is the server OS uses the traditional DES version -of crypt(), then a password level of 8 will result in case -insensitive passwords as seen from Windows users. This will also result in longer -login times as Samba hash to compute the permutations of the password string and -try them one by one until a match is located (or all combinations fail).

      The best option to adopt is to enable support for encrypted passwords -where ever Samba is used. There are three configuration possibilities -for support of encrypted passwords:

      5.1.3.2. Use MS Windows NT as an authentication server

      This method involves the additions of the following parameters in the smb.conf file:

      	encrypt passwords = Yes
      -	security = server
      -	password server = "NetBIOS_name_of_PDC"

      There are two ways of identifying whether or not a username and -password pair was valid or not. One uses the reply information provided -as part of the authentication messaging process, the other uses -just and error code.

      The down-side of this mode of configuration is the fact that -for security reasons Samba will send the password server a bogus -username and a bogus password and if the remote server fails to -reject the username and password pair then an alternative mode -of identification of validation is used. Where a site uses password -lock out after a certain number of failed authentication attempts -this will result in user lockouts.

      Use of this mode of authentication does require there to be -a standard Unix account for the user, this account can be blocked -to prevent logons by other than MS Windows clients.

      5.1.4. Domain Level Security

      When samba is operating in security = domain mode this means that -the Samba server has a domain security trust account (a machine account) and will cause -all authentication requests to be passed through to the domain controllers.

      5.1.4.1. Samba as a member of an MS Windows NT security domain

      This method involves additon of the following paramters in the smb.conf file:

      	encrypt passwords = Yes
      -	security = domain
      -	workgroup = "name of NT domain"
      -	password server = *

      The use of the "*" argument to "password server" will cause samba to locate the -domain controller in a way analogous to the way this is done within MS Windows NT. -This is the default behaviour.

      In order for this method to work the Samba server needs to join the -MS Windows NT security domain. This is done as follows:

      • On the MS Windows NT domain controller using - the Server Manager add a machine account for the Samba server. -

      • Next, on the Linux system execute: - smbpasswd -r PDC_NAME -j DOMAIN_NAME -

      Use of this mode of authentication does require there to be a standard Unix account -for the user in order to assign a uid once the account has been authenticated by -the remote Windows DC. This account can be blocked to prevent logons by other than -MS Windows clients by things such as setting an invalid shell in the -/etc/passwd entry.

      An alternative to assigning UIDs to Windows users on a Samba member server is -presented in the Winbind Overview chapter -in this HOWTO collection.

      5.1.5. ADS Level Security

      For information about the configuration option please refer to the entire section entitled -Samba as an ADS Domain Member.

      + smb.conf

      smb.conf

      smb.conf

      FILE FORMAT

      name = name = value -

      The file is line-based - that is, each newline-terminated @@ -105,7 +110,7 @@ CLASS="REPLACEABLE" >

      SECTION DESCRIPTIONS

      There are three special sections, [global], [homes] and [printers], which are - described under special sections. The following notes apply to ordinary section descriptions.

      Sections may be designated Sections may be designated guest services, in which case no password is required to access them. A specified - UNIX guest account is used to define access privileges in this case.

      /home/bar. The share is accessed via the share name "foo":

      	[foo]
      -	path = /home/bar
      -	read only = no
      [foo] + path = /home/bar + read only = no + +

      The following sample section defines a printable share. The share is readonly, but printable. That is, the only write access permitted is via calls to open, write to and close a - spool file. The guest ok parameter means access will be permitted as the default guest user (specified elsewhere):

      	[aprinter]
      -	path = /usr/spool/public
      -	read only = yes
      -	printable = yes
      -	guest ok = yes
      [aprinter] + path = /usr/spool/public + read only = yes + printable = yes + guest ok = yes + +

      SPECIAL SECTIONS

      The [global] section

      The [homes] section

      If you decide to use a If you decide to use a path = line in your [homes] section then you may find it useful to use the %S macro. For example :

      path = /data/pchome/%Spath = /data/pchome/%S

      would be useful if you have different home directories @@ -292,48 +306,47 @@ CLASS="USERINPUT" a normal service section can specify, though some make more sense than others. The following is a typical and suitable [homes] section:

      		[homes]
      -	read only = no
      [homes] + read only = no + +

      An important point is that if guest access is specified in the [homes] section, all home directories will be - visible to all clients without a password. In the very unlikely event that this is actually desirable, it - would be wise to also specify read only access.

      Note that the Note that the browseable flag for auto home directories will be inherited from the global browseable flag, not the [homes] browseable flag. This is useful as - it means setting browseable = no in the [homes] section will hide the [homes] share but make any auto home directories visible.

      The [printers] section

      [printers]
      -	path = /usr/spool/public
      -	guest ok = yes
      -	printable = yes 	 	[printers]
      + 			path = /usr/spool/public
      + 			guest ok = yes
      + 			printable = yes 
      +		

      All aliases given for a printer in the printcap file are legitimate printer names as far as the server is concerned. If your printing subsystem doesn't work like that, you will have to set up a pseudo-printcap. This is a file consisting of one or more lines like this:

      		alias|alias|alias|alias...    
      alias|alias|alias|alias... + +

      Each alias should be an acceptable printer name for your printing subsystem. In the [global] section, specify @@ -437,7 +471,7 @@ CLASS="COMPUTEROUTPUT" >

      PARAMETERS

      parameters define the specific attributes of sections.

      Some parameters are specific to the [global] section - (e.g., security). Some parameters are usable - in all sections (e.g., create mode). All others are permissible only in normal sections. For the purposes of the following descriptions the [homes] and [printers] - sections will be considered normal. The letter G in parentheses indicates that a parameter is specific to the - [global] section. The letter S indicates that a parameter can be specified in a service specific - section. Note that all S parameters can also be specified in the [global] section - in which case they will define the default behavior for all services.

      VARIABLE SUBSTITUTIONS

      Name of the domain or workgroup of the current user.

      %$(%$(envvarenvvar)

      The value of the environment variable - envarenvar.

      the name of your NIS home directory server. This is obtained from your NIS auto.map entry. If you have - not compiled Samba with the --with-automount option then this value will be the same as %L.

      NAME MANGLING

      controls if names that have characters that aren't of the "default" case are mangled. For example, if this is yes then a name like "Mail" would be mangled. - Default no.

      controls whether filenames are case sensitive. If they aren't then Samba must do a filename search and match on passed - names. Default no.

      controls what the default case is for new - filenames. Default lower.

      controls if new files are created with the case that the client passes, or if they are forced to be the - "default" case. Default yes.

      yes.

      NOTE ABOUT USERNAME/PASSWORD VALIDATION

      usernameusername method of passing a username.

      COMPLETE LIST OF GLOBAL PARAMETERS

      abort shutdown scriptabort shutdown script

      add group scriptadd group script

      addprinter commandaddprinter command

      add share commandadd share command

      add user scriptadd user script

      add user to group scriptadd user to group script

      add machine scriptadd machine script

      delete group scriptdelete group script

      ads serverads server

      algorithmic rid basealgorithmic rid base

      allow trusted domainsallow trusted domains

      announce asannounce as

      announce versionannounce version

      auth methodsauth methods

      auto servicesauto services

      bind interfaces onlybind interfaces only

      browse listbrowse list

      change notify timeoutchange notify timeout

      change share commandchange share command

      config fileconfig file

      deadtimedeadtime

      debug hires timestampdebug hires timestamp

      debug piddebug pid

      debug timestampdebug timestamp

      debug uiddebug uid

      debugleveldebuglevel

      defaultdefault

      default servicedefault service

      deleteprinter commanddeleteprinter command

      delete share commanddelete share command

      delete user scriptdelete user script

      delete user from group scriptdelete user from group script

      dfree commanddfree command

      disable netbiosdisable netbios

      disable spoolssdisable spoolss

      display charsetdisplay charset

      dns proxydns proxy

      domain logonsdomain logons

      domain masterdomain master

      dos charsetdos charset

      encrypt passwordsencrypt passwords

      enhanced browsingenhanced browsing

      enumports commandenumports command

      getwd cachegetwd cache

      hide local usershide local users

      hide unreadablehide unreadable

      hide unwriteable fileshide unwriteable files

      hide special fileshide special files

      homedir maphomedir map

      host msdfshost msdfs

      hostname lookupshostname lookups

      hosts equivhosts equiv

      interfacesinterfaces

      keepalivekeepalive

      kernel oplockskernel oplocks

      lanman authlanman auth

      large readwritelarge readwrite

      ldap admin dn

    • ldap delete dn

    • ldap admin dnldap del only sam attr

    • ldap filterldap filter

      ldap portldap port

      ldap serverldap server

      ldap sslldap ssl

      ldap suffixldap suffix

      ldap user suffixldap user suffix

      ldap machine suffixldap machine suffix

      ldap passwd syncldap passwd sync

      ldap trust idsldap trust ids

      lm announcelm announce

      lm intervallm interval

      load printersload printers

      local masterlocal master

      lock dirlock dir

      lock directorylock directory

      lock spin countlock spin count

      lock spin timelock spin time

      pid directorypid directory

      log filelog file

      log levellog level

      logon drivelogon drive

      logon homelogon home

      logon pathlogon path

      logon scriptlogon script

      lpq cache timelpq cache time

      machine password timeout

    • mangle prefixmachine password timeout

    • mangled stackmangled stack

      map to guestmap to guest

      max disk sizemax disk size

      max log sizemax log size

      max muxmax mux

      max open filesmax open files

      max protocolmax protocol

      max smbd processesmax smbd processes

      max ttlmax ttl

      max wins ttlmax wins ttl

      max xmitmax xmit

      message commandmessage command

      min passwd lengthmin passwd length

      min password lengthmin password length

      min protocolmin protocol

      min wins ttlmin wins ttl

      name cache timeoutname cache timeout

      name resolve ordername resolve order

      netbios aliasesnetbios aliases

      netbios namenetbios name

      netbios scopenetbios scope

      nis homedirnis homedir

      ntlm authntlm auth

      non unix account rangenon unix account range

      nt pipe supportnt pipe support

      nt status supportnt status support

      null passwordsnull passwords

      obey pam restrictionsobey pam restrictions

      oplock break wait timeoplock break wait time

      os levelos level

      os2 driver mapos2 driver map

      pam password changepam password change

      panic actionpanic action

      paranoid server securityparanoid server security

      passdb backendpassdb backend

      passwd chatpasswd chat

      passwd chat debugpasswd chat debug

      passwd programpasswd program

      password levelpassword level

      password serverpassword server

      prefered masterprefered master

      preferred masterpreferred master

      preloadpreload

      printcapprintcap

      printcap name

    • printcap nameprinter driver file

    • private dirprivate dir

      protocolprotocol

      read bmpxread bmpx

      read rawread raw

      read sizeread size

      realmrealm

      remote announceremote announce

      remote browse syncremote browse sync

      restrict anonymousrestrict anonymous

      rootroot

      root dirroot dir

      root directoryroot directory

      securitysecurity

      server stringserver string

      show add printer wizardshow add printer wizard

      shutdown scriptshutdown script

      smb passwd filesmb passwd file

      smb portssmb ports

      socket addresssocket address

      socket optionssocket options

      source environmentsource environment

      use spnegouse spnego

      stat cachestat cache

      stat cache sizestat cache size

      strip dotstrip dot

      syslogsyslog

      syslog onlysyslog only

      template homedirtemplate homedir

      template shelltemplate shell

      time offsettime offset

      time servertime server

      timestamp logstimestamp logs

      total print jobstotal print jobs

      unicodeunicode

      unix charsetunix charset

      unix extensionsunix extensions

      unix password syncunix password sync

      update encryptedupdate encrypted

      use mmapuse mmap

    • use rhosts

    • use sendfileuse sendfile

      username levelusername level

      username mapusername map

      utmputmp

      utmp directoryutmp directory

      wtmp directorywtmp directory

      winbind cache timewinbind cache time

      winbind enum userswinbind enum users

      winbind enum groupswinbind enum groups

      winbind gidwinbind gid

      winbind separatorwinbind separator

      winbind uidwinbind uid

      winbind use default domainwinbind use default domain

      wins hookwins hook

      wins partnerswins partners

      wins proxywins proxy

      wins serverwins server

      wins supportwins support

      workgroupworkgroup

      write rawwrite raw

      COMPLETE LIST OF SERVICE PARAMETERS

      admin usersadmin users

      allow hostsallow hosts

      availableavailable

      blocking locksblocking locks

      block sizeblock size

      browsablebrowsable

      browseablebrowseable

      case sensitivecase sensitive

      casesignamescasesignames

      commentcomment

      copycopy

      create maskcreate mask

      create modecreate mode

      csc policycsc policy

      default casedefault case

      default devmodedefault devmode

      delete readonlydelete readonly

      delete veto filesdelete veto files

      deny hostsdeny hosts

      directorydirectory

      directory maskdirectory mask

      directory modedirectory mode

      directory security maskdirectory security mask

      dont descenddont descend

      dos filemodedos filemode

      dos filetime resolutiondos filetime resolution

      dos filetimesdos filetimes

      execexec

      fake directory create timesfake directory create times

      fake oplocksfake oplocks

      follow symlinksfollow symlinks

      force create modeforce create mode

      force directory modeforce directory mode

      force directory security modeforce directory security mode

      force groupforce group

      force security modeforce security mode

      force userforce user

      fstypefstype

      groupgroup

      guest accountguest account

      guest okguest ok

      guest onlyguest only

      hide dot fileshide dot files

      hide fileshide files

      hosts allowhosts allow

      hosts denyhosts deny

      includeinclude

      inherit aclsinherit acls

      inherit permissionsinherit permissions

      invalid usersinvalid users

      level2 oplockslevel2 oplocks

      lockinglocking

      lppause commandlppause command

      lpq commandlpq command

      lpresume commandlpresume command

      lprm commandlprm command

      magic outputmagic output

      magic scriptmagic script

      mangle casemangle case

      mangled mapmangled map

      mangled namesmangled names

      mangling charmangling char

      mangling methodmangling method

      map archivemap archive

      map hiddenmap hidden

      map systemmap system

      max connectionsmax connections

      max print jobsmax print jobs

      min print spacemin print space

      msdfs proxymsdfs proxy

      msdfs rootmsdfs root

      nt acl supportnt acl support

      only guestonly guest

      only useronly user

      oplock contention limitoplock contention limit

      oplocksoplocks

      pathpath

      posix locking

    • posix lockingpostexec

    • postexecpostscript

    • preexecpreexec

      preexec closepreexec close

      preserve casepreserve case

      print commandprint command

      print okprint ok

      printableprintable

      printerprinter

      printer admin

    • printer driver

    • printer adminprinter driver location

    • printer nameprinter name

      printingprinting

      publicpublic

      queuepause commandqueuepause command

      queueresume commandqueueresume command

      read listread list

      read onlyread only

      root postexecroot postexec

      root preexecroot preexec

      root preexec closeroot preexec close

      security masksecurity mask

      set directoryset directory

      share modesshare modes

      short preserve caseshort preserve case

      strict allocatestrict allocate

      strict lockingstrict locking

      strict syncstrict sync

      sync alwayssync always

      use client driveruse client driver

      useruser

      usernameusername

      usersusers

      valid usersvalid users

      veto filesveto files

      veto oplock filesveto oplock files

      vfs pathvfs path

      vfs objectvfs object

      vfs optionsvfs options

      volumevolume

      wide linkswide links

      writablewritable

      write cache sizewrite cache size

      write listwrite list

      write okwrite ok

      writeablewriteable

      EXPLANATION OF EACH PARAMETER

      >abort shutdown script (G)
      abort shutdown script (G)

      This parameter only exists in the HEAD cvs branch - This a full path name to a script called by smbd(8) that + This a full path name to a script called by + smbd(8) that should stop a shutdown procedure issued by the shutdown scriptshutdown script.

      This command will be run as user.

      Default: Default: None.

      Example: >addprinter command (G)addprinter command (G)

      With the introduction of MS-RPC based printing @@ -4083,10 +4782,12 @@ NAME="ADDPRINTERCOMMAND" NT/2000 print server.

      For a Samba host this means that the printer must be - physically added to the underlying printing system. The add - printer command defines a script to be run which will perform the necessary operations for adding the printer to the print system and to add the appropriate service definition @@ -4094,63 +4795,79 @@ CLASS="PARAMETER" CLASS="FILENAME" >smb.conf file in order that it can be - shared by smbd(8)smbd(8) + .

      The The addprinter commandaddprinter command is automatically invoked with the following parameter (in - order):

      • printer nameprinter name

      • share nameshare name

      • port nameport name

      • driver namedriver name

      • locationlocation

      • Windows 9x driver locationWindows 9x driver location

      • Once the Once the addprinter commandaddprinter command has been executed, will return an ACCESS_DENIED error to the client.

        The "add printer command" program can output a single line of text, - which Samba will set as the port the new printer is connected to. - If this line isn't output, Samba won't reload its printer shares. -

        See also deleteprinter command deleteprinter command, printingprinting, show add - printer wizard

        Default: Default: none

        Example: >add share command (G)add share command (G)

        Samba 2.2.0 introduced the ability to dynamically add and delete shares via the Windows NT 4.0 Server Manager. The - add share commandadd share command is used to define an external program or script which will add a new service definition to smb.conf. In order to successfully - execute the add share commandadd share command, smbdsmbd will automatically invoke the - add share commandadd share command with four parameters.

        • configFileconfigFile - the location of the global

        • shareNameshareName - the name of the new share.

        • pathNamepathName - path to an **existing** directory on disk.

        • commentcomment - comment string to associate with the new share.

          This parameter is only used for add file shares. To add printer shares, see the addprinter - command.

          See also change share - command, delete share - command.

          Default: Default: none

          Example: >add machine script (G)add machine script (G)

          This is the full pathname to a script that will - be run by smbd(8) when a machine is added + be run by smbd(8) when a machine is added to it's domain using the administrator username and password method.

          This option is only required when using sam back-ends tied to the @@ -4380,7 +5112,7 @@ CLASS="COMMAND" >>ads server (G)ads server (G)

          If this option is specified, samba does @@ -4402,22 +5134,18 @@ CLASS="COMMAND" >>add user script (G)add user script (G)

          This is the full pathname to a script that will - be run AS ROOT by smbd(8) by smbd(8) + under special circumstances described below.

          Normally, a Samba server requires that UNIX users are @@ -4429,51 +5157,50 @@ HREF="smbd.8.html" TARGET="_top" >smbd to create the required UNIX users - ON DEMAND when a user accesses the Samba server.

          In order to use this option, smbd(8) must In order to use this option, smbd + must NOT be set to be set to security = sharesecurity = share - and add user scriptadd user script must be set to a full pathname for a script that will create a UNIX - user given one argument of %u%u, which expands into the UNIX user name to create.

          When the Windows user attempts to access the Samba server, - at login (session setup in the SMB protocol) time, smbd(8) contacts the password server smbd contacts the password server and attempts to authenticate the given user with the given password. If the authentication succeeds then smbd attempts to find a UNIX user in the UNIX password database to map the - Windows user into. If this lookup fails, and add user script - is set then smbd will - call the specified script AS ROOT, expanding - any %u%u argument to be the user name to create.

          If this script successfully creates the user then

          See also security security, password serverpassword server, delete user - script.

          >add group script (G)add group script (G)

          This is the full pathname to a script that will - be run AS ROOT by smbd(8) by smbd(8) when a new group is requested. It will expand any - %g%g to the group name passed. This script is only useful for installations using the Windows NT domain administration tools. The script is @@ -4581,7 +5312,7 @@ CLASS="PARAMETER" >>admin users (S)admin users (S)

          This is a list of users who will be granted @@ -4592,12 +5323,9 @@ NAME="ADMINUSERS" this list will be able to do anything they like on the share, irrespective of file permissions.

          Default: Default: no admin users

          Example: >add user to group script (G)add user to group script (G)

          Full path to the script that will be called when a user is added to a group using the Windows NT domain administration - tools. It will be run by smbd(8) smbd(8) + AS ROOT. - Any . Any %g will be replaced with the group name and - any %g will be + replaced with the group name and any %u will be replaced with the user name. +>%u will + be replaced with the user name.

          Default: >allow hosts (S)allow hosts (S)

          Synonym for hosts allowhosts allow.

          >algorithmic rid base (G)algorithmic rid base (G)

          This determines how Samba will use its @@ -4698,22 +5428,24 @@ CLASS="COMMAND" >>allow trusted domains (G)allow trusted domains (G)

          This option only takes effect when the securitysecurity option is set to - server or server or domaindomain. If it is set to no, then attempts to connect to a resource from a domain or workgroup other than the one which >announce as (G)announce as (G)

          This specifies what type of server nmbd(8) will announce itself as, to a network neighborhood browse +>This specifies what type of server + nmbd + will announce itself as, to a network neighborhood browse list. By default this is set to Windows NT. The valid options are : "NT Server" (which can also be written as "NT"), "NT Workstation", "Win95" or "WfW" meaning Windows NT Server, @@ -4775,7 +5510,7 @@ CLASS="COMMAND" >>announce version (G)announce version (G)

          This specifies the major and minor version numbers @@ -4797,14 +5532,16 @@ CLASS="COMMAND" >>auto services (G)auto services (G)

          This is a synonym for the preloadpreload.

          >auth methods (G)auth methods (G)

          This option allows the administrator to chose what @@ -4822,9 +5559,11 @@ CLASS="COMMAND" > will use when authenticating a user. This option defaults to sensible values based on security security. @@ -4847,19 +5586,18 @@ CLASS="COMMAND" >>available (S)available (S)

          This parameter lets you "turn off" a service. If - available = no, then available = no, then ALL attempts to connect to the service will fail. Such failures are logged.

          >bind interfaces only (G)bind interfaces only (G)

          This global parameter allows the Samba admin to limit what interfaces on a machine will serve SMB requests. It - affects file service smbd(8) and name service nmbd(8) in a slightly different ways.

          smbd(8) and + name service nmbd(8) in slightly + different ways.

          For name service it causes nmbd will service - name requests on all of these sockets. If bind interfaces - only is set then nmbd will check the source address of any packets coming in on the broadcast sockets and discard any that don't match the broadcast addresses of the - interfaces in the interfacesinterfaces parameter list. As unicast packets are received on the other sockets it allows nmbd to refuse to serve names to machines that send packets that arrive through any interfaces not listed in the - interfacesinterfaces list. IP Source address spoofing does defeat this simple check, however, so it must not be used seriously as a security feature for nmbd.

          For file service it causes smbd(8) to bind only to the interface list - given in the For file service it causes smbd(8) + to bind only to the interface list given in the interfaces parameter. This restricts the networks that @@ -4958,60 +5698,63 @@ CLASS="COMMAND" that are serving PPP or other intermittent or non-broadcast network interfaces as it will not cope with non-permanent interfaces.

          If If bind interfaces only is set then - unless the network address bind interfaces only is set then + unless the network address 127.0.0.1 is added - to the interfaces parameter list smbpasswd(8) and swat(8) may not work as expected due to the reasons covered below.

          interfaces parameter list smbpasswd(8) + and swat(8) may + not work as expected due to the reasons covered below.

          To change a users SMB password, the smbpasswd - by default connects to the localhost - 127.0.0.1 address as an SMB client to issue the password change request. If - bind interfaces only is set then unless the - network address bind interfaces only is set then unless the + network address 127.0.0.1 is added to the - interfacesinterfaces parameter list then smbpasswdsmbpasswd can be forced to use the primary IP interface - of the local host by using its smbpasswd(8) -r -r remote machineremote machine - parameter, with parameter, with remote machineremote machine set to the IP name of the primary interface of the local host.

          nmbd at the address - 127.0.0.1 to determine if they are running. - Not adding 127.0.0.1 will cause smbd>blocking locks (S)blocking locks (S)

          This parameter controls the behavior - of smbd(8)This parameter controls the behavior of smbd(8) when given a request by a client to obtain a byte range lock on a region of an open file, and the request has a time limit associated with it.

          If this parameter is set to If this parameter is set to nono, then samba will behave as previous versions of Samba would and will fail the lock request immediately if the lock range @@ -5127,15 +5865,14 @@ CLASS="COMMAND" >>block size (S)block size (S)

          This parameter controls the behavior of smbd(8)This parameter controls the behavior of + smbd(8) when reporting disk free sizes. By default, this reports a disk block size of 1024 bytes.

          Changing this option does not change the disk free reporting size, just the block size unit reported to the client.

          Default: block size = 1024

          Example: block size = 65536

          >browsable (S)
          browsable (S)

          See the browseable browseable.

          >browse list (G)browse list (G)

          This controls whether smbd(8)This controls whether smbd(8) will serve a browse list to a client doing a NetServerEnum call. Normally - set to yesyes. You should never need to change this.

          >browseable (S)browseable (S)

          This controls whether this share is seen in @@ -5214,11 +5964,11 @@ CLASS="COMMAND" >>case sensitive (S)case sensitive (S)

          See the discussion in the section NAME MANGLING.

          >casesignames (S)casesignames (S)

          Synonym for >change notify timeout (G)change notify timeout (G)

          This SMB allows a client to tell a server to "watch" a particular directory for any changes and only reply to the SMB request when a change has occurred. Such constant scanning of - a directory is expensive under UNIX, hence an smbd(8) smbd(8) daemon only performs such a scan - on each requested directory once every change notify - timeout seconds.

          Default: >change share command (G)change share command (G)

          Samba 2.2.0 introduced the ability to dynamically add and delete shares via the Windows NT 4.0 Server Manager. The - change share commandchange share command is used to define an external program or script which will modify an existing service definition in smb.conf. In order to successfully - execute the change share commandchange share command, smbdsmbd will automatically invoke the - change share commandchange share command with four parameters.

          • configFileconfigFile - the location of the global

          • shareNameshareName - the name of the new share.

          • pathNamepathName - path to an **existing** directory on disk.

          • commentcomment - comment string to associate with the new share.

            See also add share - command, delete - share command.

            Default: Default: none

            Example: >comment (S)comment (S)

            This is a text field that is seen next to a share @@ -5409,18 +6177,17 @@ CLASS="COMMAND" >If you want to set the string that is displayed next to the machine name then see the server string server string parameter.

            Default: Default: No comment string

            Example: >config file (G)config file (G)

            This allows you to override the config file @@ -5464,7 +6231,7 @@ CLASS="COMMAND" >>copy (S)copy (S)

            This parameter allows you to "clone" service @@ -5477,12 +6244,9 @@ NAME="COPY" copied must occur earlier in the configuration file than the service doing the copying.

            Default: Default: no value

            Example: >create mask (S)create mask (S)

            A synonym for this parameter is create modecreate mode .

            not set here will be removed from the modes set on a file when it is created.

            Following this Samba will bit-wise 'OR' the UNIX mode created from this parameter with the value of the force create modeforce create mode parameter which is set to 000 by default.

            This parameter does not affect directory modes. See the parameter directory mode - for details.

            See also the force - create mode parameter for forcing particular mode bits to be set on created files. See also the directory modedirectory mode parameter for masking mode bits on created directories. See also the inherit permissionsinherit permissions parameter.

            security masksecurity mask.

            >create mode (S)create mode (S)

            This is a synonym for create mask create mask.

            >csc policy (S)csc policy (S)

            This stands for This stands for client-side caching policy, and specifies how clients capable of offline caching will cache the files in the share. The valid values are: manual, documents, programs, disable.

            >deadtime (G)deadtime (G)

            The value of the parameter (a decimal integer) @@ -5679,7 +6453,7 @@ CLASS="COMMAND" >>debug hires timestamp (G)debug hires timestamp (G)

            Sometimes the timestamps in the log messages @@ -5689,9 +6463,11 @@ NAME="DEBUGHIRESTIMESTAMP" >

            Note that the parameter debug timestamp debug timestamp must be on for this to have an effect.

            >debug pid (G)debug pid (G)

            When using only one log file for more then one @@ -5719,9 +6495,11 @@ TARGET="_top" >

            Note that the parameter debug timestamp debug timestamp must be on for this to have an effect.

            >debug timestamp (G)debug timestamp (G)

            Samba debug log messages are timestamped by default. If you are running at a high debug leveldebug level these timestamps can be distracting. This boolean parameter allows timestamping @@ -5758,7 +6538,7 @@ CLASS="COMMAND" >>debug uid (G)debug uid (G)

            Samba is sometimes run as root and sometime @@ -5768,9 +6548,11 @@ NAME="DEBUGUID" >

            Note that the parameter debug timestamp debug timestamp must be on for this to have an effect.

            >debuglevel (G)debuglevel (G)

            Synonym for log level log level.

            >default (G)default (G)

            A synonym for default service default service.

            >default case (S)default case (S)

            See the section on NAME MANGLING. Also note the short preserve caseshort preserve case parameter.

            >default devmode (S)default devmode (S)

            This parameter is only applicable to >default service (G)default service (G)

            This parameter specifies the name of a service which will be connected to if the service actually requested cannot - be found. Note that the square brackets are NOT given in the parameter value (see example below).

            Typically the default service would be a guest okguest ok, read-onlyread-only service.

            Also note that the apparent service name will be changed to equal that of the requested service, this is very useful as it - allows you to use macros like %S%S to make a wildcard service.

            Example:

            [global]
             	default service = pub
                     
             [pub]
            -	path = /%S

            >delete group script (G)
            delete group script (G)

            This is the full pathname to a script that will - be run AS ROOT smbd(8) when a group is requested to be deleted. - It will expand any %g to the group name passed. - This script is only useful for installations using the Windows NT domain administration tools. +> by smbd(8) when a group is requested to be deleted. It will expand any %g to the group name passed. This script is only useful for installations using the Windows NT domain administration tools.

            >deleteprinter command (G)
            deleteprinter command (G)

            With the introduction of MS-RPC based printer @@ -5984,9 +6780,11 @@ NAME="DELETEPRINTERCOMMAND" DeletePrinter() RPC call.

            For a Samba host this means that the printer must be - physically deleted from underlying printing system. The deleteprinter command deleteprinter command defines a script to be run which will perform the necessary operations for removing the printer from the print system and from .

            The The deleteprinter commanddeleteprinter command is - automatically called with only one parameter: "printer name" "printer name".

            Once the Once the deleteprinter commanddeleteprinter command has been executed,

            See also addprinter command addprinter command, printingprinting, show add - printer wizard

            Default: Default: none

            Example: >delete readonly (S)delete readonly (S)

            This parameter allows readonly files to be deleted. @@ -6080,23 +6887,27 @@ CLASS="COMMAND" >>delete share command (G)delete share command (G)

            Samba 2.2.0 introduced the ability to dynamically add and delete shares via the Windows NT 4.0 Server Manager. The - delete share commanddelete share command is used to define an external program or script which will remove an existing service definition from smb.conf. In order to successfully - execute the delete share commanddelete share command, smbdsmbd will automatically invoke the - delete share commanddelete share command with two parameters.

            • configFileconfigFile - the location of the global

            • shareNameshareName - the name of the existing service.

              This parameter is only used to remove file shares. To delete printer shares, see the deleteprinter - command.

              See also add share - command, change - share command.

              Default: Default: none

              Example: >delete user script (G)delete user script (G)

              This is the full pathname to a script that will - be run by smbd(8) when managing users - with remote RPC (NT) tools. + be run by smbd(8) + when managing user's with remote RPC (NT) tools.

              This script is called when a remote client removes a user @@ -6226,32 +7047,32 @@ CLASS="COMMAND" >>delete user from group script (G)delete user from group script (G)

              Full path to the script that will be called when a user is removed from a group using the Windows NT domain administration - tools. It will be run by smbd(8) smbd(8) + AS ROOT. - Any . Any %g will be replaced with the group name and - any %g will be + replaced with the group name and any %u will be replaced with the user name. +>%u will + be replaced with the user name.

              Default: >delete veto files (S)delete veto files (S)

              This option is used when Samba is attempting to delete a directory that contains one or more vetoed directories (see the veto filesveto files - option). If this option is set to nono (the default) then if a vetoed directory contains any non-vetoed files or directories then the directory delete will fail. This is usually what you want.

              If this option is set to If this option is set to yesyes, then Samba will attempt to recursively delete any files and directories within the vetoed directory. This can be useful for integration with file @@ -6309,10 +7132,12 @@ CLASS="COMMAND" >

              See also the veto - files parameter.

              >deny hosts (S)deny hosts (S)

              Synonym for hosts - deny.

              >dfree command (G)dfree command (G)

              The The dfree commanddfree command setting should only be used on systems where a problem occurs with the internal disk space calculations. This has been known to happen with Ultrix, @@ -6370,23 +7199,17 @@ CLASS="FILENAME" third return value can give the block size in bytes. The default blocksize is 1024 bytes.

              Note: Your script should Note: Your script should NOT be setuid or setgid and should be owned by (and writeable only by) root!

              Default: Default: By default internal routines for determining the disk capacity and remaining space will be used.

              Example:

              Where the script dfree (which must be made executable) could be:

               
              -#!/bin/sh
              -df $1 | tail -1 | awk '{print $2" "$4}'

              or perhaps (on Sys V based systems):

               
              -#!/bin/sh
              -/usr/bin/df -k $1 | tail -1 | awk '{print $3" "$5}'

              Note that you may have to replace the command names @@ -6420,15 +7263,17 @@ CLASS="PROGRAMLISTING" >>directory (S)directory (S)

              Synonym for path - .

              >directory mask (S)directory mask (S)

              This parameter is the octal modes which are @@ -6447,12 +7292,9 @@ NAME="DIRECTORYMASK" calculated according to the mapping from DOS modes to UNIX permissions, and the resulting UNIX mode is then bit-wise 'AND'ed with this parameter. This parameter may be thought of as a bit-wise MASK for - the UNIX modes of a directory. Any bit not set here will be removed from the modes set on a directory when it is created.

              Following this Samba will bit-wise 'OR' the UNIX mode created from this parameter with the value of the force directory mode - parameter. This parameter is set to 000 by default (i.e. no extra mode bits are added).

              directory security maskdirectory security mask.

              See the force - directory mode parameter to cause particular mode bits to always be set on created directories.

              See also the create mode - parameter for masking mode bits on created files, and the directory - security mask parameter.

              Also refer to the inherit permissions inherit permissions parameter.

              >directory mode (S)directory mode (S)

              Synonym for directory mask directory mask

              >directory security mask (S)directory security mask (S)

              This parameter controls what UNIX permission bits @@ -6564,40 +7420,43 @@ NAME="DIRECTORYSECURITYMASK" meaning a user is allowed to modify all the user/group/world permissions on a directory.

              Note that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems. Administrators of most normal systems will probably want to leave - it as the default of 07770777.

              See also the force directory security mode force directory security mode, security masksecurity mask, force security mode - parameters.

              >disable netbios (G)disable netbios (G)

              Enabling this parameter will disable netbios support @@ -6640,7 +7499,7 @@ CLASS="COMMAND" >>disable spoolss (G)disable spoolss (G)

              Enabling this parameter will disable Samba's support @@ -6652,12 +7511,9 @@ NAME="DISABLESPOOLSS" Wizard or by using the NT printer properties dialog window. It will also disable the capability of Windows NT/2000 clients to download print drivers from the Samba host upon demand. - Be very careful about enabling this parameter.

              >display charset (G)display charset (G)

              Specifies the charset that samba will use @@ -6701,19 +7557,18 @@ CLASS="COMMAND" >>dns proxy (G)dns proxy (G)

              Specifies that nmbd(8) when acting as a WINS server and - finding that a NetBIOS name has not been registered, should treat the - NetBIOS name word-for-word as a DNS name and do a lookup with the DNS server - for that name on behalf of the name-querying client.

              Specifies that nmbd(8) + when acting as a WINS server and finding that a NetBIOS name has not + been registered, should treat the NetBIOS name word-for-word as a DNS + name and do a lookup with the DNS server for that name on behalf of + the name-querying client.

              Note that the maximum length for a NetBIOS name is 15 characters, so the DNS name (or DNS alias) can likewise only be @@ -6728,9 +7583,11 @@ CLASS="COMMAND" >

              See also the parameter wins support wins support.

              >domain logons (G)domain logons (G)

              If set to If set to yesyes, the Samba server will serve Windows 95/98 Domain logons for the workgroupworkgroup it is in. Samba 2.2 has limited capability to act as a domain controller for Windows @@ -6774,15 +7633,16 @@ CLASS="COMMAND" >>domain master (G)domain master (G)

              Tell smbd(8)Tell nmbd(8) to enable WAN-wide browse list collation. Setting this option causes workgroupworkgroup. Local master browsers - in the same workgroupworkgroup on broadcast-isolated subnets will give this nmbd their local browse lists, - and then ask smbd(8) for a complete copy of the browse - list for the whole wide area network. Browser clients will then contact - their local master browser, and will receive the domain-wide browse list, - instead of just the list for their broadcast-isolated subnet.

              smbd(8) + for a complete copy of the browse list for the whole wide area + network. Browser clients will then contact their local master browser, + and will receive the domain-wide browse list, instead of just the list + for their broadcast-isolated subnet.

              Note that Windows NT Primary Domain Controllers expect to be - able to claim this workgroupworkgroup specific special NetBIOS name that identifies them as domain master browsers for - that workgroupworkgroup by default (i.e. there is no way to prevent a Windows NT PDC from attempting to do this). This means that if this parameter is set and nmbd claims - the special name for a workgroupworkgroup before a Windows NT PDC is able to do so then cross subnet browsing will behave strangely and may fail.

              domain logons = yes
              , then the default behavior is to enable the , then the default behavior is to enable the domain - master parameter. If parameter. If domain logonsdomain logons is - not enabled (the default setting), then neither will domain - master be enabled by default.

              Default: >dont descend (S)dont descend (S)

              There are certain directories on some systems @@ -6889,13 +7767,10 @@ CLASS="FILENAME" >. Experimentation is the best policy :-)

              Default: Default: none (i.e., all directories are OK to descend)

              Example: >dos charset (G)dos charset (G)

              DOS SMB clients assume the server has @@ -6917,12 +7792,11 @@ NAME="DOSCHARSET" >

              The default depends on which charsets you have instaled. Samba tries to use charset 850 but falls back to ASCII in - case it is not available. Run testparm(1)testparm(1) + to check the default on your system.

              >dos filemode (S)dos filemode (S)

              The default behavior in Samba is to provide @@ -6953,19 +7827,21 @@ CLASS="COMMAND" >>dos filetime resolution (S)dos filetime resolution (S)

              Under the DOS and Windows FAT filesystem, the finest granularity on time resolution is two seconds. Setting this parameter for a share causes Samba to round the reported time down to the nearest two second boundary when a query call that requires one second - resolution is made to smbd(8)smbd(8) + .

              This option is mainly used as a compatibility option for Visual @@ -6988,7 +7864,7 @@ CLASS="COMMAND" >>dos filetimes (S)dos filetimes (S)

              Under DOS and Windows, if a user can write to a @@ -6999,15 +7875,13 @@ NAME="DOSFILETIMES" CLASS="COMMAND" >smbd is acting - on behalf of is not the file owner. Setting this option to yes allows DOS semantics and smbd(8) yes allows DOS semantics and smbd will change the file timestamp as DOS requires.

              >encrypt passwords (G)encrypt passwords (G)

              This boolean controls whether encrypted passwords @@ -7034,25 +7908,29 @@ CLASS="FILENAME" > shipped with the source code.

              In order for encrypted passwords to work correctly - smbd(8)smbd(8) must either - have access to a local smbpasswd(5) file (see the smbpasswd(8)smbpasswd(5) + file (see the smbpasswd(8) program for information on how to set up and maintain this file), or set the >enhanced browsing (G)enhanced browsing (G)

              This option enables a couple of enhancements to @@ -7104,7 +7982,7 @@ CLASS="COMMAND" >>enumports command (G)enumports command (G)

              The concept of a "port" is fairly foreign @@ -7112,9 +7990,9 @@ NAME="ENUMPORTSCOMMAND" is associated with a port monitor and generally takes the form of a local port (i.e. LPT1:, COM1:, FILE:) or a remote port (i.e. LPD Port Monitor, etc...). By default, Samba has only one - port defined--"Samba Printer Port""Samba Printer Port". Under Windows NT/2000, all printers must have a valid port name. If you wish to have a list of ports displayed (smbd does not use a port name for anything) other than - the default "Samba Printer Port""Samba Printer Port", you - can define enumports commandenumports command to point to a program which should generate a list of ports, one per line, to standard output. This listing will then be used in response to the level 1 and 2 EnumPorts() RPC.

              Default: Default: no enumports command

              Example: >exec (S)exec (S)

              This is a synonym for preexecpreexec.

              >fake directory create times (S)fake directory create times (S)

              NTFS and Windows VFAT file systems keep a create @@ -7205,7 +8084,7 @@ CLASS="COMMAND" >>fake oplocks (S)fake oplocks (S)

              Oplocks are the way that SMB clients get permission @@ -7232,9 +8111,11 @@ CLASS="COMMAND" >

              It is generally much better to use the real oplocksoplocks support rather than this parameter.

              >follow symlinks (S)follow symlinks (S)

              This parameter allows the Samba administrator - to stop smbd(8) from following symbolic - links in a particular share. Setting this - parameter to smbd(8) + from following symbolic links in a particular share. Setting this + parameter to nono prevents any file or directory that is a symbolic link from being followed (the user will get an error). This option is very useful to stop users from adding a @@ -7296,42 +8178,45 @@ CLASS="COMMAND" >>force create mode (S)force create mode (S)

              This parameter specifies a set of UNIX mode bit - permissions that will always be set on a file created by Samba. This is done by bitwise 'OR'ing these bits onto the mode bits of a file that is being created or having its permissions changed. The default for this parameter is (in octal) 000. The modes in this parameter are bitwise 'OR'ed onto the file - mode after the mask set in the create maskcreate mask parameter is applied.

              See also the parameter create - mask for details on masking mode bits on files.

              See also the inherit - permissions parameter.

              >force directory mode (S)force directory mode (S)

              This parameter specifies a set of UNIX mode bit - permissions that will always be set on a directory created by Samba. This is done by bitwise 'OR'ing these bits onto the mode bits of a directory that is being created. The default for this parameter is (in octal) 0000 which will not add any extra permission bits to a created directory. This operation is done after the mode - mask in the parameter directory maskdirectory mask is applied.

              See also the parameter directory mask directory mask for details on masking mode bits on created directories.

              See also the inherit permissions inherit permissions parameter.

              >force directory security mode (S)force directory security mode (S)

              This parameter controls what UNIX permission bits @@ -7426,12 +8314,9 @@ NAME="FORCEDIRECTORYSECURITYMODE" allows a user to modify all the user/group/world permissions on a directory without restrictions.

              Note that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems. @@ -7440,23 +8325,29 @@ CLASS="EMPHASIS" >

              See also the directory security mask directory security mask, security masksecurity mask, force security mode - parameters.

              >force group (S)force group (S)

              This specifies a UNIX group name that will be @@ -7503,36 +8394,41 @@ CLASS="FILENAME" >

              If the force user - parameter is also set the group specified in - force groupforce group will override the primary group - set in force userforce user.

              See also force - user.

              Default: Default: no forced group

              Example: >force security mode (S)force security mode (S)

              This parameter controls what UNIX permission @@ -7562,12 +8458,9 @@ NAME="FORCESECURITYMODE" and allows a user to modify all the user/group/world permissions on a file, with no restrictions.

              Note that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems. @@ -7576,23 +8469,29 @@ CLASS="EMPHASIS" >

              See also the force directory security mode force directory security mode, directory security - mask, security mask security mask parameters.

              >force user (S)force user (S)

              This specifies a UNIX user name that will be @@ -7631,19 +8530,18 @@ NAME="FORCEUSER" >

              See also force group -

              Default: Default: no forced user

              Example: >fstype (S)fstype (S)

              This parameter allows the administrator to configure the string that specifies the type of filesystem a share - is using that is reported by smbd(8)smbd(8) + when a client queries the filesystem type - for a share. The default type is NTFSNTFS for compatibility with Windows NT but this can be changed to other - strings such as Samba or Samba or FAT - if required.

              Default: >getwd cache (G)getwd cache (G)

              This is a tuning option. When this is enabled a @@ -7703,14 +8603,16 @@ NAME="GETWDCACHE" calls. This can have a significant impact on performance, especially when the wide linkswide links parameter is set to parameter is set to nono.

              Default: >group (S)group (S)

              Synonym for force - group.

              >guest account (S)guest account (S)

              This is a username which will be used for access to services which are specified as guest ok guest ok (see below). Whatever privileges this user has will be available to any client connecting to the guest service. @@ -7774,13 +8680,10 @@ CLASS="COMMAND" many parts of the system require this value to be constant for correct operation.

              Default: Default: specified at compile time, usually "nobody"

              Example: >guest ok (S)guest ok (S)

              If this parameter is If this parameter is yesyes for a service, then no password is required to connect to the service. Privileges will be those of the guest account guest account.

              This paramater nullifies the benifits of setting - restrict - anonymous = 2

              See the section below on security security for more information about this option.

              >guest only (S)guest only (S)

              If this parameter is If this parameter is yesyes for a service, then only guest connections to the service are permitted. This parameter will have no effect if guest okguest ok is not set for the service.

              See the section below on security security for more information about this option.

              >hide dot files (S)hide dot files (S)

              This is a boolean parameter that controls whether @@ -7885,7 +8786,7 @@ CLASS="COMMAND" >>hide files(S)hide files(S)

              This is a list of files or directories that are not @@ -7909,31 +8810,34 @@ NAME="HIDEFILES" >

              See also hide - dot files, veto files veto files and case sensitivecase sensitive.

              Default: Default: no file are hidden

              Example: >hide local users(G)hide local users(G)

              This parameter toggles the hiding of local UNIX @@ -7970,7 +8874,7 @@ CLASS="COMMAND" >>hide unreadable (G)hide unreadable (G)

              This parameter prevents clients from seeing the @@ -7985,7 +8889,7 @@ CLASS="COMMAND" >>hide unwriteable files (G)hide unwriteable files (G)

              This parameter prevents clients from seeing @@ -8002,7 +8906,7 @@ CLASS="COMMAND" >>hide special files (G)hide special files (G)

              This parameter prevents clients from seeing @@ -8019,29 +8923,34 @@ CLASS="COMMAND" >>homedir map (G)homedir map (G)

              Ifnis homedir - is is yes, and smbd(8)yes, and smbd(8) is also acting - as a Win95/98 logon serverlogon server then this parameter specifies the NIS (or YP) map from which the server for the user's home directory should be extracted. At present, only the Sun @@ -8057,27 +8966,28 @@ CLASS="COMMAND" that copes with different map formats and also Amd (another automounter) maps.

              NOTE :A working NIS client is required on the system for this option to work.

              See also nis homedirnis homedir , domain logonsdomain logons .

              >host msdfs (G)host msdfs (G)

              This boolean parameter is only available if Samba has been configured and compiled with the --with-msdfs option. If set to option. If set to yesyes, Samba will act as a Dfs server, and allow Dfs-aware clients to browse Dfs trees hosted on the server.

              See also the msdfs root msdfs root share level parameter. For more information on setting up a Dfs tree on Samba, @@ -8134,7 +9046,7 @@ CLASS="COMMAND" >>hostname lookups (G)hostname lookups (G)

              Specifies whether samba should use (expensive) @@ -8163,13 +9075,15 @@ CLASS="COMMAND" >>hosts allow (S)hosts allow (S)

              A synonym for this parameter is A synonym for this parameter is allow - hosts.

              This parameter is a comma, space, or tab delimited @@ -8196,20 +9110,19 @@ CLASS="FILENAME" >Note that the localhost address 127.0.0.1 will always be allowed access unless specifically denied by a hosts denyhosts deny option.

              You can also specify hosts by network/netmask pairs and by netgroup names if your system supports netgroups. The - EXCEPT keyword can also be used to limit a wildcard list. The following examples may provide some help:

              Note that access still requires suitable user-level passwords.

              See testparm(1) for a way of testing your host access - to see if it does what you expect.

              See testparm(1) + for a way of testing your host access to see if it does + what you expect.

              Default: Default: none (i.e., all hosts permitted access)

              Example: >hosts deny (S)hosts deny (S)

              The opposite of The opposite of hosts allow - - hosts listed here are hosts allow + - hosts listed here are NOT permitted access to services unless the specific services have their own lists to override - this one. Where the lists conflict, the allowallow list takes precedence.

              Default: Default: none (i.e., no hosts specifically excluded)

              Example: >hosts equiv (G)hosts equiv (G)

              If this global parameter is a non-null string, @@ -8327,50 +9237,49 @@ NAME="HOSTSEQUIV" >

              This is not be confused with hosts allowhosts allow which is about hosts - access to services and is more useful for guest services. hosts equiv hosts equiv may be useful for NT clients which will not supply passwords to Samba.

              NOTE : The use of The use of hosts equiv - can be a major security hole. This is because you are trusting the PC to supply the correct username. It is very easy to get a PC to supply a false username. I recommend that the - hosts equivhosts equiv option be only used if you really know what you are doing, or perhaps on a home network where you trust - your spouse and kids. And only if you really trust them :-).

              Default: Default: no host equivalences

              Example: >include (G)include (G)

              This allows you to include one config file inside another. The file is included literally, as though typed in place.

              It takes the standard substitutions, except It takes the standard substitutions, except %u - , , %P and %P and %S%S.

              Default: Default: no file included

              Example: >inherit acls (S)inherit acls (S)

              This parameter can be used to ensure @@ -8442,35 +9354,43 @@ CLASS="COMMAND" >>inherit permissions (S)inherit permissions (S)

              The permissions on new files and directories are normally governed by create mask create mask, directory maskdirectory mask, force create modeforce create mode and force - directory mode but the boolean inherit permissions parameter overrides this.

              map archivemap archive , map hiddenmap hidden and map systemmap system as usual.

              Note that the setuid bit is Note that the setuid bit is never set via inheritance (the code explicitly prohibits this).

              See also create mask - , directory mask directory mask, force create modeforce create mode and force directory modeforce directory mode .

              >interfaces (G)interfaces (G)

              This option allows you to override the default @@ -8611,36 +9542,32 @@ CLASS="COMMAND" >

              See also bind - interfaces only.

              Default: Default: all active interfaces except 127.0.0.1 that are broadcast capable

              >invalid users (S)
              invalid users (S)

              This is a list of users that should not be allowed - to login to this service. This is really a paranoid check to absolutely ensure an improper setting does not breach your security.

              +&group+&group means check the UNIX group database, followed by the NIS netgroup database, and - the value &+group&+group means check the NIS netgroup database, followed by the UNIX group database (the same as the '@' prefix).

              The current servicename is substituted for The current servicename is substituted for %S%S. This is useful in the [homes] section.

              See also valid users - .

              Default: Default: no invalid users

              Example: >keepalive (G)keepalive (G)

              The value of the parameter (an integer) represents - the number of seconds between keepalivekeepalive packets. If this parameter is zero, no keepalive packets will be sent. Keepalive packets, if sent, allow the server to tell whether @@ -8714,9 +9648,11 @@ CLASS="PARAMETER" >Keepalives should, in general, not be needed if the socket being used has the SO_KEEPALIVE attribute set on it (see socket optionssocket options). Basically you should only use this option if you strike difficulties.

              >kernel oplocks (G)kernel oplocks (G)

              For UNIXes that support kernel based oplocksoplocks (currently only IRIX and the Linux 2.4 kernel), this parameter allows the use of them to be turned on or off.

              Kernel oplocks support allows Samba Kernel oplocks support allows Samba oplocks - to be broken whenever a local UNIX process or NFS operation - accesses a file that smbd(8) has oplocked. This allows complete - data consistency between SMB/CIFS, NFS and local file access (and is - a smbd(8) + has oplocked. This allows complete data consistency between + SMB/CIFS, NFS and local file access (and is a very cool feature :-).

              + cool feature :-).

              This parameter defaults to This parameter defaults to onon, but is translated to a no-op on systems that no not have the necessary kernel support. You should never need to touch this parameter.

              See also the oplocksoplocks and level2 oplocks - parameters.

              >lanman auth (G)lanman auth (G)

              This parameter determines whether or not smbd(8) will attempt to authenticate users - using the LANMAN password hash. If disabled, only clients which support NT - password hashes (e.g. Windows NT/2000 clients, smbclient, etc... but not - Windows 95/98 or the MS DOS network client) will be able to connect to the Samba host.

              This parameter determines whether or not smbd will + attempt to authenticate users using the LANMAN password hash. + If disabled, only clients which support NT password hashes (e.g. Windows + NT/2000 clients, smbclient, etc... but not Windows 95/98 or the MS DOS + network client) will be able to connect to the Samba host.

              Default : >large readwrite (G)large readwrite (G)

              This parameter determines whether or not smbd(8) supports the new 64k streaming - read and write varient SMB requests introduced +>This parameter determines whether or not smbd + supports the new 64k streaming read and write varient SMB requests introduced with Windows 2000. Note that due to Windows 2000 client redirector bugs this requires Samba to be running on a 64-bit capable operating system such as IRIX, Solaris or a Linux 2.4 kernel. Can improve performance by 10% with @@ -8851,56 +9791,88 @@ CLASS="COMMAND" >>ldap admin dn (G)ldap admin dn (G)

              The The ldap admin dnldap admin dn defines the Distinguished Name (DN) name used by Samba to contact the ldap server when retreiving - user account information. The ldap - admin dn is used in conjunction with the admin dn password stored in the private/secrets.tdb file. See the - smbpasswd(8) man page for more information on how - to accmplish this. + smbpasswd(8) man + page for more information on how to accomplish this.

              >ldap del only sam attr (G)

              Default : This parameter specifies whether a delete + operation in the ldapsam deletes the complete entry or only the attributes + specific to Samba. +

              Default : noneldap delete dn = no

              >ldap del only sam attr (G)

              Inverted synonym for ldap delete dn. +

              >ldap filter (G)
              ldap filter (G)

              This parameter specifies the RFC 2254 compliant LDAP search filter. - The default is to match the login name with the uiduid - attribute for all entries matching the sambaAccountsambaAccount objectclass. Note that this filter should only return one entry.

              >ldap port (G)ldap port (G)

              This parameter is only available if Samba has been @@ -8928,9 +9900,11 @@ CLASS="COMMAND" > This option is used to control the tcp port number used to contact the ldap serverldap server. The default is to use the stand LDAPS port 636. @@ -8956,7 +9930,7 @@ CLASS="COMMAND" >>ldap server (G)ldap server (G)

              This parameter is only available if Samba has been @@ -8980,17 +9954,14 @@ CLASS="COMMAND" >>ldap ssl (G)ldap ssl (G)

              This option is used to define whether or not Samba should use SSL when connecting to the ldap server - This is NOT related to Samba's previous SSL support which was enabled by specifying the

              The The ldap sslldap ssl can be set to one of three values:

              • OffOff = Never use SSL when querying the directory.

              • Start_tlsStart_tls = Use the LDAPv3 StartTLS extended operation (RFC2830) for communicating with the directory server.

              • OnOn = Use SSL on the ldaps port when contacting the - ldap serverldap server. Only available when the backwards-compatiblity option is specified to configure. See passdb backendpassdb backend

              • >ldap suffix (G)ldap suffix (G)

                Specifies where user and machine accounts are added to the tree. Can be overriden by ldap machine suffix. It also used as the base dn for all ldap searches.

                Default : Default : none

                >ldap user suffix (G)
                ldap user suffix (G)

                It specifies where users are added to the tree.

                Default : Default : none

                >ldap machine suffix (G)
                ldap machine suffix (G)

                It specifies where machines should be added to the ldap tree.

                Default : Default : none

                >ldap passwd sync (G)
                ldap passwd sync (G)

                This option is used to define whether @@ -9130,9 +10104,11 @@ NAME="LDAPPASSWDSYNC" change via SAMBA.

                The The ldap passwd syncldap passwd sync can be set to one of three values:

                • YesYes = Try to update the LDAP, NT and LM passwords and update the pwdLastSet time.

                • NoNo = Update NT and LM passwords and update the pwdLastSet time.

                • OnlyOnly = Only update the LDAP password and let the LDAP server do the rest.

                >ldap trust ids (G)ldap trust ids (G)

                Normally, Samba validates each entry @@ -9199,7 +10181,7 @@ CLASS="COMMAND" >>level2 oplocks (S)level2 oplocks (S)

                This parameter controls whether Samba supports @@ -9227,41 +10209,49 @@ NAME="LEVEL2OPLOCKS" >

                Currently, if kernel - oplocks are supported then level2 oplocks are - not granted (even if this parameter is set to yesyes). Note also, the oplocksoplocks parameter must be set to parameter must be set to yesyes on this share in order for this parameter to have any effect.

                See also the oplocksoplocks and kernel oplockskernel oplocks parameters.

                >lm announce (G)lm announce (G)

                This parameter determines if nmbd(8)This parameter determines if nmbd(8) will produce Lanman announce broadcasts that are needed by OS/2 clients in order for them to see the Samba server in their browse list. This parameter can have three - values, yes, yes, nono, or - auto. The default is auto. The default is autoauto. - If set to nono Samba will never produce these - broadcasts. If set to yesyes Samba will produce Lanman announce broadcasts at a frequency set by the parameter - lm interval. If set to lm interval. If set to autoauto Samba will not send Lanman announce broadcasts by default but will listen for them. If it hears such a broadcast on the wire it will then start sending them at a frequency set by the parameter - lm intervallm interval.

                See also lm interval - .

                >lm interval (G)lm interval (G)

                If Samba is set to produce Lanman announce broadcasts needed by OS/2 clients (see the lm announcelm announce parameter) then this parameter defines the frequency in seconds with which they will be made. If this is set to zero then no Lanman announcements will be - made despite the setting of the lm announcelm announce parameter.

                See also lm - announce.

                >load printers (G)load printers (G)

                A boolean variable that controls whether all printers in the printcap will be loaded for browsing by default. See the printers section for more details.

                >local master (G)local master (G)

                This option allows nmbd(8)This option allows nmbd(8) to try and become a local master browser - on a subnet. If set to nono then nmbd will not attempt to become a local master browser on a subnet and will also lose in all browsing elections. By - default this value is set to yes. Setting this value to yes. Setting this value to yesyes doesn't - mean that Samba will become the local master browser on a subnet, just that nmbd will will participate in elections for local master browser.

                Setting this value to Setting this value to nono will cause nmbd - never to become a local master browser.

                Default: >lock dir (G)lock dir (G)

                Synonym for lock directory lock directory.

                >lock directory (G)lock directory (G)

                This option specifies the directory where lock files will be placed. The lock files are used to implement the max connectionsmax connections option.

                >lock spin count (G)lock spin count (G)

                This parameter controls the number of times @@ -9544,17 +10543,19 @@ CLASS="COMMAND" >>lock spin time (G)lock spin time (G)

                The time in microseconds that smbd should pause before attempting to gain a failed lock. See lock spin - count for more details.

                >locking (S)locking (S)

                This controls whether or not locking will be @@ -9589,23 +10590,17 @@ CLASS="COMMAND" >, real locking will be performed by the server.

                This option This option may be useful for read-only - filesystems which may not need locking (such as - CDROM drives), although setting this parameter of nono is not really recommended even in this case.

                >log file (G)log file (G)

                This option allows you to override the name @@ -9641,7 +10636,7 @@ CLASS="COMMAND" >>log level (G)log level (G)

                The value of the parameter (a astring) allows @@ -9667,15 +10662,17 @@ CLASS="COMMAND" >>logon drive (G)logon drive (G)

                This parameter specifies the local path to which the home directory will be connected (see logon homelogon home) and is only used by NT Workstations.

                >logon home (G)logon home (G)

                This parameter specifies the home directory location when a Win95/98 or NT Workstation logs into a Samba PDC. It allows you to do

                C:\> C:\> NET USE H: /HOMENET USE H: /HOME

                Note that in prior versions of Samba, the logon pathlogon path was returned rather than - logon homelogon home. This broke net use @@ -9772,7 +10775,7 @@ CLASS="COMMAND" >>logon path (G)logon path (G)

                This parameter specifies the home directory @@ -9781,9 +10784,11 @@ NAME="LOGONPATH" nothing to do with Win 9X roaming profiles. To find out how to handle roaming profiles for Win 9X system, see the logon homelogon home parameter.

                Thereafter, the directories and any of the contents can, if required, be made read-only. It is not advisable that the NTuser.dat file be made read-only - rename it to NTuser.man to - achieve the desired effect (a MANdatory profile).

                >logon script (G)logon script (G)

                This parameter specifies the batch file (.bat) or @@ -9863,9 +10865,11 @@ NAME="LOGONSCRIPT" >The script must be a relative path to the [netlogon] service. If the [netlogon] service specifies a pathpath of This option is only useful if Samba is set up as a logon server.

                Default: Default: no logon script defined

                Example: >lppause command (S)lppause command (S)

                This parameter specifies the command to be @@ -9938,21 +10939,29 @@ NAME="LPPAUSECOMMAND" of implementing this is by using job priorities, where jobs having a too low priority won't be sent to the printer.

                If a If a %p%p is given then the printer name - is put in its place. A %j%j is replaced with - the job number (an integer). On HPUX (see printing=hpux - ), if the ), if the -p%p-p%p option is added to the lpq command, the job will show up with the correct status, i.e. if the job priority is lower than the set fence priority it will @@ -9964,21 +10973,25 @@ CLASS="PARAMETER" >

                See also the printing - parameter.

                Default: Currently no default value is given to - this string, unless the value of the printingprinting - parameter is SYSVSYSV, in which case the default is :

                lp -i %p-%j -H hold

                or if the value of the or if the value of the printingprinting parameter - is SOFTQSOFTQ, then the default is:

                >lpq cache time (G)lpq cache time (G)

                This controls how long lpq info will be cached @@ -10052,10 +11067,12 @@ CLASS="COMMAND" >

                See also the printing - parameter.

                >lpq command (S)lpq command (S)

                This parameter specifies the command to be @@ -10090,9 +11107,11 @@ CLASS="COMMAND" >Currently nine styles of printer status information are supported; BSD, AIX, LPRNG, PLP, SYSV, HPUX, QNX, CUPS, and SOFTQ. This covers most UNIX systems. You control which type is expected - using the printing =printing = option.

                Some clients (notably Windows for Workgroups) may not @@ -10101,47 +11120,54 @@ CLASS="PARAMETER" server reports on the first printer service connected to by the client. This only happens if the connection number sent is invalid.

                If a If a %p%p is given then the printer name is put in its place. Otherwise it is placed at the end of the command.

                Note that it is good practice to include the absolute path - in the lpq command as the lpq command as the $PATH - may not be available to the server. When compiled with - the CUPS libraries, no lpq commandlpq command is needed because smbd will make a library call to obtain the print queue listing.

                See also the printing - parameter.

                Default: Default: depends on the setting of depends on the setting of printing printing

                Example: >lpresume command (S)lpresume command (S)

                This parameter specifies the command to be @@ -10164,47 +11190,59 @@ NAME="LPRESUMECOMMAND" a printer name and job number to resume the print job. See also the lppause command - parameter.

                If a If a %p%p is given then the printer name - is put in its place. A %j%j is replaced with the job number (an integer).

                Note that it is good practice to include the absolute path - in the lpresume commandlpresume command as the PATH may not be available to the server.

                See also the printing - parameter.

                Default: Currently no default value is given - to this string, unless the value of the printingprinting - parameter is SYSVSYSV, in which case the default is :

                lp -i %p-%j -H resume

                or if the value of the or if the value of the printingprinting parameter - is SOFTQSOFTQ, then the default is:

                >lprm command (S)lprm command (S)

                This parameter specifies the command to be @@ -10245,42 +11285,49 @@ NAME="LPRMCOMMAND" >This command should be a program or script which takes a printer name and job number, and deletes the print job.

                If a If a %p%p is given then the printer name - is put in its place. A %j%j is replaced with the job number (an integer).

                Note that it is good practice to include the absolute - path in the lprm commandlprm command as the PATH may not be available to the server.

                See also the printing - parameter.

                Default: Default: depends on the setting of depends on the setting of printing -

                Example 1: >machine password timeout (G)machine password timeout (G)

                If a Samba server is a member of a Windows @@ -10320,12 +11367,14 @@ CLASS="FILENAME" will be changed, in seconds. The default is one week (expressed in seconds), the same as a Windows NT Domain member server.

                See also smbpasswd(8)See also smbpasswd(8) + , and the security = domain>magic output (S)magic output (S)

                This parameter specifies the name of a file which will contain output created by a magic script (see the magic scriptmagic script parameter below).

                Warning: If two clients use the same Warning: If two clients use the same magic script - in the same directory the output file content is undefined.

                >magic script (S)magic script (S)

                This parameter specifies the name of a file which, @@ -10391,45 +11444,35 @@ NAME="MAGICSCRIPT" >If the script generates output, output will be sent to the file specified by the magic output magic output parameter (see above).

                Note that some shells are unable to interpret scripts containing CR/LF instead of CR as the end-of-line marker. Magic scripts must be executable - as is on the host, which for some hosts and some shells will require filtering at the DOS end.

                Magic scripts are Magic scripts are EXPERIMENTAL and - should NOT be relied upon.

                Default: Default: None. Magic scripts disabled.

                Example: >mangle case (S)mangle case (S)

                See the section on NAME MANGLING

                >mangled map (S)mangled map (S)

                This is for those who want to directly map UNIX @@ -10496,12 +11539,9 @@ CLASS="FILENAME" > off the ends of filenames on some CDROMs (only visible under some UNIXes). To do this use a map of (*;1 *;).

                Default: Default: no mangled map

                Example: >mangled names (S)mangled names (S)

                This controls whether non-DOS names under UNIX @@ -10521,7 +11561,7 @@ NAME="MANGLEDNAMES" or whether non-DOS names should simply be ignored.

                See the section on NAME MANGLING for details on how to control the mangling process.

                Note that the character to use may be specified using the mangling charmangling char option, if you don't like '~'.

                >mangling method (G)mangling method (G)

                controls the algorithm used for the generating @@ -10622,7 +11664,7 @@ CLASS="COMMAND" >>mangle prefix (G)mangle prefix (G)

                controls the number of prefix @@ -10645,16 +11687,14 @@ CLASS="COMMAND" >>mangled stack (G)mangled stack (G)

                This parameter controls the number of mangled names - that should be cached in the Samba server smbd(8) smbd(8).

                This stack is a list of recently mangled base names @@ -10684,18 +11724,15 @@ CLASS="COMMAND" >>mangling char (S)mangling char (S)

                This controls what character is used as - the magic character in name mangling. The default is a '~' but this may interfere with some software. Use this option to set @@ -10715,7 +11752,7 @@ CLASS="COMMAND" >>map archive (S)map archive (S)

                This controls whether the DOS archive attribute @@ -10725,16 +11762,20 @@ NAME="MAPARCHIVE" any file it touches from becoming executable under UNIX. This can be quite annoying for shared source code, documents, etc...

                Note that this requires the Note that this requires the create maskcreate mask parameter to be set such that owner execute bit is not masked out (i.e. it must include 100). See the parameter create maskcreate mask for details.

                >map hidden (S)map hidden (S)

                This controls whether DOS style hidden files should be mapped to the UNIX world execute bit.

                Note that this requires the Note that this requires the create maskcreate mask to be set such that the world execute bit is not masked out (i.e. it must include 001). See the parameter create maskcreate mask for details.

                >map system (S)map system (S)

                This controls whether DOS style system files should be mapped to the UNIX group execute bit.

                Note that this requires the Note that this requires the create maskcreate mask to be set such that the group execute bit is not masked out (i.e. it must include 010). See the parameter create maskcreate mask for details.

                >map to guest (G)map to guest (G)

                This parameter is only useful in security modes other than modes other than security = sharesecurity = share - - i.e. user, user, serverserver, - and domaindomain.

                This parameter can take three different values, which tell - smbd(8)smbd(8) what to do with user login requests that don't match a valid UNIX user in some way.

                Note that this parameter is needed to set up "Guest" - share services when using securitysecurity modes other than share. This is because in these modes the name of the resource being - requested is not sent to the server until after the server has successfully authenticated the client so the server cannot make authentication decisions at the correct time (connection to the share) for "Guest" shares.

                For people familiar with the older Samba releases, this - parameter maps to the old compile-time setting of the GUEST_SESSSETUP GUEST_SESSSETUP value in local.h.

                Default: >max connections (S)max connections (S)

                This option allows the number of simultaneous - connections to a service to be limited. If max connections - is greater than 0 then connections will be refused if this number of connections to the service are already open. A value of zero mean an unlimited number of connections may be made.

                Record lock files are used to implement this feature. The lock files will be stored in the directory specified by the lock directorylock directory option.

                >max disk size (G)max disk size (G)

                This option allows you to put an upper limit @@ -10979,19 +12032,23 @@ NAME="MAXDISKSIZE" data you can put on the disk. In the above case you could still store much more than 100 MB on the disk, but if a client ever asks for the amount of free disk space or the total disk size then the - result will be bounded by the amount specified in max - disk size.

                This option is primarily useful to work around bugs in some pieces of software that can't handle very large disks, particularly disks over 1GB in size.

                A A max disk sizemax disk size of 0 means no limit.

                Default: >max log size (G)max log size (G)

                This option (an integer in kilobytes) specifies @@ -11035,7 +12092,7 @@ CLASS="COMMAND" >>max mux (G)max mux (G)

                This option controls the maximum number of @@ -11051,16 +12108,14 @@ CLASS="COMMAND" >>max open files (G)max open files (G)

                This parameter limits the maximum number of - open files that one smbd(8)smbd(8) file serving process may have open for a client at any one time. The default for this parameter is set very high (10,000) as Samba uses @@ -11079,24 +12134,27 @@ CLASS="COMMAND" >>max print jobs (S)max print jobs (S)

                This parameter limits the maximum number of jobs allowable in a Samba printer queue at any given moment. - If this number is exceeded, smbd(8) smbd(8) will remote "Out of Space" to the client. See all total - print jobs.

                >max protocol (G)max protocol (G)

                The value of the parameter (a string) is the highest @@ -11127,47 +12185,44 @@ NAME="MAXPROTOCOL" >

                • CORECORE: Earliest version. No concept of user names.

                • COREPLUSCOREPLUS: Slight improvements on CORE for efficiency.

                • LANMAN1: First LANMAN1: First modern version of the protocol. Long filename support.

                • LANMAN2LANMAN2: Updates to Lanman1 protocol.

                • NT1NT1: Current up to date version of the protocol. Used by Windows NT. Known as CIFS.

                • See also min - protocol

                  >max smbd processes (G)max smbd processes (G)

                  This parameter limits the maximum number of @@ -11216,12 +12273,10 @@ CLASS="COMMAND" as a stopgap to prevent degrading service to clients in the event that the server has insufficient resources to handle more than this number of connections. Remember that under normal operating - conditions, each user will have an smbd(8)smbd associated with him or her to handle connections to all shares from a given host.

                  >max ttl (G)max ttl (G)

                  This option tells nmbd(8)This option tells nmbd(8) what the default 'time to live' of NetBIOS names should be (in seconds) when >max wins ttl (G)max wins ttl (G)

                  This option tells smbd(8)This option tells nmbd(8) + when acting as a WINS server ( wins support = yeswins support = yes) what the maximum 'time to live' of NetBIOS names that

                  See also the min - wins ttl parameter.

                  >max xmit (G)max xmit (G)

                  This option controls the maximum packet size @@ -11331,7 +12387,7 @@ CLASS="COMMAND" >>message command (G)message command (G)

                  This specifies what command to run when the @@ -11353,25 +12409,26 @@ CLASS="COMMAND" CLASS="COMMAND" >xedit, then - removes it afterwards. NOTE THAT IT IS VERY IMPORTANT THAT THIS COMMAND RETURN IMMEDIATELY. That's why I have the '&' on the end. If it doesn't return immediately then your PCs may freeze when sending messages (they should recover after 30 seconds, hopefully).

                  All messages are delivered as the global guest user. - The command takes the standard substitutions, although %u won't work ( %u won't work (%U%U may be better in this case).

                  • %s%s = the filename containing the message.

                  • %t%t = the destination that the message was sent to (probably the server name).

                  • %f%f = who the message is from.

                  • message command = rm %s

                    Default: Default: no message command

                    Example: >min passwd length (G)min passwd length (G)

                    Synonym for min password lengthmin password length.

                    >min password length (G)min password length (G)

                    This option sets the minimum length in characters @@ -11476,22 +12538,28 @@ CLASS="COMMAND" >

                    See also unix - password sync, passwd programpasswd program and passwd chat debugpasswd chat debug .

                    >min print space (S)min print space (S)

                    This sets the minimum amount of free disk @@ -11515,10 +12583,12 @@ NAME="MINPRINTSPACE" >

                    See also the printing - parameter.

                    >min protocol (G)min protocol (G)

                    The value of the parameter (a string) is the lowest SMB protocol dialect than Samba will support. Please refer to the max protocolmax protocol parameter for a list of valid protocol names and a brief description @@ -11559,10 +12631,12 @@ CLASS="FILENAME" >If you are viewing this parameter as a security measure, you should also refer to the lanman - auth parameter. Otherwise, you should never need to change this parameter.

                    >min wins ttl (G)min wins ttl (G)

                    This option tells nmbd(8)This option tells nmbd(8) when acting as a WINS server ( wins support = yes wins support = yes) what the minimum 'time to live' of NetBIOS names that >msdfs proxy (S)msdfs proxy (S)

                    This parameter indicates that the share is a @@ -11627,62 +12701,68 @@ NAME="MSDFSPROXY" >Only Dfs roots can act as proxy shares. Take a look at the msdfs rootmsdfs root and host msdfshost msdfs options to find out how to set up a Dfs root share.

                    Example: msdfs proxy = \\\\otherserver\\somesharemsdfs proxy = \otherserver\someshare

                    >msdfs root (S)
                    msdfs root (S)

                    This boolean parameter is only available if Samba is configured and compiled with the --with-msdfs option. If set to option. If set to yesyes, Samba treats the share as a Dfs root and allows clients to browse the distributed file system tree rooted at the share directory. Dfs links are specified in the share directory by symbolic links of the form msdfs:serverA\\shareA,serverB\\shareBmsdfs:serverA\shareA,serverB\shareB and so on. For more information on setting up a Dfs tree on Samba, refer to "Hosting a Microsoft - Distributed File System tree on Samba" document.

                    msdfs_setup.html + .

                    See also host msdfs -

                    >name cache timeout (G)name cache timeout (G)

                    Specifies the number of seconds it takes before @@ -11717,7 +12797,7 @@ CLASS="COMMAND" >>name resolve order (G)name resolve order (G)

                    This option is used by the programs in the Samba @@ -11732,9 +12812,9 @@ NAME="NAMERESOLVEORDER" >

                    • lmhostslmhosts : Lookup an IP address in the Samba lmhosts file. If the line in lmhosts has no name type attached to the NetBIOS name (see the

                    • hosthost : Do a standard host name to IP address resolution, using the system

                    • winswins : Query a name with the IP address listed in the wins server wins server parameter. If no WINS server has been specified this method will be ignored.

                    • bcastbcast : Do a broadcast on each of the known local interfaces listed in the interfacesinterfaces parameter. This is the least reliable of the name resolution @@ -11818,7 +12902,7 @@ CLASS="COMMAND" >>netbios aliases (G)netbios aliases (G)

                      This is a list of NetBIOS names that

                      See also netbios - name.

                      Default: Default: empty string (no additional names)

                      Example: >netbios name (G)netbios name (G)

                      This sets the NetBIOS name by which a Samba @@ -11871,19 +12954,18 @@ NAME="NETBIOSNAME" >

                      See also netbios - aliases.

                      Default: Default: machine DNS name

                      Example: >netbios scope (G)netbios scope (G)

                      This sets the NetBIOS scope that Samba will @@ -11906,7 +12988,7 @@ NAME="NETBIOSSCOPE" >>nis homedir (G)nis homedir (G)

                      Get the home share server from a NIS map. For @@ -11928,9 +13010,11 @@ NAME="NISHOMEDIR" server. When Samba is returning the home share to the client, it will consult the NIS map specified in homedir maphomedir map and return the server listed there.

                      >non unix account range (G)non unix account range (G)

                      The non unix account range parameter specifies @@ -11979,7 +13063,7 @@ CLASS="COMMAND" >>nt acl support (S)nt acl support (S)

                      This boolean parameter controls whether @@ -12001,20 +13085,18 @@ CLASS="COMMAND" >>nt pipe support (G)nt pipe support (G)

                      This boolean parameter controls whether - smbd(8)smbd(8) will allow Windows NT - clients to connect to the NT SMB specific IPC$IPC$ pipes. This is a developer debugging option and can be left alone.

                      >nt status support (G)nt status support (G)

                      This boolean parameter controls whether will negotiate NT specific status support with Windows NT/2k/XP clients. This is a developer debugging option and should be left alone. - If this option is set to nono then Samba offers exactly the same DOS error codes that versions prior to Samba 2.2.3 reported.

                      >null passwords (G)null passwords (G)

                      Allow or disallow client access to accounts that have null passwords.

                      See also smbpasswd(5)See also smbpasswd (5).

                      Default: >obey pam restrictions (G)obey pam restrictions (G)

                      When Samba 2.2 is configured to enable PAM support @@ -12089,9 +13169,11 @@ NAME="OBEYPAMRESTRICTIONS" and to ignore any account or session management. Note that Samba always ignores PAM for authentication in the case of encrypt passwords = yesencrypt passwords = yes . The reason is that PAM modules cannot support the challenge/response @@ -12107,20 +13189,24 @@ CLASS="COMMAND" >>only user (S)only user (S)

                      This is a boolean option that controls whether - connections with usernames not in the useruser list will be allowed. By default this option is disabled so that a client can supply a username to be used by the server. Enabling this parameter will force the server to only use the login - names from the useruser list and is only really useful in user = %S which means your which means your useruser list will be just the service name, which for home directories is the name of the user.

                      See also the useruser parameter.

                      >only guest (S)only guest (S)

                      A synonym for guest only guest only.

                      >oplock break wait time (G)oplock break wait time (G)

                      This is a tuning parameter added due to bugs in @@ -12185,13 +13277,10 @@ NAME="OPLOCKBREAKWAITTIME" is the amount of time Samba will wait before sending an oplock break request to such (broken) clients.

                      DO NOT CHANGE THIS PARAMETER UNLESS YOU HAVE READ AND UNDERSTOOD THE SAMBA OPLOCK CODE.

                      Default: >oplock contention limit (S)oplock contention limit (S)

                      This is a This is a very advanced

                      In brief it specifies a number, which causes smbd(8)not to grant an oplock even when requested - if the approximate number of clients contending for an oplock on the same file goes over this +>In brief it specifies a number, which causes smbd not to + grant an oplock even when requested if the approximate number of + clients contending for an oplock on the same file goes over this limit. This causes smbd to behave in a similar way to Windows NT.

                      DO NOT CHANGE THIS PARAMETER UNLESS YOU HAVE READ AND UNDERSTOOD THE SAMBA OPLOCK CODE.

                      Default: >oplocks (S)oplocks (S)

                      This boolean option tells Oplocks may be selectively turned off on certain files with a share. See the veto oplock files veto oplock files parameter. On some systems oplocks are recognized by the underlying operating system. This allows data synchronization between all access to oplocked files, whether it be via Samba or NFS or a local UNIX process. See the - kernel oplockskernel oplocks parameter for details.

                      See also the kernel - oplocks and level2 oplocks level2 oplocks parameters.

                      >ntlm auth (G)ntlm auth (G)

                      This parameter determines - whether or not smbd(8)This parameter determines whether or not smbd will attempt to authenticate users using the NTLM password hash. If disabled, only the lanman password hashes will be used. @@ -12333,8 +13420,7 @@ CLASS="REFENTRYTITLE" >Please note that at least this option or lanman auth should - be enabled in order to be able to log in. +> should be enabled in order to be able to log in.

                      Default : >os level (G)os level (G)

                      This integer value controls what level Samba advertises itself as for browse elections. The value of this - parameter determines whether nmbd(8)nmbd(8) - has a chance of becoming a local master browser for the WORKGROUP WORKGROUP in the local broadcast area.

                      Note :By default, Samba will win a local master browsing election over all Microsoft operating systems except a Windows NT 4.0/2000 Domain Controller. This @@ -12397,7 +13480,7 @@ CLASS="COMMAND" >>os2 driver map (G)os2 driver map (G)

                      The parameter is used to define the absolute @@ -12416,12 +13499,17 @@ CLASS="COMMAND" >

                      The need for the file is due to the printer driver namespace problem described in the Samba Printing HOWTO. For more details on OS/2 clients, please - refer to the OS2-Client-HOWTO containing in the Samba documentation.

                      OS2-Client-HOWTO + containing in the Samba documentation.

                      Default: >pam password change (G)pam password change (G)

                      With the addition of better PAM support in Samba 2.2, @@ -12442,17 +13530,21 @@ NAME="PAMPASSWORDCHANGE" changes when requested by an SMB client instead of the program listed in passwd programpasswd program. It should be possible to enable this without changing your passwd chatpasswd chat parameter for most setups. @@ -12467,24 +13559,21 @@ CLASS="COMMAND" >>panic action (G)panic action (G)

                      This is a Samba developer option that allows a - system command to be called when either smbd(8) or smbd(8) crashes. This is usually used to - draw attention to the fact that a problem occurred.

                      smbd(8) or nmbd(8) + crashes. This is usually used to draw attention to the fact that + a problem occurred.

                      Default: >paranoid server security (G)paranoid server security (G)

                      Some version of NT 4.x allow non-guest users with a bad passowrd. When this option is enabled, samba will not use a broken NT 4.x server as password server, but instead complain - to the logs and exit. + to the logs and exit.

                      Disabling this option prevents Samba from making - this check, which involves deliberatly attempting a - bad logon to the remote server.

                      Default: paranoid server security = yes>passdb backend (G)passdb backend (G)

                      This option allows the administrator to chose which backends to retrieve and store passwords with. This allows (for example) both @@ -12559,9 +13644,11 @@ CLASS="COMMAND" >

                      See also non unix account rangenon unix account range

                    • private dirprivate dir directory.

                      private dirprivate dir directory.

                      See also non unix account rangenon unix account range

                      See also non unix account - range

                      ldap sslldap ssl) or by - specifying ldaps://ldaps:// in the URL argument.

                      unixsam - Allows samba to map all (other) available unix users

                      - (EXPERIMENTAL) Allows samba to map all (other) available unix users

                      This backend uses the standard unix database for retrieving users. Users included in this pdb are NOT listed in samba user listings and users included in this pdb won't be @@ -12698,17 +13797,17 @@ CLASS="COMMAND" >

                      Default: passdb backend = smbpasswd unixsampassdb backend = smbpasswd guest

                      Example: passdb backend = tdbsam:/etc/samba/private/passdb.tdb smbpasswd:/etc/samba/smbpasswd unixsampassdb backend = tdbsam:/etc/samba/private/passdb.tdb smbpasswd:/etc/samba/smbpasswd

                      Example: passdb backend = ldapsam_nua:ldaps://ldap.example.com unixsampassdb backend = ldapsam_nua:ldaps://ldap.example.com

                      Example: >passwd chat (G)passwd chat (G)

                      This string controls the This string controls the "chat" - conversation that takes places between smbd(8)smbd and the local password changing program to change the user's password. The string describes a - sequence of response-receive pairs that smbd(8) smbd(8) uses to determine what to send to the passwd programpasswd program and what to expect back. If the expected output is not @@ -12761,21 +13855,20 @@ CLASS="PARAMETER" >

                      Note that this parameter only is only used if the unix - password sync parameter is set to parameter is set to yesyes. This - sequence is then called AS ROOT when the SMB password in the smbpasswd file is being changed, without access to the old password cleartext. This means that root must be able to reset the user's password @@ -12787,23 +13880,25 @@ HREF="#PASSWDPROGRAM" executed on the NIS master.

                      The string can contain the macro The string can contain the macro %n%n which is substituted for the new password. The chat sequence can also contain the standard - macros \\n, \n, \\r, \r, \\t and \t and \\s\s to give line-feed, carriage-return, tab and space. The chat sequence string can also contain a '*' which matches any sequence of characters. @@ -12816,14 +13911,16 @@ CLASS="CONSTANT" >

                      If the pam - password change parameter is set to parameter is set to yesyes, the chat pairs may be matched in any order, and success is determined by the PAM result, not any particular output. The \n macro is ignored for PAM conversions. @@ -12831,41 +13928,49 @@ CLASS="CONSTANT" >

                      See also unix password - sync, passwd program passwd program , passwd chat debugpasswd chat debug and pam password changepam password change.

                      Default: passwd chat = *new*password* %n\\n - *new*password* %n\\n *changed*passwd chat = *new*password* %n\n + *new*password* %n\n *changed*

                      Example: passwd chat = "*Enter OLD password*" %o\\n - "*Enter NEW password*" %n\\n "*Reenter NEW password*" %n\\n "*Password +>passwd chat = "*Enter OLD password*" %o\n + "*Enter NEW password*" %n\n "*Reenter NEW password*" %n\n "*Password changed*"

                      >passwd chat debug (G)passwd chat debug (G)

                      This boolean specifies if the passwd chat script - parameter is run in debug mode. In this mode the strings passed to and received from the passwd chat are printed - in the smbd(8)smbd(8) log with a debug leveldebug level of 100. This is a dangerous option as it will allow plaintext passwords @@ -12904,43 +14006,55 @@ CLASS="PARAMETER" CLASS="COMMAND" >smbd log. It is available to help - Samba admins debug their passwd chatpasswd chat scripts - when calling the passwd programpasswd program and should be turned off after this has been done. This option has no effect if the pam password changepam password change paramter is set. This parameter is off by default.

                      See also passwd chatpasswd chat , pam password changepam password change , passwd programpasswd program .

                      >passwd program (G)passwd program (G)

                      The name of a program that can be used to set - UNIX user passwords. Any occurrences of %u%u will be replaced with the user name. The user name is checked for existence before calling the password changing program.

                      Also note that many passwd programs insist in Also note that many passwd programs insist in reasonable passwords, such as a minimum length, or the inclusion of mixed case chars and digits. This can pose a problem as some clients (such as Windows for Workgroups) uppercase the password before sending it.

                      Note that if the that if the unix - password sync parameter is set to parameter is set to yes - then this program is called then this program is called AS ROOT before the SMB password in the will fail to change the SMB password also (this is by design).

                      If the If the unix password sync parameter - is set this parameter unix password sync parameter + is set this parameter MUST USE ABSOLUTE PATHS - for ALL programs called, and must be examined - for security implications. Note that by default unix - password sync is set to is set to nono.

                      See also unix - password sync.

                      >password level (G)password level (G)

                      Some client/server combinations have difficulty @@ -13076,17 +14185,21 @@ NAME="PASSWORDLEVEL" >This parameter defines the maximum number of characters that may be upper case in passwords.

                      For example, say the password given was "FRED". If For example, say the password given was "FRED". If password level password level is set to 1, the following combinations would be tried if "FRED" failed:

                      "Fred", "fred", "fRed", "frEd","freD"

                      If If password levelpassword level was set to 2, the following combinations would also be tried:

                      >password server (G)password server (G)

                      By specifying the name of another SMB server (such @@ -13143,33 +14256,29 @@ CLASS="FILENAME" >The name of the password server is looked up using the parameter name - resolve order and so may resolved by any method and order described in that parameter.

                      The password server much be a machine capable of using +>The password server must be a machine capable of using the "LM1.2X002" or the "NT LM 0.12" protocol, and it must be in user level security mode.

                      NOTE: Using a password server means your UNIX box (running Samba) is only as secure as your - password server. DO NOT CHOOSE A PASSWORD SERVER THAT YOU DON'T COMPLETELY TRUST.

                      Never point a Samba server at itself for password @@ -13177,21 +14286,25 @@ CLASS="EMPHASIS" server!

                      The name of the password server takes the standard - substitutions, but probably the only useful one is %m - , which means the Samba server will use the incoming client as the password server. If you use this then you better trust your clients, and you had better restrict them with hosts allow!

                      If the If the securitysecurity parameter is set to - domaindomain, then the list of machines in this option must be a list of Primary or Backup Domain controllers for the Domain or the character '*', as the Samba server is effectively @@ -13200,9 +14313,11 @@ CLASS="CONSTANT" CLASS="COMMAND" > security = domain is that if you list several hosts in the - password serverpassword server option then smbd @@ -13210,15 +14325,17 @@ CLASS="COMMAND" > will try each in turn till it finds one that responds. This is useful in case your primary server goes down.

                      If the If the password serverpassword server option is set to the character '*', then Samba will attempt to auto-locate the Primary or Backup Domain controllers to authenticate against by - doing a query for the name WORKGROUP<1C>WORKGROUP<1C> and then contacting each server returned in the list of IP addresses from the name resolution source.

                      If the If the securitysecurity parameter is - set to serverserver, then there are different restrictions that

                    • You may list several password servers in - the password serverpassword server parameter, however if an

                      See also the security - parameter.

                      >path (S)path (S)

                      This parameter specifies a directory to which @@ -13323,14 +14446,18 @@ NAME="PATH" you probably won't get the results you expect if you do otherwise.

                      Any occurrences of Any occurrences of %u%u in the path will be replaced with the UNIX username that the client is using - on this connection. Any occurrences of %m%m will be replaced by the NetBIOS name of the machine they are connecting from. These replacements are very useful for setting @@ -13338,18 +14465,17 @@ CLASS="PARAMETER" >

                      Note that this path will be based on root dirroot dir if one was specified.

                      Default: Default: none

                      Example: >pid directory (G)pid directory (G)

                      This option specifies the directory where pid @@ -13382,15 +14508,16 @@ CLASS="COMMAND" >>posix locking (S)posix locking (S)

                      The smbd(8)The smbd(8) daemon maintains an database of file locks obtained by SMB clients. The default behavior is to map this internal database to POSIX @@ -13408,7 +14535,7 @@ CLASS="COMMAND" >>postexec (S)postexec (S)

                      This option specifies a command to be run @@ -13426,19 +14553,18 @@ CLASS="COMMAND" >

                      See also preexecpreexec .

                      Default: Default: none (no command executed)

                      postscript (S)

                      This parameter forces a printer to interpret + the print files as PostScript. This is done by adding a %! + to the start of print output.

                      This is most useful when you have lots of PCs that persist + in putting a control-D at the start of print jobs, which then + confuses your printer.

                      Default: postscript = no

                      >preexec (S)
                      preexec (S)

                      This option specifies a command to be run whenever @@ -13472,26 +14621,27 @@ CLASS="COMMAND" >

                      See also preexec close - and postexec - .

                      Default: Default: none (no command executed)

                      Example: >preexec close (S)preexec close (S)

                      This boolean option controls whether a non-zero return code from preexec - should close the service being connected to.

                      >preferred master (G)preferred master (G)

                      This boolean parameter controls if is a preferred master browser for its workgroup.

                      If this is set to If this is set to yesyes, on startup, nmbd domain master domain master = yes, so that

                      See also os levelos level .

                      >prefered master (G)prefered master (G)

                      Synonym for preferred master preferred master for people who cannot spell :-).

                      >preload (G)preload (G)

                      This is a list of services that you want to be @@ -13610,18 +14768,17 @@ NAME="PRELOAD" >Note that if you just want all printers in your printcap file loaded then the load printersload printers option is easier.

                      Default: Default: no preloaded services

                      Example: >preserve case (S)preserve case (S)

                      This controls if new filenames are created with the case that the client passes, or if they are forced to be the default case - .

                      See the section on NAME MANGLING for a fuller discussion.

                      >print command (S)print command (S)

                      After a print job has finished spooling to @@ -13695,28 +14854,33 @@ CLASS="COMMAND" >%z - the size of the spooled print job (in bytes)

                      The print command The print command MUST contain at least - one occurrence of %s or %s or %f - - the - the %p%p is optional. At the time - a job is submitted, if no printer name is supplied the %p - will be silently removed from the printer command.

                      If specified in the [global] section, the print command given @@ -13728,15 +14892,17 @@ CLASS="PARAMETER" be created but not processed and (most importantly) not removed.

                      Note that printing may fail on some UNIXes from the - nobodynobody account. If this happens then create an alternative guest account that can print and set the guest accountguest account in the [global] section.

                      printingprinting parameter.

                      >print ok (S)print ok (S)

                      Synonym for printableprintable.

                      >printable (S)printable (S)

                      If this parameter is If this parameter is yesyes, then clients may open, write to and submit spool files on the directory specified for the service.

                      read only - parameter controls only non-printing access to the resource.

                      >printcap (G)printcap (G)

                      Synonym for printcap name printcap name.

                      >printcap name (G)printcap name (G)

                      This parameter may be used to override the @@ -13891,7 +15065,7 @@ NAME="PRINTCAPNAME" CLASS="FILENAME" > /etc/printcap). See the discussion of the [printers] section above for reasons why you might want to do this.

                      to automatically obtain lists of available printers. This is the default for systems that define SYSV at configure time in - Samba (this includes most System V based systems). If printcap name printcap name is set to lpstat

                      A minimal printcap file would look something like this:

                      print1|My Printer 1
                      -print2|My Printer 2
                      -print3|My Printer 3
                      -print4|My Printer 4
                      -print5|My Printer 5
                      print1|My Printer 1 + print2|My Printer 2 + print3|My Printer 3 + print4|My Printer 4 + print5|My Printer 5 +

                      where the '|' separates aliases of a printer. The fact that the second alias has a space in it gives a hint to Samba that it's a comment.

                      NOTE: Under AIX the default printcap name is >printer admin (S)printer admin (S)

                      This is a list of users that can do anything to @@ -13995,20 +15178,216 @@ NAME="PRINTERADMIN" >

                      Default: printer admin = <empty string> -

                      printer admin = <empty string>
                      +

                      Example: printer admin = admin, @staff

                      printer driver (S)

                      Note :This is a deprecated + parameter and will be removed in the next major release + following version 2.2. Please see the instructions in + the Samba 2.2. Printing + HOWTO for more information + on the new method of loading printer drivers onto a Samba server. +

                      This option allows you to control the string + that clients receive when they ask the server for the printer driver + associated with a printer. If you are using Windows95 or Windows NT + then you can use this to automate the setup of printers on your + system.

                      You need to set this parameter to the exact string (case + sensitive) that describes the appropriate printer driver for your + system. If you don't know the exact string to use then you should + first try with no printer driver option set and the client will + give you a list of printer drivers. The appropriate strings are + shown in a scroll box after you have chosen the printer manufacturer.

                      See also printer + driver file.

                      Example: printer driver = HP LaserJet 4L

                      printer driver file (G)

                      Note :This is a deprecated + parameter and will be removed in the next major release + following version 2.2. Please see the instructions in + the Samba 2.2. Printing + HOWTO for more information + on the new method of loading printer drivers onto a Samba server. +

                      This parameter tells Samba where the printer driver + definition file, used when serving drivers to Windows 95 clients, is + to be found. If this is not set, the default is :

                      SAMBA_INSTALL_DIRECTORY + /lib/printers.def

                      This file is created from Windows 95 msprint.inf + files found on the Windows 95 client system. For more + details on setting up serving of printer drivers to Windows 95 + clients, see the outdated documentation file in the docs/ + directory, PRINTER_DRIVER.txt.

                      See also printer driver location.

                      Default: None (set in compile).

                      Example: printer driver file = + /usr/local/samba/printers/drivers.def

                      printer driver location (S)

                      Note :This is a deprecated + parameter and will be removed in the next major release + following version 2.2. Please see the instructions in + the Samba 2.2. Printing + HOWTO for more information + on the new method of loading printer drivers onto a Samba server. +

                      This parameter tells clients of a particular printer + share where to find the printer driver files for the automatic + installation of drivers for Windows 95 machines. If Samba is set up + to serve printer drivers to Windows 95 machines, this should be set to

                      \\MACHINE\PRINTER$

                      Where MACHINE is the NetBIOS name of your Samba server, + and PRINTER$ is a share you set up for serving printer driver + files. For more details on setting this up see the outdated documentation + file in the docs/ directory, PRINTER_DRIVER.txt.

                      See also printer driver file.

                      Default: none

                      Example: printer admin = admin, @staffprinter driver location = \\MACHINE\PRINTER$ +

                      >printer name (S)
                      printer name (S)

                      This parameter specifies the name of the printer @@ -14018,16 +15397,13 @@ NAME="PRINTERNAME" name given will be used for any printable service that does not have its own printer name specified.

                      Default: Default: none (but may be none (but may be lplp on many systems)

                      Example: >printer (S)printer (S)

                      Synonym for printer name printer name.

                      >printing (S)printing (S)

                      This parameters controls how printer status information is interpreted on your system. It also affects the - default values for the print commandprint command, - lpq command, lpq command, lppause command - , , lpresume commandlpresume command, and - lprm commandlprm command if specified in the [global] section.

                      Currently nine printing styles are supported. They are - BSD, BSD, AIXAIX, - LPRNG, LPRNG, PLPPLP, - SYSV, SYSV, HPUXHPUX, - QNX, QNX, SOFTQSOFTQ, - and CUPSCUPS.

                      To see what the defaults are for the other print @@ -14124,7 +15512,7 @@ TARGET="_top" >This option can be set on a per printer basis

                      See also the discussion in the [printers] section.

                      >private dir (G)private dir (G)

                      This parameters defines the directory @@ -14155,14 +15543,16 @@ CLASS="COMMAND" >>protocol (G)protocol (G)

                      Synonym for max protocolmax protocol.

                      >public (S)public (S)

                      Synonym for guest - ok.

                      >queuepause command (S)queuepause command (S)

                      This parameter specifies the command to be @@ -14200,9 +15592,11 @@ NAME="QUEUEPAUSECOMMAND" but can be issued from the Printers window under Windows 95 and NT.

                      If a If a %p%p is given then the printer name is put in its place. Otherwise it is placed at the end of the command.

                      Default: Default: depends on the setting of depends on the setting of printing -

                      Example: >queueresume command (S)queueresume command (S)

                      This parameter specifies the command to be @@ -14240,9 +15633,11 @@ NAME="QUEUERESUMECOMMAND" is the command to undo the behavior that is caused by the previous parameter ( queuepause command queuepause command).

                      If a If a %p%p is given then the printer name is put in its place. Otherwise it is placed at the end of the command.

                      Default: Default: depends on the setting of printingprinting

                      >read bmpx (G)read bmpx (G)

                      This boolean parameter controls whether smbd(8) will support the "Read Block Multiplex" SMB. This is now rarely used and defaults to - nono. You should never need to set this parameter.

                      >read list (S)read list (S)

                      This is a list of users that are given read-only access to a service. If the connecting user is in this list then they will not be given write access, no matter what the read onlyread only option is set to. The list can include group names using the syntax described in the invalid users invalid users parameter.

                      See also the write list write list parameter and the invalid usersinvalid users parameter.

                      >read only (S)read only (S)

                      An inverted synonym is writeablewriteable.

                      If this parameter is If this parameter is yesyes, then users of a service may not create or modify files in the service's directory.

                      printable = yes) - will ALWAYS allow writing to the directory (user privileges permitting), but only via spooling operations.

                      >read raw (G)read raw (G)

                      This parameter controls whether or not the server @@ -14422,9 +15825,11 @@ NAME="READRAW" >In general this parameter should be viewed as a system tuning tool and left severely alone. See also write rawwrite raw.

                      >read size (G)read size (G)

                      The option The option read sizeread size affects the overlap of disk reads/writes with network reads/writes. If the amount of data being transferred in several of the SMB @@ -14476,7 +15883,7 @@ CLASS="COMMAND" >>realm (G)realm (G)

                      This option specifies the kerberos realm to use. The realm is @@ -14501,7 +15908,7 @@ CLASS="COMMAND" >>remote announce (G)remote announce (G)

                      This option allows you to setup workgroupworkgroup parameter is used instead.

                      See the documentation file BROWSINGSee the documentation file BROWSING.txt in the >remote browse sync (G)remote browse sync (G)

                      This option allows you to setup >restrict anonymous (G)restrict anonymous (G)

                      This is a integer parameter, and mirrors as much as possible the functinality the - RestrictAnonymousRestrictAnonymous registry key does on NT/Win2k.

                      >root (G)root (G)

                      Synonym for root directory"root directory".

                      >root dir (G)root dir (G)

                      Synonym for root directory"root directory".

                      >root directory (G)root directory (G)

                      The server will wide linkswide links parameter).

                      Adding a Adding a root directoryroot directory entry other than "/" adds an extra level of security, but at a price. It absolutely ensures that no access is given to files not in the - sub-tree specified in the root directory - option, root directory + option, including some files needed for complete operation of the server. To maintain full operability of the server you will need to mirror some system files - into the root directoryroot directory tree. In particular you will need to mirror >root postexec (S)root postexec (S)

                      This is the same as the This is the same as the postexecpostexec parameter except that the command is run as root. This is useful for unmounting filesystems @@ -14742,9 +16161,11 @@ CLASS="PARAMETER" >

                      See also postexec postexec.

                      >root preexec (S)root preexec (S)

                      This is the same as the This is the same as the preexecpreexec parameter except that the command is run as root. This is useful for mounting filesystems (such as CDROMs) when a @@ -14771,15 +16194,19 @@ CLASS="PARAMETER" >

                      See also preexec preexec and preexec closepreexec close.

                      >root preexec close (S)root preexec close (S)

                      This is the same as the This is the same as the preexec close - parameter except that the command is run as root.

                      See also preexec preexec and preexec closepreexec close.

                      >security (G)security (G)

                      This option affects how clients respond to @@ -14835,12 +16268,11 @@ CLASS="FILENAME" > file.

                      The option sets the "security mode bit" in replies to - protocol negotiations with smbd(8)smbd(8) + to turn share level security on or off. Clients decide based on this bit whether (and how) to transfer user and password information to the server.

                      , see the map to guestmap to guest parameter for details.

                      It is possible to use smbd in a in a hybrid mode where it is offers both user and share level security under different NetBIOS aliasesNetBIOS aliases.

                      >SECURITY = SHARE

                      When clients connect to a share level security server they @@ -14957,12 +16387,9 @@ CLASS="COMMAND" >Note that smbd ALWAYS uses a valid UNIX user to act on behalf of the client, even in

                      If the guest - only parameter is set, then all the other stages are missed and only the guest accountguest account username is checked.

                      Is a username is sent with the share connection request, then this username (after mapping - see username mapusername map), is added as a potential username.

                    • If the client did a previous If the client did a previous logon request (the SessionSetup SMB call) then the username sent in this SMB will be added as a potential username.

                      Any users on the user user list are added as potential usernames.

                    If the If the guest onlyguest only parameter is not set, then this list is then tried with the supplied password. The first user for whom the password matches will be used as the UNIX user.

                    If the If the guest onlyguest only parameter is set, or no username can be determined then if the share is marked - as available to the guest accountguest account, then this guest user will be used, otherwise access is denied.

                    Note that it can be Note that it can be very confusing in share-level security as to which UNIX username will eventually be used in granting access.

                    See also the section NOTE ABOUT USERNAME/PASSWORD VALIDATION.

                    >SECURITY = USER

                    This is the default security setting in Samba 3.0. +>This is the default security setting in Samba 2.2. With user-level security a client must first "log-on" with a valid username and password (which can be mapped using the username mapusername map parameter). Encrypted passwords (see the encrypted passwordsencrypted passwords parameter) can also be used in this security mode. Parameters such as useruser and guest onlyguest only if set are then applied and may change the UNIX user to use on this connection, but only after the user has been successfully authenticated.

                    Note that the name of the resource being - requested is not sent to the server until after the server has successfully authenticated the client. This is why guest shares don't work in user level security without allowing the server to automatically map unknown users into the guest accountguest account. See the map to guestmap to guest parameter for details on doing this.

                    See also the section NOTE ABOUT USERNAME/PASSWORD VALIDATION.

                    >SECURITY = DOMAIN - +>SECURITY = SERVER

                    This mode will only work correctly if net(8) has been used to add this - machine into a Windows NT Domain. It expects the encrypted passwords - parameter to be set to yes. In this - mode Samba will try to validate the username/password by passing - it to a Windows NT Primary or Backup Domain Controller, in exactly - the same way that a Windows NT Server would do.

                    Note that a valid UNIX user must still - exist as well as the account on the Domain Controller to allow - Samba to have a valid UNIX account to map file access to.

                    In this mode Samba will try to validate the username/password + by passing it to another SMB server, such as an NT box. If this + fails it will revert to security = user, but note + that if encrypted passwords have been negotiated then Samba cannot + revert back to checking the UNIX password file, it must have a valid + smbpasswd file to check users against. See the + documentation file in the docs/ directory + ENCRYPTION.txt for details on how to set this + up.

                    Note that from the client's point - of view that from the client's point of + view security = domainsecurity = server is the same as security = user - . It only affects how the server deals with the authentication, - it does not in any way affect what the client sees.

                    security = user
                    . It only affects how the server deals + with the authentication, it does not in any way affect what the + client sees.

                    Note that the name of the resource being - requested is not sent to the server until after the server has successfully authenticated the client. This is why guest shares don't work in user level security without allowing the server to automatically map unknown users into the guest accountguest account. See the map to guestmap to guest parameter for details on doing this.

                    See also the section NOTE ABOUT USERNAME/PASSWORD VALIDATION.

                    See also the password - server parameter and the encrypted passwordsencrypted passwords parameter.

                    >SECURITY = SERVER +>SECURITY = DOMAIN

                    In this mode Samba will try to validate the username/password - by passing it to another SMB server, such as an NT box. If this - fails it will revert to security = - user. It expects the This mode will only work correctly if smbpasswd(8) has been used to add this + machine into a Windows NT Domain. It expects the encrypted passwordsencrypted passwords parameter to be set to - parameter to be set to yes, unless the remote server - does not support them. However note - that if encrypted passwords have been negotiated then Samba cannot - revert back to checking the UNIX password file, it must have a valid - smbpasswd file to check users against. See the - documentation file in the docs/ directory - ENCRYPTION.txt for details on how to set this - up.

                    yes. In this + mode Samba will try to validate the username/password by passing + it to a Windows NT Primary or Backup Domain Controller, in exactly + the same way that a Windows NT Server would do.

                    Note this mode of operation - has significant pitfalls, due to the fact that is - activly initiates a man-in-the-middle attack on the - remote SMB server. In particular, this mode of - operation can cause significant resource consuption on - the PDC, as it must maintain an active connection for - the duration of the user's session. Furthermore, if - this connection is lost, there is no way to - reestablish it, and futher authenticaions to the Samba - server may fail. (From a single client, till it - disconnects).

                    that a valid UNIX user must still + exist as well as the account on the Domain Controller to allow + Samba to have a valid UNIX account to map file access to.

                    Note that from the client's point of - view that from the client's point + of view security = serversecurity = domain is the same as security = user. It only affects how the server deals - with the authentication, it does not in any way affect what the - client sees.

                    security = user +
                    . It only affects how the server deals with the authentication, + it does not in any way affect what the client sees.

                    Note that the name of the resource being - requested is not sent to the server until after the server has successfully authenticated the client. This is why guest shares don't work in user level security without allowing the server to automatically map unknown users into the guest accountguest account. See the map to guestmap to guest parameter for details on doing this.

                    BUG: There is currently a bug in the + implementation of security = domain with respect + to multi-byte character set usernames. The communication with a + Domain Controller must be done in UNICODE and Samba currently + does not widen multi-byte user names to UNICODE correctly, thus + a multi-byte username will not be recognized correctly at the + Domain Controller. This issue will be addressed in a future release.

                    See also the section NOTE ABOUT USERNAME/PASSWORD VALIDATION.

                    See also the password - server parameter and the encrypted passwordsencrypted passwords parameter.

                    >security mask (S)security mask (S)

                    This parameter controls what UNIX permission @@ -15447,40 +16856,43 @@ NAME="SECURITYMASK" a user to modify all the user/group/world permissions on a file.

                    Note that users who can access the Samba server through other means can easily bypass this restriction, so it is primarily useful for standalone "appliance" systems. Administrators of most normal systems will - probably want to leave it set to 07770777.

                    See also the force directory security modeforce directory security mode, directory - security mask, force security modeforce security mode parameters.

                    >server string (G)server string (G)

                    This controls what string will show up in the @@ -15512,15 +16924,19 @@ CLASS="COMMAND" >It also sets what will appear in browse lists next to the machine name.

                    A A %v%v will be replaced with the Samba version number.

                    A A %h%h will be replaced with the hostname.

                    >set directory (S)set directory (S)

                    If >share modes (S)share modes (S)

                    This enables or disables the honoring of - the share modesshare modes during a file open. These modes are used by clients to gain exclusive read or write access to a file.

                    The share modes that are enabled by this option are - DENY_DOS, DENY_DOS, DENY_ALLDENY_ALL, - DENY_READ, DENY_READ, DENY_WRITEDENY_WRITE, - DENY_NONE and DENY_NONE and DENY_FCBDENY_FCB.

                    This option gives full share compatibility and enabled by default.

                    You should You should NEVER turn this parameter off as many Windows applications will break if you do so.

                    >short preserve case (S)short preserve case (S)

                    This boolean parameter controls if new files @@ -15633,10 +17048,12 @@ NAME="SHORTPRESERVECASE" suitable length, are created upper case, or if they are forced to be the default case - . This option can be use with

                    See the section on NAME MANGLING.

                    >show add printer wizard (G)show add printer wizard (G)

                    With the introduction of MS-RPC based printing support @@ -15676,46 +17093,53 @@ NAME="SHOWADDPRINTERWIZARD" open a handle on the printer server with OpenPrinterEx() asking for Administrator privileges. If the user does not have administrative access on the print server (i.e is not root or a member of the - printer adminprinter admin group), the OpenPrinterEx() call fails and the client makes another open call with a request for a lower privilege level. This should succeed, however the APW icon will not be displayed.

                    Disabling the Disabling the show add printer wizardshow add printer wizard parameter will always cause the OpenPrinterEx() on the server - to fail. Thus the APW icon will never be displayed. Note :This does not prevent the same user from having administrative privilege on an individual printer.

                    See also addprinter - command, deleteprinter commanddeleteprinter command, printer adminprinter admin

                    >shutdown script (G)shutdown script (G)

                    This parameter only exists in the HEAD cvs branch This a full path name to a script called by

                    %m %t %r %f parameters are expanded

                    %m%m will be substituted with the shutdown message sent to the server.

                    %t%t will be substituted with the number of seconds to wait before effectively starting the shutdown procedure.

                    %r will be substituted with the - switch %r will be substituted with the + switch -r. It means reboot after shutdown for NT.

                    %f will be substituted with the - switch %f will be substituted with the + switch -f. It means force the shutdown even if applications do not respond for NT.

                    Default: Default: None.

                    Example:

                    Shutdown script example: -

                    #!/bin/bash
                    +>		#!/bin/bash
                     		
                    -$time=0
                    -let "time/60"
                    -let "time++"
                    +		$time=0
                    +		let "time/60"
                    +		let "time++"
                     
                    -/sbin/shutdown $3 $4 +$time $1 &
                    Shutdown does not return so we need to launch it in background.

                    See also abort shutdown scriptabort shutdown script.

                    >smb passwd file (G)smb passwd file (G)

                    This option sets the path to the encrypted @@ -15856,7 +17288,7 @@ CLASS="COMMAND" >>smb ports (G)smb ports (G)

                    Specifies which ports the server should listen on @@ -15872,7 +17304,7 @@ CLASS="COMMAND" >>socket address (G)socket address (G)

                    This option allows you to control what @@ -15893,7 +17325,7 @@ CLASS="COMMAND" >>socket options (G)socket options (G)

                    This option allows you to set socket options @@ -15974,12 +17406,9 @@ TARGET="_top" >

                  Those marked with a Those marked with a '*' take an integer argument. The others can optionally take a 1 or 0 argument to enable or disable the option, by default they will be enabled if you @@ -16027,7 +17456,7 @@ CLASS="COMMAND" >>source environment (G)source environment (G)

                  This parameter causes Samba to set environment @@ -16051,12 +17480,9 @@ CLASS="COMMAND" >SAMBA_NETBIOS_NAME = myhostname

                  Default: Default: No default value

                  Examples: >use spnego (G)use spnego (G)

                  This variable controls controls whether samba will try - to use Simple and Protected NEGOciation (as specified by rfc2478) with - WindowsXP and Windows2000sp2 clients to agree upon an authentication mechanism. - Unless further issues are discovered with our SPNEGO - implementation, there is no reason this should ever be - disabled.

                  This variable controls controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000sp2 clients to agree upon an authentication mechanism. As of samba 3.0alpha it must be set to "no" for these clients to join a samba domain controller. It can be set to "yes" to allow samba to participate in an AD domain controlled by a Windows2000 domain controller.

                  Default: Default: use spnego = yes

                  >stat cache (G)
                  stat cache (G)

                  This parameter determines if smbd(8)This parameter determines if smbd(8) will use a cache in order to speed up case insensitive name mappings. You should never need to change this parameter.

                  >stat cache size (G)stat cache size (G)

                  This parameter determines the number of - entries in the stat cachestat cache. You should never need to change this parameter.

                  >strict allocate (S)strict allocate (S)

                  This is a boolean that controls the handling of - disk space allocation in the server. When this is set to yesyes the server will change from UNIX behaviour of not committing real disk storage blocks when a file is extended to the Windows behaviour @@ -16153,15 +17571,15 @@ CLASS="CONSTANT" terminology this means that Samba will stop creating sparse files. This can be slow on some systems.

                  When strict allocate is When strict allocate is nono the server does sparse disk block allocation when a file is extended.

                  Setting this to Setting this to yesyes can help Samba return out of quota messages on systems that are restricting the disk quota of users.

                  >strict locking (S)strict locking (S)

                  This is a boolean that controls the handling of - file locking in the server. When this is set to yesyes the server will check every read and write access for file locks, and deny access if locks exist. This can be slow on some systems.

                  When strict locking is When strict locking is nono the server does file lock checks only when the client explicitly asks for them.

                  >strict sync (S)strict sync (S)

                  Many Windows applications (including the Windows @@ -16217,16 +17635,14 @@ NAME="STRICTSYNC" the process to be suspended until the kernel has ensured that all outstanding data in kernel disk buffers has been safely stored onto stable storage. This is very slow and should only be done - rarely. Setting this parameter to nono (the - default) means that smbd(8)smbd ignores the Windows applications requests for a sync call. There is only a possibility of losing data if the operating system itself that Samba is running on crashes, so there is @@ -16236,10 +17652,12 @@ CLASS="REFENTRYTITLE" >

                  See also the sync - always> parameter.

                  >strip dot (G)strip dot (G)

                  This is a boolean that controls whether to @@ -16268,41 +17686,45 @@ CLASS="COMMAND" >>sync always (S)sync always (S)

                  This is a boolean parameter that controls whether writes will always be written to stable storage before - the write call returns. If this is nono then the server will be guided by the client's request in each write call (clients can set a bit indicating that a particular write should be synchronous). - If this is yesyes then every write will be followed by a fsync() call to ensure the data is written to disk. Note that - the strict syncstrict sync parameter must be set to - yesyes in order for this parameter to have any affect.

                  See also the strict - sync parameter.

                  >syslog (G)syslog (G)

                  This parameter maps how Samba debug messages are logged onto the system syslog logging levels. Samba debug - level zero maps onto syslog LOG_ERRLOG_ERR, debug - level one maps onto LOG_WARNINGLOG_WARNING, debug level - two maps onto LOG_NOTICELOG_NOTICE, debug level three - maps onto LOG_INFO. All higher levels are mapped to LOG_DEBUG LOG_DEBUG.

                  This parameter sets the threshold for sending messages @@ -16350,7 +17772,7 @@ CLASS="COMMAND" >>syslog only (G)syslog only (G)

                  If this parameter is set then Samba debug @@ -16366,7 +17788,7 @@ CLASS="COMMAND" >>template homedir (G)template homedir (G)

                  When filling out the user information for a Windows NT @@ -16376,14 +17798,18 @@ TARGET="_top" >winbindd(8) daemon uses this parameter to fill in the home directory for that user. - If the string %D%D is present it is substituted - with the user's Windows NT domain name. If the string %U - is present it is substituted with the user's Windows NT user name.

                  >template shell (G)template shell (G)

                  When filling out the user information for a Windows NT - user, the winbindd(8)winbindd(8) daemon uses this parameter to fill in the login shell for that user.

                  >time offset (G)time offset (G)

                  This parameter is a setting in minutes to add @@ -16440,15 +17864,14 @@ CLASS="COMMAND" >>time server (G)time server (G)

                  This parameter determines if nmbd(8)This parameter determines if + nmbd(8) advertises itself as a time server to Windows clients.

                  >timestamp logs (G)timestamp logs (G)

                  Synonym for debug timestamp debug timestamp.

                  >total print jobs (G)total print jobs (G)

                  This parameter accepts an integer value which defines a limit on the maximum number of print jobs that will be accepted system wide at any given time. If a print job is submitted - by a client which will exceed this number, then smbd(8)smbd will return an error indicating that no space is available on the server. The default value of 0 means that no such limit exists. This parameter @@ -16495,9 +17918,11 @@ CLASS="REFENTRYTITLE" designed as a printing throttle. See also max print jobsmax print jobs.

                  >unicode (G)unicode (G)

                  Specifies whether Samba should try @@ -16533,7 +17958,7 @@ CLASS="COMMAND" >>unix charset (G)unix charset (G)

                  Specifies the charset the unix machine @@ -16543,19 +17968,19 @@ NAME="UNIXCHARSET" >

                  Default: unix charset = UTF8unix charset = ASCII

                  Example: unix charset = ASCIIunix charset = UTF8

                  >unix extensions(G)
                  unix extensions(G)

                  This boolean parameter controls whether Samba @@ -16574,25 +17999,24 @@ CLASS="COMMAND" >>unix password sync (G)unix password sync (G)

                  This boolean parameter controls whether Samba attempts to synchronize the UNIX password with the SMB password when the encrypted SMB password in the smbpasswd file is changed. - If this is set to yes the program specified in the yes the program specified in the passwd - programparameter is called passwd + programparameter is called AS ROOT - to allow the new UNIX password to be set without access to the old UNIX password (as the SMB password change code has no @@ -16600,16 +18024,20 @@ CLASS="EMPHASIS" >

                  See also passwd - program, passwd chat passwd chat.

                  >update encrypted (G)update encrypted (G)

                  This boolean parameter allows a user logging @@ -16637,25 +18065,27 @@ NAME="UPDATEENCRYPTED" change is made. This is a convenience option to allow the change over to encrypted passwords to be made over a longer period. Once all users have encrypted representations of their passwords in the smbpasswd - file this parameter should be set to nono.

                  In order for this parameter to work correctly the encrypt passwordsencrypt passwords parameter must be set to parameter must be set to nono when - this parameter is set to yesyes.

                  Note that even when this parameter is set a user @@ -16675,7 +18105,7 @@ CLASS="COMMAND" >>use client driver (S)use client driver (S)

                  This parameter applies only to Windows NT/2000 @@ -16704,14 +18134,11 @@ CLASS="COMMAND" >If this parameter is enabled for a printer, then any attempt to open the printer with the PRINTER_ACCESS_ADMINISTER right is mapped to PRINTER_ACCESS_USE instead. Thus allowing the OpenPrinterEx() - call to succeed. This parameter MUST not be able enabled on a print share which has valid print driver installed on the Samba server.

                  See also >use mmap (G)use mmap (G)

                  This global parameter determines if the tdb internals of Samba can depend on mmap working correctly on the running system. Samba requires a coherent mmap/read-write system memory cache. Currently only HPUX does not have such a - coherent cache, and so this parameter is set to nono by default on HPUX. On all other systems this parameter should be left alone. This parameter is provided to help the Samba developers track down problems with @@ -16751,16 +18178,60 @@ CLASS="COMMAND" >

                  use rhosts (G)

                  If this global parameter is yes, it specifies + that the UNIX user's .rhosts file in their home directory + will be read to find the names of hosts and users who will be allowed + access without specifying a password.

                  NOTE: The use of use rhosts + can be a major security hole. This is because you are + trusting the PC to supply the correct username. It is very easy to + get a PC to supply a false username. I recommend that the use rhosts option be only used if you really know what + you are doing.

                  Default: use rhosts = no

                  >user (S)
                  user (S)

                  Synonym for username username.

                  >users (S)users (S)

                  Synonym for username username.

                  >username (S)username (S)

                  Multiple users may be specified in a comma-delimited list, in which case the supplied password will be tested against each username in turn (left to right).

                  The The usernameusername line is needed only when the PC is unable to supply its own username. This is the case for the COREPLUS protocol or where your users have different WfWg usernames to UNIX usernames. In both these cases you may also be better using the \\server\share%user syntax instead.

                  The The usernameusername line is not a great solution in many cases as it means Samba will try to validate the supplied password against each of the usernames in the - usernameusername line in turn. This is slow and a bad idea for lots of users in case of duplicate passwords. You may get timeouts or security breaches using this parameter @@ -16824,10 +18303,12 @@ CLASS="PARAMETER" >To restrict a service to a particular set of users you can use the valid users - parameter.

                  If any of the usernames begin with a '&' then the name +>If any of the usernames begin with a '&'then the name will be looked up only in the NIS netgroups database (if Samba is compiled with netgroup support) and will expand to a list of all users in the netgroup group of that name.

                  See the section NOTE ABOUT USERNAME/PASSWORD VALIDATION for more information on how @@ -16873,7 +18354,7 @@ CLASS="COMMAND" >>username level (G)username level (G)

                  This option helps Samba to try and 'guess' at @@ -16887,10 +18368,10 @@ NAME="USERNAMELEVEL" combinations to try while trying to determine the UNIX user name. The higher the number the more combinations will be tried, but the slower the discovery of usernames will be. Use this parameter when you have - strange usernames on your UNIX machine, such as AstrangeUser - .

                  Default: >username map (G)username map (G)

                  This option allows you to specify a file containing @@ -16940,16 +18421,16 @@ NAME="USERNAMEMAP" Using '!' is most useful when you have a wildcard mapping line later in the file.

                  For example to map from the name For example to map from the name adminadmin - or administrator to the UNIX name administrator to the UNIX name root root you would use:

                  root = admin administrator

                  Or to map anyone in the UNIX group Or to map anyone in the UNIX group systemsystem - to the UNIX name syssys you would use:

                  !sys = mary fred
                  -guest = *
                  !sys = mary fred + guest = * +

                  Note that the remapping is applied to all occurrences - of usernames. Thus if you connect to \\server\fred and fred is remapped to fred is remapped to marymary then you will actually be connecting to \\server\mary and will need to - supply a password suitable for marymary not - fredfred. The only exception to this is the username passed to the password server password server (if you have one). The password server will receive whatever username the client supplies without @@ -17035,12 +18528,9 @@ CLASS="PARAMETER" trouble deleting print jobs as PrintManager under WfWg will think they don't own the print job.

                  Default: Default: no username map

                  Example: >use sendfile (S)use sendfile (S)

                  If this parameter is If this parameter is yesyes, and Samba was built with the --with-sendfile-support option, and the underlying operating system supports sendfile system call, then some SMB read calls (mainly ReadAndX @@ -17077,16 +18567,16 @@ CLASS="COMMAND" >>utmp (G)utmp (G)

                  This boolean parameter is only available if Samba has been configured and compiled with the option --with-utmp. If set to . If set to yesyes then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a connection is made to a Samba server. Sites may use this to record the @@ -17100,9 +18590,11 @@ CLASS="CONSTANT" >

                  See also the utmp directory utmp directory parameter.

                  >utmp directory(G)utmp directory(G)

                  This parameter is only available if Samba has @@ -17126,9 +18618,11 @@ CLASS="COMMAND" used to store the utmp or utmpx files (depending on the UNIX system) that record user connections to a Samba server. See also the utmputmp parameter. By default this is not set, meaning the system will use whatever utmp file the @@ -17138,12 +18632,9 @@ CLASS="FILENAME" >/var/run/utmp on Linux).

                  Default: Default: no utmp directory

                  Example: >wtmp directory(G)wtmp directory(G)

                  This parameter is only available if Samba has @@ -17170,9 +18661,11 @@ CLASS="COMMAND" See also the utmputmp parameter. By default this is not set, meaning the system will use whatever utmp file the @@ -17182,12 +18675,9 @@ CLASS="FILENAME" >/var/run/wtmp on Linux).

                  Default: Default: no wtmp directory

                  Example: >valid users (S)valid users (S)

                  This is a list of users that should be allowed to login to this service. Names starting with '@', '+' and '&' are interpreted using the same rules as described in the - invalid usersinvalid users parameter.

                  If this is empty (the default) then any user can login. - If a username is in both this list and the invalid - users list then access is denied for that user.

                  The current servicename is substituted for The current servicename is substituted for %S - . This is useful in the [homes] section.

                  See also invalid users -

                  Default: Default: No valid users list (anyone can login)

                  Example: >veto files(S)veto files(S)

                  This is a list of files and directories that @@ -17260,18 +18755,17 @@ NAME="VETOFILES" or directories as in DOS wildcards.

                  Each entry must be a unix path, not a DOS path and - must not include the unix directory separator '/'.

                  Note that the Note that the case sensitivecase sensitive option is applicable in vetoing files.

                  fail unless you also set - the delete veto filesdelete veto files parameter to - yesyes.

                  Setting this parameter will affect the performance @@ -17301,29 +18796,36 @@ CLASS="PARAMETER" >

                  See also hide files - and case sensitive case sensitive.

                  Default: Default: No files or directories are vetoed.

                  Examples:

                  Examples:
                  ; Veto any files containing the word Security, 
                   ; any ending in .tmp, and any directory containing the
                  @@ -17333,20 +18835,25 @@ veto files = /*Security*/*.tmp/*root*/
                   ; Veto the Apple specific files that a NetAtalk server
                   ; creates.
                   veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/

                  >veto oplock files (S)
                  veto oplock files (S)

                  This parameter is only valid when the oplocksoplocks parameter is turned on for a share. It allows the Samba administrator @@ -17354,20 +18861,19 @@ CLASS="PARAMETER" match a wildcarded list, similar to the wildcarded list used in the veto filesveto files parameter.

                  Default: Default: No files are vetoed for oplock grants

                  You might want to do this on files that you know will @@ -17391,7 +18897,7 @@ CLASS="COMMAND" >>vfs path (S)vfs path (S)

                  This parameter specifies the directory @@ -17416,7 +18922,7 @@ CLASS="COMMAND" >>vfs object (S)vfs object (S)

                  This parameter specifies a shared object files that @@ -17424,63 +18930,56 @@ NAME="VFSOBJECT" disk I/O operations are used but these can be overloaded with one or more VFS objects.

                  Default : Default : no value

                  >vfs options (S)
                  vfs options (S)

                  This parameter allows parameters to be passed to the vfs layer at initialization time. See also vfs object vfs object.

                  Default : Default : no value

                  >volume (S)
                  volume (S)

                  This allows you to override the volume label returned for a share. Useful for CDROMs with installation programs that insist on a particular volume label.

                  Default: Default: the name of the share

                  >wide links (S)
                  wide links (S)

                  This parameter controls whether or not links @@ -17502,16 +19001,14 @@ CLASS="COMMAND" >>winbind cache time (G)winbind cache time (G)

                  This parameter specifies the number of - seconds the winbindd(8)This parameter specifies the number of seconds the + winbindd(8) daemon will cache user and group information before querying a Windows NT server again.

                  >winbind enum users (G)winbind enum users (G)

                  On large installations using winbindd(8)On large installations using + winbindd(8) it may be - necessary to suppress the enumeration of users through the setpwent() setpwent(), endpwent() group of system calls. If - the winbind enum userswinbind enum users parameter is - nono, calls to the getpwent system call will not return any data.

                  Warning: Turning off user enumeration may cause some programs to behave oddly. For example, the finger program relies on having access to the @@ -17581,19 +19077,19 @@ CLASS="COMMAND" >>winbind enum groups (G)winbind enum groups (G)

                  On large installations using winbindd(8) it may be necessary to suppress - the enumeration of groups through the On large installations using + winbindd(8) it may be + necessary to suppress the enumeration of groups through the + setgrent() setgrent(), endgrent() group of system calls. If - the winbind enum groupswinbind enum groups parameter is - nono, calls to the getgrent() system call will not return any data.

                  Warning: Turning off group enumeration may cause some programs to behave oddly.

                  >winbind gid (G)winbind gid (G)

                  The winbind gid parameter specifies the range of group - ids that are allocated by the winbindd(8) winbindd(8) daemon. This range of group ids should have no existing local or NIS groups within it as strange conflicts can occur otherwise.

                  >winbind separator (G)winbind separator (G)

                  This parameter allows an admin to define the character - used when listing a username of the form of DOMAIN - \\useruser. This parameter is only applicable when using the >winbind uid (G)winbind uid (G)

                  The winbind gid parameter specifies the range of group - ids that are allocated by the winbindd(8) winbindd(8) daemon. This range of ids should have no existing local or NIS users within it as strange conflicts can occur otherwise.

                  winbind use default domain, >winbind use default domain (G)
                  winbind use default domain (G)

                  This parameter specifies whether the winbindd(8) daemon should operate on users - without domain component in their username. +>This parameter specifies whether the winbindd(8) + daemon should operate on users without domain component in their username. Users without a domain component are treated as is part of the winbindd server's own domain. While this does not benifit Windows users, it makes SSH, FTP and e-mail function in a way much closer to the way they would in a native unix system.

                  >wins hook (G)wins hook (G)

                  When Samba is running as a WINS server this @@ -17829,7 +19322,7 @@ CLASS="COMMAND" >>wins proxy (G)wins proxy (G)

                  This is a boolean that controls if nmbd(8) will respond to broadcast name queries on behalf of other hosts. You may need to set this - to yesyes for some older clients.

                  Default: >wins server (G)wins server (G)

                  This specifies the IP address (or DNS name: IP - address for preference) of the WINS server that nmbd(8) nmbd(8) should register with. If you have a WINS server on your network then you should set this to the WINS server's IP.

                  You should point this at your WINS server if you have a multi-subnetted network.

                  NOTE. You need to set up Samba to point to a WINS server if you have multiple subnets and wish cross-subnet browsing to work correctly.

                  See the documentation file BROWSINGSee the documentation file BROWSING.txt in the docs/ directory of your Samba source distribution.

                  Default: Default: not enabled

                  Example: >wins support (G)wins support (G)

                  This boolean controls if the nmbd(8)This boolean controls if the + nmbd(8) process in Samba will act as a WINS server. You should - not set this to yesyes unless you have a multi-subnetted network and you wish a particular nmbd to be your WINS server. - Note that you should NEVER set this to set this to yesyes on more than one machine in your network.

                  >workgroup (G)workgroup (G)

                  This controls what workgroup your server will @@ -17955,12 +19435,9 @@ CLASS="COMMAND" > setting.

                  Default: Default: set at compile time to WORKGROUP

                  Example: >writable (S)writable (S)

                  Synonym for writeable writeable for people who can't spell :-).

                  >write cache size (S)write cache size (S)

                  If this integer parameter is set to non-zero value, Samba will create an in-memory cache for each oplocked file - (it does not do this for non-oplocked files). All writes that the client does not request to be flushed directly to disk will be stored in this cache if possible. @@ -18031,16 +19507,18 @@ CLASS="COMMAND" >>write list (S)write list (S)

                  This is a list of users that are given read-write access to a service. If the connecting user is in this list then they will be given write access, no matter what the read onlyread only option is set to. The list can include group names using the @@ -18051,10 +19529,12 @@ CLASS="PARAMETER" >

                  See also the read list - option.

                  >wins partners (G)wins partners (G)

                  A space separated list of partners' IP addresses for @@ -18098,14 +19578,16 @@ CLASS="COMMAND" >>write ok (S)write ok (S)

                  Inverted synonym for read only read only.

                  >write raw (G)write raw (G)

                  This parameter controls whether or not the server @@ -18129,14 +19611,16 @@ CLASS="COMMAND" >>writeable (S)writeable (S)

                  Inverted synonym for read only read only.

                  WARNINGS

                  On a similar note, many clients - especially DOS clients - - limit service names to eight characters. smbd(8)smbd(8) + has no such limitation, but attempts to connect from such clients will fail if they truncate the service names. For this reason you should probably keep your service names down to eight characters @@ -18177,81 +19660,97 @@ CLASS="REFENTRYTITLE" >

                  VERSION

                  This man page is correct for version 3.0 of the Samba suite.

                  This man page is correct for version 3.0 of + the Samba suite.

                  SEE ALSO

                  samba(7), smbpasswd(8), swat(8), smbd(8), nmbd(8), smbclient(1), nmblookup(1), testparm(1), testprns(1).

                  samba(7), + smbpasswd(8), + swat(8), + smbd(8), + nmbd(8), + smbclient(1), + nmblookup(1), + testparm(1), + testprns(1) +

                  AUTHOR

                  The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy.

                  smbcacls

                  smbcacls

                  DESCRIPTION

                  This tool is part of the Samba(7)This tool is part of the Samba suite.

                  The

                  OPTIONS

                  Specifies a username used to connect to the specified service. The username may be of the form "username" in which case the user is prompted to enter in a password and the - workgroup specified in the smb.conf(5)smb.conf file is used, or "username%password" or "DOMAIN\username%password" and the password and workgroup names are used as provided.

                  The owner of a file or directory can be changed - to the name given using the -C-C option. The name can be a sid in the form S-1-x-y-z or a name resolved against the server specified in the first argument.

                  The group owner of a file or directory can - be changed to the name given using the -G-G option. The name can be a sid in the form S-1-x-y-z or a name resolved against the server specified n the first argument. @@ -183,7 +182,7 @@ CLASS="COMMAND" >

                  ACL FORMAT

                   
                  -REVISION:<revision number>
                  -OWNER:<sid or name>
                  -GROUP:<sid or name>
                  -ACL:<sid or name>:<type>/<flags>/<mask>

                  The revision of the ACL specifies the internal Windows @@ -211,45 +211,34 @@ ACL:<sid or name>:<type>/<flags>/<mask>

                  ACLs specify permissions granted to the SID. This SID again - can be specified in CWS-1-x-y-z format or as a name in which case - it is resolved against the server on which the file or directory - resides. The type, flags and mask values determine the type of - access granted to the SID.

                  The type can be either 0 or 1 corresponding to ALLOWED or - DENIED access to the SID. The flags values are generally - zero for file ACLs and either 9 or 2 for directory ACLs. Some - common flags are:

                  • #define SEC_ACE_FLAG_OBJECT_INHERIT 0x1

                    #define SEC_ACE_FLAG_OBJECT_INHERIT 0x1

                  • #define SEC_ACE_FLAG_CONTAINER_INHERIT 0x2

                    #define SEC_ACE_FLAG_CONTAINER_INHERIT 0x2

                  • #define SEC_ACE_FLAG_NO_PROPAGATE_INHERIT 0x4

                    #define SEC_ACE_FLAG_NO_PROPAGATE_INHERIT 0x4 +

                  • #define SEC_ACE_FLAG_INHERIT_ONLY 0x8

                    #define SEC_ACE_FLAG_INHERIT_ONLY 0x8

                  EXIT STATUS

                  VERSION

                  This man page is correct for version 2.2 of the Samba suite.

                  This man page is correct for version 2.2 of + the Samba suite.

                  AUTHOR

                  The conversion to DocBook for Samba 2.2 was done - by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 was done - by Alexander Bokovoy.

                  smbclient

                  smbclient

                  smbclient {servicename} [password] [-b <buffer size>] [-d debuglevel] [-D Directory] [-U username] [-W workgroup] [-M <netbios name>] [-m maxprotocol] [-A authfile] [-N] [-l logfile] [-L <netbios name>] [-I destinationIP] [-E] [-c <command string>] [-i scope] [-O <socket options>] [-p port] [-R <name resolve order>] [-s <smb config file>] [-T<c|x>IXFqgbNan] [-k]

                  {servicename} [password] [-b <buffer size>] [-d debuglevel] [-D Directory] [-U username] [-W workgroup] [-M <netbios name>] [-m maxprotocol] [-A authfile] [-N] [-l logfile] [-L <netbios name>] [-I destinationIP] [-E] [-c <command string>] [-i scope] [-O <socket options>] [-p port] [-R <name resolve order>] [-s <smb config file>] [-T<c|x>IXFqgbNan]

                  DESCRIPTION

                  This tool is part of the Samba(7)This tool is part of the Samba suite.

                  smbclient is a client that can 'talk' to an SMB/CIFS server. It offers an interface - similar to that of the ftp program (see ftp(1)ftp(1)). Operations include things like getting files from the server to the local machine, putting files from the local machine to @@ -76,7 +71,7 @@ CLASS="REFENTRYTITLE" >

                  OPTIONS

                  //server/service where where server - is the NetBIOS name of the SMB/CIFS server - offering the desired service and serviceservice is the name of the service offered. Thus to connect to the service "printer" on the SMB/CIFS server "smbserver", @@ -118,20 +117,18 @@ CLASS="FILENAME"

                  The server name is looked up according to either - the -R-R parameter to smbclient or - using the name resolve order parameter in - the smb.conf(5)smb.conf file, allowing an administrator to change the order and methods by which server names are looked up.

                  The password required to access the specified service on the specified server. If this parameter is - supplied, the -N-N option (suppress password prompt) is assumed.

                  There is no default password. If no password is supplied on the command line (either by using this parameter or adding - a password to the -U-U option (see - below)) and the -N-N option is not specified, the client will prompt for a password, even if the desired service does not require one. (If no password is @@ -175,13 +178,10 @@ CLASS="PARAMETER" >-s smb.conf

                  Specifies the location of the all - important smb.conf(5)Specifies the location of the all important + smb.conf file.

                  TCP socket options to set on the client - socket. See the socket options parameter in - the smb.conf(5) manual page for the list of valid + socket. See the socket options parameter in the smb.conf (5) manpage for the list of valid options.

                  -R <name resolve order>
                  -R <name resolve order>

                  This option is used by the programs in the Samba @@ -209,33 +205,30 @@ CLASS="REFENTRYTITLE" string of different name resolution options.

                  The options are :"lmhosts", "host", "wins" and "bcast". They - cause names to be resolved as follows:

                  • lmhosts: Lookup an IP +>lmhosts : Lookup an IP address in the Samba lmhosts file. If the line in lmhosts has - no name type attached to the NetBIOS name (see - the lmhosts(5)lmhosts(5) for details) then any name type matches for lookup.

                  • host: Do a standard host +>host : Do a standard host name to IP address resolution, using the system /etc/hosts @@ -252,27 +245,31 @@ CLASS="FILENAME" >

                  • wins: Query a name with - the IP address listed in the wins : Query a name with + the IP address listed in the wins serverwins server parameter. If no WINS server has been specified this method will be ignored.

                  • bcast: Do a broadcast on +>bcast : Do a broadcast on each of the known local interfaces listed in the - interfacesinterfaces parameter. This is the least reliable of the name resolution methods as it depends on the target host being on a locally @@ -281,26 +278,22 @@ CLASS="PARAMETER" >

                  If this parameter is not set then the name resolve order - defined in the smb.conf(5)smb.conf file parameter (name resolve order) will be used.

                  The default order is lmhosts, host, wins, bcast and without - this parameter or any entry in the name resolve order - parameter of the smb.conf(5) parameter of the smb.conf file the name resolution methods will be attempted in this order.

                  to the machine FRED.

                  You may also find the You may also find the -U-U and - -I-I options useful, as they allow you to control the FROM and TO parts of the message.

                  See the message command parameter in the smb.conf(5)See the message command parameter in the smb.conf(5) for a description of how to handle incoming WinPopup messages in Samba.

                  -d debuglevel

                  debugleveldebuglevel is an integer from 0 to 10, or the letter 'A'.

                  debugleveldebuglevel is set to the letter 'A', then -l logfilename

                  If specified, If specified, logfilenamelogfilename specifies a base filename into which operational data from the running client will be logged.

                  -I IP-address

                  IP addressIP address is the address of the server to connect to. It should be specified in standard "a.b.c.d" notation.

                  Normally the client would attempt to locate a named SMB/CIFS server by looking it up via the NetBIOS name resolution - mechanism described above in the name resolve ordername resolve order parameter above. Using this parameter will force the client to assume that the server is on the machine with the specified IP @@ -544,19 +545,19 @@ CLASS="PARAMETER" >

                  Sets the SMB username or username and password. If %pass is not specified, The user will be prompted. The client - will first check the USERUSER environment variable, then the - LOGNAMELOGNAME variable and if either exists, the string is uppercased. Anything in these variables following a '%' sign will be treated as the password. If these environment - variables are not found, the username GUESTGUEST is used.

                  smbclient will look for - a PASSWDPASSWD environment variable from which to read the password.

                  -A-A for more details.

                  Be cautious about including passwords in scripts or in - the PASSWDPASSWD environment variable. Also, on many systems the command line of a running process may be seen via the

                  username = <value> 
                  -password = <value>
                  -domain = <value>
                  username = <value> +password = <value> +domain = <value> +

                  If the domain parameter is missing the current workgroup name @@ -627,10 +631,12 @@ domain = <value>smbclient -L host and a list should appear. The and a list should appear. The -I - option may be useful if your NetBIOS names don't match your TCP/IP DNS host names or if you are trying to reach a host on another network.

                  Override the default workgroup (domain) specified - in the workgroup parameter of the smb.conf(5) file for this connection. This may be - needed to connect to some servers.

                  smb.conf + file for this connection. This may be needed to connect to some + servers.

                  -T tar options
                  • cc - Create a tar file on UNIX. Must be followed by the name of a tar file, tape device or "-" for standard output. If using standard output you must turn the log level to its lowest value -d0 to avoid corrupting your tar file. This flag is mutually exclusive with the - xx flag.

                  • xx - Extract (restore) a local tar file back to a share. Unless the -D option is given, the tar files will be restored from the top level of the share. Must be followed by the name of the tar file, device or "-" for standard - input. Mutually exclusive with the cc flag. Restored files have their creation times (mtime) set to the date saved in the tar file. Directories currently do not get @@ -741,9 +753,11 @@ CLASS="PARAMETER" >

                  • II - Include files and directories. Is the default behavior when filenames are specified above. Causes tar files to be included in an extract or create (and therefore @@ -752,22 +766,28 @@ CLASS="PARAMETER" >

                  • XX - Exclude files and directories. Causes tar files to be excluded from an extract or create. See example below. Filename globbing works in one of two ways now. - See rr below.

                  • bb - Blocksize. Must be followed by a valid (greater than zero) blocksize. Causes tar file to be written out in blocksize*TBLOCK (usually 512 byte) blocks. @@ -775,30 +795,38 @@ CLASS="PARAMETER" >

                  • gg - Incremental. Only back up files that have the archive bit set. Useful only with the - cc flag.

                  • qq - Quiet. Keeps tar from printing diagnostics as it works. This is the same as tarmode quiet.

                  • rr - Regular expression include or exclude. Uses regular expression matching for excluding or excluding files if compiled with HAVE_REGEX_H. @@ -808,31 +836,41 @@ CLASS="PARAMETER" >

                  • NN - Newer than. Must be followed by the name of a file whose date is compared against files found on the share during a create. Only files newer than the file specified are backed up to the tar file. Useful only with the - cc flag.

                  • aa - Set archive bit. Causes the archive bit to be reset when a file is backed up. Useful with the - g and g and cc flags.

                  • All file names can be given as DOS path names (with '\\' +>All file names can be given as DOS path names (with '\' as the component separator) or as UNIX path names (with '/' as the component separator).

                    command string is a semicolon-separated list of - commands to be executed instead of prompting from stdin. -N is implied by -N is implied by -c-c.

                    This is particularly useful in scripts and for printing stdin @@ -958,21 +1000,13 @@ CLASS="COMMAND" >-c 'print -'.

                    -k

                    Try to authenticate with kerberos. Only useful in - an Active Directory environment. -

                  OPERATIONS

                  Once the client is running, the user is presented with a prompt :

                  smb:\> smb:\>

                  The backslash ("\\") indicates the current working directory +>The backslash ("\") indicates the current working directory on the server, and will change if the current working directory is changed.

                  Parameters shown in square brackets (e.g., "[parameter]") are optional. If not given, the command will use suitable defaults. Parameters - shown in angle brackets (e.g., "<parameter>") are required. + shown in angle brackets (e.g., "<parameter>") are required.

                  Note that all commands operating on the server are actually @@ -1020,9 +1054,11 @@ CLASS="VARIABLELIST" >? [command]

                  If If commandcommand is specified, the ? command will display a brief informative message about the specified command. If no command is specified, a list of available commands will @@ -1032,9 +1068,11 @@ CLASS="REPLACEABLE" >! [shell command]

                  If If shell commandshell command is specified, the ! command will execute a shell locally and run the specified shell command. If no command is specified, a local shell will be run. @@ -1089,23 +1127,27 @@ CLASS="REPLACEABLE" directory on the server will be reported.

                  del <mask>
                  del <mask>

                  The client will request that the server attempt - to delete all files matching maskmask from the current working directory on the server.

                  dir <mask>
                  dir <mask>

                  A list of the files matching A list of the files matching maskmask in the current working directory on the server will be retrieved from the server and displayed.

                  get <remote file name> [local file name]
                  get <remote file name> [local file name]

                  Copy the file called lcd [directory name]

                  If If directory namedirectory name is specified, the current working directory on the local machine will be changed to the directory specified. This operation will fail if for any @@ -1181,13 +1225,13 @@ CLASS="REPLACEABLE" lowercase filenames are the norm on UNIX systems.

                  ls <mask>
                  ls <mask>

                  See the dir command above.

                  mask <mask>
                  mask <mask>

                  This command allows the user to set up a mask @@ -1213,24 +1257,28 @@ CLASS="REPLACEABLE" mask back to "*" after using the mget or mput commands.

                  md <directory name>
                  md <directory name>

                  See the mkdir command.

                  mget <mask>
                  mget <mask>

                  Copy all files matching Copy all files matching maskmask from the server to the machine running the client.

                  Note that Note that maskmask is interpreted differently during recursive operation and non-recursive operation - refer to the recurse and mask commands for more information. Note that all transfers in @@ -1240,26 +1288,30 @@ CLASS="COMMAND" > are binary. See also the lowercase command.

                  mkdir <directory name>
                  mkdir <directory name>

                  Create a new directory on the server (user access privileges permitting) with the specified name.

                  mput <mask>
                  mput <mask>

                  Copy all files matching Copy all files matching maskmask in the current working directory on the local machine to the current working directory on the server.

                  Note that Note that maskmask is interpreted differently during recursive operation and non-recursive operation - refer to the recurse and mask commands for more information. Note that all transfers in

                  print <file name>
                  print <file name>

                  Print the specified file from the local machine @@ -1278,7 +1330,7 @@ CLASS="COMMAND" >See also the printmode command.

                  printmode <graphics or text>
                  printmode <graphics or text>

                  Set the print mode to suit either binary data @@ -1298,7 +1350,7 @@ CLASS="COMMAND"

                  put <local file name> [remote file name]
                  put <local file name> [remote file name]

                  Copy the file called See the exit command.

                  rd <directory name>
                  rd <directory name>

                  See the rmdir command.

                  rm <mask>
                  rm <mask>

                  Remove all files matching Remove all files matching maskmask from the current working directory on the server.

                  rmdir <directory name>
                  rmdir <directory name>

                  Remove the specified directory (user access privileges permitting) from the server.

                  setmode <filename> <perm=[+|\-]rsha>
                  setmode <filename> <perm=[+|\-]rsha>

                  A version of the DOS attrib command to set @@ -1397,13 +1451,15 @@ CLASS="COMMAND"

                  tar <c|x>[IXbgNa]
                  tar <c|x>[IXbgNa]

                  Performs a tar operation - see the Performs a tar operation - see the -T - command line option above. Behavior may be affected by the tarmode command (see below). Using g (incremental) and N (newer) will affect tarmode settings. Note that using the "-" option @@ -1411,18 +1467,20 @@ CLASS="PARAMETER"

                  blocksize <blocksize>
                  blocksize <blocksize>

                  Blocksize. Must be followed by a valid (greater than zero) blocksize. Causes tar file to be written out in - blocksizeblocksize*TBLOCK (usually 512 byte) blocks.

                  tarmode <full|inc|reset|noreset>
                  tarmode <full|inc|reset|noreset>

                  Changes tar's behavior with regard to archive @@ -1438,7 +1496,7 @@ CLASS="REPLACEABLE" >

                  NOTES

                  ENVIRONMENT VARIABLES

                  The variable The variable USERUSER may contain the username of the person using the client. This information is used only if the protocol level is high enough to support session-level passwords.

                  The variable The variable PASSWDPASSWD may contain the password of the person using the client. This information is used only if the protocol level is high enough to support session-level passwords.

                  The variable The variable LIBSMB_PROGLIBSMB_PROG may contain the path, executed with system(), which the client should connect to instead of connecting to a server. This functionality is primarily @@ -1492,7 +1550,7 @@ CLASS="ENVAR" >

                  INSTALLATION

                  To test the client, you will need to know the name of a - running SMB/CIFS server. It is possible to run smbd(8)smbd(8) + as an ordinary user - running that server as a daemon on a user-accessible port (typically any port number over 1024) would provide a suitable test server.

                  DIAGNOSTICS

                  VERSION

                  This man page is correct for version 2.2 of the Samba suite.

                  This man page is correct for version 2.2 of + the Samba suite.

                  AUTHOR

                  The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 - was done by Alexander Bokovoy.

                  smbcontrol

                  smbcontrol

                  DESCRIPTION

                  This tool is part of the Samba(7)This tool is part of the Samba suite.

                  smbcontrol is a very small program, which - sends messages to a smbd(8), a nmbd(8), or a winbindd(8) daemon running on the system.

                  smbd(8), + an nmbd(8) + or a winbindd(8) + daemon running on the system.

                  OPTIONS

                  destination

                  One of One of nmbd, nmbd + smbdsmbd or a process ID.

                  The The smbdsmbd destination causes the message to "broadcast" to all smbd daemons.

                  The The nmbdnmbd destination causes the message to be sent to the nmbd daemon specified in the message-type

                  One of: One of: close-shareclose-share, - debugdebug, - force-election, force-election, ping - , , profile, profile, debuglevel, debuglevel, profilelevelprofilelevel, - or printnotifyprintnotify.

                  The The close-shareclose-share message-type sends a message to smbd which will then close the client connections to the named share. Note that this doesn't affect client connections @@ -180,25 +184,25 @@ CLASS="CONSTANT" share name for which client connections will be closed, or the "*" character which will close all currently open shares. This may be useful if you made changes to the access controls on the share. - This message can only be sent to smbdsmbd.

                  The The debugdebug message-type allows the debug level to be set to the value specified by the parameter. This can be sent to any of the destinations.

                  The The force-electionforce-election message-type can only be - sent to the nmbdnmbd destination. This message causes the daemon to force a new browse master election.

                  The The pingping message-type sends the number of "ping" messages specified by the parameter and waits for the same number of reply "pong" messages. This can be sent to any of the destinations.

                  The The profileprofile message-type sends a message to an smbd to change the profile settings based on the parameter. The parameter can be "on" to turn on profile stats @@ -225,25 +229,25 @@ CLASS="CONSTANT" disabled), and "flush" to zero the current profile stats. This can be sent to any smbd or nmbd destinations.

                  The The debugleveldebuglevel message-type sends a "request debug level" message. The current debug level setting is returned by a "debuglevel" message. This can be sent to any of the destinations.

                  The The profilelevelprofilelevel message-type sends a "request profile level" message. The current profile level setting is returned by a "profilelevel" message. This can be sent to any smbd or nmbd destinations.

                  The The printnotifyprintnotify message-type sends a message to smbd which in turn sends a printer notify message to any Windows NT clients connected to a printer. This message-type @@ -300,9 +304,9 @@ CLASS="VARIABLELIST" event has occured. It doesn't actually cause the event to happen. - This message can only be sent to smbdsmbd.

                  VERSION

                  SEE ALSO

                  nmbd(8) and smbd(8).

                  nmbd(8), + and smbd(8). +

                  AUTHOR

                  The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for - Samba 3.0 was done by Alexander Bokovoy.

                  + smbd

                  smbd

                  smbd

                  Synopsis

                  smbd [-D] [-F] [-S] [-i] [-h] [-V] [-b] [-d <debug level>] [-l <log directory>] [-p <port number>] [-O <socket option>] [-s <configuration file>]

                  [-D] [-F] [-S] [-i] [-h] [-V] [-b] [-d <debug level>] [-l <log directory>] [-p <port number>] [-O <socket option>] [-s <configuration file>]

                  DESCRIPTION

                  This program is part of the Samba(7) suite.

                  This program is part of the Samba suite.

                  An extensive description of the services that the server can provide is given in the man page for the configuration file controlling the attributes of those - services (see smb.conf(5)smb.conf(5) + . This man page will not describe the services, but will concentrate on the administrative aspects of running the server.

                  Please note that there are significant security - implications to running this server, and the smb.conf(5) manual page should be regarded as mandatory reading before + implications to running this server, and the smb.conf(5) + manpage should be regarded as mandatory reading before proceeding with installation.

                  A session is created whenever a client requests one. @@ -109,7 +104,7 @@ CLASS="COMMAND" >

                  OPTIONS

                  -d <debug level>

                  debugleveldebuglevel is an integer from 0 to 10. The default value if this parameter is not specified is zero.

                  log - level parameter in the smb.conf(5) parameter in the smb.conf(5) file.

                  If specified, - log directorylog directory specifies a log directory into which the "log.smbd" log file will be created for informational and debug @@ -283,23 +280,18 @@ CLASS="REPLACEABLE" its size may be controlled by the max log sizemax log size - option in the smb.conf(5) file. smb.conf(5) file. Beware: If the directory specified does not exist, See the socket optionssocket options - parameter in the smb.conf(5)smb.conf(5) + file for details.

                  -p <port number>

                  port numberport number is a positive integer value. The default value if this parameter is not specified is 139.

                  smb.conf(5) smb.conf(5) for more information. The default configuration file name is determined at compile time.

                  FILES

                  meta-daemon, this file must contain suitable startup information for the meta-daemon. See the "How to Install and Test SAMBA"UNIX_INSTALL.html document for details.

                  If running the server as a daemon at startup, this file will need to contain an appropriate startup sequence for the server. See the "How to Install and Test SAMBA"UNIX_INSTALL.html document for details.

                  "How to Install and Test SAMBA"UNIX_INSTALL.html document for details.

                This is the default location of the smb.conf(5) server configuration file. Other common places that systems +>This is the default location of the + smb.conf + server configuration file. Other common places that systems install this file are /usr/samba/lib/smb.conf and /etc/samba/smb.conf/etc/smb.conf.

                This file describes all the services the server - is to make available to clients. See smb.conf(5) for more information.

                smb.conf(5) for more information.

      LIMITATIONS

      ENVIRONMENT VARIABLES

      PRINTERPRINTER

      If no printer name is specified to printable services, most systems will use the value of - this variable (or lplp if this variable is not defined) as the name of the printer to use. This is not specific to the server, however.

      PAM INTERACTION

      Samba uses PAM for authentication (when presented with a plaintext password), for account checking (is this account disabled?) and for session management. The degree too which samba supports PAM is restricted - by the limitations of the SMB protocol and the obey - pam restricions smb.conf(5) paramater. When this is set, the following restrictions apply: +>obey pam restricions + smb.conf paramater. When this is set, the following restrictions apply:

      • Account Validation: All accesses to a samba server are checked against PAM to see if the account is vaild, not disabled and is permitted to @@ -586,12 +573,9 @@ CLASS="EMPHASIS" >

      • Session Management: When not using share level secuirty, users must pass PAM's session checks before access is granted. Note however, that this is bypassed in share level secuirty. @@ -604,7 +588,7 @@ CLASS="EMPHASIS" >

        VERSION

        DIAGNOSTICS

        SIGNALS

        SIGKILL (-9) NOT be used, except as a last resort, as this may leave the shared memory area in an inconsistent state. The safe way to terminate @@ -679,14 +660,16 @@ CLASS="COMMAND" CLASS="COMMAND" >smbd
        may be raised - or lowered using smbcontrol(1) program (SIGUSR[1|2] signals are no longer - used since Samba 2.2). This is to allow transient problems to be diagnosed, + or lowered using smbcontrol(1) + program (SIGUSR[1|2] signals are no longer used in + Samba 2.2). This is to allow transient problems to be diagnosed, whilst still running at a normally low log level.

        Note that as the signal handlers send a debug write, @@ -705,55 +688,55 @@ CLASS="COMMAND" >

        SEE ALSO

        hosts_access(5), inetd(8), nmbd(8), smb.conf(5), smbclient(1), testparm(1), testprns(1), and the - Internet RFC's hosts_access(5), inetd(8), + nmbd(8), + smb.conf(5) + , smbclient(1) + , testparm(1), testprns(1), and the Internet RFC's + rfc1001.txt,

        AUTHOR

        The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for - Samba 3.0 was done by Alexander Bokovoy.

        + smbgroupedit

        smbgroupedit

        smbgroupedit

        Synopsis

        smbroupedit [-v [l|s]] [-a UNIX-groupname [-d NT-groupname|-p privilege|]]

        [-v [l|s]] [-a UNIX-groupname [-d NT-groupname|-p privilege|]]

        DESCRIPTION

        This program is part of the Samba(7) suite.

        This program is part of the Samba +suite.

        The smbgroupedit command allows for mapping unix groups to NT Builtin, Domain, or Local groups. Also @@ -63,7 +59,7 @@ etc.

        OPTIONS

        give a long listing, of the format:

        "NT Group Name"
        @@ -98,10 +100,20 @@ CLASS="PROGRAMLISTING"
             Group type     :
             Comment        :
             Privilege      :

        For example: -

        For examples,

        Users
             SID       : S-1-5-32-545
        @@ -109,6 +121,9 @@ CLASS="PROGRAMLISTING"
             Group type: Local group
             Comment   :
             Privilege : No privilege

      display a short listing of the format:

      NTGroupName(SID) -> UnixGroupName

      For example: -

      For example,

      Users (S-1-5-32-545) -> -1

      /etc/group), let's call it ), let's call it domadmdomadm.

    • map this domadm group to the 'domain admins' group:

      map this domadm group to the 'domain admins' group: +

      1. Get the SID for the Windows NT "Domain Admins" group:

        Get the SID for the Windows NT "Domain Admins" + group:

        root# root# smbgroupedit -vs | grep "Domain Admins"
         Domain Admins (S-1-5-21-1108995562-3116817432-1375597819-512) -> -1

      2. map the unix domadm group to the Windows NT "Domain Admins" group, by running the command: -

        root# root# smbgroupedit \
         -c S-1-5-21-1108995562-3116817432-1375597819-512 \
         -u domadm -td

        warning: don't copy and paste this sample, the Domain Admins SID (the S-1-5-21-...-512) is different for every PDC.

      To verify that your mapping has taken effect: -

      To verify that your mapping has taken effect:

      root# root# smbgroupedit -vs|grep "Domain Admins"
       Domain Admins (S-1-5-21-1108995562-3116817432-1375597819-512) -> domadm

      To give access to a certain directory on a domain member machine (an NT/W2K or a samba server running winbind) to some users who are member -of a group on your samba PDC, flag that group as a domain group: -

      root# root# smbgroupedit -a unixgroup -td

    • VERSION

      SEE ALSO

      smb.conf(5)smb.conf(5)

      AUTHOR

      smbgroupedit
      was written by Jean Francois Micouleau. The current set of manpages and documentation is maintained -by the Samba Team in the same fashion as the Samba source code. The conversion -to DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy.

      smbmnt

      smbmnt

      smbmnt {mount-point} [-s <share>] [-r] [-u <uid>] [-g <gid>] [-f <mask>] [-d <mask>] [-o <options>]

      {mount-point} [-s <share>] [-r] [-u <uid>] [-g <gid>] [-f <mask>] [-d <mask>] [-o <options>]

      smbmnt program is normally invoked - by smbmount(8)smbmount(8) + . It should not be invoked directly by users.

      smbmount searches the normal PATH for smbmnt. You must ensure @@ -79,7 +81,7 @@ CLASS="REFENTRYTITLE" >

      OPTIONS

      AUTHOR

      The conversion of this manpage for Samba 2.2 was performed - by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 - was done by Alexander Bokovoy.

      smbmount

      smbmount

      mount.smbfs by - the mount(8)mount(8) command when using the "-t smbfs" option. This command only works in Linux, and the kernel must support the smbfs filesystem.

      log.smbmount
      . The . The + smbmountsmbmount process may also be called mount.smbfs.

      smbmount - calls smbmnt(8)smbmnt(8) to do the actual mount. You must make sure that

      OPTIONS

      username=<arg>
      username=<arg>

      specifies the username to connect as. If - this is not given, then the environment variable USER USER is used. This option can also take the form "user%password" or "user/workgroup" or "user/workgroup%password" to allow the password and workgroup to be specified as part of the username.

      password=<arg>
      password=<arg>

      specifies the SMB password. If this option is not given then the environment variable - PASSWDPASSWD is used. If it can find no password

      credentials=<filename>
      credentials=<filename>

      specifies a file that contains a username and/or password. -The format of the file is: -

      specifies a file that contains a username
      +		and/or password. The format of the file is:

      username = <value>
      -password = <value>

      username = <value> + password = <value> +
      +

      This is preferred over having passwords in plaintext in a shared file, such as

      netbiosname=<arg>
      netbiosname=<arg>

      sets the source NetBIOS name. It defaults to the local hostname.

      uid=<arg>
      uid=<arg>

      sets the uid that will own all files on @@ -197,7 +195,7 @@ CLASS="FILENAME"

      gid=<arg>
      gid=<arg>

      sets the gid that will own all files on @@ -206,14 +204,14 @@ CLASS="FILENAME" gid.

      port=<arg>
      port=<arg>

      sets the remote SMB port number. The default is 139.

      fmask=<arg>
      fmask=<arg>

      sets the file mask. This determines the @@ -221,7 +219,7 @@ CLASS="FILENAME" The default is based on the current umask.

      dmask=<arg>
      dmask=<arg>

      sets the directory mask. This determines the @@ -229,7 +227,7 @@ CLASS="FILENAME" The default is based on the current umask.

      debug=<arg>
      debug=<arg>

      sets the debug level. This is useful for @@ -238,40 +236,40 @@ CLASS="FILENAME" output, possibly hiding the useful output.

      ip=<arg>
      ip=<arg>

      sets the destination host or IP address.

      workgroup=<arg>
      workgroup=<arg>

      sets the workgroup on the destination

      sockopt=<arg>
      sockopt=<arg>

      sets the TCP socket options. See the smb.conf(5)smb.conf + socket optionssocket options option.

      scope=<arg>
      scope=<arg>

      sets the NetBIOS scope

      mount read-write

      iocharset=<arg>
      iocharset=<arg>

      sets the charset used by the Linux side for codepage @@ -305,7 +303,7 @@ CLASS="PARAMETER"

      codepage=<arg>
      codepage=<arg>

      sets the codepage the server uses. See the iocharset @@ -314,7 +312,7 @@ CLASS="PARAMETER"

      ttl=<arg>
      ttl=<arg>

      sets how long a directory listing is cached in milliseconds @@ -334,31 +332,31 @@ CLASS="PARAMETER" >

      ENVIRONMENT VARIABLES

      The variable The variable USERUSER may contain the username of the person using the client. This information is used only if the protocol level is high enough to support session-level passwords. The variable can be used to set both username and password by using the format username%password.

      The variable The variable PASSWDPASSWD may contain the password of the person using the client. This information is used only if the protocol level is high enough to support session-level passwords.

      The variable The variable PASSWD_FILEPASSWD_FILE may contain the pathname of a file to read the password from. A single line of input is read and used as the password.

      BUGS

      SEE ALSO

      FreeBSD also has a smbfs, but it is not related to smbmount

      For Solaris, HP-UX and others you may want to look at smbsh(1) or at other solutions, such as - Sharity or perhaps replacing the SMB server with a NFS server.

      For Solaris, HP-UX and others you may want to look at + smbsh(1) or at other + solutions, such as sharity or perhaps replacing the SMB server with + a NFS server.

      AUTHOR

      The conversion of this manpage for Samba 2.2 was performed - by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 - was done by Alexander Bokovoy.

      smbpasswd

      smbpasswd

      DESCRIPTION

      This tool is part of the Samba(7)This tool is part of the Samba suite.

      smbpasswd is the Samba encrypted password file. It contains @@ -64,7 +62,7 @@ CLASS="REFENTRYTITLE" >

      FILE FORMAT

      disableddisabled
      and the user will not be able to log onto the Samba server.

      - This means the account has no password (the passwords in the fields LANMAN Password Hash and NT Password Hash are ignored). Note that this - will only allow users to log on with no password if the null passwords null passwords parameter is set in the smb.conf(5)smb.conf(5) + config file.

      D - This means the account - is disabled and no SMB/CIFS logins will be allowed for this user.

    • VERSION

      SEE ALSO

      smbpasswd(8), Samba(7)smbpasswd(8), + samba(7), and the Internet RFC1321 for details on the MD4 algorithm.

      AUTHOR

      The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy.

      + smbpasswd

      smbpasswd

      smbpasswd

      Synopsis

      smbpasswd [-a] [-x] [-d] [-e] [-D debuglevel] [-n] [-r <remote machine>] [-R <name resolve order>] [-m] [-U username[%password]] [-h] [-s] [-w pass] [-i] [-L] [username]

      [-a] [-x] [-d] [-e] [-D debuglevel] [-n] [-r <remote machine>] [-R <name resolve order>] [-m] [-U username[%password]] [-h] [-s] [-w pass] [-i] [-L] [username]

      DESCRIPTION

      This tool is part of the Samba(7)This tool is part of the Samba suite.

      The smbpasswd program has several different - functions, depending on whether it is run by the root user - or not. When run as a normal user it allows the user to change +> + user or not. When run as a normal user it allows the user to change the password used for their SMB sessions on any machines that store SMB passwords.

      passwd(1) program works. program works. + smbpasswdsmbpasswd differs from how the passwd program works - however in that it is not setuid root but works in - a client-server mode and communicates with a - locally running smbd(8)smbd(8). As a consequence in order for this to succeed the smbd daemon must be running on the local machine. On a UNIX machine the encrypted SMB passwords are usually stored in - the smbpasswd(5)smbpasswd(5) file.

      When run by an ordinary user with no options, smbpasswd @@ -111,20 +95,14 @@ CLASS="REFENTRYTITLE" >

      smbpasswd can also be used by a normal user to change their SMB password on remote machines, such as Windows NT Primary Domain - Controllers. See the (-r) and -U options - below.

      When run by root, smbpasswd allows new users to be added and deleted in the smbpasswd file, as well as allows changes to - the attributes of the user in this file to be made. When run by root, smbpasswdsmbpasswd accesses the local smbpasswd file directly, thus enabling changes to be made even if smbd is not running.

      OPTIONS

      This option specifies that the username following - should be disableddisabled in the local smbpasswd - file. This is done by writing a 'D''D' flag into the account control space in the smbpasswd file. Once this is done all attempts to authenticate via SMB using this username @@ -191,12 +169,10 @@ CLASS="CONSTANT" >

      If the smbpasswd file is in the 'old' format (pre-Samba 2.0 format) there is no space in the user's password entry to write - this information and the command will FAIL. See smbpasswd(5)smbpasswd(5) + for details on the 'old' and new password file formats.

      This option specifies that the username following - should be enabledenabled in the local smbpasswd file, if the account was previously disabled. If the account was not disabled this option has no effect. Once the account is enabled then @@ -220,12 +196,9 @@ CLASS="CONSTANT" CLASS="COMMAND" > smbpasswd will FAIL to enable the account. - See smbpasswd(5)smbpasswd (5) for details on the 'old' and new password file formats.

      -D debuglevel

      debugleveldebuglevel is an integer from 0 to 10. The default value if this parameter is not specified is zero.

      This option allows a user to specify what machine they wish to change their password on. Without this parameter - smbpasswd defaults to the local host. The remote - machine name is the NetBIOS name of the SMB/CIFS server to contact to attempt the password change. This name is resolved into an IP address using the standard name resolution - mechanism in all programs of the Samba suite. See the -R - name resolve order parameter for details on changing this resolving mechanism.

      The username whose password is changed is that of the - current UNIX logged on user. See the -U username-U username parameter for details on changing the password for a different username.

      Note that Windows 95/98 do not have a real password database so it is not possible to change passwords specifying a Win95/98 machine as remote machine target.

      The options are :"lmhosts", "host", "wins" and "bcast". They - cause names to be resolved as follows:

      • lmhosts: Lookup an IP +>lmhosts : Lookup an IP address in the Samba lmhosts file. If the line in lmhosts has - no name type attached to the NetBIOS name (see the lmhosts(5)lmhosts(5) for details) then any name type matches for lookup.

      • host: Do a standard host +>host : Do a standard host name to IP address resolution, using the system /etc/hosts @@ -374,27 +350,31 @@ CLASS="FILENAME" >

      • wins: Query a name with - the IP address listed in the wins : Query a name with + the IP address listed in the wins serverwins server parameter. If no WINS server has been specified this method will be ignored.

      • bcast: Do a broadcast on +>bcast : Do a broadcast on each of the known local interfaces listed in the - interfacesinterfaces parameter. This is the least reliable of the name resolution methods as it depends on the target host being on a locally connected subnet.

        lmhosts, host, wins, bcast
        - and without this parameter or any entry in the smb.conf(5)smb.conf file the name resolution methods will be attempted in this order.

      This option may only be used in conjunction - with the -r-r option. When changing a password on a remote machine it allows the user to specify the user name on that machine whose password will be changed. It @@ -474,28 +454,34 @@ CLASS="COMMAND" --with-ldapsam option. The option. The -w-w switch is used to specify the password to be used with the ldap admin - dn. Note that the password is stored in the secrets.tdbprivate/secrets.tdb and is keyed off - of the admin's DN. This means that if the value of ldap - admin dn ever changes, the password will need to be manually updated as well.

      This specifies the username for all of the - root only options to operate on. Only root can specify this parameter as only root has the permission needed to modify attributes directly in the local smbpasswd file. @@ -540,7 +523,7 @@ CLASS="EMPHASIS" >

      NOTES

      smbd running on the local machine by specifying either running on the local machine by specifying a + allow - hosts or allow hosts or deny hosts entry in - the smb.conf(5)deny hosts + entry in the smb.conf file and neglecting to allow "localhost" access to the smbd.

      In addition, the smbpasswd command is only useful if Samba - has been set up to use encrypted passwords. See the document "LanMan and NT Password Encryption in Samba"ENCRYPTION.txt in the docs directory for details on how to do this.

      VERSION

      This man page is correct for version 3.0 of the Samba suite.

      This man page is correct for version 3.0 of + the Samba suite.

      SEE ALSO

      smbpasswd(5), Samba(7).

      smbpasswd(5), + samba(7) +

      AUTHOR

      The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy.

      + smbsh

      smbsh

      smbsh

      Synopsis

      smbsh [-W workgroup] [-U username] [-P prefix] [-R <name resolve order>] [-d <debug level>] [-l logfile] [-L libdir]

      [-W workgroup] [-U username] [-P prefix] [-R <name resolve order>] [-d <debug level>] [-l logfile] [-L libdir]

      DESCRIPTION

      This tool is part of the Samba(7)This tool is part of the Samba suite.

      OPTIONS

      Override the default workgroup specified in the - workgroup parameter of the smb.conf(5)smb.conf file for this session. This may be needed to connect to some servers.

      This option allows the user to set the directory prefix for SMB access. The default value if this option is not specified is - smb.

      The options are: "lmhosts", "host", "wins" and "bcast". +>The options are :"lmhosts", "host", "wins" and "bcast". They cause names to be resolved as follows :

      • lmhosts: +>lmhosts : Lookup an IP address in the Samba lmhosts file. If the line in lmhosts has no name type attached to the NetBIOS name - (see the lmhosts(5) for details) - then any name type matches for lookup. + (see the lmhosts(5) + for details) then any name type matches for lookup.

      • host: +>host : Do a standard host name to IP address resolution, using the system

      • wins: +>wins : Query a name with the IP address listed in the - wins serverwins server parameter. If no WINS server has been specified this method will be ignored. @@ -201,14 +190,16 @@ CLASS="PARAMETER" >

      • bcast: +>bcast : Do a broadcast on each of the known local interfaces - listed in the interfacesinterfaces parameter. This is the least reliable of the name resolution methods as it depends on the target host @@ -218,31 +209,25 @@ CLASS="PARAMETER" >

      If this parameter is not set then the name resolve order - defined in the smb.conf(5)smb.conf file parameter - (name resolve order) will be used.

      The default order is lmhosts, host, wins, bcast. Without - this parameter or any entry in the name resolve order - parameter of the smb.conf(5) file, the name resolution methods - will be attempted in this order.

      parameter of the smb.conf + file, the name resolution methods will be attempted in this + order.

    • -d <debug level>

      The higher this value, the more detail will be logged - about the activities of nmblookup(1)nmblookup. At level 0, only critical errors and serious warnings will be logged.

      If specified causes all debug messages to be - written to the file specified by logfilename - . If not specified then all messages will be - written tostderrstderr.

      EXAMPLES

      smbsh
      from the prompt and enter the username and password that authenticates you to the machine running the Windows NT - operating system. -

      	system% system% smbshsmbsh
      -Username: Username: useruser
      -Password: Password: XXXXXXX
      XXXXXXX +

      Any dynamically linked command you execute from @@ -371,17 +374,18 @@ CLASS="COMMAND" >

      VERSION

      This man page is correct for version 3.0 of the Samba suite.

      This man page is correct for version 3.0 of + the Samba suite.

      BUGS

      SEE ALSO

      smbd(8), smb.conf(5)

      smbd(8), + smb.conf(5) +

      AUTHOR

      The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy.

      smbspool

      smbspool

      DESCRIPTION

      This tool is part of the Samba(7)This tool is part of the Samba suite.

      smbspool is a very small print spooling program that @@ -89,14 +87,15 @@ CLASS="EMPHASIS" >

    • smb://username:password@workgroup/server/printer

      smb://username:password@workgroup/server/printer +

    • smbspool tries to get the URI from argv[0]. If argv[0] - contains the name of the program then it looks in the DEVICE_URI DEVICE_URI environment variable.

      Programs using the exec(2) functions can pass the URI in argv[0], while shell scripts must set the - DEVICE_URIDEVICE_URI environment variable prior to running smbspool.

      OPTIONS

      VERSION

      This man page is correct for version 2.2 of the Samba suite.

      This man page is correct for version 2.2 of + the Samba suite.

      SEE ALSO

      smbd(8) and Samba(7).

      smbd(8), + and samba(7). +

      AUTHOR

      The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy.

      smbstatus

      smbstatus

      smbstatus [-P] [-b] [-d <debug level>] [-v] [-L] [-B] [-p] [-S] [-s <configuration file>] [-u <username>]

      [-P] [-b] [-d <debug level>] [-v] [-L] [-B] [-p] [-S] [-s <configuration file>] [-u <username>]

      DESCRIPTION

      This tool is part of the Samba(7)This tool is part of the Samba suite.

      OPTIONS

      gives brief output.

      -d|--debug=<debuglevel>
      -d|--debug=<debuglevel>

      sets debugging to specified level

      -p|--processes

      print a list of smbd(8)print a list of smbd(8) processes and exit. Useful for scripting.

      causes smbstatus to only list shares.

      -s|--conf=<configuration file>
      -s|--conf=<configuration file>

      The default configuration file name is determined at compile time. The file specified contains the - configuration details required by the server. See smb.conf(5)smb.conf(5) + for more information.

      -u|--user=<username>
      -u|--user=<username>

      selects information relevant to - usernameusername only.

      VERSION

      SEE ALSO

      smbd(8) and smb.conf(5)smbd(8) and + smb.conf(5).

      AUTHOR

      The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy.

      smbtar

      smbtar

      DESCRIPTION

      This tool is part of the Samba(7)This tool is part of the Samba suite.

      smbtar is a very small shell script on top - of smbclient(1) which dumps SMB shares directly to tape.

      smbclient(1) + which dumps SMB shares directly to tape.

      OPTIONS

      -d directory

      Change to initial Change to initial directory - before restoring / backing up files.

      Tape device. May be regular file or tape - device. Default: $TAPE$TAPE environmental variable; if not set, a file called

      Log (debug) level. Corresponds to the - -d flag of smbclient(1).

      -d flag of smbclient(1) + .

      ENVIRONMENT VARIABLES

      The The $TAPE$TAPE variable specifies the default tape device to write to. May be overridden with the -t option.

      BUGS

      CAVEATS

      DIAGNOSTICS

      DIAGNOSTICS
      section for the smbclient(1) section for the + smbclient(1) + command.

      VERSION

      SEE ALSO

      smbd(8), smbclient(1), smb.conf(5).

      smbd(8), + smbclient(1), + smb.conf(5), +

      AUTHOR

      . Many thanks to everyone who suggested extensions, improvements, bug fixes, etc. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for - Samba 3.0 was done by Alexander Bokovoy.

      smbumount

      smbumount

      SEE ALSO

      smbmount(8)smbmount(8) +

      AUTHOR

      The conversion of this manpage for Samba 2.2 was performed - by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 - was done by Alexander Bokovoy.

      Samba performance issuesPrevNext

      Chapter 23. Samba performance issues

      Chapter 22. Samba performance issues

      23.1. Comparisons

      22.1. Comparisons

      The Samba server uses TCP to talk to the client. Thus if you are trying to see if it performs well you should really compare it to @@ -111,9 +108,7 @@ CLASS="SECT1" >

      23.2. Socket options

      22.2. Socket options

      There are a number of socket options that can greatly affect the performance of a TCP based server like Samba.

      23.3. Read size

      22.3. Read size

      The option "read size" affects the overlap of disk reads/writes with network reads/writes. If the amount of data being transferred in @@ -165,9 +158,7 @@ CLASS="SECT1" >

      23.4. Max xmit

      22.4. Max xmit

      At startup the client and server negotiate a "maximum transmit" size, which limits the size of nearly all SMB commands. You can set the @@ -188,9 +179,7 @@ CLASS="SECT1" >

      23.5. Log level

      22.5. Log level

      If you set the log level (also known as "debug level") higher than 2 then you may suffer a large drop in performance. This is because the @@ -202,9 +191,7 @@ CLASS="SECT1" >

      23.6. Read raw

      22.6. Read raw

      The "read raw" operation is designed to be an optimised, low-latency file read operation. A server may choose to not support it, @@ -224,9 +211,7 @@ CLASS="SECT1" >

      23.7. Write raw

      22.7. Write raw

      The "write raw" operation is designed to be an optimised, low-latency file write operation. A server may choose to not support it, @@ -241,9 +226,7 @@ CLASS="SECT1" >

      23.8. Slow Clients

      22.8. Slow Clients

      One person has reported that setting the protocol to COREPLUS rather than LANMAN2 gave a dramatic speed improvement (from 10k/s to 150k/s).

      23.9. Slow Logins

      22.9. Slow Logins

      Slow logins are almost always due to the password checking time. Using the lowest practical "password level" will improve things a lot. You @@ -271,9 +252,7 @@ CLASS="SECT1" >

      23.10. Client tuning

      22.10. Client tuning

      Often a speed problem can be traced to the client. The client (for example Windows for Workgroups) can often be tuned for better TCP @@ -389,7 +368,7 @@ WIDTH="33%" ALIGN="left" VALIGN="top" >PrevNextAppendixesGroup mapping HOWTOUpPortabilityAppendixes

      swat

      swat

      swat [-s <smb config file>] [-a]

      [-s <smb config file>] [-a]

      DESCRIPTION

      This tool is part of the Samba(7)This tool is part of the Samba suite.

      swat allows a Samba administrator to - configure the complex smb.conf(5) smb.conf(5) file via a Web browser. In addition, a

      OPTIONS

      The default configuration file path is determined at compile time. The file specified contains - the configuration details required by the smbd(8) server. This is the file - that smbd + server. This is the file that swat will modify. @@ -151,7 +147,7 @@ CLASS="EMPHASIS" >

      INSTALLATION

      Inetd Installation

      Launching

      FILES

      This is the default location of the smb.conf(5)This is the default location of the smb.conf(5) + server configuration file that swat edits. Other common places that systems install this file are

      WARNINGS

      swat will rewrite your smb.conf(5) will rewrite your smb.conf + file. It will rearrange the entries and delete all - comments, include= and include=
      and copy= - options. If you have a carefully crafted smb.conf

      VERSION

      This man page is correct for version 2.2 of the Samba suite.

      This man page is correct for version 2.2 of + the Samba suite.

      SEE ALSO

      inetd(5), smbd(8), smb.conf(5)

      , + smbd(8), + smb.conf(5) +

      AUTHOR

      The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for - Samba 3.0 was done by Alexander Bokovoy.

      + testparm

      testparm

      testparm

      Synopsis

      testparm [-s] [-h] [-v] [-L <servername>] [-t <encoding>] {config filename} [hostname hostIP]

      [-s] [-h] [-v] [-L <servername>] [-t <encoding>] {config filename} [hostname hostIP]

      DESCRIPTION

      This tool is part of the Samba(7)This tool is part of the Samba suite.

      testparm is a very simple test program - to check an smbd(8)smbd configuration file for internal correctness. If this program reports no problems, you can use the configuration file with confidence that will successfully load the configuration file.

      Note that this is Note that this is NOT a guarantee that the services specified in the configuration file will be available or will operate as expected.

      OPTIONS

      -L servername

      Sets the value of the %L macro to Sets the value of the %L macro to servernameservername. This is useful for testing include files specified with the %L macro.

      If this option is specified, testparm - will also output all options that were not used in smb.conf(5) and are thus set to their defaults.

      smb.conf and are thus set to + their defaults.

      -t encoding

      This is the name of the configuration file to check. If this parameter is not present then the - default smb.conf(5)smb.conf file will be checked.

      testparm will examine the will examine the hosts - allow and and hosts denyhosts deny - parameters in the smb.conf(5)smb.conf file to determine if the hostname with this IP address would be allowed access to the

      FILES

      smb.conf(5)smb.conf

      This is usually the name of the configuration - file used by smbd(8)smbd.

      DIAGNOSTICS

      VERSION

      SEE ALSO

      smb.conf(5), smbd(8)

      smb.conf(5), + smbd(8) +

      AUTHOR

      The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy.

      testprns

      testprns

      DESCRIPTION

      This tool is part of the Samba(7)This tool is part of the Samba suite.

      testprns is a very simple test program to determine whether a given printer name is valid for use in - a service to be provided by smbd(8).

      smbd(8).

      "Valid" in this context means "can be found in the printcap specified". This program is very stupid - so stupid in @@ -76,7 +75,7 @@ CLASS="REFENTRYTITLE" >

      OPTIONS

      testprns
      finds the printer then smbd(8) finds the printer then + smbd should do so as well.

      FILES

      DIAGNOSTICS

      If a printer is found to be valid, the message - "Printer name <printername> is valid" will be + "Printer name <printername> is valid" will be displayed.

      If a printer is found to be invalid, the message - "Printer name <printername> is not valid" will be + "Printer name <printername> is not valid" will be displayed.

      All messages that would normally be logged during @@ -189,7 +186,7 @@ CLASS="FILENAME" >

      VERSION

      SEE ALSO

      printcap(5), - smbd(8), smbclient(1)

      smbd(8), + smbclient(1) +

      AUTHOR

      The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 - for Samba 3.0 was done by Alexander Bokovoy.

      Type of installationPrevNext

      Introduction

      Samba can operate in various SMB networks. This part contains information on configuring samba @@ -94,211 +91,151 @@ CLASS="TOC" >Table of Contents

      4. Nomenclature of Server Types
      4.1. Stand Alone Server
      4.2. Domain Member Server
      4.3. Domain Controller
      4.3.1. Domain Controller Types
      5. Samba as Stand-Alone Server
      5.1. User and Share security level
      5.1.1. User Level Security
      5.1.2. Share Level Security
      5.1.3. Server Level SecurityUser and Share security level (for servers not in a domain)
      5.1.4. Domain Level Security
      5.1.5. ADS Level Security
      6. Samba as an NT4 or Win2k Primary Domain ControllerHow to Configure Samba as a NT4 Primary Domain Controller
      6.1. Prerequisite Reading
      6.2. Background
      6.3. Configuring the Samba Domain Controller
      6.4. Creating Machine Trust Accounts and Joining Clients to the DomainCreating Machine Trust Accounts and Joining Clients to the +Domain
      6.4.1. Manual Creation of Machine Trust Accounts
      6.4.2. "On-the-Fly" Creation of Machine Trust Accounts
      6.4.3. Joining the Client to the Domain
      6.5. Common Problems and Errors
      6.6. What other help can I get?System Policies and Profiles
      6.7. What other help can I get?
      6.8. Domain Control for Windows 9x/ME
      6.7.1. 6.8.1. Configuration Instructions: Network Logons
      6.8.2. Configuration Instructions: Setting up Roaming User Profiles
      6.9. DOMAIN_CONTROL.txt : Windows NT Domain Control & Samba
      7. Samba Backup Domain Controller to Samba Domain ControlHow to Act as a Backup Domain Controller in a Purely Samba Controlled Domain
      7.1. Prerequisite Reading
      7.2. Background
      7.3. What qualifies a Domain Controller on the network?
      7.3.1. How does a Workstation find its domain controller?
      7.3.2. When is the PDC needed?
      7.4. Can Samba be a Backup Domain Controller to an NT PDC?Can Samba be a Backup Domain Controller?
      7.5. How do I set up a Samba BDC?
      7.5.1. How do I replicate the smbpasswd file?
      7.5.2. Can I do this all with LDAP?
      8.1. Setup your smb.confInstalling the required packages for Debian
      8.2. Setup your /etc/krb5.confInstalling the required packages for RedHat
      8.3. Compile Samba
      8.4. Setup your /etc/krb5.conf
      8.5. Create the computer account
      8.3.1. 8.5.1. Possible errors
      8.4. 8.6. Test your server setup
      8.5. 8.7. Testing with smbclient
      8.6. 8.8. Notes
      9. Samba as a NT4 or Win2k domain memberSamba as a NT4 domain member
      9.1. Joining an NT Domain with Samba 3.0Joining an NT Domain with Samba 2.2
      9.2. Samba and Windows 2000 Domains
      9.3. Why is this better than security = server?
      PrevNextUser information databaseLanMan and NT Password Encryption in SambaNomenclature of Server TypesUser and Share security level (for servers not in a domain)
      UNIX Permission Bits and Windows NT Access Control ListsPrevNext

      Chapter 11. UNIX Permission Bits and Windows NT Access Control Lists

      Chapter 11. UNIX Permission Bits and Windows NT Access Control Lists

      11.1. Viewing and changing UNIX permissions using the NT - security dialogs

      11.1. Viewing and changing UNIX permissions using the NT + security dialogs

      Windows NT clients can use their native security settings - dialog box to view and modify the underlying UNIX permissions.

      New in the Samba 2.0.4 release is the ability for Windows + NT clients to use their native security settings dialog box to + view and modify the underlying UNIX permissions.

      Note that this ability is careful not to compromise the security of the UNIX host Samba is running on, and still obeys all the file permission rules that a Samba administrator can set.

      In Samba 2.0.4 and above the default value of the + parameter nt acl support has been changed from + false to true, so + manipulation of permissions is turned on by default.

      11.2. How to view file security on a Samba share

      11.2. How to view file security on a Samba share

      From an NT4/2000/XP client, single-click with the right +>From an NT 4.0 client, single-click with the right mouse button on any file or directory in a Samba mounted drive letter or UNC path. When the menu pops-up, click on the Properties entry at the bottom of - the menu. This brings up the file properties dialog - box. Click on the tab Security and you +>. Click on this tab and you will see three buttons,

      11.3. Viewing file ownership

      11.3. Viewing file ownership

      Clicking on the "SERVER\user (Long name)"

      Where Where SERVERSERVER is the NetBIOS name of - the Samba server, useruser is the user name of - the UNIX user who owns the file, and (Long name)(Long name) is the descriptive string identifying the user (normally found in the GECOS field of the UNIX password database). Click on the button to remove this dialog.

      If the parameter If the parameter nt acl supportnt acl support - is set to falsefalse then the file owner will be shown as the NT user

      There is an NT chown command that will work with Samba and allow a user with Administrator privilege connected - to a Samba server as root to change the ownership of + to a Samba 2.0.4 server as root to change the ownership of files on both a local NTFS filesystem or remote mounted NTFS or Samba drive. This is available as part of the

      11.4. Viewing file or directory permissions

      11.4. Viewing file or directory permissions

      The third button is the "SERVER\user (Long name)"

      Where Where SERVERSERVER is the NetBIOS name of - the Samba server, useruser is the user name of - the UNIX user who owns the file, and (Long name)(Long name) is the descriptive string identifying the user (normally found in the GECOS field of the UNIX password database).

      If the parameter If the parameter nt acl supportnt acl support - is set to falsefalse then the file owner will be shown as the NT user

      11.4.1. File Permissions

      11.4.1. File Permissions

      The standard UNIX user/group/world triple and the corresponding "read", "write", "execute" permissions @@ -369,9 +397,7 @@ CLASS="SECT2" >

      11.4.2. Directory Permissions

      11.4.2. Directory Permissions

      Directories on an NT NTFS file system have two different sets of permissions. The first set of permissions @@ -401,9 +427,7 @@ CLASS="SECT1" >

      11.5. Modifying file or directory permissions

      11.5. Modifying file or directory permissions

      Modifying file and directory permissions is as simple as changing the displayed permissions in the dialog box, and @@ -415,13 +439,15 @@ CLASS="COMMAND" with the standard Samba permission masks and mapping of DOS attributes that need to also be taken into account.

      If the parameter If the parameter nt acl supportnt acl support - is set to falsefalse then any attempt to set security permissions will fail with an "Add" - button will not return a list of users in Samba (it will give + button will not return a list of users in Samba 2.0.4 (it will give an error message of "The remote procedure call failed @@ -497,33 +523,38 @@ CLASS="SECT1" >

      11.6. Interaction with the standard Samba create mask - parameters

      11.6. Interaction with the standard Samba create mask + parameters

      There are four parameters - to control interaction with the standard Samba create mask parameters. - These are :

      Note that with Samba 2.0.5 there are four new parameters + to control this interaction. These are :

      security masksecurity mask

      force security modeforce security mode

      directory security maskdirectory security mask

      force directory security modeforce directory security mode

      Once a user clicks - security masksecurity mask parameter. Any bits that were changed that are not set to '1' in this parameter are left alone in the file permissions.

      Essentially, zero bits in the Essentially, zero bits in the security masksecurity mask mask may be treated as a set of bits the user is create mask - parameter. To allow a user to modify all the - user/group/world permissions on a file, set this parameter +> parameter to provide compatibility with Samba 2.0.4 + where this permission change facility was introduced. To allow a user to + modify all the user/group/world permissions on a file, set this parameter to 0777.

      Next Samba checks the changed permissions for a file against the bits set in the force security modeforce security mode parameter. Any bits that were changed that correspond to bits set to '1' in this parameter are forced to be set.

      Essentially, bits set in the Essentially, bits set in the force security mode - parameter may be treated as a set of bits that, when modifying security on a file, the user has always set to be 'on'.

      force - create mode parameter. +> parameter to provide compatibility + with Samba 2.0.4 where the permission change facility was introduced. To allow a user to modify all the user/group/world permissions on a file with no restrictions set this parameter to 000.

      The The security mask and security mask and force - security mode parameters are applied to the change request in that order.

      For a directory Samba will perform the same operations as - described above for a file except using the parameter directory security mask instead of directory security mask instead of security - mask, and , and force directory security mode - parameter instead of parameter instead of force security mode - .

      The The directory security maskdirectory security mask parameter - by default is set to the same value as the directory mask - parameter and the parameter and the force directory security - mode parameter by default is set to the same value as - the force directory mode parameter.

      force directory mode parameter to provide + compatibility with Samba 2.0.4 where the permission change facility + was introduced.

      In this way Samba enforces the permission restrictions that an administrator can set on a Samba share, whilst still allowing users @@ -666,35 +733,73 @@ CLASS="FILENAME" > file in that share specific section :

      security mask = 0777security mask = 0777

      force security mode = 0force security mode = 0

      directory security mask = 0777directory security mask = 0777

      force directory security mode = 0force directory security mode = 0

      As described, in Samba 2.0.4 the parameters :

      create mask

      force create mode

      directory mask

      force directory mode

      were used instead of the parameters discussed here.

      11.7. Interaction with the standard Samba file attribute - mapping

      11.7. Interaction with the standard Samba file attribute + mapping

      Samba maps some of the DOS attribute bits (such as "read only") into the UNIX permissions of a file. This means there can @@ -750,7 +855,7 @@ WIDTH="33%" ALIGN="left" VALIGN="top" >PrevNextSystem PoliciesIntegrating MS Windows networks with SambaGroup mapping HOWTOConfiguring PAM for distributed but centrally +managed authentication

      Stackable VFS modulesPrevNext

      Chapter 20. Stackable VFS modules

      Chapter 18. Stackable VFS modules

      20.1. Introduction and configuration

      18.1. Introduction and configuration

      Since samba 3.0, samba supports stackable VFS(Virtual File System) modules. Samba passes each request to access the unix file system thru the loaded VFS modules. @@ -121,17 +118,13 @@ CLASS="SECT1" >

      20.2. Included modules

      18.2. Included modules

      20.2.1. audit

      18.2.1. audit

      A simple module to audit file access to the syslog facility. The following operations are logged: @@ -167,9 +160,7 @@ CLASS="SECT2" >

      20.2.2. recycle

      18.2.2. recycle

      A recycle-bin like modules. When used any unlink call will be intercepted and files moved to the recycle @@ -238,9 +229,7 @@ CLASS="SECT2" >

      20.2.3. netatalk

      18.2.3. netatalk

      A netatalk module, that will ease co-existence of samba and netatalk file sharing services.

      20.3. VFS modules available elsewhere

      18.3. VFS modules available elsewhere

      This section contains a listing of various other VFS modules that have been posted but don't currently reside in the Samba CVS @@ -287,9 +274,7 @@ CLASS="SECT2" >

      20.3.1. DatabaseFS

      18.3.1. DatabaseFS

      URL:

      20.3.2. vscan

      18.3.2. vscan

      URL: PrevNextHosting a Microsoft Distributed File System tree on SambaPassdb XML pluginSecuring SambaStoring Samba's User/Machine Account information in an LDAP Directory

      + vfstest

      vfstest

      vfstest

      Synopsis

      vfstest [-d debuglevel] [-c command] [-l logfile] [-h]

      [-d debuglevel] [-c command] [-l logfile] [-h]

      DESCRIPTION

      This tool is part of the Samba(7)This tool is part of the Samba suite.

      OPTIONS

      -d|--debug=debuglevel

      debugleveldebuglevel is an integer from 0 to 10. The default value if this parameter is not specified is zero.

      File name for log/debug files. The extension - '.client''.client' will be appended. The log file is never removed by the client.

      COMMANDS

      VFS COMMANDS

      GENERAL COMMANDS

      VERSION

      AUTHOR

      wbinfo

      wbinfo

      DESCRIPTION

      This tool is part of the Samba(7)This tool is part of the Samba suite.

      The wbinfo program queries and returns information - created and used by the winbindd(8) winbindd(8) daemon.

      The winbindd(8)The winbindd(8) daemon must be configured and running for the

      OPTIONS

      This option will list all users available - in the Windows NT domain for which the winbindd(8)winbindd(8) + daemon is operating in. Users in all trusted domains will also be listed. Note that this operation does not assign - user ids to any users that have not already been seen by winbindd(8) - .

      winbindd(8)
      .

      -g

      This option will list all groups available - in the Windows NT domain for which the Samba(7)winbindd(8) + daemon is operating in. Groups in all trusted domains will also be listed. Note that this operation does not assign - group ids to any groups that have not already been - seen by winbindd(8)winbindd(8).

      -N name

      The The -N-N option - queries winbindd(8)winbindd(8) to query the WINS server for the IP address associated with the NetBIOS name - specified by the namename parameter.

      -I ip

      The The -I-I option - queries winbindd(8)winbindd(8) to send a node status request to get the NetBIOS name associated with the IP address - specified by the ipip parameter.

      -n name

      The The -n-n option - queries winbindd(8)winbindd(8) for the SID associated with the name specified. Domain names can be specified before the user name by using the winbind separator character. For example CWDOM1/Administrator refers to the Administrator user in the domain CWDOM1. If no domain is specified then the - domain used is the one specified in the smb.conf(5) smb.conf + workgroup - workgroup parameter.

      -s sid

      Use Use -s-s to resolve - a SID to a name. This is the inverse of the -n - option above. SIDs must be specified as ASCII strings in the traditional Microsoft format. For example, S-1-5-21-1455342024-3071081365-2475485837-500.

      Convert a SID to a UNIX user id. If the SID - does not correspond to a UNIX user mapped by winbindd(8) winbindd(8) then the operation will fail.

      Convert a SID to a UNIX group id. If the SID - does not correspond to a UNIX group mapped by winbindd(8) then - the operation will fail.

      winbindd(8)
      then the operation will fail.

      -t

      Produce a list of domains trusted by the - Windows NT server winbindd(8)winbindd(8) contacts when resolving names. This list does not include the Windows NT domain the server is a Primary Domain Controller for. @@ -328,18 +308,16 @@ CLASS="REFENTRYTITLE" >

      EXIT STATUS

      The wbinfo program returns 0 if the operation - succeeded, or 1 if the operation failed. If the winbindd(8)winbindd(8) + daemon is not working wbinfo

      VERSION

      SEE ALSO

      winbindd(8)winbindd(8) +

      AUTHOR

      The conversion to DocBook for Samba 2.2 was done - by Gerald Carter. The conversion to DocBook XML 4.2 for Samba - 3.0 was done by Alexander Bokovoy.

      Unified Logons between Windows NT and UNIX using WinbindPrevNext

      Chapter 16. Unified Logons between Windows NT and UNIX using Winbind

      Chapter 15. Unified Logons between Windows NT and UNIX using Winbind

      16.1. Abstract

      15.1. Abstract

      Integration of UNIX and Microsoft Windows NT through a unified logon has been considered a "holy grail" in heterogeneous @@ -107,9 +104,7 @@ CLASS="SECT1" >

      16.2. Introduction

      15.2. Introduction

      It is well known that UNIX and Microsoft Windows NT have different models for representing user and group information and @@ -161,9 +156,7 @@ CLASS="SECT1" >

      16.3. What Winbind Provides

      15.3. What Winbind Provides

      Winbind unifies UNIX and Windows NT account management by allowing a UNIX box to become a full member of a NT domain. Once @@ -203,9 +196,7 @@ CLASS="SECT2" >

      16.3.1. Target Uses

      15.3.1. Target Uses

      Winbind is targeted at organizations that have an existing NT based domain infrastructure into which they wish @@ -227,9 +218,7 @@ CLASS="SECT1" >

      16.4. How Winbind Works

      15.4. How Winbind Works

      The winbind system is designed around a client/server architecture. A long running

      16.4.1. Microsoft Remote Procedure Calls

      15.4.1. Microsoft Remote Procedure Calls

      Over the last few years, efforts have been underway +>Over the last two years, efforts have been underway by various Samba Team members to decode various aspects of the Microsoft Remote Procedure Call (MSRPC) system. This system is used for most network related operations between @@ -273,28 +260,7 @@ CLASS="SECT2" >

      16.4.2. Microsoft Active Directory Services

      Since late 2001, Samba has gained the ability to - interact with Microsoft Windows 2000 using its 'Native - Mode' protocols, rather than the NT4 RPC services. - Using LDAP and Kerberos, a domain member running - winbind can enumerate users and groups in exactly the - same way as a Win2k client would, and in so doing - provide a much more efficient and - effective winbind implementation. -

      16.4.3. Name Service Switch

      15.4.2. Name Service Switch

      The Name Service Switch, or NSS, is a feature that is present in many UNIX operating systems. It allows system @@ -372,9 +338,7 @@ CLASS="SECT2" >

      16.4.4. Pluggable Authentication Modules

      15.4.3. Pluggable Authentication Modules

      Pluggable Authentication Modules, also known as PAM, is a system for abstracting authentication and authorization @@ -421,9 +385,7 @@ CLASS="SECT2" >

      16.4.5. User and Group ID Allocation

      15.4.4. User and Group ID Allocation

      When a user or group is created under Windows NT is it allocated a numerical relative identifier (RID). This is @@ -447,9 +409,7 @@ CLASS="SECT2" >

      16.4.6. Result Caching

      15.4.5. Result Caching

      An active system can generate a lot of user and group name lookups. To reduce the network cost of these lookups winbind @@ -470,9 +430,7 @@ CLASS="SECT1" >

      16.5. Installation and Configuration

      15.5. Installation and Configuration

      Many thanks to John Trostel This HOWTO describes how to get winbind services up and running to control access and authenticate users on your Linux box using the winbind services which come with SAMBA 2.2.2.

      There is also some Solaris specific information in +docs/textdocs/Solaris-Winbind-HOWTO.txt. +Future revisions of this document will incorporate that +information.

      16.5.1. Introduction

      15.5.1. Introduction

      This HOWTO describes the procedures used to get winbind up and running on my RedHat 7.1 system. Winbind is capable of providing access @@ -548,9 +512,7 @@ CLASS="SECT2" >

      16.5.2. Requirements

      15.5.2. Requirements

      If you have a samba configuration file that you are currently using...

      16.5.3. Testing Things Out

      15.5.3. Testing Things Out

      Before starting, it is probably best to kill off all the SAMBA related daemons running on your server. Kill off all

      16.5.3.1. Configure and compile SAMBA

      15.5.3.1. Configure and compile SAMBA

      The configuration and compilation of SAMBA is pretty straightforward. The first three steps may not be necessary depending upon @@ -673,44 +631,44 @@ whether or not you have previously built the Samba binaries.

      root#root# autoconf
      -root#root# make clean
      -root#root# rm config.cache
      -root#root# ./configure./configure --with-winbind
      -root#root# make
      -root#root# make install

      16.5.3.2. Configure 15.5.3.2. Configure nsswitch.conf and the -winbind libraries

      The libraries needed to run the daemon through nsswitch need to be copied to their proper locations, so

      root#root# cp ../samba/source/nsswitch/libnss_winbind.so /lib

      I also found it necessary to make the following symbolic link:

      root#root# ln -s /lib/libnss_winbind.so /lib/libnss_winbind.so.2

      And, in the case of Sun solaris:

      root#root# ln -s /usr/lib/libnss_winbind.so /usr/lib/libnss_winbind.so.1 -root#root# ln -s /usr/lib/libnss_winbind.so /usr/lib/nss_winbind.so.1 -root#root# ln -s /usr/lib/libnss_winbind.so /usr/lib/nss_winbind.so.2

      root#root# /sbin/ldconfig -v | grep winbind

      16.5.3.3. Configure smb.conf

      15.5.3.3. Configure smb.conf

      Several parameters are needed in the smb.conf file to control the behavior of

      16.5.3.4. Join the SAMBA server to the PDC domain

      15.5.3.4. Join the SAMBA server to the PDC domain

      Enter the following command to make the SAMBA server join the -PDC domain, where DOMAINDOMAIN is the name of -your Windows domain and AdministratorAdministrator is a domain user who has administrative privileges in the domain.

      root#root# /usr/local/samba/bin/net join -S PDC -U Administrator/usr/local/samba/bin/net rpc join -S PDC -U Administrator

      The proper response to the command should be: "Joined the domain -DOMAIN" where DOMAIN" where DOMAINDOMAIN is your DOMAIN name.

      16.5.3.5. Start up the winbindd daemon and test it!

      15.5.3.5. Start up the winbindd daemon and test it!

      Eventually, you will want to modify your smb startup script to automatically invoke the winbindd daemon when the other parts of @@ -957,35 +915,20 @@ SAMBA start, but it is possible to test out just the winbind portion first. To start up winbind services, enter the following command as root:

      root#root# /usr/local/samba/bin/winbindd

      Winbindd can now also run in 'dual daemon mode'. This will make it -run as 2 processes. The first will answer all requests from the cache, -thus making responses to clients faster. The other will -update the cache for the query that the first has just responded. -Advantage of this is that responses stay accurate and are faster. -You can enable dual daemon mode by adding '-B' to the commandline:

      root# /usr/local/samba/bin/winbindd -B

      I'm always paranoid and like to make sure the daemon is really running...

      root#root# ps -ae | grep winbinddNow... for the real test, try to get some information about the users on your PDC

      root#root# /usr/local/samba/bin/wbinfo -u

      Obviously, I have named my domain 'CEO' and my Obviously, I have named my domain 'CEO' and my winbind -separator is '+'.

      You can do the same sort of thing to get group information from @@ -1031,9 +976,9 @@ the PDC:

      root#root# /usr/local/samba/bin/wbinfo -g

      root#root# getent passwd

      The same thing can be done for groups with the command

      root#root# getent group

      16.5.3.6. Fix the init.d startup scripts

      15.5.3.6. Fix the init.d startup scripts

      16.5.3.6.1. Linux

      15.5.3.6.1. Linux

      The

      If you would like to run winbindd in dual daemon mode, replace -the line -

              daemon /usr/local/samba/bin/winbindd
      - -in the example above with: - -
              daemon /usr/local/samba/bin/winbindd -B
      .

      The 'stop' function has a corresponding entry to shut down the -services and looks like this:

      16.5.3.6.2. Solaris

      15.5.3.6.2. Solaris

      On solaris, you need to modify the

      Again, if you would like to run samba in dual daemon mode, replace -

         /usr/local/samba/bin/winbindd
      - -in the script above with: - -
         /usr/local/samba/bin/winbindd -B

      16.5.3.6.3. Restarting

      15.5.3.6.3. Restarting

      If you restart the

      16.5.3.7. Configure Winbind and PAM

      15.5.3.7. Configure Winbind and PAM

      If you have made it this far, you know that winbindd and samba are working together. If you want to use winbind to provide authentication for other @@ -1329,9 +1237,9 @@ CLASS="FILENAME" > directory by invoking the command

      root#root# make nsswitch/pam_winbind.so/usr/lib/security.

      root#root# cp ../samba/source/nsswitch/pam_winbind.so /lib/security

      16.5.3.7.1. Linux/FreeBSD-specific PAM configuration

      15.5.3.7.1. Linux/FreeBSD-specific PAM configuration

      The

      16.5.3.7.2. Solaris-specific configuration

      15.5.3.7.2. Solaris-specific configuration

      The /etc/pam.conf needs to be changed. I changed this file so that my Domain users can logon both locally as well as telnet.The following are the changes @@ -1572,7 +1476,7 @@ dtsession auth required /usr/lib/security/$ISA/pam_unix.so.1 >I also added a try_first_pass line after the winbind.so line to get rid of annoying double prompts for passwords.

      Now restart your Samba and try connecting through your application that you +>Now restart your Samba & try connecting through your application that you configured in the pam.conf.

      16.6. Limitations

      15.6. Limitations

      Winbind has a number of limitations in its current released version that we hope to overcome in future @@ -1596,7 +1498,7 @@ NAME="AEN2901" >

    • Winbind is currently only available for - the Linux, Solaris and IRIX operating systems, although ports to other operating + the Linux operating system, although ports to other operating systems are certainly possible. For such ports to be feasible, we require the C library of the target operating system to support the Name Service Switch and Pluggable Authentication @@ -1615,8 +1517,7 @@ NAME="AEN2901" >

      Currently the winbind PAM module does not take into account possible workstation and logon time restrictions - that may be been set for Windows NT users, this is - instead up to the PDC to enforce.

    • 16.7. Conclusion

      15.7. Conclusion

      The winbind system, through the use of the Name Service Switch, Pluggable Authentication Modules, and appropriate @@ -1653,7 +1552,7 @@ WIDTH="33%" ALIGN="left" VALIGN="top" >PrevNextCUPS Printing SupportPrinting SupportIntegrating MS Windows networks with SambaPassdb MySQL plugin

      + winbindd

      winbindd

      winbindd

      Synopsis

      winbindd [-F] [-S] [-i] [-B] [-d <debug level>] [-s <smb config file>] [-n]

      [-F] [-S] [-i] [-B] [-d <debug level>] [-s <smb config file>] [-n]

      DESCRIPTION

      This program is part of the Samba(7)This program is part of the Samba suite.

      pam_winbind module in the 2.2.2 release only - supports the auth and auth and accountaccount module-types. The latter simply performs a getpwnam() to verify that the system can obtain a uid for the @@ -167,11 +166,22 @@ CLASS="FILENAME" CLASS="FILENAME" >/etc/group and then from the - Windows NT server. -

      passwd:         files winbind
      -group:          files winbind

      The following simple configuration in the @@ -188,7 +198,7 @@ CLASS="FILENAME" >

      OPTIONS

      Specifies the location of the all-important - smb.conf(5)smb.conf file.

      NAME AND ID RESOLUTION

      CONFIGURATION

      winbindd
      daemon - is done through configuration parameters in the smb.conf(5)smb.conf(5) + file. All parameters should be specified in the [global] section of smb.conf.

      winbind separatorwinbind separator

      winbind uidwinbind uid

      winbind gidwinbind gid

      winbind cache timewinbind cache time

      winbind enum userswinbind enum users

      winbind enum groupswinbind enum groups

      template homedirtemplate homedir

      template shelltemplate shell

      winbind use default domainwinbind use default domain

      EXAMPLE SETUP

      /etc/nsswitch.conf put the - following: -

      passwd:     files winbind
      -group:      files winbind

      In /etc/pam.d/* replace the replace the + auth lines with something like this: -

      auth lines with something like this: 

      auth       required	/lib/security/pam_securetty.so
       auth       required	/lib/security/pam_nologin.so
       auth       sufficient	/lib/security/pam_winbind.so
      -auth       required     /lib/security/pam_pwdb.so use_first_pass shadow nullok

      Note in particular the use of the Note in particular the use of the sufficient - keyword and the sufficient + keyword and the use_first_passuse_first_pass keyword.

      Now replace the account lines with this:

      net join -S PDC -U Administratorsmbpasswd -j DOMAIN -r PDC -U + Administrator

      The username after the The username after the -U-U can be any Domain user that has administrator privileges on the machine. - Substitute the name or IP of your PDC for "PDC".

      Next copy /lib and pam_winbind.so - to pam_winbind.so + to /lib/security. A symbolic link needs to be @@ -568,15 +624,19 @@ CLASS="FILENAME" >/lib/libnss_winbind.so.1.

      Finally, setup a smb.conf(5)Finally, setup a smb.conf containing directives like the - following: -

      [global]
       	winbind separator = +
      @@ -587,7 +647,11 @@ CLASS="PROGRAMLISTING"
               winbind gid = 10000-20000
               workgroup = DOMAIN
               security = domain
      -        password server = *

      Now start winbindd and you should find that your user and @@ -606,7 +670,7 @@ CLASS="COMMAND" >

      NOTES

      winbindd
      :

      nmbd(8)nmbd must be running on the local machine for to work. winbindd queries - the list of trusted domains for the Windows NT server +> + queries the list of trusted domains for the Windows NT server on startup and when a SIGHUP is received. Thus, for a running winbinddwinbindd - nsswitch module read an environment variable named $WINBINDD_DOMAIN $WINBINDD_DOMAIN. If this variable contains a comma separated list of Windows NT domain names, then winbindd will only resolve users and groups within those Windows NT domains.

      SIGNALS

      SIGHUP

      Reload the smb.conf(5) file and - apply any parameter changes to the running +>Reload the smb.conf(5) + file and apply any parameter changes to the running version of winbindd. This signal also clears any cached user and group information. The list of other domains trusted by winbindd is also reloaded.

      FILES

      Storage for the Windows NT rid to UNIX user/group id mapping. The lock directory is specified when Samba is initially - compiled using the --with-lockdir--with-lockdir option. This directory is by default

      VERSION

      SEE ALSO

      nsswitch.conf(5), Samba(7), wbinfo(8), smb.conf(5), + samba(7), + wbinfo(1), + smb.conf(5)

      AUTHOR

      and winbindd were - written by Tim Potter.

      + were written by Tim Potter.

      The conversion to DocBook for Samba 2.2 was done - by Gerald Carter. The conversion to DocBook XML 4.2 for - Samba 3.0 was done by Alexander Bokovoy.

      .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "FINDSMB" "1" "03 april 2003" "" "" - +.TH "FINDSMB" "1" "04 March 2003" "" "" .SH NAME findsmb \- list info about machines that respond to SMB name queries on a subnet .SH SYNOPSIS @@ -13,15 +12,12 @@ findsmb \- list info about machines that respond to SMB name queries on a subne .SH "DESCRIPTION" .PP -This perl script is part of the \fBSamba\fR(7) -suite. +This perl script is part of the Samba suite. .PP \fBfindsmb\fR is a perl script that prints out several pieces of information about machines on a subnet that respond to SMB name query requests. -It uses \fBnmblookup\fR(1) -and \fBsmbclient\fR(1) -to obtain this information. +It uses \fB nmblookup(1)\fR to obtain this information. .SH "OPTIONS" .TP \fB-r\fR @@ -29,16 +25,15 @@ Controls whether \fBfindsmb\fR takes bugs in Windows95 into account when trying to find a Netbios name registered of the remote machine. This option is disabled by default because it is specific to Windows 95 and Windows 95 machines only. -If set, \fBnmblookup\fR(1) +If set, \fBnmblookup\fR will be called with -B option. .TP \fBsubnet broadcast address\fR Without this option, \fBfindsmb \fR will probe the subnet of the machine where -\fBfindsmb\fR(1) -is run. This value is passed to -\fBnmblookup\fR(1) -as part of the -B option. +\fBfindsmb\fR is run. This value is passed +to \fBnmblookup\fR as part of the +-B option. .SH "EXAMPLES" .PP The output of \fBfindsmb\fR lists the following @@ -55,15 +50,15 @@ not show any information about the operating system or server version. .PP The command with -r option -must be run on a system without \fBnmbd\fR(8) running. +must be run on a system without \fBnmbd\fR running. If \fBnmbd\fR is running on the system, you will only get the IP address and the DNS name of the machine. To get proper responses from Windows 95 and Windows 98 machines, the command must be run as root and with -r option on a machine without \fBnmbd\fR running. .PP -For example, running \fBfindsmb\fR -without -r option set would yield output similar +For example, running \fBfindsmb\fR without +-r option set would yield output similar to the following .nf @@ -79,6 +74,7 @@ IP ADDR NETBIOS NAME WORKGROUP/OS/VERSION 192.168.35.88 SCNT2 +[MVENGR] [Windows NT 4.0] [NT LAN Manager 4.0] 192.168.35.93 FROGSTAR-PC [MVENGR] [Windows 5.0] [Windows 2000 LAN Manager] 192.168.35.97 HERBNT1 *[HERB-NT] [Windows NT 4.0] [NT LAN Manager 4.0] + .fi .SH "VERSION" .PP @@ -86,8 +82,9 @@ This man page is correct for version 3.0 of the Samba suite. .SH "SEE ALSO" .PP -\fBnmbd\fR(8), -\fBsmbclient\fR(1), and \fBnmblookup\fR(1) +\fBnmbd(8)\fR +\fBsmbclient(1) +\fR and \fBnmblookup(1)\fR .SH "AUTHOR" .PP The original Samba software and related utilities @@ -97,7 +94,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) -and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook -XML 4.2 for Samba 3.0 was done by Alexander Bokovoy. +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +release by Jeremy Allison. The conversion to DocBook for +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/lmhosts.5 b/docs/manpages/lmhosts.5 index 3042a9c522e..82660f26bdd 100644 --- a/docs/manpages/lmhosts.5 +++ b/docs/manpages/lmhosts.5 @@ -3,16 +3,15 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "LMHOSTS" "5" "03 april 2003" "" "" - +.TH "LMHOSTS" "5" "04 March 2003" "" "" .SH NAME lmhosts \- The Samba NetBIOS hosts file .SH SYNOPSIS .PP -\fIlmhosts\fR is the \fBSamba\fR(7) NetBIOS name to IP address mapping file. +\fIlmhosts\fR is the Samba NetBIOS name to IP address mapping file. .SH "DESCRIPTION" .PP -This file is part of the \fBSamba\fR(7) suite. +This file is part of the Samba suite. .PP \fIlmhosts\fR is the \fBSamba \fR NetBIOS name to IP address mapping file. It @@ -24,7 +23,7 @@ to the NetBIOS naming format. It is an ASCII file containing one line for NetBIOS name. The two fields on each line are separated from each other by white space. Any entry beginning with '#' is ignored. Each line -in the lmhosts file contains the following information: +in the lmhosts file contains the following information : .TP 0.2i \(bu IP Address - in dotted decimal format. @@ -39,7 +38,8 @@ If the trailing '#' is omitted then the given IP address will be returned for all names that match the given name, whatever the NetBIOS name type in the lookup. .PP -An example follows: +An example follows : +.PP .nf # @@ -61,13 +61,16 @@ type for a name "NTSERVER" is queried. Any other name type will not be resolved. .PP The default location of the \fIlmhosts\fR file -is in the same directory as the \fBsmb.conf\fR(5) file. +is in the same directory as the +smb.conf(5)> file. .SH "VERSION" .PP -This man page is correct for version 3.0 of the Samba suite. +This man page is correct for version 2.2 of +the Samba suite. .SH "SEE ALSO" .PP -\fBsmbclient\fR(1), \fBsmb.conf\fR(5), and \fBsmbpasswd\fR(8) +\fBsmbclient(1) +\fR and \fB smbpasswd(8)\fR .SH "AUTHOR" .PP The original Samba software and related utilities @@ -80,5 +83,4 @@ The man page sources were converted to YODL format (another excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook -XML 4.2 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/net.8 b/docs/manpages/net.8 index 71e0087d40b..9b25d30c4fa 100644 --- a/docs/manpages/net.8 +++ b/docs/manpages/net.8 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "NET" "8" "03 april 2003" "" "" - +.TH "NET" "8" "04 March 2003" "" "" .SH NAME net \- Tool for administration of Samba and remote CIFS servers. .SH SYNOPSIS @@ -13,7 +12,7 @@ net \- Tool for administration of Samba and remote CIFS servers. .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP The samba net utility is meant to work just like the net utility available for windows and DOS. @@ -23,8 +22,7 @@ available for windows and DOS. Display summary of all available options. .TP \fB-w target-workgroup\fR -Sets target workgroup or domain. You have to specify -either this option or the IP address or the name of a server. +Sets target workgroup or domain. You have to specify either this option or the IP address or the name of a server. .TP \fB-W workgroup\fR Sets client workgroup or domain @@ -33,8 +31,7 @@ Sets client workgroup or domain User name to use .TP \fB-I ip-address\fR -IP address of target server to use. You have to -specify either this option or a target workgroup or a target server. +IP address of target server to use. You have to specify either this option or a target workgroup or a target server. .TP \fB-p port\fR Port on the target server to connect to. @@ -46,8 +43,7 @@ Sets name of the client. Specify alternative configuration file that should be loaded. .TP \fB-S server\fR -Name of target server. You should specify either -this option or a target workgroup or a target IP address. +Name of target server. You should specify either this option or a target workgroup or a target IP address. .TP \fB-C comment\fR FIXME @@ -91,11 +87,11 @@ Without any options, the \fBNET TIME\fR command displays the time on the remote server. .TP \fBSYSTEM\fR -Displays the time on the remote server in a format ready for \fB/bin/date\fR +Displays the time on the remote server in a format ready for /bin/date .TP \fBSET\fR Tries to set the date and time of the local server to that on -the remote server using \fB/bin/date\fR. +the remote server using /bin/date. .TP \fBZONE\fR Displays the timezone in hours from GMT on the remote computer. @@ -120,7 +116,7 @@ delete specified user \fBUSER INFO [misc options]\fR list the domain groups of the specified user .TP -\fBUSER ADD [password] [-F user flags] [misc. options]\fR +\fBUSER ADD [password] [-F user flags] [misc. options\fR Add specified user .TP \fBGROUP [misc options] [targets]\fR diff --git a/docs/manpages/nmbd.8 b/docs/manpages/nmbd.8 index bd263fcf15f..44a39c1730c 100644 --- a/docs/manpages/nmbd.8 +++ b/docs/manpages/nmbd.8 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "NMBD" "8" "03 april 2003" "" "" - +.TH "NMBD" "8" "04 March 2003" "" "" .SH NAME nmbd \- NetBIOS name server to provide NetBIOS over IP naming services to clients .SH SYNOPSIS @@ -13,7 +12,7 @@ nmbd \- NetBIOS name server to provide NetBIOS over IP naming services to clien .SH "DESCRIPTION" .PP -This program is part of the \fBSamba\fR(7) suite. +This program is part of the Samba suite. .PP \fBnmbd\fR is a server that understands and can reply to NetBIOS over IP name service requests, like @@ -35,7 +34,7 @@ but this can be overridden with the \fB-n\fR option (see OPTIONS below). Thus \fBnmbd\fR will reply to broadcast queries for its own name(s). Additional names for \fBnmbd\fR to respond on can be set -via parameters in the \fBsmb.conf\fR(5) configuration file. +via parameters in the \fI smb.conf(5)\fR configuration file. .PP \fBnmbd\fR can also be used as a WINS (Windows Internet Name Server) server. What this basically means @@ -75,25 +74,36 @@ If specified, this parameter causes \fBnmbd\fR to log to standard output rather than a file. .TP +\fB-a\fR +If this parameter is specified, each new +connection will append log messages to the log file. +This is the default. +.TP \fB-i\fR If this parameter is specified it causes the server to run "interactively", not as a daemon, even if the server is executed on the command line of a shell. Setting this parameter negates the implicit daemon mode when run from the command line. \fBnmbd\fR also logs to standard -output, as if the -S parameter had been +output, as if the \fB-S\fR parameter had been given. .TP -\fB-h|--help\fR -Print a summary of command line options. +\fB-o\fR +If this parameter is specified, the +log files will be overwritten when opened. By default, +\fBsmbd\fR will append entries to the log +files. +.TP +\fB-h\fR +Prints the help information (usage) +for \fBnmbd\fR. .TP \fB-H \fR NetBIOS lmhosts file. The lmhosts file is a list of NetBIOS names to IP addresses that is loaded by the nmbd server and used via the name -resolution mechanism \fIname resolve -order\fR described in \fBsmb.conf\fR(5) to resolve any -NetBIOS name queries needed by the server. Note +resolution mechanism name resolve order described in \fIsmb.conf(5)\fR +to resolve any NetBIOS name queries needed by the server. Note that the contents of this file are \fBNOT\fR used by \fBnmbd\fR to answer any name queries. Adding a line to this file affects name NetBIOS resolution @@ -103,48 +113,53 @@ The default path to this file is compiled into Samba as part of the build process. Common defaults are \fI/usr/local/samba/lib/lmhosts\fR, \fI/usr/samba/lib/lmhosts\fR or -\fI/etc/samba/lmhosts\fR. See the \fBlmhosts\fR(5) man page for details on the contents of this file. +\fI/etc/lmhosts\fR. See the +\fIlmhosts(5)\fR +man page for details on the contents of this file. .TP \fB-V\fR Prints the version number for -\fBsmbd\fR. +\fBnmbd\fR. .TP -\fB-s \fR -The file specified contains the -configuration details required by the server. The -information in this file includes server-specific -information such as what printcap file to use, as well -as descriptions of all the services that the server is -to provide. See \fIsmb.conf(5)\fR for more information. -The default configuration file name is determined at -compile time. -.TP -\fB-d|--debug=debuglevel\fR -\fIdebuglevel\fR is an integer +\fB-d \fR +debuglevel is an integer from 0 to 10. The default value if this parameter is not specified is zero. -The higher this value, the more detail will be -logged to the log files about the activities of the +The higher this value, the more detail will +be logged to the log files about the activities of the server. At level 0, only critical errors and serious warnings will be logged. Level 1 is a reasonable level for day to day running - it generates a small amount of information about operations carried out. -Levels above 1 will generate considerable -amounts of log data, and should only be used when -investigating a problem. Levels above 3 are designed for -use only by developers and generate HUGE amounts of log -data, most of which is extremely cryptic. +Levels above 1 will generate considerable amounts +of log data, and should only be used when investigating +a problem. Levels above 3 are designed for use only by developers +and generate HUGE amounts of log data, most of which is extremely +cryptic. -Note that specifying this parameter here will -override the log -level file. +Note that specifying this parameter here will override +the log level +parameter in the \fI smb.conf(5)\fR file. +.TP +\fB-l \fR +The -l parameter specifies a directory +into which the "log.nmbd" log file will be created +for operational data from the running \fBnmbd\fR +server. The default log directory is compiled into Samba +as part of the build process. Common defaults are \fI /usr/local/samba/var/log.nmb\fR, \fI /usr/samba/var/log.nmb\fR or +\fI/var/log/log.nmb\fR. \fBBeware:\fR +If the directory specified does not exist, \fBnmbd\fR +will log to the default debug log location defined at compile time. .TP -\fB-l|--logfile=logbasename\fR -File name for log/debug files. The extension -".client" will be appended. The log file is -never removed by the client. +\fB-n \fR +This option allows you to override +the NetBIOS name that Samba uses for itself. This is identical +to setting the NetBIOS name parameter in the +\fIsmb.conf\fR file. However, a command +line setting will take precedence over settings in +\fIsmb.conf\fR. .TP \fB-p \fR UDP port number is a positive integer value. @@ -152,13 +167,21 @@ This option changes the default UDP port number (normally 137) that \fBnmbd\fR responds to name queries on. Don't use this option unless you are an expert, in which case you won't need help! +.TP +\fB-s \fR +The default configuration file name +is set at build time, typically as \fI /usr/local/samba/lib/smb.conf\fR, but +this may be changed when Samba is autoconfigured. + +The file specified contains the configuration details +required by the server. See \fIsmb.conf(5)\fR for more information. .SH "FILES" .TP \fB\fI/etc/inetd.conf\fB\fR If the server is to be run by the \fBinetd\fR meta-daemon, this file must contain suitable startup information for the -meta-daemon. See the install document +meta-daemon. See the UNIX_INSTALL.html document for details. .TP \fB\fI/etc/rc\fB\fR @@ -167,7 +190,7 @@ system uses). If running the server as a daemon at startup, this file will need to contain an appropriate startup -sequence for the server. See the "How to Install and Test SAMBA" document +sequence for the server. See the UNIX_INSTALL.html document for details. .TP \fB\fI/etc/services\fB\fR @@ -175,26 +198,27 @@ If running the server via the meta-daemon \fBinetd\fR, this file must contain a mapping of service name (e.g., netbios-ssn) to service port (e.g., 139) and protocol type (e.g., tcp). -See the "How to Install and Test SAMBA" +See the UNIX_INSTALL.html document for details. .TP \fB\fI/usr/local/samba/lib/smb.conf\fB\fR -This is the default location of -the \fBsmb.conf\fR(5) server -configuration file. Other common places that systems +This is the default location of the +\fIsmb.conf\fR +server configuration file. Other common places that systems install this file are \fI/usr/samba/lib/smb.conf\fR -and \fI/etc/samba/smb.conf\fR. +and \fI/etc/smb.conf\fR. When run as a WINS server (see the wins support -parameter in the \fBsmb.conf\fR(5) man page), +parameter in the \fIsmb.conf(5)\fR man page), \fBnmbd\fR will store the WINS database in the file \fIwins.dat\fR in the \fIvar/locks\fR directory configured under wherever Samba was configured to install itself. If \fBnmbd\fR is acting as a \fB browse master\fR (see the local master -parameter in the \fBsmb.conf\fR(5) man page, \fBnmbd\fR +parameter in the \fIsmb.conf(5)\fR man page, +\fBnmbd\fR will store the browsing database in the file \fIbrowse.dat \fR in the \fIvar/locks\fR directory configured under wherever Samba was configured to install itself. @@ -214,10 +238,10 @@ under wherever Samba was configured to install itself). This will also cause \fBnmbd\fR to dump out its server database in the \fIlog.nmb\fR file. .PP -The debug log level of nmbd may be raised or lowered -using \fBsmbcontrol\fR(1) (SIGUSR[1|2] signals -are no longer used since Samba 2.2). This is to allow -transient problems to be diagnosed, whilst still running +The debug log level of nmbd may be raised or lowered using +\fBsmbcontrol(1)\fR + (SIGUSR[1|2] signals are no longer used in Samba 2.2). This is +to allow transient problems to be diagnosed, whilst still running at a normally low log level. .SH "VERSION" .PP @@ -225,8 +249,11 @@ This man page is correct for version 3.0 of the Samba suite. .SH "SEE ALSO" .PP -\fBinetd\fR(8), \fBsmbd\fR(8), \fBsmb.conf\fR(5), \fBsmbclient\fR(1), \fBtestparm\fR(1), \fBtestprns\fR(1), and the Internet -RFC's \fIrfc1001.txt\fR, \fIrfc1002.txt\fR. +\fBinetd(8)\fR, \fBsmbd(8)\fR +\fIsmb.conf(5)\fR + \fBsmbclient(1) +\fR and the Internet RFC's +\fIrfc1001.txt\fR, \fIrfc1002.txt\fR. In addition the CIFS (formerly SMB) specification is available as a link from the Web page http://samba.org/cifs/ . @@ -239,7 +266,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook -XML 4.2 for Samba 3.0 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/nmblookup.1 b/docs/manpages/nmblookup.1 index 08ddd1c1339..06e608a62e5 100644 --- a/docs/manpages/nmblookup.1 +++ b/docs/manpages/nmblookup.1 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "NMBLOOKUP" "1" "03 april 2003" "" "" - +.TH "NMBLOOKUP" "1" "04 March 2003" "" "" .SH NAME nmblookup \- NetBIOS over TCP/IP client used to lookup NetBIOS names .SH SYNOPSIS @@ -13,7 +12,7 @@ nmblookup \- NetBIOS over TCP/IP client used to lookup NetBIOS names .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP \fBnmblookup\fR is used to query NetBIOS names and map them to IP addresses in a network using NetBIOS over TCP/IP @@ -34,7 +33,7 @@ to do a recursive lookup. This is used when sending a name query to a machine running a WINS server and the user wishes to query the names in the WINS server. If this bit is unset the normal (broadcast responding) NetBIOS processing code -on a machine is used instead. See RFC1001, RFC1002 for details. +on a machine is used instead. See rfc1001, rfc1002 for details. .TP \fB-S\fR Once the name query has returned an IP @@ -47,51 +46,22 @@ datagrams. The reason for this option is a bug in Windows 95 where it ignores the source port of the requesting packet and only replies to UDP port 137. Unfortunately, on most UNIX systems root privilege is needed to bind to this port, and -in addition, if the \fBnmbd\fR(8) daemon is running on this machine it also binds to this port. +in addition, if the nmbd(8) +daemon is running on this machine it also binds to this port. .TP \fB-A\fR Interpret \fIname\fR as an IP Address and do a node status query on this address. .TP -\fB-n \fR -This option allows you to override -the NetBIOS name that Samba uses for itself. This is identical -to setting the \fINetBIOS -name\fR parameter in the \fBsmb.conf\fR(5) file. However, a command -line setting will take precedence over settings in -\fBsmb.conf\fR(5). -.TP -\fB-i \fR -This specifies a NetBIOS scope that -\fBnmblookup\fR will use to communicate with when -generating NetBIOS names. For details on the use of NetBIOS -scopes, see rfc1001.txt and rfc1002.txt. NetBIOS scopes are -\fBvery\fR rarely used, only set this parameter -if you are the system administrator in charge of all the -NetBIOS systems you communicate with. -.TP -\fB-W|--workgroup=domain\fR -Set the SMB domain of the username. This -overrides the default domain which is the domain defined in -smb.conf. If the domain specified is the same as the servers -NetBIOS name, it causes the client to log on using the servers local -SAM (as opposed to the Domain SAM). -.TP -\fB-O socket options\fR -TCP socket options to set on the client -socket. See the socket options parameter in -the \fBsmb.conf\fR(5) manual page for the list of valid -options. -.TP -\fB-h|--help\fR -Print a summary of command line options. +\fB-h\fR +Print a help (usage) message. .TP \fB-B \fR Send the query to the given broadcast address. Without this option the default behavior of nmblookup is to send the query to the broadcast address of the network interfaces as either auto-detected or defined in the \fIinterfaces\fR - parameter of the \fBsmb.conf\fR(5) file. + parameter of the \fIsmb.conf (5)\fR file. .TP \fB-U \fR Do a unicast query to the specified address or @@ -99,46 +69,37 @@ host \fIunicast address\fR. This option (along with the \fI-R\fR option) is needed to query a WINS server. .TP -\fB-V\fR -Prints the version number for -\fBsmbd\fR. -.TP -\fB-s \fR -The file specified contains the -configuration details required by the server. The -information in this file includes server-specific -information such as what printcap file to use, as well -as descriptions of all the services that the server is -to provide. See \fIsmb.conf(5)\fR for more information. -The default configuration file name is determined at -compile time. -.TP -\fB-d|--debug=debuglevel\fR -\fIdebuglevel\fR is an integer -from 0 to 10. The default value if this parameter is -not specified is zero. +\fB-d \fR +debuglevel is an integer from 0 to 10. -The higher this value, the more detail will be -logged to the log files about the activities of the -server. At level 0, only critical errors and serious -warnings will be logged. Level 1 is a reasonable level for -day to day running - it generates a small amount of -information about operations carried out. +The default value if this parameter is not specified +is zero. -Levels above 1 will generate considerable -amounts of log data, and should only be used when -investigating a problem. Levels above 3 are designed for -use only by developers and generate HUGE amounts of log -data, most of which is extremely cryptic. +The higher this value, the more detail will be logged +about the activities of \fBnmblookup\fR. At level +0, only critical errors and serious warnings will be logged. -Note that specifying this parameter here will -override the log -level file. +Levels above 1 will generate considerable amounts of +log data, and should only be used when investigating a problem. +Levels above 3 are designed for use only by developers and +generate HUGE amounts of data, most of which is extremely cryptic. + +Note that specifying this parameter here will override +the \fI log level\fR parameter in the \fI smb.conf(5)\fR file. +.TP +\fB-s \fR +This parameter specifies the pathname to +the Samba configuration file, smb.conf(5) This file controls all aspects of +the Samba setup on the machine. .TP -\fB-l|--logfile=logbasename\fR -File name for log/debug files. The extension -".client" will be appended. The log file is -never removed by the client. +\fB-i \fR +This specifies a NetBIOS scope that +\fBnmblookup\fR will use to communicate with when +generating NetBIOS names. For details on the use of NetBIOS +scopes, see rfc1001.txt and rfc1002.txt. NetBIOS scopes are +\fBvery\fR rarely used, only set this parameter +if you are the system administrator in charge of all the +NetBIOS systems you communicate with. .TP \fB-T\fR This causes any IP addresses found in the @@ -165,8 +126,8 @@ area. .PP \fBnmblookup\fR can be used to query a WINS server (in the same way \fBnslookup\fR is -used to query DNS servers). To query a WINS server, \fBnmblookup\fR -must be called like this: +used to query DNS servers). To query a WINS server, +\fBnmblookup\fR must be called like this: .PP \fBnmblookup -U server -R 'name'\fR .PP @@ -182,7 +143,8 @@ This man page is correct for version 3.0 of the Samba suite. .SH "SEE ALSO" .PP -\fBnmbd\fR(8), \fBsamba\fR(7), and \fBsmb.conf\fR(5). +\fBnmbd(8)\fR +samba(7) and smb.conf(5) .SH "AUTHOR" .PP The original Samba software and related utilities @@ -192,7 +154,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook -XML 4.2 for Samba 3.0 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/pdbedit.8 b/docs/manpages/pdbedit.8 index fe32547e92e..82765d6dad1 100644 --- a/docs/manpages/pdbedit.8 +++ b/docs/manpages/pdbedit.8 @@ -3,17 +3,16 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "PDBEDIT" "8" "03 april 2003" "" "" - +.TH "PDBEDIT" "8" "30 March 2003" "" "" .SH NAME pdbedit \- manage the SAM database .SH SYNOPSIS -\fBpdbedit\fR [ \fB-l\fR ] [ \fB-v\fR ] [ \fB-w\fR ] [ \fB-u username\fR ] [ \fB-f fullname\fR ] [ \fB-h homedir\fR ] [ \fB-D drive\fR ] [ \fB-S script\fR ] [ \fB-p profile\fR ] [ \fB-a\fR ] [ \fB-m\fR ] [ \fB-x\fR ] [ \fB-i passdb-backend\fR ] [ \fB-e passdb-backend\fR ] [ \fB-g\fR ] [ \fB-b passdb-backend\fR ] [ \fB-g\fR ] [ \fB-d debuglevel\fR ] [ \fB-s configfile\fR ] [ \fB-P account-policy\fR ] [ \fB-C value\fR ] +\fBpdbedit\fR [ \fB-l\fR ] [ \fB-v\fR ] [ \fB-w\fR ] [ \fB-u username\fR ] [ \fB-f fullname\fR ] [ \fB-h homedir\fR ] [ \fB-D drive\fR ] [ \fB-S script\fR ] [ \fB-p profile\fR ] [ \fB-a\fR ] [ \fB-m\fR ] [ \fB-x\fR ] [ \fB-i passdb-backend\fR ] [ \fB-e passdb-backend\fR ] [ \fB-g\fR ] [ \fB-b passdb-backend\fR ] [ \fB-d debuglevel\fR ] [ \fB-s configfile\fR ] [ \fB-P account-policy\fR ] [ \fB-V value\fR ] .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP The pdbedit program is used to manage the users accounts stored in the sam database and can only be run by root. @@ -38,8 +37,9 @@ Example: \fBpdbedit -l\fR .nf -sorce:500:Simo Sorce -samba:45:Test User + sorce:500:Simo Sorce + samba:45:Test User + .fi .TP \fB-v\fR @@ -51,38 +51,40 @@ Example: \fBpdbedit -l -v\fR .nf ---------------- -username: sorce -user ID/Group: 500/500 -user RID/GRID: 2000/2001 -Full Name: Simo Sorce -Home Directory: \\\\BERSERKER\\sorce -HomeDir Drive: H: -Logon Script: \\\\BERSERKER\\netlogon\\sorce.bat -Profile Path: \\\\BERSERKER\\profile ---------------- -username: samba -user ID/Group: 45/45 -user RID/GRID: 1090/1091 -Full Name: Test User -Home Directory: \\\\BERSERKER\\samba -HomeDir Drive: -Logon Script: -Profile Path: \\\\BERSERKER\\profile + --------------- + username: sorce + user ID/Group: 500/500 + user RID/GRID: 2000/2001 + Full Name: Simo Sorce + Home Directory: \\\\BERSERKER\\sorce + HomeDir Drive: H: + Logon Script: \\\\BERSERKER\\netlogon\\sorce.bat + Profile Path: \\\\BERSERKER\\profile + --------------- + username: samba + user ID/Group: 45/45 + user RID/GRID: 1090/1091 + Full Name: Test User + Home Directory: \\\\BERSERKER\\samba + HomeDir Drive: + Logon Script: + Profile Path: \\\\BERSERKER\\profile + .fi .TP \fB-w\fR This option sets the "smbpasswd" listing format. It will make pdbedit list the users in the database, printing out the account fields in a format compatible with the -\fIsmbpasswd\fR file format. (see the -\fBsmbpasswd\fR(5) for details) +\fIsmbpasswd\fR file format. (see the \fIsmbpasswd(5)\fR for details) Example: \fBpdbedit -l -w\fR + .nf -sorce:500:508818B733CE64BEAAD3B435B51404EE:D2A2418EFC466A8A0F6B1DBB5C3DB80C:[UX ]:LCT-00000000: -samba:45:0F2B255F7B67A7A9AAD3B435B51404EE:BC281CE3F53B6A5146629CD4751D3490:[UX ]:LCT-3BFA1E8D: + sorce:500:508818B733CE64BEAAD3B435B51404EE:D2A2418EFC466A8A0F6B1DBB5C3DB80C:[UX ]:LCT-00000000: + samba:45:0F2B255F7B67A7A9AAD3B435B51404EE:BC281CE3F53B6A5146629CD4751D3490:[UX ]:LCT-3BFA1E8D: + .fi .TP \fB-u username\fR @@ -137,7 +139,7 @@ Example: \fBpdbedit -a -u sorce\fR .nf new password: -retype new password + retype new password .fi .TP \fB-m\fR @@ -180,14 +182,6 @@ If you specify \fI-g\fR, then \fI-i in-backend -e out-backend\fR applies to the group mapping instead of the user database. -This option will ease migration from one passdb backend to -another and will ease backing up. -.TP -\fB-g\fR -If you specify \fI-g\fR, -then \fI-i in-backend -e out-backend\fR -applies to the group mapping instead of the user database. - This option will ease migration from one passdb backend to another and will ease backing up. .TP @@ -207,39 +201,24 @@ Example: \fBpdbedit -P "bad lockout attempt"\fR .nf -account policy value for bad lockout attempt is 0 + account policy value for bad lockout attempt is 0 + .fi .TP -\fB-C account-policy-value\fR +\fB-V account-policy-value\fR Sets an account policy to a specified value. This option may only be used in conjunction with the \fI-P\fR option. -Example: \fBpdbedit -P "bad lockout attempt" -C 3\fR +Example: \fBpdbedit -P "bad lockout attempt" -V 3\fR .nf -account policy value for bad lockout attempt was 0 -account policy value for bad lockout attempt is now 3 + account policy value for bad lockout attempt was 0 + account policy value for bad lockout attempt is now 3 + .fi .TP -\fB-h|--help\fR -Print a summary of command line options. -.TP -\fB-V\fR -Prints the version number for -\fBsmbd\fR. -.TP -\fB-s \fR -The file specified contains the -configuration details required by the server. The -information in this file includes server-specific -information such as what printcap file to use, as well -as descriptions of all the services that the server is -to provide. See \fIsmb.conf(5)\fR for more information. -The default configuration file name is determined at -compile time. -.TP \fB-d|--debug=debuglevel\fR \fIdebuglevel\fR is an integer from 0 to 10. The default value if this parameter is @@ -262,10 +241,18 @@ Note that specifying this parameter here will override the log level file. .TP -\fB-l|--logfile=logbasename\fR -File name for log/debug files. The extension -".client" will be appended. The log file is -never removed by the client. +\fB-h|--help\fR +Print a summary of command line options. +.TP +\fB-s \fR +The file specified contains the +configuration details required by the server. The +information in this file includes server-specific +information such as what printcap file to use, as well +as descriptions of all the services that the server is +to provide. See \fIsmb.conf(5)\fR for more information. +The default configuration file name is determined at +compile time. .SH "NOTES" .PP This command may be used only by root. @@ -275,7 +262,8 @@ This man page is correct for version 2.2 of the Samba suite. .SH "SEE ALSO" .PP -\fBsmbpasswd\fR(5), \fBsamba\fR(7) +smbpasswd(8) +samba(7) .SH "AUTHOR" .PP The original Samba software and related utilities @@ -285,7 +273,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook -XML 4.2 for Samba 3.0 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/rpcclient.1 b/docs/manpages/rpcclient.1 index 8f880afcd39..dcba30100bc 100644 --- a/docs/manpages/rpcclient.1 +++ b/docs/manpages/rpcclient.1 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "RPCCLIENT" "1" "03 april 2003" "" "" - +.TH "RPCCLIENT" "1" "04 March 2003" "" "" .SH NAME rpcclient \- tool for executing client side MS-RPC functions .SH SYNOPSIS @@ -13,7 +12,7 @@ rpcclient \- tool for executing client side MS-RPC functions .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP \fBrpcclient\fR is a utility initially developed to test MS-RPC functionality in Samba itself. It has undergone @@ -25,41 +24,28 @@ their UNIX workstation. \fBserver\fR NetBIOS name of Server to which to connect. The server can be any SMB/CIFS server. The name is -resolved using the \fIname resolve order\fR line from \fBsmb.conf\fR(5). -.TP -\fB-c|--command='command string'\fR -execute semicolon separated commands (listed -below)) +resolved using the \fIname resolve order\fR line from +\fIsmb.conf(5)\fR. .TP -\fB-I IP-address\fR -\fIIP address\fR is the address of the server to connect to. -It should be specified in standard "a.b.c.d" notation. +\fB-A|--authfile=filename\fR +This option allows +you to specify a file from which to read the username and +password used in the connection. The format of the file is -Normally the client would attempt to locate a named -SMB/CIFS server by looking it up via the NetBIOS name resolution -mechanism described above in the \fIname resolve order\fR -parameter above. Using this parameter will force the client -to assume that the server is on the machine with the specified IP -address and the NetBIOS name component of the resource being -connected to will be ignored. -There is no default for this parameter. If not supplied, -it will be determined automatically by the client as described -above. -.TP -\fB-V\fR -Prints the version number for -\fBsmbd\fR. +.nf + username = + password = + domain = + +.fi + +Make certain that the permissions on the file restrict +access from unwanted users. .TP -\fB-s \fR -The file specified contains the -configuration details required by the server. The -information in this file includes server-specific -information such as what printcap file to use, as well -as descriptions of all the services that the server is -to provide. See \fIsmb.conf(5)\fR for more information. -The default configuration file name is determined at -compile time. +\fB-c|--command='command string'\fR +execute semicolon separated commands (listed +below)) .TP \fB-d|--debug=debuglevel\fR \fIdebuglevel\fR is an integer @@ -83,235 +69,120 @@ Note that specifying this parameter here will override the log level file. .TP -\fB-l|--logfile=logbasename\fR -File name for log/debug files. The extension -".client" will be appended. The log file is -never removed by the client. +\fB-h|--help\fR +Print a summary of command line options. .TP -\fB-N\fR -If specified, this parameter suppresses the normal -password prompt from the client to the user. This is useful when -accessing a service that does not require a password. +\fB-I IP-address\fR +\fIIP address\fR is the address of the server to connect to. +It should be specified in standard "a.b.c.d" notation. + +Normally the client would attempt to locate a named +SMB/CIFS server by looking it up via the NetBIOS name resolution +mechanism described above in the \fIname resolve order\fR +parameter above. Using this parameter will force the client +to assume that the server is on the machine with the specified IP +address and the NetBIOS name component of the resource being +connected to will be ignored. -Unless a password is specified on the command line or -this parameter is specified, the client will request a -password. +There is no default for this parameter. If not supplied, +it will be determined automatically by the client as described +above. .TP -\fB-k\fR -Try to authenticate with kerberos. Only useful in -an Active Directory environment. +\fB-l|--logfile=logbasename\fR +File name for log/debug files. The extension +\&'.client' will be appended. The log file is +never removed by the client. .TP -\fB-A|--authfile=filename\fR -This option allows -you to specify a file from which to read the username and -password used in the connection. The format of the file is - - -.nf -username = -password = -domain = -.fi - -Make certain that the permissions on the file restrict -access from unwanted users. +\fB-N|--nopass\fR +instruct \fBrpcclient\fR not to ask +for a password. By default, \fBrpcclient\fR will +prompt for a password. See also the \fI-U\fR +option. +.TP +\fB-s|--conf=smb.conf\fR +Specifies the location of the all-important +\fIsmb.conf\fR file. .TP \fB-U|--user=username[%password]\fR Sets the SMB username or username and password. -If %password is not specified, the user will be prompted. The -client will first check the \fBUSER\fR environment variable, then the -\fBLOGNAME\fR variable and if either exists, the -string is uppercased. If these environmental variables are not +If %password is not specified, the user will be prompted. The +client will first check the \fBUSER\fR environment variable, then the +\fBLOGNAME\fR variable and if either exists, the +string is uppercased. If these environmental variables are not found, the username GUEST is used. -A third option is to use a credentials file which -contains the plaintext of the username and password. This -option is mainly provided for scripts where the admin does not -wish to pass the credentials on the command line or via environment -variables. If this method is used, make certain that the permissions -on the file restrict access from unwanted users. See the +A third option is to use a credentials file which +contains the plaintext of the username and password. This +option is mainly provided for scripts where the admin does not +wish to pass the credentials on the command line or via environment +variables. If this method is used, make certain that the permissions +on the file restrict access from unwanted users. See the \fI-A\fR for more details. -Be cautious about including passwords in scripts. Also, on -many systems the command line of a running process may be seen -via the \fBps\fR command. To be safe always allow -\fBrpcclient\fR to prompt for a password and type +Be cautious about including passwords in scripts. Also, on +many systems the command line of a running process may be seen +via the \fBps\fR command. To be safe always allow +\fBrpcclient\fR to prompt for a password and type it in directly. .TP -\fB-n \fR -This option allows you to override -the NetBIOS name that Samba uses for itself. This is identical -to setting the \fINetBIOS -name\fR parameter in the \fBsmb.conf\fR(5) file. However, a command -line setting will take precedence over settings in -\fBsmb.conf\fR(5). -.TP -\fB-i \fR -This specifies a NetBIOS scope that -\fBnmblookup\fR will use to communicate with when -generating NetBIOS names. For details on the use of NetBIOS -scopes, see rfc1001.txt and rfc1002.txt. NetBIOS scopes are -\fBvery\fR rarely used, only set this parameter -if you are the system administrator in charge of all the -NetBIOS systems you communicate with. -.TP \fB-W|--workgroup=domain\fR -Set the SMB domain of the username. This -overrides the default domain which is the domain defined in -smb.conf. If the domain specified is the same as the servers -NetBIOS name, it causes the client to log on using the servers local -SAM (as opposed to the Domain SAM). -.TP -\fB-O socket options\fR -TCP socket options to set on the client -socket. See the socket options parameter in -the \fBsmb.conf\fR(5) manual page for the list of valid -options. -.TP -\fB-h|--help\fR -Print a summary of command line options. +Set the SMB domain of the username. This +overrides the default domain which is the domain defined in +smb.conf. If the domain specified is the same as the server's NetBIOS name, +it causes the client to log on using the server's local SAM (as +opposed to the Domain SAM). .SH "COMMANDS" -.SS "LSARPC" -.TP +.PP +\fBLSARPC\fR +.TP 0.2i +\(bu \fBlsaquery\fR -Query info policy -.TP -\fBlookupsids\fR -Resolve a list +.TP 0.2i +\(bu +\fBlookupsids\fR - Resolve a list of SIDs to usernames. -.TP -\fBlookupnames\fR -Resolve a list +.TP 0.2i +\(bu +\fBlookupnames\fR - Resolve a list of usernames to SIDs. -.TP +.TP 0.2i +\(bu \fBenumtrusts\fR -Enumerate trusted domains -.TP -\fBenumprivs\fR -Enumerate privileges -.TP -\fBgetdispname\fR -Get the privilege name -.TP -\fBlsaenumsid\fR -Enumerate the LSA SIDS -.TP -\fBlsaenumprivsaccount\fR -Enumerate the privileges of an SID -.TP -\fBlsaenumacctrights\fR -Enumerate the rights of an SID -.TP -\fBlsaenumacctwithright\fR -Enumerate accounts with a right -.TP -\fBlsaaddacctrights\fR -Add rights to an account -.TP -\fBlsaremoveacctrights\fR -Remove rights from an account -.TP -\fBlsalookupprivvalue\fR -Get a privilege value given its name -.TP -\fBlsaquerysecobj\fR -Query LSA security object -.SS "LSARPC-DS" -.TP -\fBdsroledominfo\fR -Get Primary Domain Information .PP .PP -\fBDFS\fR -.TP -\fBdfsexist\fR -Query DFS support -.TP -\fBdfsadd\fR -Add a DFS share -.TP -\fBdfsremove\fR -Remove a DFS share -.TP -\fBdfsgetinfo\fR -Query DFS share info -.TP -\fBdfsenum\fR -Enumerate dfs shares -.SS "REG" -.TP -\fBshutdown\fR -Remote Shutdown -.TP -\fBabortshutdown\fR -Abort Shutdown -.SS "SRVSVC" -.TP -\fBsrvinfo\fR -Server query info -.TP -\fBnetshareenum\fR -Enumerate shares -.TP -\fBnetfileenum\fR -Enumerate open files -.TP -\fBnetremotetod\fR -Fetch remote time of day -.SS "SAMR" -.TP +\fBSAMR\fR +.TP 0.2i +\(bu \fBqueryuser\fR -Query user info -.TP +.TP 0.2i +\(bu \fBquerygroup\fR -Query group info -.TP +.TP 0.2i +\(bu \fBqueryusergroups\fR -Query user groups -.TP +.TP 0.2i +\(bu \fBquerygroupmem\fR -Query group membership -.TP +.TP 0.2i +\(bu \fBqueryaliasmem\fR -Query alias membership -.TP +.TP 0.2i +\(bu \fBquerydispinfo\fR -Query display info -.TP +.TP 0.2i +\(bu \fBquerydominfo\fR -Query domain info -.TP -\fBenumdomusers\fR -Enumerate domain users -.TP +.TP 0.2i +\(bu \fBenumdomgroups\fR -Enumerate domain groups -.TP -\fBenumalsgroups\fR -Enumerate alias groups -.TP -\fBcreatedomuser\fR -Create domain user -.TP -\fBsamlookupnames\fR -Look up names -.TP -\fBsamlookuprids\fR -Look up names -.TP -\fBdeletedomuser\fR -Delete domain user -.TP -\fBsamquerysecobj\fR -Query SAMR security object -.TP -\fBgetdompwinfo\fR -Retrieve domain password info -.SS "SPOOLSS" -.TP -\fBadddriver \fR -Execute an AddPrinterDriver() RPC to install the printer driver +.PP +.PP +\fBSPOOLSS\fR +.TP 0.2i +\(bu +\fBadddriver \fR +- Execute an AddPrinterDriver() RPC to install the printer driver information on the server. Note that the driver files should already exist in the directory returned by \fBgetdriverdir\fR. Possible values for @@ -322,14 +193,15 @@ follows: .nf -Long Printer Name:\\ -Driver File Name:\\ -Data File Name:\\ -Config File Name:\\ -Help File Name:\\ -Language Monitor Name:\\ -Default Data Type:\\ -Comma Separated list of Files + Long Printer Name:\\ + Driver File Name:\\ + Data File Name:\\ + Config File Name:\\ + Help File Name:\\ + Language Monitor Name:\\ + Default Data Type:\\ + Comma Separated list of Files + .fi Any empty fields should be enter as the string "NULL". @@ -340,149 +212,111 @@ use of a bi-directional link for communication. This field should be "NULL". On a remote NT print server, the Print Monitor for a driver must already be installed prior to adding the driver or else the RPC will fail. -.TP -\fBaddprinter \fR -Add a printer on the remote server. This printer +.TP 0.2i +\(bu +\fBaddprinter + \fR +- Add a printer on the remote server. This printer will be automatically shared. Be aware that the printer driver must already be installed on the server (see \fBadddriver\fR) and the \fIport\fRmust be a valid port name (see \fBenumports\fR. -.TP -\fBdeldriver\fR -Delete the +.TP 0.2i +\(bu +\fBdeldriver\fR - Delete the specified printer driver for all architectures. This does not delete the actual driver files from the server, only the entry from the server's list of drivers. -.TP -\fBenumdata\fR -Enumerate all +.TP 0.2i +\(bu +\fBenumdata\fR - Enumerate all printer setting data stored on the server. On Windows NT clients, these values are stored in the registry, while Samba servers store them in the printers TDB. This command corresponds to the MS Platform SDK GetPrinterData() function (* This command is currently unimplemented). -.TP -\fBenumdataex\fR -Enumerate printer data for a key -.TP -\fBenumjobs \fR -List the jobs and status of a given printer. +.TP 0.2i +\(bu +\fBenumjobs \fR +- List the jobs and status of a given printer. This command corresponds to the MS Platform SDK EnumJobs() -function -.TP -\fBenumkey\fR -Enumerate printer keys -.TP -\fBenumports [level]\fR -Executes an EnumPorts() call using the specified +function (* This command is currently unimplemented). +.TP 0.2i +\(bu +\fBenumports [level]\fR +- Executes an EnumPorts() call using the specified info level. Currently only info levels 1 and 2 are supported. -.TP -\fBenumdrivers [level]\fR -Execute an EnumPrinterDrivers() call. This lists the various installed +.TP 0.2i +\(bu +\fBenumdrivers [level]\fR +- Execute an EnumPrinterDrivers() call. This lists the various installed printer drivers for all architectures. Refer to the MS Platform SDK documentation for more details of the various flags and calling options. Currently supported info levels are 1, 2, and 3. -.TP -\fBenumprinters [level]\fR -Execute an EnumPrinters() call. This lists the various installed +.TP 0.2i +\(bu +\fBenumprinters [level]\fR +- Execute an EnumPrinters() call. This lists the various installed and share printers. Refer to the MS Platform SDK documentation for more details of the various flags and calling options. Currently supported info levels are 0, 1, and 2. -.TP -\fBgetdata \fR -Retrieve the data for a given printer setting. See +.TP 0.2i +\(bu +\fBgetdata \fR +- Retrieve the data for a given printer setting. See the \fBenumdata\fR command for more information. This command corresponds to the GetPrinterData() MS Platform -SDK function. -.TP -\fBgetdataex\fR -Get printer driver data with keyname -.TP -\fBgetdriver \fR -Retrieve the printer driver information (such as driver file, +SDK function (* This command is currently unimplemented). +.TP 0.2i +\(bu +\fBgetdriver \fR +- Retrieve the printer driver information (such as driver file, config file, dependent files, etc...) for the given printer. This command corresponds to the GetPrinterDriver() MS Platform SDK function. Currently info level 1, 2, and 3 are supported. -.TP -\fBgetdriverdir \fR -Execute a GetPrinterDriverDirectory() +.TP 0.2i +\(bu +\fBgetdriverdir \fR +- Execute a GetPrinterDriverDirectory() RPC to retrieve the SMB share name and subdirectory for storing printer driver files for a given architecture. Possible values for \fIarch\fR are "Windows 4.0" (for Windows 95/98), "Windows NT x86", "Windows NT PowerPC", "Windows Alpha_AXP", and "Windows NT R4000". -.TP -\fBgetprinter \fR -Retrieve the current printer information. This command +.TP 0.2i +\(bu +\fBgetprinter \fR +- Retrieve the current printer information. This command corresponds to the GetPrinter() MS Platform SDK function. -.TP -\fBgetprintprocdir\fR -Get print processor directory -.TP -\fBopenprinter \fR -Execute an OpenPrinterEx() and ClosePrinter() RPC +.TP 0.2i +\(bu +\fBopenprinter \fR +- Execute an OpenPrinterEx() and ClosePrinter() RPC against a given printer. -.TP -\fBsetdriver \fR -Execute a SetPrinter() command to update the printer driver +.TP 0.2i +\(bu +\fBsetdriver +\fR +- Execute a SetPrinter() command to update the printer driver associated with an installed printer. The printer driver must already be correctly installed on the print server. See also the \fBenumprinters\fR and \fBenumdrivers\fR commands for obtaining a list of of installed printers and drivers. -.TP -\fBaddform\fR -Add form -.TP -\fBsetform\fR -Set form -.TP -\fBgetform\fR -Get form -.TP -\fBdeleteform\fR -Delete form -.TP -\fBenumforms\fR -Enumerate form -.TP -\fBsetprinter\fR -Set printer comment -.TP -\fBsetprinterdata\fR -Set REG_SZ printer data -.TP -\fBrffpcnex\fR -Rffpcnex test -.SS "NETLOGON" -.TP -\fBlogonctrl2\fR -Logon Control 2 -.TP -\fBlogonctrl\fR -Logon Control -.TP -\fBsamsync\fR -Sam Synchronisation -.TP -\fBsamdeltas\fR -Query Sam Deltas -.TP -\fBsamlogon\fR -Sam Logon -.SS "GENERAL COMMANDS" -.TP -\fBdebuglevel\fR -Set the current +.PP +\fBGENERAL OPTIONS\fR +.TP 0.2i +\(bu +\fBdebuglevel\fR - Set the current debug level used to log information. -.TP -\fBhelp (?)\fR -Print a listing of all +.TP 0.2i +\(bu +\fBhelp (?)\fR - Print a listing of all known commands or extended help on a particular command. -.TP -\fBquit (exit)\fR -Exit \fBrpcclient +.TP 0.2i +\(bu +\fBquit (exit)\fR - Exit \fBrpcclient \fR. .SH "BUGS" .PP @@ -493,7 +327,7 @@ parameters where passed to the interpreter. .PP From Luke Leighton's original rpcclient man page: .PP -\fBWARNING!\fR The MSRPC over SMB code has +\fB"WARNING!\fR The MSRPC over SMB code has been developed from examining Network traces. No documentation is available from the original creators (Microsoft) on how MSRPC over SMB works, or how the individual MSRPC services work. Microsoft's @@ -501,11 +335,12 @@ implementation of these services has been demonstrated (and reported) to be... a bit flaky in places. .PP The development of Samba's implementation is also a bit rough, -and as more of the services are understood, it can even result in -versions of \fBsmbd\fR(8) and \fBrpcclient\fR(1) that are incompatible for some commands or services. Additionally, +and as more of the services are understood, it can even result in +versions of \fBsmbd(8)\fR and \fBrpcclient(1)\fR +that are incompatible for some commands or services. Additionally, the developers are sending reports to Microsoft, and problems found or reported to Microsoft are fixed in Service Packs, which may -result in incompatibilities. +result in incompatibilities." .SH "VERSION" .PP This man page is correct for version 3.0 of the Samba @@ -520,5 +355,4 @@ to the way the Linux kernel is developed. The original rpcclient man page was written by Matthew Geddes, Luke Kenneth Casson Leighton, and rewritten by Gerald Carter. The conversion to DocBook for Samba 2.2 was done by Gerald -Carter. The conversion to DocBook XML 4.2 for Samba 3.0 was -done by Alexander Bokovoy. +Carter. diff --git a/docs/manpages/samba.7 b/docs/manpages/samba.7 index e2a6132d18a..0a64a78718b 100644 --- a/docs/manpages/samba.7 +++ b/docs/manpages/samba.7 @@ -3,10 +3,9 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SAMBA" "7" "03 april 2003" "" "" - +.TH "SAMBA" "7" "04 March 2003" "" "" .SH NAME -Samba \- A Windows SMB/CIFS fileserver for UNIX +SAMBA \- A Windows SMB/CIFS fileserver for UNIX .SH SYNOPSIS \fBSamba\fR @@ -20,19 +19,20 @@ also referred to as the Common Internet File System (CIFS). For a more thorough description, see http://www.ubiqx.org/cifs/ . Samba also implements the NetBIOS protocol in nmbd. .TP -\fBsmbd(8)\fR -The \fBsmbd\fR daemon provides the file and print services to +\fBsmbd\fR +The \fBsmbd \fR +daemon provides the file and print services to SMB clients, such as Windows 95/98, Windows NT, Windows for Workgroups or LanManager. The configuration file -for this daemon is described in \fBsmb.conf\fR(5) +for this daemon is described in \fIsmb.conf\fR .TP -\fBnmbd(8)\fR +\fBnmbd\fR The \fBnmbd\fR daemon provides NetBIOS nameservice and browsing support. The configuration file for this daemon -is described in \fBsmb.conf\fR(5) +is described in \fIsmb.conf\fR .TP -\fBsmbclient(1)\fR +\fBsmbclient\fR The \fBsmbclient\fR program implements a simple ftp-like client. This is useful for accessing SMB shares on other compatible @@ -40,33 +40,33 @@ servers (such as Windows NT), and can also be used to allow a UNIX box to print to a printer attached to any SMB server (such as a PC running Windows NT). .TP -\fBtestparm(1)\fR +\fBtestparm\fR The \fBtestparm\fR -utility is a simple syntax checker for Samba's \fBsmb.conf\fR(5) configuration file. +utility is a simple syntax checker for Samba's +\fIsmb.conf\fRconfiguration file. .TP -\fBtestprns(1)\fR +\fBtestprns\fR The \fBtestprns\fR utility supports testing printer names defined in your \fIprintcap\fR file used by Samba. .TP -\fBsmbstatus(1)\fR +\fBsmbstatus\fR The \fBsmbstatus\fR tool provides access to information about the current connections to \fBsmbd\fR. .TP -\fBnmblookup(1)\fR +\fBnmblookup\fR The \fBnmblookup\fR tools allows NetBIOS name queries to be made from a UNIX host. .TP -\fBsmbgroupedit(8)\fR -The \fBsmbgroupedit\fR -tool allows for mapping unix groups to NT Builtin, -Domain, or Local groups. Also it allows setting -priviledges for that group, such as saAddUser, etc. +\fBmake_smbcodepage\fR +The \fBmake_smbcodepage\fR +utility provides a means of creating SMB code page +definition files for your \fBsmbd\fR server. .TP -\fBsmbpasswd(8)\fR +\fBsmbpasswd\fR The \fBsmbpasswd\fR command is a tool for changing LanMan and Windows NT password hashes on Samba and Windows NT servers. @@ -101,13 +101,13 @@ on the newsgroup comp.protocol.smb and the Samba list. Details on how to join the mailing list are given in the README file that comes with Samba. .PP -If you have access to a WWW viewer (such as Mozilla -or Konqueror) then you will also find lots of useful information, +If you have access to a WWW viewer (such as Netscape +or Mosaic) then you will also find lots of useful information, including back issues of the Samba mailing list, at http://lists.samba.org . .SH "VERSION" .PP -This man page is correct for version 3.0 of the +This man page is correct for version 2.2 of the Samba suite. .SH "CONTRIBUTIONS" .PP @@ -117,8 +117,8 @@ http://lists.samba.org . .PP If you have patches to submit, visit http://devel.samba.org/ -for information on how to do it properly. We prefer patches -in \fBdiff -u\fR format. +for information on how to do it properly. We prefer patches in +\fBdiff -u\fR format. .SH "CONTRIBUTORS" .PP Contributors to the project are now too numerous @@ -141,7 +141,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML -4.2 for Samba 3.0 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/smb.conf.5 b/docs/manpages/smb.conf.5 index 719bd645129..02861d492dd 100644 --- a/docs/manpages/smb.conf.5 +++ b/docs/manpages/smb.conf.5 @@ -3,18 +3,18 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SMB.CONF" "5" "03 april 2003" "" "" - +.TH "SMB.CONF" "5" "30 March 2003" "" "" .SH NAME smb.conf \- The configuration file for the Samba suite .SH "SYNOPSIS" .PP -The \fIsmb.conf\fR file is a configuration -file for the Samba suite. \fIsmb.conf\fR contains -runtime configuration information for the Samba programs. The \fIsmb.conf\fR file -is designed to be configured and administered by the \fBswat\fR(8) program. The complete -description of the file format and possible parameters held within -are here for reference purposes. +The \fIsmb.conf\fR file is a configuration +file for the Samba suite. \fIsmb.conf\fR contains +runtime configuration information for the Samba programs. The +\fIsmb.conf\fR file is designed to be configured and +administered by the \fBswat(8)\fR + program. The complete description of the file format and +possible parameters held within are here for reference purposes. .SH "FILE FORMAT" .PP The file consists of sections and parameters. A section @@ -93,9 +93,11 @@ The user has write access to the path \fI/home/bar\fR. The share is accessed via the share name "foo": .nf -[foo] - path = /home/bar - read only = no + [foo] + path = /home/bar + read only = no + + .fi .PP The following sample section defines a printable share. @@ -106,11 +108,13 @@ access will be permitted as the default guest user (specified elsewhere): .nf -[aprinter] - path = /usr/spool/public - read only = yes - printable = yes - guest ok = yes + [aprinter] + path = /usr/spool/public + read only = yes + printable = yes + guest ok = yes + + .fi .SH "SPECIAL SECTIONS" .SS "THE [GLOBAL] SECTION" @@ -168,8 +172,10 @@ than others. The following is a typical and suitable [homes] section: .nf -[homes] - read only = no + [homes] + read only = no + + .fi .PP An important point is that if guest access is specified @@ -229,10 +235,11 @@ it. A typical [printers] entry would look like this: .nf -[printers] - path = /usr/spool/public - guest ok = yes - printable = yes + [printers] + path = /usr/spool/public + guest ok = yes + printable = yes + .fi .PP All aliases given for a printer in the printcap file @@ -242,7 +249,9 @@ to set up a pseudo-printcap. This is a file consisting of one or more lines like this: .nf -alias|alias|alias|alias... + alias|alias|alias|alias... + + .fi .PP Each alias should be an acceptable printer name for @@ -256,15 +265,12 @@ An alias, by the way, is defined as any component of the first entry of a printcap record. Records are separated by newlines, components (if there are more than one) are separated by vertical bar symbols ('|'). -.sp -.RS -.B "Note:" -On SYSV systems which use lpstat to determine what +.PP +NOTE: On SYSV systems which use lpstat to determine what printers are defined on the system you may be able to use "printcap name = lpstat" to automatically obtain a list of printers. See the "printcap name" option for more details. -.RE .SH "PARAMETERS" .PP parameters define the specific attributes of sections. @@ -667,6 +673,9 @@ each parameter for details. Note that some are synonyms. \fIldap delete dn\fR .TP 0.2i \(bu +\fIldap del only sam attr\fR +.TP 0.2i +\(bu \fIldap filter\fR .TP 0.2i \(bu @@ -745,9 +754,6 @@ each parameter for details. Note that some are synonyms. \fImachine password timeout\fR .TP 0.2i \(bu -\fImangle prefix\fR -.TP 0.2i -\(bu \fImangled stack\fR .TP 0.2i \(bu @@ -877,15 +883,15 @@ each parameter for details. Note that some are synonyms. \fIpreload\fR .TP 0.2i \(bu -\fIpreload modules\fR -.TP 0.2i -\(bu \fIprintcap\fR .TP 0.2i \(bu \fIprintcap name\fR .TP 0.2i \(bu +\fIprinter driver file\fR +.TP 0.2i +\(bu \fIprivate dir\fR .TP 0.2i \(bu @@ -928,9 +934,6 @@ each parameter for details. Note that some are synonyms. \fIserver string\fR .TP 0.2i \(bu -\fIset primary group script\fR -.TP 0.2i -\(bu \fIshow add printer wizard\fR .TP 0.2i \(bu @@ -1006,6 +1009,9 @@ each parameter for details. Note that some are synonyms. \fIuse mmap\fR .TP 0.2i \(bu +\fIuse rhosts\fR +.TP 0.2i +\(bu \fIuse sendfile\fR .TP 0.2i \(bu @@ -1307,6 +1313,9 @@ each parameter for details. Note that some are synonyms. \fIpostexec\fR .TP 0.2i \(bu +\fIpostscript\fR +.TP 0.2i +\(bu \fIpreexec\fR .TP 0.2i \(bu @@ -1331,6 +1340,12 @@ each parameter for details. Note that some are synonyms. \fIprinter admin\fR .TP 0.2i \(bu +\fIprinter driver\fR +.TP 0.2i +\(bu +\fIprinter driver location\fR +.TP 0.2i +\(bu \fIprinter name\fR .TP 0.2i \(bu @@ -1436,9 +1451,10 @@ each parameter for details. Note that some are synonyms. \fIwriteable\fR .SH "EXPLANATION OF EACH PARAMETER" .TP -\fB>abort shutdown script (G)\fR +\fBabort shutdown script (G)\fR \fBThis parameter only exists in the HEAD cvs branch\fR -This a full path name to a script called by \fBsmbd\fR(8) that +This a full path name to a script called by +\fBsmbd(8)\fR that should stop a shutdown procedure issued by the \fIshutdown script\fR. This command will be run as user. @@ -1447,7 +1463,7 @@ Default: \fBNone\fR. Example: \fBabort shutdown script = /sbin/shutdown -c\fR .TP -\fB>addprinter command (G)\fR +\fBaddprinter command (G)\fR With the introduction of MS-RPC based printing support for Windows NT/2000 clients in Samba 2.2, The MS Add Printer Wizard (APW) icon is now also available in the @@ -1461,11 +1477,12 @@ printer command\fR defines a script to be run which will perform the necessary operations for adding the printer to the print system and to add the appropriate service definition to the \fIsmb.conf\fR file in order that it can be -shared by \fBsmbd\fR(8). +shared by \fBsmbd(8)\fR + The \fIaddprinter command\fR is automatically invoked with the following parameter (in -order): +order: .RS .TP 0.2i \(bu @@ -1498,10 +1515,6 @@ been executed, \fBsmbd\fR will reparse the \fI smb.conf\fR to determine if the exists. If the sharename is still invalid, then \fBsmbd \fR will return an ACCESS_DENIED error to the client. -The "add printer command" program can output a single line of text, -which Samba will set as the port the new printer is connected to. -If this line isn't output, Samba won't reload its printer shares. - See also \fI deleteprinter command\fR, \fIprinting\fR, \fIshow add printer wizard\fR @@ -1511,7 +1524,7 @@ Default: \fBnone\fR Example: \fBaddprinter command = /usr/bin/addprinter \fR .TP -\fB>add share command (G)\fR +\fBadd share command (G)\fR Samba 2.2.0 introduced the ability to dynamically add and delete shares via the Windows NT 4.0 Server Manager. The \fIadd share command\fR is used to define an @@ -1554,9 +1567,9 @@ Default: \fBnone\fR Example: \fBadd share command = /usr/local/bin/addshare\fR .TP -\fB>add machine script (G)\fR +\fBadd machine script (G)\fR This is the full pathname to a script that will -be run by \fBsmbd\fR(8) when a machine is added +be run by smbd(8) when a machine is added to it's domain using the administrator username and password method. This option is only required when using sam back-ends tied to the @@ -1569,7 +1582,7 @@ Default: \fBadd machine script = Example: \fBadd machine script = /usr/sbin/adduser -n -g machines -c Machine -d /dev/null -s /bin/false %u \fR .TP -\fB>ads server (G)\fR +\fBads server (G)\fR If this option is specified, samba does not try to figure out what ads server to use itself, but uses the specified ads server. Either one DNS name or IP @@ -1579,9 +1592,10 @@ Default: \fBads server = \fR Example: \fBads server = 192.168.1.2\fR .TP -\fB>add user script (G)\fR +\fBadd user script (G)\fR This is the full pathname to a script that will -be run \fBAS ROOT\fR by \fBsmbd\fR(8) under special circumstances described below. +be run \fBAS ROOT\fR by smbd(8) + under special circumstances described below. Normally, a Samba server requires that UNIX users are created for all users accessing files on this server. For sites @@ -1590,14 +1604,15 @@ creating these users and keeping the user list in sync with the Windows NT PDC is an onerous task. This option allows smbd to create the required UNIX users \fBON DEMAND\fR when a user accesses the Samba server. -In order to use this option, \fBsmbd\fR(8) must \fBNOT\fR be set to \fIsecurity = share\fR +In order to use this option, smbd +must \fBNOT\fR be set to \fIsecurity = share\fR and \fIadd user script\fR must be set to a full pathname for a script that will create a UNIX user given one argument of \fI%u\fR, which expands into the UNIX user name to create. When the Windows user attempts to access the Samba server, -at login (session setup in the SMB protocol) time, \fBsmbd\fR(8) contacts the \fIpassword server\fR and +at login (session setup in the SMB protocol) time, smbd contacts the \fIpassword server\fR and attempts to authenticate the given user with the given password. If the authentication succeeds then \fBsmbd\fR attempts to find a UNIX user in the UNIX password database to map the @@ -1621,9 +1636,9 @@ Default: \fBadd user script = Example: \fBadd user script = /usr/local/samba/bin/add_user %u\fR .TP -\fB>add group script (G)\fR +\fBadd group script (G)\fR This is the full pathname to a script that will -be run \fBAS ROOT\fR by \fBsmbd\fR(8) when a new group is +be run \fBAS ROOT\fR by smbd(8) when a new group is requested. It will expand any \fI%g\fR to the group name passed. This script is only useful for installations using the @@ -1633,7 +1648,7 @@ circumvent unix group name restrictions. In that case the script must print the numeric gid of the created group on stdout. .TP -\fB>admin users (S)\fR +\fBadmin users (S)\fR This is a list of users who will be granted administrative privileges on the share. This means that they will do all file operations as the super-user (root). @@ -1646,21 +1661,22 @@ Default: \fBno admin users\fR Example: \fBadmin users = jason\fR .TP -\fB>add user to group script (G)\fR +\fBadd user to group script (G)\fR Full path to the script that will be called when a user is added to a group using the Windows NT domain administration -tools. It will be run by \fBsmbd\fR(8) \fBAS ROOT\fR. -Any \fI%g\fR will be replaced with the group name and -any \fI%u\fR will be replaced with the user name. +tools. It will be run by smbd(8) +\fBAS ROOT\fR. Any \fI%g\fR will be +replaced with the group name and any \fI%u\fR will +be replaced with the user name. Default: \fBadd user to group script = \fR Example: \fBadd user to group script = /usr/sbin/adduser %u %g\fR .TP -\fB>allow hosts (S)\fR +\fBallow hosts (S)\fR Synonym for \fIhosts allow\fR. .TP -\fB>algorithmic rid base (G)\fR +\fBalgorithmic rid base (G)\fR This determines how Samba will use its algorithmic mapping from uids/gid to the RIDs needed to construct NT Security Identifiers. @@ -1679,7 +1695,7 @@ Default: \fBalgorithmic rid base = 1000\fR Example: \fBalgorithmic rid base = 100000\fR .TP -\fB>allow trusted domains (G)\fR +\fBallow trusted domains (G)\fR This option only takes effect when the \fIsecurity\fR option is set to server or domain. If it is set to no, then attempts to connect to a resource from @@ -1698,8 +1714,10 @@ can make implementing a security boundary difficult. Default: \fBallow trusted domains = yes\fR .TP -\fB>announce as (G)\fR -This specifies what type of server \fBnmbd\fR(8) will announce itself as, to a network neighborhood browse +\fBannounce as (G)\fR +This specifies what type of server +\fBnmbd\fR +will announce itself as, to a network neighborhood browse list. By default this is set to Windows NT. The valid options are : "NT Server" (which can also be written as "NT"), "NT Workstation", "Win95" or "WfW" meaning Windows NT Server, @@ -1713,7 +1731,7 @@ Default: \fBannounce as = NT Server\fR Example: \fBannounce as = Win95\fR .TP -\fB>announce version (G)\fR +\fBannounce version (G)\fR This specifies the major and minor version numbers that nmbd will use when announcing itself as a server. The default is 4.9. Do not change this parameter unless you have a specific @@ -1723,10 +1741,10 @@ Default: \fBannounce version = 4.9\fR Example: \fBannounce version = 2.0\fR .TP -\fB>auto services (G)\fR +\fBauto services (G)\fR This is a synonym for the \fIpreload\fR. .TP -\fB>auth methods (G)\fR +\fBauth methods (G)\fR This option allows the administrator to chose what authentication methods \fBsmbd\fR will use when authenticating a user. This option defaults to sensible values based on \fI security\fR. @@ -1738,7 +1756,7 @@ Default: \fBauth methods = \fR Example: \fBauth methods = guest sam ntdomain\fR .TP -\fB>available (S)\fR +\fBavailable (S)\fR This parameter lets you "turn off" a service. If \fIavailable = no\fR, then \fBALL\fR attempts to connect to the service will fail. Such failures are @@ -1746,10 +1764,12 @@ logged. Default: \fBavailable = yes\fR .TP -\fB>bind interfaces only (G)\fR +\fBbind interfaces only (G)\fR This global parameter allows the Samba admin to limit what interfaces on a machine will serve SMB requests. It -affects file service \fBsmbd\fR(8) and name service \fBnmbd\fR(8) in a slightly different ways. +affects file service smbd(8) and +name service nmbd(8) in slightly +different ways. For name service it causes \fBnmbd\fR to bind to ports 137 and 138 on the interfaces listed in the interfaces parameter. \fBnmbd @@ -1768,8 +1788,8 @@ send packets that arrive through any interfaces not listed in the does defeat this simple check, however, so it must not be used seriously as a security feature for \fBnmbd\fR. -For file service it causes \fBsmbd\fR(8) to bind only to the interface list -given in the interfaces parameter. This restricts the networks that +For file service it causes smbd(8) +to bind only to the interface list given in the interfaces parameter. This restricts the networks that \fBsmbd\fR will serve to packets coming in those interfaces. Note that you should not use this parameter for machines that are serving PPP or other intermittent or non-broadcast network @@ -1777,7 +1797,9 @@ interfaces as it will not cope with non-permanent interfaces. If \fIbind interfaces only\fR is set then unless the network address \fB127.0.0.1\fR is added -to the \fIinterfaces\fR parameter list \fBsmbpasswd\fR(8) and \fBswat\fR(8) may not work as expected due to the reasons covered below. +to the \fIinterfaces\fR parameter list \fBsmbpasswd(8)\fR +and \fBswat(8)\fR may +not work as expected due to the reasons covered below. To change a users SMB password, the \fBsmbpasswd\fR by default connects to the \fBlocalhost - 127.0.0.1\fR @@ -1786,8 +1808,8 @@ address as an SMB client to issue the password change request. If network address \fB127.0.0.1\fR is added to the \fIinterfaces\fR parameter list then \fB smbpasswd\fR will fail to connect in it's default mode. \fBsmbpasswd\fR can be forced to use the primary IP interface -of the local host by using its \fBsmbpasswd\fR(8) \fI-r remote machine\fR -parameter, with \fIremote machine\fR set +of the local host by using its \fI-r remote machine\fR + parameter, with \fIremote machine\fR set to the IP name of the primary interface of the local host. The \fBswat\fR status page tries to connect with @@ -1799,9 +1821,8 @@ and \fBnmbd\fR. Default: \fBbind interfaces only = no\fR .TP -\fB>blocking locks (S)\fR -This parameter controls the behavior -of \fBsmbd\fR(8) when given a request by a client +\fBblocking locks (S)\fR +This parameter controls the behavior of smbd(8) when given a request by a client to obtain a byte range lock on a region of an open file, and the request has a time limit associated with it. @@ -1817,8 +1838,9 @@ cannot be obtained. Default: \fBblocking locks = yes\fR .TP -\fB>block size (S)\fR -This parameter controls the behavior of \fBsmbd\fR(8) when reporting disk free +\fBblock size (S)\fR +This parameter controls the behavior of +smbd(8) when reporting disk free sizes. By default, this reports a disk block size of 1024 bytes. Changing this parameter may have some effect on the @@ -1830,38 +1852,42 @@ is an experimental option it may be removed in a future release. Changing this option does not change the disk free reporting size, just the block size unit reported to the client. + +Default: \fBblock size = 1024\fR + +Example: \fBblock size = 65536\fR .TP -\fB>browsable (S)\fR +\fBbrowsable (S)\fR See the \fI browseable\fR. .TP -\fB>browse list (G)\fR -This controls whether \fBsmbd\fR(8) will serve a browse list to +\fBbrowse list (G)\fR +This controls whether \fBsmbd(8)\fR will serve a browse list to a client doing a \fBNetServerEnum\fR call. Normally set to yes. You should never need to change this. Default: \fBbrowse list = yes\fR .TP -\fB>browseable (S)\fR +\fBbrowseable (S)\fR This controls whether this share is seen in the list of available shares in a net view and in the browse list. Default: \fBbrowseable = yes\fR .TP -\fB>case sensitive (S)\fR +\fBcase sensitive (S)\fR See the discussion in the section NAME MANGLING. Default: \fBcase sensitive = no\fR .TP -\fB>casesignames (S)\fR +\fBcasesignames (S)\fR Synonym for case sensitive. .TP -\fB>change notify timeout (G)\fR +\fBchange notify timeout (G)\fR This SMB allows a client to tell a server to "watch" a particular directory for any changes and only reply to the SMB request when a change has occurred. Such constant scanning of -a directory is expensive under UNIX, hence an \fBsmbd\fR(8) daemon only performs such a scan +a directory is expensive under UNIX, hence an \fBsmbd(8)\fR daemon only performs such a scan on each requested directory once every \fIchange notify timeout\fR seconds. @@ -1871,7 +1897,7 @@ Example: \fBchange notify timeout = 300\fR Would change the scan time to every 5 minutes. .TP -\fB>change share command (G)\fR +\fBchange share command (G)\fR Samba 2.2.0 introduced the ability to dynamically add and delete shares via the Windows NT 4.0 Server Manager. The \fIchange share command\fR is used to define an @@ -1913,7 +1939,7 @@ Default: \fBnone\fR Example: \fBchange share command = /usr/local/bin/addshare\fR .TP -\fB>comment (S)\fR +\fBcomment (S)\fR This is a text field that is seen next to a share when a client does a queries the server, either via the network neighborhood or via \fBnet view\fR to list what shares @@ -1926,7 +1952,7 @@ Default: \fBNo comment string\fR Example: \fBcomment = Fred's Files\fR .TP -\fB>config file (G)\fR +\fBconfig file (G)\fR This allows you to override the config file to use, instead of the default (usually \fIsmb.conf\fR). There is a chicken and egg problem here as this option is set @@ -1946,7 +1972,7 @@ clients). Example: \fBconfig file = /usr/local/samba/lib/smb.conf.%m \fR .TP -\fB>copy (S)\fR +\fBcopy (S)\fR This parameter allows you to "clone" service entries. The specified service is simply duplicated under the current service's name. Any parameters specified in the current @@ -1961,7 +1987,7 @@ Default: \fBno value\fR Example: \fBcopy = otherservice\fR .TP -\fB>create mask (S)\fR +\fBcreate mask (S)\fR A synonym for this parameter is \fIcreate mode\fR \&. @@ -1998,10 +2024,10 @@ Default: \fBcreate mask = 0744\fR Example: \fBcreate mask = 0775\fR .TP -\fB>create mode (S)\fR +\fBcreate mode (S)\fR This is a synonym for \fI create mask\fR. .TP -\fB>csc policy (S)\fR +\fBcsc policy (S)\fR This stands for \fBclient-side caching policy\fR, and specifies how clients capable of offline caching will cache the files in the share. The valid values @@ -2018,7 +2044,7 @@ Default: \fBcsc policy = manual\fR Example: \fBcsc policy = programs\fR .TP -\fB>deadtime (G)\fR +\fBdeadtime (G)\fR The value of the parameter (a decimal integer) represents the number of minutes of inactivity before a connection is considered dead, and it is disconnected. The deadtime only takes @@ -2041,7 +2067,7 @@ Default: \fBdeadtime = 0\fR Example: \fBdeadtime = 15\fR .TP -\fB>debug hires timestamp (G)\fR +\fBdebug hires timestamp (G)\fR Sometimes the timestamps in the log messages are needed with a resolution of higher that seconds, this boolean parameter adds microsecond resolution to the timestamp @@ -2052,7 +2078,7 @@ effect. Default: \fBdebug hires timestamp = no\fR .TP -\fB>debug pid (G)\fR +\fBdebug pid (G)\fR When using only one log file for more then one forked smbdprocess there may be hard to follow which process outputs which message. This boolean parameter is adds the process-id @@ -2063,7 +2089,7 @@ effect. Default: \fBdebug pid = no\fR .TP -\fB>debug timestamp (G)\fR +\fBdebug timestamp (G)\fR Samba debug log messages are timestamped by default. If you are running at a high \fIdebug level\fR these timestamps can be distracting. This boolean parameter allows timestamping @@ -2071,7 +2097,7 @@ to be turned off. Default: \fBdebug timestamp = yes\fR .TP -\fB>debug uid (G)\fR +\fBdebug uid (G)\fR Samba is sometimes run as root and sometime run as the connected user, this boolean parameter inserts the current euid, egid, uid and gid to the timestamp message headers @@ -2082,18 +2108,18 @@ effect. Default: \fBdebug uid = no\fR .TP -\fB>debuglevel (G)\fR +\fBdebuglevel (G)\fR Synonym for \fI log level\fR. .TP -\fB>default (G)\fR +\fBdefault (G)\fR A synonym for \fI default service\fR. .TP -\fB>default case (S)\fR +\fBdefault case (S)\fR See the section on NAME MANGLING. Also note the \fIshort preserve case\fR parameter. Default: \fBdefault case = lower\fR .TP -\fB>default devmode (S)\fR +\fBdefault devmode (S)\fR This parameter is only applicable to printable services. When smbd is serving Printer Drivers to Windows NT/2k/XP clients, each printer on the Samba server has a Device Mode which defines things such as paper size and @@ -2121,7 +2147,7 @@ see the MSDN documentation . Default: \fBdefault devmode = no\fR .TP -\fB>default service (G)\fR +\fBdefault service (G)\fR This parameter specifies the name of a service which will be connected to if the service actually requested cannot be found. Note that the square brackets are \fBNOT\fR @@ -2151,15 +2177,14 @@ Example: [pub] path = /%S + .fi .TP -\fB>delete group script (G)\fR +\fBdelete group script (G)\fR This is the full pathname to a script that will -be run \fBAS ROOT\fR \fBsmbd\fR(8) when a group is requested to be deleted. -It will expand any \fI%g\fR to the group name passed. -This script is only useful for installations using the Windows NT domain administration tools. +be run \fBAS ROOT\fR by smbd(8) when a group is requested to be deleted. It will expand any \fI%g\fR to the group name passed. This script is only useful for installations using the Windows NT domain administration tools. .TP -\fB>deleteprinter command (G)\fR +\fBdeleteprinter command (G)\fR With the introduction of MS-RPC based printer support for Windows NT/2000 clients in Samba 2.2, it is now possible to delete printer at run time by issuing the @@ -2187,7 +2212,7 @@ Default: \fBnone\fR Example: \fBdeleteprinter command = /usr/bin/removeprinter \fR .TP -\fB>delete readonly (S)\fR +\fBdelete readonly (S)\fR This parameter allows readonly files to be deleted. This is not normal DOS semantics, but is allowed by UNIX. @@ -2197,7 +2222,7 @@ permissions, and DOS semantics prevent deletion of a read only file. Default: \fBdelete readonly = no\fR .TP -\fB>delete share command (G)\fR +\fBdelete share command (G)\fR Samba 2.2.0 introduced the ability to dynamically add and delete shares via the Windows NT 4.0 Server Manager. The \fIdelete share command\fR is used to define an @@ -2232,10 +2257,10 @@ Default: \fBnone\fR Example: \fBdelete share command = /usr/local/bin/delshare\fR .TP -\fB>delete user script (G)\fR +\fBdelete user script (G)\fR This is the full pathname to a script that will -be run by \fBsmbd\fR(8) when managing users -with remote RPC (NT) tools. +be run by \fBsmbd(8)\fR +when managing user's with remote RPC (NT) tools. This script is called when a remote client removes a user from the server, normally using 'User Manager for Domains' or @@ -2249,18 +2274,19 @@ Default: \fBdelete user script = Example: \fBdelete user script = /usr/local/samba/bin/del_user %u\fR .TP -\fB>delete user from group script (G)\fR +\fBdelete user from group script (G)\fR Full path to the script that will be called when a user is removed from a group using the Windows NT domain administration -tools. It will be run by \fBsmbd\fR(8) \fBAS ROOT\fR. -Any \fI%g\fR will be replaced with the group name and -any \fI%u\fR will be replaced with the user name. +tools. It will be run by smbd(8) +\fBAS ROOT\fR. Any \fI%g\fR will be +replaced with the group name and any \fI%u\fR will +be replaced with the user name. Default: \fBdelete user from group script = \fR Example: \fBdelete user from group script = /usr/sbin/deluser %u %g\fR .TP -\fB>delete veto files (S)\fR +\fBdelete veto files (S)\fR This option is used when Samba is attempting to delete a directory that contains one or more vetoed directories (see the \fIveto files\fR @@ -2284,11 +2310,11 @@ files\fR parameter. Default: \fBdelete veto files = no\fR .TP -\fB>deny hosts (S)\fR +\fBdeny hosts (S)\fR Synonym for \fIhosts deny\fR. .TP -\fB>dfree command (G)\fR +\fBdfree command (G)\fR The \fIdfree command\fR setting should only be used on systems where a problem occurs with the internal disk space calculations. This has been known to happen with Ultrix, @@ -2324,8 +2350,9 @@ Where the script dfree (which must be made executable) could be: .nf -#!/bin/sh -df $1 | tail -1 | awk '{print $2" "$4}' + #!/bin/sh + df $1 | tail -1 | awk '{print $2" "$4}' + .fi or perhaps (on Sys V based systems): @@ -2333,18 +2360,19 @@ or perhaps (on Sys V based systems): .nf -#!/bin/sh -/usr/bin/df -k $1 | tail -1 | awk '{print $3" "$5}' + #!/bin/sh + /usr/bin/df -k $1 | tail -1 | awk '{print $3" "$5}' + .fi Note that you may have to replace the command names with full path names on some systems. .TP -\fB>directory (S)\fR +\fBdirectory (S)\fR Synonym for \fIpath \fR. .TP -\fB>directory mask (S)\fR +\fBdirectory mask (S)\fR This parameter is the octal modes which are used when converting DOS modes to UNIX modes when creating UNIX directories. @@ -2385,10 +2413,10 @@ Default: \fBdirectory mask = 0755\fR Example: \fBdirectory mask = 0775\fR .TP -\fB>directory mode (S)\fR +\fBdirectory mode (S)\fR Synonym for \fI directory mask\fR .TP -\fB>directory security mask (S)\fR +\fBdirectory security mask (S)\fR This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog @@ -2418,7 +2446,7 @@ Default: \fBdirectory security mask = 0777\fR Example: \fBdirectory security mask = 0700\fR .TP -\fB>disable netbios (G)\fR +\fBdisable netbios (G)\fR Enabling this parameter will disable netbios support in Samba. Netbios is the only available form of browsing in all windows versions except for 2000 and XP. @@ -2430,7 +2458,7 @@ Default: \fBdisable netbios = no\fR Example: \fBdisable netbios = yes\fR .TP -\fB>disable spoolss (G)\fR +\fBdisable spoolss (G)\fR Enabling this parameter will disable Samba's support for the SPOOLSS set of MS-RPC's and will yield identical behavior as Samba 2.0.x. Windows NT/2000 clients will downgrade to using @@ -2446,7 +2474,7 @@ See also use client driver Default : \fBdisable spoolss = no\fR .TP -\fB>display charset (G)\fR +\fBdisplay charset (G)\fR Specifies the charset that samba will use to print messages to stdout and stderr and SWAT will use. Should generally be the same as the \fBunix charset\fR. @@ -2455,11 +2483,12 @@ Default: \fBdisplay charset = ASCII\fR Example: \fBdisplay charset = UTF8\fR .TP -\fB>dns proxy (G)\fR -Specifies that \fBnmbd\fR(8) when acting as a WINS server and -finding that a NetBIOS name has not been registered, should treat the -NetBIOS name word-for-word as a DNS name and do a lookup with the DNS server -for that name on behalf of the name-querying client. +\fBdns proxy (G)\fR +Specifies that nmbd(8) +when acting as a WINS server and finding that a NetBIOS name has not +been registered, should treat the NetBIOS name word-for-word as a DNS +name and do a lookup with the DNS server for that name on behalf of +the name-querying client. Note that the maximum length for a NetBIOS name is 15 characters, so the DNS name (or DNS alias) can likewise only be @@ -2473,7 +2502,7 @@ See also the parameter \fI wins support\fR. Default: \fBdns proxy = yes\fR .TP -\fB>domain logons (G)\fR +\fBdomain logons (G)\fR If set to yes, the Samba server will serve Windows 95/98 Domain logons for the \fIworkgroup\fR it is in. Samba 2.2 has limited capability to act as a domain controller for Windows @@ -2483,17 +2512,18 @@ directory shipped with the source code. Default: \fBdomain logons = no\fR .TP -\fB>domain master (G)\fR -Tell \fBsmbd\fR(8) to enable WAN-wide browse list +\fBdomain master (G)\fR +Tell \fB nmbd(8)\fR to enable WAN-wide browse list collation. Setting this option causes \fBnmbd\fR to claim a special domain specific NetBIOS name that identifies it as a domain master browser for its given \fIworkgroup\fR. Local master browsers in the same \fIworkgroup\fR on broadcast-isolated subnets will give this \fBnmbd\fR their local browse lists, -and then ask \fBsmbd\fR(8) for a complete copy of the browse -list for the whole wide area network. Browser clients will then contact -their local master browser, and will receive the domain-wide browse list, -instead of just the list for their broadcast-isolated subnet. +and then ask \fBsmbd(8)\fR +for a complete copy of the browse list for the whole wide area +network. Browser clients will then contact their local master browser, +and will receive the domain-wide browse list, instead of just the list +for their broadcast-isolated subnet. Note that Windows NT Primary Domain Controllers expect to be able to claim this \fIworkgroup\fR specific special @@ -2513,7 +2543,7 @@ master\fR be enabled by default. Default: \fBdomain master = auto\fR .TP -\fB>dont descend (S)\fR +\fBdont descend (S)\fR There are certain directories on some systems (e.g., the \fI/proc\fR tree under Linux) that are either not of interest to clients or are infinitely deep (recursive). This @@ -2529,16 +2559,17 @@ to descend)\fR Example: \fBdont descend = /proc,/dev\fR .TP -\fB>dos charset (G)\fR +\fBdos charset (G)\fR DOS SMB clients assume the server has the same charset as they do. This option specifies which charset Samba should talk to DOS clients. -The default depends on which charsets you have installed. +The default depends on which charsets you have instaled. Samba tries to use charset 850 but falls back to ASCII in -case it is not available. Run \fBtestparm\fR(1) to check the default on your system. +case it is not available. Run testparm(1) + to check the default on your system. .TP -\fB>dos filemode (S)\fR +\fBdos filemode (S)\fR The default behavior in Samba is to provide UNIX-like behavior where only the owner of a file/directory is able to change the permissions on it. However, this behavior @@ -2552,12 +2583,13 @@ are modified. Default: \fBdos filemode = no\fR .TP -\fB>dos filetime resolution (S)\fR +\fBdos filetime resolution (S)\fR Under the DOS and Windows FAT filesystem, the finest granularity on time resolution is two seconds. Setting this parameter for a share causes Samba to round the reported time down to the nearest two second boundary when a query call that requires one second -resolution is made to \fBsmbd\fR(8). +resolution is made to \fBsmbd(8)\fR + This option is mainly used as a compatibility option for Visual C++ when used against Samba shares. If oplocks are enabled on a @@ -2572,18 +2604,18 @@ happy. Default: \fBdos filetime resolution = no\fR .TP -\fB>dos filetimes (S)\fR +\fBdos filetimes (S)\fR Under DOS and Windows, if a user can write to a file they can change the timestamp on it. Under POSIX semantics, only the owner of the file or root may change the timestamp. By default, Samba runs with POSIX semantics and refuses to change the timestamp on a file if the user \fBsmbd\fR is acting -on behalf of is not the file owner. Setting this option to yes allows DOS semantics and \fBsmbd\fR(8) will change the file +on behalf of is not the file owner. Setting this option to yes allows DOS semantics and smbd will change the file timestamp as DOS requires. Default: \fBdos filetimes = no\fR .TP -\fB>encrypt passwords (G)\fR +\fBencrypt passwords (G)\fR This boolean controls whether encrypted passwords will be negotiated with the client. Note that Windows NT 4.0 SP3 and above and also Windows 98 will by default expect encrypted passwords @@ -2592,15 +2624,16 @@ Samba see the file ENCRYPTION.txt in the Samba documentation directory \fIdocs/\fR shipped with the source code. In order for encrypted passwords to work correctly -\fBsmbd\fR(8) must either -have access to a local \fBsmbpasswd\fR(5) file (see the \fBsmbpasswd\fR(8) program for information on how to set up +\fBsmbd(8)\fR must either +have access to a local \fIsmbpasswd(5) +\fR program for information on how to set up and maintain this file), or set the security = [server|domain|ads] parameter which causes \fBsmbd\fR to authenticate against another server. Default: \fBencrypt passwords = yes\fR .TP -\fB>enhanced browsing (G)\fR +\fBenhanced browsing (G)\fR This option enables a couple of enhancements to cross-subnet browse propagation that have been added in Samba but which are not standard in Microsoft implementations. @@ -2621,7 +2654,7 @@ cross-subnet browse propagation much more reliable. Default: \fBenhanced browsing = yes\fR .TP -\fB>enumports command (G)\fR +\fBenumports command (G)\fR The concept of a "port" is fairly foreign to UNIX hosts. Under Windows NT/2000 print servers, a port is associated with a port monitor and generally takes the form of @@ -2642,10 +2675,10 @@ Default: \fBno enumports command\fR Example: \fBenumports command = /usr/bin/listports \fR .TP -\fB>exec (S)\fR +\fBexec (S)\fR This is a synonym for \fIpreexec\fR. .TP -\fB>fake directory create times (S)\fR +\fBfake directory create times (S)\fR NTFS and Windows VFAT file systems keep a create time for all files and directories. This is not the same as the ctime - status change time - that Unix keeps, so Samba by default @@ -2674,7 +2707,7 @@ will proceed as expected. Default: \fBfake directory create times = no\fR .TP -\fB>fake oplocks (S)\fR +\fBfake oplocks (S)\fR Oplocks are the way that SMB clients get permission from a server to locally cache file operations. If a server grants an oplock (opportunistic lock) then the client is free to assume @@ -2699,10 +2732,10 @@ this option carefully! Default: \fBfake oplocks = no\fR .TP -\fB>follow symlinks (S)\fR +\fBfollow symlinks (S)\fR This parameter allows the Samba administrator -to stop \fBsmbd\fR(8) from following symbolic -links in a particular share. Setting this +to stop \fBsmbd(8)\fR +from following symbolic links in a particular share. Setting this parameter to no prevents any file or directory that is a symbolic link from being followed (the user will get an error). This option is very useful to stop users from adding a @@ -2715,7 +2748,7 @@ follow symbolic links) by default. Default: \fBfollow symlinks = yes\fR .TP -\fB>force create mode (S)\fR +\fBforce create mode (S)\fR This parameter specifies a set of UNIX mode bit permissions that will \fBalways\fR be set on a file created by Samba. This is done by bitwise 'OR'ing these bits onto @@ -2739,7 +2772,7 @@ would force all created files to have read and execute permissions set for 'group' and 'other' as well as the read/write/execute bits set for the 'user'. .TP -\fB>force directory mode (S)\fR +\fBforce directory mode (S)\fR This parameter specifies a set of UNIX mode bit permissions that will \fBalways\fR be set on a directory created by Samba. This is done by bitwise 'OR'ing these bits onto the @@ -2762,7 +2795,7 @@ would force all created directories to have read and execute permissions set for 'group' and 'other' as well as the read/write/execute bits set for the 'user'. .TP -\fB>force directory security mode (S)\fR +\fBforce directory security mode (S)\fR This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a directory using the native NT security dialog box. @@ -2791,7 +2824,7 @@ Default: \fBforce directory security mode = 0\fR Example: \fBforce directory security mode = 700\fR .TP -\fB>force group (S)\fR +\fBforce group (S)\fR This specifies a UNIX group name that will be assigned as the default primary group for all users connecting to this service. This is useful for sharing files by ensuring @@ -2825,7 +2858,7 @@ Default: \fBno forced group\fR Example: \fBforce group = agroup\fR .TP -\fB>force security mode (S)\fR +\fBforce security mode (S)\fR This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security dialog @@ -2855,7 +2888,7 @@ Default: \fBforce security mode = 0\fR Example: \fBforce security mode = 700\fR .TP -\fB>force user (S)\fR +\fBforce user (S)\fR This specifies a UNIX user name that will be assigned as the default user for all users connecting to this service. This is useful for sharing files. You should also use it carefully @@ -2879,10 +2912,11 @@ Default: \fBno forced user\fR Example: \fBforce user = auser\fR .TP -\fB>fstype (S)\fR +\fBfstype (S)\fR This parameter allows the administrator to configure the string that specifies the type of filesystem a share -is using that is reported by \fBsmbd\fR(8) when a client queries the filesystem type +is using that is reported by \fBsmbd(8) +\fR when a client queries the filesystem type for a share. The default type is NTFS for compatibility with Windows NT but this can be changed to other strings such as Samba or FAT @@ -2892,7 +2926,7 @@ Default: \fBfstype = NTFS\fR Example: \fBfstype = Samba\fR .TP -\fB>getwd cache (G)\fR +\fBgetwd cache (G)\fR This is a tuning option. When this is enabled a caching algorithm will be used to reduce the time taken for getwd() calls. This can have a significant impact on performance, especially @@ -2901,11 +2935,11 @@ parameter is set to no. Default: \fBgetwd cache = yes\fR .TP -\fB>group (S)\fR +\fBgroup (S)\fR Synonym for \fIforce group\fR. .TP -\fB>guest account (S)\fR +\fBguest account (S)\fR This is a username which will be used for access to services which are specified as \fI guest ok\fR (see below). Whatever privileges this user has will be available to any client connecting to the guest service. @@ -2929,20 +2963,16 @@ Default: \fBspecified at compile time, usually Example: \fBguest account = ftp\fR .TP -\fB>guest ok (S)\fR +\fBguest ok (S)\fR If this parameter is yes for a service, then no password is required to connect to the service. Privileges will be those of the \fI guest account\fR. -This paramater nullifies the benifits of setting -\fIrestrict -anonymous\fR = 2 - See the section below on \fI security\fR for more information about this option. Default: \fBguest ok = no\fR .TP -\fB>guest only (S)\fR +\fBguest only (S)\fR If this parameter is yes for a service, then only guest connections to the service are permitted. This parameter will have no effect if \fIguest ok\fR is not set for the service. @@ -2951,13 +2981,13 @@ See the section below on \fI security\fR for more information about this option Default: \fBguest only = no\fR .TP -\fB>hide dot files (S)\fR +\fBhide dot files (S)\fR This is a boolean parameter that controls whether files starting with a dot appear as hidden files. Default: \fBhide dot files = yes\fR .TP -\fB>hide files(S)\fR +\fBhide files(S)\fR This is a list of files or directories that are not visible but are accessible. The DOS 'hidden' attribute is applied to any files or directories that match. @@ -2990,35 +3020,35 @@ SMB client (DAVE) available from Thursby creates for internal use, and also still hides all files beginning with a dot. .TP -\fB>hide local users(G)\fR +\fBhide local users(G)\fR This parameter toggles the hiding of local UNIX users (root, wheel, floppy, etc) from remote clients. Default: \fBhide local users = no\fR .TP -\fB>hide unreadable (G)\fR +\fBhide unreadable (G)\fR This parameter prevents clients from seeing the existance of files that cannot be read. Defaults to off. Default: \fBhide unreadable = no\fR .TP -\fB>hide unwriteable files (G)\fR +\fBhide unwriteable files (G)\fR This parameter prevents clients from seeing the existance of files that cannot be written to. Defaults to off. Note that unwriteable directories are shown as usual. Default: \fBhide unwriteable = no\fR .TP -\fB>hide special files (G)\fR +\fBhide special files (G)\fR This parameter prevents clients from seeing special files such as sockets, devices and fifo's in directory listings. Default: \fBhide special files = no\fR .TP -\fB>homedir map (G)\fR +\fBhomedir map (G)\fR If\fInis homedir -\fR is yes, and \fBsmbd\fR(8) is also acting +\fR is yes, and \fBsmbd(8)\fR is also acting as a Win95/98 \fIlogon server\fR then this parameter specifies the NIS (or YP) map from which the server for the user's home directory should be extracted. At present, only the Sun @@ -3030,12 +3060,9 @@ and the program will extract the servername from before the first ':'. There should probably be a better parsing system that copes with different map formats and also Amd (another automounter) maps. -.sp -.RS -.B "Note:" -A working NIS client is required on + +\fBNOTE :\fRA working NIS client is required on the system for this option to work. -.RE See also \fInis homedir\fR , \fIdomain logons\fR @@ -3045,7 +3072,7 @@ Default: \fBhomedir map = \fR Example: \fBhomedir map = amd.homedir\fR .TP -\fB>host msdfs (G)\fR +\fBhost msdfs (G)\fR This boolean parameter is only available if Samba has been configured and compiled with the \fB --with-msdfs\fR option. If set to yes, Samba will act as a Dfs server, and allow Dfs-aware clients @@ -3057,7 +3084,7 @@ refer to msdfs_setup.html Default: \fBhost msdfs = no\fR .TP -\fB>hostname lookups (G)\fR +\fBhostname lookups (G)\fR Specifies whether samba should use (expensive) hostname lookups or use the ip addresses instead. An example place where hostname lookups are currently used is when checking @@ -3067,7 +3094,7 @@ Default: \fBhostname lookups = yes\fR Example: \fBhostname lookups = no\fR .TP -\fB>hosts allow (S)\fR +\fBhosts allow (S)\fR A synonym for this parameter is \fIallow hosts\fR. @@ -3115,8 +3142,9 @@ deny access from one particular host Note that access still requires suitable user-level passwords. -See \fBtestparm\fR(1) for a way of testing your host access -to see if it does what you expect. +See \fBtestparm(1)\fR + for a way of testing your host access to see if it does +what you expect. Default: \fBnone (i.e., all hosts permitted access) \fR @@ -3124,7 +3152,7 @@ Default: \fBnone (i.e., all hosts permitted access) Example: \fBallow hosts = 150.203.5. myhost.mynet.edu.au \fR .TP -\fB>hosts deny (S)\fR +\fBhosts deny (S)\fR The opposite of \fIhosts allow\fR - hosts listed here are \fBNOT\fR permitted access to services unless the specific services have their own lists to override @@ -3137,7 +3165,7 @@ Default: \fBnone (i.e., no hosts specifically excluded) Example: \fBhosts deny = 150.203.4. badhost.mynet.edu.au \fR .TP -\fB>hosts equiv (G)\fR +\fBhosts equiv (G)\fR If this global parameter is a non-null string, it specifies the name of a file to read for the names of hosts and users who will be allowed access without specifying a password. @@ -3145,10 +3173,8 @@ and users who will be allowed access without specifying a password. This is not be confused with \fIhosts allow\fR which is about hosts access to services and is more useful for guest services. \fI hosts equiv\fR may be useful for NT clients which will not supply passwords to Samba. -.sp -.RS -.B "Note:" -The use of \fIhosts equiv + +\fBNOTE :\fR The use of \fIhosts equiv \fR can be a major security hole. This is because you are trusting the PC to supply the correct username. It is very easy to get a PC to supply a false username. I recommend that the @@ -3156,13 +3182,12 @@ get a PC to supply a false username. I recommend that the know what you are doing, or perhaps on a home network where you trust your spouse and kids. And only if you \fBreally\fR trust them :-). -.RE Default: \fBno host equivalences\fR Example: \fBhosts equiv = /etc/hosts.equiv\fR .TP -\fB>include (G)\fR +\fBinclude (G)\fR This allows you to include one config file inside another. The file is included literally, as though typed in place. @@ -3175,7 +3200,7 @@ Default: \fBno file included\fR Example: \fBinclude = /usr/local/samba/lib/admin_smb.conf \fR .TP -\fB>inherit acls (S)\fR +\fBinherit acls (S)\fR This parameter can be used to ensure that if default acls exist on parent directories, they are always honored when creating a subdirectory. @@ -3186,7 +3211,7 @@ default directory acls are propagated. Default: \fBinherit acls = no\fR .TP -\fB>inherit permissions (S)\fR +\fBinherit permissions (S)\fR The permissions on new files and directories are normally governed by \fI create mask\fR, \fIdirectory mask\fR, \fIforce create mode\fR and \fIforce @@ -3216,7 +3241,7 @@ See also \fIcreate mask Default: \fBinherit permissions = no\fR .TP -\fB>interfaces (G)\fR +\fBinterfaces (G)\fR This option allows you to override the default network interfaces list that Samba will use for browsing, name registration and other NBT traffic. By default Samba will query @@ -3267,7 +3292,7 @@ interfaces only\fR. Default: \fBall active interfaces except 127.0.0.1 that are broadcast capable\fR .TP -\fB>invalid users (S)\fR +\fBinvalid users (S)\fR This is a list of users that should not be allowed to login to this service. This is really a \fBparanoid\fR check to absolutely ensure an improper setting does not breach @@ -3299,7 +3324,7 @@ Default: \fBno invalid users\fR Example: \fBinvalid users = root fred admin @wheel \fR .TP -\fB>keepalive (G)\fR +\fBkeepalive (G)\fR The value of the parameter (an integer) represents the number of seconds between \fIkeepalive\fR packets. If this parameter is zero, no keepalive packets will be @@ -3314,16 +3339,17 @@ Default: \fBkeepalive = 300\fR Example: \fBkeepalive = 600\fR .TP -\fB>kernel oplocks (G)\fR +\fBkernel oplocks (G)\fR For UNIXes that support kernel based \fIoplocks\fR (currently only IRIX and the Linux 2.4 kernel), this parameter allows the use of them to be turned on or off. Kernel oplocks support allows Samba \fIoplocks \fR to be broken whenever a local UNIX process or NFS operation -accesses a file that \fBsmbd\fR(8) has oplocked. This allows complete -data consistency between SMB/CIFS, NFS and local file access (and is -a \fBvery\fR cool feature :-). +accesses a file that \fBsmbd(8)\fR + has oplocked. This allows complete data consistency between +SMB/CIFS, NFS and local file access (and is a \fBvery\fR +cool feature :-). This parameter defaults to on, but is translated to a no-op on systems that no not have the necessary kernel support. @@ -3335,17 +3361,18 @@ and \fIlevel2 oplocks Default: \fBkernel oplocks = yes\fR .TP -\fB>lanman auth (G)\fR -This parameter determines whether or not \fBsmbd\fR(8) will attempt to authenticate users -using the LANMAN password hash. If disabled, only clients which support NT -password hashes (e.g. Windows NT/2000 clients, smbclient, etc... but not -Windows 95/98 or the MS DOS network client) will be able to connect to the Samba host. +\fBlanman auth (G)\fR +This parameter determines whether or not smbd will +attempt to authenticate users using the LANMAN password hash. +If disabled, only clients which support NT password hashes (e.g. Windows +NT/2000 clients, smbclient, etc... but not Windows 95/98 or the MS DOS +network client) will be able to connect to the Samba host. Default : \fBlanman auth = yes\fR .TP -\fB>large readwrite (G)\fR -This parameter determines whether or not \fBsmbd\fR(8) supports the new 64k streaming -read and write varient SMB requests introduced +\fBlarge readwrite (G)\fR +This parameter determines whether or not smbd +supports the new 64k streaming read and write varient SMB requests introduced with Windows 2000. Note that due to Windows 2000 client redirector bugs this requires Samba to be running on a 64-bit capable operating system such as IRIX, Solaris or a Linux 2.4 kernel. Can improve performance by 10% with @@ -3354,23 +3381,26 @@ code paths. Default : \fBlarge readwrite = yes\fR .TP -\fB>ldap admin dn (G)\fR +\fBldap admin dn (G)\fR The \fIldap admin dn\fR defines the Distinguished Name (DN) name used by Samba to contact the ldap server when retreiving user account information. The \fIldap admin dn\fR is used in conjunction with the admin dn password stored in the \fIprivate/secrets.tdb\fR file. See the -\fBsmbpasswd\fR(8) man page for more information on how -to accmplish this. +\fBsmbpasswd(8)\fR man +page for more information on how to accomplish this. .TP -\fB>ldap delete dn (G)\fR +\fB>ldap del only sam attr (G)\fR This parameter specifies whether a delete operation in the ldapsam deletes the complete entry or only the attributes specific to Samba. Default : \fBldap delete dn = no\fR .TP -\fB>ldap filter (G)\fR +\fB>ldap del only sam attr (G)\fR +Inverted synonym for \fI ldap delete dn\fR. +.TP +\fBldap filter (G)\fR This parameter specifies the RFC 2254 compliant LDAP search filter. The default is to match the login name with the uid attribute for all entries matching the sambaAccount @@ -3378,7 +3408,7 @@ objectclass. Note that this filter should only return one entry. Default : \fBldap filter = (&(uid=%u)(objectclass=sambaAccount))\fR .TP -\fB>ldap port (G)\fR +\fBldap port (G)\fR This parameter is only available if Samba has been configure to include the \fB--with-ldapsam\fR option at compile time. @@ -3393,7 +3423,7 @@ Default : \fBldap port = 636 ; if ldap ssl = on\fR Default : \fBldap port = 389 ; if ldap ssl = off\fR .TP -\fB>ldap server (G)\fR +\fBldap server (G)\fR This parameter is only available if Samba has been configure to include the \fB--with-ldapsam\fR option at compile time. @@ -3403,7 +3433,7 @@ server which should be queried to locate user account information. Default : \fBldap server = localhost\fR .TP -\fB>ldap ssl (G)\fR +\fBldap ssl (G)\fR This option is used to define whether or not Samba should use SSL when connecting to the ldap server This is \fBNOT\fR related to @@ -3431,23 +3461,23 @@ to configure. See \fIpassdb backend\fR Default : \fBldap ssl = start_tls\fR .TP -\fB>ldap suffix (G)\fR +\fBldap suffix (G)\fR Specifies where user and machine accounts are added to the tree. Can be overriden by \fBldap user suffix\fR and \fBldap machine suffix\fR. It also used as the base dn for all ldap searches. Default : \fBnone\fR .TP -\fB>ldap user suffix (G)\fR +\fBldap user suffix (G)\fR It specifies where users are added to the tree. Default : \fBnone\fR .TP -\fB>ldap machine suffix (G)\fR +\fBldap machine suffix (G)\fR It specifies where machines should be added to the ldap tree. Default : \fBnone\fR .TP -\fB>ldap passwd sync (G)\fR +\fBldap passwd sync (G)\fR This option is used to define whether or not Samba should sync the LDAP password with the NT and LM hashes for normal accounts (NOT for @@ -3469,7 +3499,7 @@ The \fIldap passwd sync\fR can be set to one of three values: Default : \fBldap passwd sync = no\fR .TP -\fB>ldap trust ids (G)\fR +\fBldap trust ids (G)\fR Normally, Samba validates each entry in the LDAP server against getpwnam(). This allows LDAP to be used for Samba with the unix system using @@ -3486,7 +3516,7 @@ same LDAP server. Default: \fBldap trust ids = No\fR .TP -\fB>level2 oplocks (S)\fR +\fBlevel2 oplocks (S)\fR This parameter controls whether Samba supports level2 (read-only) oplocks on a share. @@ -3523,8 +3553,8 @@ parameters. Default: \fBlevel2 oplocks = yes\fR .TP -\fB>lm announce (G)\fR -This parameter determines if \fBnmbd\fR(8) will produce Lanman announce +\fBlm announce (G)\fR +This parameter determines if \fBnmbd(8)\fR will produce Lanman announce broadcasts that are needed by OS/2 clients in order for them to see the Samba server in their browse list. This parameter can have three values, yes, no, or @@ -3545,7 +3575,7 @@ Default: \fBlm announce = auto\fR Example: \fBlm announce = yes\fR .TP -\fB>lm interval (G)\fR +\fBlm interval (G)\fR If Samba is set to produce Lanman announce broadcasts needed by OS/2 clients (see the \fIlm announce\fR parameter) then this parameter defines the frequency in seconds with which they will be @@ -3560,7 +3590,7 @@ Default: \fBlm interval = 60\fR Example: \fBlm interval = 120\fR .TP -\fB>load printers (G)\fR +\fBload printers (G)\fR A boolean variable that controls whether all printers in the printcap will be loaded for browsing by default. See the printers section for @@ -3568,8 +3598,8 @@ more details. Default: \fBload printers = yes\fR .TP -\fB>local master (G)\fR -This option allows \fBnmbd\fR(8) to try and become a local master browser +\fBlocal master (G)\fR +This option allows \fB nmbd(8)\fR to try and become a local master browser on a subnet. If set to no then \fB nmbd\fR will not attempt to become a local master browser on a subnet and will also lose in all browsing elections. By default this value is set to yes. Setting this value to yes doesn't @@ -3581,10 +3611,10 @@ Setting this value to no will cause \fBnmbd\fR Default: \fBlocal master = yes\fR .TP -\fB>lock dir (G)\fR +\fBlock dir (G)\fR Synonym for \fI lock directory\fR. .TP -\fB>lock directory (G)\fR +\fBlock directory (G)\fR This option specifies the directory where lock files will be placed. The lock files are used to implement the \fImax connections\fR @@ -3594,7 +3624,7 @@ Default: \fBlock directory = ${prefix}/var/locks\fR Example: \fBlock directory = /var/run/samba/locks\fR .TP -\fB>lock spin count (G)\fR +\fBlock spin count (G)\fR This parameter controls the number of times that smbd should attempt to gain a byte range lock on the behalf of a client request. Experiments have shown that @@ -3606,7 +3636,7 @@ and FoxPro. Default: \fBlock spin count = 2\fR .TP -\fB>lock spin time (G)\fR +\fBlock spin time (G)\fR The time in microseconds that smbd should pause before attempting to gain a failed lock. See \fIlock spin @@ -3614,7 +3644,7 @@ count\fR for more details. Default: \fBlock spin time = 10\fR .TP -\fB>locking (S)\fR +\fBlocking (S)\fR This controls whether or not locking will be performed by the server in response to lock requests from the client. @@ -3637,7 +3667,7 @@ You should never need to set this parameter. Default: \fBlocking = yes\fR .TP -\fB>log file (G)\fR +\fBlog file (G)\fR This option allows you to override the name of the Samba log file (also known as the debug file). @@ -3647,7 +3677,7 @@ you to have separate log files for each user or machine. Example: \fBlog file = /usr/local/samba/var/log.%m \fR .TP -\fB>log level (G)\fR +\fBlog level (G)\fR The value of the parameter (a astring) allows the debug level (logging level) to be specified in the \fIsmb.conf\fR file. This parameter has been @@ -3661,7 +3691,7 @@ the command line or level zero if none was specified. Example: \fBlog level = 3 passdb:5 auth:10 winbind:2 \fR .TP -\fB>logon drive (G)\fR +\fBlogon drive (G)\fR This parameter specifies the local path to which the home directory will be connected (see \fIlogon home\fR) and is only used by NT Workstations. @@ -3673,7 +3703,7 @@ Default: \fBlogon drive = z:\fR Example: \fBlogon drive = h:\fR .TP -\fB>logon home (G)\fR +\fBlogon home (G)\fR This parameter specifies the home directory location when a Win95/98 or NT Workstation logs into a Samba PDC. It allows you to do @@ -3710,7 +3740,7 @@ Default: \fBlogon home = "\\\\%N\\%U"\fR Example: \fBlogon home = "\\\\remote_smb_server\\%U"\fR .TP -\fB>logon path (G)\fR +\fBlogon path (G)\fR This parameter specifies the home directory where roaming profiles (NTuser.dat etc files for Windows NT) are stored. Contrary to previous versions of these manual pages, it has @@ -3753,7 +3783,7 @@ Default: \fBlogon path = \\\\%N\\%U\\profile\fR Example: \fBlogon path = \\\\PROFILESERVER\\PROFILE\\%U\fR .TP -\fB>logon script (G)\fR +\fBlogon script (G)\fR This parameter specifies the batch file (.bat) or NT command file (.cmd) to be downloaded and run on a machine when a user successfully logs in. The file must contain the DOS @@ -3789,7 +3819,7 @@ Default: \fBno logon script defined\fR Example: \fBlogon script = scripts\\%U.bat\fR .TP -\fB>lppause command (S)\fR +\fBlppause command (S)\fR This parameter specifies the command to be executed on the server host in order to stop printing or spooling a specific print job. @@ -3828,7 +3858,7 @@ is SOFTQ, then the default is: Example for HPUX: \fBlppause command = /usr/bin/lpalt %p-%j -p0\fR .TP -\fB>lpq cache time (G)\fR +\fBlpq cache time (G)\fR This controls how long lpq info will be cached for to prevent the \fBlpq\fR command being called too often. A separate cache is kept for each variation of the \fB lpq\fR command used by the system, so if you use different @@ -3852,7 +3882,7 @@ Default: \fBlpq cache time = 10\fR Example: \fBlpq cache time = 30\fR .TP -\fB>lpq command (S)\fR +\fBlpq command (S)\fR This parameter specifies the command to be executed on the server host in order to obtain \fBlpq \fR-style printer status information. @@ -3890,7 +3920,7 @@ Default: \fBdepends on the setting of \fI printing\fB\fR Example: \fBlpq command = /usr/bin/lpq -P%p\fR .TP -\fB>lpresume command (S)\fR +\fBlpresume command (S)\fR This parameter specifies the command to be executed on the server host in order to restart or continue printing or spooling a specific print job. @@ -3925,7 +3955,7 @@ is SOFTQ, then the default is: Example for HPUX: \fBlpresume command = /usr/bin/lpalt %p-%j -p2\fR .TP -\fB>lprm command (S)\fR +\fBlprm command (S)\fR This parameter specifies the command to be executed on the server host in order to delete a print job. @@ -3952,7 +3982,7 @@ Example 1: \fBlprm command = /usr/bin/lprm -P%p %j Example 2: \fBlprm command = /usr/bin/cancel %p-%j \fR .TP -\fB>machine password timeout (G)\fR +\fBmachine password timeout (G)\fR If a Samba server is a member of a Windows NT Domain (see the security = domain) parameter) then periodically a running smbd(8) process will try and change the MACHINE ACCOUNT @@ -3961,11 +3991,12 @@ PASSWORD stored in the TDB called \fIprivate/secrets.tdb will be changed, in seconds. The default is one week (expressed in seconds), the same as a Windows NT Domain member server. -See also \fBsmbpasswd\fR(8), and the security = domain) parameter. +See also \fBsmbpasswd(8) +\fR and the security = domain) parameter. Default: \fBmachine password timeout = 604800\fR .TP -\fB>magic output (S)\fR +\fBmagic output (S)\fR This parameter specifies the name of a file which will contain output created by a magic script (see the \fImagic script\fR @@ -3980,7 +4011,7 @@ Default: \fBmagic output = .out Example: \fBmagic output = myfile.txt\fR .TP -\fB>magic script (S)\fR +\fBmagic script (S)\fR This parameter specifies the name of a file which, if opened, will be executed by the server when the file is closed. This allows a UNIX script to be sent to the Samba host and @@ -4006,12 +4037,12 @@ Default: \fBNone. Magic scripts disabled.\fR Example: \fBmagic script = user.csh\fR .TP -\fB>mangle case (S)\fR +\fBmangle case (S)\fR See the section on NAME MANGLING Default: \fBmangle case = no\fR .TP -\fB>mangled map (S)\fR +\fBmangled map (S)\fR This is for those who want to directly map UNIX file names which cannot be represented on Windows/DOS. The mangling of names is not always what is needed. In particular you may have @@ -4033,7 +4064,7 @@ Default: \fBno mangled map\fR Example: \fBmangled map = (*;1 *;)\fR .TP -\fB>mangled names (S)\fR +\fBmangled names (S)\fR This controls whether non-DOS names under UNIX should be mapped to DOS-compatible names ("mangled") and made visible, or whether non-DOS names should simply be ignored. @@ -4092,7 +4123,7 @@ do not change between sessions. Default: \fBmangled names = yes\fR .TP -\fB>mangling method (G)\fR +\fBmangling method (G)\fR controls the algorithm used for the generating the mangled names. Can take two different values, "hash" and "hash2". "hash" is the default and is the algorithm that has been @@ -4106,7 +4137,7 @@ Default: \fBmangling method = hash2\fR Example: \fBmangling method = hash\fR .TP -\fB>mangle prefix (G)\fR +\fBmangle prefix (G)\fR controls the number of prefix characters from the original name used when generating the mangled names. A larger value will give a weaker @@ -4117,9 +4148,9 @@ Default: \fBmangle prefix = 1\fR Example: \fBmangle prefix = 4\fR .TP -\fB>mangled stack (G)\fR +\fBmangled stack (G)\fR This parameter controls the number of mangled names -that should be cached in the Samba server \fBsmbd\fR(8). +that should be cached in the Samba server smbd(8) This stack is a list of recently mangled base names (extensions are only maintained if they are longer than 3 characters @@ -4137,7 +4168,7 @@ Default: \fBmangled stack = 50\fR Example: \fBmangled stack = 100\fR .TP -\fB>mangling char (S)\fR +\fBmangling char (S)\fR This controls what character is used as the \fBmagic\fR character in name mangling. The default is a '~' but this may interfere with some software. Use this option to set @@ -4147,7 +4178,7 @@ Default: \fBmangling char = ~\fR Example: \fBmangling char = ^\fR .TP -\fB>map archive (S)\fR +\fBmap archive (S)\fR This controls whether the DOS archive attribute should be mapped to the UNIX owner execute bit. The DOS archive bit is set when a file has been modified since its last backup. One @@ -4161,7 +4192,7 @@ parameter to be set such that owner execute bit is not masked out Default: \fBmap archive = yes\fR .TP -\fB>map hidden (S)\fR +\fBmap hidden (S)\fR This controls whether DOS style hidden files should be mapped to the UNIX world execute bit. @@ -4171,7 +4202,7 @@ it must include 001). See the parameter \fIcreate mask\fR for details. Default: \fBmap hidden = no\fR .TP -\fB>map system (S)\fR +\fBmap system (S)\fR This controls whether DOS style system files should be mapped to the UNIX group execute bit. @@ -4181,13 +4212,13 @@ it must include 010). See the parameter \fIcreate mask\fR for details. Default: \fBmap system = no\fR .TP -\fB>map to guest (G)\fR +\fBmap to guest (G)\fR This parameter is only useful in security modes other than \fIsecurity = share\fR - i.e. user, server, and domain. This parameter can take three different values, which tell -\fBsmbd\fR(8) what to do with user +smbd(8) what to do with user login requests that don't match a valid UNIX user in some way. The three settings are : @@ -4232,7 +4263,7 @@ Default: \fBmap to guest = Never\fR Example: \fBmap to guest = Bad User\fR .TP -\fB>max connections (S)\fR +\fBmax connections (S)\fR This option allows the number of simultaneous connections to a service to be limited. If \fImax connections \fR is greater than 0 then connections will be refused if @@ -4247,7 +4278,7 @@ Default: \fBmax connections = 0\fR Example: \fBmax connections = 10\fR .TP -\fB>max disk size (G)\fR +\fBmax disk size (G)\fR This option allows you to put an upper limit on the apparent size of disks. If you set this option to 100 then all shares will appear to be not larger than 100 MB in @@ -4270,7 +4301,7 @@ Default: \fBmax disk size = 0\fR Example: \fBmax disk size = 1000\fR .TP -\fB>max log size (G)\fR +\fBmax log size (G)\fR This option (an integer in kilobytes) specifies the max size the log file should grow to. Samba periodically checks the size and if it is exceeded it will rename the file, adding @@ -4282,16 +4313,16 @@ Default: \fBmax log size = 5000\fR Example: \fBmax log size = 1000\fR .TP -\fB>max mux (G)\fR +\fBmax mux (G)\fR This option controls the maximum number of outstanding simultaneous SMB operations that Samba tells the client it will allow. You should never need to set this parameter. Default: \fBmax mux = 50\fR .TP -\fB>max open files (G)\fR +\fBmax open files (G)\fR This parameter limits the maximum number of -open files that one \fBsmbd\fR(8) file +open files that one smbd(8) file serving process may have open for a client at any one time. The default for this parameter is set very high (10,000) as Samba uses only one bit per unopened file. @@ -4302,10 +4333,10 @@ this parameter so you should never need to touch this parameter. Default: \fBmax open files = 10000\fR .TP -\fB>max print jobs (S)\fR +\fBmax print jobs (S)\fR This parameter limits the maximum number of jobs allowable in a Samba printer queue at any given moment. -If this number is exceeded, \fBsmbd\fR(8) will remote "Out of Space" to the client. +If this number is exceeded, \fB smbd(8)\fR will remote "Out of Space" to the client. See all \fItotal print jobs\fR. @@ -4313,7 +4344,7 @@ Default: \fBmax print jobs = 1000\fR Example: \fBmax print jobs = 5000\fR .TP -\fB>max protocol (G)\fR +\fBmax protocol (G)\fR The value of the parameter (a string) is the highest protocol level that will be supported by the server. @@ -4351,22 +4382,22 @@ Default: \fBmax protocol = NT1\fR Example: \fBmax protocol = LANMAN1\fR .TP -\fB>max smbd processes (G)\fR +\fBmax smbd processes (G)\fR This parameter limits the maximum number of \fBsmbd(8)\fR processes concurrently running on a system and is intended as a stopgap to prevent degrading service to clients in the event that the server has insufficient resources to handle more than this number of connections. Remember that under normal operating -conditions, each user will have an \fBsmbd\fR(8) associated with him or her +conditions, each user will have an smbd associated with him or her to handle connections to all shares from a given host. Default: \fBmax smbd processes = 0\fR ## no limit Example: \fBmax smbd processes = 1000\fR .TP -\fB>max ttl (G)\fR -This option tells \fBnmbd\fR(8) +\fBmax ttl (G)\fR +This option tells nmbd(8) what the default 'time to live' of NetBIOS names should be (in seconds) when \fBnmbd\fR is requesting a name using either a broadcast packet or from a WINS server. You should never need to @@ -4374,8 +4405,9 @@ change this parameter. The default is 3 days. Default: \fBmax ttl = 259200\fR .TP -\fB>max wins ttl (G)\fR -This option tells \fBsmbd\fR(8) when acting as a WINS server ( \fIwins support = yes\fR) what the maximum +\fBmax wins ttl (G)\fR +This option tells nmbd(8) + when acting as a WINS server ( \fIwins support = yes\fR) what the maximum \&'time to live' of NetBIOS names that \fBnmbd\fR will grant will be (in seconds). You should never need to change this parameter. The default is 6 days (518400 seconds). @@ -4385,7 +4417,7 @@ wins ttl\fR parameter. Default: \fBmax wins ttl = 518400\fR .TP -\fB>max xmit (G)\fR +\fBmax xmit (G)\fR This option controls the maximum packet size that will be negotiated by Samba. The default is 65535, which is the maximum. In some cases you may find you get better performance @@ -4395,7 +4427,7 @@ Default: \fBmax xmit = 65535\fR Example: \fBmax xmit = 8192\fR .TP -\fB>message command (G)\fR +\fBmessage command (G)\fR This specifies what command to run when the server receives a WinPopup style message. @@ -4458,10 +4490,10 @@ Default: \fBno message command\fR Example: \fBmessage command = csh -c 'xedit %s; rm %s' &\fR .TP -\fB>min passwd length (G)\fR +\fBmin passwd length (G)\fR Synonym for \fImin password length\fR. .TP -\fB>min password length (G)\fR +\fBmin password length (G)\fR This option sets the minimum length in characters of a plaintext password that \fBsmbd\fR will accept when performing UNIX password changing. @@ -4472,7 +4504,7 @@ password sync\fR, \fIpasswd program\fR and \fIpasswd chat debug\fR Default: \fBmin password length = 5\fR .TP -\fB>min print space (S)\fR +\fBmin print space (S)\fR This sets the minimum amount of free disk space that must be available before a user will be able to spool a print job. It is specified in kilobytes. The default is 0, which @@ -4485,7 +4517,7 @@ Default: \fBmin print space = 0\fR Example: \fBmin print space = 2000\fR .TP -\fB>min protocol (G)\fR +\fBmin protocol (G)\fR The value of the parameter (a string) is the lowest SMB protocol dialect than Samba will support. Please refer to the \fImax protocol\fR @@ -4504,8 +4536,8 @@ Default : \fBmin protocol = CORE\fR Example : \fBmin protocol = NT1\fR # disable DOS clients .TP -\fB>min wins ttl (G)\fR -This option tells \fBnmbd\fR(8) +\fBmin wins ttl (G)\fR +This option tells nmbd(8) when acting as a WINS server (\fI wins support = yes\fR) what the minimum 'time to live' of NetBIOS names that \fBnmbd\fR will grant will be (in seconds). You should never need to change this parameter. The default @@ -4513,7 +4545,7 @@ is 6 hours (21600 seconds). Default: \fBmin wins ttl = 21600\fR .TP -\fB>msdfs proxy (S)\fR +\fBmsdfs proxy (S)\fR This parameter indicates that the share is a stand-in for another CIFS share whose location is specified by the value of the parameter. When clients attempt to connect to @@ -4526,25 +4558,25 @@ and \fIhost msdfs\fR options to find out how to set up a Dfs root share. -Example: \fBmsdfs proxy = \\\\\\\\otherserver\\\\someshare\fR +Example: \fBmsdfs proxy = \\otherserver\\someshare\fR .TP -\fB>msdfs root (S)\fR +\fBmsdfs root (S)\fR This boolean parameter is only available if Samba is configured and compiled with the \fB --with-msdfs\fR option. If set to yes, Samba treats the share as a Dfs root and allows clients to browse the distributed file system tree rooted at the share directory. Dfs links are specified in the share directory by symbolic -links of the form \fImsdfs:serverA\\\\shareA,serverB\\\\shareB\fR +links of the form \fImsdfs:serverA\\shareA,serverB\\shareB\fR and so on. For more information on setting up a Dfs tree -on Samba, refer to "Hosting a Microsoft -Distributed File System tree on Samba" document. +on Samba, refer to msdfs_setup.html + See also \fIhost msdfs \fR Default: \fBmsdfs root = no\fR .TP -\fB>name cache timeout (G)\fR +\fBname cache timeout (G)\fR Specifies the number of seconds it takes before entries in samba's hostname resolve cache time out. If the timeout is set to 0. the caching is disabled. @@ -4553,7 +4585,7 @@ Default: \fBname cache timeout = 660\fR Example: \fBname cache timeout = 0\fR .TP -\fB>name resolve order (G)\fR +\fBname resolve order (G)\fR This option is used by the programs in the Samba suite to determine what naming services to use and in what order to resolve host names to IP addresses. The option takes a space @@ -4602,7 +4634,7 @@ This will cause the local lmhosts file to be examined first, followed by a broadcast attempt, followed by a normal system hostname lookup. .TP -\fB>netbios aliases (G)\fR +\fBnetbios aliases (G)\fR This is a list of NetBIOS names that nmbd(8) will advertise as additional names by which the Samba server is known. This allows one machine to appear in browse lists under multiple names. If a machine is @@ -4618,7 +4650,7 @@ Default: \fBempty string (no additional names)\fR Example: \fBnetbios aliases = TEST TEST1 TEST2\fR .TP -\fB>netbios name (G)\fR +\fBnetbios name (G)\fR This sets the NetBIOS name by which a Samba server is known. By default it is the same as the first component of the host's DNS name. If a machine is a browse server or @@ -4633,12 +4665,12 @@ Default: \fBmachine DNS name\fR Example: \fBnetbios name = MYNAME\fR .TP -\fB>netbios scope (G)\fR +\fBnetbios scope (G)\fR This sets the NetBIOS scope that Samba will operate under. This should not be set unless every machine on your LAN also sets this value. .TP -\fB>nis homedir (G)\fR +\fBnis homedir (G)\fR Get the home share server from a NIS map. For UNIX systems that use an automounter, the user's home directory will often be mounted on a workstation on demand from a remote @@ -4665,7 +4697,7 @@ be a logon server. Default: \fBnis homedir = no\fR .TP -\fB>non unix account range (G)\fR +\fBnon unix account range (G)\fR The non unix account range parameter specifies the range of 'user ids' that are allocated by the various 'non unix account' passdb backends. These backends allow @@ -4673,20 +4705,17 @@ the storage of passwords for users who don't exist in /etc/passwd. This is most often used for machine account creation. This range of ids should have no existing local or NIS users within it as strange conflicts can occur otherwise. -.sp -.RS -.B "Note:" -These userids never appear on the system and Samba will never + +NOTE: These userids never appear on the system and Samba will never \&'become' these users. They are used only to ensure that the algorithmic RID mapping does not conflict with normal users. -.RE Default: \fBnon unix account range = \fR Example: \fBnon unix account range = 10000-20000\fR .TP -\fB>nt acl support (S)\fR +\fBnt acl support (S)\fR This boolean parameter controls whether smbd(8) will attempt to map UNIX permissions into Windows NT access control lists. @@ -4695,16 +4724,16 @@ prior to 2.2.2. Default: \fBnt acl support = yes\fR .TP -\fB>nt pipe support (G)\fR +\fBnt pipe support (G)\fR This boolean parameter controls whether -\fBsmbd\fR(8) will allow Windows NT +smbd(8) will allow Windows NT clients to connect to the NT SMB specific IPC$ pipes. This is a developer debugging option and can be left alone. Default: \fBnt pipe support = yes\fR .TP -\fB>nt status support (G)\fR +\fBnt status support (G)\fR This boolean parameter controls whether smbd(8) will negotiate NT specific status support with Windows NT/2k/XP clients. This is a developer debugging option and should be left alone. @@ -4716,15 +4745,15 @@ You should not need to ever disable this parameter. Default: \fBnt status support = yes\fR .TP -\fB>null passwords (G)\fR +\fBnull passwords (G)\fR Allow or disallow client access to accounts that have null passwords. -See also \fBsmbpasswd\fR(5). +See also smbpasswd (5) Default: \fBnull passwords = no\fR .TP -\fB>obey pam restrictions (G)\fR +\fBobey pam restrictions (G)\fR When Samba 2.2 is configured to enable PAM support (i.e. --with-pam), this parameter will control whether or not Samba should obey PAM's account and session management directives. The @@ -4736,7 +4765,7 @@ authentication mechanism needed in the presence of SMB password encryption. Default: \fBobey pam restrictions = no\fR .TP -\fB>only user (S)\fR +\fBonly user (S)\fR This is a boolean option that controls whether connections with usernames not in the \fIuser\fR list will be allowed. By default this option is disabled so that a @@ -4758,10 +4787,10 @@ parameter. Default: \fBonly user = no\fR .TP -\fB>only guest (S)\fR +\fBonly guest (S)\fR A synonym for \fI guest only\fR. .TP -\fB>oplock break wait time (G)\fR +\fBoplock break wait time (G)\fR This is a tuning parameter added due to bugs in both Windows 9x and WinNT. If Samba responds to a client too quickly when that client issues an SMB that can cause an oplock @@ -4775,14 +4804,15 @@ AND UNDERSTOOD THE SAMBA OPLOCK CODE\fR. Default: \fBoplock break wait time = 0\fR .TP -\fB>oplock contention limit (S)\fR +\fBoplock contention limit (S)\fR This is a \fBvery\fR advanced smbd(8) tuning option to improve the efficiency of the granting of oplocks under multiple client contention for the same file. -In brief it specifies a number, which causes \fBsmbd\fR(8)not to grant an oplock even when requested -if the approximate number of clients contending for an oplock on the same file goes over this +In brief it specifies a number, which causes smbd not to +grant an oplock even when requested if the approximate number of +clients contending for an oplock on the same file goes over this limit. This causes \fBsmbd\fR to behave in a similar way to Windows NT. @@ -4791,7 +4821,7 @@ AND UNDERSTOOD THE SAMBA OPLOCK CODE\fR. Default: \fBoplock contention limit = 2\fR .TP -\fB>oplocks (S)\fR +\fBoplocks (S)\fR This boolean option tells \fBsmbd\fR whether to issue oplocks (opportunistic locks) to file open requests on this share. The oplock code can dramatically (approx. 30% or more) improve @@ -4814,21 +4844,19 @@ oplocks\fR and \fI level2 oplocks\fR parameters. Default: \fBoplocks = yes\fR .TP -\fB>ntlm auth (G)\fR -This parameter determines -whether or not \fBsmbd\fR(8) will +\fBntlm auth (G)\fR +This parameter determines whether or not smbd will attempt to authenticate users using the NTLM password hash. If disabled, only the lanman password hashes will be used. -Please note that at least this option or \fBlanman auth\fR should -be enabled in order to be able to log in. +Please note that at least this option or \fBlanman auth\fR should be enabled in order to be able to log in. Default : \fBntlm auth = yes\fR .TP -\fB>os level (G)\fR +\fBos level (G)\fR This integer value controls what level Samba advertises itself as for browse elections. The value of this -parameter determines whether \fBnmbd\fR(8) +parameter determines whether nmbd(8) has a chance of becoming a local master browser for the \fI WORKGROUP\fR in the local broadcast area. \fBNote :\fRBy default, Samba will win @@ -4843,7 +4871,7 @@ Default: \fBos level = 20\fR Example: \fBos level = 65 \fR .TP -\fB>os2 driver map (G)\fR +\fBos2 driver map (G)\fR The parameter is used to define the absolute path to a file containing a mapping of Windows NT printer driver names to OS/2 printer driver names. The format is: @@ -4858,12 +4886,13 @@ LaserJet 5L\fR. The need for the file is due to the printer driver namespace problem described in the Samba Printing HOWTO For more details on OS/2 clients, please -refer to the OS2-Client-HOWTO containing in the Samba documentation. +refer to the OS2-Client-HOWTO + containing in the Samba documentation. Default: \fBos2 driver map = \fR .TP -\fB>pam password change (G)\fR +\fBpam password change (G)\fR With the addition of better PAM support in Samba 2.2, this parameter, it is possible to use PAM's password change control flag for Samba. If enabled, then PAM will be used for password @@ -4875,28 +4904,25 @@ parameter for most setups. Default: \fBpam password change = no\fR .TP -\fB>panic action (G)\fR +\fBpanic action (G)\fR This is a Samba developer option that allows a -system command to be called when either \fBsmbd\fR(8) or \fBsmbd\fR(8) crashes. This is usually used to -draw attention to the fact that a problem occurred. +system command to be called when either smbd(8) +crashes. This is usually used to draw attention to the fact that +a problem occurred. Default: \fBpanic action = \fR Example: \fBpanic action = "/bin/sleep 90000"\fR .TP -\fB>paranoid server security (G)\fR +\fBparanoid server security (G)\fR Some version of NT 4.x allow non-guest users with a bad passowrd. When this option is enabled, samba will not use a broken NT 4.x server as password server, but instead complain -to the logs and exit. - -Disabling this option prevents Samba from making -this check, which involves deliberatly attempting a -bad logon to the remote server. +to the logs and exit. Default: \fBparanoid server security = yes\fR .TP -\fB>passdb backend (G)\fR +\fBpassdb backend (G)\fR This option allows the administrator to chose which backends to retrieve and store passwords with. This allows (for example) both smbpasswd and tdbsam to be used without a recompile. Multiple backends can be specified, separated by spaces. The backends will be searched in the order they are specified. New users are always added to the first backend specified. @@ -4966,7 +4992,7 @@ Any characters after the (optional) second : are passed to the plugin for its own processing .TP 0.2i \(bu -\fBunixsam\fR - Allows samba to map all (other) available unix users +\fBunixsam\fR - (EXPERIMENTAL) Allows samba to map all (other) available unix users This backend uses the standard unix database for retrieving users. Users included in this pdb are NOT listed in samba user listings and users included in this pdb won't be @@ -4979,19 +5005,19 @@ the unix passdb and might 'override' mappings if specified earlier. It's meant t accounts for users that aren't covered by the previous backends. .RE -Default: \fBpassdb backend = smbpasswd unixsam\fR +Default: \fBpassdb backend = smbpasswd guest\fR -Example: \fBpassdb backend = tdbsam:/etc/samba/private/passdb.tdb smbpasswd:/etc/samba/smbpasswd unixsam\fR +Example: \fBpassdb backend = tdbsam:/etc/samba/private/passdb.tdb smbpasswd:/etc/samba/smbpasswd \fR -Example: \fBpassdb backend = ldapsam_nua:ldaps://ldap.example.com unixsam\fR +Example: \fBpassdb backend = ldapsam_nua:ldaps://ldap.example.com \fR Example: \fBpassdb backend = plugin:/usr/local/samba/lib/my_passdb.so:my_plugin_args tdbsam:/etc/samba/private/passdb.tdb\fR .TP -\fB>passwd chat (G)\fR +\fBpasswd chat (G)\fR This string controls the \fB"chat"\fR -conversation that takes places between \fBsmbd\fR(8) and the local password changing +conversation that takes places between smbd and the local password changing program to change the user's password. The string describes a -sequence of response-receive pairs that \fBsmbd\fR(8) uses to determine what to send to the +sequence of response-receive pairs that smbd(8) uses to determine what to send to the \fIpasswd program\fR and what to expect back. If the expected output is not received then the password is not changed. @@ -5011,7 +5037,7 @@ executed on the NIS master. The string can contain the macro \fI%n\fR which is substituted for the new password. The chat sequence can also contain the standard -macros \\\\n, \\\\r, \\\\t and \\\\s to give line-feed, +macros \\n, \\r, \\t and \\s to give line-feed, carriage-return, tab and space. The chat sequence string can also contain a '*' which matches any sequence of characters. Double quotes can be used to collect strings with spaces @@ -5029,18 +5055,18 @@ not any particular output. The \\n macro is ignored for PAM conversions. See also \fIunix password sync\fR, \fI passwd program\fR , \fIpasswd chat debug\fR and \fIpam password change\fR. -Default: \fBpasswd chat = *new*password* %n\\\\n -*new*password* %n\\\\n *changed*\fR +Default: \fBpasswd chat = *new*password* %n\\n +*new*password* %n\\n *changed*\fR -Example: \fBpasswd chat = "*Enter OLD password*" %o\\\\n -"*Enter NEW password*" %n\\\\n "*Reenter NEW password*" %n\\\\n "*Password +Example: \fBpasswd chat = "*Enter OLD password*" %o\\n +"*Enter NEW password*" %n\\n "*Reenter NEW password*" %n\\n "*Password changed*"\fR .TP -\fB>passwd chat debug (G)\fR +\fBpasswd chat debug (G)\fR This boolean specifies if the passwd chat script parameter is run in \fBdebug\fR mode. In this mode the strings passed to and received from the passwd chat are printed -in the \fBsmbd\fR(8) log with a +in the smbd(8) log with a \fIdebug level\fR of 100. This is a dangerous option as it will allow plaintext passwords to be seen in the \fBsmbd\fR log. It is available to help @@ -5057,7 +5083,7 @@ See also \fIpasswd chat\fR Default: \fBpasswd chat debug = no\fR .TP -\fB>passwd program (G)\fR +\fBpasswd program (G)\fR The name of a program that can be used to set UNIX user passwords. Any occurrences of \fI%u\fR will be replaced with the user name. The user name is checked for @@ -5090,7 +5116,7 @@ Default: \fBpasswd program = /bin/passwd\fR Example: \fBpasswd program = /sbin/npasswd %u\fR .TP -\fB>password level (G)\fR +\fBpassword level (G)\fR Some client/server combinations have difficulty with mixed-case passwords. One offending client is Windows for Workgroups, which for some reason forces passwords to upper @@ -5128,7 +5154,7 @@ Default: \fBpassword level = 0\fR Example: \fBpassword level = 4\fR .TP -\fB>password server (G)\fR +\fBpassword server (G)\fR By specifying the name of another SMB server (such as a WinNT box) with this option, and using \fBsecurity = domain \fR or \fBsecurity = server\fR you can get Samba @@ -5148,14 +5174,11 @@ by any method and order described in that parameter. The password server must be a machine capable of using the "LM1.2X002" or the "NT LM 0.12" protocol, and it must be in user level security mode. -.sp -.RS -.B "Note:" -Using a password server + +\fBNOTE:\fR Using a password server means your UNIX box (running Samba) is only as secure as your password server. \fBDO NOT CHOOSE A PASSWORD SERVER THAT YOU DON'T COMPLETELY TRUST\fR. -.RE Never point a Samba server at itself for password serving. This will cause a loop and could lock up your Samba @@ -5222,7 +5245,7 @@ Example: \fBpassword server = NT-PDC, NT-BDC1, NT-BDC2, * Example: \fBpassword server = *\fR .TP -\fB>path (S)\fR +\fBpath (S)\fR This parameter specifies a directory to which the user of the service is to be given access. In the case of printable services, this is where print data will spool prior to @@ -5247,7 +5270,7 @@ Default: \fBnone\fR Example: \fBpath = /home/fred\fR .TP -\fB>pid directory (G)\fR +\fBpid directory (G)\fR This option specifies the directory where pid files will be placed. @@ -5255,8 +5278,8 @@ Default: \fBpid directory = ${prefix}/var/locks\fR Example: \fBpid directory = /var/run/\fR .TP -\fB>posix locking (S)\fR -The \fBsmbd\fR(8) +\fBposix locking (S)\fR +The \fBsmbd(8)\fR daemon maintains an database of file locks obtained by SMB clients. The default behavior is to map this internal database to POSIX locks. This means that file locks obtained by SMB clients are @@ -5266,7 +5289,7 @@ You should never need to disable this parameter. Default: \fBposix locking = yes\fR .TP -\fB>postexec (S)\fR +\fBpostexec (S)\fR This option specifies a command to be run whenever the service is disconnected. It takes the usual substitutions. The command may be run as the root on some @@ -5285,7 +5308,18 @@ Default: \fBnone (no command executed)\fR Example: \fBpostexec = echo \\"%u disconnected from %S from %m (%I)\\" >> /tmp/log\fR .TP -\fB>preexec (S)\fR +\fBpostscript (S)\fR +This parameter forces a printer to interpret +the print files as PostScript. This is done by adding a %! +to the start of print output. + +This is most useful when you have lots of PCs that persist +in putting a control-D at the start of print jobs, which then +confuses your printer. + +Default: \fBpostscript = no\fR +.TP +\fBpreexec (S)\fR This option specifies a command to be run whenever the service is connected to. It takes the usual substitutions. @@ -5307,14 +5341,14 @@ Default: \fBnone (no command executed)\fR Example: \fBpreexec = echo \\"%u connected to %S from %m (%I)\\" >> /tmp/log\fR .TP -\fB>preexec close (S)\fR +\fBpreexec close (S)\fR This boolean option controls whether a non-zero return code from \fIpreexec \fR should close the service being connected to. Default: \fBpreexec close = no\fR .TP -\fB>preferred master (G)\fR +\fBpreferred master (G)\fR This boolean parameter controls if nmbd(8) is a preferred master browser for its workgroup. @@ -5335,10 +5369,10 @@ See also \fIos level\fR Default: \fBpreferred master = auto\fR .TP -\fB>prefered master (G)\fR +\fBprefered master (G)\fR Synonym for \fI preferred master\fR for people who cannot spell :-). .TP -\fB>preload (G)\fR +\fBpreload (G)\fR This is a list of services that you want to be automatically added to the browse lists. This is most useful for homes and printers services that would otherwise not be @@ -5351,19 +5385,7 @@ Default: \fBno preloaded services\fR Example: \fBpreload = fred lp colorlp\fR .TP -\fB>preload modules (G)\fR -This is a list of paths to modules that should -be loaded into smbd before a client connects. This improves -the speed of smbd when reacting to new connections somewhat. - -It is recommended to only use this option on heavy-performance -servers. - -Default: \fBpreload modules = \fR - -Example: \fBpreload modules = /usr/lib/samba/passdb/mysql.so\fR -.TP -\fB>preserve case (S)\fR +\fBpreserve case (S)\fR This controls if new filenames are created with the case that the client passes, or if they are forced to be the \fIdefault case @@ -5374,7 +5396,7 @@ Default: \fBpreserve case = yes\fR See the section on NAME MANGLING for a fuller discussion. .TP -\fB>print command (S)\fR +\fBprint command (S)\fR After a print job has finished spooling to a service, this command will be used via a \fBsystem()\fR call to process the spool file. Typically the command specified will @@ -5459,10 +5481,10 @@ set print command will be ignored. Example: \fBprint command = /usr/local/samba/bin/myprintscript %p %s\fR .TP -\fB>print ok (S)\fR +\fBprint ok (S)\fR Synonym for \fIprintable\fR. .TP -\fB>printable (S)\fR +\fBprintable (S)\fR If this parameter is yes, then clients may open, write to and submit spool files on the directory specified for the service. @@ -5475,10 +5497,10 @@ the resource. Default: \fBprintable = no\fR .TP -\fB>printcap (G)\fR +\fBprintcap (G)\fR Synonym for \fI printcap name\fR. .TP -\fB>printcap name (G)\fR +\fBprintcap name (G)\fR This parameter may be used to override the compiled-in default printcap name used by the server (usually \fI /etc/printcap\fR). See the discussion of the [printers] section above for reasons why you might want to do this. @@ -5502,30 +5524,28 @@ A minimal printcap file would look something like this: .nf -print1|My Printer 1 -print2|My Printer 2 -print3|My Printer 3 -print4|My Printer 4 -print5|My Printer 5 + print1|My Printer 1 + print2|My Printer 2 + print3|My Printer 3 + print4|My Printer 4 + print5|My Printer 5 + .fi where the '|' separates aliases of a printer. The fact that the second alias has a space in it gives a hint to Samba that it's a comment. -.sp -.RS -.B "Note:" -Under AIX the default printcap + +\fBNOTE\fR: Under AIX the default printcap name is \fI/etc/qconfig\fR. Samba will assume the file is in AIX \fIqconfig\fR format if the string \fIqconfig\fR appears in the printcap filename. -.RE Default: \fBprintcap name = /etc/printcap\fR Example: \fBprintcap name = /etc/myprintcap\fR .TP -\fB>printer admin (S)\fR +\fBprinter admin (S)\fR This is a list of users that can do anything to printers via the remote administration interfaces offered by MS-RPC (usually using a NT workstation). Note that the root user always @@ -5535,7 +5555,88 @@ Default: \fBprinter admin = \fR Example: \fBprinter admin = admin, @staff\fR .TP -\fB>printer name (S)\fR +\fBprinter driver (S)\fR +\fBNote :\fRThis is a deprecated +parameter and will be removed in the next major release +following version 2.2. Please see the instructions in +the Samba 2.2. Printing +HOWTO for more information +on the new method of loading printer drivers onto a Samba server. + +This option allows you to control the string +that clients receive when they ask the server for the printer driver +associated with a printer. If you are using Windows95 or Windows NT +then you can use this to automate the setup of printers on your +system. + +You need to set this parameter to the exact string (case +sensitive) that describes the appropriate printer driver for your +system. If you don't know the exact string to use then you should +first try with no \fI printer driver\fR option set and the client will +give you a list of printer drivers. The appropriate strings are +shown in a scroll box after you have chosen the printer manufacturer. + +See also \fIprinter +driver file\fR. + +Example: \fBprinter driver = HP LaserJet 4L\fR +.TP +\fBprinter driver file (G)\fR +\fBNote :\fRThis is a deprecated +parameter and will be removed in the next major release +following version 2.2. Please see the instructions in +the Samba 2.2. Printing +HOWTO for more information +on the new method of loading printer drivers onto a Samba server. + +This parameter tells Samba where the printer driver +definition file, used when serving drivers to Windows 95 clients, is +to be found. If this is not set, the default is : + +\fISAMBA_INSTALL_DIRECTORY +/lib/printers.def\fR + +This file is created from Windows 95 \fImsprint.inf +\fR files found on the Windows 95 client system. For more +details on setting up serving of printer drivers to Windows 95 +clients, see the outdated documentation file in the \fIdocs/\fR +directory, \fIPRINTER_DRIVER.txt\fR. + +See also \fI printer driver location\fR. + +Default: \fBNone (set in compile).\fR + +Example: \fBprinter driver file = +/usr/local/samba/printers/drivers.def\fR +.TP +\fBprinter driver location (S)\fR +\fBNote :\fRThis is a deprecated +parameter and will be removed in the next major release +following version 2.2. Please see the instructions in +the Samba 2.2. Printing +HOWTO for more information +on the new method of loading printer drivers onto a Samba server. + +This parameter tells clients of a particular printer +share where to find the printer driver files for the automatic +installation of drivers for Windows 95 machines. If Samba is set up +to serve printer drivers to Windows 95 machines, this should be set to + +\fB\\\\MACHINE\\PRINTER$\fR + +Where MACHINE is the NetBIOS name of your Samba server, +and PRINTER$ is a share you set up for serving printer driver +files. For more details on setting this up see the outdated documentation +file in the \fIdocs/\fR directory, \fI PRINTER_DRIVER.txt\fR. + +See also \fI printer driver file\fR. + +Default: \fBnone\fR + +Example: \fBprinter driver location = \\\\MACHINE\\PRINTER$ +\fR +.TP +\fBprinter name (S)\fR This parameter specifies the name of the printer to which print jobs spooled through a printable service will be sent. @@ -5548,10 +5649,10 @@ on many systems)\fR Example: \fBprinter name = laserwriter\fR .TP -\fB>printer (S)\fR +\fBprinter (S)\fR Synonym for \fI printer name\fR. .TP -\fB>printing (S)\fR +\fBprinting (S)\fR This parameters controls how printer status information is interpreted on your system. It also affects the default values for the \fIprint command\fR, @@ -5574,21 +5675,21 @@ This option can be set on a per printer basis See also the discussion in the [printers] section. .TP -\fB>private dir (G)\fR +\fBprivate dir (G)\fR This parameters defines the directory smbd will use for storing such files as \fIsmbpasswd\fR and \fIsecrets.tdb\fR. Default :\fBprivate dir = ${prefix}/private\fR .TP -\fB>protocol (G)\fR +\fBprotocol (G)\fR Synonym for \fImax protocol\fR. .TP -\fB>public (S)\fR +\fBpublic (S)\fR Synonym for \fIguest ok\fR. .TP -\fB>queuepause command (S)\fR +\fBqueuepause command (S)\fR This parameter specifies the command to be executed on the server host in order to pause the printer queue. @@ -5612,7 +5713,7 @@ Default: \fBdepends on the setting of \fIprinting Example: \fBqueuepause command = disable %p\fR .TP -\fB>queueresume command (S)\fR +\fBqueueresume command (S)\fR This parameter specifies the command to be executed on the server host in order to resume the printer queue. It is the command to undo the behavior that is caused by the @@ -5639,7 +5740,7 @@ Default: \fBdepends on the setting of \fIprinting\fB\fR Example: \fBqueuepause command = enable %p \fR .TP -\fB>read bmpx (G)\fR +\fBread bmpx (G)\fR This boolean parameter controls whether smbd(8) will support the "Read Block Multiplex" SMB. This is now rarely used and defaults to no. You should never need to set this @@ -5647,7 +5748,7 @@ parameter. Default: \fBread bmpx = no\fR .TP -\fB>read list (S)\fR +\fBread list (S)\fR This is a list of users that are given read-only access to a service. If the connecting user is in this list then they will not be given write access, no matter what the \fIread only\fR @@ -5661,7 +5762,7 @@ Default: \fBread list = \fR Example: \fBread list = mary, @students\fR .TP -\fB>read only (S)\fR +\fBread only (S)\fR An inverted synonym is \fIwriteable\fR. If this parameter is yes, then users @@ -5674,7 +5775,7 @@ will \fBALWAYS\fR allow writing to the directory Default: \fBread only = yes\fR .TP -\fB>read raw (G)\fR +\fBread raw (G)\fR This parameter controls whether or not the server will support the raw read SMB requests when transferring data to clients. @@ -5691,7 +5792,7 @@ tool and left severely alone. See also \fIwrite raw\fR. Default: \fBread raw = yes\fR .TP -\fB>read size (G)\fR +\fBread size (G)\fR The option \fIread size\fR affects the overlap of disk reads/writes with network reads/writes. If the amount of data being transferred in several of the SMB @@ -5715,7 +5816,7 @@ Default: \fBread size = 16384\fR Example: \fBread size = 8192\fR .TP -\fB>realm (G)\fR +\fBrealm (G)\fR This option specifies the kerberos realm to use. The realm is used as the ADS equivalent of the NT4\fBdomain\fR. It is usually set to the DNS name of the kerberos server. @@ -5724,7 +5825,7 @@ Default: \fBrealm = \fR Example: \fBrealm = mysambabox.mycompany.com\fR .TP -\fB>remote announce (G)\fR +\fBremote announce (G)\fR This option allows you to setup nmbd(8) to periodically announce itself to arbitrary IP addresses with an arbitrary workgroup name. @@ -5748,13 +5849,13 @@ The IP addresses you choose would normally be the broadcast addresses of the remote networks, but can also be the IP addresses of known browse masters if your network config is that stable. -See the documentation file BROWSING +See the documentation file \fIBROWSING.txt\fR in the \fIdocs/\fR directory. Default: \fBremote announce = \fR .TP -\fB>remote browse sync (G)\fR +\fBremote browse sync (G)\fR This option allows you to setup nmbd(8) to periodically request synchronization of browse lists with the master browser of a Samba server that is on a remote segment. This option will allow you to @@ -5785,7 +5886,7 @@ is in fact the browse master on its segment. Default: \fBremote browse sync = \fR .TP -\fB>restrict anonymous (G)\fR +\fBrestrict anonymous (G)\fR This is a integer parameter, and mirrors as much as possible the functinality the RestrictAnonymous @@ -5793,13 +5894,13 @@ registry key does on NT/Win2k. Default: \fBrestrict anonymous = 0\fR .TP -\fB>root (G)\fR +\fBroot (G)\fR Synonym for \fIroot directory"\fR. .TP -\fB>root dir (G)\fR +\fBroot dir (G)\fR Synonym for \fIroot directory"\fR. .TP -\fB>root directory (G)\fR +\fBroot directory (G)\fR The server will \fBchroot()\fR (i.e. Change its root directory) to this directory on startup. This is not strictly necessary for secure operation. Even without it the @@ -5826,7 +5927,7 @@ Default: \fBroot directory = /\fR Example: \fBroot directory = /homes/smb\fR .TP -\fB>root postexec (S)\fR +\fBroot postexec (S)\fR This is the same as the \fIpostexec\fR parameter except that the command is run as root. This is useful for unmounting filesystems @@ -5837,7 +5938,7 @@ See also \fI postexec\fR. Default: \fBroot postexec = \fR .TP -\fB>root preexec (S)\fR +\fBroot preexec (S)\fR This is the same as the \fIpreexec\fR parameter except that the command is run as root. This is useful for mounting filesystems (such as CDROMs) when a @@ -5848,7 +5949,7 @@ See also \fI preexec\fR and \fIpreexec close\fR. Default: \fBroot preexec = \fR .TP -\fB>root preexec close (S)\fR +\fBroot preexec close (S)\fR This is the same as the \fIpreexec close \fR parameter except that the command is run as root. @@ -5856,12 +5957,13 @@ See also \fI preexec\fR and \fIpreexec close\fR. Default: \fBroot preexec close = no\fR .TP -\fB>security (G)\fR +\fBsecurity (G)\fR This option affects how clients respond to Samba and is one of the most important settings in the \fI smb.conf\fR file. The option sets the "security mode bit" in replies to -protocol negotiations with \fBsmbd\fR(8) to turn share level security on or off. Clients decide +protocol negotiations with smbd(8) + to turn share level security on or off. Clients decide based on this bit whether (and how) to transfer user and password information to the server. @@ -5902,7 +6004,7 @@ level security under different \fINetBIOS aliases\fR. The different settings will now be explained. ->\fBSECURITY = SHARE +\fBSECURITY = SHARE \fR When clients connect to a share level security server they @@ -5970,10 +6072,10 @@ be used in granting access. See also the section NOTE ABOUT USERNAME/PASSWORD VALIDATION. ->\fBSECURITY = USER +\fBSECURITY = USER \fR -This is the default security setting in Samba 3.0. +This is the default security setting in Samba 2.2. With user-level security a client must first "log-on" with a valid username and password (which can be mapped using the \fIusername map\fR parameter). Encrypted passwords (see the \fIencrypted passwords\fR parameter) can also @@ -5991,24 +6093,23 @@ parameter for details on doing this. See also the section NOTE ABOUT USERNAME/PASSWORD VALIDATION. ->\fBSECURITY = DOMAIN +\fBSECURITY = SERVER \fR -This mode will only work correctly if \fBnet\fR(8) has been used to add this -machine into a Windows NT Domain. It expects the \fIencrypted passwords\fR -parameter to be set to yes. In this -mode Samba will try to validate the username/password by passing -it to a Windows NT Primary or Backup Domain Controller, in exactly -the same way that a Windows NT Server would do. - -\fBNote\fR that a valid UNIX user must still -exist as well as the account on the Domain Controller to allow -Samba to have a valid UNIX account to map file access to. +In this mode Samba will try to validate the username/password +by passing it to another SMB server, such as an NT box. If this +fails it will revert to \fBsecurity = user\fR, but note +that if encrypted passwords have been negotiated then Samba cannot +revert back to checking the UNIX password file, it must have a valid +\fIsmbpasswd\fR file to check users against. See the +documentation file in the \fIdocs/\fR directory +\fIENCRYPTION.txt\fR for details on how to set this +up. -\fBNote\fR that from the client's point -of view \fBsecurity = domain\fR is the same as \fBsecurity = user -\fR. It only affects how the server deals with the authentication, -it does not in any way affect what the client sees. +\fBNote\fR that from the client's point of +view \fBsecurity = server\fR is the same as \fB security = user\fR. It only affects how the server deals +with the authentication, it does not in any way affect what the +client sees. \fBNote\fR that the name of the resource being requested is \fBnot\fR sent to the server until after @@ -6024,39 +6125,24 @@ See also the \fIpassword server\fR parameter and the \fIencrypted passwords\fR parameter. ->\fBSECURITY = SERVER +\fBSECURITY = DOMAIN \fR -In this mode Samba will try to validate the username/password -by passing it to another SMB server, such as an NT box. If this -fails it will revert to \fBsecurity = -user\fR. It expects the \fIencrypted passwords\fR -parameter to be set to -yes, unless the remote server -does not support them. However note -that if encrypted passwords have been negotiated then Samba cannot -revert back to checking the UNIX password file, it must have a valid -\fIsmbpasswd\fR file to check users against. See the -documentation file in the \fIdocs/\fR directory -\fIENCRYPTION.txt\fR for details on how to set this -up. +This mode will only work correctly if smbpasswd(8) has been used to add this +machine into a Windows NT Domain. It expects the \fIencrypted passwords\fR +parameter to be set to yes. In this +mode Samba will try to validate the username/password by passing +it to a Windows NT Primary or Backup Domain Controller, in exactly +the same way that a Windows NT Server would do. -\fBNote\fR this mode of operation -has significant pitfalls, due to the fact that is -activly initiates a man-in-the-middle attack on the -remote SMB server. In particular, this mode of -operation can cause significant resource consuption on -the PDC, as it must maintain an active connection for -the duration of the user's session. Furthermore, if -this connection is lost, there is no way to -reestablish it, and futher authenticaions to the Samba -server may fail. (From a single client, till it -disconnects). +\fBNote\fR that a valid UNIX user must still +exist as well as the account on the Domain Controller to allow +Samba to have a valid UNIX account to map file access to. -\fBNote\fR that from the client's point of -view \fBsecurity = server\fR is the same as \fB security = user\fR. It only affects how the server deals -with the authentication, it does not in any way affect what the -client sees. +\fBNote\fR that from the client's point +of view \fBsecurity = domain\fR is the same as \fBsecurity = user +\fR. It only affects how the server deals with the authentication, +it does not in any way affect what the client sees. \fBNote\fR that the name of the resource being requested is \fBnot\fR sent to the server until after @@ -6066,6 +6152,14 @@ the server to automatically map unknown users into the \fIguest account\fR. See the \fImap to guest\fR parameter for details on doing this. +\fBBUG:\fR There is currently a bug in the +implementation of \fBsecurity = domain\fR with respect +to multi-byte character set usernames. The communication with a +Domain Controller must be done in UNICODE and Samba currently +does not widen multi-byte user names to UNICODE correctly, thus +a multi-byte username will not be recognized correctly at the +Domain Controller. This issue will be addressed in a future release. + See also the section NOTE ABOUT USERNAME/PASSWORD VALIDATION. See also the \fIpassword @@ -6076,7 +6170,7 @@ Default: \fBsecurity = USER\fR Example: \fBsecurity = DOMAIN\fR .TP -\fB>security mask (S)\fR +\fBsecurity mask (S)\fR This parameter controls what UNIX permission bits can be modified when a Windows NT client is manipulating the UNIX permission on a file using the native NT security @@ -6105,7 +6199,7 @@ Default: \fBsecurity mask = 0777\fR Example: \fBsecurity mask = 0770\fR .TP -\fB>server string (G)\fR +\fBserver string (G)\fR This controls what string will show up in the printer comment box in print manager and next to the IPC connection in \fBnet view\fR. It can be any string that you wish @@ -6125,23 +6219,7 @@ Default: \fBserver string = Samba %v\fR Example: \fBserver string = University of GNUs Samba Server\fR .TP -\fB>set primary group script (G)\fR -Thanks to the Posix subsystem in NT a -Windows User has a primary group in addition to the -auxiliary groups. This script sets the primary group -in the unix userdatase when an administrator sets the -primary group from the windows user manager or when -fetching a SAM with \fBnet rpc -vampire\fR. \fI%u\fR will be -replaced with the user whose primary group is to be -set. \fI%g\fR will be replaced with -the group to set. - -Default: \fBNo default value\fR - -Example: \fBset primary group script = /usr/sbin/usermod -g '%g' '%u'\fR -.TP -\fB>set directory (S)\fR +\fBset directory (S)\fR If \fBset directory = no\fR, then users of the service may not use the setdir command to change directory. @@ -6152,7 +6230,7 @@ for details. Default: \fBset directory = no\fR .TP -\fB>share modes (S)\fR +\fBshare modes (S)\fR This enables or disables the honoring of the \fIshare modes\fR during a file open. These modes are used by clients to gain exclusive read or write access @@ -6175,7 +6253,7 @@ off as many Windows applications will break if you do so. Default: \fBshare modes = yes\fR .TP -\fB>short preserve case (S)\fR +\fBshort preserve case (S)\fR This boolean parameter controls if new files which conform to 8.3 syntax, that is all in upper case and of suitable length, are created upper case, or if they are forced @@ -6188,7 +6266,7 @@ See the section on NAME MANGLING. Default: \fBshort preserve case = yes\fR .TP -\fB>show add printer wizard (G)\fR +\fBshow add printer wizard (G)\fR With the introduction of MS-RPC based printing support for Windows NT/2000 client in Samba 2.2, a "Printers..." folder will appear on Samba hosts in the share listing. Normally this folder will @@ -6215,7 +6293,7 @@ command\fR, \fIdeleteprinter command\fR, \fIprinter admin\fR Default :\fBshow add printer wizard = yes\fR .TP -\fB>shutdown script (G)\fR +\fBshutdown script (G)\fR \fBThis parameter only exists in the HEAD cvs branch\fR This a full path name to a script called by \fBsmbd(8)\fR that @@ -6248,19 +6326,20 @@ Example: \fBabort shutdown script = /usr/local/samba/sbin/shutdown %m %t %r %f\f Shutdown script example: .nf -#!/bin/bash + #!/bin/bash -$time=0 -let "time/60" -let "time++" + $time=0 + let "time/60" + let "time++" -/sbin/shutdown $3 $4 +$time $1 & + /sbin/shutdown $3 $4 +$time $1 & + .fi Shutdown does not return so we need to launch it in background. See also \fIabort shutdown script\fR. .TP -\fB>smb passwd file (G)\fR +\fBsmb passwd file (G)\fR This option sets the path to the encrypted smbpasswd file. By default the path to the smbpasswd file is compiled into Samba. @@ -6271,13 +6350,13 @@ Default: \fBsmb passwd file = ${prefix}/private/smbpasswd Example: \fBsmb passwd file = /etc/samba/smbpasswd \fR .TP -\fB>smb ports (G)\fR +\fBsmb ports (G)\fR Specifies which ports the server should listen on for SMB traffic. Default: \fBsmb ports = 445 139\fR .TP -\fB>socket address (G)\fR +\fBsocket address (G)\fR This option allows you to control what address Samba will listen for connections on. This is used to support multiple virtual interfaces on the one server, each @@ -6288,7 +6367,7 @@ address. Example: \fBsocket address = 192.168.2.20\fR .TP -\fB>socket options (G)\fR +\fBsocket options (G)\fR This option allows you to set socket options to be used when talking with the client. @@ -6376,7 +6455,7 @@ Default: \fBsocket options = TCP_NODELAY\fR Example: \fBsocket options = IPTOS_LOWDELAY\fR .TP -\fB>source environment (G)\fR +\fBsource environment (G)\fR This parameter causes Samba to set environment variables as per the content of the file named. @@ -6400,31 +6479,26 @@ Examples: \fBsource environment = |/etc/smb.conf.sh Example: \fBsource environment = /usr/local/smb_env_vars\fR .TP -\fB>use spnego (G)\fR -This variable controls controls whether samba will try -to use Simple and Protected NEGOciation (as specified by rfc2478) with -WindowsXP and Windows2000sp2 clients to agree upon an authentication mechanism. -Unless further issues are discovered with our SPNEGO -implementation, there is no reason this should ever be -disabled. +\fBuse spnego (G)\fR +This variable controls controls whether samba will try to use Simple and Protected NEGOciation (as specified by rfc2478) with WindowsXP and Windows2000sp2 clients to agree upon an authentication mechanism. As of samba 3.0alpha it must be set to "no" for these clients to join a samba domain controller. It can be set to "yes" to allow samba to participate in an AD domain controlled by a Windows2000 domain controller. Default: \fBuse spnego = yes\fR .TP -\fB>stat cache (G)\fR -This parameter determines if \fBsmbd\fR(8) will use a cache in order to +\fBstat cache (G)\fR +This parameter determines if smbd(8) will use a cache in order to speed up case insensitive name mappings. You should never need to change this parameter. Default: \fBstat cache = yes\fR .TP -\fB>stat cache size (G)\fR +\fBstat cache size (G)\fR This parameter determines the number of entries in the \fIstat cache\fR. You should never need to change this parameter. Default: \fBstat cache size = 50\fR .TP -\fB>strict allocate (S)\fR +\fBstrict allocate (S)\fR This is a boolean that controls the handling of disk space allocation in the server. When this is set to yes the server will change from UNIX behaviour of not committing real @@ -6443,7 +6517,7 @@ of users. Default: \fBstrict allocate = no\fR .TP -\fB>strict locking (S)\fR +\fBstrict locking (S)\fR This is a boolean that controls the handling of file locking in the server. When this is set to yes the server will check every read and write access for file locks, and @@ -6458,7 +6532,7 @@ locking = no\fR is preferable. Default: \fBstrict locking = no\fR .TP -\fB>strict sync (S)\fR +\fBstrict sync (S)\fR Many Windows applications (including the Windows 98 explorer shell) seem to confuse flushing buffer contents to disk with doing a sync to disk. Under UNIX, a sync call forces @@ -6466,7 +6540,7 @@ the process to be suspended until the kernel has ensured that all outstanding data in kernel disk buffers has been safely stored onto stable storage. This is very slow and should only be done rarely. Setting this parameter to no (the -default) means that \fBsmbd\fR(8) ignores the Windows applications requests for +default) means that smbd ignores the Windows applications requests for a sync call. There is only a possibility of losing data if the operating system itself that Samba is running on crashes, so there is little danger in this default setting. In addition, this fixes many @@ -6478,14 +6552,14 @@ always>\fR parameter. Default: \fBstrict sync = no\fR .TP -\fB>strip dot (G)\fR +\fBstrip dot (G)\fR This is a boolean that controls whether to strip trailing dots off UNIX filenames. This helps with some CDROMs that have filenames ending in a single dot. Default: \fBstrip dot = no\fR .TP -\fB>sync always (S)\fR +\fBsync always (S)\fR This is a boolean parameter that controls whether writes will always be written to stable storage before the write call returns. If this is no then the server will be @@ -6502,7 +6576,7 @@ sync\fR parameter. Default: \fBsync always = no\fR .TP -\fB>syslog (G)\fR +\fBsyslog (G)\fR This parameter maps how Samba debug messages are logged onto the system syslog logging levels. Samba debug level zero maps onto syslog LOG_ERR, debug @@ -6516,14 +6590,14 @@ will be sent to syslog. Default: \fBsyslog = 1\fR .TP -\fB>syslog only (G)\fR +\fBsyslog only (G)\fR If this parameter is set then Samba debug messages are logged into the system syslog only, and not to the debug log files. Default: \fBsyslog only = no\fR .TP -\fB>template homedir (G)\fR +\fBtemplate homedir (G)\fR When filling out the user information for a Windows NT user, the winbindd(8) daemon uses this parameter to fill in the home directory for that user. @@ -6534,14 +6608,14 @@ NT user name. Default: \fBtemplate homedir = /home/%D/%U\fR .TP -\fB>template shell (G)\fR +\fBtemplate shell (G)\fR When filling out the user information for a Windows NT -user, the \fBwinbindd\fR(8) daemon +user, the winbindd(8) daemon uses this parameter to fill in the login shell for that user. Default: \fBtemplate shell = /bin/false\fR .TP -\fB>time offset (G)\fR +\fBtime offset (G)\fR This parameter is a setting in minutes to add to the normal GMT to local time conversion. This is useful if you are serving a lot of PCs that have incorrect daylight @@ -6551,20 +6625,21 @@ Default: \fBtime offset = 0\fR Example: \fBtime offset = 60\fR .TP -\fB>time server (G)\fR -This parameter determines if \fBnmbd\fR(8) advertises itself as a time server to Windows +\fBtime server (G)\fR +This parameter determines if +nmbd(8) advertises itself as a time server to Windows clients. Default: \fBtime server = no\fR .TP -\fB>timestamp logs (G)\fR +\fBtimestamp logs (G)\fR Synonym for \fI debug timestamp\fR. .TP -\fB>total print jobs (G)\fR +\fBtotal print jobs (G)\fR This parameter accepts an integer value which defines a limit on the maximum number of print jobs that will be accepted system wide at any given time. If a print job is submitted -by a client which will exceed this number, then \fBsmbd\fR(8) will return an +by a client which will exceed this number, then smbd will return an error indicating that no space is available on the server. The default value of 0 means that no such limit exists. This parameter can be used to prevent a server from exceeding its capacity and is @@ -6575,23 +6650,23 @@ Default: \fBtotal print jobs = 0\fR Example: \fBtotal print jobs = 5000\fR .TP -\fB>unicode (G)\fR +\fBunicode (G)\fR Specifies whether Samba should try to use unicode on the wire by default. Note: This does NOT mean that samba will assume that the unix machine uses unicode! Default: \fBunicode = yes\fR .TP -\fB>unix charset (G)\fR +\fBunix charset (G)\fR Specifies the charset the unix machine Samba runs on uses. Samba needs to know this in order to be able to convert text to the charsets other SMB clients use. -Default: \fBunix charset = UTF8\fR +Default: \fBunix charset = ASCII\fR -Example: \fBunix charset = ASCII\fR +Example: \fBunix charset = UTF8\fR .TP -\fB>unix extensions(G)\fR +\fBunix extensions(G)\fR This boolean parameter controls whether Samba implments the CIFS UNIX extensions, as defined by HP. These extensions enable Samba to better serve UNIX CIFS clients @@ -6601,7 +6676,7 @@ no current use to Windows clients. Default: \fBunix extensions = no\fR .TP -\fB>unix password sync (G)\fR +\fBunix password sync (G)\fR This boolean parameter controls whether Samba attempts to synchronize the UNIX password with the SMB password when the encrypted SMB password in the smbpasswd file is changed. @@ -6616,7 +6691,7 @@ program\fR, \fI passwd chat\fR. Default: \fBunix password sync = no\fR .TP -\fB>update encrypted (G)\fR +\fBupdate encrypted (G)\fR This boolean parameter allows a user logging on with a plaintext password to have their encrypted (hashed) password in the smbpasswd file to be updated automatically as @@ -6642,7 +6717,7 @@ password in order to connect correctly, and to update their hashed Default: \fBupdate encrypted = no\fR .TP -\fB>use client driver (S)\fR +\fBuse client driver (S)\fR This parameter applies only to Windows NT/2000 clients. It has no affect on Windows 95/98/ME clients. When serving a printer to Windows NT/2000 clients without first installing @@ -6674,7 +6749,7 @@ See also disable spoolss Default: \fBuse client driver = no\fR .TP -\fB>use mmap (G)\fR +\fBuse mmap (G)\fR This global parameter determines if the tdb internals of Samba can depend on mmap working correctly on the running system. Samba requires a coherent mmap/read-write system memory cache. Currently only HPUX does not have such a @@ -6685,13 +6760,27 @@ the tdb internal code. Default: \fBuse mmap = yes\fR .TP -\fB>user (S)\fR +\fBuse rhosts (G)\fR +If this global parameter is yes, it specifies +that the UNIX user's \fI.rhosts\fR file in their home directory +will be read to find the names of hosts and users who will be allowed +access without specifying a password. + +\fBNOTE:\fR The use of \fIuse rhosts +\fR can be a major security hole. This is because you are +trusting the PC to supply the correct username. It is very easy to +get a PC to supply a false username. I recommend that the \fI use rhosts\fR option be only used if you really know what +you are doing. + +Default: \fBuse rhosts = no\fR +.TP +\fBuser (S)\fR Synonym for \fI username\fR. .TP -\fB>users (S)\fR +\fBusers (S)\fR Synonym for \fI username\fR. .TP -\fB>username (S)\fR +\fBusername (S)\fR Multiple users may be specified in a comma-delimited list, in which case the supplied password will be tested against each username in turn (left to right). @@ -6732,7 +6821,7 @@ If any of the usernames begin with a '+' then the name will be looked up only in the UNIX groups database and will expand to a list of all users in the group of that name. -If any of the usernames begin with a '&' then the name +If any of the usernames begin with a '&'then the name will be looked up only in the NIS netgroups database (if Samba is compiled with netgroup support) and will expand to a list of all users in the netgroup group of that name. @@ -6751,7 +6840,7 @@ else .\fR Examples:\fBusername = fred, mary, jack, jane, @users, @pcgroup\fR .TP -\fB>username level (G)\fR +\fBusername level (G)\fR This option helps Samba to try and 'guess' at the real UNIX username, as many DOS clients send an all-uppercase username. By default Samba tries all lowercase, followed by the @@ -6770,7 +6859,7 @@ Default: \fBusername level = 0\fR Example: \fBusername level = 5\fR .TP -\fB>username map (G)\fR +\fBusername map (G)\fR This option allows you to specify a file containing a mapping of usernames from the clients to the server. This can be used for several purposes. The most common is to map usernames @@ -6833,8 +6922,9 @@ that line. .nf -!sys = mary fred -guest = * + !sys = mary fred + guest = * + .fi Note that the remapping is applied to all occurrences @@ -6856,7 +6946,7 @@ Default: \fBno username map\fR Example: \fBusername map = /usr/local/samba/lib/users.map \fR .TP -\fB>use sendfile (S)\fR +\fBuse sendfile (S)\fR If this parameter is yes, and Samba was built with the --with-sendfile-support option, and the underlying operating system supports sendfile system call, then some SMB read calls (mainly ReadAndX @@ -6867,7 +6957,7 @@ as yet. Default: \fBuse sendfile = no\fR .TP -\fB>utmp (G)\fR +\fButmp (G)\fR This boolean parameter is only available if Samba has been configured and compiled with the option \fB --with-utmp\fR. If set to yes then Samba will attempt to add utmp or utmpx records (depending on the UNIX system) whenever a @@ -6884,7 +6974,7 @@ See also the \fI utmp directory\fR parameter. Default: \fButmp = no\fR .TP -\fB>utmp directory(G)\fR +\fButmp directory(G)\fR This parameter is only available if Samba has been configured and compiled with the option \fB --with-utmp\fR. It specifies a directory pathname that is used to store the utmp or utmpx files (depending on the UNIX system) that @@ -6897,7 +6987,7 @@ Default: \fBno utmp directory\fR Example: \fButmp directory = /var/run/utmp\fR .TP -\fB>wtmp directory(G)\fR +\fBwtmp directory(G)\fR This parameter is only available if Samba has been configured and compiled with the option \fB --with-utmp\fR. It specifies a directory pathname that is used to store the wtmp or wtmpx files (depending on the UNIX system) that @@ -6913,7 +7003,7 @@ Default: \fBno wtmp directory\fR Example: \fBwtmp directory = /var/log/wtmp\fR .TP -\fB>valid users (S)\fR +\fBvalid users (S)\fR This is a list of users that should be allowed to login to this service. Names starting with '@', '+' and '&' are interpreted using the same rules as described in the @@ -6934,7 +7024,7 @@ Default: \fBNo valid users list (anyone can login) Example: \fBvalid users = greg, @pcusers\fR .TP -\fB>veto files(S)\fR +\fBveto files(S)\fR This is a list of files and directories that are neither visible nor accessible. Each entry in the list must be separated by a '/', which allows spaces to be included @@ -6979,7 +7069,7 @@ veto files = /*Security*/*.tmp/*root*/ veto files = /.AppleDouble/.bin/.AppleDesktop/Network Trash Folder/ .fi .TP -\fB>veto oplock files (S)\fR +\fBveto oplock files (S)\fR This parameter is only valid when the \fIoplocks\fR parameter is turned on for a share. It allows the Samba administrator to selectively turn off the granting of oplocks on selected files that @@ -7001,7 +7091,7 @@ the particular NetBench share : Example: \fBveto oplock files = /*.SEM/ \fR .TP -\fB>vfs path (S)\fR +\fBvfs path (S)\fR This parameter specifies the directory to look in for vfs modules. The name of every \fBvfs object \fR will be prepended by this directory @@ -7010,7 +7100,7 @@ Default: \fBvfs path = \fR Example: \fBvfs path = /usr/lib/samba/vfs\fR .TP -\fB>vfs object (S)\fR +\fBvfs object (S)\fR This parameter specifies a shared object files that are used for Samba VFS I/O operations. By default, normal disk I/O operations are used but these can be overloaded @@ -7018,21 +7108,21 @@ with one or more VFS objects. Default : \fBno value\fR .TP -\fB>vfs options (S)\fR +\fBvfs options (S)\fR This parameter allows parameters to be passed to the vfs layer at initialization time. See also \fI vfs object\fR. Default : \fBno value\fR .TP -\fB>volume (S)\fR +\fBvolume (S)\fR This allows you to override the volume label returned for a share. Useful for CDROMs with installation programs that insist on a particular volume label. Default: \fBthe name of the share\fR .TP -\fB>wide links (S)\fR +\fBwide links (S)\fR This parameter controls whether or not links in the UNIX file system may be followed by the server. Links that point to areas within the directory tree exported by the @@ -7045,17 +7135,19 @@ that Samba has to do in order to perform the link checks. Default: \fBwide links = yes\fR .TP -\fB>winbind cache time (G)\fR -This parameter specifies the number of -seconds the \fBwinbindd\fR(8) daemon will cache +\fBwinbind cache time (G)\fR +This parameter specifies the number of seconds the +winbindd(8) daemon will cache user and group information before querying a Windows NT server again. Default: \fBwinbind cache type = 15\fR .TP -\fB>winbind enum users (G)\fR -On large installations using \fBwinbindd\fR(8) it may be -necessary to suppress the enumeration of users through the \fBsetpwent()\fR, +\fBwinbind enum users (G)\fR +On large installations using +winbindd(8) it may be +necessary to suppress the enumeration of users through the +\fB setpwent()\fR, \fBgetpwent()\fR and \fBendpwent()\fR group of system calls. If the \fIwinbind enum users\fR parameter is @@ -7070,9 +7162,11 @@ usernames. Default: \fBwinbind enum users = yes \fR .TP -\fB>winbind enum groups (G)\fR -On large installations using \fBwinbindd\fR(8) it may be necessary to suppress -the enumeration of groups through the \fBsetgrent()\fR, +\fBwinbind enum groups (G)\fR +On large installations using +winbindd(8) it may be +necessary to suppress the enumeration of groups through the +\fB setgrent()\fR, \fBgetgrent()\fR and \fBendgrent()\fR group of system calls. If the \fIwinbind enum groups\fR parameter is @@ -7084,9 +7178,9 @@ enumeration may cause some programs to behave oddly. Default: \fBwinbind enum groups = yes \fR .TP -\fB>winbind gid (G)\fR +\fBwinbind gid (G)\fR The winbind gid parameter specifies the range of group -ids that are allocated by the \fBwinbindd\fR(8) daemon. This range of group ids should have no +ids that are allocated by the winbindd(8) daemon. This range of group ids should have no existing local or NIS groups within it as strange conflicts can occur otherwise. @@ -7095,7 +7189,7 @@ Default: \fBwinbind gid = Example: \fBwinbind gid = 10000-20000\fR .TP -\fB>winbind separator (G)\fR +\fBwinbind separator (G)\fR This parameter allows an admin to define the character used when listing a username of the form of \fIDOMAIN \fR\\\fIuser\fR. This parameter @@ -7110,9 +7204,9 @@ Default: \fBwinbind separator = '\\'\fR Example: \fBwinbind separator = +\fR .TP -\fB>winbind uid (G)\fR +\fBwinbind uid (G)\fR The winbind gid parameter specifies the range of group -ids that are allocated by the \fBwinbindd\fR(8) daemon. This range of ids should have no +ids that are allocated by the winbindd(8) daemon. This range of ids should have no existing local or NIS users within it as strange conflicts can occur otherwise. @@ -7121,9 +7215,11 @@ Default: \fBwinbind uid = Example: \fBwinbind uid = 10000-20000\fR .TP -\fB>winbind use default domain (G)\fR -This parameter specifies whether the \fBwinbindd\fR(8) daemon should operate on users -without domain component in their username. +\fBwinbind use default domain\fR +.TP +\fBwinbind use default domain (G)\fR +This parameter specifies whether the winbindd(8) +daemon should operate on users without domain component in their username. Users without a domain component are treated as is part of the winbindd server's own domain. While this does not benifit Windows users, it makes SSH, FTP and e-mail function in a way much closer to the way they would in a native unix system. @@ -7133,7 +7229,7 @@ Default: \fBwinbind use default domain = Example: \fBwinbind use default domain = yes\fR .TP -\fB>wins hook (G)\fR +\fBwins hook (G)\fR When Samba is running as a WINS server this allows you to call an external program for all changes to the WINS database. The primary use for this option is to allow the @@ -7179,47 +7275,35 @@ An example script that calls the BIND dynamic DNS update program \fBnsupdate\fR is provided in the examples directory of the Samba source code. .TP -\fB>wins proxy (G)\fR +\fBwins proxy (G)\fR This is a boolean that controls if nmbd(8) will respond to broadcast name queries on behalf of other hosts. You may need to set this to yes for some older clients. Default: \fBwins proxy = no\fR .TP -\fB>wins server (G)\fR +\fBwins server (G)\fR This specifies the IP address (or DNS name: IP -address for preference) of the WINS server that \fBnmbd\fR(8) should register with. If you have a WINS server on +address for preference) of the WINS server that nmbd(8) should register with. If you have a WINS server on your network then you should set this to the WINS server's IP. You should point this at your WINS server if you have a multi-subnetted network. -If you want to work in multiple namespaces, you can -give every wins server a 'tag'. For each tag, only one -(working) server will be queried for a name. The tag should be -seperated from the ip address by a colon. -.sp -.RS -.B "Note:" -You need to set up Samba to point +\fBNOTE\fR. You need to set up Samba to point to a WINS server if you have multiple subnets and wish cross-subnet browsing to work correctly. -.RE -See the documentation file Browsing in the samba howto collection. +See the documentation file \fIBROWSING.txt\fR +in the docs/ directory of your Samba source distribution. Default: \fBnot enabled\fR -Example: \fBwins server = mary:192.9.200.1 fred:192.168.3.199 mary:192.168.2.61\fR - -For this example when querying a certain name, 192.19.200.1 will -be asked first and if that doesn't respond 192.168.2.61. If either -of those doesn't know the name 192.168.3.199 will be queried. - -Example: \fBwins server = 192.9.200.1 192.168.2.61\fR +Example: \fBwins server = 192.9.200.1\fR .TP -\fB>wins support (G)\fR -This boolean controls if the \fBnmbd\fR(8) process in Samba will act as a WINS server. You should +\fBwins support (G)\fR +This boolean controls if the +nmbd(8) process in Samba will act as a WINS server. You should not set this to yes unless you have a multi-subnetted network and you wish a particular \fBnmbd\fR to be your WINS server. Note that you should \fBNEVER\fR set this to yes @@ -7227,7 +7311,7 @@ on more than one machine in your network. Default: \fBwins support = no\fR .TP -\fB>workgroup (G)\fR +\fBworkgroup (G)\fR This controls what workgroup your server will appear to be in when queried by clients. Note that this parameter also controls the Domain name used with the \fBsecurity = domain\fR @@ -7237,10 +7321,10 @@ Default: \fBset at compile time to WORKGROUP\fR Example: \fBworkgroup = MYGROUP\fR .TP -\fB>writable (S)\fR +\fBwritable (S)\fR Synonym for \fI writeable\fR for people who can't spell :-). .TP -\fB>write cache size (S)\fR +\fBwrite cache size (S)\fR If this integer parameter is set to non-zero value, Samba will create an in-memory cache for each oplocked file (it does \fBnot\fR do this for @@ -7266,7 +7350,7 @@ Example: \fBwrite cache size = 262144\fR for a 256k cache size per file. .TP -\fB>write list (S)\fR +\fBwrite list (S)\fR This is a list of users that are given read-write access to a service. If the connecting user is in this list then they will be given write access, no matter what the \fIread only\fR @@ -7285,7 +7369,7 @@ Default: \fBwrite list = Example: \fBwrite list = admin, root, @staff \fR .TP -\fB>wins partners (G)\fR +\fBwins partners (G)\fR A space separated list of partners' IP addresses for WINS replication. WINS partners are always defined as push/pull partners as defining only one way WINS replication is unreliable. @@ -7296,17 +7380,17 @@ Default: \fBwins partners = \fR Example: \fBwins partners = 192.168.0.1 172.16.1.2\fR .TP -\fB>write ok (S)\fR +\fBwrite ok (S)\fR Inverted synonym for \fI read only\fR. .TP -\fB>write raw (G)\fR +\fBwrite raw (G)\fR This parameter controls whether or not the server will support raw write SMB's when transferring data from clients. You should never need to change this parameter. Default: \fBwrite raw = yes\fR .TP -\fB>writeable (S)\fR +\fBwriteable (S)\fR Inverted synonym for \fI read only\fR. .SH "WARNINGS" .PP @@ -7316,7 +7400,8 @@ be ignored in comparisons anyway, so it shouldn't be a problem - but be aware of the possibility. .PP On a similar note, many clients - especially DOS clients - -limit service names to eight characters. \fBsmbd\fR(8) has no such limitation, but attempts to connect from such +limit service names to eight characters. smbd(8) + has no such limitation, but attempts to connect from such clients will fail if they truncate the service names. For this reason you should probably keep your service names down to eight characters in length. @@ -7328,10 +7413,19 @@ sections. In particular, ensure that the permissions on spool directories are correct. .SH "VERSION" .PP -This man page is correct for version 3.0 of the Samba suite. +This man page is correct for version 3.0 of +the Samba suite. .SH "SEE ALSO" .PP -\fBsamba\fR(7), \fBsmbpasswd\fR(8), \fBswat\fR(8), \fBsmbd\fR(8), \fBnmbd\fR(8), \fBsmbclient\fR(1), \fBnmblookup\fR(1), \fBtestparm\fR(1), \fBtestprns\fR(1). +samba(7) +\fBsmbpasswd(8)\fR +\fBswat(8)\fR +\fBsmbd(8)\fR +\fBnmbd(8)\fR +\fBsmbclient(1)\fR +\fBnmblookup(1)\fR +\fBtestparm(1)\fR +\fBtestprns(1)\fR .SH "AUTHOR" .PP The original Samba software and related utilities @@ -7341,7 +7435,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 -for Samba 3.0 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/smbcacls.1 b/docs/manpages/smbcacls.1 index 69d9cd9f1a0..aaed1ba8f54 100644 --- a/docs/manpages/smbcacls.1 +++ b/docs/manpages/smbcacls.1 @@ -3,17 +3,16 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SMBCACLS" "1" "03 april 2003" "" "" - +.TH "SMBCACLS" "1" "04 March 2003" "" "" .SH NAME smbcacls \- Set or get ACLs on an NT file or directory names .SH SYNOPSIS -\fBsmbcacls\fR \fB//server/share\fR \fBfilename\fR [ \fB-D acls\fR ] [ \fB-M acls\fR ] [ \fB-A acls\fR ] [ \fB-S acls\fR ] [ \fB-C name\fR ] [ \fB-G name\fR ] [ \fB-n\fR ] [ \fB-t\fR ] [ \fB-U username\fR ] [ \fB-h\fR ] [ \fB-d\fR ] +\fBsmbcacls\fR \fB//server/share\fR \fBfilename\fR [ \fB-U username\fR ] [ \fB-A acls\fR ] [ \fB-M acls\fR ] [ \fB-D acls\fR ] [ \fB-S acls\fR ] [ \fB-C name\fR ] [ \fB-G name\fR ] [ \fB-n\fR ] [ \fB-h\fR ] .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP The \fBsmbcacls\fR program manipulates NT Access Control Lists (ACLs) on SMB file shares. @@ -46,7 +45,7 @@ type, owner and group for the call to succeed. Specifies a username used to connect to the specified service. The username may be of the form "username" in which case the user is prompted to enter in a password and the -workgroup specified in the \fBsmb.conf\fR(5) file is +workgroup specified in the \fIsmb.conf\fR file is used, or "username%password" or "DOMAIN\\username%password" and the password and workgroup names are used as provided. .TP @@ -71,9 +70,9 @@ This option displays all ACL information in numeric format. The default is to convert SIDs to names and ACE types and masks to a readable string format. .TP -\fB-t\fR -Don't actually do anything, only validate the correctness of -the arguments. +\fB-h\fR +Print usage information on the \fBsmbcacls +\fR program. .SH "ACL FORMAT" .PP The format of an ACL is one or more ACL entries separated by @@ -86,6 +85,7 @@ REVISION: OWNER: GROUP: ACL::// + .fi .PP The revision of the ACL specifies the internal Windows @@ -116,7 +116,7 @@ common flags are: #define SEC_ACE_FLAG_CONTAINER_INHERIT 0x2 .TP 0.2i \(bu -#define SEC_ACE_FLAG_NO_PROPAGATE_INHERIT 0x4 +#define SEC_ACE_FLAG_NO_PROPAGATE_INHERIT 0x4 .TP 0.2i \(bu #define SEC_ACE_FLAG_INHERIT_ONLY 0x8 @@ -172,7 +172,8 @@ of 1 is returned. If there was an error parsing any command line arguments, an exit status of 2 is returned. .SH "VERSION" .PP -This man page is correct for version 3.0 of the Samba suite. +This man page is correct for version 2.2 of +the Samba suite. .SH "AUTHOR" .PP The original Samba software and related utilities @@ -184,5 +185,4 @@ to the way the Linux kernel is developed. and Tim Potter. .PP The conversion to DocBook for Samba 2.2 was done -by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 was done -by Alexander Bokovoy. +by Gerald Carter diff --git a/docs/manpages/smbclient.1 b/docs/manpages/smbclient.1 index 72747a74c21..e5785acaf53 100644 --- a/docs/manpages/smbclient.1 +++ b/docs/manpages/smbclient.1 @@ -3,21 +3,20 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SMBCLIENT" "1" "03 april 2003" "" "" - +.TH "SMBCLIENT" "1" "04 March 2003" "" "" .SH NAME smbclient \- ftp-like client to access SMB/CIFS resources on servers .SH SYNOPSIS -\fBsmbclient\fR \fBservicename\fR [ \fBpassword\fR ] [ \fB-b \fR ] [ \fB-d debuglevel\fR ] [ \fB-D Directory\fR ] [ \fB-U username\fR ] [ \fB-W workgroup\fR ] [ \fB-M \fR ] [ \fB-m maxprotocol\fR ] [ \fB-A authfile\fR ] [ \fB-N\fR ] [ \fB-l logfile\fR ] [ \fB-L \fR ] [ \fB-I destinationIP\fR ] [ \fB-E\fR ] [ \fB-c \fR ] [ \fB-i scope\fR ] [ \fB-O \fR ] [ \fB-p port\fR ] [ \fB-R \fR ] [ \fB-s \fR ] [ \fB-TIXFqgbNan\fR ] [ \fB-k\fR ] +\fBsmbclient\fR \fBservicename\fR [ \fBpassword\fR ] [ \fB-b \fR ] [ \fB-d debuglevel\fR ] [ \fB-D Directory\fR ] [ \fB-U username\fR ] [ \fB-W workgroup\fR ] [ \fB-M \fR ] [ \fB-m maxprotocol\fR ] [ \fB-A authfile\fR ] [ \fB-N\fR ] [ \fB-l logfile\fR ] [ \fB-L \fR ] [ \fB-I destinationIP\fR ] [ \fB-E\fR ] [ \fB-c \fR ] [ \fB-i scope\fR ] [ \fB-O \fR ] [ \fB-p port\fR ] [ \fB-R \fR ] [ \fB-s \fR ] [ \fB-TIXFqgbNan\fR ] .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP \fBsmbclient\fR is a client that can \&'talk' to an SMB/CIFS server. It offers an interface -similar to that of the ftp program (see \fBftp\fR(1)). +similar to that of the ftp program (see \fBftp(1)\fR). Operations include things like getting files from the server to the local machine, putting files from the local machine to the server, retrieving directory information from the server @@ -42,8 +41,7 @@ same as the IP hostname of the machine running the server. The server name is looked up according to either the \fI-R\fR parameter to \fBsmbclient\fR or -using the name resolve order parameter in -the \fBsmb.conf\fR(5) file, +using the name resolve order parameter in the \fIsmb.conf\fR file, allowing an administrator to change the order and methods by which server names are looked up. .TP @@ -67,6 +65,15 @@ or mixed case passwords may be rejected by these servers. Be cautious about including passwords in scripts. .TP +\fB-s smb.conf\fR +Specifies the location of the all important +\fIsmb.conf\fR file. +.TP +\fB-O socket options\fR +TCP socket options to set on the client +socket. See the socket options parameter in the \fI smb.conf (5)\fR manpage for the list of valid +options. +.TP \fB-R \fR This option is used by the programs in the Samba suite to determine what naming services and in what order to resolve @@ -74,18 +81,17 @@ host names to IP addresses. The option takes a space-separated string of different name resolution options. The options are :"lmhosts", "host", "wins" and "bcast". They -cause names to be resolved as follows: +cause names to be resolved as follows : .RS .TP 0.2i \(bu -lmhosts: Lookup an IP +lmhosts : Lookup an IP address in the Samba lmhosts file. If the line in lmhosts has -no name type attached to the NetBIOS name (see -the \fBlmhosts\fR(5) for details) then +no name type attached to the NetBIOS name (see the lmhosts(5) for details) then any name type matches for lookup. .TP 0.2i \(bu -host: Do a standard host +host : Do a standard host name to IP address resolution, using the system \fI/etc/hosts \fR, NIS, or DNS lookups. This method of name resolution is operating system dependent, for instance on IRIX or Solaris this @@ -95,13 +101,13 @@ type being queried is the 0x20 (server) name type, otherwise it is ignored. .TP 0.2i \(bu -wins: Query a name with +wins : Query a name with the IP address listed in the \fIwins server\fR parameter. If no WINS server has been specified this method will be ignored. .TP 0.2i \(bu -bcast: Do a broadcast on +bcast : Do a broadcast on each of the known local interfaces listed in the \fIinterfaces\fR parameter. This is the least reliable of the name resolution @@ -110,12 +116,12 @@ connected subnet. .RE If this parameter is not set then the name resolve order -defined in the \fBsmb.conf\fR(5) file parameter +defined in the \fIsmb.conf\fR file parameter (name resolve order) will be used. The default order is lmhosts, host, wins, bcast and without this parameter or any entry in the \fIname resolve order -\fR parameter of the \fBsmb.conf\fR(5) file the name resolution +\fR parameter of the \fIsmb.conf\fR file the name resolution methods will be attempted in this order. .TP \fB-M NetBIOS name\fR @@ -141,13 +147,64 @@ You may also find the \fI-U\fR and \fI-I\fR options useful, as they allow you to control the FROM and TO parts of the message. -See the \fImessage command\fR parameter in the \fBsmb.conf\fR(5) for a description of how to handle incoming +See the message command parameter in the \fI smb.conf(5)\fR for a description of how to handle incoming WinPopup messages in Samba. \fBNote\fR: Copy WinPopup into the startup group on your WfWg PCs if you want them to always be able to receive messages. .TP +\fB-i scope\fR +This specifies a NetBIOS scope that smbclient will +use to communicate with when generating NetBIOS names. For details +on the use of NetBIOS scopes, see \fIrfc1001.txt\fR +and \fIrfc1002.txt\fR. +NetBIOS scopes are \fBvery\fR rarely used, only set +this parameter if you are the system administrator in charge of all +the NetBIOS systems you communicate with. +.TP +\fB-N\fR +If specified, this parameter suppresses the normal +password prompt from the client to the user. This is useful when +accessing a service that does not require a password. + +Unless a password is specified on the command line or +this parameter is specified, the client will request a +password. +.TP +\fB-n NetBIOS name\fR +By default, the client will use the local +machine's hostname (in uppercase) as its NetBIOS name. This parameter +allows you to override the host name and use whatever NetBIOS +name you wish. +.TP +\fB-d debuglevel\fR +\fIdebuglevel\fR is an integer from 0 to 10, or +the letter 'A'. + +The default value if this parameter is not specified +is zero. + +The higher this value, the more detail will be logged to +the log files about the activities of the +client. At level 0, only critical errors and serious warnings will +be logged. Level 1 is a reasonable level for day to day running - +it generates a small amount of information about operations +carried out. + +Levels above 1 will generate considerable amounts of log +data, and should only be used when investigating a problem. +Levels above 3 are designed for use only by developers and +generate HUGE amounts of log data, most of which is extremely +cryptic. If \fIdebuglevel\fR is set to the letter 'A', then \fBall +\fR debug messages will be printed. This setting +is for developers only (and people who \fBreally\fR want +to know how the code works internally). + +Note that specifying this parameter here will override +the log level parameter in the \fIsmb.conf (5)\fR +file. +.TP \fB-p port\fR This number is the TCP port number that will be used when making connections to the server. The standard (well-known) @@ -167,8 +224,8 @@ would be \fIlog.client\fR. The log file generated is never removed by the client. .TP -\fB-h|--help\fR -Print a summary of command line options. +\fB-h\fR +Print the usage message for the client. .TP \fB-I IP-address\fR \fIIP address\fR is the address of the server to connect to. @@ -194,6 +251,53 @@ output stream. By default, the client writes messages to standard output - typically the user's tty. .TP +\fB-U username[%pass]\fR +Sets the SMB username or username and password. +If %pass is not specified, The user will be prompted. The client +will first check the \fBUSER\fR environment variable, then the +\fBLOGNAME\fR variable and if either exists, the +string is uppercased. Anything in these variables following a '%' +sign will be treated as the password. If these environment +variables are not found, the username GUEST +is used. + +If the password is not included in these environment +variables (using the %pass syntax), \fBsmbclient\fR will look for +a \fBPASSWD\fR environment variable from which +to read the password. + +A third option is to use a credentials file which +contains the plaintext of the domain name, username and password. This +option is mainly provided for scripts where the admin doesn't +wish to pass the credentials on the command line or via environment +variables. If this method is used, make certain that the permissions +on the file restrict access from unwanted users. See the +\fI-A\fR for more details. + +Be cautious about including passwords in scripts or in +the \fBPASSWD\fR environment variable. Also, on +many systems the command line of a running process may be seen +via the \fBps\fR command to be safe always allow +\fBsmbclient\fR to prompt for a password and type +it in directly. +.TP +\fB-A filename\fR +This option allows +you to specify a file from which to read the username, domain name, and +password used in the connection. The format of the file is + + +.nf +username = +password = +domain = + +.fi + +If the domain parameter is missing the current workgroup name +is used instead. Make certain that the permissions on the file restrict +access from unwanted users. +.TP \fB-L\fR This option allows you to look at what services are available on a server. You use it as \fBsmbclient -L @@ -221,127 +325,11 @@ size when getting or putting a file from/to the server. The default is 65520 bytes. Setting this value smaller (to 1200 bytes) has been observed to speed up file transfers to and from a Win9x server. .TP -\fB-V\fR -Prints the version number for -\fBsmbd\fR. -.TP -\fB-s \fR -The file specified contains the -configuration details required by the server. The -information in this file includes server-specific -information such as what printcap file to use, as well -as descriptions of all the services that the server is -to provide. See \fIsmb.conf(5)\fR for more information. -The default configuration file name is determined at -compile time. -.TP -\fB-d|--debug=debuglevel\fR -\fIdebuglevel\fR is an integer -from 0 to 10. The default value if this parameter is -not specified is zero. - -The higher this value, the more detail will be -logged to the log files about the activities of the -server. At level 0, only critical errors and serious -warnings will be logged. Level 1 is a reasonable level for -day to day running - it generates a small amount of -information about operations carried out. - -Levels above 1 will generate considerable -amounts of log data, and should only be used when -investigating a problem. Levels above 3 are designed for -use only by developers and generate HUGE amounts of log -data, most of which is extremely cryptic. - -Note that specifying this parameter here will -override the log -level file. -.TP -\fB-l|--logfile=logbasename\fR -File name for log/debug files. The extension -".client" will be appended. The log file is -never removed by the client. -.TP -\fB-N\fR -If specified, this parameter suppresses the normal -password prompt from the client to the user. This is useful when -accessing a service that does not require a password. - -Unless a password is specified on the command line or -this parameter is specified, the client will request a -password. -.TP -\fB-k\fR -Try to authenticate with kerberos. Only useful in -an Active Directory environment. -.TP -\fB-A|--authfile=filename\fR -This option allows -you to specify a file from which to read the username and -password used in the connection. The format of the file is - - -.nf -username = -password = -domain = -.fi - -Make certain that the permissions on the file restrict -access from unwanted users. -.TP -\fB-U|--user=username[%password]\fR -Sets the SMB username or username and password. - -If %password is not specified, the user will be prompted. The -client will first check the \fBUSER\fR environment variable, then the -\fBLOGNAME\fR variable and if either exists, the -string is uppercased. If these environmental variables are not -found, the username GUEST is used. - -A third option is to use a credentials file which -contains the plaintext of the username and password. This -option is mainly provided for scripts where the admin does not -wish to pass the credentials on the command line or via environment -variables. If this method is used, make certain that the permissions -on the file restrict access from unwanted users. See the -\fI-A\fR for more details. - -Be cautious about including passwords in scripts. Also, on -many systems the command line of a running process may be seen -via the \fBps\fR command. To be safe always allow -\fBrpcclient\fR to prompt for a password and type -it in directly. -.TP -\fB-n \fR -This option allows you to override -the NetBIOS name that Samba uses for itself. This is identical -to setting the \fINetBIOS -name\fR parameter in the \fBsmb.conf\fR(5) file. However, a command -line setting will take precedence over settings in -\fBsmb.conf\fR(5). -.TP -\fB-i \fR -This specifies a NetBIOS scope that -\fBnmblookup\fR will use to communicate with when -generating NetBIOS names. For details on the use of NetBIOS -scopes, see rfc1001.txt and rfc1002.txt. NetBIOS scopes are -\fBvery\fR rarely used, only set this parameter -if you are the system administrator in charge of all the -NetBIOS systems you communicate with. -.TP -\fB-W|--workgroup=domain\fR -Set the SMB domain of the username. This -overrides the default domain which is the domain defined in -smb.conf. If the domain specified is the same as the servers -NetBIOS name, it causes the client to log on using the servers local -SAM (as opposed to the Domain SAM). -.TP -\fB-O socket options\fR -TCP socket options to set on the client -socket. See the socket options parameter in -the \fBsmb.conf\fR(5) manual page for the list of valid -options. +\fB-W WORKGROUP\fR +Override the default workgroup (domain) specified +in the workgroup parameter of the \fIsmb.conf\fR +file for this connection. This may be needed to connect to some +servers. .TP \fB-T tar options\fR smbclient may be used to create \fBtar(1) @@ -425,7 +413,7 @@ files in the archive with relative names, not absolute names. \fBTar Filenames\fR -All file names can be given as DOS path names (with '\\\\' +All file names can be given as DOS path names (with '\\' as the component separator) or as UNIX path names (with '/' as the component separator). @@ -476,7 +464,7 @@ a prompt : .PP smb:\\> .PP -The backslash ("\\\\") indicates the current working directory +The backslash ("\\") indicates the current working directory on the server, and will change if the current working directory is changed. .PP @@ -778,7 +766,8 @@ The client log files should be put in a directory readable and writeable only by the user. .PP To test the client, you will need to know the name of a -running SMB/CIFS server. It is possible to run \fBsmbd\fR(8) as an ordinary user - running that server as a daemon +running SMB/CIFS server. It is possible to run \fBsmbd(8) +\fR as an ordinary user - running that server as a daemon on a user-accessible port (typically any port number over 1024) would provide a suitable test server. .SH "DIAGNOSTICS" @@ -792,7 +781,8 @@ on the debug level used by the client. If you have problems, set the debug level to 3 and peruse the log files. .SH "VERSION" .PP -This man page is correct for version 2.2 of the Samba suite. +This man page is correct for version 2.2 of +the Samba suite. .SH "AUTHOR" .PP The original Samba software and related utilities @@ -802,7 +792,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 -was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/smbcontrol.1 b/docs/manpages/smbcontrol.1 index 5b612b1b134..d69e0978a4b 100644 --- a/docs/manpages/smbcontrol.1 +++ b/docs/manpages/smbcontrol.1 @@ -3,38 +3,27 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SMBCONTROL" "1" "03 april 2003" "" "" - +.TH "SMBCONTROL" "1" "04 March 2003" "" "" .SH NAME smbcontrol \- send messages to smbd, nmbd or winbindd processes .SH SYNOPSIS -\fBsmbcontrol\fR [ \fB-i\fR ] [ \fB-s\fR ] +\fBsmbcontrol\fR [ \fB-i\fR ] \fBsmbcontrol\fR [ \fBdestination\fR ] [ \fBmessage-type\fR ] [ \fBparameter\fR ] .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP \fBsmbcontrol\fR is a very small program, which -sends messages to a \fBsmbd\fR(8), a \fBnmbd\fR(8), or a \fBwinbindd\fR(8) daemon running on the system. +sends messages to an smbd(8) +an nmbd(8) +or a winbindd(8) +daemon running on the system. .SH "OPTIONS" .TP -\fB-h|--help\fR -Print a summary of command line options. -.TP -\fB-s \fR -The file specified contains the -configuration details required by the server. The -information in this file includes server-specific -information such as what printcap file to use, as well -as descriptions of all the services that the server is -to provide. See \fIsmb.conf(5)\fR for more information. -The default configuration file name is determined at -compile time. -.TP \fB-i\fR Run interactively. Individual commands of the form destination message-type parameters can be entered @@ -42,7 +31,8 @@ on STDIN. An empty command line or a "q" will quit the program. .TP \fBdestination\fR -One of \fInmbd\fR, \fIsmbd\fR or a process ID. +One of \fInmbd\fR +\fIsmbd\fR or a process ID. The \fIsmbd\fR destination causes the message to "broadcast" to all smbd daemons. @@ -55,56 +45,57 @@ If a single process ID is given, the message is sent to only that process. .TP \fBmessage-type\fR -Type of message to send. See -the section MESSAGE-TYPES for details. -.TP -\fBparameters\fR -any parameters required for the message-type -.SH "MESSAGE-TYPES" -.PP -Available message types are: -.TP -\fBclose-share\fR -Order smbd to close the client -connections to the named share. Note that this doesn't affect client -connections to any other shares. This message-type takes an argument of the +One of: close-share, +debug, +force-election, ping +, profile, debuglevel, profilelevel, +or printnotify. + +The close-share message-type sends a +message to smbd which will then close the client connections to +the named share. Note that this doesn't affect client connections +to any other shares. This message-type takes an argument of the share name for which client connections will be closed, or the "*" character which will close all currently open shares. This may be useful if you made changes to the access controls on the share. This message can only be sent to smbd. -.TP -\fBdebug\fR -Set debug level to the value specified by the + +The debug message-type allows +the debug level to be set to the value specified by the parameter. This can be sent to any of the destinations. -.TP -\fBforce-election\fR -This message causes the \fBnmbd\fR daemon to -force a new browse master election. -.TP -\fBping\fR -Send specified number of "ping" messages and -wait for the same number of reply "pong" messages. This can be sent to + +The force-election message-type can only be +sent to the nmbd destination. This message +causes the \fBnmbd\fR daemon to force a new browse +master election. + +The ping message-type sends the +number of "ping" messages specified by the parameter and waits +for the same number of reply "pong" messages. This can be sent to any of the destinations. -.TP -\fBprofile\fR -Change profile settings of a daemon, based on the + +The profile message-type sends a +message to an smbd to change the profile settings based on the parameter. The parameter can be "on" to turn on profile stats collection, "off" to turn off profile stats collection, "count" to enable only collection of count stats (time stats are disabled), and "flush" to zero the current profile stats. This can be sent to any smbd or nmbd destinations. -.TP -\fBdebuglevel\fR -Request debuglevel of a certain daemon and write it to stdout. This -can be sent to any of the destinations. -.TP -\fBprofilelevel\fR -Request profilelevel of a certain daemon and write it to stdout. -This can be sent to any smbd or nmbd destinations. -.TP -\fBprintnotify\fR -Order smbd to send a printer notify message to any Windows NT clients -connected to a printer. This message-type takes the following arguments: + +The debuglevel message-type sends +a "request debug level" message. The current debug level setting +is returned by a "debuglevel" message. This can be +sent to any of the destinations. + +The profilelevel message-type sends +a "request profile level" message. The current profile level +setting is returned by a "profilelevel" message. This can be sent +to any smbd or nmbd destinations. + +The printnotify message-type sends a +message to smbd which in turn sends a printer notify message to +any Windows NT clients connected to a printer. This message-type +takes the following arguments: .RS .TP \fBqueuepause printername\fR @@ -130,50 +121,21 @@ Send a job delete change notify message for the printer and unix jobid specified. .RE - Note that this message only sends notification that an event has occured. It doesn't actually cause the event to happen. - This message can only be sent to smbd. .TP -\fBsamsync\fR -Order smbd to synchronise sam database from PDC (being BDC). Can only be sent to smbd. -.sp -.RS -.B "Note:" -Not working at the moment -.RE -.TP -\fBsamrepl\fR -Send sam replication message, with specified serial. Can only be sent to smbd. Should not be used manually. -.TP -\fBdmalloc-mark\fR -Set a mark for dmalloc. Can be sent to both smbd and nmbd. Only available if samba is built with dmalloc support. -.TP -\fBdmalloc-log-changed\fR -Dump the pointers that have changed since the mark set by dmalloc-mark. -Can be sent to both smbd and nmbd. Only available if samba is built with dmalloc support. -.TP -\fBshutdown\fR -Shut down specified daemon. Can be sent to both smbd and nmbd. -.TP -\fBtallocdump and pool-usage\fR -Print a human-readable description of all -talloc(pool) memory usage by the specified daemon/process. Available -for both smbd and nmbd. -.TP -\fBdrvupgrade\fR -Force clients of printers using specified driver -to update their local version of the driver. Can only be -sent to smbd. +\fBparameters\fR +any parameters required for the message-type .SH "VERSION" .PP -This man page is correct for version 3.0 of +This man page is correct for version 2.2 of the Samba suite. .SH "SEE ALSO" .PP -\fBnmbd\fR(8) and \fBsmbd\fR(8). +\fBnmbd(8)\fR +and \fBsmbd(8)\fR .SH "AUTHOR" .PP The original Samba software and related utilities @@ -183,7 +145,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for -Samba 3.0 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/smbd.8 b/docs/manpages/smbd.8 index 4f99c18f52e..106c0a98e39 100644 --- a/docs/manpages/smbd.8 +++ b/docs/manpages/smbd.8 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SMBD" "8" "03 april 2003" "" "" - +.TH "SMBD" "8" "04 March 2003" "" "" .SH NAME smbd \- server to provide SMB/CIFS services to clients .SH SYNOPSIS @@ -13,7 +12,7 @@ smbd \- server to provide SMB/CIFS services to clients .SH "DESCRIPTION" .PP -This program is part of the \fBSamba\fR(7) suite. +This program is part of the Samba suite. .PP \fBsmbd\fR is the server daemon that provides filesharing and printing services to Windows clients. @@ -27,12 +26,14 @@ OS/2, DAVE for Macintosh, and smbfs for Linux. An extensive description of the services that the server can provide is given in the man page for the configuration file controlling the attributes of those -services (see \fBsmb.conf\fR(5). This man page will not describe the +services (see \fIsmb.conf(5) +\fR This man page will not describe the services, but will concentrate on the administrative aspects of running the server. .PP Please note that there are significant security -implications to running this server, and the \fBsmb.conf\fR(5) manual page should be regarded as mandatory reading before +implications to running this server, and the \fIsmb.conf(5)\fR +manpage should be regarded as mandatory reading before proceeding with installation. .PP A session is created whenever a client requests one. @@ -85,21 +86,19 @@ command line. \fBsmbd\fR also logs to standard output, as if the \fB-S\fR parameter had been given. .TP +\fB-h\fR +Prints the help information (usage) +for \fBsmbd\fR. +.TP \fB-V\fR Prints the version number for \fBsmbd\fR. .TP -\fB-s \fR -The file specified contains the -configuration details required by the server. The -information in this file includes server-specific -information such as what printcap file to use, as well -as descriptions of all the services that the server is -to provide. See \fIsmb.conf(5)\fR for more information. -The default configuration file name is determined at -compile time. +\fB-b\fR +Prints information about how +Samba was built. .TP -\fB-d|--debug=debuglevel\fR +\fB-d \fR \fIdebuglevel\fR is an integer from 0 to 10. The default value if this parameter is not specified is zero. @@ -121,18 +120,6 @@ Note that specifying this parameter here will override the log level file. .TP -\fB-l|--logfile=logbasename\fR -File name for log/debug files. The extension -".client" will be appended. The log file is -never removed by the client. -.TP -\fB-h|--help\fR -Print a summary of command line options. -.TP -\fB-b\fR -Prints information about how -Samba was built. -.TP \fB-l \fR If specified, \fIlog directory\fR @@ -140,14 +127,19 @@ specifies a log directory into which the "log.smbd" log file will be created for informational and debug messages from the running server. The log file generated is never removed by the server although -its size may be controlled by the \fImax log size\fR -option in the \fBsmb.conf\fR(5) file. \fBBeware:\fR +its size may be controlled by the max log size +option in the \fI smb.conf(5)\fR file. \fBBeware:\fR If the directory specified does not exist, \fBsmbd\fR will log to the default debug log location defined at compile time. The default log directory is specified at compile time. .TP +\fB-O \fR +See the socket options +parameter in the \fIsmb.conf(5) +\fR file for details. +.TP \fB-p \fR \fIport number\fR is a positive integer value. The default value if this parameter is not @@ -170,13 +162,23 @@ section 4.3.5. This parameter is not normally specified except in the above situation. +.TP +\fB-s \fR +The file specified contains the +configuration details required by the server. The +information in this file includes server-specific +information such as what printcap file to use, as well +as descriptions of all the services that the server is +to provide. See \fI smb.conf(5)\fR for more information. +The default configuration file name is determined at +compile time. .SH "FILES" .TP \fB\fI/etc/inetd.conf\fB\fR If the server is to be run by the \fBinetd\fR meta-daemon, this file must contain suitable startup information for the -meta-daemon. See the "How to Install and Test SAMBA" +meta-daemon. See the UNIX_INSTALL.html document for details. .TP \fB\fI/etc/rc\fB\fR @@ -185,7 +187,7 @@ system uses). If running the server as a daemon at startup, this file will need to contain an appropriate startup -sequence for the server. See the "How to Install and Test SAMBA" +sequence for the server. See the UNIX_INSTALL.html document for details. .TP \fB\fI/etc/services\fB\fR @@ -193,16 +195,18 @@ If running the server via the meta-daemon \fBinetd\fR, this file must contain a mapping of service name (e.g., netbios-ssn) to service port (e.g., 139) and protocol type (e.g., tcp). -See the "How to Install and Test SAMBA" +See the UNIX_INSTALL.html document for details. .TP \fB\fI/usr/local/samba/lib/smb.conf\fB\fR -This is the default location of the \fBsmb.conf\fR(5) server configuration file. Other common places that systems +This is the default location of the +\fIsmb.conf\fR +server configuration file. Other common places that systems install this file are \fI/usr/samba/lib/smb.conf\fR -and \fI/etc/samba/smb.conf\fR. +and \fI/etc/smb.conf\fR. This file describes all the services the server -is to make available to clients. See \fBsmb.conf\fR(5) for more information. +is to make available to clients. See \fIsmb.conf(5)\fR for more information. .SH "LIMITATIONS" .PP On some systems \fBsmbd\fR cannot change uid back @@ -225,8 +229,9 @@ is not specific to the server, however. Samba uses PAM for authentication (when presented with a plaintext password), for account checking (is this account disabled?) and for session management. The degree too which samba supports PAM is restricted -by the limitations of the SMB protocol and the \fIobey -pam restricions\fR \fBsmb.conf\fR(5) paramater. When this is set, the following restrictions apply: +by the limitations of the SMB protocol and the +obey pam restricions +smb.conf paramater. When this is set, the following restrictions apply: .TP 0.2i \(bu \fBAccount Validation\fR: All accesses to a @@ -274,8 +279,9 @@ an \fBsmbd\fR is to send it a SIGTERM (-15) signal and wait for it to die on its own. .PP The debug log level of \fBsmbd\fR may be raised -or lowered using \fBsmbcontrol\fR(1) program (SIGUSR[1|2] signals are no longer -used since Samba 2.2). This is to allow transient problems to be diagnosed, +or lowered using \fBsmbcontrol(1) +\fR program (SIGUSR[1|2] signals are no longer used in +Samba 2.2). This is to allow transient problems to be diagnosed, whilst still running at a normally low log level. .PP Note that as the signal handlers send a debug write, @@ -286,8 +292,12 @@ by un-blocking the signals before the select call and re-blocking them after, however this would affect performance. .SH "SEE ALSO" .PP -\fBhosts_access\fR(5), \fBinetd\fR(8), \fBnmbd\fR(8), \fBsmb.conf\fR(5), \fBsmbclient\fR(1), \fBtestparm\fR(1), \fBtestprns\fR(1), and the -Internet RFC's \fIrfc1001.txt\fR, \fIrfc1002.txt\fR. +hosts_access(5), \fBinetd(8)\fR, +\fBnmbd(8)\fR +\fIsmb.conf(5)\fR + \fBsmbclient(1) +\fR and the Internet RFC's +\fIrfc1001.txt\fR, \fIrfc1002.txt\fR. In addition the CIFS (formerly SMB) specification is available as a link from the Web page http://samba.org/cifs/ . @@ -300,7 +310,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for -Samba 3.0 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/smbgroupedit.8 b/docs/manpages/smbgroupedit.8 index 6b9bd7e37d2..41b48727987 100644 --- a/docs/manpages/smbgroupedit.8 +++ b/docs/manpages/smbgroupedit.8 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SMBGROUPEDIT" "8" "03 april 2003" "" "" - +.TH "SMBGROUPEDIT" "8" "04 March 2003" "" "" .SH NAME smbgroupedit \- Query/set/change UNIX - Windows NT group mapping .SH SYNOPSIS @@ -13,7 +12,8 @@ smbgroupedit \- Query/set/change UNIX - Windows NT group mapping .SH "DESCRIPTION" .PP -This program is part of the \fBSamba\fR(7) suite. +This program is part of the Samba +suite. .PP The smbgroupedit command allows for mapping unix groups to NT Builtin, Domain, or Local groups. Also @@ -39,7 +39,8 @@ give a long listing, of the format: Privilege : .fi -For example: +For examples, + .nf Users @@ -58,7 +59,8 @@ display a short listing of the format: NTGroupName(SID) -> UnixGroupName .fi -For example: +For example, + .nf Users (S-1-5-32-545) -> -1 @@ -92,7 +94,8 @@ map this domadm group to the 'domain admins' group: .RS .TP 3 1. -Get the SID for the Windows NT "Domain Admins" group: +Get the SID for the Windows NT "Domain Admins" +group: .nf @@ -104,6 +107,7 @@ Domain Admins (S-1-5-21-1108995562-3116817432-1375597819-512) -> -1 map the unix domadm group to the Windows NT "Domain Admins" group, by running the command: + .nf root# \fBsmbgroupedit \\ -c S-1-5-21-1108995562-3116817432-1375597819-512 \\ @@ -115,6 +119,7 @@ Domain Admins SID (the S-1-5-21-...-512) is different for every PDC. .RE .PP To verify that your mapping has taken effect: +.PP .nf root# \fBsmbgroupedit -vs|grep "Domain Admins"\fR @@ -124,6 +129,7 @@ Domain Admins (S-1-5-21-1108995562-3116817432-1375597819-512) -> domadm To give access to a certain directory on a domain member machine (an NT/W2K or a samba server running winbind) to some users who are member of a group on your samba PDC, flag that group as a domain group: +.PP .nf root# \fBsmbgroupedit -a unixgroup -td\fR @@ -134,7 +140,7 @@ This man page is correct for the 3.0alpha releases of the Samba suite. .SH "SEE ALSO" .PP -\fBsmb.conf\fR(5) +smb.conf(5) .SH "AUTHOR" .PP The original Samba software and related utilities @@ -144,5 +150,4 @@ to the way the Linux kernel is developed. .PP \fBsmbgroupedit\fR was written by Jean Francois Micouleau. The current set of manpages and documentation is maintained -by the Samba Team in the same fashion as the Samba source code. The conversion -to DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy. +by the Samba Team in the same fashion as the Samba source code. diff --git a/docs/manpages/smbmnt.8 b/docs/manpages/smbmnt.8 index 5c9a6628638..e8e8562a127 100644 --- a/docs/manpages/smbmnt.8 +++ b/docs/manpages/smbmnt.8 @@ -3,13 +3,12 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SMBMNT" "8" "03 april 2003" "" "" - +.TH "SMBMNT" "8" "04 March 2003" "" "" .SH NAME smbmnt \- helper utility for mounting SMB filesystems .SH SYNOPSIS -\fBsmbmnt\fR \fBmount-point\fR [ \fB-s \fR ] [ \fB-r\fR ] [ \fB-u \fR ] [ \fB-g \fR ] [ \fB-f \fR ] [ \fB-d \fR ] [ \fB-o \fR ] [ \fB-h\fR ] +\fBsmbmnt\fR \fBmount-point\fR [ \fB-s \fR ] [ \fB-r\fR ] [ \fB-u \fR ] [ \fB-g \fR ] [ \fB-f \fR ] [ \fB-d \fR ] [ \fB-o \fR ] .SH "DESCRIPTION" .PP @@ -22,7 +21,8 @@ A setuid smbmnt will only allow mounts on directories owned by the user, and that the user has write permission on. .PP The \fBsmbmnt\fR program is normally invoked -by \fBsmbmount\fR(8). It should not be invoked directly by users. +by \fBsmbmount(8)\fR + It should not be invoked directly by users. .PP smbmount searches the normal PATH for smbmnt. You must ensure that the smbmnt version in your path matches the smbmount used. @@ -49,9 +49,6 @@ applied \fB-o options\fR list of options that are passed as-is to smbfs, if this command is run on a 2.4 or higher Linux kernel. -.TP -\fB-h|--help\fR -Print a summary of command line options. .SH "AUTHOR" .PP Volker Lendecke, Andrew Tridgell, Michael H. Warfield @@ -64,5 +61,4 @@ The SAMBA Mailing list is the preferred place to ask questions regarding these programs. .PP The conversion of this manpage for Samba 2.2 was performed -by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 -was done by Alexander Bokovoy. +by Gerald Carter diff --git a/docs/manpages/smbmount.8 b/docs/manpages/smbmount.8 index 207ec836d6d..8d7dfd8d226 100644 --- a/docs/manpages/smbmount.8 +++ b/docs/manpages/smbmount.8 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SMBMOUNT" "8" "03 april 2003" "" "" - +.TH "SMBMOUNT" "8" "04 March 2003" "" "" .SH NAME smbmount \- mount an smbfs filesystem .SH SYNOPSIS @@ -15,7 +14,7 @@ smbmount \- mount an smbfs filesystem .PP \fBsmbmount\fR mounts a Linux SMB filesystem. It is usually invoked as \fBmount.smbfs\fR by -the \fBmount\fR(8) command when using the +the \fBmount(8)\fR command when using the "-t smbfs" option. This command only works in Linux, and the kernel must support the smbfs filesystem. .PP @@ -28,10 +27,11 @@ unknown options. \fBsmbmount\fR is a daemon. After mounting it keeps running until the mounted smbfs is umounted. It will log things that happen when in daemon mode using the "machine name" smbmount, so -typically this output will end up in \fIlog.smbmount\fR. The \fB smbmount\fR process may also be called mount.smbfs. +typically this output will end up in \fIlog.smbmount\fR. The +\fBsmbmount\fR process may also be called mount.smbfs. .PP \fBNOTE:\fR \fBsmbmount\fR -calls \fBsmbmnt\fR(8) to do the actual mount. You +calls \fBsmbmnt(8)\fR to do the actual mount. You must make sure that \fBsmbmnt\fR is in the path so that it can be found. .SH "OPTIONS" @@ -58,21 +58,20 @@ in the PASSWD environment variable or a credentials file (see below) will be read correctly. .TP \fBcredentials=\fR -specifies a file that contains a username and/or password. -The format of the file is: +specifies a file that contains a username +and/or password. The format of the file is: + .nf -username = -password = + username = + password = + .fi This is preferred over having passwords in plaintext in a shared file, such as \fI/etc/fstab\fR. Be sure to protect any credentials file properly. .TP -\fBkrb\fR -Use kerberos (Active Directory). -.TP \fBnetbiosname=\fR sets the source NetBIOS name. It defaults to the local hostname. @@ -98,30 +97,31 @@ permissions that remote files have in the local filesystem. The default is based on the current umask. .TP \fBdmask=\fR -Sets the directory mask. This determines the +sets the directory mask. This determines the permissions that remote directories have in the local filesystem. The default is based on the current umask. .TP \fBdebug=\fR -Sets the debug level. This is useful for +sets the debug level. This is useful for tracking down SMB connection problems. A suggested value to start with is 4. If set too high there will be a lot of output, possibly hiding the useful output. .TP \fBip=\fR -Sets the destination host or IP address. +sets the destination host or IP address. .TP \fBworkgroup=\fR -Sets the workgroup on the destination +sets the workgroup on the destination .TP \fBsockopt=\fR -Sets the TCP socket options. See the \fBsmb.conf\fR(5) \fIsocket options\fR option. +sets the TCP socket options. See the \fIsmb.conf +\fR \fIsocket options\fR option. .TP \fBscope=\fR -Sets the NetBIOS scope +sets the NetBIOS scope .TP \fBguest\fR -Don't prompt for a password +don't prompt for a password .TP \fBro\fR mount read-only @@ -196,8 +196,10 @@ source tree may contain additional options and information. .PP FreeBSD also has a smbfs, but it is not related to smbmount .PP -For Solaris, HP-UX and others you may want to look at \fBsmbsh\fR(1) or at other solutions, such as -Sharity or perhaps replacing the SMB server with a NFS server. +For Solaris, HP-UX and others you may want to look at +\fBsmbsh(1)\fR or at other +solutions, such as sharity or perhaps replacing the SMB server with +a NFS server. .SH "AUTHOR" .PP Volker Lendecke, Andrew Tridgell, Michael H. Warfield @@ -210,5 +212,4 @@ The SAMBA Mailing list is the preferred place to ask questions regarding these programs. .PP The conversion of this manpage for Samba 2.2 was performed -by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 -was done by Alexander Bokovoy. +by Gerald Carter diff --git a/docs/manpages/smbpasswd.5 b/docs/manpages/smbpasswd.5 index 1eb8d3f2041..07b04530c31 100644 --- a/docs/manpages/smbpasswd.5 +++ b/docs/manpages/smbpasswd.5 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SMBPASSWD" "5" "03 april 2003" "" "" - +.TH "SMBPASSWD" "5" "04 March 2003" "" "" .SH NAME smbpasswd \- The Samba encrypted password file .SH SYNOPSIS @@ -12,7 +11,7 @@ smbpasswd \- The Samba encrypted password file \fIsmbpasswd\fR .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP smbpasswd is the Samba encrypted password file. It contains the username, Unix user id and the SMB hashed passwords of the @@ -96,7 +95,7 @@ This section contains flags that describe the attributes of the users account. In the Samba 2.2 release this field is bracketed by '[' and ']' characters and is always 13 characters in length (including the '[' and ']' characters). -The contents of this field may be any of the following characters: +The contents of this field may be any of the characters. .RS .TP 0.2i \(bu @@ -109,11 +108,13 @@ in the smbpasswd file. \fBN\fR - This means the account has no password (the passwords in the fields LANMAN Password Hash and NT Password Hash are ignored). Note that this -will only allow users to log on with no password if the \fI null passwords\fR parameter is set in the \fBsmb.conf\fR(5) config file. +will only allow users to log on with no password if the \fI null passwords\fR parameter is set in the \fIsmb.conf(5) +\fR config file. .TP 0.2i \(bu \fBD\fR - This means the account -is disabled and no SMB/CIFS logins will be allowed for this user. +is disabled and no SMB/CIFS logins will be allowed for +this user. .TP 0.2i \(bu \fBW\fR - This means this account @@ -138,7 +139,8 @@ This man page is correct for version 3.0 of the Samba suite. .SH "SEE ALSO" .PP -\fBsmbpasswd\fR(8), \fBSamba\fR(7), and +\fBsmbpasswd(8)\fR +samba(7) and the Internet RFC1321 for details on the MD4 algorithm. .SH "AUTHOR" .PP @@ -149,7 +151,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 -for Samba 3.0 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/smbpasswd.8 b/docs/manpages/smbpasswd.8 index 8d4598895fa..5c7b16c2e92 100644 --- a/docs/manpages/smbpasswd.8 +++ b/docs/manpages/smbpasswd.8 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SMBPASSWD" "8" "03 april 2003" "" "" - +.TH "SMBPASSWD" "8" "04 March 2003" "" "" .SH NAME smbpasswd \- change a user's SMB password .SH SYNOPSIS @@ -13,23 +12,24 @@ smbpasswd \- change a user's SMB password .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP The smbpasswd program has several different -functions, depending on whether it is run by the \fBroot\fR user -or not. When run as a normal user it allows the user to change +functions, depending on whether it is run by the \fBroot\fR +user or not. When run as a normal user it allows the user to change the password used for their SMB sessions on any machines that store SMB passwords. .PP By default (when run with no arguments) it will attempt to change the current user's SMB password on the local machine. This is -similar to the way the \fBpasswd(1)\fR program works. \fB smbpasswd\fR differs from how the passwd program works +similar to the way the \fBpasswd(1)\fR program works. +\fBsmbpasswd\fR differs from how the passwd program works however in that it is not \fBsetuid root\fR but works in -a client-server mode and communicates with a -locally running \fBsmbd\fR(8). As a consequence in order for this to +a client-server mode and communicates with a locally running +\fBsmbd(8)\fR. As a consequence in order for this to succeed the smbd daemon must be running on the local machine. On a UNIX machine the encrypted SMB passwords are usually stored in -the \fBsmbpasswd\fR(5) file. +the \fIsmbpasswd(5)\fR file. .PP When run by an ordinary user with no options, smbpasswd will prompt them for their old SMB password and then ask them @@ -41,12 +41,12 @@ the key when asked for your old password. .PP smbpasswd can also be used by a normal user to change their SMB password on remote machines, such as Windows NT Primary Domain -Controllers. See the (\fI-r\fR) and \fI-U\fR options -below. +Controllers. See the (-r) and -U options below. .PP When run by root, smbpasswd allows new users to be added and deleted in the smbpasswd file, as well as allows changes to -the attributes of the user in this file to be made. When run by root, \fB smbpasswd\fR accesses the local smbpasswd file +the attributes of the user in this file to be made. When run by root, +\fBsmbpasswd\fR accesses the local smbpasswd file directly, thus enabling changes to be made even if smbd is not running. .SH "OPTIONS" @@ -82,7 +82,8 @@ will fail. If the smbpasswd file is in the 'old' format (pre-Samba 2.0 format) there is no space in the user's password entry to write -this information and the command will FAIL. See \fBsmbpasswd\fR(5) for details on the 'old' and new password file formats. +this information and the command will FAIL. See \fBsmbpasswd(5) +\fR for details on the 'old' and new password file formats. This option is only available when running smbpasswd as root. @@ -95,7 +96,7 @@ disabled this option has no effect. Once the account is enabled then the user will be able to authenticate via SMB once again. If the smbpasswd file is in the 'old' format, then \fB smbpasswd\fR will FAIL to enable the account. -See \fBsmbpasswd\fR(5) for +See \fBsmbpasswd (5)\fR for details on the 'old' and new password file formats. This option is only available when running smbpasswd as root. @@ -163,17 +164,17 @@ what name resolution services to use when looking up the NetBIOS name of the host being connected to. The options are :"lmhosts", "host", "wins" and "bcast". They -cause names to be resolved as follows: +cause names to be resolved as follows : .RS .TP 0.2i \(bu -lmhosts: Lookup an IP +lmhosts : Lookup an IP address in the Samba lmhosts file. If the line in lmhosts has -no name type attached to the NetBIOS name (see the \fBlmhosts\fR(5) for details) then +no name type attached to the NetBIOS name (see the lmhosts(5) for details) then any name type matches for lookup. .TP 0.2i \(bu -host: Do a standard host +host : Do a standard host name to IP address resolution, using the system \fI/etc/hosts \fR, NIS, or DNS lookups. This method of name resolution is operating system depended for instance on IRIX or Solaris this @@ -183,13 +184,13 @@ type being queried is the 0x20 (server) name type, otherwise it is ignored. .TP 0.2i \(bu -wins: Query a name with +wins : Query a name with the IP address listed in the \fIwins server\fR parameter. If no WINS server has been specified this method will be ignored. .TP 0.2i \(bu -bcast: Do a broadcast on +bcast : Do a broadcast on each of the known local interfaces listed in the \fIinterfaces\fR parameter. This is the least reliable of the name resolution methods as it depends on the @@ -197,7 +198,8 @@ target host being on a locally connected subnet. .RE The default order is \fBlmhosts, host, wins, bcast\fR -and without this parameter or any entry in the \fBsmb.conf\fR(5) file the name resolution methods will +and without this parameter or any entry in the +\fIsmb.conf\fR file the name resolution methods will be attempted in this order. .TP \fB-m\fR @@ -233,7 +235,7 @@ has been configured to use the experimental switch is used to specify the password to be used with the \fIldap admin dn\fR Note that the password is stored in -the \fIsecrets.tdb\fR and is keyed off +the \fIprivate/secrets.tdb\fR and is keyed off of the admin's DN. This means that if the value of \fIldap admin dn\fR ever changes, the password will need to be manually updated as well. @@ -259,20 +261,23 @@ to modify attributes directly in the local smbpasswd file. Since \fBsmbpasswd\fR works in client-server mode communicating with a local smbd for a non-root user then the smbd daemon must be running for this to work. A common problem -is to add a restriction to the hosts that may access the \fB smbd\fR running on the local machine by specifying either \fIallow -hosts\fR or \fIdeny hosts\fR entry in -the \fBsmb.conf\fR(5) file and neglecting to +is to add a restriction to the hosts that may access the \fB smbd\fR running on the local machine by specifying a +\fIallow hosts\fR or \fIdeny hosts\fR +entry in the \fIsmb.conf\fR file and neglecting to allow "localhost" access to the smbd. .PP In addition, the smbpasswd command is only useful if Samba -has been set up to use encrypted passwords. See the document "LanMan and NT Password Encryption in Samba" in the docs directory for details +has been set up to use encrypted passwords. See the file +\fIENCRYPTION.txt\fR in the docs directory for details on how to do this. .SH "VERSION" .PP -This man page is correct for version 3.0 of the Samba suite. +This man page is correct for version 3.0 of +the Samba suite. .SH "SEE ALSO" .PP -\fBsmbpasswd\fR(5), \fBSamba\fR(7). +\fIsmbpasswd(5)\fR +samba(7) .SH "AUTHOR" .PP The original Samba software and related utilities @@ -282,7 +287,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 -for Samba 3.0 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/smbsh.1 b/docs/manpages/smbsh.1 index f7ee47949b3..06d27090db1 100644 --- a/docs/manpages/smbsh.1 +++ b/docs/manpages/smbsh.1 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SMBSH" "1" "03 april 2003" "" "" - +.TH "SMBSH" "1" "04 March 2003" "" "" .SH NAME smbsh \- Allows access to Windows NT filesystem using UNIX commands .SH SYNOPSIS @@ -13,7 +12,7 @@ smbsh \- Allows access to Windows NT filesystem using UNIX commands .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP \fBsmbsh\fR allows you to access an NT filesystem using UNIX commands such as \fBls\fR, \fB egrep\fR, and \fBrcp\fR. You must use a @@ -23,7 +22,7 @@ to work correctly. .TP \fB-W WORKGROUP\fR Override the default workgroup specified in the -workgroup parameter of the \fBsmb.conf\fR(5) file +workgroup parameter of the \fIsmb.conf\fR file for this session. This may be needed to connect to some servers. .TP @@ -39,75 +38,44 @@ the user to set the directory prefix for SMB access. The default value if this option is not specified is \fBsmb\fR. .TP -\fB-s \fR -The file specified contains the -configuration details required by the server. The -information in this file includes server-specific -information such as what printcap file to use, as well -as descriptions of all the services that the server is -to provide. See \fIsmb.conf(5)\fR for more information. -The default configuration file name is determined at -compile time. -.TP -\fB-d|--debug=debuglevel\fR -\fIdebuglevel\fR is an integer -from 0 to 10. The default value if this parameter is -not specified is zero. - -The higher this value, the more detail will be -logged to the log files about the activities of the -server. At level 0, only critical errors and serious -warnings will be logged. Level 1 is a reasonable level for -day to day running - it generates a small amount of -information about operations carried out. - -Levels above 1 will generate considerable -amounts of log data, and should only be used when -investigating a problem. Levels above 3 are designed for -use only by developers and generate HUGE amounts of log -data, most of which is extremely cryptic. - -Note that specifying this parameter here will -override the log -level file. -.TP \fB-R \fR This option is used to determine what naming services and in what order to resolve host names to IP addresses. The option takes a space-separated string of different name resolution options. -The options are: "lmhosts", "host", "wins" and "bcast". +The options are :"lmhosts", "host", "wins" and "bcast". They cause names to be resolved as follows : .RS .TP 0.2i \(bu -lmhosts: +lmhosts : Lookup an IP address in the Samba lmhosts file. If the line in lmhosts has no name type attached to the NetBIOS name -(see the \fBlmhosts\fR(5) for details) -then any name type matches for lookup. +(see the lmhosts(5) +for details) then any name type matches for lookup. .TP 0.2i \(bu -host: +host : Do a standard host name to IP address resolution, using the system \fI/etc/hosts\fR, NIS, or DNS lookups. This method of name resolution is operating system dependent, for instance on IRIX or Solaris this -may be controlled by the \fI/etc/nsswitch.conf\fR file). Note that this method is only used +may be controlled by the \fI/etc/nsswitch.conf +\fR file). Note that this method is only used if the NetBIOS name type being queried is the 0x20 (server) name type, otherwise it is ignored. .TP 0.2i \(bu -wins: +wins : Query a name with the IP address listed in the \fIwins server\fR parameter. If no WINS server has been specified this method will be ignored. .TP 0.2i \(bu -bcast: +bcast : Do a broadcast on each of the known local interfaces listed in the \fIinterfaces\fR parameter. This is the least reliable of the name @@ -116,12 +84,30 @@ being on a locally connected subnet. .RE If this parameter is not set then the name resolve order -defined in the \fBsmb.conf\fR(5) file parameter -(\fIname resolve order\fR) will be used. +defined in the \fIsmb.conf\fR file parameter +(name resolve order) will be used. The default order is lmhosts, host, wins, bcast. Without -this parameter or any entry in the \fIname resolve order\fR parameter of the \fBsmb.conf\fR(5) file, the name resolution methods -will be attempted in this order. +this parameter or any entry in the \fIname resolve order +\fR parameter of the \fIsmb.conf\fR +file, the name resolution methods will be attempted in this +order. +.TP +\fB-d \fR +debug level is an integer from 0 to 10. + +The default value if this parameter is not specified +is zero. + +The higher this value, the more detail will be logged +about the activities of \fBnmblookup\fR. At level +0, only critical errors and serious warnings will be logged. +.TP +\fB-l logfilename\fR +If specified causes all debug messages to be +written to the file specified by \fIlogfilename +\fR. If not specified then all messages will be +written to\fIstderr\fR. .TP \fB-L libdir\fR This parameter specifies the location of the @@ -132,11 +118,13 @@ value is specified at compile time. To use the \fBsmbsh\fR command, execute \fB smbsh\fR from the prompt and enter the username and password that authenticates you to the machine running the Windows NT operating system. +.PP .nf -system% \fBsmbsh\fR -Username: \fBuser\fR -Password: \fBXXXXXXX\fR + system% \fBsmbsh\fR + Username: \fBuser\fR + Password: \fBXXXXXXX\fR + .fi .PP Any dynamically linked command you execute from @@ -150,7 +138,8 @@ names for that machine. You could then, for example, use the \fB cd\fR command t edit files, and \fBrcp\fR to copy files. .SH "VERSION" .PP -This man page is correct for version 3.0 of the Samba suite. +This man page is correct for version 3.0 of +the Samba suite. .SH "BUGS" .PP \fBsmbsh\fR works by intercepting the standard @@ -164,7 +153,8 @@ of UNIX have a \fBfile\fR command that will describe how a program was linked. .SH "SEE ALSO" .PP -\fBsmbd\fR(8), \fBsmb.conf\fR(5) +\fBsmbd(8)\fR +smb.conf(5) .SH "AUTHOR" .PP The original Samba software and related utilities @@ -174,7 +164,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 -for Samba 3.0 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/smbspool.8 b/docs/manpages/smbspool.8 index 8cfa1b26719..835494b5347 100644 --- a/docs/manpages/smbspool.8 +++ b/docs/manpages/smbspool.8 @@ -3,17 +3,16 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SMBSPOOL" "8" "03 april 2003" "" "" - +.TH "SMBSPOOL" "8" "04 March 2003" "" "" .SH NAME smbspool \- send a print file to an SMB printer .SH SYNOPSIS -\fBsmbspool\fR \fBjob\fR \fBuser\fR \fBtitle\fR \fBcopies\fR \fBoptions\fR [ \fBfilename\fR ] +\fBsmbspool\fR [ \fBjob\fR ] [ \fBuser\fR ] [ \fBtitle\fR ] [ \fBcopies\fR ] [ \fBoptions\fR ] [ \fBfilename\fR ] .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP smbspool is a very small print spooling program that sends a print file to an SMB printer. The command-line arguments @@ -78,10 +77,12 @@ name of the file to print. If this argument is not specified then the print file is read from the standard input. .SH "VERSION" .PP -This man page is correct for version 3.0 of the Samba suite. +This man page is correct for version 2.2 of +the Samba suite. .SH "SEE ALSO" .PP -\fBsmbd\fR(8) and \fBSamba\fR(7). +\fBsmbd(8)\fR +and samba(7) .SH "AUTHOR" .PP \fBsmbspool\fR was written by Michael Sweet @@ -94,7 +95,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 -for Samba 3.0 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/smbstatus.1 b/docs/manpages/smbstatus.1 index 133de67ab69..9fb96f1c432 100644 --- a/docs/manpages/smbstatus.1 +++ b/docs/manpages/smbstatus.1 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SMBSTATUS" "1" "03 april 2003" "" "" - +.TH "SMBSTATUS" "1" "04 March 2003" "" "" .SH NAME smbstatus \- report on current Samba connections .SH SYNOPSIS @@ -13,7 +12,7 @@ smbstatus \- report on current Samba connections .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP \fBsmbstatus\fR is a very simple program to list the current Samba connections. @@ -27,46 +26,8 @@ shared memory area. \fB-b|--brief\fR gives brief output. .TP -\fB-V\fR -Prints the version number for -\fBsmbd\fR. -.TP -\fB-s \fR -The file specified contains the -configuration details required by the server. The -information in this file includes server-specific -information such as what printcap file to use, as well -as descriptions of all the services that the server is -to provide. See \fIsmb.conf(5)\fR for more information. -The default configuration file name is determined at -compile time. -.TP -\fB-d|--debug=debuglevel\fR -\fIdebuglevel\fR is an integer -from 0 to 10. The default value if this parameter is -not specified is zero. - -The higher this value, the more detail will be -logged to the log files about the activities of the -server. At level 0, only critical errors and serious -warnings will be logged. Level 1 is a reasonable level for -day to day running - it generates a small amount of -information about operations carried out. - -Levels above 1 will generate considerable -amounts of log data, and should only be used when -investigating a problem. Levels above 3 are designed for -use only by developers and generate HUGE amounts of log -data, most of which is extremely cryptic. - -Note that specifying this parameter here will -override the log -level file. -.TP -\fB-l|--logfile=logbasename\fR -File name for log/debug files. The extension -".client" will be appended. The log file is -never removed by the client. +\fB-d|--debug=\fR +sets debugging to specified level .TP \fB-v|--verbose\fR gives verbose output. @@ -78,14 +39,17 @@ causes smbstatus to only list locks. causes smbstatus to include byte range locks. .TP \fB-p|--processes\fR -print a list of \fBsmbd\fR(8) processes and exit. +print a list of \fBsmbd(8)\fR processes and exit. Useful for scripting. .TP \fB-S|--shares\fR causes smbstatus to only list shares. .TP -\fB-h|--help\fR -Print a summary of command line options. +\fB-s|--conf=\fR +The default configuration file name is +determined at compile time. The file specified contains the +configuration details required by the server. See \fIsmb.conf(5)\fR + for more information. .TP \fB-u|--user=\fR selects information relevant to @@ -96,7 +60,8 @@ This man page is correct for version 3.0 of the Samba suite. .SH "SEE ALSO" .PP -\fBsmbd\fR(8) and \fBsmb.conf\fR(5). +\fBsmbd(8)\fR and +smb.conf(5) .SH "AUTHOR" .PP The original Samba software and related utilities @@ -106,7 +71,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 -for Samba 3.0 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/smbtar.1 b/docs/manpages/smbtar.1 index e15af72b650..4ed25bbc756 100644 --- a/docs/manpages/smbtar.1 +++ b/docs/manpages/smbtar.1 @@ -3,20 +3,20 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SMBTAR" "1" "03 april 2003" "" "" - +.TH "SMBTAR" "1" "04 March 2003" "" "" .SH NAME smbtar \- shell script for backing up SMB/CIFS shares directly to UNIX tape drives .SH SYNOPSIS -\fBsmbtar\fR [ \fB-r\fR ] [ \fB-i\fR ] [ \fB-a\fR ] [ \fB-v\fR ] \fB-s server\fR [ \fB-p password\fR ] [ \fB-x services\fR ] [ \fB-X\fR ] [ \fB-N filename\fR ] [ \fB-b blocksize\fR ] [ \fB-d directory\fR ] [ \fB-l loglevel\fR ] [ \fB-u user\fR ] [ \fB-t tape\fR ] \fBfilenames\fR +\fBsmbtar\fR \fB-s server\fR [ \fB-p password\fR ] [ \fB-x services\fR ] [ \fB-X\fR ] [ \fB-d directory\fR ] [ \fB-u user\fR ] [ \fB-t tape\fR ] [ \fB-t tape\fR ] [ \fB-b blocksize\fR ] [ \fB-N filename\fR ] [ \fB-i\fR ] [ \fB-r\fR ] [ \fB-l loglevel\fR ] [ \fB-v\fR ] \fBfilenames\fR .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP \fBsmbtar\fR is a very small shell script on top -of \fBsmbclient\fR(1) which dumps SMB shares directly to tape. +of \fBsmbclient(1)\fR +which dumps SMB shares directly to tape. .SH "OPTIONS" .TP \fB-s server\fR @@ -46,10 +46,6 @@ Default: none The user id to connect as. Default: UNIX login name. .TP -\fB-a\fR -Reset DOS archive bit mode to -indicate file has been archived. -.TP \fB-t tape\fR Tape device. May be regular file or tape device. Default: \fI$TAPE\fR environmental @@ -76,7 +72,8 @@ from the tar file. .TP \fB-l log level\fR Log (debug) level. Corresponds to the -\fI-d\fR flag of \fBsmbclient\fR(1). +\fI-d\fR flag of \fBsmbclient(1) +\fR. .SH "ENVIRONMENT VARIABLES" .PP The \fI$TAPE\fR variable specifies the @@ -94,14 +91,18 @@ on entire shares; should work on file lists. smbtar works best with GNU tar and may not work well with other versions. .SH "DIAGNOSTICS" .PP -See the \fBDIAGNOSTICS\fR section for the \fBsmbclient\fR(1) command. +See the \fBDIAGNOSTICS\fR section for the +\fBsmbclient(1)\fR + command. .SH "VERSION" .PP This man page is correct for version 3.0 of the Samba suite. .SH "SEE ALSO" .PP -\fBsmbd\fR(8), \fBsmbclient\fR(1), \fBsmb.conf\fR(5). +\fBsmbd(8)\fR +\fBsmbclient(1)\fR +smb.conf(5) .SH "AUTHOR" .PP The original Samba software and related utilities @@ -114,7 +115,7 @@ wrote the tar extension and this man page. The \fBsmbtar\fR script was heavily rewritten and improved by Martin Kraemer . Many thanks to everyone who suggested extensions, improvements, bug fixes, etc. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for -Samba 3.0 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter. diff --git a/docs/manpages/smbumount.8 b/docs/manpages/smbumount.8 index 6a2f04cfd59..4c3688d63fc 100644 --- a/docs/manpages/smbumount.8 +++ b/docs/manpages/smbumount.8 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SMBUMOUNT" "8" "03 april 2003" "" "" - +.TH "SMBUMOUNT" "8" "04 March 2003" "" "" .SH NAME smbumount \- smbfs umount for normal users .SH SYNOPSIS @@ -27,7 +26,8 @@ to make umount setuid root. The directory to unmount. .SH "SEE ALSO" .PP -\fBsmbmount\fR(8) +\fBsmbmount(8)\fR + .SH "AUTHOR" .PP Volker Lendecke, Andrew Tridgell, Michael H. Warfield @@ -40,5 +40,4 @@ The SAMBA Mailing list is the preferred place to ask questions regarding these programs. .PP The conversion of this manpage for Samba 2.2 was performed -by Gerald Carter. The conversion to DocBook XML 4.2 for Samba 3.0 -was done by Alexander Bokovoy. +by Gerald Carter diff --git a/docs/manpages/swat.8 b/docs/manpages/swat.8 index 47ad346fd7b..6466a0a79d5 100644 --- a/docs/manpages/swat.8 +++ b/docs/manpages/swat.8 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "SWAT" "8" "03 april 2003" "" "" - +.TH "SWAT" "8" "04 March 2003" "" "" .SH NAME swat \- Samba Web Administration Tool .SH SYNOPSIS @@ -13,10 +12,10 @@ swat \- Samba Web Administration Tool .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP \fBswat\fR allows a Samba administrator to -configure the complex \fBsmb.conf\fR(5) file via a Web browser. In addition, +configure the complex \fI smb.conf(5)\fR file via a Web browser. In addition, a \fBswat\fR configuration page has help links to all the configurable options in the \fIsmb.conf\fR file allowing an administrator to easily look up the effects of any change. @@ -27,8 +26,8 @@ administrator to easily look up the effects of any change. \fB-s smb configuration file\fR The default configuration file path is determined at compile time. The file specified contains -the configuration details required by the \fBsmbd\fR(8) server. This is the file -that \fBswat\fR will modify. +the configuration details required by the \fBsmbd +\fR server. This is the file that \fBswat\fR will modify. The information in this file includes server-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide. @@ -41,57 +40,8 @@ the \fIsmb.conf\fR file. \fBWARNING: Do NOT enable this option on a production server. \fR -.TP -\fB-V\fR -Prints the version number for -\fBsmbd\fR. -.TP -\fB-s \fR -The file specified contains the -configuration details required by the server. The -information in this file includes server-specific -information such as what printcap file to use, as well -as descriptions of all the services that the server is -to provide. See \fIsmb.conf(5)\fR for more information. -The default configuration file name is determined at -compile time. -.TP -\fB-d|--debug=debuglevel\fR -\fIdebuglevel\fR is an integer -from 0 to 10. The default value if this parameter is -not specified is zero. - -The higher this value, the more detail will be -logged to the log files about the activities of the -server. At level 0, only critical errors and serious -warnings will be logged. Level 1 is a reasonable level for -day to day running - it generates a small amount of -information about operations carried out. - -Levels above 1 will generate considerable -amounts of log data, and should only be used when -investigating a problem. Levels above 3 are designed for -use only by developers and generate HUGE amounts of log -data, most of which is extremely cryptic. - -Note that specifying this parameter here will -override the log -level file. -.TP -\fB-l|--logfile=logbasename\fR -File name for log/debug files. The extension -".client" will be appended. The log file is -never removed by the client. -.TP -\fB-h|--help\fR -Print a summary of command line options. .SH "INSTALLATION" .PP -Swat is included as binary package with most distributions. The -package manager in this case takes care of the installation and -configuration. This section is only for those who have compiled -swat from scratch. -.PP After you compile SWAT you need to run \fBmake install \fR to install the \fBswat\fR binary and the various help files and images. A default install would put @@ -116,7 +66,7 @@ add a line like this: .PP \fBswat 901/tcp\fR .PP -Note for NIS/YP and LDAP users - you may need to rebuild the +Note for NIS/YP users - you may need to rebuild the NIS service maps rather than alter your local \fI /etc/services\fR file. .PP the choice of port number isn't really important @@ -135,7 +85,7 @@ One you have edited \fI/etc/services\fR and \fI/etc/inetd.conf\fR you need to send a HUP signal to inetd. To do this use \fBkill -1 PID \fR where PID is the process ID of the inetd daemon. -.SH "LAUNCHING" +.SS "LAUNCHING" .PP To launch SWAT just run your favorite web browser and point it at "http://localhost:901/". @@ -156,21 +106,26 @@ This file must contain a mapping of service name (e.g., tcp). .TP \fB\fI/usr/local/samba/lib/smb.conf\fB\fR -This is the default location of the \fBsmb.conf\fR(5) server configuration file that swat edits. Other +This is the default location of the \fIsmb.conf(5) +\fR server configuration file that swat edits. Other common places that systems install this file are \fI /usr/samba/lib/smb.conf\fR and \fI/etc/smb.conf \fR. This file describes all the services the server is to make available to clients. .SH "WARNINGS" .PP -\fBswat\fR will rewrite your \fBsmb.conf\fR(5) file. It will rearrange the entries and delete all +\fBswat\fR will rewrite your \fIsmb.conf +\fR file. It will rearrange the entries and delete all comments, \fIinclude=\fR and \fIcopy= \fR options. If you have a carefully crafted \fI smb.conf\fR then back it up or don't use swat! .SH "VERSION" .PP -This man page is correct for version 3.0 of the Samba suite. +This man page is correct for version 2.2 of +the Samba suite. .SH "SEE ALSO" .PP -\fBinetd(5)\fR, \fBsmbd\fR(8), \fBsmb.conf\fR(5) +\fBinetd(5)\fR, +\fBsmbd(8)\fR +smb.conf(5) .SH "AUTHOR" .PP The original Samba software and related utilities @@ -180,7 +135,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 for -Samba 3.0 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/testparm.1 b/docs/manpages/testparm.1 index e9ecd565c9e..c459eeea70e 100644 --- a/docs/manpages/testparm.1 +++ b/docs/manpages/testparm.1 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "TESTPARM" "1" "03 april 2003" "" "" - +.TH "TESTPARM" "1" "04 March 2003" "" "" .SH NAME testparm \- check an smb.conf configuration file for internal correctness .SH SYNOPSIS @@ -13,10 +12,10 @@ testparm \- check an smb.conf configuration file for internal correctness .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP \fBtestparm\fR is a very simple test program -to check an \fBsmbd\fR(8) configuration file for +to check an \fBsmbd\fR configuration file for internal correctness. If this program reports no problems, you can use the configuration file with confidence that \fBsmbd \fR will successfully load the configuration file. @@ -40,12 +39,8 @@ Without this option, \fBtestparm\fR will prompt for a carriage return after printing the service names and before dumping the service definitions. .TP -\fB-h|--help\fR -Print a summary of command line options. -.TP -\fB-V\fR -Prints the version number for -\fBsmbd\fR. +\fB-h\fR +Print usage message .TP \fB-L servername\fR Sets the value of the %L macro to \fIservername\fR. @@ -54,7 +49,9 @@ This is useful for testing include files specified with the .TP \fB-v\fR If this option is specified, testparm -will also output all options that were not used in \fBsmb.conf\fR(5) and are thus set to their defaults. +will also output all options that were not used in +\fIsmb.conf\fR and are thus set to +their defaults. .TP \fB-t encoding\fR Output data in specified encoding. @@ -62,13 +59,13 @@ Output data in specified encoding. \fBconfigfilename\fR This is the name of the configuration file to check. If this parameter is not present then the -default \fBsmb.conf\fR(5) file will be checked. +default \fIsmb.conf\fR file will be checked. .TP \fBhostname\fR If this parameter and the following are specified, then \fBtestparm\fR will examine the \fIhosts allow\fR and \fIhosts deny\fR -parameters in the \fBsmb.conf\fR(5) file to +parameters in the \fIsmb.conf\fR file to determine if the hostname with this IP address would be allowed access to the \fBsmbd\fR server. If this parameter is supplied, the hostIP parameter must also @@ -80,9 +77,9 @@ in the previous parameter. This address must be supplied if the hostname parameter is supplied. .SH "FILES" .TP -\fBsmb.conf(5)\fR +\fB\fIsmb.conf\fB\fR This is usually the name of the configuration -file used by \fBsmbd\fR(8). +file used by \fBsmbd\fR. .SH "DIAGNOSTICS" .PP The program will issue a message saying whether the @@ -96,7 +93,8 @@ This man page is correct for version 3.0 of the Samba suite. .SH "SEE ALSO" .PP -\fBsmb.conf\fR(5), \fBsmbd\fR(8) +\fIsmb.conf(5)\fR +\fBsmbd(8)\fR .SH "AUTHOR" .PP The original Samba software and related utilities @@ -106,7 +104,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 -for Samba 3.0 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/testprns.1 b/docs/manpages/testprns.1 index 5779d71b195..f70b383f9d1 100644 --- a/docs/manpages/testprns.1 +++ b/docs/manpages/testprns.1 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "TESTPRNS" "1" "03 april 2003" "" "" - +.TH "TESTPRNS" "1" "04 March 2003" "" "" .SH NAME testprns \- check printer name for validity with smbd .SH SYNOPSIS @@ -13,11 +12,11 @@ testprns \- check printer name for validity with smbd .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP \fBtestprns\fR is a very simple test program to determine whether a given printer name is valid for use in -a service to be provided by \fBsmbd\fR(8). +a service to be provided by \fB smbd(8)\fR .PP "Valid" in this context means "can be found in the printcap specified". This program is very stupid - so stupid in @@ -35,7 +34,8 @@ Note that no validation or checking of the printcap syntax is done beyond that required to extract the printer name. It may be that the print spooling system is more forgiving or less forgiving than \fBtestprns\fR. However, if -\fBtestprns\fR finds the printer then \fBsmbd\fR(8) should do so as well. +\fBtestprns\fR finds the printer then +\fBsmbd\fR should do so as well. .TP \fBprintcapname\fR This is the name of the printcap file within @@ -69,12 +69,13 @@ for errors and warnings. Other messages are self-explanatory. .SH "VERSION" .PP -This man page is correct for version 3.0 of +This man page is correct for version 2.2 of the Samba suite. .SH "SEE ALSO" .PP \fIprintcap(5)\fR, -\fBsmbd\fR(8), \fBsmbclient\fR(1) +\fBsmbd(8)\fR +\fBsmbclient(1)\fR .SH "AUTHOR" .PP The original Samba software and related utilities @@ -84,7 +85,7 @@ to the way the Linux kernel is developed. .PP The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another -excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 +excellent piece of Open Source software, available at +ftp://ftp.icce.rug.nl/pub/unix/ ) and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for -Samba 2.2 was done by Gerald Carter. The conversion to DocBook XML 4.2 -for Samba 3.0 was done by Alexander Bokovoy. +Samba 2.2 was done by Gerald Carter diff --git a/docs/manpages/vfstest.1 b/docs/manpages/vfstest.1 index 71e07c58e6c..9877e2e461a 100644 --- a/docs/manpages/vfstest.1 +++ b/docs/manpages/vfstest.1 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "VFSTEST" "1" "03 april 2003" "" "" - +.TH "VFSTEST" "1" "04 March 2003" "" "" .SH NAME vfstest \- tool for testing samba VFS modules .SH SYNOPSIS @@ -13,7 +12,7 @@ vfstest \- tool for testing samba VFS modules .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP \fBvfstest\fR is a small command line utility that has the ability to test dso samba VFS modules. It gives the @@ -25,28 +24,6 @@ supports cascaded VFS modules. Execute the specified (colon-separated) commands. See below for the commands that are available. .TP -\fB-h|--help\fR -Print a summary of command line options. -.TP -\fB-l|--logfile=logbasename\fR -File name for log/debug files. The extension -\&'.client' will be appended. The log file is never removed -by the client. -.TP -\fB-V\fR -Prints the version number for -\fBsmbd\fR. -.TP -\fB-s \fR -The file specified contains the -configuration details required by the server. The -information in this file includes server-specific -information such as what printcap file to use, as well -as descriptions of all the services that the server is -to provide. See \fIsmb.conf(5)\fR for more information. -The default configuration file name is determined at -compile time. -.TP \fB-d|--debug=debuglevel\fR \fIdebuglevel\fR is an integer from 0 to 10. The default value if this parameter is @@ -69,10 +46,13 @@ Note that specifying this parameter here will override the log level file. .TP +\fB-h|--help\fR +Print a summary of command line options. +.TP \fB-l|--logfile=logbasename\fR File name for log/debug files. The extension -".client" will be appended. The log file is -never removed by the client. +\&'.client' will be appended. The log file is never removed +by the client. .SH "COMMANDS" .PP \fBVFS COMMANDS\fR diff --git a/docs/manpages/wbinfo.1 b/docs/manpages/wbinfo.1 index 5c4392e80e4..3cc35e494d7 100644 --- a/docs/manpages/wbinfo.1 +++ b/docs/manpages/wbinfo.1 @@ -3,61 +3,62 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "WBINFO" "1" "03 april 2003" "" "" - +.TH "WBINFO" "1" "04 March 2003" "" "" .SH NAME wbinfo \- Query information from winbind daemon .SH SYNOPSIS -\fBwbinfo\fR [ \fB-u\fR ] [ \fB-g\fR ] [ \fB-N netbios-name\fR ] [ \fB-I ip\fR ] [ \fB-n name\fR ] [ \fB-s sid\fR ] [ \fB-U uid\fR ] [ \fB-G gid\fR ] [ \fB-S sid\fR ] [ \fB-Y sid\fR ] [ \fB-t\fR ] [ \fB-m\fR ] [ \fB--sequence\fR ] [ \fB-r user\fR ] [ \fB-a user%password\fR ] [ \fB-A user%password\fR ] [ \fB--get-auth-user\fR ] [ \fB-p\fR ] +\fBwbinfo\fR [ \fB-u\fR ] [ \fB-g\fR ] [ \fB-i ip\fR ] [ \fB-N netbios-name\fR ] [ \fB-n name\fR ] [ \fB-s sid\fR ] [ \fB-U uid\fR ] [ \fB-G gid\fR ] [ \fB-S sid\fR ] [ \fB-Y sid\fR ] [ \fB-t\fR ] [ \fB-m\fR ] [ \fB-r user\fR ] [ \fB-a user%password\fR ] [ \fB-A user%password\fR ] [ \fB-p\fR ] .SH "DESCRIPTION" .PP -This tool is part of the \fBSamba\fR(7) suite. +This tool is part of the Samba suite. .PP The \fBwbinfo\fR program queries and returns information -created and used by the \fBwinbindd\fR(8) daemon. +created and used by the \fB winbindd(8)\fR daemon. .PP -The \fBwinbindd\fR(8) daemon must be configured +The \fBwinbindd(8)\fR daemon must be configured and running for the \fBwbinfo\fR program to be able to return information. .SH "OPTIONS" .TP \fB-u\fR This option will list all users available -in the Windows NT domain for which the \fBwinbindd\fR(8) daemon is operating in. Users in all trusted domains +in the Windows NT domain for which the \fBwinbindd(8) +\fR daemon is operating in. Users in all trusted domains will also be listed. Note that this operation does not assign -user ids to any users that have not already been seen by \fBwinbindd\fR(8) -\&. +user ids to any users that have not already been seen by +\fBwinbindd(8)\fR. .TP \fB-g\fR This option will list all groups available -in the Windows NT domain for which the \fBSamba\fR(7) daemon is operating in. Groups in all trusted domains +in the Windows NT domain for which the \fBwinbindd(8) +\fR daemon is operating in. Groups in all trusted domains will also be listed. Note that this operation does not assign -group ids to any groups that have not already been -seen by \fBwinbindd\fR(8). +group ids to any groups that have not already been seen by +\fBwinbindd(8)\fR. .TP \fB-N name\fR The \fI-N\fR option -queries \fBwinbindd\fR(8) to query the WINS +queries \fBwinbindd(8)\fR to query the WINS server for the IP address associated with the NetBIOS name specified by the \fIname\fR parameter. .TP \fB-I ip\fR The \fI-I\fR option -queries \fBwinbindd\fR(8) to send a node status +queries \fBwinbindd(8)\fR to send a node status request to get the NetBIOS name associated with the IP address specified by the \fIip\fR parameter. .TP \fB-n name\fR The \fI-n\fR option -queries \fBwinbindd\fR(8) for the SID +queries \fBwinbindd(8)\fR for the SID associated with the name specified. Domain names can be specified before the user name by using the winbind separator character. For example CWDOM1/Administrator refers to the Administrator user in the domain CWDOM1. If no domain is specified then the -domain used is the one specified in the \fBsmb.conf\fR(5) \fIworkgroup -\fR parameter. +domain used is the one specified in the \fIsmb.conf\fR +\fIworkgroup\fR parameter. .TP \fB-s sid\fR Use \fI-s\fR to resolve @@ -78,12 +79,11 @@ the winbind gid range then the operation will fail. .TP \fB-S sid\fR Convert a SID to a UNIX user id. If the SID -does not correspond to a UNIX user mapped by \fBwinbindd\fR(8) then the operation will fail. +does not correspond to a UNIX user mapped by \fB winbindd(8)\fR then the operation will fail. .TP \fB-Y sid\fR Convert a SID to a UNIX group id. If the SID -does not correspond to a UNIX group mapped by \fBwinbindd\fR(8) then -the operation will fail. +does not correspond to a UNIX group mapped by \fB winbindd(8)\fR then the operation will fail. .TP \fB-t\fR Verify that the workstation trust account @@ -92,14 +92,10 @@ domain is working. .TP \fB-m\fR Produce a list of domains trusted by the -Windows NT server \fBwinbindd\fR(8) contacts +Windows NT server \fBwinbindd(8)\fR contacts when resolving names. This list does not include the Windows NT domain the server is a Primary Domain Controller for. .TP -\fB--sequence\fR -Show sequence numbers of -all known domains -.TP \fB-r username\fR Try to obtain the list of UNIX group ids to which the user belongs. This only works for users @@ -115,27 +111,11 @@ during session setup to a domain controller. This enables winbindd to operate in a Windows 2000 domain with Restrict Anonymous turned on (a.k.a. Permissions compatiable with Windows 2000 servers only). -.TP -\fB--get-auth-user\fR -Print username and password used by winbindd -during session setup to a domain controller. Username -and password can be set using '-A'. Only available for -root. -.TP -\fB-p\fR -Check whether winbindd is still alive. -Prints out either 'succeeded' or 'failed'. -.TP -\fB-V\fR -Prints the version number for -\fBsmbd\fR. -.TP -\fB-h|--help\fR -Print a summary of command line options. .SH "EXIT STATUS" .PP The wbinfo program returns 0 if the operation -succeeded, or 1 if the operation failed. If the \fBwinbindd\fR(8) daemon is not working \fBwbinfo\fR will always return +succeeded, or 1 if the operation failed. If the \fBwinbindd(8) +\fR daemon is not working \fBwbinfo\fR will always return failure. .SH "VERSION" .PP @@ -143,7 +123,8 @@ This man page is correct for version 3.0 of the Samba suite. .SH "SEE ALSO" .PP -\fBwinbindd\fR(8) +\fBwinbindd(8)\fR + .SH "AUTHOR" .PP The original Samba software and related utilities @@ -155,5 +136,4 @@ to the way the Linux kernel is developed. were written by Tim Potter. .PP The conversion to DocBook for Samba 2.2 was done -by Gerald Carter. The conversion to DocBook XML 4.2 for Samba -3.0 was done by Alexander Bokovoy. +by Gerald Carter diff --git a/docs/manpages/winbindd.8 b/docs/manpages/winbindd.8 index bccc5e04cd4..696de8537b1 100644 --- a/docs/manpages/winbindd.8 +++ b/docs/manpages/winbindd.8 @@ -3,8 +3,7 @@ .\" .\" Please send any bug reports, improvements, comments, patches, .\" etc. to Steve Cheng . -.TH "WINBINDD" "8" "03 april 2003" "" "" - +.TH "WINBINDD" "8" "04 March 2003" "" "" .SH NAME winbindd \- Name Service Switch daemon for resolving names from NT servers .SH SYNOPSIS @@ -13,7 +12,7 @@ winbindd \- Name Service Switch daemon for resolving names from NT servers .SH "DESCRIPTION" .PP -This program is part of the \fBSamba\fR(7) suite. +This program is part of the Samba suite. .PP \fBwinbindd\fR is a daemon that provides a service for the Name Service Switch capability that is present @@ -60,11 +59,13 @@ For example, the following simple configuration in the \fI/etc/nsswitch.conf\fR file can be used to initially resolve user and group information from \fI/etc/passwd \fR and \fI/etc/group\fR and then from the -Windows NT server. +Windows NT server. +.PP .nf passwd: files winbind group: files winbind + .fi .PP The following simple configuration in the @@ -90,49 +91,11 @@ If specified, this parameter causes \fBwinbindd\fR to log to standard output rather than a file. .TP -\fB-V\fR -Prints the version number for -\fBsmbd\fR. -.TP -\fB-s \fR -The file specified contains the -configuration details required by the server. The -information in this file includes server-specific -information such as what printcap file to use, as well -as descriptions of all the services that the server is -to provide. See \fIsmb.conf(5)\fR for more information. -The default configuration file name is determined at -compile time. -.TP -\fB-d|--debug=debuglevel\fR -\fIdebuglevel\fR is an integer -from 0 to 10. The default value if this parameter is -not specified is zero. - -The higher this value, the more detail will be -logged to the log files about the activities of the -server. At level 0, only critical errors and serious -warnings will be logged. Level 1 is a reasonable level for -day to day running - it generates a small amount of -information about operations carried out. - -Levels above 1 will generate considerable -amounts of log data, and should only be used when -investigating a problem. Levels above 3 are designed for -use only by developers and generate HUGE amounts of log -data, most of which is extremely cryptic. - -Note that specifying this parameter here will -override the log -level file. -.TP -\fB-l|--logfile=logbasename\fR -File name for log/debug files. The extension -".client" will be appended. The log file is -never removed by the client. -.TP -\fB-h|--help\fR -Print a summary of command line options. +\fB-d debuglevel\fR +Sets the debuglevel to an integer between +0 and 100. 0 is for no debugging and 100 is for reams and +reams. To submit a bug report to the Samba Team, use debug +level 100 (see BUGS.txt). .TP \fB-i\fR Tells \fBwinbindd\fR to not @@ -155,7 +118,11 @@ Dual daemon mode. This means winbindd will run as 2 threads. The first will answer all requests from the cache, thus making responses to clients faster. The other will update the cache for the query that the first has just responded. -Advantage of this is that responses stay accurate and are faster. +Advantage of this is that responses are accurate and fast. +.TP +\fB-s|--conf=smb.conf\fR +Specifies the location of the all-important +\fIsmb.conf\fR file. .SH "NAME AND ID RESOLUTION" .PP Users and groups on a Windows NT server are assigned @@ -180,7 +147,8 @@ and group rids. .SH "CONFIGURATION" .PP Configuration of the \fBwinbindd\fR daemon -is done through configuration parameters in the \fBsmb.conf\fR(5) file. All parameters should be specified in the +is done through configuration parameters in the \fIsmb.conf(5) +\fR file. All parameters should be specified in the [global] section of smb.conf. .TP 0.2i \(bu @@ -217,23 +185,28 @@ following setup. This was tested on a RedHat 6.2 Linux box. .PP In \fI/etc/nsswitch.conf\fR put the following: +.PP .nf passwd: files winbind group: files winbind + .fi .PP -In \fI/etc/pam.d/*\fR replace the \fI auth\fR lines with something like this: +In \fI/etc/pam.d/*\fR replace the +\fIauth\fR lines with something like this: +.PP .nf auth required /lib/security/pam_securetty.so auth required /lib/security/pam_nologin.so auth sufficient /lib/security/pam_winbind.so auth required /lib/security/pam_pwdb.so use_first_pass shadow nullok + .fi .PP -Note in particular the use of the \fIsufficient -\fR keyword and the \fIuse_first_pass\fR keyword. +Note in particular the use of the \fIsufficient\fR +keyword and the \fIuse_first_pass\fR keyword. .PP Now replace the account lines with this: .PP @@ -241,24 +214,27 @@ Now replace the account lines with this: \fR .PP The next step is to join the domain. To do that use the -\fBnet\fR program like this: +\fBsmbpasswd\fR program like this: .PP -\fBnet join -S PDC -U Administrator\fR +\fBsmbpasswd -j DOMAIN -r PDC -U +Administrator\fR .PP The username after the \fI-U\fR can be any Domain user that has administrator privileges on the machine. -Substitute the name or IP of your PDC for "PDC". +Substitute your domain name for "DOMAIN" and the name of your PDC +for "PDC". .PP Next copy \fIlibnss_winbind.so\fR to -\fI/lib\fR and \fIpam_winbind.so -\fR to \fI/lib/security\fR. A symbolic link needs to be +\fI/lib\fR and \fIpam_winbind.so\fR +to \fI/lib/security\fR. A symbolic link needs to be made from \fI/lib/libnss_winbind.so\fR to \fI/lib/libnss_winbind.so.2\fR. If you are using an older version of glibc then the target of the link should be \fI/lib/libnss_winbind.so.1\fR. .PP -Finally, setup a \fBsmb.conf\fR(5) containing directives like the -following: +Finally, setup a \fIsmb.conf\fR containing directives like the +following: +.PP .nf [global] @@ -271,6 +247,7 @@ following: workgroup = DOMAIN security = domain password server = * + .fi .PP Now start winbindd and you should find that your user and @@ -284,12 +261,17 @@ commands \fBgetent passwd\fR and \fBgetent group The following notes are useful when configuring and running \fBwinbindd\fR: .PP -\fBnmbd\fR(8) must be running on the local machine -for \fBwinbindd\fR to work. \fBwinbindd\fR queries -the list of trusted domains for the Windows NT server +\fBnmbd\fR must be running on the local machine +for \fBwinbindd\fR to work. \fBwinbindd\fR +queries the list of trusted domains for the Windows NT server on startup and when a SIGHUP is received. Thus, for a running \fB winbindd\fR to become aware of new trust relationships between servers, it must be sent a SIGHUP signal. .PP +Client processes resolving names through the \fBwinbindd\fR +nsswitch module read an environment variable named \fB $WINBINDD_DOMAIN\fR. If this variable contains a comma separated +list of Windows NT domain names, then winbindd will only resolve users +and groups within those Windows NT domains. +.PP PAM is really easy to misconfigure. Make sure you know what you are doing when modifying PAM configuration files. It is possible to set up PAM such that you can no longer log into your system. @@ -307,8 +289,8 @@ The following signals can be used to manipulate the \fBwinbindd\fR daemon. .TP \fBSIGHUP\fR -Reload the \fBsmb.conf\fR(5) file and -apply any parameter changes to the running +Reload the \fIsmb.conf(5)\fR +file and apply any parameter changes to the running version of winbindd. This signal also clears any cached user and group information. The list of other domains trusted by winbindd is also reloaded. @@ -333,19 +315,6 @@ if both the \fI/tmp/.winbindd\fR directory and \fI/tmp/.winbindd/pipe\fR file are owned by root. .TP -\fB$LOCKDIR/winbindd_privilaged/pipe\fR -The UNIX pipe over which 'privilaged' clients -communicate with the \fBwinbindd\fR program. For security -reasons, access to some winbindd functions - like those needed by -the \fBntlm_auth\fR utility - is restricted. By default, -only users in the 'root' group will get this access, however the administrator -may change the group permissions on $LOCKDIR/winbindd_privilaged to allow -programs like 'squid' to use ntlm_auth. -Note that the winbind client will only attempt to connect to the winbindd daemon -if both the \fI$LOCKDIR/winbindd_privilaged\fR directory -and \fI$LOCKDIR/winbindd_privilaged/pipe\fR file are owned by -root. -.TP \fB/lib/libnss_winbind.so.X\fR Implementation of name service switch library. .TP @@ -364,7 +333,10 @@ This man page is correct for version 3.0 of the Samba suite. .SH "SEE ALSO" .PP -\fInsswitch.conf(5)\fR, \fBSamba\fR(7), \fBwbinfo\fR(8), \fBsmb.conf\fR(5) +\fInsswitch.conf(5)\fR, +samba(7) +wbinfo(1) +smb.conf(5) .SH "AUTHOR" .PP The original Samba software and related utilities @@ -372,9 +344,8 @@ were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed. .PP -\fBwbinfo\fR and \fBwinbindd\fR were -written by Tim Potter. +\fBwbinfo\fR and \fBwinbindd\fR +were written by Tim Potter. .PP The conversion to DocBook for Samba 2.2 was done -by Gerald Carter. The conversion to DocBook XML 4.2 for -Samba 3.0 was done by Alexander Bokovoy. +by Gerald Carter diff --git a/docs/textdocs/CreatingGroupProfiles-Win2K.txt b/docs/textdocs/CreatingGroupProfiles-Win2K.txt new file mode 100644 index 00000000000..11a326bafb8 --- /dev/null +++ b/docs/textdocs/CreatingGroupProfiles-Win2K.txt @@ -0,0 +1,112 @@ +You must first convert the profile from a local profile to a domain +profile on the MS Windows workstation as follows: + +1. Log on as the LOCAL workstation administrator. + +2. Right click on the 'My Computer' Icon, select 'Properties' + +3. Click on the 'User Profiles' tab + +4. Select the profile you wish to convert (click on it once) + +5. Click on the button 'Copy To' + +6. In the "Permitted to use" box, click on the 'Change' button. + +7. Click on the 'Look in" area that lists the machine name, when you click +here it will open up a selection box. Click on the domain to which the +profile must be accessible. + +Note: You will need to log on if a logon box opens up. Eg: In the connect +as: MIDEARTH\root, password: mypassword. + +8. To make the profile capable of being used by anyone select 'Everyone' + +9. Click OK. The Selection box will close. + +10. Now click on the 'Ok' button to create the profile in the path you +nominated. + +Done. You now have a profile that can be editted using the samba-3.0.0 +profiles tool. + + + +> Keep profiles clean and small by making them mandatory. +> See the Win2K/WinXP resource kits for details how to create a mandatory profile. +> +> Can you do this when using Samba as a PDC? I thought you could only do +> policies if you had a Win2K server? + +No difference. Samba handles the profile ACLs the same way Win2K does. +But understand that it is the Win2K client that does all the processing +of the SIDs on the ACLs in the profile NTUser.DAT file. + + +Note: +----- +> Unless your users are using Outlook (or virtually any E-mail client for +> that matter) I have a few users with .PST files that are over 1Gig in +> size. This is due to the regular amount of data files that we are sent. I +> have discussed with them the need to trim those files down. + +Under NT/2K the use of mandotory profiles forces the use of MS Exchange +storage of mail data. That keeps desktop profiles usable. + + +Note: +----- + Date: Tue, 19 Nov 2002 08:32:17 -0000 + From: John Russell + Reply-To: John Russell + To: samba@lists.samba.org + Subject: Re: [Samba] Samba and Windows XP + + [ The following text is in the "iso-8859-1" character set. ] + [ Your display is set for the "US-ASCII" character set. ] + [ Some characters may be displayed incorrectly. ] + + this is a security check new to Windows XP (or maybe only + Windows XP service pack 1). It can be disabled via a group policy in + Active Directory. The policy is: + + "Computer Configuration\Administrative Templates\System\User + Profiles\Do not check for user ownership of Roaming Profile Folders" + + ...and it should be set to "Enabled". + + Does the new version of samba have an Active Directory analogue? If so, + then you may be able to set the policy through this. + + If you cannot set group policies in samba, then you may be able to set + the policy locally on each machine. If you want to try this, then do + the following (N.B. I don't know for sure that this will work in the + same way as a domain group policy): + + On the XP workstation log in with an Administrator account. + + Click: "Start", "Run" + Type: "mmc" + Click: "OK" + + A Microsoft Management Console should appear. + Click: File, "Add/Remove Snap-in...", "Add" + Double-Click: "Group Policy" + Click: "Finish", "Close" + Click: "OK" + + In the "Console Root" window: + Expand: "Local Computer Policy", "Computer Configuration", + "Administrative Templates", "System", "User Profiles" + Double-Click: "Do not check for user ownership of Roaming Profile + Folders" + Select: "Enabled" + Click: OK" + + Close the whole console. You do not need to save the settings (this + refers to the console settings rather than the policies you have + changed). + + Reboot. + + diff --git a/docs/textdocs/CreatingGroupProfiles-Win9X.txt b/docs/textdocs/CreatingGroupProfiles-Win9X.txt new file mode 100644 index 00000000000..3d9c239a611 --- /dev/null +++ b/docs/textdocs/CreatingGroupProfiles-Win9X.txt @@ -0,0 +1,58 @@ +To : "C.Lee Taylor" +Cc : Bart , + samba@lists.samba.org +Attchmnt: +Subject : Re: [Samba] Profiles ... +----- Message Text ----- +On Fri, 17 Jan 2003, C.Lee Taylor wrote: + +> John H Terpstra wrote: +> > On Thu, 16 Jan 2003, C.Lee Taylor wrote: +> > +> > +> >>Bart wrote: +> >> +> >>>Or ju put the documents on the home drive and change the target of the +> >>>'my documents' folder to this home drive. +> >>> +> >>>that way you have security & all the docs on a mounted drive. +> >> +> >> We did that with Win98SE, and found that some times it would change +> >>back or to something that should cause problems ... that is why I was +> >>hoping, there was away around this ... but then it seems not. +> > +> > +> > Did you check the Win98 Resource Kit for how to configure this? +> No, just searched the registery for the set strings, changed them and +> tested. Also used support.microsoft.com for other info ... Don't have +> access to the Resource kits, unless they have not put them up on the net +> and it's legal for us to use them wihtout paying? + +That method does not work well. You need the Win98 Group Policy Editor to +set this up. It can be found on the Original full product Win98 +installation CD under tools/reskit/netadmin/poledit. You install this +using the Add/Remove Programs facility and then click on the 'Have Disk' +tab. + +Use the Group Policy Editor to create a policy file that specifies the +location of user profiles and/or the 'My Documents' etc. stuff. You then +save these settings in a file called Config.POL that needs to be placed in +the root of the [NETLOGON] share. If your Win98 is configured to log onto +the Samba Domain, it will automatically read this file and update the +Win98 registry of the machine that is logging on. + +All of this is covered in the Win98 Resource Kit documentation. + +If you do not do it this way, then every so often Win98 will check the +integrity of the registry and will restore it's settings from the back-up +copy of the registry it stores on each Win98 machine. Hence, your symptoms +of things changing back to original settings. + +Hope this helps. I have omitted quite a lot of detail you will need to +figure out. Yell if you need more help. + +- John T. +-- +John H Terpstra +Email: jht@samba.org + diff --git a/docs/textdocs/CreatingGroupProfilesInNT4.txt b/docs/textdocs/CreatingGroupProfilesInNT4.txt new file mode 100644 index 00000000000..666788643e1 --- /dev/null +++ b/docs/textdocs/CreatingGroupProfilesInNT4.txt @@ -0,0 +1,71 @@ +Unfortunately, the Resource Kit info is Win NT4/2K version specific. + +Here is a quick guide: + +1. On your NT4 Domain Controller, right click on 'My Computer', then +select the tab labelled 'User Profiles'. + +2. Select a user profile you want to migrate and click on it. + +Note: I am using the term "migrate" lossely. You can copy a profile to +create a group profile. You can give the user 'Everyone' rights to the +profile you copy this to. That is what you need to do, since your samba +domain is not a member of a trust relationship with your NT4 PDC. + +3. Click the 'Copy To' button. + +4. In the box labelled 'Copy Profile to' add your new path, eg: +c:\temp\foobar + +5. Click on the button labelled 'Change' in the "Permitted to use" box. + +6. Click on the group 'Everyone' and then click OK. This closes the +'chose user' box. + +7. Now click OK. + +Follow the above for every profile you need to migrate. + + +Side bar Notes: +--------------- +You should obtain the SID of your NT4 domain. You can use smbpasswd to do +this. Read the man page. + +With Samba-3.0.0 alpha code you can import all you NT4 domain accounts +using the net samsync method. This way you can retain your profile +settings as well as all your users. + +Also Note: +---------- +The above method can be used to create mandatory profiles also. To convert +a group profile into a mandatory profile simply locate the NTUser.DAT file +in the copied profile and rename it to NTUser.MAN. + + +Next Note: +---------- +The W2K professional resource kit has moveuser.exe: + +Description: + + moveuser.exe changes the security of a profile from one user to another. + This allows the account domain to change, and/or the user name to change. + + +Next Note: +---------- +You can identify the SID by using GetSID.exe from the Windows NT Server 4.0 +Resource Kit. + +Windows NT 4.0 stores the local profile information in the registry under +the following key: +HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList + +Under the ProfileList key, there will be subkeys named with the SIDs of the +users who have logged on to this computer. (To find the profile information +for the user whose locally cached profile you want to move, find the SID for +the user with the GetSID.exe utility.) Inside of the appropriate user's +subkey, you will see a string value named ProfileImagePath. + + diff --git a/docs/textdocs/RoutedNetworks.txt b/docs/textdocs/RoutedNetworks.txt new file mode 100644 index 00000000000..fb55f9f9bf0 --- /dev/null +++ b/docs/textdocs/RoutedNetworks.txt @@ -0,0 +1,63 @@ +#NOFNR Flag in LMHosts to Communicate Across Routers + + Last reviewed: May 5, 1997 + Article ID: Q103765 + The information in this article applies to: + + Microsoft Windows NT operating system version 3.1 + Microsoft Windows NT Advanced Server version 3.1 + + SUMMARY + + Some of the LAN Manager for UNIX and Pathworks servers may have +problems in communicating across routers with + Windows NT workstations. The use of #NOFNR flag in the LMHosts +file solves the problem. + + MORE INFORMATION + + When you are communicating with a server across a router in a IP +routed environment, the LMHosts file is used to + resolve Workstation name-to-IP address mapping. The LMHosts +entry for a remote machine name provides the IP + address for the remote machine. In Lan Manager 2.x, providing +the LMHosts entry eliminates the need to do a Name + Query broadcast to the local domain and instead a TCP session is +established with the remote machine. Windows NT + performs the same function in a different way. + + When an LMHosts entry exists for a remote server, Windows NT +will not send a Name Query broadcast to the local + subnet and instead send a directed Name Query to the remote +server. If the remote server does not respond to the Name + Query, further communications (TCP SYN, and so on) will not take +place. This was done to eliminate the performance + issues when trying to connect to a remote machine when it was +not available (down). + + Some of the older LAN Manager for UNIX and DEC Pathworks servers +do not respond to directed Name Queries sent + by Windows NT. In that case, the users will see an error 53 +(Path not found), even though they have specified the + LMHosts entries correctly. A new LMHosts flag #NOFNR was added +to solve this problem. By specifying the + #NOFNR flag on the same line where the name resolution +information for the server is provided, the directed Name + Query can be avoided. For example: + + 130.20.1.1 mylmxserver #PRE #NOFNR + + + Note that this will only apply to mylmxserver and not to any +other entries in the LMHosts file. To set + a global flag, an entry could be added in the registry. To +completely remove any directed Name + Queries sent from a Windows NT machine, create the following +value in + +HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Nbt\Parameters: + + NoDirectedFNR REG_DWORD 1 + + + This will cause the directed Name Queries to not go out for any diff --git a/examples/LDAP/export_smbpasswd.pl b/examples/LDAP/export_smbpasswd.pl new file mode 100644 index 00000000000..3f67dc62427 --- /dev/null +++ b/examples/LDAP/export_smbpasswd.pl @@ -0,0 +1,63 @@ +#!/usr/bin/perl +## +## Example script to export ldap entries into an smbpasswd file format +## using the Mozilla PerLDAP module. +## +## writen by jerry@samba.org +## + +use Mozilla::LDAP::Conn; +use Mozilla::LDAP::Entry; + +###################################################### +## Set these values to whatever you need for your site +## + +$DN="ou=people,dc=plainjoe,dc=org"; +$ROOTDN="cn=Manager,dc=plainjoe,dc=org"; +$rootpw = "secret"; +$LDAPSERVER="localhost"; + +## +## end local site variables +###################################################### + + +$conn = new Mozilla::LDAP::Conn ("$LDAPSERVER", "389", $ROOTDN, $rootpw ); +die "Unable to connect to LDAP server $LDAPSERVER" unless $conn; + +print "##\n"; +print "## Autogenerated smbpasswd file via ldapsearch\n"; +print "## from $LDAPSERVER ($DN)\n"; +print "##\n"; + +## scheck for the existence of the posixAccount first +$result = $conn->search ("$DN", "sub", "(objectclass=smbPasswordEntry)"); + + +## loop over the entries we found +while ($result) { + + @uid = $result->getValue("uid"); + @uidNumber = $result->getValue("uidNumber"); + @lm_pw = $result->getValue("lmpassword"); + @nt_pw = $result->getValue("ntpassword"); + @acct = $result->getValue("acctFlags"); + @pwdLastSet = $result->getValue("pwdLastSet"); + + if (($#uid+1) && ($#uidNumber+1)) { + + $lm_pw[0] = "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX" if (! ($#lm_pw+1)); + $nt_pw[0] = "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX" if (! ($#nt_pw+1)); + $acct[0] = "[DU ]" if (! ($#acct+1)); + $pwdLastSet[0] = "FFFFFFFF" if (! ($#pwdLastSet+1)); + + print "$uid[0]:$uidNumber[0]:$lm_pw[0]:$nt_pw[0]:$acct[0]:LCT-$pwdLastSet[0]\n"; + } + + $result = $conn->nextEntry(); + +} + +$conn->close(); +exit 0; diff --git a/examples/LDAP/import_smbpasswd.pl b/examples/LDAP/import_smbpasswd.pl new file mode 100644 index 00000000000..14aeff967f1 --- /dev/null +++ b/examples/LDAP/import_smbpasswd.pl @@ -0,0 +1,65 @@ +#!/usr/bin/perl +## +## Example script of how you could import and smbpasswd file into an LDAP +## directory using the Mozilla PerLDAP module. +## +## writen by jerry@samba.org +## + +use Mozilla::LDAP::Conn; +use Mozilla::LDAP::Entry; + +################################################# +## set these to a value appropriate for your site +## + +$DN="ou=people,dc=plainjoe,dc=org"; +$ROOTDN="cn=Manager,dc=plainjoe,dc=org"; +$rootpw = "secret"; +$LDAPSERVER="localhost"; + +## +## end local site variables +################################################# + +$conn = new Mozilla::LDAP::Conn ("$LDAPSERVER", "389", $ROOTDN, $rootpw ); +die "Unable to connect to LDAP server $LDAPSERVER" unless $conn; + + +while ( $string = ) { + chop ($string); + + ## get the account information + @smbentry = split (/:/, $string); + + ## check for the existence of the posixAccount first + + ## FIXME!! Should do a getownam() and let the NSS modules lookup the account + ## This way you can have a UNIX account in /etc/passwd and the smbpasswd i + ## entry in LDAP. + $result = $conn->search ("$DN", "sub", "(&(uid=$smbentry[0])(objectclass=posixAccount))"); + if ( ! $result ) { + print STDERR "uid=$smbentry[0] does not have a posixAccount entry in the directory!\n"; + next; + } + + print "Updating [" . $result->getDN() . "]\n"; + + ## Do we need to add the 'objectclass: smbPasswordEntry' attribute? + if (! $result->hasValue("objectclass", "smbPasswordEntry")) { + $result->addValue("objectclass", "smbPasswordEntry"); + } + + ## Set other attribute values + $result->setValues ("lmPassword", $smbentry[2]); + $result->setValues ("ntPassword", $smbentry[3]); + $result->setValues ("acctFlags", $smbentry[4]); + $result->setValues ("pwdLastSet", substr($smbentry[5],4)); + + if (! $conn->update($result)) { + print "Error updating!\n"; + } +} + +$conn->close(); +exit 0; diff --git a/examples/LDAP/samba.schema b/examples/LDAP/samba.schema index a4435564ecd..e801e0b8479 100644 --- a/examples/LDAP/samba.schema +++ b/examples/LDAP/samba.schema @@ -167,11 +167,11 @@ objectclass ( 1.3.6.1.4.1.7165.2.2.4 NAME 'sambaGroupMapping' SUP top AUXILIARY ## ## Used for Winbind experimentation ## -objectclass ( 1.3.6.1.4.1.7165.1.2.2.3 NAME 'uidPool' SUP top AUXILIARY - DESC 'Pool for allocating UNIX uids' - MUST ( uidNumber $ cn ) ) +#objectclass ( 1.3.6.1.4.1.7165.1.2.2.3 NAME 'uidPool' SUP top AUXILIARY +# DESC 'Pool for allocating UNIX uids' +# MUST ( uidNumber $ cn ) ) -objectclass ( 1.3.6.1.4.1.7165.1.2.2.4 NAME 'gidPool' SUP top AUXILIARY - DESC 'Pool for allocating UNIX gids' - MUST ( gidNumber $ cn ) ) +#objectclass ( 1.3.6.1.4.1.7165.1.2.2.4 NAME 'gidPool' SUP top AUXILIARY +# DESC 'Pool for allocating UNIX gids' +# MUST ( gidNumber $ cn ) ) diff --git a/examples/libsmbclient/testsmbc.c b/examples/libsmbclient/testsmbc.c index 9af845a5eab..888a9c0d4f9 100644 --- a/examples/libsmbclient/testsmbc.c +++ b/examples/libsmbclient/testsmbc.c @@ -103,7 +103,7 @@ int main(int argc, char *argv[]) } - fprintf(stdout, "Directory handles: %u\n", dh1); + fprintf(stdout, "Directory handles: %u, %u, %u\n", dh1, dh2, dh3); /* Now, list those directories, but in funny ways ... */ diff --git a/examples/pdb/README b/examples/pdb/README index 7fe45248824..561473129b0 100644 --- a/examples/pdb/README +++ b/examples/pdb/README @@ -1,7 +1,46 @@ README for Samba Password Database (PDB) examples ==================================================== -Jelmer Vernooij -Stefan (metze) Metzmacher +8-8-2002 Jelmer Vernooij + +Added mysql and xml modules. See README in xml/ and mysql/ for details. + +21-6-2002 Stefan (metze) Metzmacher + +I have added an interface versioning. + +Every module MUST have a pdb_version() function. + +this is defined in include/passdb.h: +#define PDB_MODULE_VERSIONING_MAGIC \ +int pdb_version(void)\ +{\ + return PASSDB_INTERFACE_VERSION;\ +} + +You MUST add this line inside a module: +PDB_MODULE_VERSIONING_MAGIC + +21-6-2002 Stefan (metze) Metzmacher + +The pdb_interface was changed: + +this function are deleted: +static BOOL testsam_getsampwrid (struct pdb_methods *methods, SAM_ACCOUNT *user, uint32 rid) + +this function are added: +static BOOL testsam_getsampwsid (struct pdb_methods *methods, SAM_ACCOUNT *user, DOM_SID sid) + +In the SAM_ACCOUNT struct: + +this fields are deleted: +uint32 user_rid; +uint32 group_rid; + +this fields are added: +DOM_SID user_sid; +DOM_SID group_sid; + +15-2-2002 Jelmer Vernooij The pdb_test.c file in this directory contains a very basic example of a pdb plugin. It just prints the name of the function that is executed using @@ -11,5 +50,6 @@ future too.. To debug passdb backends, try to run gdb on the 'pdbedit' executable. That's really much easier than restarting smbd constantly and attaching with your debugger. New passdb plugins should go into the samba lib directory, (/usr/lib/samba/ for -most distributions). An example would be: /usr/lib/samba/test.so +most distributions) and should be prefixed with 'pdb_'. An example would be: +/usr/lib/samba/pdb_test.so diff --git a/examples/pdb/pdb_test.c b/examples/pdb/pdb_test.c index f5fb57ddb20..c5ba094e42c 100644 --- a/examples/pdb/pdb_test.c +++ b/examples/pdb/pdb_test.c @@ -25,6 +25,9 @@ static int testsam_debug_level = DBGC_ALL; #undef DBGC_CLASS #define DBGC_CLASS testsam_debug_level +/* define the version of the passdb interface */ +PDB_MODULE_VERSIONING_MAGIC + /*************************************************************** Start enumeration of the passwd list. ****************************************************************/ @@ -104,7 +107,7 @@ static NTSTATUS testsam_add_sam_account (struct pdb_methods *methods, SAM_ACCOUN return NT_STATUS_NOT_IMPLEMENTED; } -NTSTATUS testsam_init(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_method, const char *location) +NTSTATUS pdb_init(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_method, const char *location) { NTSTATUS nt_status; @@ -138,12 +141,3 @@ NTSTATUS testsam_init(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_method, const return NT_STATUS_OK; } - -int init_module(void); - -int init_module() { - if(smb_register_passdb("testsam", testsam_init, PASSDB_INTERFACE_VERSION)) - return 0; - - return 1; -} diff --git a/examples/printing/smbprint.old b/examples/printing/smbprint.old deleted file mode 100755 index 5a00a2a8aa8..00000000000 --- a/examples/printing/smbprint.old +++ /dev/null @@ -1,95 +0,0 @@ -#!/bin/sh - -# This script is an input filter for printcap printing on a unix machine. It -# uses the smbclient program to print the file to the specified smb-based -# server and service. -# For example you could have a printcap entry like this -# -# smb:lp=/dev/null:sd=/usr/spool/smb:sh:if=/usr/local/samba/smbprint -# -# which would create a unix printer called "smb" that will print via this -# script. You will need to create the spool directory /usr/spool/smb with -# appropriate permissions and ownerships for your system. - -# Set these to the server and service you wish to print to -# In this example I have a WfWg PC called "lapland" that has a printer -# exported called "printer" with no password. - -# -# Script further altered by hamiltom@ecnz.co.nz (Michael Hamilton) -# so that the server, service, and password can be read from -# a /usr/var/spool/lpd/PRINTNAME/.config file. -# -# Script further modified by Richard Sharpe to fix some things. -# Get rid of the -x on the first line, and add parameters -# -# -t now causes translate to be used when sending files -# -# In order for this to work the /etc/printcap entry must include an -# accounting file (af=...): -# -# cdcolour:\ -# :cm=CD IBM Colorjet on 6th:\ -# :sd=/var/spool/lpd/cdcolour:\ -# :af=/var/spool/lpd/cdcolour/acct:\ -# :if=/usr/local/etc/smbprint:\ -# :mx=0:\ -# :lp=/dev/null: -# -# The /usr/var/spool/lpd/PRINTNAME/.config file should contain: -# server=PC_SERVER -# service=PR_SHARENAME -# password="password" -# -# E.g. -# server=PAULS_PC -# service=CJET_371 -# password="" - -# -# Debugging log file, change to /dev/null if you like. -# -logfile=/tmp/smb-print.log -# logfile=/dev/null - - -# -# The last parameter to the filter is the accounting file name. -# Extract the directory name from the file name. -# Concat this with /.config to get the config file. -# -TRANS=0 -eval acct_file=\${$#} -spool_dir=`dirname $acct_file` -config_file=$spool_dir/.config - -# Should read the following variables set in the config file: -# server -# service -# password -eval `cat $config_file` - -while getopts t c; do - case $c in - t) - TRANS=1 - ;; - - '?') # Bad parameters, ignore it ... - ;; - esac -done -# -# Some debugging help, change the >> to > if you want to same space. -# -echo "server $server, service $service" >> $logfile - -( -# NOTE You may wish to add the line `echo translate' if you want automatic -# CR/LF translation when printing. - if [ $TRANS -eq 1 ]; then - echo translate - fi - echo "print -" - cat -) | /usr/local/samba/bin/smbclient "\\\\$server\\$service" $password -U $server -N -P >> $logfile diff --git a/examples/sam/.cvsignore b/examples/sam/.cvsignore deleted file mode 100644 index f3c7a7c5da6..00000000000 --- a/examples/sam/.cvsignore +++ /dev/null @@ -1 +0,0 @@ -Makefile diff --git a/examples/sam/Makefile.in b/examples/sam/Makefile.in deleted file mode 100644 index d5df346a8c4..00000000000 --- a/examples/sam/Makefile.in +++ /dev/null @@ -1,28 +0,0 @@ -CC = @CC@ -CFLAGS = @CFLAGS@ -CPPFLAGS = @CPPFLAGS@ -LDFLAGS = @LDFLAGS@ -LDSHFLAGS = -shared -srcdir = @builddir@ -FLAGS = $(CFLAGS) -Iinclude -I$(srcdir)/include -I$(srcdir)/ubiqx -I$(srcdir)/smbwrapper -I. $(CPPFLAGS) -I$(srcdir) - -SAM_OBJS = sam_skel.so - -# Default target - -default: $(SAM_OBJS) - -# Pattern rules - -%.so: %.o - $(CC) $(LDSHFLAGS) $(LDFLAGS) -o $@ $< - -%.o: %.c - $(CC) $(FLAGS) -c $< - -# Misc targets - -clean: - rm -rf .libs - rm -f core *~ *% *.bak \ - $(SAM_OBJ) $(SAM_OBJS) diff --git a/examples/sam/README b/examples/sam/README deleted file mode 100644 index 9e9fbb26db3..00000000000 --- a/examples/sam/README +++ /dev/null @@ -1,29 +0,0 @@ -README for Samba SAM Database examples -==================================================== -26-08-2002 Stefan (metze) Metzmacher - -Every module MUST have a sam_version() function. - -this is defined in include/sam.h: -#define SAM_MODULE_VERSIONING_MAGIC \ -int sam_version(void)\ -{\ - return SAM_INTERFACE_VERSION;\ -} - -You MUST add this line inside a module: -SAM_MODULE_VERSIONING_MAGIC - - -The sam_skel.c file in this directory contains a very basic example of -a SAM plugin. It just prints the name of the function that is executed using -DEBUG. Maybe it's nice to include some of the arguments to the function in the -future too.. - -New SAM plugins should go into the samba lib directory, (/usr/lib/samba/ -for most distributions) and should be prefixed with 'sam_' and should go into the -subdir sam/. The SAM subsystem will search in /usr/lib/samba/sam and fall back to -/usr/lib/samba/ . -An example path would be: -/usr/lib/samba/sam/sam_skel.so - diff --git a/examples/sam/sam_skel.c b/examples/sam/sam_skel.c deleted file mode 100644 index da3a3758947..00000000000 --- a/examples/sam/sam_skel.c +++ /dev/null @@ -1,250 +0,0 @@ -/* - Unix SMB/CIFS implementation. - this is a skeleton for SAM backend modules. - - Copyright (C) Stefan (metze) Metzmacher 2002 - Copyright (C) Jelmer Vernooij 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" - -static int sam_skel_debug_level = DBGC_SAM; - -#undef DBGC_CLASS -#define DBGC_CLASS sam_skel_debug_level - -/* define the version of the SAM interface */ -SAM_MODULE_VERSIONING_MAGIC - -/* General API */ - -NTSTATUS sam_skel_get_sec_desc(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, const DOM_SID *sid, SEC_DESC **sd) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_skel_set_sec_desc(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, const DOM_SID *sid, const SEC_DESC *sd) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - - -NTSTATUS sam_skel_lookup_sid(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, const DOM_SID *sid, char **name, uint32 *type) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_skel_lookup_name(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, const char *name, DOM_SID **sid, uint32 *type) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - - -/* Domain API */ - -NTSTATUS sam_skel_update_domain(const SAM_METHODS *sam_methods, const SAM_DOMAIN_HANDLE *domain) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_skel_get_domain_handle(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint32 access_desired, SAM_DOMAIN_HANDLE **domain) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - - -/* Account API */ - -NTSTATUS sam_skel_create_account(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint32 access_desired, const char *group_name, uint16 acct_ctrl, SAM_ACCOUNT_HANDLE **account) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_skel_add_account(const SAM_METHODS *sam_methods, const SAM_ACCOUNT_HANDLE *account) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_skel_update_account(const SAM_METHODS *sam_methods, const SAM_ACCOUNT_HANDLE *account) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_skel_delete_account(const SAM_METHODS *sam_methods, const SAM_ACCOUNT_HANDLE *account) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_skel_enum_accounts(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint16 acct_ctrl, uint32 *account_count, SAM_ACCOUNT_ENUM **accounts) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - - -NTSTATUS sam_skel_get_account_by_sid(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint32 access_desired, const DOM_SID *accountsid, SAM_ACCOUNT_HANDLE **account) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_skel_get_account_by_name(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint32 access_desired, const char *name, SAM_ACCOUNT_HANDLE **account) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - - -/* Group API */ - -NTSTATUS sam_skel_create_group(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint32 access_desired, const char *account_name, uint16 group_ctrl, SAM_GROUP_HANDLE **group) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_skel_add_group(const SAM_METHODS *sam_methods, const SAM_GROUP_HANDLE *group) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_skel_update_group(const SAM_METHODS *sam_methods, const SAM_GROUP_HANDLE *group) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_skel_delete_group(const SAM_METHODS *sam_methods, const SAM_GROUP_HANDLE *group) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_skel_enum_groups(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint16 group_ctrl, uint32 *groups_count, SAM_GROUP_ENUM **groups) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_skel_get_group_by_sid(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint32 access_desired, const DOM_SID *groupsid, SAM_GROUP_HANDLE **group) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_skel_get_group_by_name(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint32 access_desired, const char *name, SAM_GROUP_HANDLE **group) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - - -NTSTATUS sam_skel_add_member_to_group(const SAM_METHODS *sam_methods, const SAM_GROUP_HANDLE *group, const SAM_GROUP_MEMBER *member) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_skel_delete_member_from_group(const SAM_METHODS *sam_methods, const SAM_GROUP_HANDLE *group, const SAM_GROUP_MEMBER *member) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_skel_enum_groupmembers(const SAM_METHODS *sam_methods, const SAM_GROUP_HANDLE *group, uint32 *members_count, SAM_GROUP_MEMBER **members) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - - -NTSTATUS sam_skel_get_groups_of_sid(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, const DOM_SID **sids, uint16 group_ctrl, uint32 *group_count, SAM_GROUP_ENUM **groups) -{ - DEBUG(0,("sam_skel: %s was called!\n",__FUNCTION__)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_init(SAM_METHODS *sam_methods, const char *module_params) -{ - /* Functions your SAM module doesn't provide should be set - * to NULL */ - - sam_methods->sam_get_sec_desc = sam_skel_get_sec_desc; - sam_methods->sam_set_sec_desc = sam_skel_set_sec_desc; - - sam_methods->sam_lookup_sid = sam_skel_lookup_sid; - sam_methods->sam_lookup_name = sam_skel_lookup_name; - - /* Domain API */ - - sam_methods->sam_update_domain = sam_skel_update_domain; - sam_methods->sam_get_domain_handle = sam_skel_get_domain_handle; - - /* Account API */ - - sam_methods->sam_create_account = sam_skel_create_account; - sam_methods->sam_add_account = sam_skel_add_account; - sam_methods->sam_update_account = sam_skel_update_account; - sam_methods->sam_delete_account = sam_skel_delete_account; - sam_methods->sam_enum_accounts = sam_skel_enum_accounts; - - sam_methods->sam_get_account_by_sid = sam_skel_get_account_by_sid; - sam_methods->sam_get_account_by_name = sam_skel_get_account_by_name; - - /* Group API */ - - sam_methods->sam_create_group = sam_skel_create_group; - sam_methods->sam_add_group = sam_skel_add_group; - sam_methods->sam_update_group = sam_skel_update_group; - sam_methods->sam_delete_group = sam_skel_delete_group; - sam_methods->sam_enum_groups = sam_skel_enum_groups; - sam_methods->sam_get_group_by_sid = sam_skel_get_group_by_sid; - sam_methods->sam_get_group_by_name = sam_skel_get_group_by_name; - - sam_methods->sam_add_member_to_group = sam_skel_add_member_to_group; - sam_methods->sam_delete_member_from_group = sam_skel_delete_member_from_group; - sam_methods->sam_enum_groupmembers = sam_skel_enum_groupmembers; - - sam_methods->sam_get_groups_of_sid = sam_skel_get_groups_of_sid; - - sam_methods->free_private_data = NULL; - - - sam_skel_debug_level = debug_add_class("sam_skel"); - if (sam_skel_debug_level == -1) { - sam_skel_debug_level = DBGC_SAM; - DEBUG(0, ("sam_skel: Couldn't register custom debugging class!\n")); - } else DEBUG(2, ("sam_skel: Debug class number of 'sam_skel': %d\n", sam_skel_debug_level)); - - if(module_params) - DEBUG(0, ("Starting 'sam_skel' with parameters '%s' for domain %s\n", module_params, sam_methods->domain_name)); - else - DEBUG(0, ("Starting 'sam_skel' for domain %s without paramters\n", sam_methods->domain_name)); - - return NT_STATUS_OK; -} diff --git a/packaging/README b/packaging/README index ce651377907..1cf147f3f9f 100644 --- a/packaging/README +++ b/packaging/README @@ -1,7 +1,8 @@ -Copyright (C) 1997-1998 Samba-Team +Copyright (C) 1997-2003 Samba-Team Date: November 16, 1998 Updates: First Release - 19970819 19981116 + 20030329 =============================================================================== Note: @@ -36,3 +37,10 @@ ability to keep the binary distribution itself current with the released source. The future of cooperatively developed software such as Samba depends on the willingness of all partners to share the fruit of their labours. + +If you have a compelling need for binary packages for your platform and it is +not available from this packaging repository please notify jht@samba.org. We +can not guarrantee our ability to satisfy your need, but your feedback may help +us to find a solution. + +- John T. diff --git a/packaging/RedHat/makerpms.sh.tmpl b/packaging/RedHat/makerpms.sh.tmpl index 9d71452db8e..3c4ff40ddc8 100644 --- a/packaging/RedHat/makerpms.sh.tmpl +++ b/packaging/RedHat/makerpms.sh.tmpl @@ -37,23 +37,19 @@ case $RPMVER in 2*) echo Building for RPM v2.x sed -e "s/MANDIR_MACRO/\%\{prefix\}\/man/g" < samba2.spec > samba.spec - sed -e "s/MANDIR_MACRO/\%\{prefix\}\/man/g" < samba2-devel.spec > samba-devel.spec ;; 3*) echo Building for RPM v3.x sed -e "s/MANDIR_MACRO/\%\{prefix\}\/man/g" < samba2.spec > samba.spec - sed -e "s/MANDIR_MACRO/\%\{prefix\}\/man/g" < samba2-devel.spec > samba-devel.spec ;; 4.1*) echo Building for RPM v4.1 RPM="rpmbuild" sed -e "s/MANDIR_MACRO/\%\{_mandir\}/g" < samba2.spec > samba.spec - sed -e "s/MANDIR_MACRO/\%\{_mandir\}/g" < samba2-devel.spec > samba-devel.spec ;; 4*) echo Building for RPM v4.x sed -e "s/MANDIR_MACRO/\%\{_mandir\}/g" < samba2.spec > samba.spec - sed -e "s/MANDIR_MACRO/\%\{_mandir\}/g" < samba2-devel.spec > samba-devel.spec ;; *) echo "Unknown RPM version: `rpm --version`" diff --git a/packaging/RedHat/samba2.spec.tmpl b/packaging/RedHat/samba2.spec.tmpl index 638df4f2cce..e50870fffc8 100644 --- a/packaging/RedHat/samba2.spec.tmpl +++ b/packaging/RedHat/samba2.spec.tmpl @@ -26,6 +26,7 @@ Samba 3.0 also introduces UNICODE support and kerberos/ldap integration as a member server in a Windows 2000 domain. Please refer to the WHATSNEW.txt document for fixup information. +docs directory for implementation details. %changelog * Mon Nov 18 2002 Gerald Carter @@ -157,6 +158,7 @@ install -m 644 source/include/libsmbclient.h $RPM_BUILD_ROOT%{prefix}/include/ #done # Install the miscellany +install -m755 swat/README $RPM_BUILD_ROOT%{prefix}/share/swat/README install -m755 packaging/RedHat/smbprint $RPM_BUILD_ROOT%{prefix}/bin install -m755 packaging/RedHat/smb.init $RPM_BUILD_ROOT/etc/rc.d/init.d/smb install -m755 packaging/RedHat/winbind.init $RPM_BUILD_ROOT/etc/rc.d/init.d/winbind @@ -169,6 +171,9 @@ install -m644 packaging/RedHat/samba.pamd.stack $RPM_BUILD_ROOT/etc/samba/samba. install -m644 packaging/RedHat/samba.xinetd $RPM_BUILD_ROOT/etc/samba/samba.xinetd echo 127.0.0.1 localhost > $RPM_BUILD_ROOT/etc/samba/lmhosts +# Remove "*.old" files +find $RPM_BUILD_ROOT -name "*.old" -exec rm -f {} \; + %clean rm -rf $RPM_BUILD_ROOT @@ -407,6 +412,7 @@ fi %{prefix}/share/swat/lang/*/images/* %{prefix}/share/swat/lang/*/include/*.html %{prefix}/share/swat/using_samba/* +%{prefix}/share/swat/README %config(noreplace) /etc/samba/lmhosts %config(noreplace) /etc/samba/smb.conf %config(noreplace) /etc/samba/smbusers diff --git a/packaging/SGI/relnotes.html b/packaging/SGI/relnotes.html index d055be6c1a3..afcf5796776 100644 --- a/packaging/SGI/relnotes.html +++ b/packaging/SGI/relnotes.html @@ -205,8 +205,17 @@ printer name to describe its location.
      of the docs directory from the Samba distribution; consult samba(7) for an introduction.

      -

      There is a mailing list for discussion of Samba. To subscribe and - for more information go to lists.samba.org. +

      There is a mailing list for discussion of Samba. To subscribe send mail +to listproc@samba.org +with a body of "subscribe samba Your Name"

      + +

      To send mail to everyone on the list mail to samba@samba.org. +

      + +

      There is also an announcement mailing list where new versions are announced. +To subscribe send mail to listproc@samba.org +with a body of "subscribe samba-announce Your Name". All announcements +also go to the samba list.

      You might also like to look at the Usenet news group comp.protocols.smb as it often contains lots of useful info and is frequented by lots of Samba @@ -214,10 +223,10 @@ users. The newsgroup was initially setup by people on the Samba mailing list. It is not, however, exclusive to Samba, it is a forum for discussing the SMB protocol (which Samba implements).

      -

      - A Samba WWW site has been setup with lots of useful info. Connect to: - http://samba.org/. You can - contact the webmaster at "webmaster at samba dot org". +

      A Samba WWW site has been setup with lots of useful info. Connect to: +http://samba.org/pub/samba/. +It is maintained by Paul Blackman (thanks Paul!). You can contact him at +ictinus@lake.canberra.edu.au.

      diff --git a/packaging/SuSE/7.1/samba-2.2.0-alpha0.dif b/packaging/SuSE/7.1/samba-2.2.0-alpha0.dif deleted file mode 100644 index 75bfdf18c66..00000000000 --- a/packaging/SuSE/7.1/samba-2.2.0-alpha0.dif +++ /dev/null @@ -1,224 +0,0 @@ ---- lmhosts -+++ lmhosts 2000/08/28 07:32:33 -@@ -0,0 +1,8 @@ -+# This file provides the same function that the -+# lmhosts file does for Windows. -+# It provides another way to map netbios names to ip addresses. -+# See the section on 'name resolve order' in the manual page to -+# smb.conf for more information. -+ -+# Sample entry: -+# 192.168.1.1 samba ---- mount.smbfs -+++ mount.smbfs 2000/08/28 07:32:55 -@@ -0,0 +1,14 @@ -+#!/bin/sh -+# -+# Copyright (c) 1999 SuSE GmbH Nuernberg, Germany. All rights reserved. -+# -+# Author: Carsten Hoeger -+# -+# /sbin/mount.smbfs -+# -+# I'm called by the mount-command and smbmount want's to get -+# called by me, so lets do it. -+# -+# P.S.: This is a very very raw solution and I don't know, if this -+# is intentionally. -+smbmount "$@" ---- rc -+++ rc 2000/08/28 07:32:33 -@@ -0,0 +1,53 @@ -+#! /bin/sh -+# Copyright (c) 1996 StarDivision GmbH. All rights reserved. -+# Copyright (c) 1996 S.u.S.E. Gmbh Fuerth, Germany. All rights reserved. -+# -+# Author: Bastian Epting, StarDivision GmbH -+# Florian La Roche, -+# Volker Lendecke, -+# -+ -+. /etc/rc.config -+ -+# Determine the base and follow a runlevel link name. -+base=${0##*/} -+link=${base#*[SK][0-9][0-9]} -+ -+# Force execution if not called by a runlevel directory. -+test $link = $base && START_SMB=yes -+test "$START_SMB" = "yes" || exit 0 -+ -+# The echo return value for success (defined in /etc/rc.config). -+return=$rc_done -+case "$1" in -+ start) -+ echo -n "Starting SMB services:" -+ startproc /usr/sbin/nmbd -D || return=$rc_failed -+ startproc /usr/sbin/smbd -D || return=$rc_failed -+ echo -e "$return" -+ ;; -+ stop) -+ echo -n "Shutting down SMB services:" -+ killproc -TERM /usr/sbin/nmbd || return=$rc_failed -+ killproc -TERM /usr/sbin/smbd || return=$rc_failed -+ echo -e "$return" -+ ;; -+ restart|reload) -+ echo -n "Reloading SMB services:" -+ killproc -HUP /usr/sbin/nmbd || return=$rc_failed -+ killproc -HUP /usr/sbin/smbd || return=$rc_failed -+ echo -e "$return" -+ ;; -+ status) -+ echo -n "Checking for service smb: " -+ checkproc /usr/sbin/nmbd && echo -n "OK " || echo -n "No process " -+ checkproc /usr/sbin/smbd && echo "OK " || echo "No process" -+ ;; -+ *) -+ echo "Usage: $0 {start|stop|restart|reload|status}" -+ exit 1 -+esac -+ -+# Inform the caller not only verbosely and set an exit status. -+test "$return" = "$rc_done" || exit 1 -+exit 0 ---- rc.config.samba -+++ rc.config.samba 2000/08/28 07:32:33 -@@ -0,0 +1,5 @@ -+# -+# start samba? ("yes" or "no") -+# Windows 95 / NT - File- and Printservices -+# -+START_SMB="no" ---- smb.conf -+++ smb.conf 2000/08/28 07:32:33 -@@ -0,0 +1,80 @@ -+; -+; /etc/smb.conf -+; -+; Copyright (c) 1999 SuSE GmbH Nuernberg, Germany. -+; -+[global] -+ workgroup = arbeitsgruppe -+ guest account = nobody -+ keep alive = 30 -+ os level = 2 -+ kernel oplocks = false -+ security = user -+ -+; Uncomment the following, if you want to use an existing -+; NT-Server to authenticate users, but don't forget that -+; you also have to create them locally!!! -+; security = server -+; password server = 192.168.1.10 -+; encrypt passwords = yes -+ -+ printing = bsd -+ printcap name = /etc/printcap -+ load printers = yes -+ -+ socket options = TCP_NODELAY -+ -+ map to guest = Bad User -+ -+; Uncomment this, if you want to integrate your server -+; into an existing net e.g. with NT-WS to prevent nettraffic -+; local master = no -+ -+; Please uncomment the following entry and replace the -+; ip number and netmask with the correct numbers for -+; your ethernet interface. -+; interfaces = 192.168.1.1/255.255.255.0 -+ -+; If you want Samba to act as a wins server, please set -+; 'wins support = yes' -+ wins support = no -+ -+; If you want Samba to use an existing wins server, -+; please uncomment the following line and replace -+; the dummy with the wins server's ip number. -+; wins server = 192.168.1.1 -+ -+; Do you wan't samba to act as a logon-server for -+; your windows 95/98 clients, so uncomment the -+; following: -+; logon script =%U.bat -+; domain logons = yes -+; domain master = yes -+; [netlogon] -+; path = /netlogon -+ -+ -+[homes] -+ comment = Heimatverzeichnis -+ browseable = no -+ read only = no -+ create mode = 0750 -+ -+; The following share gives all users access to the Server's CD drive, -+; assuming it is mounted under /cd. To enable this share, please remove -+; the semicolons before the lines -+; -+; [cdrom] -+; comment = Linux CD-ROM -+; path = /cdrom -+; read only = yes -+; locking = no -+ -+[printers] -+ comment = All Printers -+ browseable = no -+ printable = yes -+ public = no -+ read only = yes -+ create mode = 0700 -+ directory = /tmp ---- smbfs -+++ smbfs 2000/08/28 07:32:33 -@@ -0,0 +1,40 @@ -+#! /bin/bash -+# Copyright (c) 1996 SuSE GmbH Nuernberg, Germany. All rights reserved. -+# -+# Author: Thomas Fehr , 1999 -+# -+# /sbin/init.d/smbfs -+# -+ -+smbfs=no -+if [ `cat /proc/mounts | grep " smbfs " | wc -l` -gt 0 ] -+then -+ smbfs=yes -+fi -+ -+return=$rc_done -+case "$1" in -+ start|reload) -+ ;; -+ stop) -+ if [ "$smbfs" = "yes" ] -+ then -+ echo -n "Remove SMB File System" -+ # -+ # Unmount in background because during long timeouts -+ # -+ umount -at smbfs & -+ sleep 2 -+ echo -e "$return" -+ fi -+ ;; -+ restart) -+ $0 stop && $0 start || return=$rc_failed -+ ;; -+ status) -+ ;; -+ *) -+ echo "Usage: $0 {start|stop|status|reload|restart}" -+ exit 1 -+esac -+exit 0 ---- smbpasswd -+++ smbpasswd 2000/08/28 07:32:33 -@@ -0,0 +1,3 @@ -+# Sample smbpasswd file. -+# To use this, set 'encrypt passwords = yes' in the [global]-section -+# of /etc/smb.conf diff --git a/packaging/SuSE/7.1/samba.pamd b/packaging/SuSE/7.1/samba.pamd deleted file mode 100644 index d9e7088bea3..00000000000 --- a/packaging/SuSE/7.1/samba.pamd +++ /dev/null @@ -1,3 +0,0 @@ -#%PAM-1.0 -auth required /lib/security/pam_unix.so -account required /lib/security/pam_unix.so diff --git a/packaging/SuSE/7.1/samba.spec b/packaging/SuSE/7.1/samba.spec deleted file mode 100644 index 60d8099edbf..00000000000 --- a/packaging/SuSE/7.1/samba.spec +++ /dev/null @@ -1,381 +0,0 @@ -# -# spec file for package samba (Version 2.0.7) -# -# Copyright (c) 2000 SuSE GmbH Nuernberg, Germany. -# -# please send bugfixes or comments to feedback@suse.de. -# - -# neededforbuild automake openldap -# usedforbuild aaa_base aaa_dir autoconf automake base bash bindutil binutils bison bzip compress cpio cracklib devs diff ext2fs file fileutil find flex gawk gcc gdbm gettext gpm gppshare groff gzip kbd less libc libtool libz lx_suse make mktemp modules ncurses net_tool netcfg nkita nkitb nssv1 openldap pam patch perl pgp ps rcs rpm sendmail sh_utils shadow shlibs strace syslogd sysvinit texinfo textutil timezone unzip util vim xdevel xf86 xshared - -Vendor: SuSE GmbH, Nuernberg, Germany -Distribution: SuSE Linux 7.1a (i386) -Name: samba -Release: 0 -Packager: feedback@suse.de - -Copyright: 1992-95 Andrew Tridgell, Karl Auer, Jeremy Allison -Group: Networking/Daemons -Url: http://www.samba.org -Provides: samba smbfs -Requires: smbclnt -Autoreqprov: on -Version: 2.2 -Summary: An SMB file server for Unix -Source: samba-2.2.0-alpha0.tar.gz -Source1: samba.pamd -Patch: samba-2.2.0-alpha0.dif -%package -n smbclnt -Summary: Samba client utilities -Autoreqprov: on -Group: Networking -%prep -%setup -n samba-2.2.0-alpha0 -%patch - -%build -cd source -%{?suse_update_config:%{suse_update_config -f}} -LIBS=-lnsl \ -./configure --prefix=/usr --libdir=/etc \ - --with-privatedir=/etc --localstatedir=/var/log \ - --with-smbmount --with-pam \ - --mandir=%{_mandir} \ - --with-swatdir=/usr/lib/samba/swat \ - --with-sambabook=/usr/lib/samba/swat/using_samba -cd .. -make LOCKDIR=/var/lock/samba SBINDIR=/usr/sbin \ - CODEPAGEDIR=/usr/lib/samba/codepages -C source - -%install -mkdir -p /usr/lib/samba -make install LOCKDIR=/var/lock/samba SBINDIR=/usr/sbin \ - CODEPAGEDIR=/usr/lib/samba/codepages -C source -# cleanup docs -rm -rf docs/*.[0-9] -chmod 644 `find docs examples -type f` -chmod 755 `find docs examples -type d` -#utility scripts -mkdir -p /usr/lib/samba/scripts -cp -a source/script/* /usr/lib/samba/scripts -# configuration files -install -m 644 smb.conf /etc/smb.conf -install -m 644 lmhosts /etc/lmhosts -install -m 600 smbpasswd -o root -g root /etc/smbpasswd -install -d 755 /etc/pam.d -install -m 644 $RPM_SOURCE_DIR/samba.pamd /etc/pam.d/samba -install -m 755 mount.smbfs /sbin/mount.smbfs -# start script -install rc /sbin/init.d/smb -ln -sf ../smb /sbin/init.d/rc2.d/S20smb -ln -sf ../smb /sbin/init.d/rc2.d/K20smb -ln -sf ../smb /sbin/init.d/rc3.d/S20smb -ln -sf ../smb /sbin/init.d/rc3.d/K20smb -ln -sf ../../sbin/init.d/smb /usr/sbin/rcsmb -install smbfs /sbin/init.d/smbfs -ln -sf ../smbfs /sbin/init.d/rc2.d/S21smbfs -ln -sf ../smbfs /sbin/init.d/rc2.d/K19smbfs -ln -sf ../smbfs /sbin/init.d/rc3.d/S21smbfs -ln -sf ../smbfs /sbin/init.d/rc3.d/K19smbfs -ln -sf ../../sbin/init.d/smbfs /usr/sbin/rcsmbfs -# rc.config fragment -mkdir -p /var/adm/fillup-templates -cp rc.config.samba /var/adm/fillup-templates -%{?suse_check} - -%post -echo "Updating etc/rc.config..." -if [ -x bin/fillup ] ; then - bin/fillup -q -d = etc/rc.config var/adm/fillup-templates/rc.config.samba -else - echo "ERROR: fillup not found. This should not happen. Please compare" - echo "etc/rc.config and var/adm/fillup-templates/rc.config.samba and" - echo "update by hand." -fi -if grep -q '^[#[:space:]]*swat' etc/inetd.conf ; then - echo /etc/inetd.conf is up to date -else - echo updating inetd.conf - cat >> etc/inetd.conf << EOF -# swat is the Samba Web Administration Tool -swat stream tcp nowait.400 root /usr/sbin/swat swat -EOF -fi -if grep -q '^swat' etc/services ; then - echo /etc/services is up to date -else - echo updating services - cat >> etc/services << EOF -swat 901/tcp # swat is the Samba Web Administration Tool -EOF -fi -mkdir -p var/adm/notify/messages -cat << EOF > var/adm/notify/messages/samba-notify -Achtung! -======== -Die Syntax des smbmount Kommandos hat sich geaendert! -smbmount kann nicht mehr direkt aufgerufen werden. Es wird von einem -Shellscript /sbin/mount.smbfs aufgerufen, welches wiederum von mount -aufgerufen wird. -Hier ein Beispielaufruf: -mount -t smbfs -o username=uname,password=passwd //smbserv/share /destination -***************************************************************************** -Attention! -========== -The syntax of smbmount has changed! -smbmount can not be called direct anymore. It will be called by a shell -script /sbin/mount.smbfs, which will be called by mount. -A sample call to smbfs: -mount -t smbfs -o username=uname,password=passwd //smbserv/share /destination -EOF - -%files -%config(noreplace) /etc/smb.conf -%config(noreplace) /etc/lmhosts -%config(noreplace) /etc/smbpasswd -%config /etc/pam.d/samba -/usr/lib/samba -/sbin/init.d/rc2.d/K20smb -/sbin/init.d/rc2.d/S20smb -/sbin/init.d/rc3.d/K20smb -/sbin/init.d/rc3.d/S20smb -%config /sbin/init.d/smb -/usr/bin/addtosmbpass -/usr/bin/convert_smbpasswd -/usr/bin/make_printerdef -/usr/bin/make_smbcodepage -/usr/bin/make_unicodemap -/usr/bin/smbpasswd -/usr/bin/smbstatus -/usr/bin/testparm -/usr/bin/testprns -%doc docs/* examples -%doc %{_mandir}/man1/make_smbcodepage.1.gz -%doc %{_mandir}/man1/make_unicodemap.1.gz -%doc %{_mandir}/man1/smbrun.1.gz -%doc %{_mandir}/man1/smbsh.1.gz -%doc %{_mandir}/man1/smbstatus.1.gz -%doc %{_mandir}/man1/testparm.1.gz -%doc %{_mandir}/man1/testprns.1.gz -%doc %{_mandir}/man5/lmhosts.5.gz -%doc %{_mandir}/man5/smb.conf.5.gz -%doc %{_mandir}/man5/smbpasswd.5.gz -%doc %{_mandir}/man7/samba.7.gz -%doc %{_mandir}/man8/nmbd.8.gz -%doc %{_mandir}/man8/smbd.8.gz -%doc %{_mandir}/man8/smbpasswd.8.gz -%doc %{_mandir}/man8/swat.8.gz -/usr/sbin/nmbd -/usr/sbin/rcsmb -/usr/sbin/smbd -/usr/sbin/swat -/var/adm/fillup-templates/rc.config.samba - -%files -n smbclnt -/sbin/init.d/rc2.d/K19smbfs -/sbin/init.d/rc2.d/S21smbfs -/sbin/init.d/rc3.d/K19smbfs -/sbin/init.d/rc3.d/S21smbfs -%config /sbin/init.d/smbfs -/usr/sbin/rcsmbfs -/sbin/mount.smbfs -/usr/bin/nmblookup -/usr/bin/rpcclient -/usr/bin/smbclient -/usr/bin/smbmnt -/usr/bin/smbmount -/usr/bin/smbumount -/usr/bin/smbspool -/usr/bin/smbtar -%doc %{_mandir}/man1/nmblookup.1.gz -%doc %{_mandir}/man1/smbclient.1.gz -%doc %{_mandir}/man1/smbtar.1.gz -%doc %{_mandir}/man8/smbmnt.8.gz -%doc %{_mandir}/man8/smbmount.8.gz -%doc %{_mandir}/man8/smbspool.8.gz -%doc %{_mandir}/man8/smbumount.8.gz - -%description -Samba is a suite of programs which work together to allow clients to -access Unix filespace and printers via the SMB protocol (Server Message -Block). -In practice, this means that you can redirect disks and printers to -Unix disks and printers from LAN Manager clients, Windows for -Workgroups 3.11 clients, Windows'95 clients, Windows NT clients -and OS/2 clients. There is -also a Unix client program supplied as part of the suite which allows -Unix users to use an ftp-like interface to access filespace and -printers on any other SMB server. -Samba includes the following programs (in summary): -* smbd, the SMB server. This handles actual connections from clients. -* nmbd, the Netbios name server, which helps clients locate servers. -* smbclient, the Unix-hosted client program. -* smbrun, a little 'glue' program to help the server run external -programs. -* testprns, a program to test server access to printers. -* testparm, a program to test the Samba configuration file for correctness. -* smb.conf, the Samba configuration file. -* smbprint, a sample script to allow a Unix host to use smbclient -to print to an SMB server. -The suite is supplied with full source and is GPLed. -This package expects its config file under /etc/smb.conf . - -Authors: --------- - Andrew Tridgell - Karl Auer - Jeremy Allison - -SuSE series: n - - -%description -n smbclnt -This package contains all programs, that are needed to act as a samba -client. This includes also smbmount, of course. - -Authors: --------- - Andrew Tridgell - Karl Auer - Jeremy Allison - -SuSE series: n - - -%changelog -n samba -* Mon Aug 28 2000 - choeger@suse.de -- changed $* to "$@" in mount.smbfs to make it also - possible to mount shares with spaces -* Mon Jul 31 2000 - choeger@suse.de -- improvement for rcsmb -- fix for spec-file to compile with NIS netgroups -* Thu Jul 20 2000 - choeger@suse.de -- added smbfs initscript that has been removed - by an error -* Tue Jul 11 2000 - choeger@suse.de -- split package into client and server parts - client package name: smbclnt -* Wed Apr 26 2000 - choeger@suse.de -- new version, 2.0.7 -* Thu Apr 06 2000 - ro@suse.de -- removed pam,cracklib from neededforbuild: build handles this -* Wed Apr 05 2000 - bk@suse.de -- s390 team added config.{sub,guess} update macro for s390 -* Mon Mar 27 2000 - choeger@suse.de -- fixed bug in specfile - the multilined configure call missed a "" :-( -* Thu Mar 09 2000 - choeger@suse.de -- fixed typo in specfile -* Wed Mar 01 2000 - choeger@suse.de -- added %{_mandir} -* Tue Feb 08 2000 - choeger@suse.de -- removed /sbin/init.d/smbfs because it is no longer needed -* Mon Jan 03 2000 - choeger@suse.de -- bugfix for ipc.c - to make roaming profiles work again. -* Tue Nov 30 1999 - choeger@suse.de -- changed kernel oplocks = off to - kernel oplocks = false -* Tue Nov 16 1999 - choeger@suse.de -- added kernel oplocks = off in smb.conf -* Fri Nov 12 1999 - choeger@suse.de -- new version, 2.0.6 -* Fri Nov 05 1999 - choeger@suse.de -- Fix for the smbmount lost-connection problem - _seems_ to work... -* Fri Oct 29 1999 - choeger@suse.de -- removed comment sign in /etc/inetd.conf for swat -* Mon Sep 13 1999 - bs@suse.de -- ran old prepare_spec on spec file to switch to new prepare_spec. -* Tue Aug 10 1999 - fehr@suse.de -- set execute permissions for mksmbpasswd.sh and changesmbpasswd.sh -* Thu Jul 29 1999 - fehr@suse.de -- fixed typo in /sbin/init.d/smbfs -* Thu Jul 22 1999 - fehr@suse.de -- changed to new version 2.0.5a -* Wed Jul 21 1999 - fehr@suse.de -- changed to new version 2.0.5 -* Tue Jul 20 1999 - fehr@suse.de -- install /sbin/init.d/smbfs -- changed to new version 2.0.5pre4 -* Mon Jul 19 1999 - fehr@suse.de -- add /sbin/init.d/smbfs -- changed to new version 2.0.5pre3 -* Fri Jul 02 1999 - fehr@suse.de -- removed "umount -a -t smbfs" from start sscript -* Tue Jun 22 1999 - kukuk@suse.de -- 2.0.4b changed default values, enable PAM again -* Fri Jun 18 1999 - kukuk@suse.de -- changed to new version 2.0.4b -* Mon Jun 14 1999 - kukuk@suse.de -- Enable PAM, add samba.pamd -* Mon May 03 1999 - fehr@suse.de -- add umount -a -t smbfs to shutdown sequence of samba -* Thu Mar 11 1999 - ro@suse.de -- smbmount: define NR_OPEN to 1024 if undefined (GLIBC-2.1) -* Wed Mar 10 1999 - choeger@suse.de -- some enhancements for smb.conf -* Wed Mar 10 1999 - choeger@suse.de -- new version 2.0.3 and smbmount now seems to work -* Tue Mar 09 1999 - ro@suse.de -- use samba-2.0.2 for STABLE -- use smbfs-2.1 with kernel 2.2.2 -* Sun Feb 28 1999 - ro@suse.de -- for glibc-2.1 strncat uses strcat for one subcase, so don't - redefine strcat to "ERROR" for glibc-2.1 -* Mon Feb 15 1999 - fehr@suse.de -- fix for umount problem from Volker -* Tue Feb 09 1999 - fehr@suse.de -- changed to version 2.0.2 of samba -* Fri Jan 15 1999 - bs@suse.de -- replaced /sbin/init.d/smb with newer style version (again) -* Fri Jan 15 1999 - fehr@suse.de -- switched to new version 2.0.0 -* Wed Jan 13 1999 - bs@suse.de -- fixed entry in inetd.conf -* Wed Jan 13 1999 - bs@suse.de -- replaced /sbin/init.d/smb with newer style version -* Mon Jan 11 1999 - vl@suse.de -- make 2.0.0beta5 package of samba -* Mon Aug 24 1998 - vl@suse.de -- changed to version 1.9.18p10 -* Mon Jun 29 1998 - vl@suse.de -- changed to version 1.9.18p8 -* Mon Apr 20 1998 - vl@suse.de -- changed to version 1.9.18p4 -* Thu Feb 19 1998 - vl@suse.de -- changed to version 1.9.18p3 -* Tue Feb 03 1998 - vl@suse.de -- changed to version 1.9.18p2 -- fixed some problems in spec-file, some files were missing :-( -- fixed smbfs-2.0.2/Makefile.Linux -* Tue Jan 13 1998 - vl@suse.de -- changed to version 1.9.18p1 -* Fri Jan 09 1998 - vl@suse.de -- changed to version 1.9.18 -* Tue Dec 02 1997 - bs@suse.de -- disable samba by default in /etc/rc.config -* Mon Oct 06 1997 - fehr@suse.de -- package prepared for automatic building -* Mon Sep 29 1997 - fehr@suse.de -- updated to version 1.9.17p2 due to security hole. -* Wed Jul 16 1997 - fehr@suse.de -- add fillup-template for rc.config and install it in doinst.sh -* Fri Jun 27 1997 - bs@suse.de -- update to smbfs-2.0.2, due to security hole. -* Tue Jun 17 1997 - fehr@suse.de -- changed init-skript to recognize entry START_SMB of rc.config -* Mon Jun 02 1997 - vl@suse.de -- update to version 1.9.16p11 -- Starting Samba from /sbin/init.d, not from inetd.conf -* Sun Feb 02 1997 - vl@suse.de -- update to version 1.9.16p10 -- Adapted /etc/smb.conf.sample to 4.4.1 manual -* Thu Jan 02 1997 - florian@suse.de -- update to version 1.9.16p9 -- configuration file is now /etc/smb.conf -- smbd and nmbd are now in /usr/sbin -- added start-script /sbin/init.d/smb and entry in /etc/rc.config -* Thu Jan 02 1997 - florian@suse.de -- Update auf neue Version 1.9.16p6. diff --git a/packaging/SuSE/README b/packaging/SuSE/README new file mode 100644 index 00000000000..5d0af9944aa --- /dev/null +++ b/packaging/SuSE/README @@ -0,0 +1,18 @@ +Date: March 29, 2003 + +Note: The current packaging files are NOT officially supported files. +--------------------------------------------------------------------- + +While the SPEC file shows who the original author was, these files imply no warranty of +fitness what so ever. These files are NOT official SuSE files and are NOT supported by +them. If you have ANY problems with the use of these files then please email jht@samba.org +and NOT SuSE support. + + +These files may be used to build Samba-3.0 packages for SuSE Linux 8.1 and/or for +UnitedLinux 1.0 systems. + +Note2: You most likely will need to update to heimdal-0.5.1 or later if you intend to +use any Kerberos functionality. + +- John T. diff --git a/packaging/SuSE/samba-3.0.0-msdfs.diff b/packaging/SuSE/samba-3.0.0-msdfs.diff new file mode 100644 index 00000000000..1e688e64c4b --- /dev/null +++ b/packaging/SuSE/samba-3.0.0-msdfs.diff @@ -0,0 +1,97 @@ +--- source/param/loadparm.c Wed Oct 9 21:17:05 2002 ++++ source/param/loadparm.c Mon Oct 14 16:33:08 2002 +@@ -386,6 +386,8 @@ + BOOL bInheritPerms; + BOOL bInheritACLS; + BOOL bMSDfsRoot; ++ BOOL bMSDfsProxy; ++ char *bMSDfsLinkName; + BOOL bUseClientDriver; + BOOL bDefaultDevmode; + BOOL bNTAclSupport; +@@ -508,6 +510,8 @@ + False, /* bInheritPerms */ + False, /* bInheritACLS */ + False, /* bMSDfsRoot */ ++ False, /* bMSDfsProxy */ ++ NULL, /* bMSDfsLinkName */ + False, /* bUseClientDriver */ + False, /* bDefaultDevmode */ + True, /* bNTAclSupport */ +@@ -1079,6 +1083,8 @@ + + + {"msdfs root", P_BOOL, P_LOCAL, &sDefault.bMSDfsRoot, NULL, NULL, FLAG_SHARE}, ++ {"msdfs proxy", P_BOOL, P_LOCAL, &sDefault.bMSDfsProxy, NULL, NULL, FLAG_SHARE}, ++ {"msdfs link name", P_STRING, P_LOCAL, &sDefault.bMSDfsLinkName, NULL, NULL, FLAG_SHARE}, + {"host msdfs", P_BOOL, P_GLOBAL, &Globals.bHostMSDfs, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, + + {"Winbind options", P_SEP, P_SEPARATOR}, +@@ -1730,6 +1736,8 @@ + FN_LOCAL_STRING(lp_veto_oplocks, szVetoOplockFiles) + FN_LOCAL_STRING(lp_driverlocation, szPrinterDriverLocation) + FN_LOCAL_BOOL(lp_msdfs_root, bMSDfsRoot) ++FN_LOCAL_BOOL(lp_msdfs_proxy, bMSDfsProxy) ++FN_LOCAL_STRING(lp_msdfs_link_name, bMSDfsLinkName) + FN_LOCAL_BOOL(lp_autoloaded, autoloaded) + FN_LOCAL_BOOL(lp_preexec_close, bPreexecClose) + FN_LOCAL_BOOL(lp_rootpreexec_close, bRootpreexecClose) +--- source/msdfs/msdfs.c Tue Jul 2 08:34:24 2002 ++++ source/msdfs/msdfs.c Mon Oct 14 16:49:57 2002 +@@ -600,12 +600,38 @@ + int reply_size = 0; + char *pathnamep = pathname; + ++ struct connection_struct conns; ++ struct connection_struct* conn = &conns; ++ int snum; ++ pstring conn_path; ++ struct dfs_path dpi; ++ ++ struct junction_map junction2; ++ parse_dfs_path(pathname, &dpi); ++ pstrcpy(junction2.service_name, dpi.servicename); ++ snum = lp_servicenumber(junction2.service_name); ++ create_conn_struct(conn, snum, conn_path); ++ ++ + ZERO_STRUCT(junction); + + /* get the junction entry */ + if (!pathnamep) + return -1; + ++ if (lp_msdfs_proxy(SNUM(conn))) { ++ DEBUG(10,("running in proxy mode\n")); ++ pstrcpy(pathnamep, "\\"); ++ pstrcat(pathnamep, dpi.hostname); ++ pstrcat(pathnamep, "\\"); ++ pstrcat(pathnamep, dpi.servicename); ++ pstrcat(pathnamep, "\\"); ++ pstrcat(pathnamep, (char *) lp_msdfs_link_name(SNUM(conn))); ++ } else { ++ DEBUG(10,("running in normal mode\n")); ++ } ++ ++ + /* Trim pathname sent by client so it begins with only one backslash. + Two backslashes confuse some dfs clients + */ +@@ -631,6 +657,17 @@ + } + } + ++ if ( lp_msdfs_proxy(SNUM(conn)) ) { ++ DEBUG(10,("running in proxy mode\n")); ++ pstrcpy ( pathnamep, "\\" ); ++ pstrcat ( pathnamep, dpi.hostname); ++ pstrcat ( pathnamep, "\\" ); ++ pstrcat ( pathnamep, dpi.servicename); ++ } else { ++ DEBUG(10,("running in normal mode\n")); ++ } ++ ++ + /* create the referral depeding on version */ + DEBUG(10,("max_referral_level :%d\n",max_referral_level)); + if(max_referral_level<2 || max_referral_level>3) diff --git a/packaging/SuSE/samba-3.0.0-net_ads.diff b/packaging/SuSE/samba-3.0.0-net_ads.diff new file mode 100644 index 00000000000..b1224c0cef1 --- /dev/null +++ b/packaging/SuSE/samba-3.0.0-net_ads.diff @@ -0,0 +1,140 @@ +diff -Nur source/utils/net.c source/utils/net.c +--- source/utils/net.c Fri Sep 27 09:42:34 2002 ++++ source/utils/net.c Tue Oct 1 12:22:00 2002 +@@ -68,6 +68,7 @@ + int opt_port = 0; + int opt_maxusers = -1; + char *opt_comment = ""; ++char *opt_container = "cn=Users"; + int opt_flags = -1; + int opt_jobid = 0; + int opt_timeout = 0; +@@ -459,6 +460,7 @@ + {"myname", 'n', POPT_ARG_STRING, &opt_requester_name}, + {"conf", 's', POPT_ARG_STRING, &servicesf}, + {"server", 'S', POPT_ARG_STRING, &opt_host}, ++ {"container", 'c', POPT_ARG_STRING, &opt_container}, + {"comment", 'C', POPT_ARG_STRING, &opt_comment}, + {"maxusers", 'M', POPT_ARG_INT, &opt_maxusers}, + {"flags", 'F', POPT_ARG_INT, &opt_flags}, +diff -Nur source/utils/net.h source/utils/net.h +--- source/utils/net.h Tue Jun 25 04:29:09 2002 ++++ source/utils/net.h Tue Oct 1 12:19:51 2002 +@@ -38,10 +38,8 @@ + + extern int opt_maxusers; + extern char *opt_comment; ++extern char *opt_container; + extern int opt_flags; +- +-extern char *opt_comment; +- + extern char *opt_target_workgroup; + extern int opt_long_list_entries; + extern int opt_reboot; +diff -Nur source/utils/net_ads.c source/utils/net_ads.c +--- source/utils/net_ads.c Tue Sep 17 14:15:52 2002 ++++ source/utils/net_ads.c Tue Oct 1 12:33:44 2002 +@@ -255,7 +255,7 @@ + goto done; + } + +- status = ads_add_user_acct(ads, argv[0], opt_comment); ++ status = ads_add_user_acct(ads, argv[0], opt_container, opt_comment); + + if (!ADS_ERR_OK(status)) { + d_printf("Could not add user %s: %s\n", argv[0], +@@ -431,7 +431,7 @@ + goto done; + } + +- status = ads_add_group_acct(ads, argv[0], opt_comment); ++ status = ads_add_group_acct(ads, argv[0], opt_container, opt_comment); + + if (ADS_ERR_OK(status)) { + d_printf("Group %s added\n", argv[0]); +diff -Nur source/utils/net_help.c source/utils/net_help.c +--- source/utils/net_help.c Tue Sep 24 20:10:30 2002 ++++ source/utils/net_help.c Tue Oct 1 13:01:50 2002 +@@ -69,14 +69,14 @@ + "\n\tDelete specified user\n"); + d_printf("\nnet [] user INFO [misc. options] [targets]"\ + "\n\tList the domain groups of the specified user\n"); +- d_printf("\nnet [] user ADD [password] "\ ++ d_printf("\nnet [] user ADD [password] [-c container] "\ + "[-F user flags] [misc. options]"\ + " [targets]\n\tAdd specified user\n"); + + net_common_methods_usage(argc, argv); + net_common_flags_usage(argc, argv); +- d_printf( +- "\t-C or --comment=\tdescriptive comment (for add only)\n"); ++ d_printf("\t-C or --comment=\tdescriptive comment (for add only)\n"); ++ d_printf("\t-c or --container=\tLDAP container, defaults to cn=Users (for add in ADS only)\n"); + return -1; + } + +@@ -85,12 +85,12 @@ + "\n\tList user groups\n\n"); + d_printf("net [] group DELETE [misc. options] [targets]"\ + "\n\tDelete specified group\n"); +- d_printf("\nnet [] group ADD [-C comment]"\ ++ d_printf("\nnet [] group ADD [-C comment] [-c container]"\ + " [misc. options] [targets]\n\tCreate specified group\n"); + net_common_methods_usage(argc, argv); + net_common_flags_usage(argc, argv); +- d_printf( +- "\t-C or --comment=\tdescriptive comment (for add only)\n"); ++ d_printf("\t-C or --comment=\tdescriptive comment (for add only)\n"); ++ d_printf("\t-c or --container=\tLDAP container, defaults to cn=Users (for add in ADS only)\n"); + return -1; + } + +diff -Nur source/libads/ldap_user.c source/libads/ldap_user.c +--- source/libads/ldap_user.c Wed Aug 7 12:33:22 2002 ++++ source/libads/ldap_user.c Tue Oct 1 12:46:08 2002 +@@ -38,7 +38,7 @@ + } + + ADS_STATUS ads_add_user_acct(ADS_STRUCT *ads, const char *user, +- const char *fullname) ++ const char *container, const char *fullname) + { + TALLOC_CTX *ctx; + ADS_MODLIST mods; +@@ -57,7 +60,7 @@ + + if (!(upn = talloc_asprintf(ctx, "%s@%s", user, ads->config.realm))) + goto done; +- if (!(new_dn = talloc_asprintf(ctx, "cn=%s,cn=Users,%s", name, ++ if (!(new_dn = talloc_asprintf(ctx, "cn=%s,%s,%s", name, container, + ads->config.bind_path))) + goto done; + if (!(controlstr = talloc_asprintf(ctx, "%u", UF_NORMAL_ACCOUNT))) +@@ -80,7 +83,7 @@ + } + + ADS_STATUS ads_add_group_acct(ADS_STRUCT *ads, const char *group, +- const char *comment) ++ const char *container, const char *comment) + { + TALLOC_CTX *ctx; + ADS_MODLIST mods; +@@ -93,7 +96,7 @@ + + status = ADS_ERROR(LDAP_NO_MEMORY); + +- if (!(new_dn = talloc_asprintf(ctx, "cn=%s,cn=Users,%s", group, ++ if (!(new_dn = talloc_asprintf(ctx, "cn=%s,%s,%s", group, container, + ads->config.bind_path))) + goto done; + if (!(mods = ads_init_mods(ctx))) +@@ -102,7 +105,7 @@ + ads_mod_str(ctx, &mods, "cn", group); + ads_mod_strlist(ctx, &mods, "objectClass",objectClass); + ads_mod_str(ctx, &mods, "name", group); +- if (comment) ++ if (comment && *comment) + ads_mod_str(ctx, &mods, "description", comment); + ads_mod_str(ctx, &mods, "sAMAccountName", group); + status = ads_gen_add(ads, new_dn, mods); diff --git a/packaging/SuSE/samba-3.0.0-pdb.diff b/packaging/SuSE/samba-3.0.0-pdb.diff new file mode 100644 index 00000000000..4f767c4ac45 --- /dev/null +++ b/packaging/SuSE/samba-3.0.0-pdb.diff @@ -0,0 +1,11 @@ +--- examples/pdb/Makefile Thu Sep 5 02:11:41 2002 ++++ examples/pdb/Makefile Thu Sep 5 02:11:59 2002 +@@ -8,7 +8,7 @@ + SAMBA_INCL = ../../source/include + UBIQX_SRC = ../../source/ubiqx + SMBWR_SRC = ../../source/smbwrapper +-CFLAGS = -I$(SAMBA_SRC) -I$(SAMBA_INCL) -I$(UBIQX_SRC) -I$(SMBWR_SRC) -Wall -g ++CFLAGS = -I/usr/include/heimdal -I$(SAMBA_SRC) -I$(SAMBA_INCL) -I$(UBIQX_SRC) -I$(SMBWR_SRC) -Wall -g + PDB_OBJS = pdb_test.so + + # Default target diff --git a/packaging/SuSE/samba-3.0.0-python.diff b/packaging/SuSE/samba-3.0.0-python.diff new file mode 100644 index 00000000000..8c5931e4448 --- /dev/null +++ b/packaging/SuSE/samba-3.0.0-python.diff @@ -0,0 +1,44 @@ +--- source/python/py_common.c 2002-12-22 03:07:40.000000000 +0100 ++++ source/python/py_common.c 2002-11-29 11:50:22.000000000 +0100 +@@ -45,9 +45,6 @@ + + void py_samba_init(void) + { +- extern pstring global_myname; +- char *p; +- + if (initialised) + return; + +@@ -59,11 +56,7 @@ + /* Misc other stuff */ + + load_interfaces(); +- +- fstrcpy(global_myname, myhostname()); +- p = strchr(global_myname, '.'); +- if (p) +- *p = 0; ++ init_names(); + + initialised = True; + } +--- source/python/py_smb.c 2002-11-27 03:54:20.000000000 +0100 ++++ source/python/py_smb.c 2002-11-29 11:50:22.000000000 +0100 +@@ -61,7 +61,6 @@ + static char *kwlist[] = { "called", "calling", NULL }; + char *calling_name = NULL, *called_name; + struct nmb_name calling, called; +- extern pstring global_myname; + BOOL result; + + if (!PyArg_ParseTupleAndKeywords(args, kw, "s|s", kwlist, &called_name, +@@ -69,7 +68,7 @@ + return NULL; + + if (!calling_name) +- calling_name = global_myname; ++ calling_name = global_myname(); + + make_nmb_name(&calling, calling_name, 0x00); + make_nmb_name(&called, called_name, 0x20); diff --git a/packaging/SuSE/samba-3.0.0-vscan.diff b/packaging/SuSE/samba-3.0.0-vscan.diff new file mode 100644 index 00000000000..cb860e3ffb4 --- /dev/null +++ b/packaging/SuSE/samba-3.0.0-vscan.diff @@ -0,0 +1,80 @@ +--- examples/VFS/samba-vscan-0.3.1/fprot/Makefile 2002-11-26 15:20:17.000000000 +0100 ++++ examples/VFS/samba-vscan-0.3.1/fprot/Makefile 2002-12-19 13:26:19.000000000 +0100 +@@ -14,7 +14,7 @@ + SMBWR_SRC = ../../../../source/smbwrapper + SMBVS_INCL = ../include + SMBVS_GLB = ../global +-CFLAGS = -I$(SAMBA_SRC) -I$(SAMBA_INCL) -I$(UBIQX_SRC) -I$(SMBWR_SRC) -I$(SMBVS_INCL) -Wall -g -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 ++CFLAGS = -I$(SAMBA_SRC) -I$(SAMBA_INCL) -I$(UBIQX_SRC) -I$(SMBWR_SRC) -I$(SMBVS_INCL) -Wall -g -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -I/usr/include/heimdal + VFS_OBJS = vscan-fprotd.so + SOURCES = $(SMBVS_GLB)/vscan-functions.c $(SMBVS_GLB)/vscan-message.c $(SMBVS_GLB)/vscan-quarantine.c vscan-fprotd.c vscan-fprotd_core.c vscan-fprotd.h vscan-fprotd_core.h + OBJS = vscan-functions.lo vscan-message.lo vscan-quarantine.lo vscan-fprotd.lo vscan-fprotd_core.lo +--- examples/VFS/samba-vscan-0.3.1/include/vscan-global.h 2002-11-25 16:48:10.000000000 +0100 ++++ examples/VFS/samba-vscan-0.3.1/include/vscan-global.h 2002-12-19 13:26:34.000000000 +0100 +@@ -93,7 +93,7 @@ + */ + + #ifndef SAMBA_VERSION_MAJOR +-# define SAMBA_VERSION_MAJOR 2 ++# define SAMBA_VERSION_MAJOR 3 + #endif + + #ifndef SAMBA_VERSION_MINOR +--- examples/VFS/samba-vscan-0.3.1/kaspersky/Makefile 2002-11-28 17:40:35.000000000 +0100 ++++ examples/VFS/samba-vscan-0.3.1/kaspersky/Makefile 2002-12-19 13:27:23.000000000 +0100 +@@ -23,9 +23,9 @@ + VFS_OBJS = vscan-kavp.so + + ifdef USE_DEBUG +-CFLAGS = -I$(SAMBA_SRC) -I$(SAMBA_INCL) -I$(UBIQX_SRC) -I$(SMBWR_SRC) -I$(SMBVS_INCL) -Wall -g -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 ++CFLAGS = -I$(SAMBA_SRC) -I$(SAMBA_INCL) -I$(UBIQX_SRC) -I$(SMBWR_SRC) -I$(SMBVS_INCL) -Wall -g -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -I/usr/include/heimdal + else +-CFLAGS = -I$(SAMBA_SRC) -I$(SAMBA_INCL) -I$(UBIQX_SRC) -I$(SMBWR_SRC) -I$(SMBVS_INCL) -Wall -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 ++CFLAGS = -I$(SAMBA_SRC) -I$(SAMBA_INCL) -I$(UBIQX_SRC) -I$(SMBWR_SRC) -I$(SMBVS_INCL) -Wall -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -I/usr/include/heimdal + endif + + ifndef USE_KAVPSHAREDLIB +--- examples/VFS/samba-vscan-0.3.1/mks/Makefile 2002-11-26 16:29:55.000000000 +0100 ++++ examples/VFS/samba-vscan-0.3.1/mks/Makefile 2002-12-19 13:27:53.000000000 +0100 +@@ -13,7 +13,7 @@ + SMBWR_SRC = ../../../../source/smbwrapper + SMBVS_INCL = ../include + SMBVS_GLB = ../global +-CFLAGS = -I$(SAMBA_SRC) -I$(SAMBA_INCL) -I$(UBIQX_SRC) -I$(SMBWR_SRC) -I$(SMBVS_INCL) -Wall -g -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 ++CFLAGS = -I$(SAMBA_SRC) -I$(SAMBA_INCL) -I$(UBIQX_SRC) -I$(SMBWR_SRC) -I$(SMBVS_INCL) -Wall -g -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -I/usr/include/heimdal + VFS_OBJS = vscan-mksd.so + SOURCES = $(SMBVS_GLB)/vscan-functions.c $(SMBVS_GLB)/vscan-message.c $(SMBVS_GLB)/vscan-quarantine.c vscan-mksd.c vscan-mksd_core.c vscan-mksd.h vscan-mksd_core.h mks.h mks_c.c + OBJS = vscan-functions.lo vscan-message.lo vscan-quarantine.lo vscan-mksd.lo vscan-mksd_core.lo mks_c.lo +--- examples/VFS/samba-vscan-0.3.1/openantivirus/Makefile 2002-11-27 19:24:03.000000000 +0100 ++++ examples/VFS/samba-vscan-0.3.1/openantivirus/Makefile 2002-12-19 13:28:10.000000000 +0100 +@@ -15,7 +15,7 @@ + SMBWR_SRC = ../../../../source/smbwrapper + SMBVS_INCL = ../include + SMBVS_GLB = ../global +-CFLAGS = -I$(SAMBA_SRC) -I$(SAMBA_INCL) -I$(UBIQX_SRC) -I$(SMBWR_SRC) -I$(SMBVS_INCL) -Wall -g -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 ++CFLAGS = -I$(SAMBA_SRC) -I$(SAMBA_INCL) -I$(UBIQX_SRC) -I$(SMBWR_SRC) -I$(SMBVS_INCL) -Wall -g -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -I/usr/include/heimdal + VFS_OBJS = vscan-oav.so + SOURCES = $(SMBVS_GLB)/vscan-functions.c $(SMBVS_GLB)/vscan-message.c $(SMBVS_GLB)/vscan-quarantine.c vscan-oav.c vscan-oav_core.c vscan-oav.h vscan-oav_core.h + OBJS = vscan-functions.lo vscan-message.lo vscan-quarantine.lo vscan-oav.lo vscan-oav_core.lo +--- examples/VFS/samba-vscan-0.3.1/sophos/Makefile 2002-11-27 19:24:03.000000000 +0100 ++++ examples/VFS/samba-vscan-0.3.1/sophos/Makefile 2002-12-19 13:29:20.000000000 +0100 +@@ -15,7 +15,7 @@ + SMBWR_SRC = ../../../../source/smbwrapper + SMBVS_INCL = ../include + SMBVS_GLB = ../global +-CFLAGS = -I$(SAMBA_SRC) -I$(SAMBA_INCL) -I$(UBIQX_SRC) -I$(SMBWR_SRC) -I$(SMBVS_INCL) -Wall -g -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 ++CFLAGS = -I$(SAMBA_SRC) -I$(SAMBA_INCL) -I$(UBIQX_SRC) -I$(SMBWR_SRC) -I$(SMBVS_INCL) -Wall -g -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -I/usr/include/heimdal + VFS_OBJS = vscan-sophos.so + SOURCES = $(SMBVS_GLB)/vscan-functions.c $(SMBVS_GLB)/vscan-message.c $(SMBVS_GLB)/vscan-quarantine.c vscan-sophos.c vscan-sophos_core.c vscan-sophos.h vscan-sophos_core.h + OBJS = vscan-functions.lo vscan-message.lo vscan-quarantine.lo vscan-sophos.lo vscan-sophos_core.lo +--- examples/VFS/samba-vscan-0.3.1/trend/Makefile 2002-11-27 19:24:03.000000000 +0100 ++++ examples/VFS/samba-vscan-0.3.1/trend/Makefile 2002-12-19 13:29:31.000000000 +0100 +@@ -15,7 +15,7 @@ + SMBWR_SRC = ../../../../source/smbwrapper + SMBVS_INCL = ../include + SMBVS_GLB = ../global +-CFLAGS = -I$(SAMBA_SRC) -I$(SAMBA_INCL) -I$(UBIQX_SRC) -I$(SMBWR_SRC) -I$(SMBVS_INCL) -Wall -g -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 ++CFLAGS = -I$(SAMBA_SRC) -I$(SAMBA_INCL) -I$(UBIQX_SRC) -I$(SMBWR_SRC) -I$(SMBVS_INCL) -Wall -g -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64 -I/usr/include/heimdal + VFS_OBJS = vscan-trend.so + SOURCES = $(SMBVS_GLB)/vscan-functions.c $(SMBVS_GLB)/vscan-message.c $(SMBVS_GLB)/vscan-quarantine.c vscan-trend.c vscan-trend_core.c vscan-trend.h vscan-trend_core.h + OBJS = vscan-functions.lo vscan-message.lo vscan-quarantine.lo vscan-trend.lo vscan-trend_core.lo diff --git a/packaging/SuSE/samba-3.0.0.files.tar.bz2 b/packaging/SuSE/samba-3.0.0.files.tar.bz2 new file mode 100644 index 00000000000..1e8fc9baf0c Binary files /dev/null and b/packaging/SuSE/samba-3.0.0.files.tar.bz2 differ diff --git a/packaging/SuSE/samba-vscan-0.3.1.tar.bz2 b/packaging/SuSE/samba-vscan-0.3.1.tar.bz2 new file mode 100644 index 00000000000..56392793744 Binary files /dev/null and b/packaging/SuSE/samba-vscan-0.3.1.tar.bz2 differ diff --git a/packaging/SuSE/samba3.spec b/packaging/SuSE/samba3.spec new file mode 100644 index 00000000000..625a7d12839 --- /dev/null +++ b/packaging/SuSE/samba3.spec @@ -0,0 +1,766 @@ +# +# spec file for package samba (Version HEAD) CVS +# +# Copyright (c) 2002 SuSE Linux AG, Nuernberg, Germany. +# This file and all modifications and additions to the pristine +# package are under the same license as the package itself. +# +# packaged by Guenther Deschner - work is not finished yet ! + +# neededforbuild acl acl-devel attr attr-devel autoconf automake heimdal-devel heimdal-lib libxml2 libxml2-devel mysql-devel mysql-shared openldap2 openldap2-client openldap2-devel openssl openssl-devel popt popt-devel python python-devel readline readline-devel +# usedforbuild aaa_base aaa_version acl attr bash bind9-utils bison cpio cpp cyrus-sasl db devs diffutils e2fsprogs file filesystem fileutils fillup findutils flex gawk gdbm-devel glibc glibc-devel glibc-locale gpm grep groff gzip kbd less libgcc libstdc++ libxcrypt m4 make man mktemp modutils ncurses ncurses-devel net-tools netcfg pam pam-devel pam-modules patch permissions ps rcs readline sed sendmail sh-utils shadow strace syslogd sysvinit tar texinfo textutils timezone unzip util-linux vim zlib-devel acl-devel attr-devel autoconf automake binutils bzip2 cracklib gcc gdbm gettext heimdal-devel heimdal-lib libtool libxml2 libxml2-devel mysql-devel mysql-shared openldap2 openldap2-client openldap2-devel openssl openssl-devel perl popt popt-devel python python-devel readline-devel rpm zlib + + +Vendor: SuSE Linux AG, GS Berlin, Germany +Distribution: SuSE Linux 8.1 (i386) +Name: samba +Packager: gd@suse.de +License: GPL +Group: Productivity/Networking/Samba +Url: http://www.samba.org +Provides: samba smbfs +Obsoletes: samba-classic samba-ldap +Autoreqprov: on +%define smbwrap 0 +%define mit_kerberos 0 +%define heimdal_kerberos 1 +%define devel 0 +%define head 0 +%define python 1 +%define netatalk 0 +%define newsam 0 +%define samba_ver 3.0.0 +Requires: samba-client = %{samba_ver} +Version: 3.0.0 +Release: %(date +%%j) +Summary: An SMB file server for Unix +Source: %{name}-%{version}.tar.bz2 +Source10: %{name}-%{version}.files.tar.bz2 +Source50: http://prdownloads.sourceforge.net/openantivirus/samba-vscan-%{vscan_ver}.tar.bz2 +Patch1: %{name}-%{version}-pdb.diff +Patch10: %{name}-%{version}-net_ads.diff +Patch22: %{name}-%{version}-msdfs.diff +Patch30: %{name}-%{version}-python.diff +BuildRoot: %{_tmppath}/%{name}-%{version}-buildroot +%define DOCDIR %{_defaultdocdir}/%{name} +%define SWATDIR %{_datadir}/samba/swat +%define vscan_ver 0.3.1 +%define vscan_modules fprot kaspersky mks openantivirus sophos trend +Patch51: %{name}-%{version}-vscan.diff + +%package client +Summary: Samba client utilities +Autoreqprov: on +Requires: cups-libs +Obsoletes: smbclnt samba-classic-client samba-ldap-client +Group: Productivity/Networking/Samba + +%package winbind +Requires: samba-client samba +Summary: Samba Winbind-package +Autoreqprov: on +Group: Productivity/Networking/Samba + +%package utils +Summary: Samba Testing Utilities +Autoreqprov: on +Group: Productivity/Networking/Samba + +%package doc +Summary: Samba Documentation +Autoreqprov: on +Group: Productivity/Networking/Samba + +%package pdb +Summary: Samba PDB-Modules +Autoreqprov: on +Group: Productivity/Networking/Samba + +%package vfs +Summary: Samba VFS-Modules +Autoreqprov: on +Group: Productivity/Networking/Samba + +%if %{newsam} > 0 +%package sam +Summary: Samba SAM-Modules +Autoreqprov: on +Group: Productivity/Networking/Samba +%endif + +%package vscan +Summary: Samba VFS-Modules for Virusscanners +Autoreqprov: on +Group: Productivity/Networking/Samba +Version: 0.3.1 + +%package python +Summary: Samba Python-Modules +Autoreqprov: on +Group: Productivity/Networking/Samba + + + + +%changelog +* Sat Nov 3 2001 - gd@suse.de +- start + + +%prep +[ $RPM_BUILD_ROOT = "/" ] && (echo "your buildroot is /" && exit 0) || rm -rf $RPM_BUILD_ROOT +mkdir $RPM_BUILD_ROOT + +%setup -n %{name}-%{samba_ver} +%setup -T -D -a 50 +cp -ar samba-vscan-%{vscan_ver} examples/VFS/ + +# untar my configs +%setup -T -D -a 10 + +%if %{heimdal_kerberos} > 0 +%patch1 +%patch51 +%endif +#%patch10 +#%patch22 +#%patch30 + +find . -name CVS -print | xargs rm -rf +find . -name ".cvsignore" -print | xargs rm -rf +find . -name "'*.gd'" -print | xargs rm -rvf +find . -name "'*.orig'" -print | xargs rm -rvf + +%build %{name}-%{samba_ver} +%{?suse_update_config:%{suse_update_config -f}} +cd source +./autogen.sh +libtoolize --force --copy +autoconf +export CFLAGS="$RPM_OPT_FLAGS -Wall -O -D_GNU_SOURCE -D_LARGEFILE64_SOURCE" +%ifarch ppc64 +export CFLAGS="$CFLAGS -mminimal-toc" +%endif +CONF_OPTS_BASIC="\ + --prefix=/usr \ + --libdir=/etc/samba \ + --localstatedir=/var/lib/samba \ + --mandir=%{_mandir} \ + --sbindir=/usr/sbin \ + --with-privatedir=/etc/samba \ + --with-piddir=/var/run/samba \ + --with-codepagedir=/usr/share/samba/codepages \ + --with-swatdir=/usr/share/samba/swat \ + --with-smbmount \ + --with-automount \ + --enable-cups \ + --with-msdfs \ + --with-vfs \ + --with-pam \ + --with-pam_smbpass \ + --with-utmp \ + --with-winbind \ + --with-tdbsam \ + --with-ldapsam \ +%if %{smbwrap} + --with-smbwrapper \ +%endif + --with-quotas \ + --with-acl-support \ + --with-python=python2.2 \ + --with-syslog \ +" +CONF_OPTS_HEAD="\ + --with-sam \ +" +CONF_OPTS_HEIMDAL_KERBEROS="\ + --with-krb5impl=heimdal \ +" +CONF_OPTS_HEIMDAL_51_KERBEROS="\ + --with-krb5impl=heimdal \ + --with-krb5includes=/opt/heimdal-0.5.1/include \ + --with-krb5libs=/opt/heimdal-0.5.1/lib \ +" +CONF_OPTS_MIT_KERBEROS="\ + --with-krb5impl=mit \ + --with-krb5includes=/usr/kerberos/include \ + --with-krb5libs=/usr/kerberos/lib \ +" +CONF_OPTS_DEVEL="\ + --enable-developer \ + --enable-krb5developer \ + --with-profiling-data \ +" +CONF_OPTS="$CONF_OPTS_BASIC" +%if %{head} > 0 +CONF_OPTS="$CONF_OPTS $CONF_OPTS_HEAD" +%endif +%if %{heimdal_kerberos} > 0 +CONF_OPTS="$CONF_OPTS $CONF_OPTS_HEIMDAL_KERBEROS" +%endif +%if %{mit_kerberos} > 0 +CONF_OPTS="$CONF_OPTS $CONF_OPTS_MIT_KERBEROS" +%endif +%if %{devel} > 0 +CONF_OPTS="$CONF_OPTS $CONF_OPTS_DEVEL" +%endif + +./configure $CONF_OPTS + +### --with-ldapsam is now standard! +### --with-sendfile-support ---default now +# --with-nisplussam \ +# --with-nisplus_home \ + +# with the new passdb-code we can finaly compile several passdb-backends +# and make our choice at runtime. +# HEAD and thus alpha21 no longer need this +#make proto + +make \ + LOCKDIR=/var/lib/samba \ + LOGFILEBASE=/var/log/samba \ + SBINDIR=/usr/sbin \ + all \ + torture \ + nsswitch/libnss_wins.so \ + debug2html \ + libsmbclient \ + bin/profiles \ + everything + +# everything = nsswitch smbwrapper smbtorture debug2html smbfilter nsswitch/libnss_wins.so + +%if %{newsam} > 0 +make bin/samtest +%endif +make modules + +make -C tdb tdbdump tdbtest tdbtool tdbtorture +# tdbbackup is now in main Makefile + +make talloctort + +# VFS,PDB and SAM +EXAMPLEDIRS="pdb" +for i in $EXAMPLEDIRS; do make -C ../examples/$i; done + +export USE_KAVPSHAREDLIB=0 +for module in %{vscan_modules}; do + make -C ../examples/VFS/%{name}-vscan-%{vscan_ver}/${module}; +done + +# tim potters python +%if %{python} > 0 +make python_ext +%endif + + + +%install + +mkdir -p \ + $RPM_BUILD_ROOT/usr/{bin,sbin} \ + $RPM_BUILD_ROOT/usr/share/{man,samba/{scripts,swat}} \ + $RPM_BUILD_ROOT/usr/lib/samba/{vfs,pdb,sam,vscan} \ + $RPM_BUILD_ROOT/usr/lib/python2.2/lib-dynload \ + $RPM_BUILD_ROOT/usr/include \ + $RPM_BUILD_ROOT/etc/{pam.d,init.d,samba} \ + $RPM_BUILD_ROOT/var/adm \ + $RPM_BUILD_ROOT/sbin \ + $RPM_BUILD_ROOT/lib/security \ + $RPM_BUILD_ROOT/%{DOCDIR} \ + $RPM_BUILD_ROOT/%{DOCDIR}-vscan \ + $RPM_BUILD_ROOT/var/spool/samba \ + $RPM_BUILD_ROOT/var/log/samba \ + $RPM_BUILD_ROOT/var/run/samba \ + $RPM_BUILD_ROOT/var/lib/samba/{netlogon,drivers/{W32X86,WIN40,W32ALPHA,W32MIPS,W32PPC},profiles} + +cd source/ +make install \ + LIBDIR=$RPM_BUILD_ROOT/etc/samba \ + LOGFILEBASE=$RPM_BUILD_ROOT/var/log/samba \ + CONFIGFILE=$RPM_BUILD_ROOT/etc/samba/smb.conf \ + LMHOSTSFILE=$RPM_BUILD_ROOT/etc/samba/lmhosts \ + SWATDIR=$RPM_BUILD_ROOT/usr/share/samba/swat \ + SBINDIR=$RPM_BUILD_ROOT/usr/sbin \ + LOCKDIR=$RPM_BUILD_ROOT/var/lock/samba \ + CODEPAGEDIR=$RPM_BUILD_ROOT/usr/share/samba/codepages \ + DRIVERFILE=$RPM_BUILD_ROOT/etc/samba/printers.def \ + BINDIR=$RPM_BUILD_ROOT/usr/bin \ + SMB_PASSWD_FILE=$RPM_BUILD_ROOT/etc/samba/smbpasswd \ + TDB_PASSWD_FILE=$RPM_BUILD_ROOT/etc/samba/smbpasswd.tdb \ + MANDIR=$RPM_BUILD_ROOT/usr/share/man +cd .. + +# utility scripts +%if %{head} > 0 +scripts="creategroup cvslog.pl scancvslog.pl" +%else +scripts="scancvslog.pl" +%endif +for i in $scripts; do + cp -a source/script/$i $RPM_BUILD_ROOT/usr/share/samba/scripts/ +done + +# move the man-pages (ugly lang thing, fixed in alpha16) +#mv $RPM_BUILD_ROOT/usr/share/man/lang/* $RPM_BUILD_ROOT/usr/share/man/ + +# configuration files +install -m 644 smb.conf* $RPM_BUILD_ROOT/etc/samba/ +install -m 644 shares.conf $RPM_BUILD_ROOT/etc/samba/ +install -m 644 lmhosts $RPM_BUILD_ROOT/etc/samba/ +install -m 600 smbpasswd -o root -g root $RPM_BUILD_ROOT/etc/samba/ + +# pam +install -m 644 samba.pamd $RPM_BUILD_ROOT/etc/pam.d/samba + +# sambamount +ln -sf /usr/bin/smbmount $RPM_BUILD_ROOT/sbin/mount.smbfs + +# start scripts +install rc.smb $RPM_BUILD_ROOT/etc/init.d/smb +ln -sf ../../etc/init.d/smb $RPM_BUILD_ROOT/usr/sbin/rcsmb +install rc.smbfs $RPM_BUILD_ROOT/etc/init.d/smbfs +ln -sf ../../etc/init.d/smbfs $RPM_BUILD_ROOT/usr/sbin/rcsmbfs +install rc.winbind $RPM_BUILD_ROOT/etc/init.d/winbind +ln -sf ../../etc/init.d/winbind $RPM_BUILD_ROOT/usr/sbin/rcwinbind +install rc.wrepl $RPM_BUILD_ROOT/etc/init.d/wrepl +ln -sf ../../etc/init.d/wrepl $RPM_BUILD_ROOT/usr/sbin/rcwrepl + +#### disabled for 8.0 +### rc.config fragment +mkdir -p $RPM_BUILD_ROOT/var/adm/fillup-templates +cp rc.config.samba $RPM_BUILD_ROOT/var/adm/fillup-templates +cp rc.config.winbind $RPM_BUILD_ROOT/var/adm/fillup-templates +cp rc.config.wrepl $RPM_BUILD_ROOT/var/adm/fillup-templates + +# libnss_wins.so +cp source/nsswitch/libnss_wins.so $RPM_BUILD_ROOT/lib/libnss_wins.so +ln -sf /lib/libnss_wins.so $RPM_BUILD_ROOT/lib/libnss_wins.so.2 + +# winbind stuff +cp -a source/nsswitch/pam_winbind.so $RPM_BUILD_ROOT/lib/security/ +cp -a source/nsswitch/libnss_winbind.so $RPM_BUILD_ROOT/lib/ +cp -a source/bin/winbindd $RPM_BUILD_ROOT/usr/sbin/ +ln -sf /lib/libnss_winbind.so $RPM_BUILD_ROOT/lib/libnss_winbind.so.2 + +# pam_smbpass +cp -a source/bin/pam_smbpass.so $RPM_BUILD_ROOT/lib/security/ + +# smbfilter +cp -a source/bin/smbfilter $RPM_BUILD_ROOT/usr/bin/ + + +%{?suse_check} + +## install libsmbclient +install -m0755 source/bin/{libsmbclient.so,libsmbclient.a} $RPM_BUILD_ROOT/%{_libdir} +ln -s /usr/lib/libsmbclient.so $RPM_BUILD_ROOT/%{_libdir}/libsmbclient.so.0 +install -m0644 source/include/libsmbclient.h $RPM_BUILD_ROOT/%{_includedir} + +# install smbtorture and other test-programs +install -m0755 source/bin/smbtorture $RPM_BUILD_ROOT/usr/bin/ +install -m0755 source/bin/talloctort $RPM_BUILD_ROOT/usr/bin/ +install -m0755 source/bin/{msgtest,masktest,locktest*} $RPM_BUILD_ROOT/usr/bin/ +install -m0755 source/bin/{vfstest,nsstest} $RPM_BUILD_ROOT/usr/bin/ +%if %{head} > 0 +%if %{newsam} > 0 +install -m0755 source/bin/samtest $RPM_BUILD_ROOT/usr/bin/ +%endif +%endif + +# install tdb tools +install -m0755 source/tdb/{tdbdump,tdbtest,tdbtool,tdbtorture} $RPM_BUILD_ROOT/usr/bin/ + + +# install VFS-modules +%if %{head} > 0 +install -m0755 source/bin/developer.so $RPM_BUILD_ROOT/%{_libdir}/samba/vfs/ +#install -m0755 examples/VFS/block/block.so $RPM_BUILD_ROOT/%{_libdir}/samba/vfs/ +#install -m0755 examples/VFS/skel.so $RPM_BUILD_ROOT/%{_libdir}/samba/vfs/ +%else +#install -m0755 examples/VFS/block/block.so $RPM_BUILD_ROOT/%{_libdir}/samba/vfs/ +#install -m0755 examples/VFS/skel.so $RPM_BUILD_ROOT/%{_libdir}/samba/vfs/ +%endif +install -m0755 source/bin/vfs_audit.so $RPM_BUILD_ROOT/%{_libdir}/samba/vfs/ +install -m0755 source/bin/vfs_extd_audit.so $RPM_BUILD_ROOT/%{_libdir}/samba/vfs/ +install -m0755 source/bin/vfs_recycle.so $RPM_BUILD_ROOT/%{_libdir}/samba/vfs/ +%if %{netatalk} +install -m0755 source/bin/vfs_netatalk.so $RPM_BUILD_ROOT/%{_libdir}/samba/vfs/ +%endif + +# install PDB-modules +%if %{head} > 0 +install -m0755 source/bin/xml.so $RPM_BUILD_ROOT/%{_libdir}/samba/pdb/ +install -m0755 source/bin/mysql.so $RPM_BUILD_ROOT/%{_libdir}/samba/pdb/ +%else +install -m0755 source/bin/pdb_xml.so $RPM_BUILD_ROOT/%{_libdir}/samba/pdb/ +install -m0755 source/bin/pdb_mysql.so $RPM_BUILD_ROOT/%{_libdir}/samba/pdb/ +%endif +install -m0755 examples/pdb/pdb_test.so $RPM_BUILD_ROOT/%{_libdir}/samba/pdb/ + +# install SAM-modules +%if %{head} > 0 +%if %{newsam} > 0 +install -m0755 examples/sam/sam_skel.so $RPM_BUILD_ROOT/%{_libdir}/samba/sam/ +%endif +%endif + +# install VSCAN-vfs-modules +install -m0755 examples/VFS/%{name}-vscan-%{vscan_ver}/*/*.so $RPM_BUILD_ROOT/%{_libdir}/samba/vscan/ + +# make examples clean +VFS="$RPM_BUILD_DIR/%{name}-%{samba_ver}/examples/VFS" +VSCAN="$VFS/%{name}-vscan-%{vscan_ver}" +PDB="$RPM_BUILD_DIR/%{name}-%{samba_ver}/examples/pdb" +%if %{head} > 0 +%if %{newsam} > 0 +SAM="$RPM_BUILD_DIR/%{name}-%{samba_ver}/examples/sam" +%endif +%endif +dirs="$PDB $SAM" +(for i in $dirs; do make -C $i clean; done) +(for i in %{vscan_modules}; do make -C $VSCAN/$i clean; done) + +%if %{python} > 0 +# install python +cp -a source/build/lib.*/samba $RPM_BUILD_ROOT/usr/lib/python2.2/lib-dynload/ +%endif + +# whats this ? +install -m0755 source/bin/debug2html $RPM_BUILD_ROOT/usr/bin/ + +%if %{smbwrap} +# install smbwrapper +install -m0755 source/bin/smbwrapper.so $RPM_BUILD_ROOT/%{_libdir}/samba/ +install -m0755 source/bin/smbsh $RPM_BUILD_ROOT/usr/bin/ +%endif + +# finally obsolete with alpha17 makefile +# install unicode-codepages +#install -m0755 source/codepages/{lowcase,upcase,valid}.dat $RPM_BUILD_ROOT/etc/samba/ + +# cleanup docs +rm -rf docs/*.[0-9] +chmod 644 `find docs examples -type f` +chmod 755 `find docs examples -type d` +mv COPYING Manifest README Read-Manifest-Now Roadmap WHATSNEW.txt $RPM_BUILD_ROOT/%{DOCDIR}/ +cp source/msdfs/README $RPM_BUILD_ROOT/%{DOCDIR}/README.msdfs +#cp source/nsswitch/README $RPM_BUILD_ROOT/%{DOCDIR}/README.nsswitch +cp source/smbwrapper/README $RPM_BUILD_ROOT/%{DOCDIR}/README.smbwrapper +cp -a docs/* $RPM_BUILD_ROOT/%{DOCDIR} +cp -a examples/ $RPM_BUILD_ROOT/%{DOCDIR} +# save space... +rm -r \ + $RPM_BUILD_ROOT/%{SWATDIR}/using_samba +ln -s %{DOCDIR}/htmldocs/using_samba $RPM_BUILD_ROOT/%{SWATDIR} + + +%post +###### disabled for 8.1 +###echo "Updating etc/rc.config..." +##if [ -x bin/fillup ] ; then +## bin/fillup -q -d = etc/rc.config var/adm/fillup-templates/rc.config.samba +## bin/fillup -q -d = etc/rc.config var/adm/fillup-templates/rc.config.winbind +##else +## echo "ERROR: fillup not found. This should not happen. Please compare" +## echo "etc/rc.config and var/adm/fillup-templates/rc.config.samba and" +## echo "var/adm/fillup-templates/rc.config.winbind and update by hand." +##fi +mkdir -p $RPM_BUILD_ROOT/var/adm/notify/messages +cat << EOF > var/adm/notify/messages/samba-notify +Achtung! + +This is %{name}-%{samba_ver}. Please do not run on production systems. + +You have been warned. +EOF + +# Initialize runlevel links +# +%{fillup_and_insserv smb} +#sbin/insserv /etc/init.d/smb + +%post client +#sbin/insserv /etc/init.d/smbfs +%{fillup_and_insserv -fpy smbfs} +%{fillup_only -ans samba client} + +%postun +%{insserv_cleanup} +#sbin/insserv /etc/init.d/ + +%postun client +%{insserv_cleanup} +#sbin/insserv /etc/init.d/ + +%post winbind +%{fillup_and_insserv winbind} +#sbin/insserv /etc/init.d/winbind + +%postun winbind +%{insserv_cleanup} +#sbin/insserv /etc/init.d/ + +%clean +#make -C source realclean + +%files +%config(noreplace) /etc/samba/smbpasswd +%config /etc/pam.d/samba +%config /etc/init.d/smb +%config /etc/init.d/wrepl +#/usr/bin/make_printerdef +/usr/bin/addtosmbpass +/usr/bin/convert_smbpasswd +/usr/bin/smbgroupedit +/usr/bin/ntlm_auth +/usr/bin/profiles +/usr/bin/smbfilter +/usr/bin/smbpasswd +/usr/bin/smbstatus +/usr/bin/testparm +/usr/bin/testprns +#%doc %{_mandir}/man1/smbrun.1.gz +%doc %{_mandir}/man1/smbsh.1.gz +%doc %{_mandir}/man1/smbstatus.1.gz +%doc %{_mandir}/man1/testparm.1.gz +%doc %{_mandir}/man1/testprns.1.gz +%doc %{_mandir}/man5/smbpasswd.5.gz +%doc %{_mandir}/man7/samba.7.gz +%doc %{_mandir}/man8/nmbd.8.gz +%doc %{_mandir}/man8/smbd.8.gz +%doc %{_mandir}/man8/smbgroupedit.8.gz +%doc %{_mandir}/man8/smbpasswd.8.gz +%doc %{_mandir}/man8/swat.8.gz +/usr/sbin/nmbd +/usr/sbin/smbd +/usr/sbin/swat +/usr/sbin/wrepld +/usr/sbin/rcsmb +/usr/sbin/rcwrepl +#/var/adm/fillup-templates/rc.config.samba +/var/log/samba +/var/spool/samba +/var/run/samba +/var/lib/samba +/usr/share/samba +/lib/security/pam_smbpass.so + +%files client +%config(noreplace) /etc/samba/smb.conf +%config(noreplace) /etc/samba/lmhosts +/etc/samba/lowcase.dat +/etc/samba/upcase.dat +/etc/samba/valid.dat +%config /etc/init.d/smbfs +/usr/sbin/rcsmbfs +/sbin/mount.smbfs +/usr/bin/findsmb +/usr/bin/net +/usr/bin/nmblookup +/usr/bin/pdbedit +/usr/bin/rpcclient +/usr/bin/smbcacls +/usr/bin/smbcontrol +/usr/bin/smbclient +/usr/bin/smbmnt +/usr/bin/smbmount +%if %{smbwrap} +/usr/bin/smbsh +%endif +/usr/bin/smbumount +/usr/bin/smbspool +/usr/bin/smbtar +/usr/bin/smbtree +%doc %{_mandir}/man1/nmblookup.1.gz +%doc %{_mandir}/man1/rpcclient.1.gz +%doc %{_mandir}/man1/smbclient.1.gz +%doc %{_mandir}/man1/smbcacls.1.gz +%doc %{_mandir}/man1/smbcontrol.1.gz +%doc %{_mandir}/man1/smbtar.1.gz +%doc %{_mandir}/man5/lmhosts.5.gz +%doc %{_mandir}/man5/smb.conf.5.gz +%doc %{_mandir}/man8/net.8.gz +%doc %{_mandir}/man8/pdbedit.8.gz +%doc %{_mandir}/man8/smbmnt.8.gz +%doc %{_mandir}/man8/smbmount.8.gz +%doc %{_mandir}/man8/smbspool.8.gz +%doc %{_mandir}/man8/smbumount.8.gz +/usr/include/libsmbclient.h +%if %{smbwrap} +/usr/lib/samba/smbwrapper.so +%endif +/usr/lib/libsmbclient.a +/usr/lib/libsmbclient.so +/usr/lib/libsmbclient.so.0 + +%files winbind +%config(noreplace) /etc/samba/smb.conf.winbind +%config /etc/init.d/winbind +%doc %{_mandir}/man1/wbinfo.1.gz +%doc %{_mandir}/man8/winbindd.8.gz +/usr/bin/wbinfo +%if %{head} > 0 +/usr/bin/ntlm_auth +%endif +/usr/sbin/winbindd +/usr/sbin/rcwinbind +#/var/adm/fillup-templates/rc.config.winbind +/lib/security/pam_winbind.so +/lib/libnss_winbind.so +/lib/libnss_winbind.so.2 +/lib/libnss_wins.so +/lib/libnss_wins.so.2 + +%files utils +/usr/bin/smbtorture +/usr/bin/msgtest +/usr/bin/masktest +/usr/bin/locktest +/usr/bin/locktest2 +/usr/bin/debug2html +/usr/bin/talloctort +/usr/bin/tdbbackup +/usr/bin/tdbdump +/usr/bin/tdbtest +/usr/bin/tdbtool +/usr/bin/tdbtorture +/usr/bin/vfstest +/usr/bin/nsstest +%if %{head} > 0 +%if %{newsam} > 0 +/usr/bin/samtest +%endif +/usr/bin/profiles +/usr/bin/editreg +%endif +%doc %{_mandir}/man1/vfstest.1.gz + +%files doc +%docdir %{DOCDIR} +%{DOCDIR} + +%files pdb +/usr/lib/samba/pdb +%doc examples/pdb/* + +%files vfs +/usr/lib/samba/vfs +%doc examples/VFS/README* +%doc examples/VFS/Makefile* +#doc examples/VFS/audit* +#%doc examples/VFS/block* +#doc examples/VFS/netatalk* +#doc examples/VFS/recycle* +%doc examples/VFS/skel* + +%if %{newsam} > 0 +%files sam +/usr/lib/samba/sam +%if %{head} > 0 +%doc examples/sam/* +%endif +%endif + +%files vscan +/usr/lib/samba/vscan +%doc %{name}-vscan-%{vscan_ver}/{AUTHORS,COPYING,ChangeLog,FAQ,NEWS,README,TODO} + + +%files python +%doc source/python/README +%if %{python} > 0 +/usr/lib/python2.2/lib-dynload/samba +%doc source/python/examples +%doc source/python/gprinterdata +%doc source/python/gtdbtool +%doc source/python/gtkdictbrowser.py +%if %{head} > 0 +%doc source/python/gtkdictbrowser.pyc +%doc source/python/printerdata.pyc +%endif +%endif + +%description +Samba is a suite of programs which work together to allow clients to +access Unix filespace and printers via the SMB protocol (Server Message +Block). +In practice, this means that you can redirect disks and printers to +Unix disks and printers from LAN Manager clients, Windows for +Workgroups 3.11 clients, Windows'95 clients, Windows NT clients +and OS/2 clients. There is +also a Unix client program supplied as part of the suite which allows +Unix users to use an ftp-like interface to access filespace and +printers on any other SMB server. +Samba includes the following programs (in summary): +* smbd, the SMB server. This handles actual connections from clients. +* nmbd, the Netbios name server, which helps clients locate servers. +* smbclient, the Unix-hosted client program. +* smbrun, a little 'glue' program to help the server run external +programs. +* testprns, a program to test server access to printers. +* testparm, a program to test the Samba configuration file for correctness. +* smb.conf, the Samba configuration file. +* smbprint, a sample script to allow a Unix host to use smbclient +to print to an SMB server. +The suite is supplied with full source and is GPLed. +This package expects its config file under /etc/smb.conf . + +Authors: +-------- + Andrew Tridgell + Karl Auer + Jeremy Allison + +SuSE series: n + + +%description client +This package contains all programs, that are needed to act as a samba +client. This includes also smbmount, of course. + +Authors: +-------- + Andrew Tridgell + Karl Auer + Jeremy Allison + +SuSE series: n + + +%description winbind +This is the winbind-daemon and the wbinfo-tool. + +%description utils +Some of the debug-tools for developpers. +Contains: + - debug2html + - locktest + - locktest2 + - masktest + - msgtest + - smbtorture + - talloctort + - several tdb-tools + +%description doc +The Samba Documentation. + +%description vfs +The Samba VFS-Modules. + +%description pdb +The Samba PDB-Modules. + +%if %{newsam} > 0 +%description sam +The Samba SAM-Modules. +%endif + +%description vscan +The Samba VFS-Modules for Virusscanners. + +%description python +The Samba python-Modules. diff --git a/source3/Makefile.in b/source3/Makefile.in index fa94c582e0e..7c810678c1b 100644 --- a/source3/Makefile.in +++ b/source3/Makefile.in @@ -4,14 +4,13 @@ # Copyright (C) 2001 by Martin Pool # Copyright Andrew Bartlett 2002 # Copyright (C) 2003 Anthony Liguori -# Copyright (C) 2002-2003 Jelmer Vernooij ########################################################################### prefix=@prefix@ exec_prefix=@exec_prefix@ mandir=@mandir@ -LIBS=@LIBS@ +LIBS=@LIBS@ CC=@CC@ SHLD=@SHLD@ CFLAGS=@CFLAGS@ @@ -22,16 +21,12 @@ LDSHFLAGS=@LDSHFLAGS@ @LDFLAGS@ @CFLAGS@ AWK=@AWK@ DYNEXP=@DYNEXP@ PYTHON=@PYTHON@ -PERL=@PERL@ TERMLDFLAGS=@TERMLDFLAGS@ TERMLIBS=@TERMLIBS@ PRINTLIBS=@PRINTLIBS@ AUTHLIBS=@AUTHLIBS@ ACLLIBS=@ACLLIBS@ -PASSDBLIBS=@PASSDBLIBS@ -ADSLIBS=@ADSLIBS@ -KRB5LIBS=@KRB5_LIBS@ LINK=$(CC) $(FLAGS) $(LDFLAGS) @@ -59,8 +54,6 @@ LIBDIR = @libdir@ VFSLIBDIR = $(LIBDIR)/vfs PDBLIBDIR = $(LIBDIR)/pdb RPCLIBDIR = $(LIBDIR)/rpc -CHARSETLIBDIR = $(LIBDIR)/charset -AUTHLIBDIR = $(LIBDIR)/auth CONFIGDIR = @configdir@ VARDIR = @localstatedir@ MANDIR = @mandir@ @@ -125,8 +118,7 @@ BIN_PROGS1 = bin/smbclient@EXEEXT@ bin/net@EXEEXT@ bin/smbspool@EXEEXT@ \ BIN_PROGS2 = bin/smbcontrol@EXEEXT@ bin/smbtree@EXEEXT@ bin/tdbbackup@EXEEXT@ \ bin/nmblookup@EXEEXT@ bin/pdbedit@EXEEXT@ BIN_PROGS3 = bin/smbpasswd@EXEEXT@ bin/rpcclient@EXEEXT@ bin/smbcacls@EXEEXT@ \ - bin/profiles@EXEEXT@ bin/smbgroupedit@EXEEXT@ bin/ntlm_auth@EXEEXT@ \ - bin/editreg@EXEEXT@ + bin/profiles@EXEEXT@ bin/smbgroupedit@EXEEXT@ bin/ntlm_auth@EXEEXT@ TORTURE_PROGS = bin/smbtorture@EXEEXT@ bin/msgtest@EXEEXT@ \ bin/masktest@EXEEXT@ bin/locktest@EXEEXT@ \ @@ -143,12 +135,8 @@ SCRIPTS = $(srcdir)/script/smbtar $(srcdir)/script/addtosmbpass $(srcdir)/script QUOTAOBJS=@QUOTAOBJS@ -VFS_MODULES = @VFS_MODULES@ -PDB_MODULES = @PDB_MODULES@ -RPC_MODULES = @RPC_MODULES@ -CHARSET_MODULES = @CHARSET_MODULES@ -AUTH_MODULES = @AUTH_MODULES@ -MODULES = $(VFS_MODULES) $(PDB_MODULES) $(RPC_MODULES) $(CHARSET_MODULES) $(AUTH_MODULES) +VFS_MODULES = bin/vfs_audit.@SHLIBEXT@ bin/vfs_extd_audit.@SHLIBEXT@ bin/vfs_recycle.@SHLIBEXT@ bin/vfs_netatalk.@SHLIBEXT@ +PDB_MODULES = @MODULE_MYSQL@ @MODULE_XML@ ###################################################################### # object file lists @@ -175,8 +163,7 @@ LIB_OBJ = lib/charcnv.o lib/debug.o lib/fault.o \ nsswitch/wb_client.o nsswitch/wb_common.o \ lib/pam_errors.o intl/lang_tdb.o lib/account_pol.o \ lib/adt_tree.o lib/gencache.o $(TDB_OBJ) \ - lib/module.o lib/genparser.o lib/genparser_samba.o \ - lib/ldap_escape.o @CHARSET_STATIC@ + lib/module.o lib/ldap_escape.o LIB_SMBD_OBJ = lib/system_smbd.o lib/util_smbd.o @@ -187,7 +174,7 @@ POPT_LIB_OBJ = lib/popt_common.o UBIQX_OBJ = ubiqx/ubi_BinTree.o ubiqx/ubi_Cache.o ubiqx/ubi_SplayTree.o \ ubiqx/ubi_dLinkList.o ubiqx/ubi_sLinkList.o -PARAM_OBJ = dynconfig.o param/loadparm.o param/params.o +PARAM_OBJ = param/loadparm.o param/params.o dynconfig.o KRBCLIENT_OBJ = libads/kerberos.o @@ -217,7 +204,6 @@ LIBSMB_OBJ = libsmb/clientgen.o libsmb/cliconnect.o libsmb/clifile.o \ libsmb/smberr.o libsmb/credentials.o libsmb/pwd_cache.o \ libsmb/clioplock.o libsmb/errormap.o libsmb/clirap2.o \ libsmb/passchange.o libsmb/doserr.o \ - libsmb/trustdom_cache.o \ $(RPC_PARSE_OBJ1) $(LIBNTLMSSP_OBJ) $(LIBSAMBA_OBJ) $(LIBNMB_OBJ) LIBMSRPC_OBJ = rpc_client/cli_lsarpc.o rpc_client/cli_samr.o \ @@ -227,7 +213,7 @@ LIBMSRPC_OBJ = rpc_client/cli_lsarpc.o rpc_client/cli_samr.o \ rpc_client/cli_spoolss.o rpc_client/cli_spoolss_notify.o \ rpc_client/cli_ds.o libsmb/namequery_dc.o -LIBMSRPC_SERVER_OBJ = libsmb/trusts_util.o +LIBMSRPC_SERVER_OBJ = libsmb/trust_passwd.o REGOBJS_OBJ = registry/reg_objects.o REGISTRY_OBJ = registry/reg_frontend.o registry/reg_cachehook.o registry/reg_printing.o \ @@ -252,7 +238,29 @@ RPC_SPOOLSS_OBJ = rpc_server/srv_spoolss.o rpc_server/srv_spoolss_nt.o RPC_PIPE_OBJ = rpc_server/srv_pipe_hnd.o rpc_server/srv_util.o \ rpc_server/srv_pipe.o rpc_server/srv_lsa_hnd.o -RPC_SERVER_OBJ = @RPC_STATIC@ $(RPC_PIPE_OBJ) +# These are like they are to avoid a dependency on GNU MAKE +@LSA_DYNAMIC_YES@RPC_MODULES1 = bin/librpc_lsarpc.@SHLIBEXT@ +@NETLOG_DYNAMIC_YES@RPC_MODULES2 = bin/librpc_NETLOGON.@SHLIBEXT@ +@SAMR_DYNAMIC_YES@RPC_MODULES3 = bin/librpc_samr.@SHLIBEXT@ +@SVC_DYNAMIC_YES@RPC_MODULES4 = bin/librpc_srvsvc.@SHLIBEXT@ +@WKS_DYNAMIC_YES@RPC_MODULES5 = bin/librpc_wkssvc.@SHLIBEXT@ +@REG_DYNAMIC_YES@RPC_MODULES6 = bin/librpc_winreg.@SHLIBEXT@ +@SPOOLSS_DYNAMIC_YES@RPC_MODULES7 = bin/librpc_spoolss.@SHLIBEXT@ +@DFS_DYNAMIC_YES@RPC_MODULES8 = bin/librpc_netdfs.@SHLIBEXT@ +RPC_MODULES = $(RPC_MODULES1) $(RPC_MODULES2) $(RPC_MODULES3) $(RPC_MODULES4) \ + $(RPC_MODULES5) $(RPC_MODULES6) $(RPC_MODULES7) $(RPC_MODULES8) + +@LSA_DYNAMIC_NO@RPC_PIPE_OBJ1 = $(RPC_LSA_OBJ) +@NETLOG_DYNAMIC_NO@RPC_PIPE_OBJ2 = $(RPC_NETLOG_OBJ) +@SAMR_DYNAMIC_NO@RPC_PIPE_OBJ3 = $(RPC_SAMR_OBJ) +@SVC_DYNAMIC_NO@RPC_PIPE_OBJ4 = $(RPC_SVC_OBJ) +@WKS_DYNAMIC_NO@RPC_PIPE_OBJ5 = $(RPC_WKS_OBJ) +@REG_DYNAMIC_NO@RPC_PIPE_OBJ6 = $(RPC_REG_OBJ) +@SPOOLSS_DYNAMIC_NO@RPC_PIPE_OBJ7 = $(RPC_SPOOLSS_OBJ) +@DFS_DYNAMIC_NO@RPC_PIPE_OBJ8 = $(RPC_DFS_OBJ) +RPC_SERVER_OBJ = $(RPC_PIPE_OBJ1) $(RPC_PIPE_OBJ2) $(RPC_PIPE_OBJ3) \ + $(RPC_PIPE_OBJ4) $(RPC_PIPE_OBJ5) $(RPC_PIPE_OBJ6) $(RPC_PIPE_OBJ7) \ + $(RPC_PIPE_OBJ8) $(RPC_PIPE_OBJ) # this includes only the low level parse code, not stuff # that requires knowledge of security contexts @@ -274,27 +282,17 @@ LOCKING_OBJ = locking/locking.o locking/brlock.o locking/posix.o PASSDB_GET_SET_OBJ = passdb/pdb_get_set.o PASSDB_OBJ = $(PASSDB_GET_SET_OBJ) passdb/passdb.o passdb/pdb_interface.o \ - passdb/machine_sid.o passdb/util_sam_sid.o passdb/pdb_compat.o \ - passdb/privileges.o lib/ldap.o @PDB_STATIC@ + passdb/machine_sid.o passdb/pdb_smbpasswd.o \ + passdb/pdb_tdb.o passdb/pdb_ldap.o passdb/pdb_plugin.o \ + passdb/pdb_unix.o passdb/pdb_guest.o passdb/util_sam_sid.o \ + passdb/pdb_compat.o passdb/pdb_nisplus.o -XML_OBJ = modules/xml.o -MYSQL_OBJ = modules/mysql.o -DEVEL_HELP_OBJ = modules/developer.o - -SAM_STATIC_MODULES = sam/sam_plugin.o sam/sam_skel.o sam/sam_ads.o - -IDMAP_OBJ = sam/idmap.o sam/idmap_tdb.o sam/idmap_winbind.o - -SAM_OBJ = sam/account.o sam/get_set_account.o sam/get_set_group.o \ - sam/get_set_domain.o sam/interface.o $(SAM_STATIC_MODULES) - -SAMTEST_OBJ = torture/samtest.o torture/cmd_sam.o $(PARAM_OBJ) $(SAM_OBJ) $(LIB_OBJ) $(LIBSMB_OBJ) $(UBIQX_OBJ) $(READLINE_OBJ) lib/util_seaccess.o $(LIBADS_OBJ) $(KRBCLIENT_OBJ) $(PASSDB_OBJ) $(SECRETS_OBJ) $(GROUPDB_OBJ) +PDB_XML_OBJ = passdb/pdb_xml.o +PDB_MYSQL_OBJ = passdb/pdb_mysql.o GROUPDB_OBJ = groupdb/mapping.o PROFILE_OBJ = profile/profile.o -PROFILES_OBJ = utils/profiles.o -EDITREG_OBJ = utils/editreg.o lib/snprintf.o OPLOCK_OBJ = smbd/oplock.o smbd/oplock_irix.o smbd/oplock_linux.o @@ -304,16 +302,9 @@ PLAINTEXT_AUTH_OBJ = auth/pampass.o auth/pass_check.o UNIGRP_OBJ = libsmb/netlogon_unigrp.o -AUTH_BUILTIN_OBJ = auth/auth_builtin.o -AUTH_DOMAIN_OBJ = auth/auth_domain.o -AUTH_SAM_OBJ = auth/auth_sam.o -AUTH_RHOSTS_OBJ = auth/auth_rhosts.o -AUTH_SERVER_OBJ = auth/auth_server.o -AUTH_UNIX_OBJ = auth/auth_unix.o -AUTH_WINBIND_OBJ = auth/auth_winbind.o - -AUTH_OBJ = auth/auth.o @AUTH_STATIC@ auth/auth_util.o auth/auth_compat.o \ - auth/auth_ntlmssp.o \ +AUTH_OBJ = auth/auth.o auth/auth_sam.o auth/auth_server.o auth/auth_domain.o \ + auth/auth_rhosts.o auth/auth_unix.o auth/auth_util.o auth/auth_winbind.o \ + auth/auth_builtin.o auth/auth_compat.o auth/auth_ntlmssp.o \ $(PLAINTEXT_AUTH_OBJ) $(UNIGRP_OBJ) MANGLE_OBJ = smbd/mangle.o smbd/mangle_hash.o smbd/mangle_map.o smbd/mangle_hash2.o @@ -334,17 +325,16 @@ SMBD_OBJ_SRV = smbd/files.o smbd/chgpasswd.o smbd/connection.o \ printing/printfsp.o lib/util_seaccess.o \ smbd/build_options.o \ smbd/change_trust_pw.o \ - $(MANGLE_OBJ) @VFS_STATIC@ + $(MANGLE_OBJ) -SMBD_OBJ_BASE = $(PARAM_OBJ) $(SMBD_OBJ_SRV) $(MSDFS_OBJ) $(LIBSMB_OBJ) \ - $(RPC_SERVER_OBJ) $(RPC_PARSE_OBJ) $(SECRETS_OBJ) $(UBIQX_OBJ) \ +SMBD_OBJ_BASE = $(SMBD_OBJ_SRV) $(MSDFS_OBJ) $(PARAM_OBJ) $(LIBSMB_OBJ) $(UBIQX_OBJ) \ + $(RPC_SERVER_OBJ) $(RPC_PARSE_OBJ) $(SECRETS_OBJ) \ $(LOCKING_OBJ) $(PASSDB_OBJ) $(PRINTING_OBJ) $(PROFILE_OBJ) \ $(LIB_OBJ) $(PRINTBACKEND_OBJ) $(QUOTAOBJS) $(OPLOCK_OBJ) \ $(NOTIFY_OBJ) $(GROUPDB_OBJ) $(AUTH_OBJ) \ $(LIBMSRPC_OBJ) $(LIBMSRPC_SERVER_OBJ) \ $(LIBADS_OBJ) $(KRBCLIENT_OBJ) $(LIBADS_SERVER_OBJ) \ - $(LIB_SMBD_OBJ) $(REGISTRY_OBJ) $(POPT_LIB_OBJ) \ - $(IDMAP_OBJ) + $(LIB_SMBD_OBJ) $(REGISTRY_OBJ) $(POPT_LIB_OBJ) PRINTING_OBJ = printing/pcap.o printing/print_svid.o \ @@ -356,7 +346,8 @@ PRINTBACKEND_OBJ = printing/printing.o printing/nt_printing.o printing/notify.o MSDFS_OBJ = msdfs/msdfs.o -SMBD_OBJ = $(SMBD_OBJ_BASE) $(SMBD_OBJ_MAIN) +SMBD_OBJ = $(SMBD_OBJ_MAIN) $(SMBD_OBJ_BASE) + NMBD_OBJ1 = nmbd/asyncdns.o nmbd/nmbd.o nmbd/nmbd_become_dmb.o \ nmbd/nmbd_become_lmb.o nmbd/nmbd_browserdb.o \ nmbd/nmbd_browsesync.o nmbd/nmbd_elections.o \ @@ -377,13 +368,13 @@ WREPL_OBJ1 = wrepld/server.o wrepld/process.o wrepld/parser.o wrepld/socket.o \ wrepld/partners.o WREPL_OBJ = $(WREPL_OBJ1) $(PARAM_OBJ) $(UBIQX_OBJ) \ - $(PROFILE_OBJ) $(LIB_OBJ) $(POPT_LIB_OBJ) + $(PROFILE_OBJ) $(LIB_OBJ) SWAT_OBJ1 = web/cgi.o web/diagnose.o web/startstop.o web/statuspage.o \ web/swat.o web/neg_lang.o -SWAT_OBJ = $(SWAT_OBJ1) $(PARAM_OBJ) $(PRINTING_OBJ) $(LIBSMB_OBJ) \ - $(LOCKING_OBJ) $(PASSDB_OBJ) $(SECRETS_OBJ) $(KRBCLIENT_OBJ) \ +SWAT_OBJ = $(SWAT_OBJ1) $(PRINTING_OBJ) $(LIBSMB_OBJ) $(LOCKING_OBJ) \ + $(PARAM_OBJ) $(PASSDB_OBJ) $(SECRETS_OBJ) $(KRBCLIENT_OBJ) \ $(UBIQX_OBJ) $(LIB_OBJ) $(GROUPDB_OBJ) $(PLAINTEXT_AUTH_OBJ) \ $(POPT_LIB_OBJ) @@ -399,7 +390,7 @@ SMBCONTROL_OBJ = utils/smbcontrol.o $(LOCKING_OBJ) $(PARAM_OBJ) \ SMBTREE_OBJ = utils/smbtree.o $(LOCKING_OBJ) $(PARAM_OBJ) \ $(UBIQX_OBJ) $(PROFILE_OBJ) $(LIB_OBJ) $(LIBSMB_OBJ) \ - $(KRBCLIENT_OBJ) $(POPT_LIB_OBJ) + $(KRBCLIENT_OBJ) TESTPARM_OBJ = utils/testparm.o \ $(PARAM_OBJ) $(UBIQX_OBJ) $(LIB_OBJ) $(POPT_LIB_OBJ) @@ -409,15 +400,14 @@ TESTPRNS_OBJ = utils/testprns.o $(PARAM_OBJ) $(PRINTING_OBJ) $(UBIQX_OBJ) \ SMBPASSWD_OBJ = utils/smbpasswd.o $(PARAM_OBJ) $(SECRETS_OBJ) \ $(LIBSMB_OBJ) $(PASSDB_OBJ) $(GROUPDB_OBJ)\ - $(UBIQX_OBJ) $(LIB_OBJ) $(KRBCLIENT_OBJ) \ - $(IDMAP_OBJ) + $(UBIQX_OBJ) $(LIB_OBJ) $(KRBCLIENT_OBJ) PDBEDIT_OBJ = utils/pdbedit.o $(PARAM_OBJ) $(PASSDB_OBJ) $(LIBSAMBA_OBJ) \ $(UBIQX_OBJ) $(LIB_OBJ) $(GROUPDB_OBJ) $(SECRETS_OBJ) \ - $(POPT_LIB_OBJ) $(IDMAP_OBJ) + $(POPT_LIB_OBJ) SMBGROUPEDIT_OBJ = utils/smbgroupedit.o $(GROUPDB_OBJ) $(PARAM_OBJ) \ - $(LIBSAMBA_OBJ) $(PASSDB_OBJ) $(SECRETS_OBJ) $(UBIQX_OBJ) $(LIB_OBJ) $(IDMAP_OBJ) + $(LIBSAMBA_OBJ) $(PASSDB_OBJ) $(SECRETS_OBJ) $(UBIQX_OBJ) $(LIB_OBJ) RPCCLIENT_OBJ1 = rpcclient/rpcclient.o rpcclient/cmd_lsarpc.o \ rpcclient/cmd_samr.o rpcclient/cmd_spoolss.o \ @@ -429,8 +419,7 @@ RPCCLIENT_OBJ = $(RPCCLIENT_OBJ1) \ $(PARAM_OBJ) $(LIBSMB_OBJ) $(UBIQX_OBJ) $(LIB_OBJ) \ $(RPC_PARSE_OBJ) $(PASSDB_OBJ) $(LIBMSRPC_OBJ) \ $(READLINE_OBJ) $(GROUPDB_OBJ) $(KRBCLIENT_OBJ) \ - $(LIBADS_OBJ) $(SECRETS_OBJ) $(POPT_LIB_OBJ) \ - $(IDMAP_OBJ) + $(LIBADS_OBJ) $(SECRETS_OBJ) $(POPT_LIB_OBJ) PAM_WINBIND_OBJ = nsswitch/pam_winbind.po nsswitch/wb_common.po lib/snprintf.po @@ -447,8 +436,8 @@ SMBWRAPPER_OBJ1 = smbwrapper/wrapped.o SMBWRAPPER_OBJ = $(SMBW_OBJ) $(SMBWRAPPER_OBJ1) LIBSMBCLIENT_OBJ = libsmb/libsmbclient.o libsmb/libsmb_compat.o \ - libsmb/libsmb_cache.o $(PARAM_OBJ) $(LIB_OBJ) \ - $(LIBSMB_OBJ) $(KRBCLIENT_OBJ) $(UBIQX_OBJ) + libsmb/libsmb_cache.o $(LIB_OBJ) \ + $(LIBSMB_OBJ) $(KRBCLIENT_OBJ) $(PARAM_OBJ) $(UBIQX_OBJ) # This shared library is intended for linking with unit test programs # to test Samba internals. It's called libbigballofmud.so to @@ -456,7 +445,7 @@ LIBSMBCLIENT_OBJ = libsmb/libsmbclient.o libsmb/libsmb_compat.o \ LIBBIGBALLOFMUD_MAJOR = 0 -LIBBIGBALLOFMUD_OBJ = $(PARAM_OBJ) $(LIB_OBJ) $(UBIQX_OBJ) $(SECRETS_OBJ) \ +LIBBIGBALLOFMUD_OBJ = $(LIB_OBJ) $(UBIQX_OBJ) $(PARAM_OBJ) $(SECRETS_OBJ) \ $(LIBSMB_OBJ) $(LIBMSRPC_OBJ) $(RPC_PARSE_OBJ) $(PASSDB_OBJ) \ $(GROUPDB_OBJ) $(KRBCLIENT_OBJ) @@ -473,12 +462,11 @@ NET_OBJ1 = utils/net.o utils/net_ads.o utils/net_ads_cldap.o utils/net_help.o \ utils/net_rpc_join.o utils/net_time.o utils/net_lookup.o \ utils/net_cache.o -NET_OBJ = $(NET_OBJ1) $(PARAM_OBJ) $(SECRETS_OBJ) $(LIBSMB_OBJ) \ +NET_OBJ = $(NET_OBJ1) $(SECRETS_OBJ) $(LIBSMB_OBJ) $(KRBCLIENT_OBJ) \ $(RPC_PARSE_OBJ) $(PASSDB_OBJ) $(GROUPDB_OBJ) \ - $(KRBCLIENT_OBJ) $(UBIQX_OBJ) $(LIB_OBJ) \ + $(PARAM_OBJ) $(UBIQX_OBJ) $(LIB_OBJ) \ $(LIBMSRPC_OBJ) $(LIBMSRPC_SERVER_OBJ) \ - $(LIBADS_OBJ) $(LIBADS_SERVER_OBJ) $(POPT_LIB_OBJ) \ - $(IDMAP_OBJ) + $(LIBADS_OBJ) $(LIBADS_SERVER_OBJ) $(POPT_LIB_OBJ) CUPS_OBJ = client/smbspool.o $(PARAM_OBJ) $(LIBSMB_OBJ) $(UBIQX_OBJ) \ $(LIB_OBJ) $(KRBCLIENT_OBJ) @@ -491,24 +479,24 @@ MNT_OBJ = client/smbmnt.o UMOUNT_OBJ = client/smbumount.o NMBLOOKUP_OBJ = utils/nmblookup.o $(PARAM_OBJ) $(UBIQX_OBJ) $(LIBNMB_OBJ) \ - $(LIB_OBJ) $(POPT_LIB_OBJ) + $(LIB_OBJ) SMBTORTURE_OBJ1 = torture/torture.o torture/nbio.o torture/scanner.o torture/utable.o \ torture/denytest.o torture/mangle_test.o -SMBTORTURE_OBJ = $(SMBTORTURE_OBJ1) $(PARAM_OBJ) \ - $(LIBSMB_OBJ) $(KRBCLIENT_OBJ) $(UBIQX_OBJ) $(LIB_OBJ) +SMBTORTURE_OBJ = $(SMBTORTURE_OBJ1) \ + $(LIBSMB_OBJ) $(KRBCLIENT_OBJ) $(PARAM_OBJ) $(UBIQX_OBJ) $(LIB_OBJ) -MASKTEST_OBJ = torture/masktest.o $(PARAM_OBJ) $(LIBSMB_OBJ) $(KRBCLIENT_OBJ) \ +MASKTEST_OBJ = torture/masktest.o $(LIBSMB_OBJ) $(KRBCLIENT_OBJ) $(PARAM_OBJ) \ $(UBIQX_OBJ) $(LIB_OBJ) -MSGTEST_OBJ = torture/msgtest.o $(PARAM_OBJ) $(LIBSMB_OBJ) $(KRBCLIENT_OBJ) \ +MSGTEST_OBJ = torture/msgtest.o $(LIBSMB_OBJ) $(KRBCLIENT_OBJ) $(PARAM_OBJ) \ $(UBIQX_OBJ) $(LIB_OBJ) -LOCKTEST_OBJ = torture/locktest.o $(PARAM_OBJ) $(LOCKING_OBJ) $(KRBCLIENT_OBJ) \ - $(LIBSMB_OBJ) $(UBIQX_OBJ) $(LIB_OBJ) +LOCKTEST_OBJ = torture/locktest.o $(LOCKING_OBJ) $(KRBCLIENT_OBJ) $(LIBSMB_OBJ) $(PARAM_OBJ) \ + $(UBIQX_OBJ) $(LIB_OBJ) -NSSTEST_OBJ = torture/nsstest.o $(PARAM_OBJ) $(LIBSMB_OBJ) $(KRBCLIENT_OBJ) \ +NSSTEST_OBJ = torture/nsstest.o $(LIBSMB_OBJ) $(KRBCLIENT_OBJ) $(PARAM_OBJ) \ $(UBIQX_OBJ) $(LIB_OBJ) VFSTEST_OBJ = torture/cmd_vfs.o torture/vfstest.o $(SMBD_OBJ_BASE) $(READLINE_OBJ) @@ -517,17 +505,17 @@ VFS_AUDIT_OBJ = modules/vfs_audit.o VFS_EXTD_AUDIT_OBJ = modules/vfs_extd_audit.o VFS_RECYCLE_OBJ = modules/vfs_recycle.o VFS_NETATALK_OBJ = modules/vfs_netatalk.o -VFS_FAKE_PERMS_OBJ = modules/vfs_fake_perms.o -LOCKTEST2_OBJ = torture/locktest2.o $(PARAM_OBJ) $(LOCKING_OBJ) $(LIBSMB_OBJ) \ - $(KRBCLIENT_OBJ) $(UBIQX_OBJ) $(LIB_OBJ) +LOCKTEST2_OBJ = torture/locktest2.o $(LOCKING_OBJ) $(LIBSMB_OBJ) \ + $(KRBCLIENT_OBJ) $(PARAM_OBJ) \ + $(UBIQX_OBJ) $(LIB_OBJ) -SMBCACLS_OBJ = utils/smbcacls.o $(PARAM_OBJ) $(LOCKING_OBJ) $(LIBSMB_OBJ) \ - $(KRBCLIENT_OBJ) $(UBIQX_OBJ) $(LIB_OBJ) $(RPC_PARSE_OBJ) \ - $(PASSDB_GET_SET_OBJ) $(LIBMSRPC_OBJ) $(SECRETS_OBJ) \ - $(POPT_LIB_OBJ) +SMBCACLS_OBJ = utils/smbcacls.o $(LOCKING_OBJ) $(LIBSMB_OBJ) $(KRBCLIENT_OBJ) \ + $(PARAM_OBJ) \ + $(UBIQX_OBJ) $(LIB_OBJ) $(RPC_PARSE_OBJ) $(PASSDB_GET_SET_OBJ) \ + $(LIBMSRPC_OBJ) $(SECRETS_OBJ) -TALLOCTORT_OBJ = lib/talloctort.o $(PARAM_OBJ) $(LIB_OBJ) $(UBIQX_OBJ) +TALLOCTORT_OBJ = lib/talloctort.o $(LIB_OBJ) $(PARAM_OBJ) $(UBIQX_OBJ) RPCTORTURE_OBJ = torture/rpctorture.o \ rpcclient/display.o \ @@ -541,7 +529,7 @@ RPCTORTURE_OBJ = torture/rpctorture.o \ DEBUG2HTML_OBJ = utils/debug2html.o ubiqx/debugparse.o -SMBFILTER_OBJ = utils/smbfilter.o $(PARAM_OBJ) $(LIBSMB_OBJ) \ +SMBFILTER_OBJ = utils/smbfilter.o $(LIBSMB_OBJ) $(PARAM_OBJ) \ $(UBIQX_OBJ) $(LIB_OBJ) $(KRBCLIENT_OBJ) PROTO_OBJ = $(SMBD_OBJ_MAIN) \ @@ -555,8 +543,7 @@ PROTO_OBJ = $(SMBD_OBJ_MAIN) \ $(READLINE_OBJ) $(PROFILE_OBJ) $(LIBADS_OBJ) $(LIBADS_SERVER_OBJ) \ $(LIB_SMBD_OBJ) $(SAM_OBJ) $(REGISTRY_OBJ) $(POPT_LIB_OBJ) \ $(RPC_LSA_OBJ) $(RPC_NETLOG_OBJ) $(RPC_SAMR_OBJ) $(RPC_REG_OBJ) \ - $(RPC_SVC_OBJ) $(RPC_WKS_OBJ) $(RPC_DFS_OBJ) $(RPC_SPOOLSS_OBJ) \ - $(IDMAP_OBJ) + $(RPC_SVC_OBJ) $(RPC_WKS_OBJ) $(RPC_DFS_OBJ) $(RPC_SPOOLSS_OBJ) NSS_OBJ_0 = nsswitch/wins.o $(PARAM_OBJ) $(UBIQX_OBJ) $(LIBSMB_OBJ) \ $(LIB_OBJ) $(NSSWINS_OBJ) @@ -580,8 +567,6 @@ WINBINDD_OBJ1 = \ nsswitch/winbindd_user.o \ nsswitch/winbindd_group.o \ nsswitch/winbindd_idmap.o \ - nsswitch/winbindd_idmap_tdb.o \ - nsswitch/winbindd_idmap_ldap.o \ nsswitch/winbindd_util.o \ nsswitch/winbindd_cache.o \ nsswitch/winbindd_pam.o \ @@ -597,11 +582,11 @@ WINBINDD_OBJ = \ $(WINBINDD_OBJ1) $(PASSDB_GET_SET_OBJ) \ $(PARAM_OBJ) $(UBIQX_OBJ) $(LIB_OBJ) \ $(LIBSMB_OBJ) $(LIBMSRPC_OBJ) $(RPC_PARSE_OBJ) \ - $(PROFILE_OBJ) $(UNIGRP_OBJ) $(IDMAP_OBJ) \ - $(SECRETS_OBJ) $(LIBADS_OBJ) $(KRBCLIENT_OBJ) $(POPT_LIB_OBJ) \ - lib/ldap.o + $(PROFILE_OBJ) $(UNIGRP_OBJ) \ + $(SECRETS_OBJ) $(LIBADS_OBJ) $(KRBCLIENT_OBJ) -WBINFO_OBJ = nsswitch/wbinfo.o libsmb/smbencrypt.o libsmb/smbdes.o $(POPT_LIB_OBJ) +WBINFO_OBJ = nsswitch/wbinfo.o libsmb/smbencrypt.o libsmb/smbdes.o \ + $(POPT_LIB_OBJ) WINBIND_NSS_OBJ = nsswitch/wb_common.o @WINBIND_NSS_EXTRA_OBJS@ @@ -617,8 +602,7 @@ NTLM_AUTH_OBJ = utils/ntlm_auth.o $(LIBNTLMSSP_OBJ) $(LIBSAMBA_OBJ) $(POPT_LIB_O ###################################################################### # now the rules... ###################################################################### -all : SHOWFLAGS proto_exists $(SBIN_PROGS) $(BIN_PROGS) $(SHLIBS) \ - $(TORTURE_PROGS) $(MODULES) @EXTRA_ALL_TARGETS@ +all : SHOWFLAGS proto_exists $(SBIN_PROGS) $(BIN_PROGS) $(SHLIBS) $(RPC_MODULES) @EXTRA_ALL_TARGETS@ pam_smbpass : SHOWFLAGS bin/pam_smbpass.@SHLIBEXT@ @@ -650,9 +634,9 @@ nsswitch : SHOWFLAGS bin/winbindd@EXEEXT@ bin/wbinfo@EXEEXT@ nsswitch/libnss_win wins : SHOWFLAGS nsswitch/libnss_wins.@SHLIBEXT@ -modules: SHOWFLAGS proto_exists $(MODULES) +modules: SHOWFLAGS proto_exists $(VFS_MODULES) $(PDB_MODULES) -everything: all libsmbclient debug2html smbfilter talloctort +everything: all libsmbclient debug2html smbfilter talloctort modules torture .SUFFIXES: .SUFFIXES: .c .o .po .po32 .lo @@ -687,7 +671,6 @@ MAKEDIR = || exec false; \ # rebuild it's a bit hard. dynconfig.o: dynconfig.c Makefile - @$(MAKE) modules_clean @echo Compiling $*.c @$(CC) $(FLAGS) $(PATH_FLAGS) -c $< -o $@ @@ -724,49 +707,45 @@ bin/.dummy: bin/smbd@EXEEXT@: $(SMBD_OBJ) @BUILD_POPT@ bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(SMBD_OBJ) $(ADSLIBS) $(LDFLAGS) $(DYNEXP) $(PRINTLIBS) \ - $(AUTHLIBS) $(ACLLIBS) $(PASSDBLIBS) $(LIBS) @POPTLIBS@ + @$(CC) $(FLAGS) -o $@ $(SMBD_OBJ) $(LDFLAGS) $(DYNEXP) $(PRINTLIBS) \ + $(AUTHLIBS) $(ACLLIBS) $(LIBS) @BUILD_POPT@ bin/nmbd@EXEEXT@: $(NMBD_OBJ) @BUILD_POPT@ bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(NMBD_OBJ) $(LDFLAGS) $(DYNEXP) $(LIBS) @POPTLIBS@ $(KRB5LIBS) + @$(CC) $(FLAGS) -o $@ $(NMBD_OBJ) $(LDFLAGS) $(LIBS) @BUILD_POPT@ -bin/wrepld@EXEEXT@: $(WREPL_OBJ) @BUILD_POPT@ bin/.dummy +bin/wrepld@EXEEXT@: $(WREPL_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(WREPL_OBJ) $(LDFLAGS) $(DYNEXP) $(LIBS) @POPTLIBS@ + @$(CC) $(FLAGS) -o $@ $(WREPL_OBJ) $(LDFLAGS) $(LIBS) bin/swat@EXEEXT@: $(SWAT_OBJ) @BUILD_POPT@ bin/.dummy @echo Linking $@ @$(CC) $(FLAGS) -o $@ $(SWAT_OBJ) $(LDFLAGS) $(DYNEXP) $(PRINTLIBS) \ - $(AUTHLIBS) $(LIBS) $(PASSDBLIBS) @POPTLIBS@ $(KRB5LIBS) + $(AUTHLIBS) $(LIBS) @BUILD_POPT@ bin/rpcclient@EXEEXT@: $(RPCCLIENT_OBJ) @BUILD_POPT@ bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(PASSDBLIBS) $(RPCCLIENT_OBJ) $(LDFLAGS) $(DYNEXP) $(TERMLDFLAGS) $(TERMLIBS) $(LIBS) @POPTLIBS@ $(ADSLIBS) + @$(CC) $(FLAGS) -o $@ $(RPCCLIENT_OBJ) $(LDFLAGS) $(DYNEXP) $(TERMLDFLAGS) $(TERMLIBS) $(LIBS) @BUILD_POPT@ bin/smbclient@EXEEXT@: $(CLIENT_OBJ) @BUILD_POPT@ bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(CLIENT_OBJ) $(LDFLAGS) $(DYNEXP) $(TERMLDFLAGS) $(TERMLIBS) $(LIBS) @POPTLIBS@ $(KRB5LIBS) + @$(CC) $(FLAGS) -o $@ $(CLIENT_OBJ) $(LDFLAGS) $(TERMLDFLAGS) $(TERMLIBS) $(LIBS) @BUILD_POPT@ bin/net@EXEEXT@: $(NET_OBJ) @BUILD_POPT@ bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(NET_OBJ) $(DYNEXP) $(LDFLAGS) $(LIBS) @POPTLIBS@ $(ADSLIBS) - -bin/profiles@EXEEXT@: $(PROFILES_OBJ) @BUILD_POPT@ bin/.dummy - @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(PROFILES_OBJ) $(LDFLAGS) $(LIBS) @POPTLIBS@ + @$(CC) $(FLAGS) -o $@ $(NET_OBJ) $(DYNEXP) $(LDFLAGS) $(LIBS) @BUILD_POPT@ -bin/editreg@EXEEXT@: $(EDITREG_OBJ) @BUILD_POPT@ bin/.dummy +bin/profiles@EXEEXT@: utils/profiles.o bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(EDITREG_OBJ) $(LDFLAGS) $(LIBS) @POPTLIBS@ + @$(CC) $(FLAGS) -o $@ utils/profiles.o $(LDFLAGS) $(LIBS) bin/smbspool@EXEEXT@: $(CUPS_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(CUPS_OBJ) $(LDFLAGS) $(LIBS) $(KRB5LIBS) + @$(CC) $(FLAGS) -o $@ $(CUPS_OBJ) $(LDFLAGS) $(LIBS) bin/smbmount@EXEEXT@: $(MOUNT_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(MOUNT_OBJ) $(LDFLAGS) $(LIBS) $(KRB5LIBS) + @$(CC) $(FLAGS) -o $@ $(MOUNT_OBJ) $(LDFLAGS) $(LIBS) bin/smbmnt@EXEEXT@: $(MNT_OBJ) bin/.dummy @echo Linking $@ @@ -778,47 +757,43 @@ bin/smbumount@EXEEXT@: $(UMOUNT_OBJ) bin/.dummy bin/testparm@EXEEXT@: $(TESTPARM_OBJ) @BUILD_POPT@ bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(TESTPARM_OBJ) $(LDFLAGS) $(DYNEXP) $(LIBS) @POPTLIBS@ + @$(CC) $(FLAGS) -o $@ $(TESTPARM_OBJ) $(LDFLAGS) $(LIBS) @BUILD_POPT@ bin/testprns@EXEEXT@: $(TESTPRNS_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(TESTPRNS_OBJ) $(LDFLAGS) $(DYNEXP) $(PRINTLIBS) $(LIBS) + @$(CC) $(FLAGS) -o $@ $(TESTPRNS_OBJ) $(LDFLAGS) $(PRINTLIBS) $(LIBS) bin/smbstatus@EXEEXT@: $(STATUS_OBJ) @BUILD_POPT@ bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(STATUS_OBJ) $(LDFLAGS) $(DYNEXP) $(LIBS) @POPTLIBS@ + @$(CC) $(FLAGS) -o $@ $(STATUS_OBJ) $(LDFLAGS) $(LIBS) @BUILD_POPT@ bin/smbcontrol@EXEEXT@: $(SMBCONTROL_OBJ) bin/.dummy @echo Linking $@ - @$(CC) -DUSING_SMBCONTROL $(FLAGS) -o $@ $(SMBCONTROL_OBJ) $(DYNEXP) $(LDFLAGS) $(LIBS) + @$(CC) -DUSING_SMBCONTROL $(FLAGS) -o $@ $(SMBCONTROL_OBJ) $(LDFLAGS) $(LIBS) -bin/smbtree@EXEEXT@: $(SMBTREE_OBJ) @BUILD_POPT@ bin/.dummy +bin/smbtree@EXEEXT@: $(SMBTREE_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(SMBTREE_OBJ) $(LDFLAGS) $(DYNEXP) $(LIBS) @POPTLIBS@ $(KRB5LIBS) + @$(CC) $(FLAGS) -o $@ $(SMBTREE_OBJ) $(LDFLAGS) $(LIBS) bin/smbpasswd@EXEEXT@: $(SMBPASSWD_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(SMBPASSWD_OBJ) $(PASSDBLIBS) $(LDFLAGS) $(DYNEXP) $(LIBS) $(KRB5LIBS) + @$(CC) $(FLAGS) -o $@ $(SMBPASSWD_OBJ) $(LDFLAGS) $(DYNEXP) $(LIBS) bin/pdbedit@EXEEXT@: $(PDBEDIT_OBJ) @BUILD_POPT@ bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(PASSDBLIBS) $(PDBEDIT_OBJ) $(LDFLAGS) $(DYNEXP) $(LIBS) @POPTLIBS@ - -bin/samtest@EXEEXT@: $(SAMTEST_OBJ) @BUILD_POPT@ bin/.dummy - @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(SAMTEST_OBJ) $(LDFLAGS) $(TERMLDFLAGS) $(TERMLIBS) $(DYNEXP) $(LIBS) @POPTLIBS@ $(PASSDBLIBS) $(ADSLIBS) + @$(CC) $(FLAGS) -o $@ $(PDBEDIT_OBJ) $(LDFLAGS) $(DYNEXP) $(LIBS) @BUILD_POPT@ bin/smbgroupedit@EXEEXT@: $(SMBGROUPEDIT_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(SMBGROUPEDIT_OBJ) $(PASSDBLIBS) $(LDFLAGS) $(DYNEXP) $(LIBS) + @$(CC) $(FLAGS) -o $@ $(SMBGROUPEDIT_OBJ) $(LDFLAGS) $(LIBS) -bin/nmblookup@EXEEXT@: $(NMBLOOKUP_OBJ) @BUILD_POPT@ bin/.dummy +bin/nmblookup@EXEEXT@: $(NMBLOOKUP_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(NMBLOOKUP_OBJ) $(LDFLAGS) $(DYNEXP) $(LIBS) @POPTLIBS@ + @$(CC) $(FLAGS) -o $@ $(NMBLOOKUP_OBJ) $(LDFLAGS) $(LIBS) bin/smbtorture@EXEEXT@: $(SMBTORTURE_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(SMBTORTURE_OBJ) $(LDFLAGS) $(DYNEXP) $(LIBS) $(KRB5LIBS) + @$(CC) $(FLAGS) -o $@ $(SMBTORTURE_OBJ) $(LDFLAGS) $(LIBS) bin/talloctort@EXEEXT@: $(TALLOCTORT_OBJ) bin/.dummy @echo Linking $@ @@ -826,35 +801,35 @@ bin/talloctort@EXEEXT@: $(TALLOCTORT_OBJ) bin/.dummy bin/masktest@EXEEXT@: $(MASKTEST_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(MASKTEST_OBJ) $(LDFLAGS) $(LIBS) $(KRB5LIBS) + @$(CC) $(FLAGS) -o $@ $(MASKTEST_OBJ) $(LDFLAGS) $(LIBS) bin/msgtest@EXEEXT@: $(MSGTEST_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(MSGTEST_OBJ) $(LDFLAGS) $(LIBS) $(KRB5LIBS) + @$(CC) $(FLAGS) -o $@ $(MSGTEST_OBJ) $(LDFLAGS) $(LIBS) -bin/smbcacls@EXEEXT@: $(SMBCACLS_OBJ) @BUILD_POPT@ bin/.dummy +bin/smbcacls@EXEEXT@: $(SMBCACLS_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(SMBCACLS_OBJ) $(DYNEXP) $(LDFLAGS) $(LIBS) @POPTLIBS@ $(KRB5LIBS) + @$(CC) $(FLAGS) -o $@ $(SMBCACLS_OBJ) $(DYNEXP) $(LDFLAGS) $(LIBS) bin/locktest@EXEEXT@: $(LOCKTEST_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(LOCKTEST_OBJ) $(LDFLAGS) $(LIBS) $(KRB5LIBS) + @$(CC) $(FLAGS) -o $@ $(LOCKTEST_OBJ) $(LDFLAGS) $(LIBS) bin/nsstest@EXEEXT@: $(NSSTEST_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(NSSTEST_OBJ) $(LDFLAGS) $(LIBS) $(KRB5LIBS) + @$(CC) $(FLAGS) -o $@ $(NSSTEST_OBJ) $(LDFLAGS) $(LIBS) bin/vfstest@EXEEXT@: $(VFSTEST_OBJ) @BUILD_POPT@ bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(VFSTEST_OBJ) $(LDFLAGS) $(TERMLDFLAGS) $(TERMLIBS) $(DYNEXP) $(PRINTLIBS) $(AUTHLIBS) $(ACLLIBS) $(LIBS) @POPTLIBS@ $(ADSLIBS) + @$(CC) $(FLAGS) -o $@ $(VFSTEST_OBJ) $(LDFLAGS) $(TERMLDFLAGS) $(TERMLIBS) $(DYNEXP) $(PRINTLIBS) $(AUTHLIBS) $(ACLLIBS) $(LIBS) @BUILD_POPT@ bin/locktest2@EXEEXT@: $(LOCKTEST2_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(LOCKTEST2_OBJ) $(LDFLAGS) $(LIBS) $(KRB5LIBS) + @$(CC) $(FLAGS) -o $@ $(LOCKTEST2_OBJ) $(LDFLAGS) $(LIBS) bin/rpctorture@EXEEXT@: $(RPCTORTURE_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(RPCTORTURE_OBJ) $(DYNEXP) $(LDFLAGS) $(LIBS) $(KRB5LIBS) + @$(CC) $(FLAGS) -o $@ $(RPCTORTURE_OBJ) $(DYNEXP) $(LDFLAGS) $(LIBS) bin/debug2html@EXEEXT@: $(DEBUG2HTML_OBJ) bin/.dummy @echo Linking $@ @@ -862,34 +837,34 @@ bin/debug2html@EXEEXT@: $(DEBUG2HTML_OBJ) bin/.dummy bin/smbfilter@EXEEXT@: $(SMBFILTER_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(SMBFILTER_OBJ) $(LDFLAGS) $(LIBS) $(KRB5LIBS) + @$(CC) $(FLAGS) -o $@ $(SMBFILTER_OBJ) $(LDFLAGS) $(LIBS) bin/smbw_sample@EXEEXT@: $(SMBW_OBJ) utils/smbw_sample.o bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(SMBW_OBJ) utils/smbw_sample.o $(LDFLAGS) $(LIBS) $(KRB5LIBS) + @$(CC) $(FLAGS) -o $@ $(SMBW_OBJ) utils/smbw_sample.o $(LDFLAGS) $(LIBS) bin/smbsh@EXEEXT@: $(SMBSH_OBJ) bin/.dummy @echo Linking $@ - @$(CC) $(FLAGS) -o $@ $(SMBSH_OBJ) $(LDFLAGS) $(DYNEXP) $(LIBS) + @$(CC) $(FLAGS) -o $@ $(SMBSH_OBJ) $(LDFLAGS) $(LIBS) bin/smbwrapper.@SHLIBEXT@: $(PICOBJS) bin/.dummy @echo Linking shared library $@ @$(SHLD) $(LDSHFLAGS) -o $@ $(PICOBJS) $(LIBS) \ - @SONAMEFLAG@`basename $@` $(KRB5LIBS) + @SONAMEFLAG@`basename $@` bin/smbwrapper.32.@SHLIBEXT@: $(PICOBJS32) @echo Linking shared library $@ @$(SHLD) -32 $(LDSHFLAGS) -o $@ $(PICOBJS32) $(LIBS) \ - @SONAMEFLAG@`basename $@` $(KRB5LIBS) + @SONAMEFLAG@`basename $@` bin/libsmbclient.@SHLIBEXT@: $(LIBSMBCLIENT_PICOBJS) @echo Linking libsmbclient shared library $@ $(SHLD) $(LDSHFLAGS) -o $@ $(LIBSMBCLIENT_PICOBJS) $(LDFLAGS) $(LIBS) \ - @SONAMEFLAG@`basename $@`.$(LIBSMBCLIENT_MAJOR) $(KRB5LIBS) + @SONAMEFLAG@`basename $@`.$(LIBSMBCLIENT_MAJOR) bin/libsmbclient.a: $(LIBSMBCLIENT_PICOBJS) @echo Linking libsmbclient non-shared library $@ - -$(AR) -rc $@ $(LIBSMBCLIENT_PICOBJS) $(KRB5LIBS) + -$(AR) -rc $@ $(LIBSMBCLIENT_PICOBJS) bin/libbigballofmud.@SHLIBEXT@: $(LIBBIGBALLOFMUD_PICOBJS) @echo Linking bigballofmud shared library $@ @@ -948,10 +923,9 @@ nsswitch/libnss_wins.@SHLIBEXT@: $(NSS_OBJ) @$(SHLD) $(LDSHFLAGS) -o $@ $(NSS_OBJ) -lc \ @SONAMEFLAG@`basename $@` -bin/winbindd@EXEEXT@: $(WINBINDD_OBJ) @BUILD_POPT@ bin/.dummy +bin/winbindd@EXEEXT@: $(WINBINDD_OBJ) bin/.dummy @echo Linking $@ - @$(LINK) -o $@ $(WINBINDD_OBJ) $(DYNEXP) $(LIBS) @POPTLIBS@ $(ADSLIBS) \ - @LDAP_LIBS@ + @$(LINK) -o $@ $(WINBINDD_OBJ) $(DYNEXP) $(LIBS) nsswitch/libns_winbind.@SHLIBEXT@: $(WINBIND_NSS_PICOBJS) @echo "Linking $@" @@ -968,110 +942,47 @@ nsswitch/pam_winbind.@SHLIBEXT@: $(PAM_WINBIND_OBJ) bin/.dummy @$(SHLD) $(LDSHFLAGS) -o $@ $(PAM_WINBIND_OBJ) \ @SONAMEFLAG@`basename $@` -lpam -bin/rhosts.@SHLIBEXT@: $(AUTH_RHOSTS_OBJ) - @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ $(AUTH_RHOSTS_OBJ) @SONAMEFLAG@`basename $@` - -bin/builtin.@SHLIBEXT@: $(AUTH_BUILTIN_OBJ) - @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ $(AUTH_BUILTIN_OBJ) @SONAMEFLAG@`basename $@` - -bin/domain.@SHLIBEXT@: $(AUTH_DOMAIN_OBJ) - @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ $(AUTH_DOMAIN_OBJ) @SONAMEFLAG@`basename $@` - -bin/server.@SHLIBEXT@: $(AUTH_SERVER_OBJ) - @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ $(AUTH_SERVER_OBJ) @SONAMEFLAG@`basename $@` - -bin/winbind.@SHLIBEXT@: $(AUTH_WINBIND_OBJ) - @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ $(AUTH_WINBIND_OBJ) @SONAMEFLAG@`basename $@` - -bin/unix.@SHLIBEXT@: $(AUTH_UNIX_OBJ) - @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ $(AUTH_UNIX_OBJ) @SONAMEFLAG@`basename $@` - -bin/sam.@SHLIBEXT@: $(AUTH_SAM_OBJ) - @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ $(AUTH_SAM_OBJ) @SONAMEFLAG@`basename $@` - -bin/mysql.@SHLIBEXT@: $(MYSQL_OBJ) +bin/pdb_mysql.@SHLIBEXT@: $(PDB_MYSQL_OBJ) @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ $(MYSQL_OBJ) @MYSQL_LIBS@ \ + @$(SHLD) $(LDSHFLAGS) -o $@ $(PDB_MYSQL_OBJ) @MYSQL_LIBS@ \ @SONAMEFLAG@`basename $@` -bin/ldapsam.@SHLIBEXT@: passdb/pdb_ldap.o +bin/pdb_xml.@SHLIBEXT@: $(PDB_XML_OBJ) @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) @LDAP_LIBS@ -o $@ passdb/pdb_ldap.o \ + @$(SHLD) $(LDSHFLAGS) -o $@ $(PDB_XML_OBJ) @XML_LIBS@ \ @SONAMEFLAG@`basename $@` -bin/tdbsam.@SHLIBEXT@: passdb/pdb_tdb.o - @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ passdb/pdb_tdb.o \ - @SONAMEFLAG@`basename $@` - -bin/smbpasswd.@SHLIBEXT@: passdb/pdb_smbpasswd.o - @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ passdb/pdb_smbpasswd.o \ - @SONAMEFLAG@`basename $@` - -bin/unixsam.@SHLIBEXT@: passdb/pdb_unix.o - @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ passdb/pdb_unix.o \ - @SONAMEFLAG@`basename $@` - -bin/nisplussam.@SHLIBEXT@: passdb/pdb_nisplus.o - @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ passdb/pdb_nisplus.o \ - @SONAMEFLAG@`basename $@` - -bin/weird.@SHLIBEXT@: $(DEVEL_HELP_OBJ) - @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ $(DEVEL_HELP_OBJ) \ - @SONAMEFLAG@`basename $@` - -bin/xml.@SHLIBEXT@: $(XML_OBJ) - @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ $(XML_OBJ) @XML_LIBS@ \ - @SONAMEFLAG@`basename $@` - -bin/audit.@SHLIBEXT@: $(VFS_AUDIT_OBJ) +bin/vfs_audit.@SHLIBEXT@: $(VFS_AUDIT_OBJ) @echo "Building plugin $@" @$(SHLD) $(LDSHFLAGS) -o $@ $(VFS_AUDIT_OBJ) \ @SONAMEFLAG@`basename $@` -bin/extd_audit.@SHLIBEXT@: $(VFS_EXTD_AUDIT_OBJ) +bin/vfs_extd_audit.@SHLIBEXT@: $(VFS_EXTD_AUDIT_OBJ) @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ $(VFS_EXTD_AUDIT_OBJ) \ + @$(SHLD) $(LDSHFLAGS) -o $@ $(VFS_AUDIT_OBJ) \ @SONAMEFLAG@`basename $@` -bin/recycle.@SHLIBEXT@: $(VFS_RECYCLE_OBJ) +bin/vfs_recycle.@SHLIBEXT@: $(VFS_RECYCLE_OBJ) @echo "Building plugin $@" @$(SHLD) $(LDSHFLAGS) -o $@ $(VFS_RECYCLE_OBJ) \ @SONAMEFLAG@`basename $@` -bin/netatalk.@SHLIBEXT@: $(VFS_NETATALK_OBJ) +bin/vfs_netatalk.@SHLIBEXT@: $(VFS_NETATALK_OBJ) @echo "Building plugin $@" @$(SHLD) $(LDSHFLAGS) -o $@ $(VFS_NETATALK_OBJ) \ @SONAMEFLAG@`basename $@` -bin/fake_perms.@SHLIBEXT@: $(VFS_FAKE_PERMS_OBJ) - @echo "Building plugin $@" - @$(SHLD) $(LDSHFLAGS) -o $@ $(VFS_FAKE_PERMS_OBJ) \ - @SONAMEFLAG@`basename $@` - bin/wbinfo@EXEEXT@: $(WBINFO_OBJ) $(PARAM_OBJ) $(LIB_OBJ) \ $(UBIQX_OBJ) $(SECRETS_OBJ) @BUILD_POPT@ bin/.dummy @echo Linking $@ @$(LINK) -o $@ $(WBINFO_OBJ) $(PARAM_OBJ) $(LIB_OBJ) \ - $(UBIQX_OBJ) $(SECRETS_OBJ) $(LIBS) @POPTLIBS@ + $(UBIQX_OBJ) $(SECRETS_OBJ) $(LIBS) @BUILD_POPT@ bin/ntlm_auth@EXEEXT@: $(NTLM_AUTH_OBJ) $(PARAM_OBJ) $(LIB_OBJ) \ $(UBIQX_OBJ) @BUILD_POPT@ bin/.dummy @echo Linking $@ @$(LINK) -o $@ $(NTLM_AUTH_OBJ) $(PARAM_OBJ) $(LIB_OBJ) \ - $(UBIQX_OBJ) $(LIBS) @POPTLIBS@ + $(UBIQX_OBJ) $(LIBS) @BUILD_POPT@ bin/pam_smbpass.@SHLIBEXT@: $(PAM_SMBPASS_PICOOBJ) @echo "Linking shared library $@" @@ -1090,10 +1001,9 @@ bin/t_strcmp@EXEEXT@: bin/libbigballofmud.@SHLIBEXT@ torture/t_strcmp.o bin/t_stringoverflow@EXEEXT@: bin/libbigballofmud.@SHLIBEXT@ torture/t_stringoverflow.o $(CC) $(FLAGS) -o $@ torture/t_stringoverflow.o -L./bin -lbigballofmud -bin/t_doschar@EXEEXT@: bin/libbigballofmud.@SHLIBEXT@ torture/t_doschar.o - $(CC) $(FLAGS) -o $@ $(LIBS) torture/t_doschar.o -L ./bin -lbigballofmud +install: installbin installman installscripts installdat installswat -install: installbin installman installscripts installdat installswat installmodules installclientlib +install-everything: install installmodules # DESTDIR is used here to prevent packagers wasting their time # duplicating the Makefile. Remove it and you will have the privelege @@ -1113,13 +1023,11 @@ installbin: all installdirs @$(SHELL) $(srcdir)/script/installbin.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(SBINDIR) $(DESTDIR)$(LIBDIR) $(DESTDIR)$(VARDIR) $(SBIN_PROGS) @$(SHELL) $(srcdir)/script/installbin.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(BINDIR) $(DESTDIR)$(LIBDIR) $(DESTDIR)$(VARDIR) $(BIN_PROGS) + @$(SHELL) $(srcdir)/script/installmodules.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(RPCLIBDIR) $(RPC_MODULES) -installmodules: all modules installdirs +installmodules: all installdirs @$(SHELL) $(srcdir)/script/installmodules.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(VFSLIBDIR) $(VFS_MODULES) @$(SHELL) $(srcdir)/script/installmodules.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(PDBLIBDIR) $(PDB_MODULES) - @$(SHELL) $(srcdir)/script/installmodules.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(RPCLIBDIR) $(RPC_MODULES) - @$(SHELL) $(srcdir)/script/installmodules.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(CHARSETLIBDIR) $(CHARSET_MODULES) - @$(SHELL) $(srcdir)/script/installmodules.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(AUTHLIBDIR) $(AUTH_MODULES) installscripts: installdirs @$(SHELL) $(srcdir)/script/installscripts.sh $(INSTALLPERMS) $(DESTDIR)$(BINDIR) $(SCRIPTS) @@ -1130,16 +1038,16 @@ installdat: installdirs installswat: installdirs @$(SHELL) $(srcdir)/script/installswat.sh $(DESTDIR)$(SWATDIR) $(srcdir) -installclientlib: bin/libsmbclient.@SHLIBEXT@ +installclientlib: -$(INSTALLCLIENTCMD_SH) bin/libsmbclient.@SHLIBEXT@ $(DESTDIR)${prefix}/lib -$(INSTALLCLIENTCMD_A) bin/libsmbclient.a $(DESTDIR)${prefix}/lib - @$(SHELL) $(srcdir)/script/installdirs.sh $(DESTDIR)${prefix}/include + -$(INSTALLCMD) -d $(DESTDIR)${prefix}/include -$(INSTALLCMD) include/libsmbclient.h $(DESTDIR)${prefix}/include # Python extensions -PYTHON_OBJS = $(PARAM_OBJ) $(LIB_OBJ) $(LIBSMB_OBJ) $(RPC_PARSE_OBJ) \ - $(UBIQX_OBJ) $(LIBMSRPC_OBJ) $(PASSDB_OBJ) $(GROUPDB_OBJ) \ +PYTHON_OBJS = $(LIB_OBJ) $(LIBSMB_OBJ) $(RPC_PARSE_OBJ) $(UBIQX_OBJ) \ + $(PARAM_OBJ) $(LIBMSRPC_OBJ) $(PASSDB_OBJ) $(GROUPDB_OBJ) \ $(SECRETS_OBJ) $(KRBCLIENT_OBJ) python_ext: $(PYTHON_OBJS) @@ -1147,7 +1055,7 @@ python_ext: $(PYTHON_OBJS) echo Use the option --with-python to configure python; \ exit 1; fi PYTHON_OBJS="$(PYTHON_OBJS)" PYTHON_CFLAGS="$(CFLAGS) $(CPPFLAGS) $(FLAGS)" \ - LIBS="$(LIBS) $(PASSDBLIBS) $(KRB5LIBS)" \ + LIBS="$(LIBS)" \ $(PYTHON) python/setup.py build python_install: $(PYTHON_OBJS) @@ -1189,13 +1097,11 @@ uninstallman: uninstallbin: @$(SHELL) $(srcdir)/script/uninstallbin.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(SBINDIR) $(DESTDIR)$(LIBDIR) $(DESTDIR)$(VARDIR) $(DESTDIR)$(SBIN_PROGS) @$(SHELL) $(srcdir)/script/uninstallbin.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(BINDIR) $(DESTDIR)$(LIBDIR) $(DESTDIR)$(VARDIR) $(DESTDIR)$(BIN_PROGS) + @$(SHELL) $(srcdir)/script/uninstallmodules.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(RPCLIBDIR) $(DESTDIR)$(RPC_MODULES) uninstallmodules: - @$(SHELL) $(srcdir)/script/uninstallmodules.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(VFSLIBDIR) $(DESTDIR)$(VFS_MODULES) - @$(SHELL) $(srcdir)/script/uninstallmodules.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(PDBLIBDIR) $(DESTDIR)$(PDB_MODULES) - @$(SHELL) $(srcdir)/script/uninstallmodules.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(RPCLIBDIR) $(DESTDIR)$(RPC_MODULES) - @$(SHELL) $(srcdir)/script/uninstallmodules.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(CHARSETLIBDIR) $(DESTDIR)$(CHARSET_MODULES) - @$(SHELL) $(srcdir)/script/uninstallmodules.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(AUTHLIBDIR) $(DESTDIR)$(AUTH_MODULES) + @$(SHELL) $(srcdir)/script/uninstallmodules.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(PDBLIBDIR) $(DESTDIR)$(VFS_MODULES) + @$(SHELL) $(srcdir)/script/uninstallmodules.sh $(INSTALLPERMS) $(DESTDIR)$(BASEDIR) $(DESTDIR)$(VFSLIBDIR) $(DESTDIR)$(PDB_MODULES) uninstallscripts: @$(SHELL) $(srcdir)/script/uninstallscripts.sh $(INSTALLPERMS) $(DESTDIR)$(BINDIR) $(SCRIPTS) @@ -1208,10 +1114,6 @@ clean: delheaders python_clean $(TOPFILES) $(BIN_PROGS) $(SBIN_PROGS) $(MODULES) $(TORTURE_PROGS) \ $(LIBSMBCLIENT) $(EVERYTHING_PROGS) .headers.stamp -# This is quite ugly actually.. But we need to make -# sure the changes to include/config.h are used. -modules_clean: - @-rm -f @MODULES_CLEAN@ auth/auth.o passdb/pdb_interface.o rpc_server/srv_pipe_hnd.o lib/iconv.o smbd/vfs.o # Making this target will just make sure that the prototype files # exist, not necessarily that they are up to date. Since they're @@ -1219,8 +1121,7 @@ modules_clean: # afterwards. proto_exists: include/proto.h include/wrepld_proto.h include/build_env.h \ nsswitch/winbindd_proto.h web/swat_proto.h \ - client/client_proto.h utils/net_proto.h \ - include/tdbsam2_parse_info.h + client/client_proto.h utils/net_proto.h delheaders: @echo Removing prototype headers @@ -1228,12 +1129,10 @@ delheaders: @/bin/rm -f $(srcdir)/include/wrepld_proto.h $(srcdir)/nsswitch/winbindd_proto.h @/bin/rm -f $(srcdir)/web/swat_proto.h @/bin/rm -f $(srcdir)/client/client_proto.h $(srcdir)/utils/net_proto.h - @/bin/rm -f $(srcdir)/include/tdbsam2_parse_info.h @/bin/rm -f include/proto.h include/build_env.h include/wrepld_proto.h \ nsswitch/winbindd_proto.h web/swat_proto.h \ - client/client_proto.h utils/net_proto.h \ - include/tdbsam2_parse_info.h + client/client_proto.h utils/net_proto.h include/proto.h: @echo Building include/proto.h @@ -1271,15 +1170,6 @@ utils/net_proto.h: -h _CLIENT_PROTO_H_ utils/net_proto.h \ $(NET_OBJ1) -include/tdbsam2_parse_info.h: - @if test -n "$(PERL)"; then \ - cd $(srcdir) && @PERL@ -w script/genstruct.pl \ - -o include/tdbsam2_parse_info.h $(CC) -E -O2 -g \ - include/tdbsam2.h; \ - else \ - echo Unable to build $@, continuing; \ - fi - # "make headers" or "make proto" calls a subshell because we need to # make sure these commands are executed in sequence even for a # parallel make. @@ -1291,8 +1181,7 @@ headers: $(MAKE) nsswitch/winbindd_proto.h; \ $(MAKE) web/swat_proto.h; \ $(MAKE) client/client_proto.h; \ - $(MAKE) utils/net_proto.h; \ - $(MAKE) include/tdbsam2_parse_info.h + $(MAKE) utils/net_proto.h proto: headers @@ -1324,10 +1213,10 @@ finddead: # when configure.in is updated, reconfigure $(srcdir)/configure: $(srcdir)/configure.in - @echo "WARNING: you need to rerun ./autogen.sh" + @echo "WARNING: you need to rerun autoconf" config.status: $(srcdir)/configure - @echo "WARNING: you need to run ./configure" + @echo "WARNING: you need to run configure" Makefile: $(srcdir)/Makefile.in config.status @echo "WARNING: you need to run ./config.status" @@ -1346,3 +1235,4 @@ check: check-programs # These are called by the test suite check-programs: bin/t_strcmp + diff --git a/source3/aclocal.m4 b/source3/aclocal.m4 index f470e2e8b0e..7bec88dd87c 100644 --- a/source3/aclocal.m4 +++ b/source3/aclocal.m4 @@ -36,43 +36,6 @@ if test $ac_cv_dirent_d_off = yes; then fi ]) -dnl Mark specified module as shared -dnl SMB_MODULE(name,static_files,shared_files,subsystem,whatif-static,whatif-shared) -AC_DEFUN(SMB_MODULE, -[ - AC_MSG_CHECKING([how to build $1]) - if test "$[MODULE_][$1]"; then - DEST=$[MODULE_][$1] - elif test "$[MODULE_]translit([$4], [A-Z], [a-z])" -a "$[MODULE_DEFAULT_][$1]"; then - DEST=$[MODULE_]translit([$4], [A-Z], [a-z]) - else - DEST=$[MODULE_DEFAULT_][$1] - fi - - if test x"$DEST" = xSHARED; then - AC_DEFINE([$1][_init], [init_module], [Whether to build $1 as shared module]) - $4_MODULES="$$4_MODULES $3" - AC_MSG_RESULT([shared]) - [$6] - elif test x"$DEST" = xSTATIC; then - [init_static_modules_]translit([$4], [A-Z], [a-z])="$[init_static_modules_]translit([$4], [A-Z], [a-z]) $1_init();" - string_static_modules="$string_static_modules $1" - $4_STATIC="$$4_STATIC $2" - AC_SUBST($4_STATIC) - [$5] - AC_MSG_RESULT([static]) - else - AC_MSG_RESULT([not]) - fi - MODULES_CLEAN="$MODULES_CLEAN $2 $3" -]) - -AC_DEFUN(SMB_SUBSYSTEM, -[ - AC_SUBST($1_STATIC) - AC_SUBST($1_MODULES) - AC_DEFINE_UNQUOTED([static_init_]translit([$1], [A-Z], [a-z]), [{$init_static_modules_]translit([$1], [A-Z], [a-z])[}], [Static init functions]) -]) dnl AC_PROG_CC_FLAG(flag) AC_DEFUN(AC_PROG_CC_FLAG, diff --git a/source3/auth/auth.c b/source3/auth/auth.c index f9df255595d..126a712fbdd 100644 --- a/source3/auth/auth.c +++ b/source3/auth/auth.c @@ -23,45 +23,26 @@ #undef DBGC_CLASS #define DBGC_CLASS DBGC_AUTH -static struct auth_init_function_entry *backends = NULL; - -BOOL smb_register_auth(const char *name, auth_init_function init, int version) -{ - struct auth_init_function_entry *entry = backends; - - if(version != AUTH_INTERFACE_VERSION) - return False; - - DEBUG(5,("Attempting to register auth backend %s\n", name)); - - while(entry) { - if (strequal(name, entry->name)) { - DEBUG(0,("There already is an auth backend registered with the name %s!\n", name)); - return False; - } - entry = entry->next; - } - - entry = smb_xmalloc(sizeof(struct auth_init_function_entry)); - entry->name = smb_xstrdup(name); - entry->init = init; - - DLIST_ADD(backends, entry); - DEBUG(5,("Successfully added auth backend '%s'\n", name)); - return True; -} - -static struct auth_init_function_entry *auth_find_backend_entry(const char *name) -{ - struct auth_init_function_entry *entry = backends; - - while(entry) { - if (strequal(entry->name, name)) return entry; - entry = entry->next; - } - - return NULL; -} +/** List of various built-in authentication modules */ + +static const struct auth_init_function_entry builtin_auth_init_functions[] = { + { "guest", auth_init_guest }, + { "rhosts", auth_init_rhosts }, + { "hostsequiv", auth_init_hostsequiv }, + { "sam", auth_init_sam }, + { "samstrict", auth_init_samstrict }, + { "unix", auth_init_unix }, + { "smbserver", auth_init_smbserver }, + { "ntdomain", auth_init_ntdomain }, + { "trustdomain", auth_init_trustdomain }, + { "winbind", auth_init_winbind }, +#ifdef DEVELOPER + { "name_to_ntstatus", auth_init_name_to_ntstatus }, + { "fixed_challenge", auth_init_fixed_challenge }, +#endif + { "plugin", auth_init_plugin }, + { NULL, NULL} +}; /**************************************************************************** Try to get a challenge out of the various authentication modules. @@ -343,8 +324,8 @@ static NTSTATUS make_auth_context_text_list(struct auth_context **auth_context, auth_methods *list = NULL; auth_methods *t = NULL; auth_methods *tmp; + int i; NTSTATUS nt_status; - static BOOL initialised_static_modules = False; if (!text_list) { DEBUG(2,("make_auth_context_text_list: No auth method list!?\n")); @@ -353,22 +334,15 @@ static NTSTATUS make_auth_context_text_list(struct auth_context **auth_context, if (!NT_STATUS_IS_OK(nt_status = make_auth_context(auth_context))) return nt_status; - - /* Initialise static modules if not done so yet */ - if(!initialised_static_modules) { - static_init_auth; - initialised_static_modules = True; - } for (;*text_list; text_list++) { - struct auth_init_function_entry *entry; + DEBUG(5,("make_auth_context_text_list: Attempting to find an auth method to match %s\n", + *text_list)); + for (i = 0; builtin_auth_init_functions[i].name; i++) { char *module_name = smb_xstrdup(*text_list); char *module_params = NULL; char *p; - DEBUG(5,("make_auth_context_text_list: Attempting to find an auth method to match %s\n", - *text_list)); - p = strchr(module_name, ':'); if (p) { *p = 0; @@ -378,20 +352,20 @@ static NTSTATUS make_auth_context_text_list(struct auth_context **auth_context, trim_string(module_name, " ", " "); - entry = auth_find_backend_entry(module_name); - - if(!(entry = auth_find_backend_entry(module_name)) && !smb_probe_module("auth", module_name) && - !(entry = auth_find_backend_entry(module_name))) { - DEBUG(0,("make_auth_context_text_list: can't find auth method %s!\n", module_name)); - } else if (!NT_STATUS_IS_OK(entry->init(*auth_context, module_params, &t))) { - DEBUG(0,("make_auth_context_text_list: auth method %s did not correctly init\n", - *text_list)); - } else { - DEBUG(5,("make_auth_context_text_list: auth method %s has a valid init\n", - *text_list)); - DLIST_ADD_END(list, t, tmp); + if (strequal(builtin_auth_init_functions[i].name, module_name)) { + DEBUG(5,("make_auth_context_text_list: Found auth method %s (at pos %d)\n", *text_list, i)); + if (NT_STATUS_IS_OK(builtin_auth_init_functions[i].init(*auth_context, module_params, &t))) { + DEBUG(5,("make_auth_context_text_list: auth method %s has a valid init\n", + *text_list)); + DLIST_ADD_END(list, t, tmp); + } else { + DEBUG(0,("make_auth_context_text_list: auth method %s did not correctly init\n", + *text_list)); + } + break; } SAFE_FREE(module_name); + } } (*auth_context)->auth_method_list = list; diff --git a/source3/auth/auth_builtin.c b/source3/auth/auth_builtin.c index 509a4afba9b..3b0b84b5256 100644 --- a/source3/auth/auth_builtin.c +++ b/source3/auth/auth_builtin.c @@ -1,6 +1,6 @@ /* Unix SMB/CIFS implementation. - Generic authentication types + Generic authenticaion types Copyright (C) Andrew Bartlett 2001-2002 Copyright (C) Jelmer Vernooij 2002 @@ -161,12 +161,50 @@ NTSTATUS auth_init_fixed_challenge(struct auth_context *auth_context, const char return NT_STATUS_OK; } -int auth_builtin_init(void) +/** + * Outsorce an auth module to an external loadable .so + * + * Only works on systems with dlopen() etc. + **/ + +/* Plugin modules initialisation */ + +NTSTATUS auth_init_plugin(struct auth_context *auth_context, const char *param, auth_methods **auth_method) { - smb_register_auth("guest", auth_init_guest, AUTH_INTERFACE_VERSION); -#ifdef DEVELOPER - smb_register_auth("fixed_challenge", auth_init_fixed_challenge, AUTH_INTERFACE_VERSION); - smb_register_auth("name_to_ntstatus", auth_init_name_to_ntstatus, AUTH_INTERFACE_VERSION); -#endif - return True; + void * dl_handle; + char *plugin_param, *plugin_name, *p; + auth_init_function plugin_init; + + if (param == NULL) { + DEBUG(0, ("auth_init_plugin: The plugin module needs an argument!\n")); + return NT_STATUS_UNSUCCESSFUL; + } + + plugin_name = smb_xstrdup(param); + p = strchr(plugin_name, ':'); + if (p) { + *p = 0; + plugin_param = p+1; + trim_string(plugin_param, " ", " "); + } else plugin_param = NULL; + + trim_string(plugin_name, " ", " "); + + DEBUG(5, ("auth_init_plugin: Trying to load auth plugin %s\n", plugin_name)); + dl_handle = sys_dlopen(plugin_name, RTLD_NOW ); + if (!dl_handle) { + DEBUG(0, ("auth_init_plugin: Failed to load auth plugin %s using sys_dlopen (%s)\n", + plugin_name, sys_dlerror())); + return NT_STATUS_UNSUCCESSFUL; + } + + plugin_init = sys_dlsym(dl_handle, "auth_init"); + if (!plugin_init){ + DEBUG(0, ("Failed to find function 'auth_init' using sys_dlsym in sam plugin %s (%s)\n", + plugin_name, sys_dlerror())); + return NT_STATUS_UNSUCCESSFUL; + } + + DEBUG(5, ("Starting sam plugin %s with paramater %s\n", plugin_name, plugin_param?plugin_param:"(null)")); + return plugin_init(auth_context, plugin_param, auth_method); } diff --git a/source3/auth/auth_domain.c b/source3/auth/auth_domain.c index 7dca5914f0b..534af2257db 100644 --- a/source3/auth/auth_domain.c +++ b/source3/auth/auth_domain.c @@ -24,7 +24,7 @@ #undef DBGC_CLASS #define DBGC_CLASS DBGC_AUTH -extern BOOL global_machine_password_needs_changing; +BOOL global_machine_password_needs_changing = False; extern userdom_struct current_user_info; @@ -175,11 +175,6 @@ static NTSTATUS connect_to_domain_password_server(struct cli_state **cli, &dest_ip, 0, "IPC$", "IPC", "", "", "",0, retry); if (!NT_STATUS_IS_OK(result)) { - /* map to something more useful */ - if (NT_STATUS_EQUAL(result, NT_STATUS_UNSUCCESSFUL)) { - result = NT_STATUS_NO_LOGON_SERVERS; - } - release_server_mutex(); return result; } @@ -277,7 +272,7 @@ static NTSTATUS find_connect_dc(struct cli_state **cli, struct in_addr dc_ip; fstring srv_name; - if (!rpc_find_dc(domain, srv_name, &dc_ip)) { + if ( !rpc_find_dc(lp_workgroup(), srv_name, &dc_ip) ) { DEBUG(0,("find_connect_dc: Failed to find an DCs for %s\n", lp_workgroup())); return NT_STATUS_NO_LOGON_SERVERS; } @@ -550,10 +545,3 @@ NTSTATUS auth_init_trustdomain(struct auth_context *auth_context, const char* pa (*auth_method)->auth = check_trustdomain_security; return NT_STATUS_OK; } - -int auth_domain_init(void) -{ - smb_register_auth("trustdomain", auth_init_trustdomain, AUTH_INTERFACE_VERSION); - smb_register_auth("ntdomain", auth_init_ntdomain, AUTH_INTERFACE_VERSION); - return True; -} diff --git a/source3/auth/auth_rhosts.c b/source3/auth/auth_rhosts.c index db371935799..5451f7d9309 100644 --- a/source3/auth/auth_rhosts.c +++ b/source3/auth/auth_rhosts.c @@ -242,10 +242,3 @@ NTSTATUS auth_init_rhosts(struct auth_context *auth_context, const char *param, (*auth_method)->name = "rhosts"; return NT_STATUS_OK; } - -int auth_rhosts_init(void) -{ - smb_register_auth("rhosts", auth_init_rhosts, AUTH_INTERFACE_VERSION); - smb_register_auth("hostsequiv", auth_init_hostsequiv, AUTH_INTERFACE_VERSION); - return True; -} diff --git a/source3/auth/auth_sam.c b/source3/auth/auth_sam.c index aa399f33e2e..b309833440e 100644 --- a/source3/auth/auth_sam.c +++ b/source3/auth/auth_sam.c @@ -500,8 +500,6 @@ static NTSTATUS check_samstrict_security(const struct auth_context *auth_context unless it is one of our aliases. */ if (!is_myname(user_info->domain.str)) { - DEBUG(7,("The requested user domain is not the local server name. [%s]\\[%s]\n", - user_info->domain.str,user_info->internal_username.str)); return NT_STATUS_NO_SUCH_USER; } @@ -520,53 +518,4 @@ NTSTATUS auth_init_samstrict(struct auth_context *auth_context, const char *para return NT_STATUS_OK; } -/**************************************************************************** -Check SAM security (above) but with a few extra checks if we're a DC. -****************************************************************************/ - -static NTSTATUS check_samstrict_dc_security(const struct auth_context *auth_context, - void *my_private_data, - TALLOC_CTX *mem_ctx, - const auth_usersupplied_info *user_info, - auth_serversupplied_info **server_info) -{ - - if (!user_info || !auth_context) { - return NT_STATUS_LOGON_FAILURE; - } - - /* If we are a domain member, we must not - attempt to check the password locally, - unless it is one of our aliases, empty - or our domain if we are a logon server.*/ - - if ((!is_myworkgroup(user_info->domain.str))&& - (!is_myname(user_info->domain.str))) { - DEBUG(7,("The requested user domain is not the local server name or our domain. [%s]\\[%s]\n", - user_info->domain.str,user_info->internal_username.str)); - return NT_STATUS_NO_SUCH_USER; - } - - return check_sam_security(auth_context, my_private_data, mem_ctx, user_info, server_info); -} - -/* module initialisation */ -NTSTATUS auth_init_samstrict_dc(struct auth_context *auth_context, const char *param, auth_methods **auth_method) -{ - if (!make_auth_methods(auth_context, auth_method)) { - return NT_STATUS_NO_MEMORY; - } - - (*auth_method)->auth = check_samstrict_dc_security; - (*auth_method)->name = "samstrict_dc"; - return NT_STATUS_OK; -} - -int auth_sam_init(void) -{ - smb_register_auth("samstrict_dc", auth_init_samstrict_dc, AUTH_INTERFACE_VERSION); - smb_register_auth("samstrict", auth_init_samstrict, AUTH_INTERFACE_VERSION); - smb_register_auth("sam", auth_init_sam, AUTH_INTERFACE_VERSION); - return True; -} diff --git a/source3/auth/auth_server.c b/source3/auth/auth_server.c index a311f01dc3f..5144852d3b4 100644 --- a/source3/auth/auth_server.c +++ b/source3/auth/auth_server.c @@ -400,8 +400,3 @@ NTSTATUS auth_init_smbserver(struct auth_context *auth_context, const char* para (*auth_method)->free_private_data = free_server_private_data; return NT_STATUS_OK; } - -int auth_server_init(void) -{ - return smb_register_auth("smbserver", auth_init_smbserver, AUTH_INTERFACE_VERSION); -} diff --git a/source3/auth/auth_unix.c b/source3/auth/auth_unix.c index efab2046c36..4f44767a81a 100644 --- a/source3/auth/auth_unix.c +++ b/source3/auth/auth_unix.c @@ -130,7 +130,3 @@ NTSTATUS auth_init_unix(struct auth_context *auth_context, const char* param, au return NT_STATUS_OK; } -int auth_unix_init(void) -{ - return smb_register_auth("unix", auth_init_unix, AUTH_INTERFACE_VERSION); -} diff --git a/source3/auth/auth_util.c b/source3/auth/auth_util.c index a3ca0b226f2..d0f1fc1e342 100644 --- a/source3/auth/auth_util.c +++ b/source3/auth/auth_util.c @@ -219,18 +219,35 @@ NTSTATUS make_user_info_map(auth_usersupplied_info **user_info, where it doens't supply a domain for logon script 'net use' commands. - Finally, we do this by looking up a cache of trusted domains! + The way I do it here is by checking if the fully + qualified username exists. This is rather reliant + on winbind, but until we have a better method this + will have to do */ domain = client_domain; - if (is_trusted_domain(domain)) { - return make_user_info(user_info, smb_name, internal_username, - client_domain, domain, wksta_name, - lm_pwd, nt_pwd, plaintext, ntlmssp_flags, - encrypted); - } + if ((smb_name) && (*smb_name)) { /* Don't do this for guests */ + char *user = NULL; + if (asprintf(&user, "%s%s%s", + client_domain, lp_winbind_separator(), + smb_name) < 0) { + DEBUG(0, ("make_user_info_map: asprintf() failed!\n")); + return NT_STATUS_NO_MEMORY; + } + DEBUG(5, ("make_user_info_map: testing for user %s\n", user)); + + if (Get_Pwnam(user) == NULL) { + DEBUG(5, ("make_user_info_map: test for user %s failed\n", user)); + domain = lp_workgroup(); + DEBUG(5, ("make_user_info_map: trusted domain %s doesn't appear to exist, using %s\n", + client_domain, domain)); + } else { + DEBUG(5, ("make_user_info_map: using trusted domain %s\n", domain)); + } + SAFE_FREE(user); + } } else { domain = lp_workgroup(); } diff --git a/source3/auth/auth_winbind.c b/source3/auth/auth_winbind.c index e2a292dd015..5e1567d3c19 100644 --- a/source3/auth/auth_winbind.c +++ b/source3/auth/auth_winbind.c @@ -134,8 +134,3 @@ NTSTATUS auth_init_winbind(struct auth_context *auth_context, const char *param, (*auth_method)->auth = check_winbind_security; return NT_STATUS_OK; } - -int auth_winbind_init(void) -{ - return smb_register_auth("winbind", auth_init_winbind, AUTH_INTERFACE_VERSION); -} diff --git a/source3/bin/.cvsignore b/source3/bin/.cvsignore index 058397a52c0..5cad4ba4067 100644 --- a/source3/bin/.cvsignore +++ b/source3/bin/.cvsignore @@ -2,7 +2,6 @@ .dummy .libs debug2html -editreg locktest locktest2 make_printerdef @@ -37,8 +36,6 @@ smbtorture smbtree smbumount swat -t_strcmp -t_stringoverflow talloctort tdbbackup testparm @@ -47,3 +44,4 @@ vfstest wbinfo winbindd wrepld +editreg diff --git a/source3/change-log b/source3/change-log index 71f5012484f..1f7798b541f 100644 --- a/source3/change-log +++ b/source3/change-log @@ -2,7 +2,7 @@ SUPERCEDED Change Log for Samba ^^^^^^^^^^ Unless otherwise attributed, all changes were made by -Andrew.Tridgell@anu.edu.au. +Andrew.Tridgell@anu.edu.au. All bugs to samba-bugs@samba.org. NOTE: THIS LOG IS IN CHRONOLOGICAL ORDER diff --git a/source3/client/client.c b/source3/client/client.c index b6c4b704a9b..1248c256591 100644 --- a/source3/client/client.c +++ b/source3/client/client.c @@ -3,7 +3,6 @@ SMB client Copyright (C) Andrew Tridgell 1994-1998 Copyright (C) Simo Sorce 2001-2002 - Copyright (C) Jelmer Vernooij 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -28,24 +27,28 @@ #define REGISTER 0 #endif +const char prog_name[] = "smbclient"; + struct cli_state *cli; extern BOOL in_client; +extern BOOL AllowDebugChange; static int port = 0; pstring cur_dir = "\\"; static pstring cd_path = ""; static pstring service; static pstring desthost; -static pstring username; static pstring password; +static pstring username; static pstring workgroup; -static BOOL use_kerberos; +static char *cmdstr; +static BOOL got_user; static BOOL got_pass; -static char *cmdstr = NULL; - static int io_bufsize = 64512; +static BOOL use_kerberos; static int name_type = 0x20; static int max_protocol = PROTOCOL_NT1; +extern pstring user_socket_options; static int process_tok(fstring tok); static int cmd_help(void); @@ -1057,7 +1060,7 @@ static int do_put(char *rname, char *lname, BOOL reput) { int fnum; XFILE *f; - size_t start = 0; + int start = 0; off_t nread = 0; char *buf = NULL; int maxwrite = io_bufsize; @@ -2469,6 +2472,102 @@ static int process(char *base_directory) return rc; } +/**************************************************************************** +usage on the program +****************************************************************************/ +static void usage(char *pname) +{ + d_printf("Usage: %s service [options]", pname); + + d_printf("\nVersion %s\n",VERSION); + d_printf("\t-s smb.conf pathname to smb.conf file\n"); + d_printf("\t-O socket_options socket options to use\n"); + d_printf("\t-R name resolve order use these name resolution services only\n"); + d_printf("\t-M host send a winpopup message to the host\n"); + d_printf("\t-i scope use this NetBIOS scope\n"); + d_printf("\t-N don't ask for a password\n"); + d_printf("\t-n netbios name. Use this name as my netbios name\n"); + d_printf("\t-d debuglevel set the debuglevel\n"); + d_printf("\t-p port connect to the specified port\n"); + d_printf("\t-l log basename. Basename for log/debug files\n"); + d_printf("\t-h Print this help message.\n"); + d_printf("\t-I dest IP use this IP to connect to\n"); + d_printf("\t-E write messages to stderr instead of stdout\n"); + d_printf("\t-k use kerberos (active directory) authentication\n"); + d_printf("\t-U username set the network username\n"); + d_printf("\t-L host get a list of shares available on a host\n"); + d_printf("\t-t terminal code terminal i/o code {sjis|euc|jis7|jis8|junet|hex}\n"); + d_printf("\t-m max protocol set the max protocol level\n"); + d_printf("\t-A filename get the credentials from a file\n"); + d_printf("\t-W workgroup set the workgroup name\n"); + d_printf("\t-TIXFqgbNan command line tar\n"); + d_printf("\t-D directory start from directory\n"); + d_printf("\t-c command string execute semicolon separated commands\n"); + d_printf("\t-b xmit/send buffer changes the transmit/send buffer (default: 65520)\n"); + d_printf("\n"); +} + + +/**************************************************************************** +get a password from a a file or file descriptor +exit on failure +****************************************************************************/ +static void get_password_file(void) +{ + int fd = -1; + char *p; + BOOL close_it = False; + pstring spec; + char pass[128]; + + if ((p = getenv("PASSWD_FD")) != NULL) { + pstrcpy(spec, "descriptor "); + pstrcat(spec, p); + sscanf(p, "%d", &fd); + close_it = False; + } else if ((p = getenv("PASSWD_FILE")) != NULL) { + fd = sys_open(p, O_RDONLY, 0); + pstrcpy(spec, p); + if (fd < 0) { + fprintf(stderr, "Error opening PASSWD_FILE %s: %s\n", + spec, strerror(errno)); + exit(1); + } + close_it = True; + } + + for(p = pass, *p = '\0'; /* ensure that pass is null-terminated */ + p && p - pass < sizeof(pass);) { + switch (read(fd, p, 1)) { + case 1: + if (*p != '\n' && *p != '\0') { + *++p = '\0'; /* advance p, and null-terminate pass */ + break; + } + case 0: + if (p - pass) { + *p = '\0'; /* null-terminate it, just in case... */ + p = NULL; /* then force the loop condition to become false */ + break; + } else { + fprintf(stderr, "Error reading password from file %s: %s\n", + spec, "empty password\n"); + exit(1); + } + + default: + fprintf(stderr, "Error reading password from file %s: %s\n", + spec, strerror(errno)); + exit(1); + } + } + pstrcpy(password, pass); + if (close_it) + close(fd); +} + + + /**************************************************************************** handle a -L query ****************************************************************************/ @@ -2578,36 +2677,19 @@ static void remember_query_host(const char *arg, int main(int argc,char *argv[]) { fstring base_directory; + char *pname = argv[0]; int opt; + extern char *optarg; + extern int optind; + int old_debug; pstring query_host; BOOL message = False; extern char tar_type; pstring term_code; - static const char *new_name_resolve_order = NULL; - poptContext pc; + pstring new_name_resolve_order; + pstring logfile; char *p; int rc = 0; - struct poptOption long_options[] = { - POPT_AUTOHELP - - { "name-resolve", 'R', POPT_ARG_STRING, &new_name_resolve_order, 'R', "Use these name resolution services only", "NAME-RESOLVE-ORDER" }, - { "message", 'M', POPT_ARG_STRING, NULL, 'M', "Send message", "HOST" }, - { "ip-address", 'I', POPT_ARG_STRING, NULL, 'I', "Use this IP to connect to", "IP" }, - { "stderr", 'E', POPT_ARG_NONE, NULL, 'E', "Write messages to stderr instead of stdout" }, - { "list", 'L', POPT_ARG_STRING, NULL, 'L', "Get a list of shares available on a host", "HOST" }, - { "terminal", 't', POPT_ARG_STRING, NULL, 't', "Terminal I/O code {sjis|euc|jis7|jis8|junet|hex}", "CODE" }, - { "max-protocol", 'm', POPT_ARG_STRING, NULL, 'm', "Set the max protocol level", "LEVEL" }, - { "tar", 'T', POPT_ARG_STRING, NULL, 'T', "Command line tar", "IXFqgbNan" }, - { "directory", 'D', POPT_ARG_STRING, NULL, 'D', "Start from directory", "DIR" }, - { "command", 'c', POPT_ARG_STRING, &cmdstr, 'c', "Execute semicolon separated commands" }, - { "send-buffer", 'b', POPT_ARG_INT, NULL, 'b', "Changes the transmit/send buffer", "BYTES" }, - { "port", 'p', POPT_ARG_INT, &port, 'p', "Port to connect to", "PORT" }, - POPT_COMMON_SAMBA - POPT_COMMON_CONNECTION - POPT_COMMON_CREDENTIALS - POPT_TABLEEND - }; - #ifdef KANJI pstrcpy(term_code, KANJI); @@ -2618,107 +2700,306 @@ static void remember_query_host(const char *arg, *query_host = 0; *base_directory = 0; - setup_logging(argv[0],True); + *new_name_resolve_order = 0; - pc = poptGetContext("smbclient", argc, (const char **) argv, long_options, - POPT_CONTEXT_KEEP_FIRST); - poptSetOtherOptionHelp(pc, "service "); + DEBUGLEVEL = 2; + AllowDebugChange = False; + + setup_logging(pname,True); + + /* + * If the -E option is given, be careful not to clobber stdout + * before processing the options. 28.Feb.99, richard@hacom.nl. + * Also pre-parse the -s option to get the service file name. + */ + + for (opt = 1; opt < argc; opt++) { + if (strcmp(argv[opt], "-E") == 0) + dbf = x_stderr; + else if(strncmp(argv[opt], "-s", 2) == 0) { + if(argv[opt][2] != '\0') + pstrcpy(dyn_CONFIGFILE, &argv[opt][2]); + else if(argv[opt+1] != NULL) { + /* + * At least one more arg left. + */ + pstrcpy(dyn_CONFIGFILE, argv[opt+1]); + } else { + usage(pname); + exit(1); + } + } + } in_client = True; /* Make sure that we tell lp_load we are */ - while ((opt = poptGetNextOpt(pc)) != -1) { + old_debug = DEBUGLEVEL; + if (!lp_load(dyn_CONFIGFILE,True,False,False)) { + fprintf(stderr, "%s: Can't load %s - run testparm to debug it\n", + prog_name, dyn_CONFIGFILE); + } + DEBUGLEVEL = old_debug; + + pstrcpy(workgroup,lp_workgroup()); + + load_interfaces(); + + if (getenv("USER")) { + pstrcpy(username,getenv("USER")); + + /* modification to support userid%passwd syntax in the USER var + 25.Aug.97, jdblair@uab.edu */ + + if ((p=strchr_m(username,'%'))) { + *p = 0; + pstrcpy(password,p+1); + got_pass = True; + memset(strchr_m(getenv("USER"),'%')+1,'X',strlen(password)); + } + } + + /* modification to support PASSWD environmental var + 25.Aug.97, jdblair@uab.edu */ + if (getenv("PASSWD")) { + pstrcpy(password,getenv("PASSWD")); + got_pass = True; + } + + if (getenv("PASSWD_FD") || getenv("PASSWD_FILE")) { + get_password_file(); + got_pass = True; + } + + if (*username == 0 && getenv("LOGNAME")) { + pstrcpy(username,getenv("LOGNAME")); + } + + if (*username == 0) { + pstrcpy(username,"GUEST"); + } + + if (argc < 2) { + usage(pname); + exit(1); + } + + /* FIXME: At the moment, if the user should happen to give the + * options ahead of the service name (in standard Unix + * fashion) then smbclient just spits out the usage message + * with no explanation of what in particular was wrong. Is + * there any reason we can't just parse out the service name + * and password after running getopt?? -- mbp */ + if (*argv[1] != '-') { + pstrcpy(service,argv[1]); + /* Convert any '/' characters in the service name to '\' characters */ + string_replace( service, '/','\\'); + argc--; + argv++; + + if (count_chars(service,'\\') < 3) { + usage(pname); + d_printf("\n%s: Not enough '\\' characters in service\n",service); + exit(1); + } + + if (argc > 1 && (*argv[1] != '-')) { + got_pass = True; + pstrcpy(password,argv[1]); + memset(argv[1],'X',strlen(argv[1])); + argc--; + argv++; + } + } + + while ((opt = + getopt(argc, argv,"s:O:R:M:i:Nn:d:Pp:l:hI:EU:L:t:m:W:T:D:c:b:A:k")) != EOF) { switch (opt) { + case 's': + pstrcpy(dyn_CONFIGFILE, optarg); + break; + case 'O': + pstrcpy(user_socket_options,optarg); + break; + case 'R': + pstrcpy(new_name_resolve_order, optarg); + break; case 'M': /* Messages are sent to NetBIOS name type 0x3 * (Messenger Service). Make sure we default * to port 139 instead of port 445. srl,crh */ name_type = 0x03; - pstrcpy(desthost,poptGetOptArg(pc)); - if( 0 == port ) port = 139; + pstrcpy(desthost,optarg); + if( 0 == port ) + port = 139; message = True; break; + case 'i': + set_global_scope(optarg); + break; + case 'N': + got_pass = True; + break; + case 'n': + set_global_myname(optarg); + break; + case 'd': + if (*optarg == 'A') + DEBUGLEVEL = 10000; + else + DEBUGLEVEL = atoi(optarg); + break; + case 'P': + /* not needed anymore */ + break; + case 'p': + port = atoi(optarg); + break; + case 'l': + slprintf(logfile,sizeof(logfile)-1, "%s.client",optarg); + lp_set_logfile(logfile); + break; + case 'h': + usage(pname); + exit(0); + break; case 'I': { - dest_ip = *interpret_addr2(poptGetOptArg(pc)); + dest_ip = *interpret_addr2(optarg); if (is_zero_ip(dest_ip)) exit(1); have_ip = True; } break; case 'E': - dbf = x_stderr; display_set_stderr(); + dbf = x_stderr; + break; + case 'U': + { + char *lp; + + got_user = True; + pstrcpy(username,optarg); + if ((lp=strchr_m(username,'%'))) { + *lp = 0; + pstrcpy(password,lp+1); + got_pass = True; + memset(strchr_m(optarg,'%')+1,'X',strlen(password)); + } + } + break; + + case 'A': + { + XFILE *auth; + fstring buf; + uint16 len = 0; + char *ptr, *val, *param; + + if ((auth=x_fopen(optarg, O_RDONLY, 0)) == NULL) + { + /* fail if we can't open the credentials file */ + d_printf("ERROR: Unable to open credentials file!\n"); + exit (-1); + } + + while (!x_feof(auth)) + { + /* get a line from the file */ + if (!x_fgets(buf, sizeof(buf), auth)) + continue; + len = strlen(buf); + + if ((len) && (buf[len-1]=='\n')) + { + buf[len-1] = '\0'; + len--; + } + if (len == 0) + continue; + + /* break up the line into parameter & value. + will need to eat a little whitespace possibly */ + param = buf; + if (!(ptr = strchr_m (buf, '='))) + continue; + val = ptr+1; + *ptr = '\0'; + + /* eat leading white space */ + while ((*val!='\0') && ((*val==' ') || (*val=='\t'))) + val++; + + if (strwicmp("password", param) == 0) + { + pstrcpy(password, val); + got_pass = True; + } + else if (strwicmp("username", param) == 0) + pstrcpy(username, val); + else if (strwicmp("domain", param) == 0) + pstrcpy(workgroup,val); + memset(buf, 0, sizeof(buf)); + } + x_fclose(auth); + } break; case 'L': - remember_query_host(poptGetOptArg(pc), query_host); + remember_query_host(optarg, query_host); break; case 't': - pstrcpy(term_code, poptGetOptArg(pc)); + pstrcpy(term_code, optarg); break; case 'm': - max_protocol = interpret_protocol(poptGetOptArg(pc), max_protocol); + max_protocol = interpret_protocol(optarg, max_protocol); + break; + case 'W': + pstrcpy(workgroup,optarg); break; case 'T': - if (!tar_parseargs(argc, argv, poptGetOptArg(pc), optind)) { - poptPrintUsage(pc, stderr, 0); + if (!tar_parseargs(argc, argv, optarg, optind)) { + usage(pname); exit(1); } break; case 'D': - fstrcpy(base_directory,poptGetOptArg(pc)); + fstrcpy(base_directory,optarg); + break; + case 'c': + cmdstr = optarg; break; case 'b': - io_bufsize = MAX(1, atoi(poptGetOptArg(pc))); + io_bufsize = MAX(1, atoi(optarg)); break; - } - } - - if (!lp_load(dyn_CONFIGFILE,True,False,False)) { - fprintf(stderr, "%s: Can't load %s - run testparm to debug it\n", - argv[0], dyn_CONFIGFILE); - } - - poptGetArg(pc); - - load_interfaces(); - - if(poptPeekArg(pc)) { - pstrcpy(service,poptGetArg(pc)); - /* Convert any '/' characters in the service name to '\' characters */ - string_replace(service, '/','\\'); - - if (count_chars(service,'\\') < 3) { - d_printf("\n%s: Not enough '\\' characters in service\n",service); - poptPrintUsage(pc, stderr, 0); + case 'k': +#ifdef HAVE_KRB5 + use_kerberos = True; +#else + d_printf("No kerberos support compiled in\n"); + exit(1); +#endif + break; + default: + usage(pname); exit(1); } } - if (poptPeekArg(pc)) { - cmdline_auth_info.got_pass = True; - pstrcpy(cmdline_auth_info.password,poptGetArg(pc)); - } + if (use_kerberos && !got_user) + got_pass = True; init_names(); - if(new_name_resolve_order) + if(*new_name_resolve_order) lp_set_name_resolve_order(new_name_resolve_order); if (!tar_type && !*query_host && !*service && !message) { - poptPrintUsage(pc, stderr, 0); + usage(pname); exit(1); } - poptFreeContext(pc); - - pstrcpy(username, cmdline_auth_info.username); - pstrcpy(password, cmdline_auth_info.password); - pstrcpy(workgroup, lp_workgroup()); - use_kerberos = cmdline_auth_info.use_kerberos; - got_pass = cmdline_auth_info.got_pass; - DEBUG( 3, ( "Client started (version %s).\n", VERSION ) ); if (tar_type) { diff --git a/source3/client/clitar.c b/source3/client/clitar.c index dfda997ca26..579110f75fb 100644 --- a/source3/client/clitar.c +++ b/source3/client/clitar.c @@ -1089,7 +1089,7 @@ static char * get_longfilename(file_info2 finfo) BOOL first = True; DEBUG(5, ("Restoring a long file name: %s\n", finfo.name)); - DEBUG(5, ("Len = %.0f\n", (double)finfo.size)); + DEBUG(5, ("Len = %d\n", (int)finfo.size)); if (longname == NULL) { diff --git a/source3/config.guess b/source3/config.guess index 78f6b92cd30..bcdc0742b73 100755 --- a/source3/config.guess +++ b/source3/config.guess @@ -1,9 +1,9 @@ #! /bin/sh # Attempt to guess a canonical system name. -# Copyright (C) 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, -# 2000, 2001, 2002, 2003 Free Software Foundation, Inc. +# Copyright (C) 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001 +# Free Software Foundation, Inc. -timestamp='2003-01-10' +timestamp='2001-11-26' # This file is free software; you can redistribute it and/or modify it # under the terms of the GNU General Public License as published by @@ -24,7 +24,7 @@ timestamp='2003-01-10' # configuration script generated by Autoconf, you may include it under # the same distribution terms that you use for the rest of that program. -# Originally written by Per Bothner . +# Originally written by Per Bothner . # Please send patches to . Submit a context # diff and a properly formatted ChangeLog entry. # @@ -88,41 +88,30 @@ if test $# != 0; then exit 1 fi -trap 'exit 1' 1 2 15 -# CC_FOR_BUILD -- compiler used by this script. Note that the use of a -# compiler to aid in system detection is discouraged as it requires -# temporary files to be created and, as you can see below, it is a -# headache to deal with in a portable fashion. +dummy=dummy-$$ +trap 'rm -f $dummy.c $dummy.o $dummy.rel $dummy; exit 1' 1 2 15 +# CC_FOR_BUILD -- compiler used by this script. # Historically, `CC_FOR_BUILD' used to be named `HOST_CC'. We still # use `HOST_CC' if defined, but it is deprecated. -# Portable tmp directory creation inspired by the Autoconf team. - -set_cc_for_build=' -trap "exitcode=\$?; (rm -f \$tmpfiles 2>/dev/null; rmdir \$tmp 2>/dev/null) && exit \$exitcode" 0 ; -trap "rm -f \$tmpfiles 2>/dev/null; rmdir \$tmp 2>/dev/null; exit 1" 1 2 13 15 ; -: ${TMPDIR=/tmp} ; - { tmp=`(umask 077 && mktemp -d -q "$TMPDIR/cgXXXXXX") 2>/dev/null` && test -n "$tmp" && test -d "$tmp" ; } || - { test -n "$RANDOM" && tmp=$TMPDIR/cg$$-$RANDOM && (umask 077 && mkdir $tmp) ; } || - { echo "$me: cannot create a temporary directory in $TMPDIR" >&2 ; exit 1 ; } ; -dummy=$tmp/dummy ; -tmpfiles="$dummy.c $dummy.o $dummy.rel $dummy" ; -case $CC_FOR_BUILD,$HOST_CC,$CC in - ,,) echo "int x;" > $dummy.c ; - for c in cc gcc c89 c99 ; do - if ($c -c -o $dummy.o $dummy.c) >/dev/null 2>&1 ; then +set_cc_for_build='case $CC_FOR_BUILD,$HOST_CC,$CC in + ,,) echo "int dummy(){}" > $dummy.c ; + for c in cc gcc c89 ; do + ($c $dummy.c -c -o $dummy.o) >/dev/null 2>&1 ; + if test $? = 0 ; then CC_FOR_BUILD="$c"; break ; fi ; done ; + rm -f $dummy.c $dummy.o $dummy.rel ; if test x"$CC_FOR_BUILD" = x ; then CC_FOR_BUILD=no_compiler_found ; fi ;; ,,*) CC_FOR_BUILD=$CC ;; ,*,*) CC_FOR_BUILD=$HOST_CC ;; -esac ;' +esac' # This is needed to find uname on a Pyramid OSx when run in the BSD universe. # (ghazi@noc.rutgers.edu 1994-08-24) @@ -146,23 +135,23 @@ case "${UNAME_MACHINE}:${UNAME_SYSTEM}:${UNAME_RELEASE}:${UNAME_VERSION}" in # object file format. This provides both forward # compatibility and a consistent mechanism for selecting the # object file format. - # - # Note: NetBSD doesn't particularly care about the vendor - # portion of the name. We always set it to "unknown". - sysctl="sysctl -n hw.machine_arch" - UNAME_MACHINE_ARCH=`(/sbin/$sysctl 2>/dev/null || \ - /usr/sbin/$sysctl 2>/dev/null || echo unknown)` - case "${UNAME_MACHINE_ARCH}" in - armeb) machine=armeb-unknown ;; - arm*) machine=arm-unknown ;; - sh3el) machine=shl-unknown ;; - sh3eb) machine=sh-unknown ;; - *) machine=${UNAME_MACHINE_ARCH}-unknown ;; + # Determine the machine/vendor (is the vendor relevant). + case "${UNAME_MACHINE}" in + amiga) machine=m68k-unknown ;; + arm32) machine=arm-unknown ;; + atari*) machine=m68k-atari ;; + sun3*) machine=m68k-sun ;; + mac68k) machine=m68k-apple ;; + macppc) machine=powerpc-apple ;; + hp3[0-9][05]) machine=m68k-hp ;; + ibmrt|romp-ibm) machine=romp-ibm ;; + sparc*) machine=`uname -p`-unknown ;; + *) machine=${UNAME_MACHINE}-unknown ;; esac # The Operating System including object format, if it has switched # to ELF recently, or will in the future. - case "${UNAME_MACHINE_ARCH}" in - arm*|i386|m68k|ns32k|sh3*|sparc|vax) + case "${UNAME_MACHINE}" in + i386|sparc|amiga|arm*|hp300|mvme68k|vax|atari|luna68k|mac68k|news68k|next68k|pc532|sun3*|x68k) eval $set_cc_for_build if echo __ELF__ | $CC_FOR_BUILD -E - 2>/dev/null \ | grep __ELF__ >/dev/null @@ -179,18 +168,7 @@ case "${UNAME_MACHINE}:${UNAME_SYSTEM}:${UNAME_RELEASE}:${UNAME_VERSION}" in ;; esac # The OS release - # Debian GNU/NetBSD machines have a different userland, and - # thus, need a distinct triplet. However, they do not need - # kernel version information, so it can be replaced with a - # suitable tag, in the style of linux-gnu. - case "${UNAME_VERSION}" in - Debian*) - release='-gnu' - ;; - *) - release=`echo ${UNAME_RELEASE}|sed -e 's/[-_].*/\./'` - ;; - esac + release=`echo ${UNAME_RELEASE}|sed -e 's/[-_].*/\./'` # Since CPU_TYPE-MANUFACTURER-KERNEL-OPERATING_SYSTEM: # contains redundant information, the shorter form: # CPU_TYPE-MANUFACTURER-OPERATING_SYSTEM is used. @@ -235,9 +213,6 @@ case "${UNAME_MACHINE}:${UNAME_SYSTEM}:${UNAME_RELEASE}:${UNAME_VERSION}" in *:OpenBSD:*:*) echo ${UNAME_MACHINE}-unknown-openbsd${UNAME_RELEASE} exit 0 ;; - *:MicroBSD:*:*) - echo ${UNAME_MACHINE}-unknown-microbsd${UNAME_RELEASE} - exit 0 ;; alpha:OSF1:*:*) if test $UNAME_RELEASE = "V4.0"; then UNAME_RELEASE=`/usr/sbin/sizer -v | awk '{print $3}'` @@ -246,7 +221,6 @@ case "${UNAME_MACHINE}:${UNAME_SYSTEM}:${UNAME_RELEASE}:${UNAME_VERSION}" in # A Tn.n version is a released field test version. # A Xn.n version is an unreleased experimental baselevel. # 1.2 uses "1.2" for uname -r. - eval $set_cc_for_build cat <$dummy.s .data \$Lformat: @@ -272,9 +246,10 @@ main: jsr \$26,exit .end main EOF - $CC_FOR_BUILD -o $dummy $dummy.s 2>/dev/null + eval $set_cc_for_build + $CC_FOR_BUILD $dummy.s -o $dummy 2>/dev/null if test "$?" = 0 ; then - case `$dummy` in + case `./$dummy` in 0-0) UNAME_MACHINE="alpha" ;; @@ -296,11 +271,9 @@ EOF 2-1307) UNAME_MACHINE="alphaev68" ;; - 3-1307) - UNAME_MACHINE="alphaev7" - ;; esac fi + rm -f $dummy.s $dummy echo ${UNAME_MACHINE}-dec-osf`echo ${UNAME_RELEASE} | sed -e 's/^[VTX]//' | tr 'ABCDEFGHIJKLMNOPQRSTUVWXYZ' 'abcdefghijklmnopqrstuvwxyz'` exit 0 ;; Alpha\ *:Windows_NT*:*) @@ -318,9 +291,6 @@ EOF *:[Aa]miga[Oo][Ss]:*:*) echo ${UNAME_MACHINE}-unknown-amigaos exit 0 ;; - *:[Mm]orph[Oo][Ss]:*:*) - echo ${UNAME_MACHINE}-unknown-morphos - exit 0 ;; *:OS/390:*:*) echo i370-ibm-openedition exit 0 ;; @@ -341,10 +311,6 @@ EOF NILE*:*:*:dcosx) echo pyramid-pyramid-svr4 exit 0 ;; - DRS?6000:UNIX_SV:4.2*:7*) - case `/usr/bin/uname -p` in - sparc) echo sparc-icl-nx7 && exit 0 ;; - esac ;; sun4H:SunOS:5.*:*) echo sparc-hal-solaris2`echo ${UNAME_RELEASE}|sed -e 's/[^.]*//'` exit 0 ;; @@ -373,7 +339,7 @@ EOF echo m68k-sun-sunos${UNAME_RELEASE} exit 0 ;; sun*:*:4.2BSD:*) - UNAME_RELEASE=`(sed 1q /etc/motd | awk '{print substr($5,1,3)}') 2>/dev/null` + UNAME_RELEASE=`(head -1 /etc/motd | awk '{print substr($5,1,3)}') 2>/dev/null` test "x${UNAME_RELEASE}" = "x" && UNAME_RELEASE=3 case "`/bin/arch`" in sun3) @@ -451,20 +417,15 @@ EOF exit (-1); } EOF - $CC_FOR_BUILD -o $dummy $dummy.c \ - && $dummy `echo "${UNAME_RELEASE}" | sed -n 's/\([0-9]*\).*/\1/p'` \ - && exit 0 + $CC_FOR_BUILD $dummy.c -o $dummy \ + && ./$dummy `echo "${UNAME_RELEASE}" | sed -n 's/\([0-9]*\).*/\1/p'` \ + && rm -f $dummy.c $dummy && exit 0 + rm -f $dummy.c $dummy echo mips-mips-riscos${UNAME_RELEASE} exit 0 ;; Motorola:PowerMAX_OS:*:*) echo powerpc-motorola-powermax exit 0 ;; - Motorola:*:4.3:PL8-*) - echo powerpc-harris-powermax - exit 0 ;; - Night_Hawk:*:*:PowerMAX_OS | Synergy:PowerMAX_OS:*:*) - echo powerpc-harris-powermax - exit 0 ;; Night_Hawk:Power_UNIX:*:*) echo powerpc-harris-powerunix exit 0 ;; @@ -537,7 +498,8 @@ EOF exit(0); } EOF - $CC_FOR_BUILD -o $dummy $dummy.c && $dummy && exit 0 + $CC_FOR_BUILD $dummy.c -o $dummy && ./$dummy && rm -f $dummy.c $dummy && exit 0 + rm -f $dummy.c $dummy echo rs6000-ibm-aix3.2.5 elif grep bos324 /usr/include/stdio.h >/dev/null 2>&1; then echo rs6000-ibm-aix3.2.4 @@ -546,7 +508,7 @@ EOF fi exit 0 ;; *:AIX:*:[45]) - IBM_CPU_ID=`/usr/sbin/lsdev -C -c processor -S available | sed 1q | awk '{ print $1 }'` + IBM_CPU_ID=`/usr/sbin/lsdev -C -c processor -S available | head -1 | awk '{ print $1 }'` if /usr/sbin/lsattr -El ${IBM_CPU_ID} | grep ' POWER' >/dev/null 2>&1; then IBM_ARCH=rs6000 else @@ -635,21 +597,11 @@ EOF exit (0); } EOF - (CCOPTS= $CC_FOR_BUILD -o $dummy $dummy.c 2>/dev/null) && HP_ARCH=`$dummy` - test -z "$HP_ARCH" && HP_ARCH=hppa + (CCOPTS= $CC_FOR_BUILD $dummy.c -o $dummy 2>/dev/null) && HP_ARCH=`./$dummy` + if test -z "$HP_ARCH"; then HP_ARCH=hppa; fi + rm -f $dummy.c $dummy fi ;; esac - if [ ${HP_ARCH} = "hppa2.0w" ] - then - # avoid double evaluation of $set_cc_for_build - test -n "$CC_FOR_BUILD" || eval $set_cc_for_build - if echo __LP64__ | (CCOPTS= $CC_FOR_BUILD -E -) | grep __LP64__ >/dev/null - then - HP_ARCH="hppa2.0w" - else - HP_ARCH="hppa64" - fi - fi echo ${HP_ARCH}-hp-hpux${HPUX_REV} exit 0 ;; ia64:HP-UX:*:*) @@ -683,7 +635,8 @@ EOF exit (0); } EOF - $CC_FOR_BUILD -o $dummy $dummy.c && $dummy && exit 0 + $CC_FOR_BUILD $dummy.c -o $dummy && ./$dummy && rm -f $dummy.c $dummy && exit 0 + rm -f $dummy.c $dummy echo unknown-hitachi-hiuxwe2 exit 0 ;; 9000/7??:4.3bsd:*:* | 9000/8?[79]:4.3bsd:*:* ) @@ -729,6 +682,9 @@ EOF C4*:ConvexOS:*:* | convex:ConvexOS:C4*:*) echo c4-convex-bsd exit 0 ;; + CRAY*X-MP:*:*:*) + echo xmp-cray-unicos + exit 0 ;; CRAY*Y-MP:*:*:*) echo ymp-cray-unicos${UNAME_RELEASE} | sed -e 's/\.[^.]*$/.X/' exit 0 ;; @@ -741,15 +697,18 @@ EOF CRAY*TS:*:*:*) echo t90-cray-unicos${UNAME_RELEASE} | sed -e 's/\.[^.]*$/.X/' exit 0 ;; + CRAY*T3D:*:*:*) + echo alpha-cray-unicosmk${UNAME_RELEASE} | sed -e 's/\.[^.]*$/.X/' + exit 0 ;; CRAY*T3E:*:*:*) echo alphaev5-cray-unicosmk${UNAME_RELEASE} | sed -e 's/\.[^.]*$/.X/' exit 0 ;; CRAY*SV1:*:*:*) echo sv1-cray-unicos${UNAME_RELEASE} | sed -e 's/\.[^.]*$/.X/' exit 0 ;; - *:UNICOS/mp:*:*) - echo nv1-cray-unicosmp${UNAME_RELEASE} | sed -e 's/\.[^.]*$/.X/' - exit 0 ;; + CRAY-2:*:*:*) + echo cray2-cray-unicos + exit 0 ;; F30[01]:UNIX_System_V:*:* | F700:UNIX_System_V:*:*) FUJITSU_PROC=`uname -m | tr 'ABCDEFGHIJKLMNOPQRSTUVWXYZ' 'abcdefghijklmnopqrstuvwxyz'` FUJITSU_SYS=`uname -p | tr 'ABCDEFGHIJKLMNOPQRSTUVWXYZ' 'abcdefghijklmnopqrstuvwxyz' | sed -e 's/\///'` @@ -766,18 +725,7 @@ EOF echo ${UNAME_MACHINE}-unknown-bsdi${UNAME_RELEASE} exit 0 ;; *:FreeBSD:*:*) - # Determine whether the default compiler uses glibc. - eval $set_cc_for_build - sed 's/^ //' << EOF >$dummy.c - #include - #if __GLIBC__ >= 2 - LIBC=gnu - #else - LIBC= - #endif -EOF - eval `$CC_FOR_BUILD -E $dummy.c 2>/dev/null | grep ^LIBC=` - echo ${UNAME_MACHINE}-unknown-freebsd`echo ${UNAME_RELEASE}|sed -e 's/[-(].*//'`${LIBC:+-$LIBC} + echo ${UNAME_MACHINE}-unknown-freebsd`echo ${UNAME_RELEASE}|sed -e 's/[-(].*//'` exit 0 ;; i*:CYGWIN*:*) echo ${UNAME_MACHINE}-pc-cygwin @@ -788,17 +736,11 @@ EOF i*:PW*:*) echo ${UNAME_MACHINE}-pc-pw32 exit 0 ;; - x86:Interix*:3*) - echo i586-pc-interix3 - exit 0 ;; - [345]86:Windows_95:* | [345]86:Windows_98:* | [345]86:Windows_NT:*) - echo i${UNAME_MACHINE}-pc-mks - exit 0 ;; i*:Windows_NT*:* | Pentium*:Windows_NT*:*) # How do we know it's Interix rather than the generic POSIX subsystem? # It also conflicts with pre-2.0 versions of AT&T UWIN. Should we # UNAME_MACHINE based on the output of uname instead of i386? - echo i586-pc-interix + echo i386-pc-interix exit 0 ;; i*:UWIN*:*) echo ${UNAME_MACHINE}-pc-uwin @@ -819,48 +761,16 @@ EOF echo ${UNAME_MACHINE}-unknown-linux-gnu exit 0 ;; ia64:Linux:*:*) - echo ${UNAME_MACHINE}-unknown-linux-gnu + echo ${UNAME_MACHINE}-unknown-linux exit 0 ;; m68*:Linux:*:*) echo ${UNAME_MACHINE}-unknown-linux-gnu exit 0 ;; mips:Linux:*:*) - eval $set_cc_for_build - sed 's/^ //' << EOF >$dummy.c - #undef CPU - #undef mips - #undef mipsel - #if defined(__MIPSEL__) || defined(__MIPSEL) || defined(_MIPSEL) || defined(MIPSEL) - CPU=mipsel - #else - #if defined(__MIPSEB__) || defined(__MIPSEB) || defined(_MIPSEB) || defined(MIPSEB) - CPU=mips - #else - CPU= - #endif - #endif -EOF - eval `$CC_FOR_BUILD -E $dummy.c 2>/dev/null | grep ^CPU=` - test x"${CPU}" != x && echo "${CPU}-unknown-linux-gnu" && exit 0 - ;; - mips64:Linux:*:*) - eval $set_cc_for_build - sed 's/^ //' << EOF >$dummy.c - #undef CPU - #undef mips64 - #undef mips64el - #if defined(__MIPSEL__) || defined(__MIPSEL) || defined(_MIPSEL) || defined(MIPSEL) - CPU=mips64el - #else - #if defined(__MIPSEB__) || defined(__MIPSEB) || defined(_MIPSEB) || defined(MIPSEB) - CPU=mips64 - #else - CPU= - #endif - #endif -EOF - eval `$CC_FOR_BUILD -E $dummy.c 2>/dev/null | grep ^CPU=` - test x"${CPU}" != x && echo "${CPU}-unknown-linux-gnu" && exit 0 + case `sed -n '/^byte/s/^.*: \(.*\) endian/\1/p' < /proc/cpuinfo` in + big) echo mips-unknown-linux-gnu && exit 0 ;; + little) echo mipsel-unknown-linux-gnu && exit 0 ;; + esac ;; ppc:Linux:*:*) echo powerpc-unknown-linux-gnu @@ -909,8 +819,7 @@ EOF # The BFD linker knows what the default object file format is, so # first see if it will tell us. cd to the root directory to prevent # problems with other programs or directories called `ld' in the path. - # Set LC_ALL=C to ensure ld outputs messages in English. - ld_supported_targets=`cd /; LC_ALL=C ld --help 2>&1 \ + ld_supported_targets=`cd /; ld --help 2>&1 \ | sed -ne '/supported targets:/!d s/[ ][ ]*/ /g s/.*supported targets: *// @@ -922,7 +831,7 @@ EOF ;; a.out-i386-linux) echo "${UNAME_MACHINE}-pc-linux-gnuaout" - exit 0 ;; + exit 0 ;; coff-i386) echo "${UNAME_MACHINE}-pc-linux-gnucoff" exit 0 ;; @@ -934,28 +843,32 @@ EOF esac # Determine whether the default compiler is a.out or elf eval $set_cc_for_build - sed 's/^ //' << EOF >$dummy.c - #include - #ifdef __ELF__ - # ifdef __GLIBC__ - # if __GLIBC__ >= 2 - LIBC=gnu - # else - LIBC=gnulibc1 - # endif - # else - LIBC=gnulibc1 - # endif - #else - #ifdef __INTEL_COMPILER - LIBC=gnu - #else - LIBC=gnuaout - #endif - #endif + cat >$dummy.c < +#ifdef __cplusplus +#include /* for printf() prototype */ + int main (int argc, char *argv[]) { +#else + int main (argc, argv) int argc; char *argv[]; { +#endif +#ifdef __ELF__ +# ifdef __GLIBC__ +# if __GLIBC__ >= 2 + printf ("%s-pc-linux-gnu\n", argv[1]); +# else + printf ("%s-pc-linux-gnulibc1\n", argv[1]); +# endif +# else + printf ("%s-pc-linux-gnulibc1\n", argv[1]); +# endif +#else + printf ("%s-pc-linux-gnuaout\n", argv[1]); +#endif + return 0; +} EOF - eval `$CC_FOR_BUILD -E $dummy.c 2>/dev/null | grep ^LIBC=` - test x"${LIBC}" != x && echo "${UNAME_MACHINE}-pc-linux-${LIBC}" && exit 0 + $CC_FOR_BUILD $dummy.c -o $dummy 2>/dev/null && ./$dummy "${UNAME_MACHINE}" && rm -f $dummy.c $dummy && exit 0 + rm -f $dummy.c $dummy test x"${TENTATIVE}" != x && echo "${TENTATIVE}" && exit 0 ;; i*86:DYNIX/ptx:4*:*) @@ -972,23 +885,6 @@ EOF # Use sysv4.2uw... so that sysv4* matches it. echo ${UNAME_MACHINE}-pc-sysv4.2uw${UNAME_VERSION} exit 0 ;; - i*86:OS/2:*:*) - # If we were able to find `uname', then EMX Unix compatibility - # is probably installed. - echo ${UNAME_MACHINE}-pc-os2-emx - exit 0 ;; - i*86:XTS-300:*:STOP) - echo ${UNAME_MACHINE}-unknown-stop - exit 0 ;; - i*86:atheos:*:*) - echo ${UNAME_MACHINE}-unknown-atheos - exit 0 ;; - i*86:LynxOS:2.*:* | i*86:LynxOS:3.[01]*:* | i*86:LynxOS:4.0*:*) - echo i386-unknown-lynxos${UNAME_RELEASE} - exit 0 ;; - i*86:*DOS:*:*) - echo ${UNAME_MACHINE}-pc-msdosdjgpp - exit 0 ;; i*86:*:4.*:* | i*86:SYSTEM_V:4.*:*) UNAME_REL=`echo ${UNAME_RELEASE} | sed 's/\/MP$//'` if grep Novell /usr/include/link.h >/dev/null 2>/dev/null; then @@ -1010,19 +906,22 @@ EOF UNAME_REL=`sed -n 's/.*Version //p' /dev/null >/dev/null ; then - UNAME_REL=`(/bin/uname -X|grep Release|sed -e 's/.*= //')` - (/bin/uname -X|grep i80486 >/dev/null) && UNAME_MACHINE=i486 - (/bin/uname -X|grep '^Machine.*Pentium' >/dev/null) \ + UNAME_REL=`(/bin/uname -X|egrep Release|sed -e 's/.*= //')` + (/bin/uname -X|egrep i80486 >/dev/null) && UNAME_MACHINE=i486 + (/bin/uname -X|egrep '^Machine.*Pentium' >/dev/null) \ && UNAME_MACHINE=i586 - (/bin/uname -X|grep '^Machine.*Pent *II' >/dev/null) \ + (/bin/uname -X|egrep '^Machine.*Pent ?II' >/dev/null) \ && UNAME_MACHINE=i686 - (/bin/uname -X|grep '^Machine.*Pentium Pro' >/dev/null) \ + (/bin/uname -X|egrep '^Machine.*Pentium Pro' >/dev/null) \ && UNAME_MACHINE=i686 echo ${UNAME_MACHINE}-pc-sco$UNAME_REL else echo ${UNAME_MACHINE}-pc-sysv32 fi exit 0 ;; + i*86:*DOS:*:*) + echo ${UNAME_MACHINE}-pc-msdosdjgpp + exit 0 ;; pc:*:*:*) # Left here for compatibility: # uname -m prints for DJGPP always 'pc', but it prints nothing about @@ -1046,15 +945,9 @@ EOF # "miniframe" echo m68010-convergent-sysv exit 0 ;; - mc68k:UNIX:SYSTEM5:3.51m) - echo m68k-convergent-sysv - exit 0 ;; - M680?0:D-NIX:5.3:*) - echo m68k-diab-dnix - exit 0 ;; M68*:*:R3V[567]*:*) test -r /sysV68 && echo 'm68k-motorola-sysv' && exit 0 ;; - 3[34]??:*:4.0:3.0 | 3[34]??A:*:4.0:3.0 | 3[34]??,*:*:4.0:3.0 | 3[34]??/*:*:4.0:3.0 | 4400:*:4.0:3.0 | 4850:*:4.0:3.0 | SKA40:*:4.0:3.0 | SDS2:*:4.0:3.0) + 3[34]??:*:4.0:3.0 | 3[34]??A:*:4.0:3.0 | 3[34]??,*:*:4.0:3.0 | 3[34]??/*:*:4.0:3.0 | 4850:*:4.0:3.0 | SKA40:*:4.0:3.0) OS_REL='' test -r /etc/.relid \ && OS_REL=.`sed -n 's/[^ ]* [^ ]* \([0-9][0-9]\).*/\1/p' < /etc/.relid` @@ -1071,6 +964,9 @@ EOF mc68030:UNIX_System_V:4.*:*) echo m68k-atari-sysv4 exit 0 ;; + i*86:LynxOS:2.*:* | i*86:LynxOS:3.[01]*:* | i*86:LynxOS:4.0*:*) + echo i386-unknown-lynxos${UNAME_RELEASE} + exit 0 ;; TSUNAMI:LynxOS:2.*:*) echo sparc-unknown-lynxos${UNAME_RELEASE} exit 0 ;; @@ -1142,9 +1038,6 @@ EOF SX-5:SUPER-UX:*:*) echo sx5-nec-superux${UNAME_RELEASE} exit 0 ;; - SX-6:SUPER-UX:*:*) - echo sx6-nec-superux${UNAME_RELEASE} - exit 0 ;; Power*:Rhapsody:*:*) echo powerpc-apple-rhapsody${UNAME_RELEASE} exit 0 ;; @@ -1152,24 +1045,18 @@ EOF echo ${UNAME_MACHINE}-apple-rhapsody${UNAME_RELEASE} exit 0 ;; *:Darwin:*:*) - case `uname -p` in - *86) UNAME_PROCESSOR=i686 ;; - powerpc) UNAME_PROCESSOR=powerpc ;; - esac - echo ${UNAME_PROCESSOR}-apple-darwin${UNAME_RELEASE} + echo `uname -p`-apple-darwin${UNAME_RELEASE} exit 0 ;; *:procnto*:*:* | *:QNX:[0123456789]*:*) - UNAME_PROCESSOR=`uname -p` - if test "$UNAME_PROCESSOR" = "x86"; then - UNAME_PROCESSOR=i386 + if test "${UNAME_MACHINE}" = "x86pc"; then UNAME_MACHINE=pc fi - echo ${UNAME_PROCESSOR}-${UNAME_MACHINE}-nto-qnx${UNAME_RELEASE} + echo `uname -p`-${UNAME_MACHINE}-nto-qnx exit 0 ;; *:QNX:*:4*) echo i386-pc-qnx exit 0 ;; - NSR-[DGKLNPTVW]:NONSTOP_KERNEL:*:*) + NSR-[GKLNPTVW]:NONSTOP_KERNEL:*:*) echo nsr-tandem-nsk${UNAME_RELEASE} exit 0 ;; *:NonStop-UX:*:*) @@ -1192,6 +1079,11 @@ EOF fi echo ${UNAME_MACHINE}-unknown-plan9 exit 0 ;; + i*86:OS/2:*:*) + # If we were able to find `uname', then EMX Unix compatibility + # is probably installed. + echo ${UNAME_MACHINE}-pc-os2-emx + exit 0 ;; *:TOPS-10:*:*) echo pdp10-unknown-tops10 exit 0 ;; @@ -1210,6 +1102,12 @@ EOF *:ITS:*:*) echo pdp10-unknown-its exit 0 ;; + i*86:XTS-300:*:STOP) + echo ${UNAME_MACHINE}-unknown-stop + exit 0 ;; + i*86:atheos:*:*) + echo ${UNAME_MACHINE}-unknown-atheos + exit 0 ;; esac #echo '(No uname command or uname output not recognized.)' 1>&2 @@ -1330,7 +1228,8 @@ main () } EOF -$CC_FOR_BUILD -o $dummy $dummy.c 2>/dev/null && $dummy && exit 0 +$CC_FOR_BUILD $dummy.c -o $dummy 2>/dev/null && ./$dummy && rm -f $dummy.c $dummy && exit 0 +rm -f $dummy.c $dummy # Apollos put the system type in the environment. diff --git a/source3/config.sub b/source3/config.sub index 04baf3d80d1..2476310dff3 100755 --- a/source3/config.sub +++ b/source3/config.sub @@ -1,9 +1,9 @@ #! /bin/sh # Configuration validation subroutine script. -# Copyright (C) 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, -# 2000, 2001, 2002, 2003 Free Software Foundation, Inc. +# Copyright (C) 1992, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001 +# Free Software Foundation, Inc. -timestamp='2003-01-03' +timestamp='2001-12-03' # This file is (in principle) common to ALL GNU software. # The presence of a machine in this file suggests that SOME GNU software @@ -118,7 +118,7 @@ esac # Here we must recognize all the valid KERNEL-OS combinations. maybe_os=`echo $1 | sed 's/^\(.*\)-\([^-]*-[^-]*\)$/\2/'` case $maybe_os in - nto-qnx* | linux-gnu* | freebsd*-gnu* | netbsd*-gnu* | storm-chaos* | os2-emx* | rtmk-nova*) + nto-qnx* | linux-gnu* | storm-chaos* | os2-emx* | windows32-*) os=-$maybe_os basic_machine=`echo $1 | sed 's/^\(.*\)-\([^-]*-[^-]*\)$/\1/'` ;; @@ -227,39 +227,26 @@ case $basic_machine in 1750a | 580 \ | a29k \ | alpha | alphaev[4-8] | alphaev56 | alphaev6[78] | alphapca5[67] \ - | alpha64 | alpha64ev[4-8] | alpha64ev56 | alpha64ev6[78] | alpha64pca5[67] \ | arc | arm | arm[bl]e | arme[lb] | armv[2345] | armv[345][lb] | avr \ - | clipper \ - | d10v | d30v | dlx | dsp16xx \ - | fr30 | frv \ + | c4x | clipper \ + | d10v | d30v | dsp16xx \ + | fr30 \ | h8300 | h8500 | hppa | hppa1.[01] | hppa2.0 | hppa2.0[nw] | hppa64 \ | i370 | i860 | i960 | ia64 \ - | ip2k \ | m32r | m68000 | m68k | m88k | mcore \ - | mips | mipsbe | mipseb | mipsel | mipsle \ - | mips16 \ - | mips64 | mips64el \ - | mips64vr | mips64vrel \ - | mips64orion | mips64orionel \ - | mips64vr4100 | mips64vr4100el \ - | mips64vr4300 | mips64vr4300el \ - | mips64vr5000 | mips64vr5000el \ - | mipsisa32 | mipsisa32el \ - | mipsisa32r2 | mipsisa32r2el \ - | mipsisa64 | mipsisa64el \ - | mipsisa64sb1 | mipsisa64sb1el \ - | mipsisa64sr71k | mipsisa64sr71kel \ - | mipstx39 | mipstx39el \ + | mips16 | mips64 | mips64el | mips64orion | mips64orionel \ + | mips64vr4100 | mips64vr4100el | mips64vr4300 \ + | mips64vr4300el | mips64vr5000 | mips64vr5000el \ + | mipsbe | mipseb | mipsel | mipsle | mipstx39 | mipstx39el \ + | mipsisa32 \ | mn10200 | mn10300 \ - | msp430 \ | ns16k | ns32k \ - | openrisc | or32 \ + | openrisc \ | pdp10 | pdp11 | pj | pjl \ | powerpc | powerpc64 | powerpc64le | powerpcle | ppcbe \ | pyramid \ - | sh | sh[1234] | sh3e | sh[34]eb | shbe | shle | sh[1234]le | sh3ele \ - | sh64 | sh64le \ - | sparc | sparc64 | sparc86x | sparclet | sparclite | sparcv9 | sparcv9b \ + | sh | sh[34] | sh[34]eb | shbe | shle \ + | sparc | sparc64 | sparclet | sparclite | sparcv9 | sparcv9b \ | strongarm \ | tahoe | thumb | tic80 | tron \ | v850 | v850e \ @@ -291,52 +278,38 @@ case $basic_machine in 580-* \ | a29k-* \ | alpha-* | alphaev[4-8]-* | alphaev56-* | alphaev6[78]-* \ - | alpha64-* | alpha64ev[4-8]-* | alpha64ev56-* | alpha64ev6[78]-* \ - | alphapca5[67]-* | alpha64pca5[67]-* | arc-* \ - | arm-* | armbe-* | armle-* | armeb-* | armv*-* \ + | alphapca5[67]-* | arc-* \ + | arm-* | armbe-* | armle-* | armv*-* \ | avr-* \ | bs2000-* \ - | c[123]* | c30-* | [cjt]90-* | c4x-* | c54x-* \ - | clipper-* | cydra-* \ - | d10v-* | d30v-* | dlx-* \ + | c[123]* | c30-* | [cjt]90-* | c54x-* \ + | clipper-* | cray2-* | cydra-* \ + | d10v-* | d30v-* \ | elxsi-* \ - | f30[01]-* | f700-* | fr30-* | frv-* | fx80-* \ + | f30[01]-* | f700-* | fr30-* | fx80-* \ | h8300-* | h8500-* \ | hppa-* | hppa1.[01]-* | hppa2.0-* | hppa2.0[nw]-* | hppa64-* \ | i*86-* | i860-* | i960-* | ia64-* \ - | ip2k-* \ | m32r-* \ - | m68000-* | m680[012346]0-* | m68360-* | m683?2-* | m68k-* \ + | m68000-* | m680[01234]0-* | m68360-* | m683?2-* | m68k-* \ | m88110-* | m88k-* | mcore-* \ - | mips-* | mipsbe-* | mipseb-* | mipsel-* | mipsle-* \ - | mips16-* \ - | mips64-* | mips64el-* \ - | mips64vr-* | mips64vrel-* \ - | mips64orion-* | mips64orionel-* \ - | mips64vr4100-* | mips64vr4100el-* \ - | mips64vr4300-* | mips64vr4300el-* \ - | mips64vr5000-* | mips64vr5000el-* \ - | mipsisa32-* | mipsisa32el-* \ - | mipsisa32r2-* | mipsisa32r2el-* \ - | mipsisa64-* | mipsisa64el-* \ - | mipsisa64sb1-* | mipsisa64sb1el-* \ - | mipsisa64sr71k-* | mipsisa64sr71kel-* \ - | mipstx39-* | mipstx39el-* \ - | msp430-* \ - | none-* | np1-* | nv1-* | ns16k-* | ns32k-* \ + | mips-* | mips16-* | mips64-* | mips64el-* | mips64orion-* \ + | mips64orionel-* | mips64vr4100-* | mips64vr4100el-* \ + | mips64vr4300-* | mips64vr4300el-* | mipsbe-* | mipseb-* \ + | mipsle-* | mipsel-* | mipstx39-* | mipstx39el-* \ + | none-* | np1-* | ns16k-* | ns32k-* \ | orion-* \ | pdp10-* | pdp11-* | pj-* | pjl-* | pn-* | power-* \ | powerpc-* | powerpc64-* | powerpc64le-* | powerpcle-* | ppcbe-* \ | pyramid-* \ | romp-* | rs6000-* \ - | sh-* | sh[1234]-* | sh3e-* | sh[34]eb-* | shbe-* \ - | shle-* | sh[1234]le-* | sh3ele-* | sh64-* | sh64le-* \ - | sparc-* | sparc64-* | sparc86x-* | sparclet-* | sparclite-* \ - | sparcv9-* | sparcv9b-* | strongarm-* | sv1-* | sx?-* \ - | tahoe-* | thumb-* | tic30-* | tic4x-* | tic54x-* | tic80-* | tron-* \ + | sh-* | sh[34]-* | sh[34]eb-* | shbe-* | shle-* \ + | sparc-* | sparc64-* | sparc86x-* | sparclite-* \ + | sparcv9-* | sparcv9b-* | strongarm-* | sv1-* \ + | t3e-* | tahoe-* | thumb-* | tic30-* | tic54x-* | tic80-* | tron-* \ | v850-* | v850e-* | vax-* \ | we32k-* \ - | x86-* | x86_64-* | xps100-* | xscale-* | xstormy16-* \ + | x86-* | x86_64-* | xmp-* | xps100-* | xscale-* | xstormy16-* \ | xtensa-* \ | ymp-* \ | z8k-*) @@ -402,10 +375,6 @@ case $basic_machine in basic_machine=ns32k-sequent os=-dynix ;; - c90) - basic_machine=c90-cray - os=-unicos - ;; convex-c1) basic_machine=c1-convex os=-bsd @@ -426,8 +395,16 @@ case $basic_machine in basic_machine=c38-convex os=-bsd ;; - cray | j90) - basic_machine=j90-cray + cray | ymp) + basic_machine=ymp-cray + os=-unicos + ;; + cray2) + basic_machine=cray2-cray + os=-unicos + ;; + [cjt]90) + basic_machine=${basic_machine}-cray os=-unicos ;; crds | unos) @@ -442,14 +419,6 @@ case $basic_machine in decstation | decstation-3100 | pmax | pmax-* | pmin | dec3100 | decstatn) basic_machine=mips-dec ;; - decsystem10* | dec10*) - basic_machine=pdp10-dec - os=-tops10 - ;; - decsystem20* | dec20*) - basic_machine=pdp10-dec - os=-tops20 - ;; delta | 3300 | motorola-3300 | motorola-delta \ | 3300-motorola | delta-motorola) basic_machine=m68k-motorola @@ -630,6 +599,14 @@ case $basic_machine in basic_machine=m68k-atari os=-mint ;; + mipsel*-linux*) + basic_machine=mipsel-unknown + os=-linux-gnu + ;; + mips*-linux*) + basic_machine=mips-unknown + os=-linux-gnu + ;; mips3*-*) basic_machine=`echo $basic_machine | sed -e 's/mips3/mips64/'` ;; @@ -644,10 +621,6 @@ case $basic_machine in basic_machine=m68k-rom68k os=-coff ;; - morphos) - basic_machine=powerpc-unknown - os=-morphos - ;; msdos) basic_machine=i386-pc os=-msdos @@ -720,10 +693,6 @@ case $basic_machine in np1) basic_machine=np1-gould ;; - nv1) - basic_machine=nv1-cray - os=-unicosmp - ;; nsr-tandem) basic_machine=nsr-tandem ;; @@ -731,10 +700,6 @@ case $basic_machine in basic_machine=hppa1.1-oki os=-proelf ;; - or32 | or32-*) - basic_machine=or32-unknown - os=-coff - ;; OSE68000 | ose68000) basic_machine=m68000-ericsson os=-ose @@ -757,13 +722,13 @@ case $basic_machine in pbb) basic_machine=m68k-tti ;; - pc532 | pc532-*) + pc532 | pc532-*) basic_machine=ns32k-pc532 ;; pentium | p5 | k5 | k6 | nexgen | viac3) basic_machine=i586-pc ;; - pentiumpro | p6 | 6x86 | athlon | athlon_*) + pentiumpro | p6 | 6x86 | athlon) basic_machine=i686-pc ;; pentiumii | pentium2) @@ -784,22 +749,22 @@ case $basic_machine in power) basic_machine=power-ibm ;; ppc) basic_machine=powerpc-unknown - ;; + ;; ppc-*) basic_machine=powerpc-`echo $basic_machine | sed 's/^[^-]*-//'` ;; ppcle | powerpclittle | ppc-le | powerpc-little) basic_machine=powerpcle-unknown - ;; + ;; ppcle-* | powerpclittle-*) basic_machine=powerpcle-`echo $basic_machine | sed 's/^[^-]*-//'` ;; ppc64) basic_machine=powerpc64-unknown - ;; + ;; ppc64-*) basic_machine=powerpc64-`echo $basic_machine | sed 's/^[^-]*-//'` ;; ppc64le | powerpc64little | ppc64-le | powerpc64-little) basic_machine=powerpc64le-unknown - ;; + ;; ppc64le-* | powerpc64little-*) basic_machine=powerpc64le-`echo $basic_machine | sed 's/^[^-]*-//'` ;; @@ -830,12 +795,6 @@ case $basic_machine in basic_machine=a29k-amd os=-udi ;; - sb1) - basic_machine=mipsisa64sb1-unknown - ;; - sb1el) - basic_machine=mipsisa64sb1el-unknown - ;; sequent) basic_machine=i386-sequent ;; @@ -910,17 +869,9 @@ case $basic_machine in os=-dynix ;; t3e) - basic_machine=alphaev5-cray + basic_machine=t3e-cray os=-unicos ;; - t90) - basic_machine=t90-cray - os=-unicos - ;; - tic4x | c4x*) - basic_machine=tic4x-unknown - os=-coff - ;; tic54x | c54x*) basic_machine=tic54x-unknown os=-coff @@ -931,10 +882,6 @@ case $basic_machine in tx39el) basic_machine=mipstx39el-unknown ;; - toad1) - basic_machine=pdp10-xkl - os=-tops20 - ;; tower | tower-32) basic_machine=m68k-ncr ;; @@ -959,8 +906,8 @@ case $basic_machine in os=-vms ;; vpp*|vx|vx-*) - basic_machine=f301-fujitsu - ;; + basic_machine=f301-fujitsu + ;; vxworks960) basic_machine=i960-wrs os=-vxworks @@ -981,13 +928,17 @@ case $basic_machine in basic_machine=hppa1.1-winbond os=-proelf ;; - xps | xps100) - basic_machine=xps100-honeywell + windows32) + basic_machine=i386-pc + os=-windows32-msvcrt ;; - ymp) - basic_machine=ymp-cray + xmp) + basic_machine=xmp-cray os=-unicos ;; + xps | xps100) + basic_machine=xps100-honeywell + ;; z8k-*-coff) basic_machine=z8k-unknown os=-sim @@ -1008,6 +959,13 @@ case $basic_machine in op60c) basic_machine=hppa1.1-oki ;; + mips) + if [ x$os = x-linux-gnu ]; then + basic_machine=mips-unknown + else + basic_machine=mips-mips + fi + ;; romp) basic_machine=romp-ibm ;; @@ -1027,16 +985,13 @@ case $basic_machine in we32k) basic_machine=we32k-att ;; - sh3 | sh4 | sh3eb | sh4eb | sh[1234]le | sh3ele) + sh3 | sh4 | sh3eb | sh4eb) basic_machine=sh-unknown ;; - sh64) - basic_machine=sh64-unknown - ;; sparc | sparcv9 | sparcv9b) basic_machine=sparc-sun ;; - cydra) + cydra) basic_machine=cydra-cydrome ;; orion) @@ -1051,6 +1006,10 @@ case $basic_machine in pmac | pmac-mpw) basic_machine=powerpc-apple ;; + c4x*) + basic_machine=c4x-none + os=-coff + ;; *-unknown) # Make sure to match an already-canonicalized machine name. ;; @@ -1113,12 +1072,10 @@ case $os in | -chorusos* | -chorusrdb* \ | -cygwin* | -pe* | -psos* | -moss* | -proelf* | -rtems* \ | -mingw32* | -linux-gnu* | -uxpv* | -beos* | -mpeix* | -udk* \ - | -interix* | -uwin* | -mks* | -rhapsody* | -darwin* | -opened* \ + | -interix* | -uwin* | -rhapsody* | -darwin* | -opened* \ | -openstep* | -oskit* | -conix* | -pw32* | -nonstopux* \ | -storm-chaos* | -tops10* | -tenex* | -tops20* | -its* \ - | -os2* | -vos* | -palmos* | -uclinux* | -nucleus* \ - | -morphos* | -superux* | -rtmk* | -rtmk-nova* | -windiss* \ - | -powermax* | -dnix* | -microbsd*) + | -os2* | -vos* | -palmos* | -uclinux* | -nucleus*) # Remember, each alternative MUST END IN *, to match a version number. ;; -qnx*) @@ -1130,10 +1087,8 @@ case $os in ;; esac ;; - -nto-qnx*) - ;; -nto*) - os=`echo $os | sed -e 's|nto|nto-qnx|'` + os=-nto-qnx ;; -sim | -es1800* | -hms* | -xray | -os68k* | -none* | -v88r* \ | -windows* | -osx | -abug | -netware* | -os9* | -beos* \ @@ -1181,11 +1136,8 @@ case $os in -ctix* | -uts*) os=-sysv ;; - -nova*) - os=-rtmk-nova - ;; -ns2 ) - os=-nextstep2 + os=-nextstep2 ;; -nsk*) os=-nsk @@ -1224,8 +1176,8 @@ case $os in -xenix) os=-xenix ;; - -*mint | -mint[0-9]* | -*MiNT | -MiNT[0-9]*) - os=-mint + -*mint | -mint[0-9]* | -*MiNT | -MiNT[0-9]*) + os=-mint ;; -none) ;; @@ -1258,11 +1210,10 @@ case $basic_machine in arm*-semi) os=-aout ;; - # This must come before the *-dec entry. pdp10-*) os=-tops20 ;; - pdp11-*) + pdp11-*) os=-none ;; *-dec | vax-*) @@ -1289,9 +1240,6 @@ case $basic_machine in mips*-*) os=-elf ;; - or32-*) - os=-coff - ;; *-tti) # must be before sparc entry or we get the wrong os. os=-sysv3 ;; @@ -1355,19 +1303,19 @@ case $basic_machine in *-next) os=-nextstep3 ;; - *-gould) + *-gould) os=-sysv ;; - *-highlevel) + *-highlevel) os=-bsd ;; *-encore) os=-bsd ;; - *-sgi) + *-sgi) os=-irix ;; - *-siemens) + *-siemens) os=-sysv4 ;; *-masscomp) @@ -1439,7 +1387,7 @@ case $basic_machine in -ptx*) vendor=sequent ;; - -vxsim* | -vxworks* | -windiss*) + -vxsim* | -vxworks*) vendor=wrs ;; -aux*) diff --git a/source3/configure.in b/source3/configure.in index 87626db666a..7515ee78b0d 100644 --- a/source3/configure.in +++ b/source3/configure.in @@ -153,15 +153,49 @@ AC_SUBST(LIBSMBCLIENT) AC_SUBST(PRINTLIBS) AC_SUBST(AUTHLIBS) AC_SUBST(ACLLIBS) -AC_SUBST(ADSLIBS) -AC_SUBST(PASSDBLIBS) -AC_SUBST(KRB5_LIBS) -AC_SUBST(LDAP_LIBS) AC_SUBST(SHLIB_PROGS) AC_SUBST(SMBWRAPPER) AC_SUBST(EXTRA_BIN_PROGS) AC_SUBST(EXTRA_SBIN_PROGS) AC_SUBST(EXTRA_ALL_TARGETS) +dnl For the DYNAMIC RPC stuff +dnl The complicated _YES and _NO stuff allows us to avoid a dependency +dnl on GNU Make. +AC_SUBST(LSA_DYNAMIC_YES) +AC_SUBST(LSA_DYNAMIC_NO) +LSA_DYNAMIC_YES="#" +LSA_DYNAMIC_NO= +AC_SUBST(NETLOG_DYNAMIC_YES) +AC_SUBST(NETLOG_DYNAMIC_NO) +NETLOG_DYNAMIC_YES="#" +NETLOG_DYNAMIC_NO= +AC_SUBST(SAMR_DYNAMIC_YES) +AC_SUBST(SAMR_DYNAMIC_NO) +SAMR_DYNAMIC_YES="#" +SAMR_DYNAMIC_NO= +AC_SUBST(SVC_DYNAMIC_YES) +AC_SUBST(SVC_DYNAMIC_NO) +SVC_DYNAMIC_YES="#" +SVC_DYNAMIC_NO= +AC_SUBST(WKS_DYNAMIC_YES) +AC_SUBST(WKS_DYNAMIC_NO) +WKS_DYNAMIC_YES="#" +WKS_DYNAMIC_NO= +AC_SUBST(REG_DYNAMIC_YES) +AC_SUBST(REG_DYNAMIC_NO) +REG_DYNAMIC_YES="#" +REG_DYNAMIC_NO= +AC_SUBST(SPOOLSS_DYNAMIC_YES) +AC_SUBST(SPOOLSS_DYNAMIC_NO) +SPOOLSS_DYNAMIC_YES="#" +SPOOLSS_DYNAMIC_NO= +AC_SUBST(DFS_DYNAMIC_YES) +AC_SUBST(DFS_DYNAMIC_NO) +DFS_DYNAMIC_YES="#" +DFS_DYNAMIC_NO= + +# compile with optimization and without debugging by default +CFLAGS="-O ${CFLAGS}" AC_ARG_ENABLE(debug, [ --enable-debug Turn on compiler debugging information (default=no)], @@ -189,19 +223,66 @@ then LIBS="$LIBS -ldmalloc" fi +AC_ARG_ENABLE(dynrpc, [ --enable-dynrpc Enable dynamic RPC modules [default=no]]) + +if test x$enable_dynrpc = xyes +then + enable_dynrpc=lsa,samr,reg,wks,netlog,dfs +fi + +if test x$enable_dynrpc != xno +then + for i in `echo $enable_dynrpc | sed -e's/,/ /g'` + do case $i in lsa) + LSA_DYNAMIC_YES= + LSA_DYNAMIC_NO="#" + AC_DEFINE(RPC_LSA_DYNAMIC, 1, + [Define to make the LSA pipe dynamic]) + ;; samr) + SAMR_DYNAMIC_YES= + SAMR_DYNAMIC_NO="#" + AC_DEFINE(RPC_SAMR_DYNAMIC, 1, + [Define to make the SAMR pipe dynamic]) + ;; svc) + SVC_DYNAMIC_YES= + SVC_DYNAMIC_NO="#" + AC_DEFINE(RPC_SVC_DYNAMIC, 1, + [Define to make the SRVSVC pipe dynamic]) + ;; wks) + WKS_DYNAMIC_YES= + WKS_DYNAMIC_NO="#" + AC_DEFINE(RPC_WKS_DYNAMIC, 1, + [Define to make the WKSSVC pipe dynamic]) + ;; netlog) + NETLOG_DYNAMIC_YES= + NETLOG_DYNAMIC_NO="#" + AC_DEFINE(RPC_NETLOG_DYNAMIC, 1, + [Define to make the NETLOGON pipe dynamic]) + ;; reg) + REG_DYNAMIC_YES= + REG_DYNAMIC_NO="#" + AC_DEFINE(RPC_REG_DYNAMIC, 1, + [Define to make the WINREG pipe dynamic]) + ;; spoolss) + SPOOLSS_DYNAMIC_YES= + SPOOLSS_DYNAMIC_NO="#" + AC_DEFINE(RPC_SPOOLSS_DYNAMIC, 1, + [Define to make the SPOOLSS pipe dynamic]) + ;; dfs) + DFS_DYNAMIC_YES= + DFS_DYNAMIC_NO="#" + AC_DEFINE(RPC_DFS_DYNAMIC, 1, + [Define to make the NETDFS pipe dynamic]) + ;; esac + done +fi + dnl Checks for programs. AC_PROG_CC AC_PROG_INSTALL AC_PROG_AWK AC_PATH_PROG(PERL, perl) -# compile with optimization and without debugging by default, but -# allow people to set their own preference. -if test "x$CFLAGS" = x -then - CFLAGS="-O ${CFLAGS}" -fi - dnl Check if we use GNU ld LD=ld AC_PROG_LD_GNU @@ -242,13 +323,6 @@ AC_VALIDATE_CACHE_SYSTEM_TYPE DYNEXP= -dnl Add modules that have to be built by default here -dnl These have to be built static: -default_static_modules="pdb_smbpasswd pdb_tdbsam pdb_unix rpc_lsa rpc_samr rpc_reg rpc_wks rpc_net rpc_dfs rpc_srv rpc_spoolss auth_rhosts auth_sam auth_unix auth_winbind auth_server auth_domain auth_builtin" - -dnl These are preferably build shared, and static if dlopen() is not available -default_shared_modules="vfs_recycle vfs_audit vfs_extd_audit vfs_fake_perms vfs_netatalk" - # # Config CPPFLAG settings for strange OS's that must be set # before other tests. @@ -480,8 +554,8 @@ AC_CHECK_HEADERS(sys/param.h ctype.h sys/wait.h sys/resource.h sys/ioctl.h sys/i AC_CHECK_HEADERS(sys/mman.h sys/filio.h sys/priv.h sys/shm.h string.h strings.h stdlib.h sys/socket.h) AC_CHECK_HEADERS(sys/mount.h sys/vfs.h sys/fs/s5param.h sys/filsys.h termios.h termio.h) AC_CHECK_HEADERS(sys/termio.h sys/statfs.h sys/dustat.h sys/statvfs.h stdarg.h sys/sockio.h) -AC_CHECK_HEADERS(security/pam_modules.h security/_pam_macros.h dlfcn.h) -AC_CHECK_HEADERS(sys/syslog.h syslog.h execinfo.h) +AC_CHECK_HEADERS(security/pam_modules.h security/_pam_macros.h ldap.h lber.h dlfcn.h) +AC_CHECK_HEADERS(sys/syslog.h syslog.h) # In valgrind 1.0.x, it's just valgrind.h. In 1.9.x+ there's a # subdirectory of headers. @@ -804,7 +878,7 @@ AC_CHECK_FUNCS(fseek64 fseeko64 ftell64 ftello64 setluid getpwanam setlinebuf) AC_CHECK_FUNCS(srandom random srand rand setenv usleep strcasecmp fcvt fcvtl symlink readlink) AC_CHECK_FUNCS(syslog vsyslog getgrouplist timegm) # setbuffer, shmget, shm_open are needed for smbtorture -AC_CHECK_FUNCS(setbuffer shmget shm_open backtrace_symbols) +AC_CHECK_FUNCS(setbuffer shmget shm_open) # syscall() is needed for smbwrapper. AC_CHECK_FUNCS(syscall) @@ -2067,14 +2141,8 @@ fi AC_MSG_RESULT($with_ads_support) FOUND_KRB5=no -KRB5_LIBS="" if test x"$with_ads_support" = x"yes"; then -ac_save_CFLAGS="$CFLAGS" -ac_save_LIBS="$LIBS" -CFLAGS="" -LIBS="" - ################################################# # check for krb5-config from recent MIT and Heimdal kerberos 5 AC_PATH_PROG(KRB5_CONFIG, krb5-config) @@ -2231,16 +2299,14 @@ fi ######################################################## # now see if we can find the krb5 libs in standard paths # or as specified above - AC_CHECK_LIB(krb5, krb5_mk_req_extended, [KRB5_LIBS="$LIBS -lkrb5"; - KRB5_CFLAGS="$CFLAGS"; + AC_CHECK_LIB(krb5, krb5_mk_req_extended, [LIBS="$LIBS -lkrb5"; AC_DEFINE(HAVE_KRB5,1,[Whether KRB5 is available])]) ######################################################## # now see if we can find the gssapi libs in standard paths - AC_CHECK_LIB(gssapi_krb5, gss_display_status, [KRB5_LIBS="$KRB5_LIBS -lgssapi_krb5"; + AC_CHECK_LIB(gssapi_krb5, gss_display_status, [LIBS="$LIBS -lgssapi_krb5"; AC_DEFINE(HAVE_GSSAPI,1,[Whether GSSAPI is available])]) -LIBS="$ac_save_LIBS"; CFLAGS="$ac_save_CFLAGS" fi ######################################################## @@ -2260,8 +2326,6 @@ AC_ARG_WITH(ldap, AC_MSG_RESULT($with_ldap_support) if test x"$with_ldap_support" = x"yes"; then -ac_save_LIBS="$LIBS" -LIBS="" ################################################################## # we might need the lber lib on some systems. To avoid link errors @@ -2273,7 +2337,6 @@ LIBS="" if test x$have_ldap != xyes; then AC_CHECK_LIB(ldap, ldap_domain2hostlist, [LIBS="$LIBS -lldap"; AC_DEFINE(HAVE_LDAP,1,[Whether ldap is available])]) - AC_CHECK_HEADERS([ldap.h lber.h], [default_static_modules="$default_static_modules pdb_ldap"]) ######################################################## # If we have LDAP, does it's rebind procedure take 2 or 3 arguments? @@ -2285,29 +2348,19 @@ LIBS="" #include ], [ldap_set_rebind_proc(0, 0, 0);], [pam_ldap_cv_ldap_set_rebind_proc=3], [pam_ldap_cv_ldap_set_rebind_proc=2]) ]) AC_DEFINE_UNQUOTED(LDAP_SET_REBIND_PROC_ARGS, $pam_ldap_cv_ldap_set_rebind_proc, [Number of arguments to ldap_set_rebind_proc]) fi - -LDAP_LIBS="$LIBS"; -LIBS="$ac_save_LIBS"; -else - # Can't have ADS support without LDAP - if test x"$with_ads_support" = x"yes"; then - AC_MSG_ERROR(Active directory support requires LDAP) - fi -fi - -if test x"$with_ads_support" = x"yes"; then - ADSLIBS="$LDAP_LIBS $KRB5_LIBS" fi ######################################################## # Compile with MySQL support? -AM_PATH_MYSQL([0.11.0],[default_shared_modules="$default_shared_modules pdb_mysql"],[]) +AM_PATH_MYSQL([0.11.0],[MODULE_MYSQL=bin/pdb_mysql.so],[MODULE_MYSQL=]) CFLAGS="$CFLAGS $MYSQL_CFLAGS" +AC_SUBST(MODULE_MYSQL) ######################################################## # Compile with XML support? -AM_PATH_XML2([2.0.0],[default_shared_modules="$default_shared_modules pdb_xml"],[]) +AM_PATH_XML2([2.0.0],[MODULE_XML=bin/pdb_xml.so],[MODULE_XML=]) CFLAGS="$CFLAGS $XML_CFLAGS" +AC_SUBST(MODULE_XML) ################################################# # check for automount support @@ -2426,15 +2479,21 @@ if test x"$samba_cv_HAVE_TRUNCATED_SALT" = x"yes"; then fi fi -# New experimental SAM system +######################################################################################## +## +## TESTS FOR SAM BACKENDS. KEEP THESE GROUPED TOGETHER +## +######################################################################################## -AC_MSG_CHECKING([whether to build the new (experimental) SAM database]) -AC_ARG_WITH(sam, -[ --with-sam Build new (experimental) SAM database (default=no)], +################################################# +# check for a LDAP password database configuration backwards compatibility +AC_MSG_CHECKING(whether to use LDAP SAM 2.2 compatible configuration) +AC_ARG_WITH(ldapsam, +[ --with-ldapsam Include LDAP SAM 2.2 compatible configuration (default=no)], [ case "$withval" in yes) AC_MSG_RESULT(yes) - AC_DEFINE(WITH_SAM,1,[Whether to build the new (experimental) SAM database]) + AC_DEFINE(WITH_LDAP_SAMCONFIG,1,[Whether to include 2.2 compatibel LDAP SAM configuration]) ;; *) AC_MSG_RESULT(no) @@ -2443,22 +2502,15 @@ AC_ARG_WITH(sam, AC_MSG_RESULT(no) ) - -######################################################################################## -## -## TESTS FOR SAM BACKENDS. KEEP THESE GROUPED TOGETHER -## -######################################################################################## - ################################################# -# check for a LDAP password database configuration backwards compatibility -AC_MSG_CHECKING(whether to use LDAP SAM 2.2 compatible configuration) -AC_ARG_WITH(ldapsam, -[ --with-ldapsam Include LDAP SAM 2.2 compatible configuration (default=no)], +# check for a TDB password database +AC_MSG_CHECKING(whether to use TDB SAM database) +AC_ARG_WITH(tdbsam, +[ --with-tdbsam Include experimental TDB SAM support (default=no)], [ case "$withval" in yes) AC_MSG_RESULT(yes) - AC_DEFINE(WITH_LDAP_SAMCONFIG,1,[Whether to include 2.2 compatible LDAP SAM configuration]) + AC_DEFINE(WITH_TDB_SAM,1,[Whether to include experimental TDB SAM support]) ;; *) AC_MSG_RESULT(no) @@ -2468,24 +2520,20 @@ AC_ARG_WITH(ldapsam, ) ################################################# -# check for IDMAP - -AC_DEFINE(WITH_IDMAP,1, [Include IDMAP support]) - -AC_MSG_CHECKING(whether to use IDMAP only for [ug]id mapping) -AC_ARG_WITH(idmap, -[ --with-idmap Include experimental IDMAP support (default=yes)], +# check for a NISPLUS password database +AC_MSG_CHECKING(whether to use NISPLUS SAM database) +AC_ARG_WITH(nisplussam, +[ --with-nisplussam Include NISPLUS SAM support (default=no)], [ case "$withval" in yes) AC_MSG_RESULT(yes) - AC_DEFINE(WITH_IDMAP,1,[Whether to include experimental IDMAP support]) + AC_DEFINE(WITH_NISPLUS_SAM,1,[Whether to include nisplus SAM support]) ;; - no) + *) AC_MSG_RESULT(no) - AC_DEFINE(WITH_IDMAP,0,[Whether to include experimental IDMAP support]) ;; esac ], - AC_MSG_RESULT(yes) + AC_MSG_RESULT(no) ) ######################################################################################## @@ -3349,15 +3397,12 @@ AC_MSG_CHECKING(whether to use included popt) if test x"$INCLUDED_POPT" = x"yes"; then AC_MSG_RESULT(yes) BUILD_POPT='$(POPT_OBJS)' - POPTLIBS='$(POPT_OBJS)' FLAGS1="-I$srcdir/popt" else AC_MSG_RESULT(no) - BUILD_POPT="" - POPTLIBS="-lpopt" + LIBS="$LIBS -lpopt" fi AC_SUBST(BUILD_POPT) -AC_SUBST(POPTLIBS) AC_SUBST(FLAGS1) ################################################# @@ -3388,90 +3433,6 @@ AC_ARG_WITH(python, esac ]) AC_SUBST(PYTHON) -for i in `echo $default_static_modules | sed -e's/,/ /g'` -do - eval MODULE_DEFAULT_$i=STATIC -done - -for i in `echo $default_shared_modules | sed -e's/,/ /g'` -do - dnl Fall back to static if dlopen() is not available - eval MODULE_DEFAULT_$i=STATIC - - if test x"$ac_cv_func_dlopen" = xyes; then - eval MODULE_DEFAULT_$i=SHARED - fi -done - -dnl Always built these modules static -MODULE_pdb_guest=STATIC -MODULE_rpc_spoolss=STATIC -MODULE_rpc_srv=STATIC - -AC_ARG_WITH(static-modules, -[ --with-static-modules=MODULES Comma-seperated list of names of modules to statically link in], -[ if test $withval; then - for i in `echo $withval | sed -e's/,/ /g'` - do - eval MODULE_$i=STATIC - done -fi ]) - -AC_ARG_WITH(shared-modules, -[ --with-shared-modules=MODULES Comma-seperated list of names of modules to build shared], -[ if test $withval; then - for i in `echo $withval | sed -e's/,/ /g'` - do - eval MODULE_$i=SHARED - done -fi ]) - -SMB_MODULE(pdb_xml, modules/xml.o, bin/xml.so, PDB, - [ PASSDBLIBS="$PASSDBLIBS $XML_LIBS" ] ) -SMB_MODULE(pdb_mysql, modules/mysql.o, bin/mysql.so, PDB, - [ PASSDBLIBS="$PASSDBLIBS $MYSQL_LIBS" ] ) -SMB_MODULE(pdb_ldap, passdb/pdb_ldap.o, bin/ldapsam.so, PDB, - [ PASSDBLIBS="$PASSDBLIBS $LDAP_LIBS" ] ) -SMB_MODULE(pdb_smbpasswd, passdb/pdb_smbpasswd.o, bin/smbpasswd.so, PDB) -SMB_MODULE(pdb_tdbsam, passdb/pdb_tdb.o, bin/tdbsam.so, PDB) -SMB_MODULE(pdb_nisplussam, passdb/pdb_nisplus.o, bin/nisplussam.so, PDB) -SMB_MODULE(pdb_unix, passdb/pdb_unix.o, bin/unixsam.so, PDB) -SMB_MODULE(pdb_guest, passdb/pdb_guest.o, bin/guest.so, PDB) -SMB_SUBSYSTEM(PDB) - -SMB_MODULE(rpc_lsa, \$(RPC_LSA_OBJ), bin/librpc_lsarpc.so, RPC) -SMB_MODULE(rpc_reg, \$(RPC_REG_OBJ), bin/librpc_winreg.so, RPC) -SMB_MODULE(rpc_wks, \$(RPC_WKS_OBJ), bin/librpc_wkssvc.so, RPC) -SMB_MODULE(rpc_net, \$(RPC_NETLOG_OBJ), bin/librpc_NETLOGON.so, RPC) -SMB_MODULE(rpc_dfs, \$(RPC_DFS_OBJ), bin/librpc_netdfs.so, RPC) -SMB_MODULE(rpc_srv, \$(RPC_SVC_OBJ), bin/librpc_srvsvc.so, RPC) -SMB_MODULE(rpc_spoolss, \$(RPC_SPOOLSS_OBJ), bin/librpc_spoolss.so, RPC) -SMB_MODULE(rpc_samr, \$(RPC_SAMR_OBJ), bin/librpc_samr.so, RPC) -SMB_SUBSYSTEM(RPC) - -SMB_MODULE(charset_weird, modules/developer.o, bin/developer.so, CHARSET) -SMB_SUBSYSTEM(CHARSET) - -SMB_MODULE(auth_rhosts, \$(AUTH_RHOSTS_OBJ), bin/rhosts.so, AUTH) -SMB_MODULE(auth_sam, \$(AUTH_SAM_OBJ), bin/sam.so, AUTH) -SMB_MODULE(auth_unix, \$(AUTH_UNIX_OBJ), bin/unix.so, AUTH) -SMB_MODULE(auth_winbind, \$(AUTH_WINBIND_OBJ), bin/winbind.so, AUTH) -SMB_MODULE(auth_server, \$(AUTH_SERVER_OBJ), bin/server.so, AUTH) -SMB_MODULE(auth_domain, \$(AUTH_DOMAIN_OBJ), bin/domain.so, AUTH) -SMB_MODULE(auth_builtin, \$(AUTH_BUILTIN_OBJ), bin/builtin.so, AUTH) -SMB_SUBSYSTEM(AUTH) - -SMB_MODULE(vfs_recycle, \$(VFS_RECYCLE_OBJ), bin/recycle.so, VFS) -SMB_MODULE(vfs_audit, \$(VFS_AUDIT_OBJ), bin/audit.so, VFS) -SMB_MODULE(vfs_extd_audit, \$(VFS_EXTD_AUDIT_OBJ), bin/extd_audit.so, VFS) -SMB_MODULE(vfs_fake_perms, \$(VFS_FAKE_PERMS_OBJ), bin/fake_perms.so, VFS) -SMB_MODULE(vfs_netatalk, \$(VFS_NETATALK_OBJ), bin/netatalk.so, VFS) -SMB_SUBSYSTEM(VFS) - -AC_DEFINE_UNQUOTED(STRING_STATIC_MODULES, "$string_static_modules", [String list of builtin modules]) - -AC_SUBST(MODULES_CLEAN) - ################################################# # do extra things if we are running insure diff --git a/source3/configure.nodebug.developer b/source3/configure.nodebug.developer new file mode 100755 index 00000000000..65e21b4bdf4 --- /dev/null +++ b/source3/configure.nodebug.developer @@ -0,0 +1,3 @@ +#!/bin/sh +CFLAGS="-Wall -Wshadow -Wstrict-prototypes -Wpointer-arith -Wcast-qual -Wcast-align -DDEBUG_PASSWORD"; export CFLAGS +./configure $* diff --git a/source3/include/.cvsignore b/source3/include/.cvsignore index 4bff170b3bf..bff248727f2 100644 --- a/source3/include/.cvsignore +++ b/source3/include/.cvsignore @@ -3,5 +3,4 @@ config.h stamp-h proto.h wrepld_proto.h -tdbsam2_parse_info.h config.h.in diff --git a/source3/include/auth.h b/source3/include/auth.h index 626b9f3ba04..e37f181082e 100644 --- a/source3/include/auth.h +++ b/source3/include/auth.h @@ -148,8 +148,6 @@ struct auth_init_function_entry { /* Function to create a member of the authmethods list */ auth_init_function init; - - struct auth_init_function_entry *prev, *next; }; typedef struct auth_ntlmssp_state @@ -160,6 +158,4 @@ typedef struct auth_ntlmssp_state struct ntlmssp_state *ntlmssp_state; } AUTH_NTLMSSP_STATE; -#define AUTH_INTERFACE_VERSION 1 - #endif /* _SMBAUTH_H_ */ diff --git a/source3/include/charset.h b/source3/include/charset.h index c56984ca7b2..07d5e2d5993 100644 --- a/source3/include/charset.h +++ b/source3/include/charset.h @@ -2,7 +2,6 @@ Unix SMB/CIFS implementation. charset defines Copyright (C) Andrew Tridgell 2001 - Copyright (C) Jelmer Vernooij 2002 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -23,18 +22,3 @@ typedef enum {CH_UCS2=0, CH_UNIX=1, CH_DISPLAY=2, CH_DOS=3, CH_UTF8=4} charset_t; #define NUM_CHARSETS 5 - -/* - * for each charset we have a function that pulls from that charset to - * a ucs2 buffer, and a function that pushes to a ucs2 buffer - * */ - -struct charset_functions { - const char *name; - size_t (*pull)(void *, char **inbuf, size_t *inbytesleft, - char **outbuf, size_t *outbytesleft); - size_t (*push)(void *, char **inbuf, size_t *inbytesleft, - char **outbuf, size_t *outbytesleft); - struct charset_functions *prev, *next; -}; - diff --git a/source3/include/debug.h b/source3/include/debug.h index 70f9f7706de..d4f45539f45 100644 --- a/source3/include/debug.h +++ b/source3/include/debug.h @@ -88,7 +88,6 @@ extern int DEBUGLEVEL; #define DBGC_AUTH 10 #define DBGC_WINBIND 11 #define DBGC_VFS 12 -#define DBGC_IDMAP 13 /* So you can define DBGC_CLASS before including debug.h */ #ifndef DBGC_CLASS diff --git a/source3/include/genparser.h b/source3/include/genparser.h deleted file mode 100644 index f28cd78249d..00000000000 --- a/source3/include/genparser.h +++ /dev/null @@ -1,78 +0,0 @@ -/* - Copyright (C) Andrew Tridgell 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#ifndef _GENPARSER_H -#define _GENPARSER_H - -/* these macros are needed for genstruct auto-parsers */ -#ifndef GENSTRUCT -#define GENSTRUCT -#define _LEN(x) -#define _NULLTERM -#endif - -/* - automatic marshalling/unmarshalling system for C structures -*/ - -/* flag to mark a fixed size array as actually being null terminated */ -#define FLAG_NULLTERM 1 -#define FLAG_ALWAYS 2 - -struct enum_struct { - const char *name; - unsigned value; -}; - -/* intermediate dumps are stored in one of these */ -struct parse_string { - unsigned allocated; - unsigned length; - char *s; -}; - -typedef int (*gen_dump_fn)(TALLOC_CTX *, struct parse_string *, const char *ptr, unsigned indent); -typedef int (*gen_parse_fn)(TALLOC_CTX *, char *ptr, const char *str); - -/* genstruct.pl generates arrays of these */ -struct parse_struct { - const char *name; - unsigned ptr_count; - unsigned size; - unsigned offset; - unsigned array_len; - const char *dynamic_len; - unsigned flags; - gen_dump_fn dump_fn; - gen_parse_fn parse_fn; -}; - -#define DUMP_PARSE_DECL(type) \ - int gen_dump_ ## type(TALLOC_CTX *, struct parse_string *, const char *, unsigned); \ - int gen_parse_ ## type(TALLOC_CTX *, char *, const char *); - -DUMP_PARSE_DECL(char) -DUMP_PARSE_DECL(int) -DUMP_PARSE_DECL(unsigned) -DUMP_PARSE_DECL(double) -DUMP_PARSE_DECL(float) - -#define gen_dump_unsigned_char gen_dump_char -#define gen_parse_unsigned_char gen_parse_char - -#endif /* _GENPARSER_H */ diff --git a/source3/include/genparser_samba.h b/source3/include/genparser_samba.h deleted file mode 100644 index 172ff2362c4..00000000000 --- a/source3/include/genparser_samba.h +++ /dev/null @@ -1,58 +0,0 @@ -/* - Copyright (C) Simo Sorce 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#ifndef _GENPARSER_SAMBA_H -#define _GENPARSER_SAMBA_H - -const struct parse_struct pinfo_security_ace_info[] = { -{"type", 0, sizeof(uint8), offsetof(struct security_ace_info, type), 0, NULL, 0, gen_dump_uint8, gen_parse_uint8}, -{"flags", 0, sizeof(uint8), offsetof(struct security_ace_info, flags), 0, NULL, 0, gen_dump_uint8, gen_parse_uint8}, -{"size", 0, sizeof(uint16), offsetof(struct security_ace_info, size), 0, NULL, 0, gen_dump_uint16, gen_parse_uint16}, -{"info", 0, sizeof(char), offsetof(struct security_ace_info, info), 0, NULL, 0, gen_dump_SEC_ACCESS, gen_parse_SEC_ACCESS}, -{"obj_flags", 0, sizeof(uint32), offsetof(struct security_ace_info, obj_flags), 0, NULL, 0, gen_dump_uint32, gen_parse_uint32}, -{"obj_guid", 0, sizeof(char), offsetof(struct security_ace_info, obj_guid), 0, NULL, 0, gen_dump_GUID, gen_parse_GUID}, -{"inh_guid", 0, sizeof(char), offsetof(struct security_ace_info, inh_guid), 0, NULL, 0, gen_dump_GUID, gen_parse_GUID}, -{"trustee", 0, sizeof(char), offsetof(struct security_ace_info, trustee), 0, NULL, 0, gen_dump_DOM_SID, gen_parse_DOM_SID}, -{NULL, 0, 0, 0, 0, NULL, 0, NULL, NULL}}; - -const struct parse_struct pinfo_security_acl_info[] = { -{"revision", 0, sizeof(uint16), offsetof(struct security_acl_info, revision), 0, NULL, 0, gen_dump_uint16, gen_parse_uint16}, -{"size", 0, sizeof(uint16), offsetof(struct security_acl_info, size), 0, NULL, 0, gen_dump_uint16, gen_parse_uint16}, -{"num_aces", 0, sizeof(uint32), offsetof(struct security_acl_info, num_aces), 0, NULL, 0, gen_dump_uint32, gen_parse_uint32}, -{"ace", 1, sizeof(struct security_ace_info), offsetof(struct security_acl_info, ace), 0, "size", 0, gen_dump_SEC_ACE, gen_parse_SEC_ACE}, -{NULL, 0, 0, 0, 0, NULL, 0, NULL, NULL}}; - -const struct parse_struct pinfo_security_descriptor_info[] = { -{"revision", 0, sizeof(uint16), offsetof(struct security_descriptor_info, revision), 0, NULL, 0, gen_dump_uint16, gen_parse_uint16}, -{"type", 0, sizeof(uint16), offsetof(struct security_descriptor_info, type), 0, NULL, 0, gen_dump_uint16, gen_parse_uint16}, -{"off_owner_sid", 0, sizeof(uint32), offsetof(struct security_descriptor_info, off_owner_sid), 0, NULL, 0, gen_dump_uint32, gen_parse_uint32}, -{"off_grp_sid", 0, sizeof(uint32), offsetof(struct security_descriptor_info, off_grp_sid), 0, NULL, 0, gen_dump_uint32, gen_parse_uint32}, -{"off_sacl", 0, sizeof(uint32), offsetof(struct security_descriptor_info, off_sacl), 0, NULL, 0, gen_dump_uint32, gen_parse_uint32}, -{"off_dacl", 0, sizeof(uint32), offsetof(struct security_descriptor_info, off_dacl), 0, NULL, 0, gen_dump_uint32, gen_parse_uint32}, -{"dacl", 1, sizeof(struct security_acl_info), offsetof(struct security_descriptor_info, dacl), 0, NULL, 0, gen_dump_SEC_ACL, gen_parse_SEC_ACL}, -{"sacl", 1, sizeof(struct security_acl_info), offsetof(struct security_descriptor_info, sacl), 0, NULL, 0, gen_dump_SEC_ACL, gen_parse_SEC_ACL}, -{"owner_sid", 1, sizeof(char), offsetof(struct security_descriptor_info, owner_sid), 0, NULL, 0, gen_dump_DOM_SID, gen_parse_DOM_SID}, -{"grp_sid", 1, sizeof(char), offsetof(struct security_descriptor_info, grp_sid), 0, NULL, 0, gen_dump_DOM_SID, gen_parse_DOM_SID}, -{NULL, 0, 0, 0, 0, NULL, 0, NULL, NULL}}; - -const struct parse_struct pinfo_luid_attr_info[] = { -{"attr", 0, sizeof(uint32), offsetof(struct LUID_ATTR, attr), 0, NULL, 0, gen_dump_uint32, gen_parse_uint32}, -{"luid", 1, sizeof(LUID), offsetof(struct LUID_ATTR, luid), 0, NULL, 0, gen_dump_LUID, gen_parse_LUID}, -{NULL, 0, 0, 0, 0, NULL, 0, NULL, NULL}}; - -#endif /* _GENPARSER_SAMBA_H */ diff --git a/source3/include/gums.h b/source3/include/gums.h deleted file mode 100644 index 789acc269f3..00000000000 --- a/source3/include/gums.h +++ /dev/null @@ -1,240 +0,0 @@ -/* - Unix SMB/CIFS implementation. - GUMS structures - Copyright (C) Simo Sorce 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#ifndef _GUMS_H -#define _GUMS_H - -#define GUMS_VERSION_MAJOR 0 -#define GUMS_VERSION_MINOR 1 -#define GUMS_OBJECT_VERSION 1 - -#define GUMS_OBJ_DOMAIN 1 -#define GUMS_OBJ_NORMAL_USER 2 -#define GUMS_OBJ_GROUP 3 -#define GUMS_OBJ_ALIAS 4 -#define GUMS_OBJ_WORKSTATION_TRUST 5 -#define GUMS_OBJ_SERVER_TRUST 6 -#define GUMS_OBJ_DOMAIN_TRUST 7 - -typedef struct gums_user -{ - DOM_SID *group_sid; /* Primary Group SID */ - - NTTIME logon_time; /* logon time */ - NTTIME logoff_time; /* logoff time */ - NTTIME kickoff_time; /* kickoff time */ - NTTIME pass_last_set_time; /* password last set time */ - NTTIME pass_can_change_time; /* password can change time */ - NTTIME pass_must_change_time; /* password must change time */ - - char *full_name; /* user's full name string */ - char *home_dir; /* home directory string */ - char *dir_drive; /* home directory drive string */ - char *logon_script; /* logon script string */ - char *profile_path; /* profile path string */ - char *workstations; /* login from workstations string */ - char *unknown_str; /* don't know what this is, yet. */ - char *munged_dial; /* munged path name and dial-back tel number */ - - DATA_BLOB lm_pw; /* .data is Null if no password */ - DATA_BLOB nt_pw; /* .data is Null if no password */ - - uint32 unknown_3; /* 0x00ff ffff */ - - uint16 logon_divs; /* 168 - number of hours in a week */ - uint32 hours_len; /* normally 21 bytes */ - uint8 *hours; - - uint32 unknown_5; /* 0x0002 0000 */ - uint32 unknown_6; /* 0x0000 04ec */ - -} GUMS_USER; - -typedef struct gums_group -{ - uint32 count; /* Number of SIDs */ - DOM_SID **members; /* SID array */ - -} GUMS_GROUP; - -typedef struct gums_domain -{ - uint32 next_rid; - -} GUMS_DOMAIN; - -union gums_obj_p { - GUMS_USER *user; - GUMS_GROUP *group; - GUMS_DOMAIN *domain; -}; - -typedef struct gums_object -{ - TALLOC_CTX *mem_ctx; - - uint32 type; /* Object Type */ - uint32 version; /* Object Version */ - uint32 seq_num; /* Object Sequence Number */ - - SEC_DESC *sec_desc; /* Security Descriptor */ - - DOM_SID *sid; /* Object Sid */ - char *name; /* Object Name */ - char *description; /* Object Description */ - - union gums_obj_p data; /* Object Specific data */ - -} GUMS_OBJECT; - -typedef struct gums_data_set -{ - int type; /* GUMS_SET_xxx */ - void *data; - -} GUMS_DATA_SET; - -typedef struct gums_commit_set -{ - TALLOC_CTX *mem_ctx; - - uint32 type; /* Object type */ - DOM_SID sid; /* Object Sid */ - uint32 count; /* number of changes */ - GUMS_DATA_SET **data; - -} GUMS_COMMIT_SET; - -typedef struct gums_privilege -{ - TALLOC_CTX *mem_ctx; - - uint32 type; /* Object Type */ - uint32 version; /* Object Version */ - uint32 seq_num; /* Object Sequence Number */ - - LUID_ATTR *privilege; /* Privilege Type */ - char *name; /* Object Name */ - char *description; /* Object Description */ - - uint32 count; - DOM_SID **members; - -} GUMS_PRIVILEGE; - - -typedef struct gums_functions -{ - /* Generic object functions */ - - NTSTATUS (*get_domain_sid) (DOM_SID **sid, const char* name); - NTSTATUS (*set_domain_sid) (const DOM_SID *sid); - - NTSTATUS (*get_sequence_number) (void); - - NTSTATUS (*new_object) (DOM_SID **sid, const char *name, const int obj_type); - NTSTATUS (*delete_object) (const DOM_SID *sid); - - NTSTATUS (*get_object_from_sid) (GUMS_OBJECT **object, const DOM_SID *sid, const int obj_type); - NTSTATUS (*get_object_from_name) (GUMS_OBJECT **object, const char *name, const int onj_type); - /* This function is used to get the list of all objects changed since b_time, it is - used to support PDC<->BDC synchronization */ - NTSTATUS (*get_updated_objects) (GUMS_OBJECT **objects, const NTTIME base_time); - - NTSTATUS (*enumerate_objects_start) (void *handle, const DOM_SID *sid, const int obj_type); - NTSTATUS (*enumerate_objects_get_next) (GUMS_OBJECT **object, void *handle); - NTSTATUS (*enumerate_objects_stop) (void *handle); - - /* This function MUST be used ONLY by PDC<->BDC replication code or recovery tools. - Never use this function to update an object in the database, use set_object_values() */ - NTSTATUS (*set_object) (const GUMS_OBJECT *object); - - /* set object values function */ - NTSTATUS (*set_object_values) (DOM_SID *sid, uint32 count, GUMS_DATA_SET **data_set); - - /* Group related functions */ - NTSTATUS (*add_members_to_group) (const DOM_SID *group, const DOM_SID **members); - NTSTATUS (*delete_members_from_group) (const DOM_SID *group, const DOM_SID **members); - NTSTATUS (*enumerate_group_members) (DOM_SID **members, const DOM_SID *sid, const int type); - - NTSTATUS (*get_sid_groups) (DOM_SID **groups, const DOM_SID *sid); - - NTSTATUS (*lock_sid) (const DOM_SID *sid); - NTSTATUS (*unlock_sid) (const DOM_SID *sid); - - /* privileges related functions */ - - NTSTATUS (*add_members_to_privilege) (const LUID_ATTR *priv, const DOM_SID **members); - NTSTATUS (*delete_members_from_privilege) (const LUID_ATTR *priv, const DOM_SID **members); - NTSTATUS (*enumerate_privilege_members) (DOM_SID **members, const LUID_ATTR *priv); - NTSTATUS (*get_sid_privileges) (DOM_SID **privs, const DOM_SID *sid); - - /* warning!: set_privilege will overwrite a prior existing privilege if such exist */ - NTSTATUS (*set_privilege) (GUMS_PRIVILEGE *priv); - -} GUMS_FUNCTIONS; - -/* define value types */ -#define GUMS_SET_PRIMARY_GROUP 0x1 -#define GUMS_SET_SEC_DESC 0x2 - -#define GUMS_SET_NAME 0x10 -#define GUMS_SET_DESCRIPTION 0x11 -#define GUMS_SET_FULL_NAME 0x12 - -/* user specific type values */ -#define GUMS_SET_LOGON_TIME 0x20 -#define GUMS_SET_LOGOFF_TIME 0x21 -#define GUMS_SET_KICKOFF_TIME 0x23 -#define GUMS_SET_PASS_LAST_SET_TIME 0x24 -#define GUMS_SET_PASS_CAN_CHANGE_TIME 0x25 -#define GUMS_SET_PASS_MUST_CHANGE_TIME 0x26 - - -#define GUMS_SET_HOME_DIRECTORY 0x31 -#define GUMS_SET_DRIVE 0x32 -#define GUMS_SET_LOGON_SCRIPT 0x33 -#define GUMS_SET_PROFILE_PATH 0x34 -#define GUMS_SET_WORKSTATIONS 0x35 -#define GUMS_SET_UNKNOWN_STRING 0x36 -#define GUMS_SET_MUNGED_DIAL 0x37 - -#define GUMS_SET_LM_PASSWORD 0x40 -#define GUMS_SET_NT_PASSWORD 0x41 -#define GUMS_SET_PLAINTEXT_PASSWORD 0x42 -#define GUMS_SET_UNKNOWN_3 0x43 -#define GUMS_SET_LOGON_DIVS 0x44 -#define GUMS_SET_HOURS_LEN 0x45 -#define GUMS_SET_HOURS 0x46 -#define GUMS_SET_UNKNOWN_5 0x47 -#define GUMS_SET_UNKNOWN_6 0x48 - -#define GUMS_SET_MUST_CHANGE_PASS 0x50 -#define GUMS_SET_CANNOT_CHANGE_PASS 0x51 -#define GUMS_SET_PASS_NEVER_EXPIRE 0x52 -#define GUMS_SET_ACCOUNT_DISABLED 0x53 -#define GUMS_SET_ACCOUNT_LOCKOUT 0x54 - -/*group specific type values */ -#define GUMS_ADD_SID_LIST 0x60 -#define GUMS_DEL_SID_LIST 0x61 -#define GUMS_SET_SID_LIST 0x62 - -#endif /* _GUMS_H */ diff --git a/source3/include/idmap.h b/source3/include/idmap.h deleted file mode 100644 index 2cc31e9ed27..00000000000 --- a/source3/include/idmap.h +++ /dev/null @@ -1,56 +0,0 @@ -/* - Unix SMB/CIFS implementation. - - Idmap headers - - Copyright (C) Anthony Liguori 2003 - Copyright (C) Simo Sorce 2003 - - This library is free software; you can redistribute it and/or - modify it under the terms of the GNU Library General Public - License as published by the Free Software Foundation; either - version 2 of the License, or (at your option) any later version. - - This library is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU - Library General Public License for more details. - - You should have received a copy of the GNU Library General Public - License along with this library; if not, write to the - Free Software Foundation, Inc., 59 Temple Place - Suite 330, - Boston, MA 02111-1307, USA. -*/ - -#define ID_EMPTY 0x00 -#define ID_USERID 0x01 -#define ID_GROUPID 0x02 -#define ID_OTHER 0x04 - -#define ID_TYPEMASK 0x0f - -#define ID_NOMAP 0x10 -#define ID_CACHE 0x20 - -typedef union unid_t { - uid_t uid; - gid_t gid; -} unid_t; - -/* Filled out by IDMAP backends */ -struct idmap_methods { - - /* Called when backend is first loaded */ - NTSTATUS (*init)(const char *init_str); - - NTSTATUS (*get_sid_from_id)(DOM_SID *sid, unid_t id, int id_type); - NTSTATUS (*get_id_from_sid)(unid_t *id, int *id_type, const DOM_SID *sid); - NTSTATUS (*set_mapping)(DOM_SID *sid, unid_t id, int id_type); - - /* Called when backend is unloaded */ - NTSTATUS (*close)(void); - - /* Called to dump backend status */ - void (*status)(void); -}; - diff --git a/source3/include/includes.h b/source3/include/includes.h index bf71ed54cf7..f6d26afe4f7 100644 --- a/source3/include/includes.h +++ b/source3/include/includes.h @@ -345,10 +345,6 @@ #include #endif -#ifdef HAVE_EXECINFO_H -#include -#endif - #ifdef HAVE_SYS_CAPABILITY_H #if defined(BROKEN_REDHAT_7_SYSTEM_HEADERS) && !defined(_I386_STATFS_H) @@ -437,23 +433,6 @@ #include #endif -/* Special macros that are no-ops except when run under Valgrind on - * x86. They've moved a little bit from valgrind 1.0.4 to 1.9.4 */ -#if HAVE_VALGRIND_MEMCHECK_H - /* memcheck.h includes valgrind.h */ -#include -#elif HAVE_VALGRIND_H -#include -#endif - -/* If we have --enable-developer and the valgrind header is present, - * then we're OK to use it. Set a macro so this logic can be done only - * once. */ -#if defined(DEVELOPER) && (HAVE_VALGRIND_H || HAVE_VALGRIND_VALGRIND_H) -#define VALGRIND -#endif - - /* we support ADS if we want it and have krb5 and ldap libs */ #if defined(WITH_ADS) && defined(HAVE_KRB5) && defined(HAVE_LDAP) #define HAVE_ADS @@ -794,12 +773,6 @@ extern int errno; #include "passdb.h" -#include "sam.h" - -#include "gums.h" - -#include "idmap.h" - #include "session.h" #include "asn_1.h" @@ -810,8 +783,6 @@ extern int errno; #include "nsswitch/winbind_client.h" -#include "genparser.h" - /* * Type for wide character dirent structure. * Only d_name is defined by POSIX. @@ -856,10 +827,6 @@ struct functable { struct printjob; -struct smb_ldap_privates; - -struct smb_ldap_privates; - /***** automatically generated prototypes *****/ #ifndef NO_PROTO_H #include "proto.h" @@ -1241,6 +1208,10 @@ int smb_xvasprintf(char **ptr, const char *format, va_list ap) PRINTF_ATTRIBUTE( time_t timegm(struct tm *tm); #endif +#if defined(VALGRIND) +#define strlen(x) valgrind_strlen(x) +#endif + /* * Veritas File System. Often in addition to native. * Quotas different. diff --git a/source3/include/libsmbclient.h b/source3/include/libsmbclient.h index f5d653f6978..0c905edcbcc 100644 --- a/source3/include/libsmbclient.h +++ b/source3/include/libsmbclient.h @@ -257,8 +257,9 @@ typedef int (*smbc_remove_unused_server_fn)(SMBCCTX * c, SMBCSRV *srv); * */ typedef int (*smbc_add_cached_srv_fn) (SMBCCTX * c, SMBCSRV *srv, - const char * server, const char * share, - const char * workgroup, const char * username); + char * server, char * share, + char * workgroup, char * username); + /**@ingroup callback * Look up a server in the cache system @@ -276,9 +277,9 @@ typedef int (*smbc_add_cached_srv_fn) (SMBCCTX * c, SMBCSRV *srv, * @return pointer to SMBCSRV on success. NULL on failure. * */ -typedef SMBCSRV * (*smbc_get_cached_srv_fn) (SMBCCTX * c, const char * server, - const char * share, const char * workgroup, - const char * username); +typedef SMBCSRV * (*smbc_get_cached_srv_fn) (SMBCCTX * c, char * server, + char * share, char * workgroup, char * username); + /**@ingroup callback * Check if a server is still good diff --git a/source3/include/local.h b/source3/include/local.h index 4c3c58e14fc..29b0641119d 100644 --- a/source3/include/local.h +++ b/source3/include/local.h @@ -223,8 +223,4 @@ /* Max number of simultaneous winbindd socket connections. */ #define WINBINDD_MAX_SIMULTANEOUS_CLIENTS 200 - -/* Buffer size to use when printing backtraces */ -#define BACKTRACE_STACK_SIZE 64 - #endif diff --git a/source3/include/passdb.h b/source3/include/passdb.h index 06409aa34eb..fa80b263ffa 100644 --- a/source3/include/passdb.h +++ b/source3/include/passdb.h @@ -34,6 +34,13 @@ #define PASSDB_INTERFACE_VERSION 4 +/* use this inside a passdb module */ +#define PDB_MODULE_VERSIONING_MAGIC \ +int pdb_version(void)\ +{\ + return PASSDB_INTERFACE_VERSION;\ +} + typedef struct pdb_context { struct pdb_methods *pdb_methods; @@ -149,7 +156,6 @@ struct pdb_init_function_entry { const char *name; /* Function to create a member of the pdb_methods list */ pdb_init_function init; - struct pdb_init_function_entry *prev, *next; }; #endif /* _PASSDB_H */ diff --git a/source3/include/rpc_client_proto.h b/source3/include/rpc_client_proto.h deleted file mode 100644 index 0ecb1956913..00000000000 --- a/source3/include/rpc_client_proto.h +++ /dev/null @@ -1,231 +0,0 @@ -#ifndef _RPC_CLIENT_PROTO_H_ -#define _RPC_CLIENT_PROTO_H_ -/* This file is automatically generated with "make proto". DO NOT EDIT */ - - -/*The following definitions come from lib/util_list.c */ - -BOOL copy_policy_hnd (POLICY_HND *dest, const POLICY_HND *src); -BOOL compare_rpc_hnd_node(const RPC_HND_NODE *x, - const RPC_HND_NODE *y); -BOOL RpcHndList_set_connection(const POLICY_HND *hnd, - struct cli_connection *con); -BOOL RpcHndList_del_connection(const POLICY_HND *hnd); -struct cli_connection* RpcHndList_get_connection(const POLICY_HND *hnd); - -/*The following definitions come from rpc_client/cli_connect.c */ - -void init_connections(void); -void free_connections(void); -void cli_connection_free(struct cli_connection *con); -void cli_connection_unlink(struct cli_connection *con); -BOOL cli_connection_init(const char *srv_name, char *pipe_name, - struct cli_connection **con); -BOOL cli_connection_init_auth(const char *srv_name, char *pipe_name, - struct cli_connection **con, - cli_auth_fns * auth, void *auth_creds); -struct _cli_auth_fns *cli_conn_get_authfns(struct cli_connection *con); -void *cli_conn_get_auth_creds(struct cli_connection *con); -BOOL rpc_hnd_pipe_req(const POLICY_HND * hnd, uint8 op_num, - prs_struct * data, prs_struct * rdata); -BOOL rpc_con_pipe_req(struct cli_connection *con, uint8 op_num, - prs_struct * data, prs_struct * rdata); -BOOL rpc_con_ok(struct cli_connection *con); - -/*The following definitions come from rpc_client/cli_login.c */ - -BOOL cli_nt_setup_creds(struct cli_state *cli, unsigned char mach_pwd[16]); -BOOL cli_nt_srv_pwset(struct cli_state *cli, unsigned char *new_hashof_mach_pwd); -BOOL cli_nt_login_interactive(struct cli_state *cli, char *domain, char *username, - uint32 smb_userid_low, char *password, - NET_ID_INFO_CTR *ctr, NET_USER_INFO_3 *user_info3); -BOOL cli_nt_login_network(struct cli_state *cli, char *domain, char *username, - uint32 smb_userid_low, char lm_chal[8], - char *lm_chal_resp, char *nt_chal_resp, - NET_ID_INFO_CTR *ctr, NET_USER_INFO_3 *user_info3); -BOOL cli_nt_logoff(struct cli_state *cli, NET_ID_INFO_CTR *ctr); - -/*The following definitions come from rpc_client/cli_lsarpc.c */ - -BOOL do_lsa_open_policy(struct cli_state *cli, - char *system_name, POLICY_HND *hnd, - BOOL sec_qos); -BOOL do_lsa_query_info_pol(struct cli_state *cli, - POLICY_HND *hnd, uint16 info_class, - fstring domain_name, DOM_SID *domain_sid); -BOOL do_lsa_close(struct cli_state *cli, POLICY_HND *hnd); -BOOL cli_lsa_get_domain_sid(struct cli_state *cli, char *server); -uint32 lsa_open_policy(const char *system_name, POLICY_HND *hnd, - BOOL sec_qos, uint32 des_access); -uint32 lsa_lookup_sids(POLICY_HND *hnd, int num_sids, DOM_SID *sids, - char ***names, uint32 **types, int *num_names); -uint32 lsa_lookup_names(POLICY_HND *hnd, int num_names, char **names, - DOM_SID **sids, uint32 **types, int *num_sids); - -/*The following definitions come from rpc_client/cli_netlogon.c */ - -BOOL cli_net_logon_ctrl2(struct cli_state *cli, uint32 status_level); -BOOL cli_net_auth2(struct cli_state *cli, uint16 sec_chan, - uint32 neg_flags, DOM_CHAL *srv_chal); -BOOL cli_net_req_chal(struct cli_state *cli, DOM_CHAL *clnt_chal, DOM_CHAL *srv_chal); -BOOL cli_net_srv_pwset(struct cli_state *cli, uint8 hashed_mach_pwd[16]); -BOOL cli_net_sam_logon(struct cli_state *cli, NET_ID_INFO_CTR *ctr, NET_USER_INFO_3 *user_info3); -BOOL cli_net_sam_logoff(struct cli_state *cli, NET_ID_INFO_CTR *ctr); -BOOL change_trust_account_password( char *domain, char *remote_machine_list); - -/*The following definitions come from rpc_client/cli_pipe.c */ - -BOOL rpc_api_pipe_req(struct cli_state *cli, uint8 op_num, - prs_struct *data, prs_struct *rdata); -BOOL rpc_pipe_bind(struct cli_state *cli, char *pipe_name, char *my_name); -void cli_nt_set_ntlmssp_flgs(struct cli_state *cli, uint32 ntlmssp_flgs); -BOOL cli_nt_session_open(struct cli_state *cli, char *pipe_name); -void cli_nt_session_close(struct cli_state *cli); - -/*The following definitions come from rpc_client/cli_reg.c */ - -BOOL do_reg_connect(struct cli_state *cli, char *full_keyname, char *key_name, - POLICY_HND *reg_hnd); -BOOL do_reg_open_hklm(struct cli_state *cli, uint16 unknown_0, uint32 level, - POLICY_HND *hnd); -BOOL do_reg_open_hku(struct cli_state *cli, uint16 unknown_0, uint32 level, - POLICY_HND *hnd); -BOOL do_reg_flush_key(struct cli_state *cli, POLICY_HND *hnd); -BOOL do_reg_query_key(struct cli_state *cli, POLICY_HND *hnd, - char *class, uint32 *class_len, - uint32 *num_subkeys, uint32 *max_subkeylen, - uint32 *max_subkeysize, uint32 *num_values, - uint32 *max_valnamelen, uint32 *max_valbufsize, - uint32 *sec_desc, NTTIME *mod_time); -BOOL do_reg_unknown_1a(struct cli_state *cli, POLICY_HND *hnd, uint32 *unk); -BOOL do_reg_query_info(struct cli_state *cli, POLICY_HND *hnd, - char *key_value, uint32* key_type); -BOOL do_reg_set_key_sec(struct cli_state *cli, POLICY_HND *hnd, SEC_DESC_BUF *sec_desc_buf); -BOOL do_reg_get_key_sec(struct cli_state *cli, POLICY_HND *hnd, uint32 *sec_buf_size, SEC_DESC_BUF **ppsec_desc_buf); -BOOL do_reg_delete_val(struct cli_state *cli, POLICY_HND *hnd, char *val_name); -BOOL do_reg_delete_key(struct cli_state *cli, POLICY_HND *hnd, char *key_name); -BOOL do_reg_create_key(struct cli_state *cli, POLICY_HND *hnd, - char *key_name, char *key_class, - SEC_ACCESS *sam_access, - POLICY_HND *key); -BOOL do_reg_enum_key(struct cli_state *cli, POLICY_HND *hnd, - int key_index, char *key_name, - uint32 *unk_1, uint32 *unk_2, - time_t *mod_time); -BOOL do_reg_create_val(struct cli_state *cli, POLICY_HND *hnd, - char *val_name, uint32 type, BUFFER3 *data); -BOOL do_reg_enum_val(struct cli_state *cli, POLICY_HND *hnd, - int val_index, int max_valnamelen, int max_valbufsize, - fstring val_name, - uint32 *val_type, BUFFER2 *value); -BOOL do_reg_open_entry(struct cli_state *cli, POLICY_HND *hnd, - char *key_name, uint32 unk_0, - POLICY_HND *key_hnd); -BOOL do_reg_close(struct cli_state *cli, POLICY_HND *hnd); - -/*The following definitions come from rpc_client/cli_samr.c */ - -BOOL get_samr_query_usergroups(struct cli_state *cli, - POLICY_HND *pol_open_domain, uint32 user_rid, - uint32 *num_groups, DOM_GID *gid); -BOOL get_samr_query_userinfo(struct cli_state *cli, - POLICY_HND *pol_open_domain, - uint32 info_level, - uint32 user_rid, SAM_USER_INFO_21 *usr); -BOOL do_samr_chgpasswd_user(struct cli_state *cli, - char *srv_name, char *user_name, - char nt_newpass[516], uchar nt_oldhash[16], - char lm_newpass[516], uchar lm_oldhash[16]); -BOOL do_samr_unknown_38(struct cli_state *cli, char *srv_name); -BOOL do_samr_query_dom_info(struct cli_state *cli, - POLICY_HND *domain_pol, uint16 switch_value); -BOOL do_samr_enum_dom_users(struct cli_state *cli, - POLICY_HND *pol, uint16 num_entries, uint16 unk_0, - uint16 acb_mask, uint16 unk_1, uint32 size, - struct acct_info **sam, - int *num_sam_users); -BOOL do_samr_connect(struct cli_state *cli, - char *srv_name, uint32 unknown_0, - POLICY_HND *connect_pol); -BOOL do_samr_open_user(struct cli_state *cli, - POLICY_HND *pol, uint32 unk_0, uint32 rid, - POLICY_HND *user_pol); -BOOL do_samr_open_domain(struct cli_state *cli, - POLICY_HND *connect_pol, uint32 rid, DOM_SID *sid, - POLICY_HND *domain_pol); -BOOL do_samr_query_unknown_12(struct cli_state *cli, - POLICY_HND *pol, uint32 rid, uint32 num_gids, uint32 *gids, - uint32 *num_aliases, - fstring als_names [MAX_LOOKUP_SIDS], - uint32 num_als_users[MAX_LOOKUP_SIDS]); -BOOL do_samr_query_usergroups(struct cli_state *cli, - POLICY_HND *pol, uint32 *num_groups, DOM_GID *gid); -BOOL do_samr_query_userinfo(struct cli_state *cli, - POLICY_HND *pol, uint16 switch_value, void* usr); -BOOL do_samr_close(struct cli_state *cli, POLICY_HND *hnd); - -/*The following definitions come from rpc_client/cli_spoolss_notify.c */ - -BOOL spoolss_disconnect_from_client( struct cli_state *cli); -BOOL spoolss_connect_to_client( struct cli_state *cli, char *remote_machine); -BOOL cli_spoolss_reply_open_printer(struct cli_state *cli, char *printer, uint32 localprinter, uint32 type, uint32 *status, POLICY_HND *handle); -BOOL cli_spoolss_reply_rrpcn(struct cli_state *cli, POLICY_HND *handle, - uint32 change_low, uint32 change_high, uint32 *status); -BOOL cli_spoolss_reply_close_printer(struct cli_state *cli, POLICY_HND *handle, uint32 *status); - -/*The following definitions come from rpc_client/cli_srvsvc.c */ - -BOOL do_srv_net_srv_conn_enum(struct cli_state *cli, - char *server_name, char *qual_name, - uint32 switch_value, SRV_CONN_INFO_CTR *ctr, - uint32 preferred_len, - ENUM_HND *hnd); -BOOL do_srv_net_srv_sess_enum(struct cli_state *cli, - char *server_name, char *qual_name, - uint32 switch_value, SRV_SESS_INFO_CTR *ctr, - uint32 preferred_len, - ENUM_HND *hnd); -BOOL do_srv_net_srv_share_enum(struct cli_state *cli, - char *server_name, - uint32 switch_value, SRV_R_NET_SHARE_ENUM *r_o, - uint32 preferred_len, ENUM_HND *hnd); -BOOL do_srv_net_srv_file_enum(struct cli_state *cli, - char *server_name, char *qual_name, - uint32 switch_value, SRV_FILE_INFO_CTR *ctr, - uint32 preferred_len, - ENUM_HND *hnd); -BOOL do_srv_net_srv_get_info(struct cli_state *cli, - char *server_name, uint32 switch_value, SRV_INFO_CTR *ctr); - -/*The following definitions come from rpc_client/cli_use.c */ - -void init_cli_use(void); -void free_cli_use(void); -struct cli_state *cli_net_use_add(const char *srv_name, - const struct ntuser_creds *usr_creds, - BOOL reuse, BOOL *is_new); -BOOL cli_net_use_del(const char *srv_name, - const struct ntuser_creds *usr_creds, - BOOL force_close, BOOL *connection_closed); -void cli_net_use_enum(uint32 *num_cons, struct use_info ***use); -void cli_use_wait_keyboard(void); - -/*The following definitions come from rpc_client/cli_wkssvc.c */ - -BOOL do_wks_query_info(struct cli_state *cli, - char *server_name, uint32 switch_value, - WKS_INFO_100 *wks100); - -/*The following definitions come from rpc_client/ncacn_np_use.c */ - -BOOL ncacn_np_use_del(const char *srv_name, const char *pipe_name, - const vuser_key * key, - BOOL force_close, BOOL *connection_closed); -struct ncacn_np *ncacn_np_initialise(struct ncacn_np *msrpc, - const vuser_key * key); -struct ncacn_np *ncacn_np_use_add(const char *pipe_name, - const vuser_key * key, - const char *srv_name, - const struct ntuser_creds *ntc, - BOOL reuse, BOOL *is_new_connection); -#endif /* _PROTO_H_ */ diff --git a/source3/include/rpc_lsa.h b/source3/include/rpc_lsa.h index 8e1368810fb..33dde6e3cb4 100644 --- a/source3/include/rpc_lsa.h +++ b/source3/include/rpc_lsa.h @@ -237,7 +237,7 @@ typedef struct r_lsa_query_sec_obj_info typedef struct lsa_query_info { POLICY_HND pol; /* policy handle */ - uint16 info_class; /* info class */ + uint16 info_class; /* info class */ } LSA_Q_QUERY_INFO; @@ -537,6 +537,7 @@ typedef struct POLICY_HND pol; /* policy handle */ DOM_SID2 sid; UNISTR2_ARRAY rights; + uint32 count; } LSA_Q_ADD_ACCT_RIGHTS; /* LSA_R_ADD_ACCT_RIGHTS - LSA add account rights */ @@ -553,6 +554,7 @@ typedef struct DOM_SID2 sid; uint32 removeall; UNISTR2_ARRAY rights; + uint32 count; } LSA_Q_REMOVE_ACCT_RIGHTS; /* LSA_R_REMOVE_ACCT_RIGHTS - LSA remove account rights */ @@ -561,22 +563,6 @@ typedef struct NTSTATUS status; } LSA_R_REMOVE_ACCT_RIGHTS; -/* LSA_Q_ENUM_ACCT_WITH_RIGHT - LSA enum accounts with right */ -typedef struct -{ - POLICY_HND pol; - STRHDR right_hdr; - UNISTR2 right; -} LSA_Q_ENUM_ACCT_WITH_RIGHT; - -/* LSA_R_ENUM_ACCT_WITH_RIGHT - LSA enum accounts with right */ -typedef struct -{ - uint32 count; - SID_ARRAY sids; - NTSTATUS status; -} LSA_R_ENUM_ACCT_WITH_RIGHT; - /* LSA_Q_PRIV_GET_DISPNAME - LSA get privilege display name */ typedef struct lsa_q_priv_get_dispname diff --git a/source3/include/rpc_misc.h b/source3/include/rpc_misc.h index 06ad760c58f..77104894351 100644 --- a/source3/include/rpc_misc.h +++ b/source3/include/rpc_misc.h @@ -227,22 +227,6 @@ typedef struct UNISTR2_ARRAY_EL *strings; } UNISTR2_ARRAY; - -/* an element in a sid array */ -typedef struct -{ - uint32 ref_id; - DOM_SID2 sid; -} SID_ARRAY_EL; - -/* an array of sids */ -typedef struct -{ - uint32 ref_id; - uint32 count; - SID_ARRAY_EL *sids; -} SID_ARRAY; - /* DOM_RID2 - domain RID structure for ntlsa pipe */ typedef struct domrid2_info { diff --git a/source3/include/safe_string.h b/source3/include/safe_string.h index a6b352b02e8..df3633d91d9 100644 --- a/source3/include/safe_string.h +++ b/source3/include/safe_string.h @@ -113,24 +113,24 @@ size_t __unsafe_string_function_usage_here_char__(void); #endif /* HAVE_COMPILER_WILL_OPTIMIZE_OUT_FNS */ -/* the addition of the DEVELOPER checks in safe_strcpy means we must - * update a lot of code. To make this a little easier here are some - * functions that provide the lengths with less pain */ -#define pstrcpy_base(dest, src, pstring_base) \ - safe_strcpy(dest, src, sizeof(pstring)-PTR_DIFF(dest,pstring_base)-1) - #define safe_strcpy_base(dest, src, base, size) \ safe_strcpy(dest, src, size-PTR_DIFF(dest,base)-1) -/* String copy functions - macro hell below adds 'type checking' - (limited, but the best we can do in C) and may tag with function - name/number to record the last 'clobber region' on that string */ +/* String copy functions - macro hell below adds 'type checking' (limited, + but the best we can do in C) and may tag with function name/number to + record the last 'clobber region' on that string */ #define pstrcpy(d,s) safe_strcpy((d), (s),sizeof(pstring)-1) #define pstrcat(d,s) safe_strcat((d), (s),sizeof(pstring)-1) #define fstrcpy(d,s) safe_strcpy((d),(s),sizeof(fstring)-1) #define fstrcat(d,s) safe_strcat((d),(s),sizeof(fstring)-1) +/* the addition of the DEVELOPER checks in safe_strcpy means we must + * update a lot of code. To make this a little easier here are some + * functions that provide the lengths with less pain */ +#define pstrcpy_base(dest, src, pstring_base) \ + safe_strcpy(dest, src, sizeof(pstring)-PTR_DIFF(dest,pstring_base)-1) + /* Inside the _fn variants of these is a call to clobber_region(), - * which might destroy the stack on a buggy function. We help the diff --git a/source3/include/sam.h b/source3/include/sam.h deleted file mode 100644 index f46a6e7bcb7..00000000000 --- a/source3/include/sam.h +++ /dev/null @@ -1,238 +0,0 @@ -/* - Unix SMB/CIFS implementation. - SAM structures - Copyright (C) Kai Krueger 2002 - Copyright (C) Stefan (metze) Metzmacher 2002 - Copyright (C) Simo Sorce 2002 - Copyright (C) Andrew Bartlett 2002 - Copyright (C) Jelmer Vernooij 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#ifndef _SAM_H -#define _SAM_H - -/* We want to track down bugs early */ -#if 1 -#define SAM_ASSERT(x) SMB_ASSERT(x) -#else -#define SAM_ASSERT(x) while (0) { \ - if (!(x)) { - DEBUG(0, ("SAM_ASSERT failed!\n")) - return NT_STATUS_FAIL_CHECK;\ - } \ - } -#endif - - -/* let it be 0 until we have a stable interface --metze */ -#define SAM_INTERFACE_VERSION 0 - -/* use this inside a passdb module */ -#define SAM_MODULE_VERSIONING_MAGIC \ -int sam_version(void)\ -{\ - return SAM_INTERFACE_VERSION;\ -} - -/* Backend to use by default when no backend was specified */ -#define SAM_DEFAULT_BACKEND "plugin" - -typedef struct sam_domain_handle { - TALLOC_CTX *mem_ctx; - uint32 access_granted; - const struct sam_methods *current_sam_methods; /* sam_methods creating this handle */ - void (*free_fn)(struct sam_domain_handle **); - struct domain_data { - DOM_SID sid; /*SID of the domain. Should not be changed */ - char *name; /* Name of the domain */ - char *servername; /* */ - NTTIME max_passwordage; /* time till next password expiration */ - NTTIME min_passwordage; /* time till password can be changed again */ - NTTIME lockout_duration; /* time till login is allowed again after lockout*/ - NTTIME reset_count; /* time till bad login counter is reset */ - uint16 min_passwordlength; /* minimum number of characters for a password */ - uint16 password_history; /* number of passwords stored in history */ - uint16 lockout_count; /* number of bad login attempts before lockout */ - BOOL force_logoff; /* force logoff after logon hours have expired */ - BOOL login_pwdchange; /* Users need to logon to change their password */ - uint32 num_accounts; /* number of accounts in the domain */ - uint32 num_groups; /* number of global groups */ - uint32 num_aliases; /* number of local groups */ - uint32 sam_sequence_number; /* global sequence number */ - } private; -} SAM_DOMAIN_HANDLE; - -typedef struct sam_account_handle { - TALLOC_CTX *mem_ctx; - uint32 access_granted; - const struct sam_methods *current_sam_methods; /* sam_methods creating this handle */ - void (*free_fn)(struct sam_account_handle **); - struct sam_account_data { - uint32 init_flag; - NTTIME logon_time; /* logon time */ - NTTIME logoff_time; /* logoff time */ - NTTIME kickoff_time; /* kickoff time */ - NTTIME pass_last_set_time; /* password last set time */ - NTTIME pass_can_change_time; /* password can change time */ - NTTIME pass_must_change_time; /* password must change time */ - char * account_name; /* account_name string */ - SAM_DOMAIN_HANDLE * domain; /* domain of account */ - char *full_name; /* account's full name string */ - char *unix_home_dir; /* UNIX home directory string */ - char *home_dir; /* home directory string */ - char *dir_drive; /* home directory drive string */ - char *logon_script; /* logon script string */ - char *profile_path; /* profile path string */ - char *acct_desc; /* account description string */ - char *workstations; /* login from workstations string */ - char *unknown_str; /* don't know what this is, yet. */ - char *munged_dial; /* munged path name and dial-back tel number */ - DOM_SID account_sid; /* Primary Account SID */ - DOM_SID group_sid; /* Primary Group SID */ - DATA_BLOB lm_pw; /* .data is Null if no password */ - DATA_BLOB nt_pw; /* .data is Null if no password */ - char *plaintext_pw; /* if Null not available */ - uint16 acct_ctrl; /* account info (ACB_xxxx bit-mask) */ - uint32 unknown_1; /* 0x00ff ffff */ - uint16 logon_divs; /* 168 - number of hours in a week */ - uint32 hours_len; /* normally 21 bytes */ - uint8 hours[MAX_HOURS_LEN]; - uint32 unknown_2; /* 0x0002 0000 */ - uint32 unknown_3; /* 0x0000 04ec */ - } private; -} SAM_ACCOUNT_HANDLE; - -typedef struct sam_group_handle { - TALLOC_CTX *mem_ctx; - uint32 access_granted; - const struct sam_methods *current_sam_methods; /* sam_methods creating this handle */ - void (*free_fn)(struct sam_group_handle **); - struct sam_group_data { - char *group_name; - char *group_desc; - DOM_SID sid; - uint16 group_ctrl; /* specifies if the group is a local group or a global group */ - uint32 num_members; - } private; -} SAM_GROUP_HANDLE; - - -typedef struct sam_group_member { - DOM_SID sid; - BOOL group; /* specifies if it is a group or a account */ -} SAM_GROUP_MEMBER; - -typedef struct sam_account_enum { - DOM_SID sid; - char *account_name; - char *full_name; - char *account_desc; - uint16 acct_ctrl; -} SAM_ACCOUNT_ENUM; - -typedef struct sam_group_enum { - DOM_SID sid; - char *group_name; - char *group_desc; - uint16 group_ctrl; -} SAM_GROUP_ENUM; - - -/* bits for group_ctrl: to spezify if the group is global group or alias */ -#define GCB_LOCAL_GROUP 0x0001 -#define GCB_ALIAS_GROUP (GCB_LOCAL_GROUP |GCB_BUILTIN) -#define GCB_GLOBAL_GROUP 0x0002 -#define GCB_BUILTIN 0x1000 - -typedef struct sam_context -{ - struct sam_methods *methods; - TALLOC_CTX *mem_ctx; - - void (*free_fn)(struct sam_context **); -} SAM_CONTEXT; - -typedef struct sam_methods -{ - struct sam_context *parent; - struct sam_methods *next; - struct sam_methods *prev; - const char *backendname; - const char *domain_name; - DOM_SID domain_sid; - void *private_data; - - /* General API */ - - NTSTATUS (*sam_get_sec_desc) (const struct sam_methods *, const NT_USER_TOKEN *access_token, const DOM_SID *sid, SEC_DESC **sd); - NTSTATUS (*sam_set_sec_desc) (const struct sam_methods *, const NT_USER_TOKEN *access_token, const DOM_SID *sid, const SEC_DESC *sd); - - NTSTATUS (*sam_lookup_sid) (const struct sam_methods *, const NT_USER_TOKEN *access_token, TALLOC_CTX *mem_ctx, const DOM_SID *sid, char **name, uint32 *type); - NTSTATUS (*sam_lookup_name) (const struct sam_methods *, const NT_USER_TOKEN *access_token, const char *name, DOM_SID *sid, uint32 *type); - - /* Domain API */ - - NTSTATUS (*sam_update_domain) (const struct sam_methods *, const SAM_DOMAIN_HANDLE *domain); - NTSTATUS (*sam_get_domain_handle) (const struct sam_methods *, const NT_USER_TOKEN *access_token, uint32 access_desired, SAM_DOMAIN_HANDLE **domain); - - /* Account API */ - - NTSTATUS (*sam_create_account) (const struct sam_methods *, const NT_USER_TOKEN *access_token, uint32 access_desired, const char *account_name, uint16 acct_ctrl, SAM_ACCOUNT_HANDLE **account); - NTSTATUS (*sam_add_account) (const struct sam_methods *, const SAM_ACCOUNT_HANDLE *account); - NTSTATUS (*sam_update_account) (const struct sam_methods *, const SAM_ACCOUNT_HANDLE *account); - NTSTATUS (*sam_delete_account) (const struct sam_methods *, const SAM_ACCOUNT_HANDLE *account); - NTSTATUS (*sam_enum_accounts) (const struct sam_methods *, const NT_USER_TOKEN *access_token, uint16 acct_ctrl, uint32 *account_count, SAM_ACCOUNT_ENUM **accounts); - - NTSTATUS (*sam_get_account_by_sid) (const struct sam_methods *, const NT_USER_TOKEN *access_token, uint32 access_desired, const DOM_SID *accountsid, SAM_ACCOUNT_HANDLE **account); - NTSTATUS (*sam_get_account_by_name) (const struct sam_methods *, const NT_USER_TOKEN *access_token, uint32 access_desired, const char *name, SAM_ACCOUNT_HANDLE **account); - - /* Group API */ - - NTSTATUS (*sam_create_group) (const struct sam_methods *, const NT_USER_TOKEN *access_token, uint32 access_desired, const char *group_name, uint16 group_ctrl, SAM_GROUP_HANDLE **group); - NTSTATUS (*sam_add_group) (const struct sam_methods *, const SAM_GROUP_HANDLE *group); - NTSTATUS (*sam_update_group) (const struct sam_methods *, const SAM_GROUP_HANDLE *group); - NTSTATUS (*sam_delete_group) (const struct sam_methods *, const SAM_GROUP_HANDLE *group); - NTSTATUS (*sam_enum_groups) (const struct sam_methods *, const NT_USER_TOKEN *access_token, uint16 group_ctrl, uint32 *groups_count, SAM_GROUP_ENUM **groups); - NTSTATUS (*sam_get_group_by_sid) (const struct sam_methods *, const NT_USER_TOKEN *access_token, uint32 access_desired, const DOM_SID *groupsid, SAM_GROUP_HANDLE **group); - NTSTATUS (*sam_get_group_by_name) (const struct sam_methods *, const NT_USER_TOKEN *access_token, uint32 access_desired, const char *name, SAM_GROUP_HANDLE **group); - - NTSTATUS (*sam_add_member_to_group) (const struct sam_methods *, const SAM_GROUP_HANDLE *group, const SAM_GROUP_MEMBER *member); - NTSTATUS (*sam_delete_member_from_group) (const struct sam_methods *, const SAM_GROUP_HANDLE *group, const SAM_GROUP_MEMBER *member); - NTSTATUS (*sam_enum_groupmembers) (const struct sam_methods *, const SAM_GROUP_HANDLE *group, uint32 *members_count, SAM_GROUP_MEMBER **members); - - NTSTATUS (*sam_get_groups_of_sid) (const struct sam_methods *, const NT_USER_TOKEN *access_token, const DOM_SID **sids, uint16 group_ctrl, uint32 *group_count, SAM_GROUP_ENUM **groups); - - void (*free_private_data)(void **); -} SAM_METHODS; - -typedef NTSTATUS (*sam_init_function)(SAM_METHODS *, const char *); - -struct sam_init_function_entry { - char *module_name; - /* Function to create a member of the sam_methods list */ - sam_init_function init; -}; - -typedef struct sam_backend_entry { - char *module_name; - char *module_params; - char *domain_name; - DOM_SID *domain_sid; -} SAM_BACKEND_ENTRY; - - -#endif /* _SAM_H */ diff --git a/source3/include/secrets.h b/source3/include/secrets.h index 07faf28d439..183b29d7a8a 100644 --- a/source3/include/secrets.h +++ b/source3/include/secrets.h @@ -57,14 +57,14 @@ struct machine_acct_pass { /* * storage structure for trusted domain */ -typedef struct trusted_dom_pass { +struct trusted_dom_pass { size_t uni_name_len; smb_ucs2_t uni_name[32]; /* unicode domain name */ size_t pass_len; fstring pass; /* trust relationship's password */ time_t mod_time; DOM_SID domain_sid; /* remote domain's sid */ -} TRUSTED_DOM_PASS; +}; /* * trusted domain entry/entries returned by secrets_get_trusted_domains diff --git a/source3/include/smb.h b/source3/include/smb.h index 4f37c38413c..edd25fb44eb 100644 --- a/source3/include/smb.h +++ b/source3/include/smb.h @@ -236,15 +236,15 @@ typedef struct nttime_info /* SID Types */ enum SID_NAME_USE { + SID_NAME_USE_NONE = 0,/* NOTUSED */ SID_NAME_USER = 1, /* user */ - SID_NAME_DOM_GRP, /* domain group */ - SID_NAME_DOMAIN, /* domain sid */ - SID_NAME_ALIAS, /* local group */ - SID_NAME_WKN_GRP, /* well-known group */ - SID_NAME_DELETED, /* deleted account: needed for c2 rating */ - SID_NAME_INVALID, /* invalid account */ - SID_NAME_UNKNOWN, /* unknown sid type */ - SID_NAME_COMPUTER, /* sid for a computer */ + SID_NAME_DOM_GRP = 2, /* domain group */ + SID_NAME_DOMAIN = 3, /* domain: don't know what this is */ + SID_NAME_ALIAS = 4, /* local group */ + SID_NAME_WKN_GRP = 5, /* well-known group */ + SID_NAME_DELETED = 6, /* deleted account: needed for c2 rating */ + SID_NAME_INVALID = 7, /* invalid account */ + SID_NAME_UNKNOWN = 8 /* oops. */ }; /** @@ -1711,9 +1711,16 @@ typedef struct { #define DEFAULT_TRUST_ACCOUNT_PASSWORD_LENGTH 14 -#include "popt_common.h" +/* Common popt structures */ + +extern struct poptOption popt_common_debug[]; +extern struct poptOption popt_common_configfile[]; +extern struct poptOption popt_common_socket_options[]; +extern struct poptOption popt_common_version[]; +extern struct poptOption popt_common_netbios_name[]; +extern struct poptOption popt_common_log_base[]; /* Module support */ -typedef int (init_module_function) (void); +typedef NTSTATUS (init_module_function) (void); #endif /* _SMB_H */ diff --git a/source3/include/smb_ldap.h b/source3/include/smb_ldap.h deleted file mode 100644 index 1a30b853e78..00000000000 --- a/source3/include/smb_ldap.h +++ /dev/null @@ -1,59 +0,0 @@ -/* - Unix SMB/CIFS implementation. - LDAP protocol helper functions for SAMBA - Copyright (C) Jean François Micouleau 1998 - Copyright (C) Gerald Carter 2001 - Copyright (C) Shahms King 2001 - Copyright (C) Andrew Bartlett 2002 - Copyright (C) Stefan (metze) Metzmacher 2002 - Copyright (C) Jim McDonough 2003 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - -*/ - -#ifndef SMB_LDAP_H -#define SMB_LDAP_H - -#ifdef HAVE_LDAP - -#include -#include - -struct smb_ldap_privates { - - /* Former statics */ - LDAP *ldap_struct; - LDAPMessage *result; - LDAPMessage *entry; - int index; - - time_t last_ping; - /* retrive-once info */ - const char *uri; - - BOOL permit_non_unix_accounts; - - uint32 low_nua_rid; - uint32 high_nua_rid; - - char *bind_dn; - char *bind_secret; - - struct smb_ldap_privates *next; -}; - -#endif -#endif diff --git a/source3/include/tdbsam2.h b/source3/include/tdbsam2.h deleted file mode 100644 index 047b4e7c902..00000000000 --- a/source3/include/tdbsam2.h +++ /dev/null @@ -1,95 +0,0 @@ -/* - * Unix SMB/CIFS implementation. - * tdbsam2 genstruct enabled header file - * Copyright (C) Simo Sorce 2002 - * - * This program is free software; you can redistribute it and/or modify it under - * the terms of the GNU General Public License as published by the Free - * Software Foundation; either version 2 of the License, or (at your option) - * any later version. - * - * This program is distributed in the hope that it will be useful, but WITHOUT - * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or - * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for - * more details. - * - * You should have received a copy of the GNU General Public License along with - * this program; if not, write to the Free Software Foundation, Inc., 675 - * Mass Ave, Cambridge, MA 02139, USA. - */ - -/* ALL strings assumes UTF8 as encoding */ - -GENSTRUCT struct tdbsam2_domain_data { - uint32 xcounter; /* counter to be updated at any change */ - - SEC_DESC *sec_desc; /* Security Descriptor */ - DOM_SID *dom_sid; /* The Domain SID */ - char *name; _NULLTERM /* NT Domain Name */ - char *description; _NULLTERM /* Descritpion (Gecos) */ - - uint32 next_rid; /* The Next free RID */ -}; - -GENSTRUCT struct tdbsam2_user_data { - uint32 xcounter; /* counter to be updated at any change */ - - SEC_DESC *sec_desc; /* Security Descriptor */ - DOM_SID *user_sid; /* The User SID */ - char *name; _NULLTERM /* NT User Name */ - char *description; _NULLTERM /* Descritpion (Gecos) */ - - DOM_SID *group_sid; /* The Primary Group SID */ - - NTTIME *logon_time; - NTTIME *logoff_time; - NTTIME *kickoff_time; - NTTIME *pass_last_set_time; - NTTIME *pass_can_change_time; - NTTIME *pass_must_change_time; - - char *full_name; _NULLTERM /* The Full Name */ - char *home_dir; _NULLTERM /* Home Directory */ - char *dir_drive; _NULLTERM /* Drive Letter the home should be mapped to */ - char *logon_script; _NULLTERM /* Logon script path */ - char *profile_path; _NULLTERM /* Profile is stored here */ - char *workstations; _NULLTERM /* List of Workstation names the user is allowed to LogIn */ - char *unknown_str; _NULLTERM /* Guess ... Unknown */ - char *munged_dial; _NULLTERM /* Callback Number */ - - /* passwords are 16 byte leght, pointer is null if no password */ - uint8 *lm_pw_ptr; _LEN(16) /* Lanman hashed password */ - uint8 *nt_pw_ptr; _LEN(16) /* NT hashed password */ - - uint16 logon_divs; /* 168 - num of hours in a week */ - uint32 hours_len; /* normally 21 */ - uint8 *hours; _LEN(hours_len) /* normally 21 bytes (depends on hours_len) */ - - uint32 unknown_3; /* 0x00ff ffff */ - uint32 unknown_5; /* 0x0002 0000 */ - uint32 unknown_6; /* 0x0000 04ec */ -}; - -GENSTRUCT struct tdbsam2_group_data { - uint32 xcounter; /* counter to be updated at any change */ - - SEC_DESC *sec_desc; /* Security Descriptor */ - DOM_SID *group_sid; /* The Group SID */ - char *name; _NULLTERM /* NT Group Name */ - char *description; _NULLTERM /* Descritpion (Gecos) */ - - uint32 count; /* number of sids */ - DOM_SID **members; _LEN(count) /* SID array */ -}; - -GENSTRUCT struct tdbsam2_privilege_data { - uint32 xcounter; /* counter to be updated at any change */ - - LUID_ATTR *privilege; /* Privilege */ - char *name; _NULLTERM /* NT User Name */ - char *description; _NULLTERM /* Descritpion (Gecos) */ - - uint32 count; /* number of sids */ - DOM_SID **members; _LEN(count) /* SID array */ -}; - diff --git a/source3/include/version.h b/source3/include/version.h index c0a1c702f29..3ee1d8db599 100644 --- a/source3/include/version.h +++ b/source3/include/version.h @@ -1 +1 @@ -#define VERSION "post3.0-HEAD" +#define VERSION "3.0alpha24" diff --git a/source3/include/vfs.h b/source3/include/vfs.h index 756e417814d..9a067643713 100644 --- a/source3/include/vfs.h +++ b/source3/include/vfs.h @@ -48,7 +48,7 @@ #define SMB_VFS_INTERFACE_VERSION 5 -/* Version of supported cascaded interface backward compatibility. +/* Version of supported cascaded interface backward copmatibility. (version 5 corresponds to SMB_VFS_INTERFACE_VERSION 5) It is used in vfs_init_custom() to detect VFS modules which conform to cascaded VFS interface but implement elder version than current version of Samba uses. @@ -77,7 +77,7 @@ is unloaded from smbd process using sys_dlclose(). Prototypes: - vfs_op_tuple *vfs_init(const struct vfs_ops *def_vfs_ops, + vfs_op_tuple *vfs_init(int *vfs_version, const struct vfs_ops *def_vfs_ops, struct smb_vfs_handle_struct *vfs_handle); void vfs_done(connection_struct *conn); diff --git a/source3/lib/account_pol.c b/source3/lib/account_pol.c index e8b382c7ab9..2e619c0c6b3 100644 --- a/source3/lib/account_pol.c +++ b/source3/lib/account_pol.c @@ -118,7 +118,7 @@ BOOL account_policy_get(int field, uint32 *value) { fstring name; - if(!init_account_policy())return False; + init_account_policy(); *value = 0; @@ -142,7 +142,7 @@ BOOL account_policy_set(int field, uint32 value) { fstring name; - if(!init_account_policy())return False; + init_account_policy(); fstrcpy(name, decode_account_policy_name(field)); if (!*name) { diff --git a/source3/lib/domain_namemap.c b/source3/lib/domain_namemap.c deleted file mode 100644 index 988f5e5d659..00000000000 --- a/source3/lib/domain_namemap.c +++ /dev/null @@ -1,1317 +0,0 @@ -/* - Unix SMB/Netbios implementation. - Version 1.9. - Groupname handling - Copyright (C) Jeremy Allison 1998. - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -/* - * UNIX gid and Local or Domain SID resolution. This module resolves - * only those entries in the map files, it is *NOT* responsible for - * resolving UNIX groups not listed: that is an entirely different - * matter, altogether... - */ - -/* - * - * - - format of the file is: - - unixname NT Group name - unixname Domain Admins (well-known Domain Group) - unixname DOMAIN_NAME\NT Group name - unixname OTHER_DOMAIN_NAME\NT Group name - unixname DOMAIN_NAME\Domain Admins (well-known Domain Group) - .... - - if the DOMAIN_NAME\ component is left off, then your own domain is assumed. - - * - * - */ - - -#include "includes.h" -extern int DEBUGLEVEL; - -extern fstring global_myworkgroup; -extern DOM_SID global_member_sid; -extern fstring global_sam_name; -extern DOM_SID global_sam_sid; -extern DOM_SID global_sid_S_1_5_20; - -/******************************************************************* - converts UNIX uid to an NT User RID. NOTE: IS SOMETHING SPECIFIC TO SAMBA - ********************************************************************/ -static uid_t pwdb_user_rid_to_uid(uint32 user_rid) -{ - return ((user_rid & (~RID_TYPE_USER))- 1000)/RID_MULTIPLIER; -} - -/******************************************************************* - converts NT Group RID to a UNIX uid. NOTE: IS SOMETHING SPECIFIC TO SAMBA - ********************************************************************/ -static uint32 pwdb_group_rid_to_gid(uint32 group_rid) -{ - return ((group_rid & (~RID_TYPE_GROUP))- 1000)/RID_MULTIPLIER; -} - -/******************************************************************* - converts NT Alias RID to a UNIX uid. NOTE: IS SOMETHING SPECIFIC TO SAMBA - ********************************************************************/ -static uint32 pwdb_alias_rid_to_gid(uint32 alias_rid) -{ - return ((alias_rid & (~RID_TYPE_ALIAS))- 1000)/RID_MULTIPLIER; -} - -/******************************************************************* - converts NT Group RID to a UNIX uid. NOTE: IS SOMETHING SPECIFIC TO SAMBA - ********************************************************************/ -static uint32 pwdb_gid_to_group_rid(uint32 gid) -{ - uint32 grp_rid = ((((gid)*RID_MULTIPLIER) + 1000) | RID_TYPE_GROUP); - return grp_rid; -} - -/****************************************************************** - converts UNIX gid to an NT Alias RID. NOTE: IS SOMETHING SPECIFIC TO SAMBA - ********************************************************************/ -static uint32 pwdb_gid_to_alias_rid(uint32 gid) -{ - uint32 alias_rid = ((((gid)*RID_MULTIPLIER) + 1000) | RID_TYPE_ALIAS); - return alias_rid; -} - -/******************************************************************* - converts UNIX uid to an NT User RID. NOTE: IS SOMETHING SPECIFIC TO SAMBA - ********************************************************************/ -static uint32 pwdb_uid_to_user_rid(uint32 uid) -{ - uint32 user_rid = ((((uid)*RID_MULTIPLIER) + 1000) | RID_TYPE_USER); - return user_rid; -} - -/****************************************************************** - converts SID + SID_NAME_USE type to a UNIX id. the Domain SID is, - and can only be, our own SID. - ********************************************************************/ -static BOOL pwdb_sam_sid_to_unixid(DOM_SID *sid, uint8 type, uint32 *id) -{ - DOM_SID tmp_sid; - uint32 rid; - - sid_copy(&tmp_sid, sid); - sid_split_rid(&tmp_sid, &rid); - if (!sid_equal(&global_sam_sid, &tmp_sid)) - { - return False; - } - - switch (type) - { - case SID_NAME_USER: - { - *id = pwdb_user_rid_to_uid(rid); - return True; - } - case SID_NAME_ALIAS: - { - *id = pwdb_alias_rid_to_gid(rid); - return True; - } - case SID_NAME_DOM_GRP: - case SID_NAME_WKN_GRP: - { - *id = pwdb_group_rid_to_gid(rid); - return True; - } - } - return False; -} - -/****************************************************************** - converts UNIX gid + SID_NAME_USE type to a SID. the Domain SID is, - and can only be, our own SID. - ********************************************************************/ -static BOOL pwdb_unixid_to_sam_sid(uint32 id, uint8 type, DOM_SID *sid) -{ - sid_copy(sid, &global_sam_sid); - switch (type) - { - case SID_NAME_USER: - { - sid_append_rid(sid, pwdb_uid_to_user_rid(id)); - return True; - } - case SID_NAME_ALIAS: - { - sid_append_rid(sid, pwdb_gid_to_alias_rid(id)); - return True; - } - case SID_NAME_DOM_GRP: - case SID_NAME_WKN_GRP: - { - sid_append_rid(sid, pwdb_gid_to_group_rid(id)); - return True; - } - } - return False; -} - -/******************************************************************* - Decides if a RID is a well known RID. - ********************************************************************/ -static BOOL pwdb_rid_is_well_known(uint32 rid) -{ - return (rid < 1000); -} - -/******************************************************************* - determines a rid's type. NOTE: THIS IS SOMETHING SPECIFIC TO SAMBA - ********************************************************************/ -static uint32 pwdb_rid_type(uint32 rid) -{ - /* lkcl i understand that NT attaches an enumeration to a RID - * such that it can be identified as either a user, group etc - * type: SID_ENUM_TYPE. - */ - if (pwdb_rid_is_well_known(rid)) - { - /* - * The only well known user RIDs are DOMAIN_USER_RID_ADMIN - * and DOMAIN_USER_RID_GUEST. - */ - if (rid == DOMAIN_USER_RID_ADMIN || rid == DOMAIN_USER_RID_GUEST) - { - return RID_TYPE_USER; - } - if (DOMAIN_GROUP_RID_ADMINS <= rid && rid <= DOMAIN_GROUP_RID_GUESTS) - { - return RID_TYPE_GROUP; - } - if (BUILTIN_ALIAS_RID_ADMINS <= rid && rid <= BUILTIN_ALIAS_RID_REPLICATOR) - { - return RID_TYPE_ALIAS; - } - } - return (rid & RID_TYPE_MASK); -} - -/******************************************************************* - checks whether rid is a user rid. NOTE: THIS IS SOMETHING SPECIFIC TO SAMBA - ********************************************************************/ -BOOL pwdb_rid_is_user(uint32 rid) -{ - return pwdb_rid_type(rid) == RID_TYPE_USER; -} - -/************************************************************************** - Groupname map functionality. The code loads a groupname map file and - (currently) loads it into a linked list. This is slow and memory - hungry, but can be changed into a more efficient storage format - if the demands on it become excessive. -***************************************************************************/ - -typedef struct name_map -{ - ubi_slNode next; - DOM_NAME_MAP grp; - -} name_map_entry; - -static ubi_slList groupname_map_list; -static ubi_slList aliasname_map_list; -static ubi_slList ntusrname_map_list; - -static void delete_name_entry(name_map_entry *gmep) -{ - if (gmep->grp.nt_name) - { - free(gmep->grp.nt_name); - } - if (gmep->grp.nt_domain) - { - free(gmep->grp.nt_domain); - } - if (gmep->grp.unix_name) - { - free(gmep->grp.unix_name); - } - free((char*)gmep); -} - -/************************************************************************** - Delete all the entries in the name map list. -***************************************************************************/ - -static void delete_map_list(ubi_slList *map_list) -{ - name_map_entry *gmep; - - while ((gmep = (name_map_entry *)ubi_slRemHead(map_list )) != NULL) - { - delete_name_entry(gmep); - } -} - - -/************************************************************************** - makes a group sid out of a domain sid and a _unix_ gid. -***************************************************************************/ -static BOOL make_mydomain_sid(DOM_NAME_MAP *grp, DOM_MAP_TYPE type) -{ - int ret = False; - fstring sid_str; - - if (!map_domain_name_to_sid(&grp->sid, &(grp->nt_domain))) - { - DEBUG(0,("make_mydomain_sid: unknown domain %s\n", - grp->nt_domain)); - return False; - } - - if (sid_equal(&grp->sid, &global_sid_S_1_5_20)) - { - /* - * only builtin aliases are recognised in S-1-5-20 - */ - DEBUG(10,("make_mydomain_sid: group %s in builtin domain\n", - grp->nt_name)); - - if (lookup_builtin_alias_name(grp->nt_name, "BUILTIN", &grp->sid, &grp->type) != 0x0) - { - DEBUG(0,("unix group %s mapped to an unrecognised BUILTIN domain name %s\n", - grp->unix_name, grp->nt_name)); - return False; - } - ret = True; - } - else if (lookup_wk_user_name(grp->nt_name, grp->nt_domain, &grp->sid, &grp->type) == 0x0) - { - if (type != DOM_MAP_USER) - { - DEBUG(0,("well-known NT user %s\\%s listed in wrong map file\n", - grp->nt_domain, grp->nt_name)); - return False; - } - ret = True; - } - else if (lookup_wk_group_name(grp->nt_name, grp->nt_domain, &grp->sid, &grp->type) == 0x0) - { - if (type != DOM_MAP_DOMAIN) - { - DEBUG(0,("well-known NT group %s\\%s listed in wrong map file\n", - grp->nt_domain, grp->nt_name)); - return False; - } - ret = True; - } - else - { - switch (type) - { - case DOM_MAP_USER: - { - grp->type = SID_NAME_USER; - break; - } - case DOM_MAP_DOMAIN: - { - grp->type = SID_NAME_DOM_GRP; - break; - } - case DOM_MAP_LOCAL: - { - grp->type = SID_NAME_ALIAS; - break; - } - } - - ret = pwdb_unixid_to_sam_sid(grp->unix_id, grp->type, &grp->sid); - } - - sid_to_string(sid_str, &grp->sid); - DEBUG(10,("nt name %s\\%s gid %d mapped to %s\n", - grp->nt_domain, grp->nt_name, grp->unix_id, sid_str)); - return ret; -} - -/************************************************************************** - makes a group sid out of an nt domain, nt group name or a unix group name. -***************************************************************************/ -static BOOL unix_name_to_nt_name_info(DOM_NAME_MAP *map, DOM_MAP_TYPE type) -{ - /* - * Attempt to get the unix gid_t for this name. - */ - - DEBUG(5,("unix_name_to_nt_name_info: unix_name:%s\n", map->unix_name)); - - if (type == DOM_MAP_USER) - { - const struct passwd *pwptr = Get_Pwnam(map->unix_name, False); - if (pwptr == NULL) - { - DEBUG(0,("unix_name_to_nt_name_info: Get_Pwnam for user %s\ -failed. Error was %s.\n", map->unix_name, strerror(errno) )); - return False; - } - - map->unix_id = (uint32)pwptr->pw_uid; - } - else - { - struct group *gptr = getgrnam(map->unix_name); - if (gptr == NULL) - { - DEBUG(0,("unix_name_to_nt_name_info: getgrnam for group %s\ -failed. Error was %s.\n", map->unix_name, strerror(errno) )); - return False; - } - - map->unix_id = (uint32)gptr->gr_gid; - } - - DEBUG(5,("unix_name_to_nt_name_info: unix gid:%d\n", map->unix_id)); - - /* - * Now map the name to an NT SID+RID. - */ - - if (map->nt_domain != NULL && !strequal(map->nt_domain, global_sam_name)) - { - /* Must add client-call lookup code here, to - * resolve remote domain's sid and the group's rid, - * in that domain. - * - * NOTE: it is _incorrect_ to put code here that assumes - * we are responsible for lookups for foriegn domains' RIDs. - * - * for foriegn domains for which we are *NOT* the PDC, all - * we can be responsible for is the unix gid_t to which - * the foriegn SID+rid maps to, on this _local_ machine. - * we *CANNOT* make any short-cuts or assumptions about - * RIDs in a foriegn domain. - */ - - if (!map_domain_name_to_sid(&map->sid, &(map->nt_domain))) - { - DEBUG(0,("unix_name_to_nt_name_info: no known sid for %s\n", - map->nt_domain)); - return False; - } - } - - return make_mydomain_sid(map, type); -} - -static BOOL make_name_entry(name_map_entry **new_ep, - char *nt_domain, char *nt_group, char *unix_group, - DOM_MAP_TYPE type) -{ - /* - * Create the list entry and add it onto the list. - */ - - DEBUG(5,("make_name_entry:%s,%s,%s\n", nt_domain, nt_group, unix_group)); - - (*new_ep) = (name_map_entry *)malloc(sizeof(name_map_entry)); - if ((*new_ep) == NULL) - { - DEBUG(0,("make_name_entry: malloc fail for name_map_entry.\n")); - return False; - } - - ZERO_STRUCTP(*new_ep); - - (*new_ep)->grp.nt_name = strdup(nt_group ); - (*new_ep)->grp.nt_domain = strdup(nt_domain ); - (*new_ep)->grp.unix_name = strdup(unix_group); - - if ((*new_ep)->grp.nt_name == NULL || - (*new_ep)->grp.unix_name == NULL) - { - DEBUG(0,("make_name_entry: malloc fail for names in name_map_entry.\n")); - delete_name_entry((*new_ep)); - return False; - } - - /* - * look up the group names, make the Group-SID and unix gid - */ - - if (!unix_name_to_nt_name_info(&(*new_ep)->grp, type)) - { - delete_name_entry((*new_ep)); - return False; - } - - return True; -} - -/************************************************************************** - Load a name map file. Sets last accessed timestamp. -***************************************************************************/ -static ubi_slList *load_name_map(DOM_MAP_TYPE type) -{ - static time_t groupmap_file_last_modified = (time_t)0; - static time_t aliasmap_file_last_modified = (time_t)0; - static time_t ntusrmap_file_last_modified = (time_t)0; - static BOOL initialised_group = False; - static BOOL initialised_alias = False; - static BOOL initialised_ntusr = False; - char *groupname_map_file = lp_groupname_map(); - char *aliasname_map_file = lp_aliasname_map(); - char *ntusrname_map_file = lp_ntusrname_map(); - - FILE *fp; - char *s; - pstring buf; - name_map_entry *new_ep; - - time_t *file_last_modified = NULL; - int *initialised = NULL; - char *map_file = NULL; - ubi_slList *map_list = NULL; - - switch (type) - { - case DOM_MAP_DOMAIN: - { - file_last_modified = &groupmap_file_last_modified; - initialised = &initialised_group; - map_file = groupname_map_file; - map_list = &groupname_map_list; - - break; - } - case DOM_MAP_LOCAL: - { - file_last_modified = &aliasmap_file_last_modified; - initialised = &initialised_alias; - map_file = aliasname_map_file; - map_list = &aliasname_map_list; - - break; - } - case DOM_MAP_USER: - { - file_last_modified = &ntusrmap_file_last_modified; - initialised = &initialised_ntusr; - map_file = ntusrname_map_file; - map_list = &ntusrname_map_list; - - break; - } - } - - if (!(*initialised)) - { - DEBUG(10,("initialising map %s\n", map_file)); - ubi_slInitList(map_list); - (*initialised) = True; - } - - if (!*map_file) - { - return map_list; - } - - /* - * Load the file. - */ - - fp = open_file_if_modified(map_file, "r", file_last_modified); - if (!fp) - { - return map_list; - } - - /* - * Throw away any previous list. - */ - delete_map_list(map_list); - - DEBUG(4,("load_name_map: Scanning name map %s\n",map_file)); - - while ((s = fgets_slash(buf, sizeof(buf), fp)) != NULL) - { - pstring unixname; - pstring nt_name; - fstring nt_domain; - fstring ntname; - char *p; - - DEBUG(10,("Read line |%s|\n", s)); - - memset(nt_name, 0, sizeof(nt_name)); - - if (!*s || strchr("#;",*s)) - continue; - - if (!next_token(&s,unixname, "\t\n\r=", sizeof(unixname))) - continue; - - if (!next_token(&s,nt_name, "\t\n\r=", sizeof(nt_name))) - continue; - - trim_string(unixname, " ", " "); - trim_string(nt_name, " ", " "); - - if (!*nt_name) - continue; - - if (!*unixname) - continue; - - p = strchr(nt_name, '\\'); - - if (p == NULL) - { - memset(nt_domain, 0, sizeof(nt_domain)); - fstrcpy(ntname, nt_name); - } - else - { - *p = 0; - p++; - fstrcpy(nt_domain, nt_name); - fstrcpy(ntname , p); - } - - if (make_name_entry(&new_ep, nt_domain, ntname, unixname, type)) - { - ubi_slAddTail(map_list, (ubi_slNode *)new_ep); - DEBUG(5,("unixname = %s, ntname = %s\\%s type = %d\n", - new_ep->grp.unix_name, - new_ep->grp.nt_domain, - new_ep->grp.nt_name, - new_ep->grp.type)); - } - } - - DEBUG(10,("load_name_map: Added %ld entries to name map.\n", - ubi_slCount(map_list))); - - fclose(fp); - - return map_list; -} - -static void copy_grp_map_entry(DOM_NAME_MAP *grp, const DOM_NAME_MAP *from) -{ - sid_copy(&grp->sid, &from->sid); - grp->unix_id = from->unix_id; - grp->nt_name = from->nt_name; - grp->nt_domain = from->nt_domain; - grp->unix_name = from->unix_name; - grp->type = from->type; -} - -#if 0 -/*********************************************************** - Lookup unix name. -************************************************************/ -static BOOL map_unixname(DOM_MAP_TYPE type, - char *unixname, DOM_NAME_MAP *grp_info) -{ - name_map_entry *gmep; - ubi_slList *map_list; - - /* - * Initialise and load if not already loaded. - */ - map_list = load_name_map(type); - - for (gmep = (name_map_entry *)ubi_slFirst(map_list); - gmep != NULL; - gmep = (name_map_entry *)ubi_slNext(gmep )) - { - if (strequal(gmep->grp.unix_name, unixname)) - { - copy_grp_map_entry(grp_info, &gmep->grp); - DEBUG(7,("map_unixname: Mapping unix name %s to nt group %s.\n", - gmep->grp.unix_name, gmep->grp.nt_name )); - return True; - } - } - - return False; -} - -#endif - -/*********************************************************** - Lookup nt name. -************************************************************/ -static BOOL map_ntname(DOM_MAP_TYPE type, char *ntname, char *ntdomain, - DOM_NAME_MAP *grp_info) -{ - name_map_entry *gmep; - ubi_slList *map_list; - - /* - * Initialise and load if not already loaded. - */ - map_list = load_name_map(type); - - for (gmep = (name_map_entry *)ubi_slFirst(map_list); - gmep != NULL; - gmep = (name_map_entry *)ubi_slNext(gmep )) - { - if (strequal(gmep->grp.nt_name , ntname) && - strequal(gmep->grp.nt_domain, ntdomain)) - { - copy_grp_map_entry(grp_info, &gmep->grp); - DEBUG(7,("map_ntname: Mapping unix name %s to nt name %s.\n", - gmep->grp.unix_name, gmep->grp.nt_name )); - return True; - } - } - - return False; -} - - -/*********************************************************** - Lookup by SID -************************************************************/ -static BOOL map_sid(DOM_MAP_TYPE type, - DOM_SID *psid, DOM_NAME_MAP *grp_info) -{ - name_map_entry *gmep; - ubi_slList *map_list; - - /* - * Initialise and load if not already loaded. - */ - map_list = load_name_map(type); - - for (gmep = (name_map_entry *)ubi_slFirst(map_list); - gmep != NULL; - gmep = (name_map_entry *)ubi_slNext(gmep )) - { - if (sid_equal(&gmep->grp.sid, psid)) - { - copy_grp_map_entry(grp_info, &gmep->grp); - DEBUG(7,("map_sid: Mapping unix name %s to nt name %s.\n", - gmep->grp.unix_name, gmep->grp.nt_name )); - return True; - } - } - - return False; -} - -/*********************************************************** - Lookup by gid_t. -************************************************************/ -static BOOL map_unixid(DOM_MAP_TYPE type, uint32 unix_id, DOM_NAME_MAP *grp_info) -{ - name_map_entry *gmep; - ubi_slList *map_list; - - /* - * Initialise and load if not already loaded. - */ - map_list = load_name_map(type); - - for (gmep = (name_map_entry *)ubi_slFirst(map_list); - gmep != NULL; - gmep = (name_map_entry *)ubi_slNext(gmep )) - { - fstring sid_str; - sid_to_string(sid_str, &gmep->grp.sid); - DEBUG(10,("map_unixid: enum entry unix group %s %d nt %s %s\n", - gmep->grp.unix_name, gmep->grp.unix_id, gmep->grp.nt_name, sid_str)); - if (gmep->grp.unix_id == unix_id) - { - copy_grp_map_entry(grp_info, &gmep->grp); - DEBUG(7,("map_unixid: Mapping unix name %s to nt name %s type %d\n", - gmep->grp.unix_name, gmep->grp.nt_name, gmep->grp.type)); - return True; - } - } - - return False; -} - -/*********************************************************** - * - * Call four functions to resolve unix group ids and either - * local group SIDs or domain group SIDs listed in the local group - * or domain group map files. - * - * Note that it is *NOT* the responsibility of these functions to - * resolve entries that are not in the map files. - * - * Any SID can be in the map files (i.e from any Domain). - * - ***********************************************************/ - -#if 0 - -/*********************************************************** - Lookup a UNIX Group entry by name. -************************************************************/ -BOOL map_unix_group_name(char *group_name, DOM_NAME_MAP *grp_info) -{ - return map_unixname(DOM_MAP_DOMAIN, group_name, grp_info); -} - -/*********************************************************** - Lookup a UNIX Alias entry by name. -************************************************************/ -BOOL map_unix_alias_name(char *alias_name, DOM_NAME_MAP *grp_info) -{ - return map_unixname(DOM_MAP_LOCAL, alias_name, grp_info); -} - -/*********************************************************** - Lookup an Alias name entry -************************************************************/ -BOOL map_nt_alias_name(char *ntalias_name, char *nt_domain, DOM_NAME_MAP *grp_info) -{ - return map_ntname(DOM_MAP_LOCAL, ntalias_name, nt_domain, grp_info); -} - -/*********************************************************** - Lookup a Group entry -************************************************************/ -BOOL map_nt_group_name(char *ntgroup_name, char *nt_domain, DOM_NAME_MAP *grp_info) -{ - return map_ntname(DOM_MAP_DOMAIN, ntgroup_name, nt_domain, grp_info); -} - -#endif - -/*********************************************************** - Lookup a Username entry by name. -************************************************************/ -static BOOL map_nt_username(char *nt_name, char *nt_domain, DOM_NAME_MAP *grp_info) -{ - return map_ntname(DOM_MAP_USER, nt_name, nt_domain, grp_info); -} - -/*********************************************************** - Lookup a Username entry by SID. -************************************************************/ -static BOOL map_username_sid(DOM_SID *sid, DOM_NAME_MAP *grp_info) -{ - return map_sid(DOM_MAP_USER, sid, grp_info); -} - -/*********************************************************** - Lookup a Username SID entry by uid. -************************************************************/ -static BOOL map_username_uid(uid_t gid, DOM_NAME_MAP *grp_info) -{ - return map_unixid(DOM_MAP_USER, (uint32)gid, grp_info); -} - -/*********************************************************** - Lookup an Alias SID entry by name. -************************************************************/ -BOOL map_alias_sid(DOM_SID *psid, DOM_NAME_MAP *grp_info) -{ - return map_sid(DOM_MAP_LOCAL, psid, grp_info); -} - -/*********************************************************** - Lookup a Group entry by sid. -************************************************************/ -BOOL map_group_sid(DOM_SID *psid, DOM_NAME_MAP *grp_info) -{ - return map_sid(DOM_MAP_DOMAIN, psid, grp_info); -} - -/*********************************************************** - Lookup an Alias SID entry by gid_t. -************************************************************/ -static BOOL map_alias_gid(gid_t gid, DOM_NAME_MAP *grp_info) -{ - return map_unixid(DOM_MAP_LOCAL, (uint32)gid, grp_info); -} - -/*********************************************************** - Lookup a Group SID entry by gid_t. -************************************************************/ -static BOOL map_group_gid( gid_t gid, DOM_NAME_MAP *grp_info) -{ - return map_unixid(DOM_MAP_DOMAIN, (uint32)gid, grp_info); -} - - -/************************************************************************ - Routine to look up User details by UNIX name -*************************************************************************/ -BOOL lookupsmbpwnam(const char *unix_usr_name, DOM_NAME_MAP *grp) -{ - uid_t uid; - DEBUG(10,("lookupsmbpwnam: unix user name %s\n", unix_usr_name)); - if (nametouid(unix_usr_name, &uid)) - { - return lookupsmbpwuid(uid, grp); - } - else - { - return False; - } -} - -/************************************************************************ - Routine to look up a remote nt name -*************************************************************************/ -static BOOL lookup_remote_ntname(const char *ntname, DOM_SID *sid, uint8 *type) -{ - struct cli_state cli; - POLICY_HND lsa_pol; - fstring srv_name; - extern struct ntuser_creds *usr_creds; - struct ntuser_creds usr; - - BOOL res3 = True; - BOOL res4 = True; - uint32 num_sids; - DOM_SID *sids; - uint8 *types; - char *names[1]; - - usr_creds = &usr; - - ZERO_STRUCT(usr); - pwd_set_nullpwd(&usr.pwd); - - DEBUG(5,("lookup_remote_ntname: %s\n", ntname)); - - if (!cli_connect_serverlist(&cli, lp_passwordserver())) - { - return False; - } - - names[0] = ntname; - - fstrcpy(srv_name, "\\\\"); - fstrcat(srv_name, cli.desthost); - strupper(srv_name); - - /* lookup domain controller; receive a policy handle */ - res3 = res3 ? lsa_open_policy( srv_name, - &lsa_pol, True) : False; - - /* send lsa lookup sids call */ - res4 = res3 ? lsa_lookup_names( &lsa_pol, - 1, names, - &sids, &types, &num_sids) : False; - - res3 = res3 ? lsa_close(&lsa_pol) : False; - - if (res4 && res3 && sids != NULL && types != NULL) - { - sid_copy(sid, &sids[0]); - *type = types[0]; - } - else - { - res3 = False; - } - if (types != NULL) - { - free(types); - } - - if (sids != NULL) - { - free(sids); - } - - return res3 && res4; -} - -/************************************************************************ - Routine to look up a remote nt name -*************************************************************************/ -static BOOL get_sid_and_type(const char *fullntname, uint8 expected_type, - DOM_NAME_MAP *gmep) -{ - /* - * check with the PDC to see if it owns the name. if so, - * the SID is resolved with the PDC database. - */ - - if (lp_server_role() == ROLE_DOMAIN_MEMBER) - { - if (lookup_remote_ntname(fullntname, &gmep->sid, &gmep->type)) - { - if (sid_front_equal(&gmep->sid, &global_member_sid) && - strequal(gmep->nt_domain, global_myworkgroup) && - gmep->type == expected_type) - { - return True; - } - return False; - } - } - - /* - * ... otherwise, it's one of ours. map the sid ourselves, - * which can only happen in our own SAM database. - */ - - if (!strequal(gmep->nt_domain, global_sam_name)) - { - return False; - } - if (!pwdb_unixid_to_sam_sid(gmep->unix_id, gmep->type, &gmep->sid)) - { - return False; - } - - return True; -} - -/* - * used by lookup functions below - */ - -static fstring nt_name; -static fstring unix_name; -static fstring nt_domain; - -/************************************************************************* - looks up a uid, returns User Information. -*************************************************************************/ -BOOL lookupsmbpwuid(uid_t uid, DOM_NAME_MAP *gmep) -{ - DEBUG(10,("lookupsmbpwuid: unix uid %d\n", uid)); - if (map_username_uid(uid, gmep)) - { - return True; - } -#if 0 - if (lp_server_role() != ROLE_DOMAIN_NONE) -#endif - { - gmep->nt_name = nt_name; - gmep->unix_name = unix_name; - gmep->nt_domain = nt_domain; - - gmep->unix_id = (uint32)uid; - - /* - * ok, assume it's one of ours. then double-check it - * if we are a member of a domain - */ - - gmep->type = SID_NAME_USER; - fstrcpy(gmep->nt_name, uidtoname(uid)); - fstrcpy(gmep->unix_name, gmep->nt_name); - - /* - * here we should do a LsaLookupNames() call - * to check the status of the name with the PDC. - * if the PDC know nothing of the name, it's ours. - */ - - if (lp_server_role() == ROLE_DOMAIN_MEMBER) - { -#if 0 - lsa_lookup_names(global_myworkgroup, gmep->nt_name, &gmep->sid...); -#endif - } - - /* - * ok, it's one of ours. - */ - - gmep->nt_domain = global_sam_name; - pwdb_unixid_to_sam_sid(gmep->unix_id, gmep->type, &gmep->sid); - - return True; - } - - /* oops. */ - - return False; -} - -/************************************************************************* - looks up by NT name, returns User Information. -*************************************************************************/ -BOOL lookupsmbpwntnam(const char *fullntname, DOM_NAME_MAP *gmep) -{ - DEBUG(10,("lookupsmbpwntnam: nt user name %s\n", fullntname)); - - if (!split_domain_name(fullntname, nt_domain, nt_name)) - { - return False; - } - - if (map_nt_username(nt_name, nt_domain, gmep)) - { - return True; - } - if (lp_server_role() != ROLE_DOMAIN_NONE) - { - uid_t uid; - gmep->nt_name = nt_name; - gmep->unix_name = unix_name; - gmep->nt_domain = nt_domain; - - /* - * ok, it's one of ours. we therefore "create" an nt user named - * after the unix user. this is the point where "appliance mode" - * should get its teeth in, as unix users won't really exist, - * they will only be numbers... - */ - - gmep->type = SID_NAME_USER; - fstrcpy(gmep->unix_name, gmep->nt_name); - if (!nametouid(gmep->unix_name, &uid)) - { - return False; - } - gmep->unix_id = (uint32)uid; - - return get_sid_and_type(fullntname, gmep->type, gmep); - } - - /* oops. */ - - return False; -} - -/************************************************************************* - looks up by RID, returns User Information. -*************************************************************************/ -BOOL lookupsmbpwsid(DOM_SID *sid, DOM_NAME_MAP *gmep) -{ - fstring sid_str; - sid_to_string(sid_str, sid); - DEBUG(10,("lookupsmbpwsid: nt sid %s\n", sid_str)); - - if (map_username_sid(sid, gmep)) - { - return True; - } - if (lp_server_role() != ROLE_DOMAIN_NONE) - { - gmep->nt_name = nt_name; - gmep->unix_name = unix_name; - gmep->nt_domain = nt_domain; - - /* - * here we should do a LsaLookupNames() call - * to check the status of the name with the PDC. - * if the PDC know nothing of the name, it's ours. - */ - - if (lp_server_role() == ROLE_DOMAIN_MEMBER) - { -#if 0 - if (lookup_remote_sid(global_myworkgroup, gmep->sid, gmep->nt_name, gmep->nt_domain...); -#endif - } - - /* - * ok, it's one of ours. we therefore "create" an nt user named - * after the unix user. this is the point where "appliance mode" - * should get its teeth in, as unix users won't really exist, - * they will only be numbers... - */ - - gmep->type = SID_NAME_USER; - sid_copy(&gmep->sid, sid); - if (!pwdb_sam_sid_to_unixid(&gmep->sid, gmep->type, &gmep->unix_id)) - { - return False; - } - fstrcpy(gmep->nt_name, uidtoname((uid_t)gmep->unix_id)); - fstrcpy(gmep->unix_name, gmep->nt_name); - gmep->nt_domain = global_sam_name; - - return True; - } - - /* oops. */ - - return False; -} - -/************************************************************************ - Routine to look up group / alias / well-known group RID by UNIX name -*************************************************************************/ -BOOL lookupsmbgrpnam(const char *unix_grp_name, DOM_NAME_MAP *grp) -{ - gid_t gid; - DEBUG(10,("lookupsmbgrpnam: unix user group %s\n", unix_grp_name)); - if (nametogid(unix_grp_name, &gid)) - { - return lookupsmbgrpgid(gid, grp); - } - else - { - return False; - } -} - -/************************************************************************* - looks up a SID, returns name map entry -*************************************************************************/ -BOOL lookupsmbgrpsid(DOM_SID *sid, DOM_NAME_MAP *gmep) -{ - fstring sid_str; - sid_to_string(sid_str, sid); - DEBUG(10,("lookupsmbgrpsid: nt sid %s\n", sid_str)); - - if (map_alias_sid(sid, gmep)) - { - return True; - } - if (map_group_sid(sid, gmep)) - { - return True; - } - if (lp_server_role() != ROLE_DOMAIN_NONE) - { - gmep->nt_name = nt_name; - gmep->unix_name = unix_name; - gmep->nt_domain = nt_domain; - - /* - * here we should do a LsaLookupNames() call - * to check the status of the name with the PDC. - * if the PDC know nothing of the name, it's ours. - */ - - if (lp_server_role() == ROLE_DOMAIN_MEMBER) - { -#if 0 - lsa_lookup_sids(global_myworkgroup, gmep->sid, gmep->nt_name, gmep->nt_domain...); -#endif - } - - /* - * ok, it's one of ours. we therefore "create" an nt group or - * alias name named after the unix group. this is the point - * where "appliance mode" should get its teeth in, as unix - * groups won't really exist, they will only be numbers... - */ - - /* name is not explicitly mapped - * with map files or the PDC - * so we are responsible for it... - */ - - if (lp_server_role() == ROLE_DOMAIN_MEMBER) - { - /* ... as a LOCAL group. */ - gmep->type = SID_NAME_ALIAS; - } - else - { - /* ... as a DOMAIN group. */ - gmep->type = SID_NAME_DOM_GRP; - } - - sid_copy(&gmep->sid, sid); - if (!pwdb_sam_sid_to_unixid(&gmep->sid, gmep->type, &gmep->unix_id)) - { - return False; - } - fstrcpy(gmep->nt_name, gidtoname((gid_t)gmep->unix_id)); - fstrcpy(gmep->unix_name, gmep->nt_name); - gmep->nt_domain = global_sam_name; - - return True; - } - - /* oops */ - return False; -} - -/************************************************************************* - looks up a gid, returns RID and type local, domain or well-known domain group -*************************************************************************/ -BOOL lookupsmbgrpgid(gid_t gid, DOM_NAME_MAP *gmep) -{ - DEBUG(10,("lookupsmbgrpgid: unix gid %d\n", (int)gid)); - if (map_alias_gid(gid, gmep)) - { - return True; - } - if (map_group_gid(gid, gmep)) - { - return True; - } - if (lp_server_role() != ROLE_DOMAIN_NONE) - { - gmep->nt_name = nt_name; - gmep->unix_name = unix_name; - gmep->nt_domain = nt_domain; - - gmep->unix_id = (uint32)gid; - - /* - * here we should do a LsaLookupNames() call - * to check the status of the name with the PDC. - * if the PDC know nothing of the name, it's ours. - */ - - if (lp_server_role() == ROLE_DOMAIN_MEMBER) - { -#if 0 - if (lsa_lookup_names(global_myworkgroup, gmep->nt_name, &gmep->sid...); - { - return True; - } -#endif - } - - /* - * ok, it's one of ours. we therefore "create" an nt group or - * alias name named after the unix group. this is the point - * where "appliance mode" should get its teeth in, as unix - * groups won't really exist, they will only be numbers... - */ - - /* name is not explicitly mapped - * with map files or the PDC - * so we are responsible for it... - */ - - if (lp_server_role() == ROLE_DOMAIN_MEMBER) - { - /* ... as a LOCAL group. */ - gmep->type = SID_NAME_ALIAS; - } - else - { - /* ... as a DOMAIN group. */ - gmep->type = SID_NAME_DOM_GRP; - } - fstrcpy(gmep->nt_name, gidtoname(gid)); - fstrcpy(gmep->unix_name, gmep->nt_name); - - return get_sid_and_type(gmep->nt_name, gmep->type, gmep); - } - - /* oops */ - return False; -} - diff --git a/source3/lib/gencache.c b/source3/lib/gencache.c index 40b4d1390dc..baec0e3b376 100644 --- a/source3/lib/gencache.c +++ b/source3/lib/gencache.c @@ -94,12 +94,12 @@ BOOL gencache_shutdown(void) * Set an entry in the cache file. If there's no such * one, then add it. * - * @param keystr string that represents a key of this entry + * @param key string that represents a key of this entry * @param value text representation value being cached * @param timeout time when the value is expired * - * @retval true when entry is successfuly stored - * @retval false on failure + * @return true when entry is successfuly stored or + * false on the attempt's failure **/ BOOL gencache_set(const char *keystr, const char *value, time_t timeout) @@ -137,12 +137,12 @@ BOOL gencache_set(const char *keystr, const char *value, time_t timeout) /** * Set existing entry to the cache file. * - * @param keystr string that represents a key of this entry - * @param valstr text representation value being cached + * @param key string that represents a key of this entry + * @param value text representation value being cached * @param timeout time when the value is expired * - * @retval true when entry is successfuly set - * @retval false on failure + * @return true when entry is successfuly set or + * false on the attempt's failure **/ BOOL gencache_set_only(const char *keystr, const char *valstr, time_t timeout) @@ -192,10 +192,10 @@ BOOL gencache_set_only(const char *keystr, const char *valstr, time_t timeout) /** * Delete one entry from the cache file. * - * @param keystr string that represents a key of this entry + * @param key string that represents a key of this entry * - * @retval true upon successful deletion - * @retval false in case of failure + * @return true upon successful deletion or + * false in case of failure **/ BOOL gencache_del(const char *keystr) @@ -221,14 +221,14 @@ BOOL gencache_del(const char *keystr) /** * Get existing entry from the cache file. * - * @param keystr string that represents a key of this entry - * @param valstr buffer that is allocated and filled with the entry value + * @param key string that represents a key of this entry + * @param value buffer that is allocated and filled with the entry value * buffer's disposing must be done outside * @param timeout pointer to a time_t that is filled with entry's * timeout * - * @retval true when entry is successfuly fetched - * @retval False for failure + * @return true when entry is successfuly fetched or + * false on the failure **/ BOOL gencache_get(const char *keystr, char **valstr, time_t *timeout) diff --git a/source3/lib/genparser.c b/source3/lib/genparser.c deleted file mode 100644 index 233050b4327..00000000000 --- a/source3/lib/genparser.c +++ /dev/null @@ -1,786 +0,0 @@ -/* - Copyright (C) Andrew Tridgell 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -/* - automatic marshalling/unmarshalling system for C structures -*/ - -#include "includes.h" - -/* see if a range of memory is all zero. Used to prevent dumping of zero elements */ -static int all_zero(const char *ptr, unsigned size) -{ - int i; - if (!ptr) return 1; - for (i=0;i>4]; - p[2] = hexdig[c&0xF]; - p += 3; - } - } - - *p = 0; - - return ret; -} - -/* decode an escaped string from encode_bytes() into a buffer */ -static char *decode_bytes(TALLOC_CTX *mem_ctx, const char *s, unsigned *len) -{ - char *ret, *p; - unsigned i; - int slen = strlen(s) + 1; - - ret = talloc(mem_ctx, slen); /* worst case length */ - if (!ret) - return NULL; - memset(ret, 0, slen); - - if (*s == '{') s++; - - for (p=ret,i=0;s[i];i++) { - if (s[i] == '}') { - break; - } else if (s[i] == '\\') { - unsigned v; - if (sscanf(&s[i+1], "%02x", &v) != 1 || v > 255) { - return NULL; - } - *(unsigned char *)p = v; - p++; - i += 2; - } else { - *p++ = s[i]; - } - } - *p = 0; - - (*len) = (unsigned)(p - ret); - - return ret; -} - -/* the add*() functions deal with adding things to a struct - parse_string */ - -/* allocate more space if needed */ -static int addgen_alloc(TALLOC_CTX *mem_ctx, struct parse_string *p, int n) -{ - if (p->length + n <= p->allocated) return 0; - p->allocated = p->length + n + 200; - p->s = talloc_realloc(mem_ctx, p->s, p->allocated); - if (!p->s) { - errno = ENOMEM; - return -1; - } - return 0; -} - -/* add a character to the buffer */ -static int addchar(TALLOC_CTX *mem_ctx, struct parse_string *p, char c) -{ - if (addgen_alloc(mem_ctx, p, 2) != 0) { - return -1; - } - p->s[p->length++] = c; - p->s[p->length] = 0; - return 0; -} - -/* add a string to the buffer */ -int addstr(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *s) -{ - int len = strlen(s); - if (addgen_alloc(mem_ctx, p, len+1) != 0) { - return -1; - } - memcpy(p->s + p->length, s, len+1); - p->length += len; - return 0; -} - -/* add a string to the buffer with a tab prefix */ -static int addtabbed(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *s, unsigned indent) -{ - int len = strlen(s); - if (addgen_alloc(mem_ctx, p, indent+len+1) != 0) { - return -1; - } - while (indent--) { - p->s[p->length++] = '\t'; - } - memcpy(p->s + p->length, s, len+1); - p->length += len; - return 0; -} - -/* note! this can only be used for results up to 60 chars wide! */ -int addshort(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *fmt, ...) -{ - char buf[60]; - int n; - va_list ap; - va_start(ap, fmt); - n = vsnprintf(buf, sizeof(buf), fmt, ap); - va_end(ap); - if (addgen_alloc(mem_ctx, p, n + 1) != 0) { - return -1; - } - if (n != 0) { - memcpy(p->s + p->length, buf, n); - } - p->length += n; - p->s[p->length] = 0; - return 0; -} - -/* - this is here to make it easier for people to write dump functions - for their own types - */ -int gen_addgen(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *fmt, ...) -{ - char *buf = NULL; - int n; - va_list ap; - va_start(ap, fmt); - n = vasprintf(&buf, fmt, ap); - va_end(ap); - if (addgen_alloc(mem_ctx, p, n + 1) != 0) { - if (buf) free(buf); - return -1; - } - if (n != 0) { - memcpy(p->s + p->length, buf, n); - } - p->length += n; - p->s[p->length] = 0; - if (buf) free(buf); - return 0; -} - -/* dump a enumerated type */ -int gen_dump_enum(TALLOC_CTX *mem_ctx, - const struct enum_struct *einfo, - struct parse_string *p, - const char *ptr, - unsigned indent) -{ - unsigned v = *(unsigned *)ptr; - int i; - for (i=0;einfo[i].name;i++) { - if (v == einfo[i].value) { - addstr(mem_ctx, p, einfo[i].name); - return 0; - } - } - /* hmm, maybe we should just fail? */ - return gen_dump_unsigned(mem_ctx, p, ptr, indent); -} - -/* dump a single non-array element, hanlding struct and enum */ -static int gen_dump_one(TALLOC_CTX *mem_ctx, - struct parse_string *p, - const struct parse_struct *pinfo, - const char *ptr, - unsigned indent) -{ - if (pinfo->dump_fn == gen_dump_char && pinfo->ptr_count == 1) { - char *s = encode_bytes(mem_ctx, ptr, strlen(ptr)); - if (addchar(mem_ctx, p,'{') || - addstr(mem_ctx, p, s) || - addstr(mem_ctx, p, "}")) { - return -1; - } - return 0; - } - - return pinfo->dump_fn(mem_ctx, p, ptr, indent); -} - -/* handle dumping of an array of arbitrary type */ -static int gen_dump_array(TALLOC_CTX *mem_ctx, - struct parse_string *p, - const struct parse_struct *pinfo, - const char *ptr, - int array_len, - int indent) -{ - int i, count=0; - - /* special handling of fixed length strings */ - if (array_len != 0 && - pinfo->ptr_count == 0 && - pinfo->dump_fn == gen_dump_char) { - char *s = encode_bytes(mem_ctx, ptr, array_len); - if (!s) return -1; - if (addtabbed(mem_ctx, p, pinfo->name, indent) || - addstr(mem_ctx, p, " = {") || - addstr(mem_ctx, p, s) || - addstr(mem_ctx, p, "}\n")) { - return -1; - } - free(s); - return 0; - } - - for (i=0;isize; - - /* generic pointer dereference */ - if (pinfo->ptr_count) { - p2 = *(const char **)ptr; - size = sizeof(void *); - } - - if ((count || pinfo->ptr_count) && - !(pinfo->flags & FLAG_ALWAYS) && - all_zero(ptr, size)) { - ptr += size; - continue; - } - if (count == 0) { - if (addtabbed(mem_ctx, p, pinfo->name, indent) || - addshort(mem_ctx, p, " = %u:", i)) { - return -1; - } - } else { - if (addshort(mem_ctx, p, ", %u:", i) != 0) { - return -1; - } - } - if (gen_dump_one(mem_ctx, p, pinfo, p2, indent) != 0) { - return -1; - } - ptr += size; - count++; - } - if (count) { - return addstr(mem_ctx, p, "\n"); - } - return 0; -} - -/* find a variable by name in a loaded structure and return its value - as an integer. Used to support dynamic arrays */ -static int find_var(const struct parse_struct *pinfo, - const char *data, - const char *var) -{ - int i; - const char *ptr; - - /* this allows for constant lengths */ - if (isdigit(*var)) { - return atoi(var); - } - - for (i=0;pinfo[i].name;i++) { - if (strcmp(pinfo[i].name, var) == 0) break; - } - if (!pinfo[i].name) return -1; - - ptr = data + pinfo[i].offset; - - switch (pinfo[i].size) { - case sizeof(int): - return *(int *)ptr; - case sizeof(char): - return *(char *)ptr; - } - - return -1; -} - - -int gen_dump_struct(TALLOC_CTX *mem_ctx, - const struct parse_struct *pinfo, - struct parse_string *p, - const char *ptr, - unsigned indent) -{ - char *s = gen_dump(mem_ctx, pinfo, ptr, indent+1); - if (!s) return -1; - if (addstr(mem_ctx, p, "{\n") || - addstr(mem_ctx, p, s) || - addtabbed(mem_ctx, p, "}", indent)) { - return -1; - } - return 0; -} - -static int gen_dump_string(TALLOC_CTX *mem_ctx, - struct parse_string *p, - const struct parse_struct *pinfo, - const char *data, - unsigned indent) -{ - const char *ptr = *(char **)data; - char *s = encode_bytes(mem_ctx, ptr, strlen(ptr)); - if (addtabbed(mem_ctx, p, pinfo->name, indent) || - addstr(mem_ctx, p, " = ") || - addchar(mem_ctx, p, '{') || - addstr(mem_ctx, p, s) || - addstr(mem_ctx, p, "}\n")) { - return -1; - } - return 0; -} - -/* - find the length of a nullterm array -*/ -static int len_nullterm(const char *ptr, int size, int array_len) -{ - int len; - - if (size == 1) { - len = strnlen(ptr, array_len); - } else { - for (len=0; len < array_len; len++) { - if (all_zero(ptr+len*size, size)) break; - } - } - - if (len == 0) len = 1; - - return len; -} - - -/* the generic dump routine. Scans the parse information for this structure - and processes it recursively */ -char *gen_dump(TALLOC_CTX *mem_ctx, - const struct parse_struct *pinfo, - const char *data, - unsigned indent) -{ - struct parse_string p; - int i; - - p.length = 0; - p.allocated = 0; - p.s = NULL; - - if (addstr(mem_ctx, &p, "") != 0) { - return NULL; - } - - for (i=0;pinfo[i].name;i++) { - const char *ptr = data + pinfo[i].offset; - unsigned size = pinfo[i].size; - - if (pinfo[i].ptr_count) { - size = sizeof(void *); - } - - /* special handling for array types */ - if (pinfo[i].array_len) { - unsigned len = pinfo[i].array_len; - if (pinfo[i].flags & FLAG_NULLTERM) { - len = len_nullterm(ptr, size, len); - } - if (gen_dump_array(mem_ctx, &p, &pinfo[i], ptr, - len, indent)) { - goto failed; - } - continue; - } - - /* and dynamically sized arrays */ - if (pinfo[i].dynamic_len) { - int len = find_var(pinfo, data, pinfo[i].dynamic_len); - struct parse_struct p2 = pinfo[i]; - if (len < 0) { - goto failed; - } - if (len > 0) { - if (pinfo[i].flags & FLAG_NULLTERM) { - len = len_nullterm(*(char **)ptr, - pinfo[i].size, len); - } - p2.ptr_count--; - p2.dynamic_len = NULL; - if (gen_dump_array(mem_ctx, &p, &p2, - *(char **)ptr, - len, indent) != 0) { - goto failed; - } - } - continue; - } - - /* don't dump zero elements */ - if (!(pinfo[i].flags & FLAG_ALWAYS) && all_zero(ptr, size)) continue; - - /* assume char* is a null terminated string */ - if (pinfo[i].size == 1 && pinfo[i].ptr_count == 1 && - pinfo[i].dump_fn == gen_dump_char) { - if (gen_dump_string(mem_ctx, &p, &pinfo[i], ptr, indent) != 0) { - goto failed; - } - continue; - } - - /* generic pointer dereference */ - if (pinfo[i].ptr_count) { - ptr = *(const char **)ptr; - } - - if (addtabbed(mem_ctx, &p, pinfo[i].name, indent) || - addstr(mem_ctx, &p, " = ") || - gen_dump_one(mem_ctx, &p, &pinfo[i], ptr, indent) || - addstr(mem_ctx, &p, "\n")) { - goto failed; - } - } - return p.s; - -failed: - return NULL; -} - -/* search for a character in a string, skipping over sections within - matching braces */ -static char *match_braces(char *s, char c) -{ - int depth = 0; - while (*s) { - switch (*s) { - case '}': - depth--; - break; - case '{': - depth++; - break; - } - if (depth == 0 && *s == c) { - return s; - } - s++; - } - return s; -} - -/* parse routine for enumerated types */ -int gen_parse_enum(TALLOC_CTX *mem_ctx, - const struct enum_struct *einfo, - char *ptr, - const char *str) -{ - unsigned v; - int i; - - if (isdigit(*str)) { - if (sscanf(str, "%u", &v) != 1) { - errno = EINVAL; - return -1; - } - *(unsigned *)ptr = v; - return 0; - } - - for (i=0;einfo[i].name;i++) { - if (strcmp(einfo[i].name, str) == 0) { - *(unsigned *)ptr = einfo[i].value; - return 0; - } - } - - /* unknown enum value?? */ - return -1; -} - - -/* parse all base types */ -static int gen_parse_base(TALLOC_CTX *mem_ctx, - const struct parse_struct *pinfo, - char *ptr, - const char *str) -{ - if (pinfo->parse_fn == gen_parse_char && pinfo->ptr_count==1) { - unsigned len; - char *s = decode_bytes(mem_ctx, str, &len); - if (!s) return -1; - *(char **)ptr = s; - return 0; - } - - if (pinfo->ptr_count) { - unsigned size = pinfo->ptr_count>1?sizeof(void *):pinfo->size; - struct parse_struct p2 = *pinfo; - *(void **)ptr = talloc(mem_ctx, size); - if (! *(void **)ptr) { - return -1; - } - memset(*(void **)ptr, 0, size); - ptr = *(char **)ptr; - p2.ptr_count--; - return gen_parse_base(mem_ctx, &p2, ptr, str); - } - - return pinfo->parse_fn(mem_ctx, ptr, str); -} - -/* parse a generic array */ -static int gen_parse_array(TALLOC_CTX *mem_ctx, - const struct parse_struct *pinfo, - char *ptr, - const char *str, - int array_len) -{ - char *p, *p2; - unsigned size = pinfo->size; - - /* special handling of fixed length strings */ - if (array_len != 0 && - pinfo->ptr_count == 0 && - pinfo->dump_fn == gen_dump_char) { - unsigned len = 0; - char *s = decode_bytes(mem_ctx, str, &len); - if (!s || (len > array_len)) return -1; - memset(ptr, 0, array_len); - memcpy(ptr, s, len); - return 0; - } - - if (pinfo->ptr_count) { - size = sizeof(void *); - } - - while (*str) { - unsigned idx; - int done; - - idx = atoi(str); - p = strchr(str,':'); - if (!p) break; - p++; - p2 = match_braces(p, ','); - done = (*p2 != ','); - *p2 = 0; - - if (*p == '{') { - p++; - p[strlen(p)-1] = 0; - } - - if (gen_parse_base(mem_ctx, pinfo, ptr + idx*size, p) != 0) { - return -1; - } - - if (done) break; - str = p2+1; - } - - return 0; -} - -/* parse one element, hanlding dynamic and static arrays */ -static int gen_parse_one(TALLOC_CTX *mem_ctx, - const struct parse_struct *pinfo, - const char *name, - char *data, - const char *str) -{ - int i; - for (i=0;pinfo[i].name;i++) { - if (strcmp(pinfo[i].name, name) == 0) { - break; - } - } - if (pinfo[i].name == NULL) { - return 0; - } - - if (pinfo[i].array_len) { - return gen_parse_array(mem_ctx, &pinfo[i], - data+pinfo[i].offset, - str, pinfo[i].array_len); - } - - if (pinfo[i].dynamic_len) { - int len = find_var(pinfo, data, pinfo[i].dynamic_len); - if (len < 0) { - errno = EINVAL; - return -1; - } - if (len > 0) { - struct parse_struct p2 = pinfo[i]; - char *ptr; - unsigned size = pinfo[i].ptr_count>1?sizeof(void*):pinfo[i].size; - ptr = talloc(mem_ctx, len*size); - if (!ptr) { - errno = ENOMEM; - return -1; - } - memset(ptr, 0, len*size); - *((char **)(data + pinfo[i].offset)) = ptr; - p2.ptr_count--; - p2.dynamic_len = NULL; - return gen_parse_array(mem_ctx, &p2, ptr, str, len); - } - return 0; - } - - return gen_parse_base(mem_ctx, &pinfo[i], data + pinfo[i].offset, str); -} - -int gen_parse_struct(TALLOC_CTX * mem_ctx, const struct parse_struct *pinfo, char *ptr, const char *str) -{ - return gen_parse(mem_ctx, pinfo, ptr, str); -} - -/* the main parse routine */ -int gen_parse(TALLOC_CTX *mem_ctx, const struct parse_struct *pinfo, char *data, const char *s) -{ - char *str, *s0; - - s0 = strdup(s); - str = s0; - - while (*str) { - char *p; - char *name; - char *value; - - /* skip leading whitespace */ - while (isspace(*str)) str++; - - p = strchr(str, '='); - if (!p) break; - value = p+1; - while (p > str && isspace(*(p-1))) { - p--; - } - - *p = 0; - name = str; - - while (isspace(*value)) value++; - - if (*value == '{') { - str = match_braces(value, '}'); - value++; - } else { - str = match_braces(value, '\n'); - } - - *str++ = 0; - - if (gen_parse_one(mem_ctx, pinfo, name, data, value) != 0) { - free(s0); - return -1; - } - } - - free(s0); - return 0; -} - - - -/* for convenience supply some standard dumpers and parsers here */ - -int gen_parse_char(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - *(unsigned char *)ptr = atoi(str); - return 0; -} - -int gen_parse_int(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - *(int *)ptr = atoi(str); - return 0; -} - -int gen_parse_unsigned(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - *(unsigned *)ptr = strtoul(str, NULL, 10); - return 0; -} - -int gen_parse_time_t(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - *(time_t *)ptr = strtoul(str, NULL, 10); - return 0; -} - -int gen_parse_double(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - *(double *)ptr = atof(str); - return 0; -} - -int gen_parse_float(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - *(float *)ptr = atof(str); - return 0; -} - -int gen_dump_char(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - return addshort(mem_ctx, p, "%u", *(unsigned char *)(ptr)); -} - -int gen_dump_int(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - return addshort(mem_ctx, p, "%d", *(int *)(ptr)); -} - -int gen_dump_unsigned(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - return addshort(mem_ctx, p, "%u", *(unsigned *)(ptr)); -} - -int gen_dump_time_t(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - return addshort(mem_ctx, p, "%u", *(time_t *)(ptr)); -} - -int gen_dump_double(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - return addshort(mem_ctx, p, "%lg", *(double *)(ptr)); -} - -int gen_dump_float(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - return addshort(mem_ctx, p, "%g", *(float *)(ptr)); -} diff --git a/source3/lib/genparser_samba.c b/source3/lib/genparser_samba.c deleted file mode 100644 index bece5877473..00000000000 --- a/source3/lib/genparser_samba.c +++ /dev/null @@ -1,200 +0,0 @@ -/* - Copyright (C) Andrew Tridgell 2002 - Copyright (C) Simo Sorce 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" -#include "genparser_samba.h" - -/* PARSE functions */ - -int gen_parse_uint8(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - *(uint8 *)ptr = atoi(str); - return 0; -} - -int gen_parse_uint16(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - *(uint16 *)ptr = atoi(str); - return 0; -} - -int gen_parse_uint32(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - *(uint32 *)ptr = strtoul(str, NULL, 10); - return 0; -} - -int gen_parse_NTTIME(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - if(sscanf(str, "%u,%u", &(((NTTIME *)(ptr))->high), &(((NTTIME *)(ptr))->low)) != 2) { - errno = EINVAL; - return -1; - } - return 0; -} - -int gen_parse_DOM_SID(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - if(!string_to_sid((DOM_SID *)ptr, str)) return -1; - return 0; -} - -int gen_parse_SEC_ACCESS(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - ((SEC_ACCESS *)ptr)->mask = strtoul(str, NULL, 10); - return 0; -} - -int gen_parse_GUID(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - int info[GUID_SIZE]; - int i; - char *sc; - char *p; - char *m; - - m = strdup(str); - if (!m) return -1; - sc = m; - - memset(info, 0, sizeof(info)); - for (i = 0; i < GUID_SIZE; i++) { - p = strchr(sc, ','); - if (p != NULL) p = '\0'; - info[i] = atoi(sc); - if (p != NULL) sc = p + 1; - } - free(m); - - for (i = 0; i < GUID_SIZE; i++) { - ((GUID *)ptr)->info[i] = info[i]; - } - - return 0; -} - -int gen_parse_SEC_ACE(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - return gen_parse_struct(mem_ctx, pinfo_security_ace_info, ptr, str); -} - -int gen_parse_SEC_ACL(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - return gen_parse_struct(mem_ctx, pinfo_security_acl_info, ptr, str); -} - -int gen_parse_SEC_DESC(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - return gen_parse_struct(mem_ctx, pinfo_security_descriptor_info, ptr, str); -} - -int gen_parse_LUID_ATTR(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - return gen_parse_struct(mem_ctx, pinfo_luid_attr_info, ptr, str); -} - -int gen_parse_LUID(TALLOC_CTX *mem_ctx, char *ptr, const char *str) -{ - if(sscanf(str, "%u,%u", &(((LUID *)(ptr))->high), &(((LUID *)(ptr))->low)) != 2) { - errno = EINVAL; - return -1; - } - return 0; -} - - - -/* DUMP functions */ - -int gen_dump_uint8(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - return addshort(mem_ctx, p, "%u", *(uint8 *)(ptr)); -} - -int gen_dump_uint16(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - return addshort(mem_ctx, p, "%u", *(uint16 *)(ptr)); -} - -int gen_dump_uint32(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - return addshort(mem_ctx, p, "%u", *(uint32 *)(ptr)); -} - -int gen_dump_NTTIME(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - uint32 low, high; - - high = ((NTTIME *)(ptr))->high; - low = ((NTTIME *)(ptr))->low; - return addshort(mem_ctx, p, "%u,%u", high, low); -} - -int gen_dump_DOM_SID(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - fstring sidstr; - - sid_to_string(sidstr, (DOM_SID *)ptr); - return addstr(mem_ctx, p, sidstr); -} - -int gen_dump_SEC_ACCESS(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - return addshort(mem_ctx, p, "%u", ((SEC_ACCESS *)ptr)->mask); -} - -int gen_dump_GUID(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - int i, r; - - for (i = 0; i < (GUID_SIZE - 1); i++) { - if (!(r = addshort(mem_ctx, p, "%d,", ((GUID *)ptr)->info[i]))) return r; - } - return addshort(mem_ctx, p, "%d", ((GUID *)ptr)->info[i]); -} - -int gen_dump_SEC_ACE(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - return gen_dump_struct(mem_ctx, pinfo_security_ace_info, p, ptr, indent); -} - -int gen_dump_SEC_ACL(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - return gen_dump_struct(mem_ctx, pinfo_security_acl_info, p, ptr, indent); -} - -int gen_dump_SEC_DESC(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - return gen_dump_struct(mem_ctx, pinfo_security_descriptor_info, p, ptr, indent); -} - -int gen_dump_LUID_ATTR(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - return gen_dump_struct(mem_ctx, pinfo_luid_attr_info, p, ptr, indent); -} - -int gen_dump_LUID(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) -{ - uint32 low, high; - - high = ((LUID *)(ptr))->high; - low = ((LUID *)(ptr))->low; - return addshort(mem_ctx, p, "%u,%u", high, low); -} - diff --git a/source3/lib/getsmbpass.c b/source3/lib/getsmbpass.c index b6ae09b3181..c271d554047 100644 --- a/source3/lib/getsmbpass.c +++ b/source3/lib/getsmbpass.c @@ -83,7 +83,7 @@ static int tcsetattr(int fd, int flags, struct sgttyb *t) static struct termios t; #endif /* SYSV_TERMIO */ -char *getsmbpass(const char *prompt) +char *getsmbpass(char *prompt) { FILE *in, *out; int echo_off; diff --git a/source3/lib/iconv.c b/source3/lib/iconv.c index a37441b9fab..54733c2ac27 100644 --- a/source3/lib/iconv.c +++ b/source3/lib/iconv.c @@ -2,7 +2,6 @@ Unix SMB/CIFS implementation. minimal iconv implementation Copyright (C) Andrew Tridgell 2001 - Copyright (C) Jelmer Vernooij 2002,2003,2003,2003,2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -21,95 +20,35 @@ #include "includes.h" - -/** - * @file - * - * @brief Samba wrapper/stub for iconv character set conversion. - * - * iconv is the XPG2 interface for converting between character - * encodings. This file provides a Samba wrapper around it, and also - * a simple reimplementation that is used if the system does not - * implement iconv. - * - * Samba only works with encodings that are supersets of ASCII: ascii - * characters like whitespace can be tested for directly, multibyte - * sequences start with a byte with the high bit set, and strings are - * terminated by a nul byte. - * - * Note that the only function provided by iconv is conversion between - * characters. It doesn't directly support operations like - * uppercasing or comparison. We have to convert to UCS-2 and compare - * there. - * - * @sa Samba Developers Guide - **/ - static size_t ascii_pull(void *,char **, size_t *, char **, size_t *); static size_t ascii_push(void *,char **, size_t *, char **, size_t *); static size_t utf8_pull(void *,char **, size_t *, char **, size_t *); static size_t utf8_push(void *,char **, size_t *, char **, size_t *); +static size_t weird_pull(void *,char **, size_t *, char **, size_t *); +static size_t weird_push(void *,char **, size_t *, char **, size_t *); static size_t ucs2hex_pull(void *,char **, size_t *, char **, size_t *); static size_t ucs2hex_push(void *,char **, size_t *, char **, size_t *); static size_t iconv_copy(void *,char **, size_t *, char **, size_t *); -static struct charset_functions builtin_functions[] = { +/* + for each charset we have a function that pulls from that charset to + a ucs2 buffer, and a function that pushes to a ucs2 buffer +*/ +static struct { + const char *name; + size_t (*pull)(void *, char **inbuf, size_t *inbytesleft, + char **outbuf, size_t *outbytesleft); + size_t (*push)(void *, char **inbuf, size_t *inbytesleft, + char **outbuf, size_t *outbytesleft); +} charsets[] = { {"UCS-2LE", iconv_copy, iconv_copy}, {"UTF8", utf8_pull, utf8_push}, {"ASCII", ascii_pull, ascii_push}, + {"WEIRD", weird_pull, weird_push}, {"UCS2-HEX", ucs2hex_pull, ucs2hex_push}, {NULL, NULL, NULL} }; -static struct charset_functions *charsets = NULL; - -static struct charset_functions *find_charset_functions(const char *name) -{ - struct charset_functions *c = charsets; - pstring stripped; - - module_path_get_name(name, stripped); - - while(c) { - if (strequal(stripped, c->name) == 0)return c; - c = c->next; - } - - return NULL; -} - -BOOL smb_register_charset(struct charset_functions *funcs) -{ - struct charset_functions *c = charsets; - - DEBUG(5, ("Attempting to register new charset %s\n", funcs->name)); - /* Check whether we already have this charset... */ - while(c) { - if(!strcasecmp(c->name, funcs->name)){ - DEBUG(2, ("Duplicate charset %s, not registering\n", funcs->name)); - return False; - } - c = c->next; - } - - funcs->next = funcs->prev = NULL; - DEBUG(5, ("Registered charset %s\n", funcs->name)); - DLIST_ADD(charsets, funcs); - return True; -} - -void lazy_initialize_iconv(void) -{ - static BOOL initialized = False; - int i; - - if (!initialized) { - initialized = True; - for(i = 0; builtin_functions[i].name; i++) - smb_register_charset(&builtin_functions[i]); - static_init_charset; - } -} /* if there was an error then reset the internal state, this ensures that we don't have a shift state remaining for @@ -177,11 +116,7 @@ size_t smb_iconv(smb_iconv_t cd, smb_iconv_t smb_iconv_open(const char *tocode, const char *fromcode) { smb_iconv_t ret; - struct charset_functions *from, *to; - - lazy_initialize_iconv(); - from = charsets; - to = charsets; + int from, to; ret = (smb_iconv_t)malloc(sizeof(*ret)); if (!ret) { @@ -194,78 +129,53 @@ smb_iconv_t smb_iconv_open(const char *tocode, const char *fromcode) ret->to_name = strdup(tocode); /* check for the simplest null conversion */ - if (strcasecmp(fromcode, tocode) == 0) { + if (strcmp(fromcode, tocode) == 0) { ret->direct = iconv_copy; return ret; } - /* check if we have a builtin function for this conversion */ - from = find_charset_functions(fromcode); - if(from)ret->pull = from->pull; - - to = find_charset_functions(tocode); - if(to)ret->push = to->push; + for (from=0; charsets[from].name; from++) { + if (strcasecmp(charsets[from].name, fromcode) == 0) break; + } + for (to=0; charsets[to].name; to++) { + if (strcasecmp(charsets[to].name, tocode) == 0) break; + } - /* check if we can use iconv for this conversion */ #ifdef HAVE_NATIVE_ICONV - if (!ret->pull) { + if (!charsets[from].name) { + ret->pull = sys_iconv; ret->cd_pull = iconv_open("UCS-2LE", fromcode); - if (ret->cd_pull != (iconv_t)-1) - ret->pull = sys_iconv; + if (ret->cd_pull == (iconv_t)-1) goto failed; } - - if (!ret->push) { + if (!charsets[to].name) { + ret->push = sys_iconv; ret->cd_push = iconv_open(tocode, "UCS-2LE"); - if (ret->cd_push != (iconv_t)-1) - ret->push = sys_iconv; - } -#endif - - /* check if there is a module available that can do this conversion */ - if (!ret->pull && smb_probe_module("charset", fromcode)) { - if(!(from = find_charset_functions(fromcode))) - DEBUG(0, ("Module %s doesn't provide charset %s!\n", fromcode, fromcode)); - else - ret->pull = from->pull; + if (ret->cd_push == (iconv_t)-1) goto failed; } - - if (!ret->push && smb_probe_module("charset", tocode)) { - if(!(to = find_charset_functions(tocode))) - DEBUG(0, ("Module %s doesn't provide charset %s!\n", tocode, tocode)); - else - ret->push = to->push; - } - - if (!ret->push || !ret->pull) { - SAFE_FREE(ret->from_name); - SAFE_FREE(ret->to_name); - SAFE_FREE(ret); - errno = EINVAL; - return (smb_iconv_t)-1; +#else + if (!charsets[from].name || !charsets[to].name) { + goto failed; } +#endif /* check for conversion to/from ucs2 */ - if (strcasecmp(fromcode, "UCS-2LE") == 0 && to) { - ret->direct = to->push; - ret->push = ret->pull = NULL; + if (from == 0 && charsets[to].name) { + ret->direct = charsets[to].push; return ret; } - - if (strcasecmp(tocode, "UCS-2LE") == 0 && from) { - ret->direct = from->pull; - ret->push = ret->pull = NULL; + if (to == 0 && charsets[from].name) { + ret->direct = charsets[from].pull; return ret; } - /* Check if we can do the conversion direct */ #ifdef HAVE_NATIVE_ICONV - if (strcasecmp(fromcode, "UCS-2LE") == 0) { + if (from == 0) { ret->direct = sys_iconv; ret->cd_direct = ret->cd_push; ret->cd_push = NULL; return ret; } - if (strcasecmp(tocode, "UCS-2LE") == 0) { + if (to == 0) { ret->direct = sys_iconv; ret->cd_direct = ret->cd_pull; ret->cd_pull = NULL; @@ -273,7 +183,15 @@ smb_iconv_t smb_iconv_open(const char *tocode, const char *fromcode) } #endif + /* the general case has to go via a buffer */ + if (!ret->pull) ret->pull = charsets[from].pull; + if (!ret->push) ret->push = charsets[to].push; return ret; + +failed: + SAFE_FREE(ret); + errno = EINVAL; + return (smb_iconv_t)-1; } /* @@ -435,6 +353,111 @@ static size_t ucs2hex_push(void *cd, char **inbuf, size_t *inbytesleft, } +/* the "weird" character set is very useful for testing multi-byte + support and finding bugs. Don't use on a production system! +*/ +static struct { + const char from; + const char *to; + int len; +} weird_table[] = { + {'q', "^q^", 3}, + {'Q', "^Q^", 3}, + {0, NULL} +}; + +static size_t weird_pull(void *cd, char **inbuf, size_t *inbytesleft, + char **outbuf, size_t *outbytesleft) +{ + while (*inbytesleft >= 1 && *outbytesleft >= 2) { + int i; + int done = 0; + for (i=0;weird_table[i].from;i++) { + if (strncmp((*inbuf), + weird_table[i].to, + weird_table[i].len) == 0) { + if (*inbytesleft < weird_table[i].len) { + DEBUG(0,("ERROR: truncated weird string\n")); + /* smb_panic("weird_pull"); */ + + } else { + (*outbuf)[0] = weird_table[i].from; + (*outbuf)[1] = 0; + (*inbytesleft) -= weird_table[i].len; + (*outbytesleft) -= 2; + (*inbuf) += weird_table[i].len; + (*outbuf) += 2; + done = 1; + break; + } + } + } + if (done) continue; + (*outbuf)[0] = (*inbuf)[0]; + (*outbuf)[1] = 0; + (*inbytesleft) -= 1; + (*outbytesleft) -= 2; + (*inbuf) += 1; + (*outbuf) += 2; + } + + if (*inbytesleft > 0) { + errno = E2BIG; + return -1; + } + + return 0; +} + +static size_t weird_push(void *cd, char **inbuf, size_t *inbytesleft, + char **outbuf, size_t *outbytesleft) +{ + int ir_count=0; + + while (*inbytesleft >= 2 && *outbytesleft >= 1) { + int i; + int done=0; + for (i=0;weird_table[i].from;i++) { + if ((*inbuf)[0] == weird_table[i].from && + (*inbuf)[1] == 0) { + if (*outbytesleft < weird_table[i].len) { + DEBUG(0,("No room for weird character\n")); + /* smb_panic("weird_push"); */ + } else { + memcpy(*outbuf, weird_table[i].to, + weird_table[i].len); + (*inbytesleft) -= 2; + (*outbytesleft) -= weird_table[i].len; + (*inbuf) += 2; + (*outbuf) += weird_table[i].len; + done = 1; + break; + } + } + } + if (done) continue; + + (*outbuf)[0] = (*inbuf)[0]; + if ((*inbuf)[1]) ir_count++; + (*inbytesleft) -= 2; + (*outbytesleft) -= 1; + (*inbuf) += 2; + (*outbuf) += 1; + } + + if (*inbytesleft == 1) { + errno = EINVAL; + return -1; + } + + if (*inbytesleft > 1) { + errno = E2BIG; + return -1; + } + + return ir_count; +} + static size_t iconv_copy(void *cd, char **inbuf, size_t *inbytesleft, char **outbuf, size_t *outbytesleft) { diff --git a/source3/lib/ldap.c b/source3/lib/ldap.c deleted file mode 100644 index 73ff50e1591..00000000000 --- a/source3/lib/ldap.c +++ /dev/null @@ -1,718 +0,0 @@ -/* - Unix SMB/CIFS implementation. - LDAP protocol helper functions for SAMBA - Copyright (C) Jean François Micouleau 1998 - Copyright (C) Gerald Carter 2001 - Copyright (C) Shahms King 2001 - Copyright (C) Andrew Bartlett 2002 - Copyright (C) Stefan (metze) Metzmacher 2002 - Copyright (C) Jim McDonough 2003 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - -*/ - -#include "includes.h" - -#ifdef HAVE_LDAP -/* TODO: -* persistent connections: if using NSS LDAP, many connections are made -* however, using only one within Samba would be nice -* -* Clean up SSL stuff, compile on OpenLDAP 1.x, 2.x, and Netscape SDK -* -* Other LDAP based login attributes: accountExpires, etc. -* (should be the domain of Samba proper, but the sam_password/SAM_ACCOUNT -* structures don't have fields for some of these attributes) -* -* SSL is done, but can't get the certificate based authentication to work -* against on my test platform (Linux 2.4, OpenLDAP 2.x) -*/ - -/* NOTE: this will NOT work against an Active Directory server -* due to the fact that the two password fields cannot be retrieved -* from a server; recommend using security = domain in this situation -* and/or winbind -*/ - -#include "smb_ldap.h" - -/* We need an internal mapping of LDAP * -> smb_ldap_privates so we implement - it in terms of a VK list. It's a little backwards but its quite efficent */ -static struct smb_ldap_privates *head; - -static struct smb_ldap_privates *get_internal(LDAP *ldap_struct) -{ - struct smb_ldap_privates *ret = head; - - while (NULL != ret && ret->ldap_struct != ldap_struct) { - ret = ret->next; - } - - return ret; -} - -#define SMB_LDAP_DONT_PING_TIME 10 /* ping only all 10 seconds */ - -/******************************************************************* - find the ldap password -******************************************************************/ -static BOOL smb_ldap_fetch_pw(char **dn, char** pw) -{ - char *key = NULL; - size_t size; - - *dn = smb_xstrdup(lp_ldap_admin_dn()); - - if (asprintf(&key, "%s/%s", SECRETS_LDAP_BIND_PW, *dn) < 0) { - SAFE_FREE(*dn); - DEBUG(0, ("smb_ldap_fetch_pw: asprintf failed!\n")); - } - - *pw=secrets_fetch(key, &size); - if (!size) { - /* Upgrade 2.2 style entry */ - char *p; - char* old_style_key = strdup(*dn); - char *data; - fstring old_style_pw; - - if (!old_style_key) { - DEBUG(0, ("smb_ldap_fetch_pw: strdup failed!\n")); - return False; - } - - for (p=old_style_key; *p; p++) - if (*p == ',') *p = '/'; - - data=secrets_fetch(old_style_key, &size); - if (!size && size < sizeof(old_style_pw)) { - DEBUG(0,("fetch_ldap_pw: neither ldap secret retrieved!\n")); - SAFE_FREE(old_style_key); - SAFE_FREE(*dn); - return False; - } - - strncpy(old_style_pw, data, size); - old_style_pw[size] = 0; - - SAFE_FREE(data); - - if (!secrets_store_ldap_pw(*dn, old_style_pw)) { - DEBUG(0,("fetch_ldap_pw: ldap secret could not be upgraded!\n")); - SAFE_FREE(old_style_key); - SAFE_FREE(*dn); - return False; - } - if (!secrets_delete(old_style_key)) { - DEBUG(0,("fetch_ldap_pw: old ldap secret could not be deleted!\n")); - } - - SAFE_FREE(old_style_key); - - *pw = smb_xstrdup(old_style_pw); - } - - return True; -} - -/******************************************************************* - open a connection to the ldap server. -******************************************************************/ -int smb_ldap_open_connection (struct smb_ldap_privates *ldap_state, - LDAP ** ldap_struct) -{ - int rc = LDAP_SUCCESS; - int version; - BOOL ldap_v3 = False; - -#if defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000) - DEBUG(10, ("smb_ldap_open_connection: %s\n", ldap_state->uri)); - - if ((rc = ldap_initialize(ldap_struct, ldap_state->uri)) != LDAP_SUCCESS) { - DEBUG(0, ("ldap_initialize: %s\n", ldap_err2string(rc))); - return rc; - } - -#else - - /* Parse the string manually */ - - { - int port = 0; - fstring protocol; - fstring host; - const char *p = ldap_state->uri; - SMB_ASSERT(sizeof(protocol)>10 && sizeof(host)>254); - - /* skip leading "URL:" (if any) */ - if ( strncasecmp( p, "URL:", 4 ) == 0 ) { - p += 4; - } - - sscanf(p, "%10[^:]://%254s[^:]:%d", protocol, host, &port); - - if (port == 0) { - if (strequal(protocol, "ldap")) { - port = LDAP_PORT; - } else if (strequal(protocol, "ldaps")) { - port = LDAPS_PORT; - } else { - DEBUG(0, ("unrecognised protocol (%s)!\n", protocol)); - } - } - - if ((*ldap_struct = ldap_init(host, port)) == NULL) { - DEBUG(0, ("ldap_init failed !\n")); - return LDAP_OPERATIONS_ERROR; - } - - if (strequal(protocol, "ldaps")) { -#ifdef LDAP_OPT_X_TLS - int tls = LDAP_OPT_X_TLS_HARD; - if (ldap_set_option (*ldap_struct, LDAP_OPT_X_TLS, &tls) != LDAP_SUCCESS) - { - DEBUG(0, ("Failed to setup a TLS session\n")); - } - - DEBUG(3,("LDAPS option set...!\n")); -#else - DEBUG(0,("smb_ldap_open_connection: Secure connection not supported by LDAP client libraries!\n")); - return LDAP_OPERATIONS_ERROR; -#endif - } - } -#endif - - if (ldap_get_option(*ldap_struct, LDAP_OPT_PROTOCOL_VERSION, &version) == LDAP_OPT_SUCCESS) - { - if (version != LDAP_VERSION3) - { - version = LDAP_VERSION3; - if (ldap_set_option (*ldap_struct, LDAP_OPT_PROTOCOL_VERSION, &version) == LDAP_OPT_SUCCESS) { - ldap_v3 = True; - } - } else { - ldap_v3 = True; - } - } - - if (lp_ldap_ssl() == LDAP_SSL_START_TLS) { -#ifdef LDAP_OPT_X_TLS - if (ldap_v3) { - if ((rc = ldap_start_tls_s (*ldap_struct, NULL, NULL)) != LDAP_SUCCESS) - { - DEBUG(0,("Failed to issue the StartTLS instruction: %s\n", - ldap_err2string(rc))); - return rc; - } - DEBUG (3, ("StartTLS issued: using a TLS connection\n")); - } else { - - DEBUG(0, ("Need LDAPv3 for Start TLS\n")); - return LDAP_OPERATIONS_ERROR; - } -#else - DEBUG(0,("smb_ldap_open_connection: StartTLS not supported by LDAP client libraries!\n")); - return LDAP_OPERATIONS_ERROR; -#endif - } - - DEBUG(2, ("smb_ldap_open_connection: connection opened\n")); - return rc; -} - - -/******************************************************************* - a rebind function for authenticated referrals - This version takes a void* that we can shove useful stuff in :-) -******************************************************************/ -#if defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000) -#else -static int rebindproc_with_state (LDAP * ld, char **whop, char **credp, - int *methodp, int freeit, void *arg) -{ - struct smb_ldap_privates *ldap_state = arg; - - /** @TODO Should we be doing something to check what servers we rebind to? - Could we get a referral to a machine that we don't want to give our - username and password to? */ - - if (freeit) { - SAFE_FREE(*whop); - memset(*credp, '\0', strlen(*credp)); - SAFE_FREE(*credp); - } else { - DEBUG(5,("rebind_proc_with_state: Rebinding as \"%s\"\n", - ldap_state->bind_dn)); - - *whop = strdup(ldap_state->bind_dn); - if (!*whop) { - return LDAP_NO_MEMORY; - } - *credp = strdup(ldap_state->bind_secret); - if (!*credp) { - SAFE_FREE(*whop); - return LDAP_NO_MEMORY; - } - *methodp = LDAP_AUTH_SIMPLE; - } - return 0; -} -#endif /*defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000)*/ - -/******************************************************************* - a rebind function for authenticated referrals - This version takes a void* that we can shove useful stuff in :-) - and actually does the connection. -******************************************************************/ -#if defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000) -static int rebindproc_connect_with_state (LDAP *ldap_struct, - LDAP_CONST char *url, - ber_tag_t request, - ber_int_t msgid, void *arg) -{ - struct smb_ldap_privates *ldap_state = arg; - int rc; - DEBUG(5,("rebindproc_connect_with_state: Rebinding as \"%s\"\n", - ldap_state->bind_dn)); - - /** @TODO Should we be doing something to check what servers we rebind to? - Could we get a referral to a machine that we don't want to give our - username and password to? */ - - rc = ldap_simple_bind_s(ldap_struct, ldap_state->bind_dn, ldap_state->bind_secret); - - return rc; -} -#endif /*defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000)*/ - -/******************************************************************* - Add a rebind function for authenticated referrals -******************************************************************/ -#if defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000) -#else -# if LDAP_SET_REBIND_PROC_ARGS == 2 -static int rebindproc (LDAP *ldap_struct, char **whop, char **credp, - int *method, int freeit ) -{ - return rebindproc_with_state(ldap_struct, whop, credp, - method, freeit, get_internal(ldap_struct)); - -} -# endif /*LDAP_SET_REBIND_PROC_ARGS == 2*/ -#endif /*defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000)*/ - -/******************************************************************* - a rebind function for authenticated referrals - this also does the connection, but no void*. -******************************************************************/ -#if defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000) -# if LDAP_SET_REBIND_PROC_ARGS == 2 -static int rebindproc_connect (LDAP * ld, LDAP_CONST char *url, int request, - ber_int_t msgid) -{ - return rebindproc_connect_with_state(ld, url, (ber_tag_t)request, msgid, - get_internal(ld)); -} -# endif /*LDAP_SET_REBIND_PROC_ARGS == 2*/ -#endif /*defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000)*/ - -/******************************************************************* - connect to the ldap server under system privilege. -******************************************************************/ -int smb_ldap_connect_system(struct smb_ldap_privates *ldap_state, - LDAP * ldap_struct) -{ - int rc; - char *ldap_dn; - char *ldap_secret; - - if (NULL == get_internal(ldap_struct)) { - ldap_state->next = head; - } - - /* get the password */ - if (!smb_ldap_fetch_pw(&ldap_dn, &ldap_secret)) - { - DEBUG(0, ("ldap_connect_system: Failed to retrieve password from secrets.tdb\n")); - return LDAP_INVALID_CREDENTIALS; - } - - ldap_state->bind_dn = ldap_dn; - ldap_state->bind_secret = ldap_secret; - - /* removed the sasl_bind_s "EXTERNAL" stuff, as my testsuite - (OpenLDAP) doesnt' seem to support it */ - - DEBUG(10,("ldap_connect_system: Binding to ldap server %s as \"%s\"\n", - ldap_state->uri, ldap_dn)); - -#if defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000) -# if LDAP_SET_REBIND_PROC_ARGS == 2 - ldap_set_rebind_proc(ldap_struct, &rebindproc_connect); -# endif -# if LDAP_SET_REBIND_PROC_ARGS == 3 - ldap_set_rebind_proc(ldap_struct, &rebindproc_connect_with_state, (void *)ldap_state); -# endif -#else /*defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000)*/ -# if LDAP_SET_REBIND_PROC_ARGS == 2 - ldap_set_rebind_proc(ldap_struct, &rebindproc); -# endif -# if LDAP_SET_REBIND_PROC_ARGS == 3 - ldap_set_rebind_proc(ldap_struct, &rebindproc_with_state, (void *)ldap_state); -# endif -#endif /*defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000)*/ - - rc = ldap_simple_bind_s(ldap_struct, ldap_dn, ldap_secret); - - if (rc != LDAP_SUCCESS) { - char *ld_error; - ldap_get_option(ldap_state->ldap_struct, LDAP_OPT_ERROR_STRING, - &ld_error); - DEBUG(0, - ("failed to bind to server with dn= %s Error: %s\n\t%s\n", - ldap_dn, ldap_err2string(rc), - ld_error)); - free(ld_error); - return rc; - } - - DEBUG(2, ("ldap_connect_system: succesful connection to the LDAP server\n")); - return rc; -} - -/********************************************************************** -Connect to LDAP server -*********************************************************************/ -int smb_ldap_open(struct smb_ldap_privates *ldap_state) -{ - int rc; - SMB_ASSERT(ldap_state); - -#ifndef NO_LDAP_SECURITY - if (geteuid() != 0) { - DEBUG(0, ("smb_ldap_open: cannot access LDAP when not root..\n")); - return LDAP_INSUFFICIENT_ACCESS; - } -#endif - - if ((ldap_state->ldap_struct != NULL) && ((ldap_state->last_ping + SMB_LDAP_DONT_PING_TIME) < time(NULL))) { - struct sockaddr_un addr; - socklen_t len; - int sd; - if (ldap_get_option(ldap_state->ldap_struct, LDAP_OPT_DESC, &sd) == 0 && - getpeername(sd, (struct sockaddr *) &addr, &len) < 0) { - /* the other end has died. reopen. */ - ldap_unbind_ext(ldap_state->ldap_struct, NULL, NULL); - ldap_state->ldap_struct = NULL; - ldap_state->last_ping = (time_t)0; - } else { - ldap_state->last_ping = time(NULL); - } - } - - if (ldap_state->ldap_struct != NULL) { - DEBUG(5,("smb_ldap_open: allready connected to the LDAP server\n")); - return LDAP_SUCCESS; - } - - if ((rc = smb_ldap_open_connection(ldap_state, &ldap_state->ldap_struct))) { - return rc; - } - - if ((rc = smb_ldap_connect_system(ldap_state, ldap_state->ldap_struct))) { - ldap_unbind_ext(ldap_state->ldap_struct, NULL, NULL); - ldap_state->ldap_struct = NULL; - return rc; - } - - - ldap_state->last_ping = time(NULL); - DEBUG(4,("The LDAP server is succesful connected\n")); - - return LDAP_SUCCESS; -} - -/********************************************************************** -Disconnect from LDAP server -*********************************************************************/ -NTSTATUS smb_ldap_close(struct smb_ldap_privates *ldap_state) -{ - if (!ldap_state) - return NT_STATUS_INVALID_PARAMETER; - - if (ldap_state->ldap_struct != NULL) { - ldap_unbind_ext(ldap_state->ldap_struct, NULL, NULL); - ldap_state->ldap_struct = NULL; - } - - DEBUG(5,("The connection to the LDAP server was closed\n")); - /* maybe free the results here --metze */ - - return NT_STATUS_OK; -} - -static int smb_ldap_retry_open(struct smb_ldap_privates *ldap_state, int *attempts) -{ - int rc; - - SMB_ASSERT(ldap_state && attempts); - - if (*attempts != 0) { - /* we retry after 0.5, 2, 4.5, 8, 12.5, 18, 24.5 seconds */ - msleep((((*attempts)*(*attempts))/2)*1000); - } - (*attempts)++; - - if ((rc = smb_ldap_open(ldap_state))) { - DEBUG(0,("Connection to LDAP Server failed for the %d try!\n",*attempts)); - return rc; - } - - return LDAP_SUCCESS; -} - - -int smb_ldap_search(struct smb_ldap_privates *ldap_state, - const char *base, int scope, const char *filter, - const char *attrs[], int attrsonly, - LDAPMessage **res) -{ - int rc = LDAP_SERVER_DOWN; - int attempts = 0; - - SMB_ASSERT(ldap_state); - - while ((rc == LDAP_SERVER_DOWN) && (attempts < 8)) { - - if ((rc = smb_ldap_retry_open(ldap_state,&attempts)) != LDAP_SUCCESS) - continue; - - rc = ldap_search_s(ldap_state->ldap_struct, base, scope, - filter, attrs, attrsonly, res); - } - - if (rc == LDAP_SERVER_DOWN) { - DEBUG(0,("%s: LDAP server is down!\n",FUNCTION_MACRO)); - smb_ldap_close(ldap_state); - } - - return rc; -} - -int smb_ldap_modify(struct smb_ldap_privates *ldap_state, char *dn, - LDAPMod *attrs[]) -{ - int rc = LDAP_SERVER_DOWN; - int attempts = 0; - - if (!ldap_state) - return (-1); - - while ((rc == LDAP_SERVER_DOWN) && (attempts < 8)) { - - if ((rc = smb_ldap_retry_open(ldap_state,&attempts)) != LDAP_SUCCESS) - continue; - - rc = ldap_modify_s(ldap_state->ldap_struct, dn, attrs); - } - - if (rc == LDAP_SERVER_DOWN) { - DEBUG(0,("%s: LDAP server is down!\n",FUNCTION_MACRO)); - smb_ldap_close(ldap_state); - } - - return rc; -} - -int smb_ldap_add(struct smb_ldap_privates *ldap_state, const char *dn, - LDAPMod *attrs[]) -{ - int rc = LDAP_SERVER_DOWN; - int attempts = 0; - - if (!ldap_state) - return (-1); - - while ((rc == LDAP_SERVER_DOWN) && (attempts < 8)) { - - if ((rc = smb_ldap_retry_open(ldap_state,&attempts)) != LDAP_SUCCESS) - continue; - - rc = ldap_add_s(ldap_state->ldap_struct, dn, attrs); - } - - if (rc == LDAP_SERVER_DOWN) { - DEBUG(0,("%s: LDAP server is down!\n",FUNCTION_MACRO)); - smb_ldap_close(ldap_state); - } - - return rc; -} - -int smb_ldap_delete(struct smb_ldap_privates *ldap_state, char *dn) -{ - int rc = LDAP_SERVER_DOWN; - int attempts = 0; - - if (!ldap_state) - return (-1); - - while ((rc == LDAP_SERVER_DOWN) && (attempts < 8)) { - - if ((rc = smb_ldap_retry_open(ldap_state,&attempts)) != LDAP_SUCCESS) - continue; - - rc = ldap_delete_s(ldap_state->ldap_struct, dn); - } - - if (rc == LDAP_SERVER_DOWN) { - DEBUG(0,("%s: LDAP server is down!\n",FUNCTION_MACRO)); - smb_ldap_close(ldap_state); - } - - return rc; -} - -int smb_ldap_extended_operation(struct smb_ldap_privates *ldap_state, - LDAP_CONST char *reqoid, - struct berval *reqdata, - LDAPControl **serverctrls, - LDAPControl **clientctrls, char **retoidp, - struct berval **retdatap) -{ - int rc = LDAP_SERVER_DOWN; - int attempts = 0; - - if (!ldap_state) - return (-1); - - while ((rc == LDAP_SERVER_DOWN) && (attempts < 8)) { - - if ((rc = smb_ldap_retry_open(ldap_state,&attempts)) != LDAP_SUCCESS) - continue; - - rc = ldap_extended_operation_s(ldap_state->ldap_struct, reqoid, reqdata, serverctrls, clientctrls, retoidp, retdatap); - } - - if (rc == LDAP_SERVER_DOWN) { - DEBUG(0,("%s: LDAP server is down!\n",FUNCTION_MACRO)); - smb_ldap_close(ldap_state); - } - - return rc; -} - -/******************************************************************* -search an attribute and return the first value found. -******************************************************************/ -BOOL smb_ldap_get_single_attribute (LDAP * ldap_struct, LDAPMessage * entry, - const char *attribute, pstring value) -{ - char **values; - - if ((values = ldap_get_values (ldap_struct, entry, attribute)) == NULL) { - value = NULL; - DEBUG (10, ("smb_ldap_get_single_attribute: [%s] = []\n", attribute)); - - return False; - } - - pstrcpy(value, values[0]); - ldap_value_free(values); -#ifdef DEBUG_PASSWORDS - DEBUG (100, ("smb_ldap_get_single_attribute: [%s] = [%s]\n", attribute, value)); -#endif - return True; -} - - -/************************************************************************ -Routine to manage the LDAPMod structure array -manage memory used by the array, by each struct, and values - -************************************************************************/ -void smb_ldap_make_a_mod (LDAPMod *** modlist, int modop, - const char *attribute, const char *value) -{ - LDAPMod **mods; - int i; - int j; - - mods = *modlist; - - if (attribute == NULL || *attribute == '\0') - return; - - if (value == NULL || *value == '\0') - return; - - if (mods == NULL) - { - mods = (LDAPMod **) malloc(sizeof(LDAPMod *)); - if (mods == NULL) - { - DEBUG(0, ("smb_ldap_make_a_mod: out of memory!\n")); - return; - } - mods[0] = NULL; - } - - for (i = 0; mods[i] != NULL; ++i) { - if (mods[i]->mod_op == modop && !strcasecmp(mods[i]->mod_type, attribute)) - break; - } - - if (mods[i] == NULL) - { - mods = (LDAPMod **) Realloc (mods, (i + 2) * sizeof (LDAPMod *)); - if (mods == NULL) - { - DEBUG(0, ("smb_ldap_make_a_mod: out of memory!\n")); - return; - } - mods[i] = (LDAPMod *) malloc(sizeof(LDAPMod)); - if (mods[i] == NULL) - { - DEBUG(0, ("smb_ldap_make_a_mod: out of memory!\n")); - return; - } - mods[i]->mod_op = modop; - mods[i]->mod_values = NULL; - mods[i]->mod_type = strdup(attribute); - mods[i + 1] = NULL; - } - - if (value != NULL) - { - j = 0; - if (mods[i]->mod_values != NULL) { - for (; mods[i]->mod_values[j] != NULL; j++); - } - mods[i]->mod_values = (char **)Realloc(mods[i]->mod_values, - (j + 2) * sizeof (char *)); - - if (mods[i]->mod_values == NULL) { - DEBUG (0, ("smb_ldap_make_a_mod: Memory allocation failure!\n")); - return; - } - mods[i]->mod_values[j] = strdup(value); - mods[i]->mod_values[j + 1] = NULL; - } - *modlist = mods; -} - -#endif diff --git a/source3/lib/module.c b/source3/lib/module.c index 763a5c2b2d5..2498f6de2c5 100644 --- a/source3/lib/module.c +++ b/source3/lib/module.c @@ -22,11 +22,11 @@ #include "includes.h" #ifdef HAVE_DLOPEN -int smb_load_module(const char *module_name) +NTSTATUS smb_load_module(const char *module_name) { void *handle; init_module_function *init; - int status; + NTSTATUS nt_status; const char *error; /* Always try to use LAZY symbol resolving; if the plugin has @@ -37,7 +37,7 @@ int smb_load_module(const char *module_name) if(!handle) { DEBUG(0, ("Error loading module '%s': %s\n", module_name, sys_dlerror())); - return False; + return NT_STATUS_UNSUCCESSFUL; } init = sys_dlsym(handle, "init_module"); @@ -47,101 +47,22 @@ int smb_load_module(const char *module_name) error = sys_dlerror(); if (error) { DEBUG(0, ("Error trying to resolve symbol 'init_module' in %s: %s\n", module_name, error)); - return False; + return NT_STATUS_UNSUCCESSFUL; } - status = init(); + nt_status = init(); DEBUG(2, ("Module '%s' loaded\n", module_name)); - return status; -} - -/* Load all modules in list and return number of - * modules that has been successfully loaded */ -int smb_load_modules(const char **modules) -{ - int i; - int success = 0; - - for(i = 0; modules[i]; i++){ - if(smb_load_module(modules[i])) { - success++; - } - } - - DEBUG(2, ("%d modules successfully loaded\n", success)); - - return success; -} - -int smb_probe_module(const char *subsystem, const char *module) -{ - pstring full_path; - - /* Check for absolute path */ - if(strchr_m(module, '/'))return smb_load_module(module); - - pstrcpy(full_path, lib_path(subsystem)); - pstrcat(full_path, "/"); - pstrcat(full_path, module); - pstrcat(full_path, "."); - pstrcat(full_path, shlib_ext()); - - DEBUG(5, ("Probing module %s: Trying to load from %s\n", module, full_path)); - - return smb_load_module(full_path); + return nt_status; } #else /* HAVE_DLOPEN */ -int smb_load_module(const char *module_name) -{ - DEBUG(0,("This samba executable has not been built with plugin support")); - return False; -} - -int smb_load_modules(const char **modules) -{ - DEBUG(0,("This samba executable has not been built with plugin support")); - return False; -} - -int smb_probe_module(const char *subsystem, const char *module) +NTSTATUS smb_load_module(const char *module_name) { - DEBUG(0,("This samba executable has not been built with plugin support, not probing")); - return False; + DEBUG(0,("This samba executable has not been build with plugin support")); + return NT_STATUS_NOT_SUPPORTED; } #endif /* HAVE_DLOPEN */ - -void init_modules(void) -{ - /* FIXME: This can cause undefined symbol errors : - * smb_register_vfs() isn't available in nmbd, for example */ - if(lp_preload_modules()) - smb_load_modules(lp_preload_modules()); -} - - -/************************************************************************* - * This functions /path/to/foobar.so -> foobar - ************************************************************************/ -void module_path_get_name(const char *path, pstring name) -{ - char *s; - - /* First, make the path relative */ - s = strrchr(path, '/'); - if(s) pstrcpy(name, s+1); - else pstrcpy(name, path); - - if (dyn_SHLIBEXT && *dyn_SHLIBEXT && strlen(dyn_SHLIBEXT) < strlen(name)) { - int n = strlen(name) - strlen(dyn_SHLIBEXT); - - /* Remove extension if necessary */ - if (name[n-1] == '.' && !strcmp(name+n, dyn_SHLIBEXT)) { - name[n-1] = '\0'; - } - } -} diff --git a/source3/lib/popt_common.c b/source3/lib/popt_common.c index 6920ef4d5f0..77c44f127a0 100644 --- a/source3/lib/popt_common.c +++ b/source3/lib/popt_common.c @@ -3,7 +3,7 @@ Common popt routines Copyright (C) Tim Potter 2001,2002 - Copyright (C) Jelmer Vernooij 2002,2003 + Copyright (C) Jelmer Vernooij 2002 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -23,21 +23,17 @@ #include "includes.h" /* Handle command line options: - * -d,--debuglevel - * -s,--configfile - * -O,--socket-options - * -V,--version - * -l,--log-base - * -n,--netbios-name - * -W,--workgroup - * -i,--scope + * d,--debuglevel + * s,--configfile + * O,--socket-options + * V,--version + * l,--log-base + * n,--netbios-name */ extern pstring user_socket_options; extern BOOL AllowDebugChange; -struct user_auth_info cmdline_auth_info; - static void popt_common_callback(poptContext con, enum poptCallbackReason reason, const struct poptOption *opt, @@ -97,246 +93,42 @@ static void popt_common_callback(poptContext con, lp_set_logfile(logfile); } break; - - case 'i': - if (arg) { - set_global_scope(arg); - } - break; - - case 'W': - if (arg) { - set_global_myworkgroup(arg); - } - break; } } -struct poptOption popt_common_connection[] = { +struct poptOption popt_common_debug[] = { { NULL, 0, POPT_ARG_CALLBACK, popt_common_callback }, - { "socket-options", 'O', POPT_ARG_STRING, NULL, 'O', "socket options to use", - "SOCKETOPTIONS" }, - { "netbiosname", 'n', POPT_ARG_STRING, NULL, 'n', "Primary netbios name", "NETBIOSNAME" }, - { "workgroup", 'W', POPT_ARG_STRING, NULL, 'W', "Set the workgroup name", "WORKGROUP" }, - { "scope", 'i', POPT_ARG_STRING, NULL, 'i', "Use this Netbios scope", "SCOPE" }, - POPT_TABLEEND + { "debuglevel", 'd', POPT_ARG_STRING, NULL, 'd', "Set debug level", + "DEBUGLEVEL" }, + { 0 } }; -struct poptOption popt_common_samba[] = { - { NULL, 0, POPT_ARG_CALLBACK|POPT_CBFLAG_PRE, popt_common_callback }, - { "debuglevel", 'd', POPT_ARG_STRING, NULL, 'd', "Set debug level", "DEBUGLEVEL" }, - { "configfile", 's', POPT_ARG_STRING, NULL, 's', "Use alternative configuration file", "CONFIGFILE" }, - { "log-basename", 'l', POPT_ARG_STRING, NULL, 'l', "Basename for log/debug files", "LOGFILEBASE" }, - { "version", 'V', POPT_ARG_NONE, NULL, 'V', "Print version" }, - POPT_TABLEEND +struct poptOption popt_common_configfile[] = { + { NULL, 0, POPT_ARG_CALLBACK, popt_common_callback }, + { "configfile", 's', POPT_ARG_STRING, NULL, 's', "Use alternative configuration file" }, + { 0 } }; -struct poptOption popt_common_version[] = { +struct poptOption popt_common_socket_options[] = { { NULL, 0, POPT_ARG_CALLBACK, popt_common_callback }, - { "version", 'V', POPT_ARG_NONE, NULL, 'V', "Print version" }, - POPT_TABLEEND + {"socket-options", 'O', POPT_ARG_STRING, NULL, 'O', "socket options to use" }, + { 0 } }; +struct poptOption popt_common_version[] = { + { NULL, 0, POPT_ARG_CALLBACK, popt_common_callback }, + {"version", 'V', POPT_ARG_NONE, NULL, 'V', "Print version" }, + { 0 } +}; +struct poptOption popt_common_netbios_name[] = { + { NULL, 0, POPT_ARG_CALLBACK, popt_common_callback }, + {"netbiosname", 'n', POPT_ARG_STRING, NULL, 'n', "Primary netbios name"}, + { 0 } +}; -/**************************************************************************** - * get a password from a a file or file descriptor - * exit on failure - * ****************************************************************************/ -static void get_password_file(struct user_auth_info *a) -{ - int fd = -1; - char *p; - BOOL close_it = False; - pstring spec; - char pass[128]; - - if ((p = getenv("PASSWD_FD")) != NULL) { - pstrcpy(spec, "descriptor "); - pstrcat(spec, p); - sscanf(p, "%d", &fd); - close_it = False; - } else if ((p = getenv("PASSWD_FILE")) != NULL) { - fd = sys_open(p, O_RDONLY, 0); - pstrcpy(spec, p); - if (fd < 0) { - fprintf(stderr, "Error opening PASSWD_FILE %s: %s\n", - spec, strerror(errno)); - exit(1); - } - close_it = True; - } - - for(p = pass, *p = '\0'; /* ensure that pass is null-terminated */ - p && p - pass < sizeof(pass);) { - switch (read(fd, p, 1)) { - case 1: - if (*p != '\n' && *p != '\0') { - *++p = '\0'; /* advance p, and null-terminate pass */ - break; - } - case 0: - if (p - pass) { - *p = '\0'; /* null-terminate it, just in case... */ - p = NULL; /* then force the loop condition to become false */ - break; - } else { - fprintf(stderr, "Error reading password from file %s: %s\n", - spec, "empty password\n"); - exit(1); - } - - default: - fprintf(stderr, "Error reading password from file %s: %s\n", - spec, strerror(errno)); - exit(1); - } - } - pstrcpy(a->password, pass); - if (close_it) - close(fd); -} - -static void get_credentials_file(const char *file, struct user_auth_info *info) -{ - XFILE *auth; - fstring buf; - uint16 len = 0; - char *ptr, *val, *param; - - if ((auth=x_fopen(file, O_RDONLY, 0)) == NULL) - { - /* fail if we can't open the credentials file */ - d_printf("ERROR: Unable to open credentials file!\n"); - exit(-1); - } - - while (!x_feof(auth)) - { - /* get a line from the file */ - if (!x_fgets(buf, sizeof(buf), auth)) - continue; - len = strlen(buf); - - if ((len) && (buf[len-1]=='\n')) - { - buf[len-1] = '\0'; - len--; - } - if (len == 0) - continue; - - /* break up the line into parameter & value. - * will need to eat a little whitespace possibly */ - param = buf; - if (!(ptr = strchr_m (buf, '='))) - continue; - - val = ptr+1; - *ptr = '\0'; - - /* eat leading white space */ - while ((*val!='\0') && ((*val==' ') || (*val=='\t'))) - val++; - - if (strwicmp("password", param) == 0) - { - pstrcpy(info->password, val); - info->got_pass = True; - } - else if (strwicmp("username", param) == 0) - pstrcpy(info->username, val); - else if (strwicmp("domain", param) == 0) - set_global_myworkgroup(val); - memset(buf, 0, sizeof(buf)); - } - x_fclose(auth); -} - -/* Handle command line options: - * -U,--user - * -A,--authentication-file - * -k,--use-kerberos - * -N,--no-pass - */ - - -static void popt_common_credentials_callback(poptContext con, - enum poptCallbackReason reason, - const struct poptOption *opt, - const char *arg, const void *data) -{ - char *p; - - if (reason == POPT_CALLBACK_REASON_PRE) { - cmdline_auth_info.use_kerberos = False; - cmdline_auth_info.got_pass = False; - pstrcpy(cmdline_auth_info.username, "GUEST"); - - if (getenv("LOGNAME"))pstrcpy(cmdline_auth_info.username,getenv("LOGNAME")); - - if (getenv("USER")) { - pstrcpy(cmdline_auth_info.username,getenv("USER")); - - if ((p = strchr_m(cmdline_auth_info.username,'%'))) { - *p = 0; - pstrcpy(cmdline_auth_info.password,p+1); - cmdline_auth_info.got_pass = True; - memset(strchr_m(getenv("USER"),'%')+1,'X',strlen(cmdline_auth_info.password)); - } - } - - if (getenv("PASSWD")) { - pstrcpy(cmdline_auth_info.password,getenv("PASSWD")); - cmdline_auth_info.got_pass = True; - } - - if (getenv("PASSWD_FD") || getenv("PASSWD_FILE")) { - get_password_file(&cmdline_auth_info); - cmdline_auth_info.got_pass = True; - } - - return; - } - - switch(opt->val) { - case 'U': - { - char *lp; - - pstrcpy(cmdline_auth_info.username,arg); - if ((lp=strchr_m(cmdline_auth_info.username,'%'))) { - *lp = 0; - pstrcpy(cmdline_auth_info.password,lp+1); - cmdline_auth_info.got_pass = True; - memset(strchr_m(arg,'%')+1,'X',strlen(cmdline_auth_info.password)); - } - } - break; - - case 'A': - get_credentials_file(arg, &cmdline_auth_info); - break; - - case 'k': -#ifndef HAVE_KRB5 - d_printf("No kerberos support compiled in\n"); - exit(1); -#else - cmdline_auth_info.use_kerberos = True; - cmdline_auth_info.got_pass = True; -#endif - break; - } -} - - - -struct poptOption popt_common_credentials[] = { - { NULL, 0, POPT_ARG_CALLBACK|POPT_CBFLAG_PRE, popt_common_credentials_callback }, - { "user", 'U', POPT_ARG_STRING, NULL, 'U', "Set the network username", "USERNAME" }, - { "no-pass", 'N', POPT_ARG_NONE, &cmdline_auth_info.got_pass, True, "Don't ask for a password" }, - { "kerberos", 'k', POPT_ARG_NONE, &cmdline_auth_info.use_kerberos, True, "Use kerberos (active directory) authentication" }, - { "authentication-file", 'A', POPT_ARG_STRING, NULL, 'A', "Get the credentials from a file", "FILE" }, - POPT_TABLEEND +struct poptOption popt_common_log_base[] = { + { NULL, 0, POPT_ARG_CALLBACK|POPT_CBFLAG_PRE, popt_common_callback }, + { "log-basename", 'l', POPT_ARG_STRING, NULL, 'l', "Basename for log/debug files"}, + { 0 } }; diff --git a/source3/lib/username.c b/source3/lib/username.c index d8f4ff80edb..b8f33494ee4 100644 --- a/source3/lib/username.c +++ b/source3/lib/username.c @@ -339,7 +339,7 @@ static BOOL user_in_winbind_group_list(const char *user, const char *gname, BOOL goto err; } - if (!lp_idmap_gid(&gid_low, &gid_high)) { + if (!lp_winbind_gid(&gid_low, &gid_high)) { DEBUG(4, ("winbind gid range not configured, therefore %s cannot be a winbind group\n", gname)); goto err; } diff --git a/source3/lib/util.c b/source3/lib/util.c index 3ecfc925526..4f564b332a0 100644 --- a/source3/lib/util.c +++ b/source3/lib/util.c @@ -1040,7 +1040,7 @@ BOOL get_mydomname(fstring my_domname) Interpret a protocol description string, with a default. ****************************************************************************/ -int interpret_protocol(const char *str,int def) +int interpret_protocol(char *str,int def) { if (strequal(str,"NT1")) return(PROTOCOL_NT1); @@ -1400,24 +1400,20 @@ void smb_panic(const char *why) { char *cmd; int result; - size_t i; - void *backtrace_stack[BACKTRACE_STACK_SIZE]; - size_t backtrace_size; - char **backtrace_strings; #ifdef DEVELOPER { extern char *global_clobber_region_function; extern unsigned int global_clobber_region_line; - + if (global_clobber_region_function) { DEBUG(0,("smb_panic: clobber_region() last called from [%s(%u)]\n", - global_clobber_region_function, - global_clobber_region_line)); + global_clobber_region_function, + global_clobber_region_line)); } } #endif - + cmd = lp_panic_action(); if (cmd && *cmd) { DEBUG(0, ("smb_panic(): calling panic action [%s]\n", cmd)); @@ -1425,36 +1421,19 @@ void smb_panic(const char *why) if (result == -1) DEBUG(0, ("smb_panic(): fork failed in panic action: %s\n", - strerror(errno))); + strerror(errno))); else DEBUG(0, ("smb_panic(): action returned status %d\n", - WEXITSTATUS(result))); + WEXITSTATUS(result))); } DEBUG(0,("PANIC: %s\n", why)); - -#ifdef HAVE_BACKTRACE_SYMBOLS - /* get the backtrace (stack frames) */ - backtrace_size = backtrace(backtrace_stack,BACKTRACE_STACK_SIZE); - backtrace_strings = backtrace_symbols(backtrace_stack, backtrace_size); - - DEBUG(0, ("BACKTRACE: %d stack frames:\n", backtrace_size)); - - if (backtrace_strings) { - for (i = 0; i < backtrace_size; i++) - DEBUGADD(0, (" #%u %s\n", i, backtrace_strings[i])); - - SAFE_FREE(backtrace_strings); - } - -#endif - dbgflush(); abort(); } /******************************************************************* - A readdir wrapper which just returns the file name. - ********************************************************************/ + A readdir wrapper which just returns the file name. +********************************************************************/ const char *readdirname(DIR *p) { diff --git a/source3/lib/util_getent.c b/source3/lib/util_getent.c index 32641dbf83b..ef01dd5947b 100644 --- a/source3/lib/util_getent.c +++ b/source3/lib/util_getent.c @@ -228,7 +228,7 @@ static struct sys_userlist *add_members_to_userlist(struct sys_userlist *list_he free_userlist(list_head); return NULL; } - entry->unix_name = (char *)strdup(grp->gr_mem[i]); + entry->unix_name = strdup(grp->gr_mem[i]); if (entry->unix_name == NULL) { SAFE_FREE(entry); free_userlist(list_head); diff --git a/source3/lib/util_sid.c b/source3/lib/util_sid.c index dfd3b312e06..824987f1892 100644 --- a/source3/lib/util_sid.c +++ b/source3/lib/util_sid.c @@ -91,9 +91,8 @@ static const struct { {SID_NAME_DELETED, "Deleted Account"}, {SID_NAME_INVALID, "Invalid Account"}, {SID_NAME_UNKNOWN, "UNKNOWN"}, - {SID_NAME_COMPUTER, "Computer"}, - {0, NULL} + {SID_NAME_USE_NONE, NULL} }; const char *sid_type_lookup(uint32 sid_type) @@ -630,21 +629,3 @@ void print_guid(GUID *guid) d_printf("%02x", guid->info[i]); d_printf("\n"); } - -/******************************************************************* - Tallocs a duplicate SID. -********************************************************************/ - -DOM_SID *sid_dup_talloc(TALLOC_CTX *ctx, DOM_SID *src) -{ - DOM_SID *dst; - - if(!src) - return NULL; - - if((dst = talloc_zero(ctx, sizeof(DOM_SID))) != NULL) { - sid_copy( dst, src); - } - - return dst; -} diff --git a/source3/libads/ads_utils.c b/source3/libads/ads_utils.c index 626c1779266..750940e336b 100644 --- a/source3/libads/ads_utils.c +++ b/source3/libads/ads_utils.c @@ -88,52 +88,6 @@ uint32 ads_uf2atype(uint32 uf) return atype; } -/* -translated the GROUP_CTRL Flags to GroupType (groupType) -*/ -uint32 ads_gcb2gtype(uint16 gcb) -{ - uint32 gtype = 0x00000000; - - if (gcb & GCB_ALIAS_GROUP) gtype |= GTYPE_SECURITY_BUILTIN_LOCAL_GROUP; - else if(gcb & GCB_LOCAL_GROUP) gtype |= GTYPE_SECURITY_DOMAIN_LOCAL_GROUP; - if (gcb & GCB_GLOBAL_GROUP) gtype |= GTYPE_SECURITY_GLOBAL_GROUP; - - return gtype; -} - -/* -translated the GroupType (groupType) to GROUP_CTRL Flags -*/ -uint16 ads_gtype2gcb(uint32 gtype) -{ - uint16 gcb = 0x0000; - - switch(gtype) { - case GTYPE_SECURITY_BUILTIN_LOCAL_GROUP: - gcb = GCB_ALIAS_GROUP; - break; - case GTYPE_SECURITY_DOMAIN_LOCAL_GROUP: - gcb = GCB_LOCAL_GROUP; - break; - case GTYPE_SECURITY_GLOBAL_GROUP: - gcb = GCB_GLOBAL_GROUP; - break; - - case GTYPE_DISTRIBUTION_GLOBAL_GROUP: - gcb = GCB_GLOBAL_GROUP; - break; - case GTYPE_DISTRIBUTION_DOMAIN_LOCAL_GROUP: - gcb = GCB_LOCAL_GROUP; - break; - case GTYPE_DISTRIBUTION_UNIVERSAL_GROUP: - gcb = GCB_GLOBAL_GROUP; - break; - } - - return gcb; -} - /* get the accountType from the groupType */ diff --git a/source3/libads/krb5_setpw.c b/source3/libads/krb5_setpw.c index 214871b3fb5..a5b9eee4ceb 100644 --- a/source3/libads/krb5_setpw.c +++ b/source3/libads/krb5_setpw.c @@ -538,6 +538,7 @@ ADS_STATUS krb5_set_password(const char *kdc_host, const char *princ, const char krb5_free_creds(context, credsp); krb5_free_principal(context, creds.client); + krb5_free_principal(context, creds.server); krb5_free_principal(context, principal); krb5_free_context(context); @@ -570,11 +571,11 @@ kerb_prompter(krb5_context ctx, void *data, return 0; } -static ADS_STATUS krb5_chg_password(const char *kdc_host, - const char *principal, - const char *oldpw, - const char *newpw, - int time_offset) +ADS_STATUS krb5_chg_password(const char *kdc_host, + const char *principal, + const char *oldpw, + const char *newpw, + int time_offset) { ADS_STATUS aret; krb5_error_code ret; diff --git a/source3/libads/ldap.c b/source3/libads/ldap.c index baedfb28dbb..67827d27f3a 100644 --- a/source3/libads/ldap.c +++ b/source3/libads/ldap.c @@ -401,7 +401,7 @@ static char **ads_pull_strvals(TALLOC_CTX *ctx, const char **in_vals) * @param ads connection to ads server * @param bind_path Base dn for the search * @param scope Scope of search (LDAP_BASE | LDAP_ONE | LDAP_SUBTREE) - * @param expr Search expression - specified in local charset + * @param exp Search expression - specified in local charset * @param attrs Attributes to retrieve - specified in utf8 or ascii * @param res ** which will contain results - free res* with ads_msgfree() * @param count Number of entries retrieved on this page @@ -409,12 +409,12 @@ static char **ads_pull_strvals(TALLOC_CTX *ctx, const char **in_vals) * @return status of search **/ ADS_STATUS ads_do_paged_search(ADS_STRUCT *ads, const char *bind_path, - int scope, const char *expr, + int scope, const char *exp, const char **attrs, void **res, int *count, void **cookie) { int rc, i, version; - char *utf8_expr, *utf8_path, **search_attrs; + char *utf8_exp, *utf8_path, **search_attrs; LDAPControl PagedResults, NoReferrals, *controls[3], **rcontrols; BerElement *cookie_be = NULL; struct berval *cookie_bv= NULL; @@ -428,7 +428,7 @@ ADS_STATUS ads_do_paged_search(ADS_STRUCT *ads, const char *bind_path, /* 0 means the conversion worked but the result was empty so we only fail if it's -1. In any case, it always at least nulls out the dest */ - if ((push_utf8_talloc(ctx, &utf8_expr, expr) == (size_t)-1) || + if ((push_utf8_talloc(ctx, &utf8_exp, exp) == (size_t)-1) || (push_utf8_talloc(ctx, &utf8_path, bind_path) == (size_t)-1)) { rc = LDAP_NO_MEMORY; goto done; @@ -489,7 +489,7 @@ ADS_STATUS ads_do_paged_search(ADS_STRUCT *ads, const char *bind_path, */ ldap_set_option(ads->ld, LDAP_OPT_REFERRALS, LDAP_OPT_OFF); - rc = ldap_search_ext_s(ads->ld, utf8_path, scope, utf8_expr, + rc = ldap_search_ext_s(ads->ld, utf8_path, scope, utf8_exp, search_attrs, 0, controls, NULL, NULL, LDAP_NO_LIMIT, (LDAPMessage **)res); @@ -497,7 +497,7 @@ ADS_STATUS ads_do_paged_search(ADS_STRUCT *ads, const char *bind_path, ber_bvfree(cookie_bv); if (rc) { - DEBUG(3,("ldap_search_ext_s(%s) -> %s\n", expr, ldap_err2string(rc))); + DEBUG(3,("ldap_search_ext_s(%s) -> %s\n", exp, ldap_err2string(rc))); goto done; } @@ -541,20 +541,20 @@ done: * @param ads connection to ads server * @param bind_path Base dn for the search * @param scope Scope of search (LDAP_BASE | LDAP_ONE | LDAP_SUBTREE) - * @param expr Search expression + * @param exp Search expression * @param attrs Attributes to retrieve * @param res ** which will contain results - free res* with ads_msgfree() * @return status of search **/ ADS_STATUS ads_do_search_all(ADS_STRUCT *ads, const char *bind_path, - int scope, const char *expr, + int scope, const char *exp, const char **attrs, void **res) { void *cookie = NULL; int count = 0; ADS_STATUS status; - status = ads_do_paged_search(ads, bind_path, scope, expr, attrs, res, + status = ads_do_paged_search(ads, bind_path, scope, exp, attrs, res, &count, &cookie); if (!ADS_ERR_OK(status)) return status; @@ -564,7 +564,7 @@ ADS_STATUS ads_do_search_all(ADS_STRUCT *ads, const char *bind_path, ADS_STATUS status2; LDAPMessage *msg, *next; - status2 = ads_do_paged_search(ads, bind_path, scope, expr, + status2 = ads_do_paged_search(ads, bind_path, scope, exp, attrs, &res2, &count, &cookie); if (!ADS_ERR_OK(status2)) break; @@ -588,14 +588,14 @@ ADS_STATUS ads_do_search_all(ADS_STRUCT *ads, const char *bind_path, * @param ads connection to ads server * @param bind_path Base dn for the search * @param scope Scope of search (LDAP_BASE | LDAP_ONE | LDAP_SUBTREE) - * @param expr Search expression - specified in local charset + * @param exp Search expression - specified in local charset * @param attrs Attributes to retrieve - specified in UTF-8 or ascii * @param fn Function which takes attr name, values list, and data_area * @param data_area Pointer which is passed to function on each call * @return status of search **/ ADS_STATUS ads_do_search_all_fn(ADS_STRUCT *ads, const char *bind_path, - int scope, const char *expr, const char **attrs, + int scope, const char *exp, const char **attrs, BOOL(*fn)(char *, void **, void *), void *data_area) { @@ -604,7 +604,7 @@ ADS_STATUS ads_do_search_all_fn(ADS_STRUCT *ads, const char *bind_path, ADS_STATUS status; void *res; - status = ads_do_paged_search(ads, bind_path, scope, expr, attrs, &res, + status = ads_do_paged_search(ads, bind_path, scope, exp, attrs, &res, &count, &cookie); if (!ADS_ERR_OK(status)) return status; @@ -613,7 +613,7 @@ ADS_STATUS ads_do_search_all_fn(ADS_STRUCT *ads, const char *bind_path, ads_msgfree(ads, res); while (cookie) { - status = ads_do_paged_search(ads, bind_path, scope, expr, attrs, + status = ads_do_paged_search(ads, bind_path, scope, exp, attrs, &res, &count, &cookie); if (!ADS_ERR_OK(status)) break; @@ -630,18 +630,18 @@ ADS_STATUS ads_do_search_all_fn(ADS_STRUCT *ads, const char *bind_path, * @param ads connection to ads server * @param bind_path Base dn for the search * @param scope Scope of search (LDAP_BASE | LDAP_ONE | LDAP_SUBTREE) - * @param expr Search expression + * @param exp Search expression * @param attrs Attributes to retrieve * @param res ** which will contain results - free res* with ads_msgfree() * @return status of search **/ ADS_STATUS ads_do_search(ADS_STRUCT *ads, const char *bind_path, int scope, - const char *expr, + const char *exp, const char **attrs, void **res) { struct timeval timeout; int rc; - char *utf8_expr, *utf8_path, **search_attrs = NULL; + char *utf8_exp, *utf8_path, **search_attrs = NULL; TALLOC_CTX *ctx; if (!(ctx = talloc_init("ads_do_search"))) { @@ -652,7 +652,7 @@ ADS_STATUS ads_do_search(ADS_STRUCT *ads, const char *bind_path, int scope, /* 0 means the conversion worked but the result was empty so we only fail if it's negative. In any case, it always at least nulls out the dest */ - if ((push_utf8_talloc(ctx, &utf8_expr, expr) == (size_t)-1) || + if ((push_utf8_talloc(ctx, &utf8_exp, exp) == (size_t)-1) || (push_utf8_talloc(ctx, &utf8_path, bind_path) == (size_t)-1)) { DEBUG(1,("ads_do_search: push_utf8_talloc() failed!")); rc = LDAP_NO_MEMORY; @@ -679,7 +679,7 @@ ADS_STATUS ads_do_search(ADS_STRUCT *ads, const char *bind_path, int scope, /* see the note in ads_do_paged_search - we *must* disable referrals */ ldap_set_option(ads->ld, LDAP_OPT_REFERRALS, LDAP_OPT_OFF); - rc = ldap_search_ext_s(ads->ld, utf8_path, scope, utf8_expr, + rc = ldap_search_ext_s(ads->ld, utf8_path, scope, utf8_exp, search_attrs, 0, NULL, NULL, &timeout, LDAP_NO_LIMIT, (LDAPMessage **)res); @@ -698,16 +698,16 @@ ADS_STATUS ads_do_search(ADS_STRUCT *ads, const char *bind_path, int scope, * Do a general ADS search * @param ads connection to ads server * @param res ** which will contain results - free res* with ads_msgfree() - * @param expr Search expression + * @param exp Search expression * @param attrs Attributes to retrieve * @return status of search **/ ADS_STATUS ads_search(ADS_STRUCT *ads, void **res, - const char *expr, + const char *exp, const char **attrs) { return ads_do_search(ads, ads->config.bind_path, LDAP_SCOPE_SUBTREE, - expr, attrs, res); + exp, attrs, res); } /** @@ -772,18 +772,18 @@ char *ads_get_dn(ADS_STRUCT *ads, void *res) ADS_STATUS ads_find_machine_acct(ADS_STRUCT *ads, void **res, const char *host) { ADS_STATUS status; - char *expr; + char *exp; const char *attrs[] = {"*", "nTSecurityDescriptor", NULL}; /* the easiest way to find a machine account anywhere in the tree is to look for hostname$ */ - if (asprintf(&expr, "(samAccountName=%s$)", host) == -1) { + if (asprintf(&exp, "(samAccountName=%s$)", host) == -1) { DEBUG(1, ("asprintf failed!\n")); return ADS_ERROR_NT(NT_STATUS_NO_MEMORY); } - status = ads_search(ads, res, expr, attrs); - free(expr); + status = ads_search(ads, res, exp, attrs); + free(exp); return status; } @@ -1424,7 +1424,7 @@ ADS_STATUS ads_leave_realm(ADS_STRUCT *ads, const char *hostname) ADS_STATUS ads_set_machine_sd(ADS_STRUCT *ads, const char *hostname, char *dn) { const char *attrs[] = {"nTSecurityDescriptor", "objectSid", 0}; - char *expr = 0; + char *exp = 0; size_t sd_size = 0; struct berval bval = {0, NULL}; prs_struct ps_wire; @@ -1452,7 +1452,7 @@ ADS_STATUS ads_set_machine_sd(ADS_STRUCT *ads, const char *hostname, char *dn) return ADS_ERROR_NT(NT_STATUS_NO_MEMORY); } - if (asprintf(&expr, "(samAccountName=%s$)", escaped_hostname) == -1) { + if (asprintf(&exp, "(samAccountName=%s$)", escaped_hostname) == -1) { DEBUG(1, ("ads_set_machine_sd: asprintf failed!\n")); SAFE_FREE(escaped_hostname); return ADS_ERROR_NT(NT_STATUS_NO_MEMORY); @@ -1460,7 +1460,7 @@ ADS_STATUS ads_set_machine_sd(ADS_STRUCT *ads, const char *hostname, char *dn) SAFE_FREE(escaped_hostname); - ret = ads_search(ads, (void *) &res, expr, attrs); + ret = ads_search(ads, (void *) &res, exp, attrs); if (!ADS_ERR_OK(ret)) return ret; @@ -2036,7 +2036,7 @@ but you need to force the bind path to match the configurationNamingContext from */ ADS_STATUS ads_workgroup_name(ADS_STRUCT *ads, TALLOC_CTX *mem_ctx, char **workgroup) { - char *expr; + char *exp; ADS_STATUS rc; char **principles; char *prefix; @@ -2047,10 +2047,10 @@ ADS_STATUS ads_workgroup_name(ADS_STRUCT *ads, TALLOC_CTX *mem_ctx, char **workg (*workgroup) = NULL; - asprintf(&expr, "(&(objectclass=computer)(dnshostname=%s.%s))", + asprintf(&exp, "(&(objectclass=computer)(dnshostname=%s.%s))", ads->config.ldap_server_name, ads->config.realm); - rc = ads_search(ads, &res, expr, attrs); - free(expr); + rc = ads_search(ads, &res, exp, attrs); + free(exp); if (!ADS_ERR_OK(rc)) { return rc; diff --git a/source3/libads/ldap_utils.c b/source3/libads/ldap_utils.c index 68556002880..907f7c8aff5 100644 --- a/source3/libads/ldap_utils.c +++ b/source3/libads/ldap_utils.c @@ -28,7 +28,7 @@ this is supposed to catch dropped connections and auto-reconnect */ ADS_STATUS ads_do_search_retry(ADS_STRUCT *ads, const char *bind_path, int scope, - const char *expr, + const char *exp, const char **attrs, void **res) { ADS_STATUS status; @@ -46,10 +46,10 @@ ADS_STATUS ads_do_search_retry(ADS_STRUCT *ads, const char *bind_path, int scope return ADS_ERROR_NT(NT_STATUS_NO_MEMORY); while (count--) { - status = ads_do_search_all(ads, bp, scope, expr, attrs, res); + status = ads_do_search_all(ads, bp, scope, exp, attrs, res); if (ADS_ERR_OK(status)) { DEBUG(5,("Search for %s gave %d replies\n", - expr, ads_count_replies(ads, *res))); + exp, ads_count_replies(ads, *res))); free(bp); return status; } @@ -79,11 +79,11 @@ ADS_STATUS ads_do_search_retry(ADS_STRUCT *ads, const char *bind_path, int scope ADS_STATUS ads_search_retry(ADS_STRUCT *ads, void **res, - const char *expr, + const char *exp, const char **attrs) { return ads_do_search_retry(ads, ads->config.bind_path, LDAP_SCOPE_SUBTREE, - expr, attrs, res); + exp, attrs, res); } ADS_STATUS ads_search_retry_dn(ADS_STRUCT *ads, void **res, diff --git a/source3/libsmb/cliconnect.c b/source3/libsmb/cliconnect.c index 75dcd62c2f3..763878f9b38 100644 --- a/source3/libsmb/cliconnect.c +++ b/source3/libsmb/cliconnect.c @@ -750,6 +750,7 @@ BOOL cli_ulogoff(struct cli_state *cli) /**************************************************************************** Send a tconX. ****************************************************************************/ + BOOL cli_send_tconX(struct cli_state *cli, const char *share, const char *dev, const char *pass, int passlen) { @@ -1342,45 +1343,3 @@ name *SMBSERVER with error %s\n", desthost, cli_errstr(cli) )); return True; } - - - - - -/**************************************************************************** - Send an old style tcon. -****************************************************************************/ -NTSTATUS cli_raw_tcon(struct cli_state *cli, - const char *service, const char *pass, const char *dev, - uint16 *max_xmit, uint16 *tid) -{ - char *p; - - memset(cli->outbuf,'\0',smb_size); - memset(cli->inbuf,'\0',smb_size); - - set_message(cli->outbuf, 0, 0, True); - SCVAL(cli->outbuf,smb_com,SMBtcon); - cli_setup_packet(cli); - - p = smb_buf(cli->outbuf); - *p++ = 4; p += clistr_push(cli, p, service, -1, STR_TERMINATE | STR_NOALIGN); - *p++ = 4; p += clistr_push(cli, p, pass, -1, STR_TERMINATE | STR_NOALIGN); - *p++ = 4; p += clistr_push(cli, p, dev, -1, STR_TERMINATE | STR_NOALIGN); - - cli_setup_bcc(cli, p); - - cli_send_smb(cli); - if (!cli_receive_smb(cli)) { - return NT_STATUS_UNEXPECTED_NETWORK_ERROR; - } - - if (cli_is_error(cli)) { - return cli_nt_error(cli); - } - - *max_xmit = SVAL(cli->inbuf, smb_vwv0); - *tid = SVAL(cli->inbuf, smb_vwv1); - - return NT_STATUS_OK; -} diff --git a/source3/libsmb/clientgen.c b/source3/libsmb/clientgen.c index 0da9a8932fc..d9691930894 100644 --- a/source3/libsmb/clientgen.c +++ b/source3/libsmb/clientgen.c @@ -259,6 +259,9 @@ struct cli_state *cli_initialise(struct cli_state *cli) if (getenv("CLI_FORCE_DOSERR")) cli->force_dos_errors = True; + /* initialise signing */ + cli_null_set_signing(cli); + if (lp_client_signing()) cli->sign_info.allow_smb_signing = True; @@ -271,13 +274,6 @@ struct cli_state *cli_initialise(struct cli_state *cli) memset(cli->outbuf, 0, cli->bufsize); memset(cli->inbuf, 0, cli->bufsize); - /* just becouse we over-allocate, doesn't mean it's right to use it */ - clobber_region(FUNCTION_MACRO, __LINE__, cli->outbuf+cli->bufsize, SAFETY_MARGIN); - clobber_region(FUNCTION_MACRO, __LINE__, cli->inbuf+cli->bufsize, SAFETY_MARGIN); - - /* initialise signing */ - cli_null_set_signing(cli); - cli->nt_pipe_fnum = 0; cli->initialised = 1; diff --git a/source3/libsmb/clierror.c b/source3/libsmb/clierror.c index cea736ef180..12a7b5dba18 100644 --- a/source3/libsmb/clierror.c +++ b/source3/libsmb/clierror.c @@ -2,7 +2,6 @@ Unix SMB/CIFS implementation. client error handling routines Copyright (C) Andrew Tridgell 1994-1998 - Copyright (C) Jelmer Vernooij 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -221,104 +220,16 @@ static struct { int error; } nt_errno_map[] = { {NT_STATUS_ACCESS_VIOLATION, EACCES}, + {NT_STATUS_NO_SUCH_FILE, ENOENT}, + {NT_STATUS_NO_SUCH_DEVICE, ENODEV}, {NT_STATUS_INVALID_HANDLE, EBADF}, + {NT_STATUS_NO_MEMORY, ENOMEM}, {NT_STATUS_ACCESS_DENIED, EACCES}, {NT_STATUS_OBJECT_NAME_NOT_FOUND, ENOENT}, {NT_STATUS_SHARING_VIOLATION, EBUSY}, {NT_STATUS_OBJECT_PATH_INVALID, ENOTDIR}, {NT_STATUS_OBJECT_NAME_COLLISION, EEXIST}, {NT_STATUS_PATH_NOT_COVERED, ENOENT}, - {NT_STATUS_UNSUCCESSFUL, EINVAL}, - {NT_STATUS_NOT_IMPLEMENTED, ENOSYS}, - {NT_STATUS_IN_PAGE_ERROR, EFAULT}, - {NT_STATUS_BAD_NETWORK_NAME, ENOENT}, -#ifdef EDQUOT - {NT_STATUS_PAGEFILE_QUOTA, EDQUOT}, - {NT_STATUS_QUOTA_EXCEEDED, EDQUOT}, - {NT_STATUS_REGISTRY_QUOTA_LIMIT, EDQUOT}, - {NT_STATUS_LICENSE_QUOTA_EXCEEDED, EDQUOT}, -#endif -#ifdef ETIME - {NT_STATUS_TIMER_NOT_CANCELED, ETIME}, -#endif - {NT_STATUS_INVALID_PARAMETER, EINVAL}, - {NT_STATUS_NO_SUCH_DEVICE, ENODEV}, - {NT_STATUS_NO_SUCH_FILE, ENOENT}, -#ifdef ENODATA - {NT_STATUS_END_OF_FILE, ENODATA}, -#endif -#ifdef ENOMEDIUM - {NT_STATUS_NO_MEDIA_IN_DEVICE, ENOMEDIUM}, - {NT_STATUS_NO_MEDIA, ENOMEDIUM}, -#endif - {NT_STATUS_NONEXISTENT_SECTOR, ESPIPE}, - {NT_STATUS_NO_MEMORY, ENOMEM}, - {NT_STATUS_CONFLICTING_ADDRESSES, EADDRINUSE}, - {NT_STATUS_NOT_MAPPED_VIEW, EINVAL}, - {NT_STATUS_UNABLE_TO_FREE_VM, EADDRINUSE}, - {NT_STATUS_ACCESS_DENIED, EACCES}, - {NT_STATUS_BUFFER_TOO_SMALL, ENOBUFS}, - {NT_STATUS_WRONG_PASSWORD, EACCES}, - {NT_STATUS_LOGON_FAILURE, EACCES}, - {NT_STATUS_INVALID_WORKSTATION, EACCES}, - {NT_STATUS_INVALID_LOGON_HOURS, EACCES}, - {NT_STATUS_PASSWORD_EXPIRED, EACCES}, - {NT_STATUS_ACCOUNT_DISABLED, EACCES}, - {NT_STATUS_DISK_FULL, ENOSPC}, - {NT_STATUS_INVALID_PIPE_STATE, EPIPE}, - {NT_STATUS_PIPE_BUSY, EPIPE}, - {NT_STATUS_PIPE_DISCONNECTED, EPIPE}, - {NT_STATUS_PIPE_NOT_AVAILABLE, ENOSYS}, - {NT_STATUS_FILE_IS_A_DIRECTORY, EISDIR}, - {NT_STATUS_NOT_SUPPORTED, ENOSYS}, - {NT_STATUS_NOT_A_DIRECTORY, ENOTDIR}, - {NT_STATUS_DIRECTORY_NOT_EMPTY, ENOTEMPTY}, - {NT_STATUS_NETWORK_UNREACHABLE, ENETUNREACH}, - {NT_STATUS_HOST_UNREACHABLE, EHOSTUNREACH}, - {NT_STATUS_CONNECTION_ABORTED, ECONNABORTED}, - {NT_STATUS_CONNECTION_REFUSED, ECONNREFUSED}, - {NT_STATUS_TOO_MANY_LINKS, EMLINK}, - {NT_STATUS_NETWORK_BUSY, EBUSY}, - {NT_STATUS_DEVICE_DOES_NOT_EXIST, ENODEV}, -#ifdef ELIBACC - {NT_STATUS_DLL_NOT_FOUND, ELIBACC}, -#endif - {NT_STATUS_PIPE_BROKEN, EPIPE}, - {NT_STATUS_REMOTE_NOT_LISTENING, ECONNREFUSED}, - {NT_STATUS_NETWORK_ACCESS_DENIED, EACCES}, - {NT_STATUS_TOO_MANY_OPENED_FILES, EMFILE}, -#ifdef EPROTO - {NT_STATUS_DEVICE_PROTOCOL_ERROR, EPROTO}, -#endif - {NT_STATUS_FLOAT_OVERFLOW, ERANGE}, - {NT_STATUS_FLOAT_UNDERFLOW, ERANGE}, - {NT_STATUS_INTEGER_OVERFLOW, ERANGE}, - {NT_STATUS_MEDIA_WRITE_PROTECTED, EROFS}, - {NT_STATUS_PIPE_CONNECTED, EISCONN}, - {NT_STATUS_MEMORY_NOT_ALLOCATED, EFAULT}, - {NT_STATUS_FLOAT_INEXACT_RESULT, ERANGE}, - {NT_STATUS_ILL_FORMED_PASSWORD, EACCES}, - {NT_STATUS_PASSWORD_RESTRICTION, EACCES}, - {NT_STATUS_ACCOUNT_RESTRICTION, EACCES}, - {NT_STATUS_PORT_CONNECTION_REFUSED, ECONNREFUSED}, - {NT_STATUS_NAME_TOO_LONG, ENAMETOOLONG}, - {NT_STATUS_REMOTE_DISCONNECT, ESHUTDOWN}, - {NT_STATUS_CONNECTION_DISCONNECTED, ECONNABORTED}, - {NT_STATUS_CONNECTION_RESET, ENETRESET}, -#ifdef ENOTUNIQ - {NT_STATUS_IP_ADDRESS_CONFLICT1, ENOTUNIQ}, - {NT_STATUS_IP_ADDRESS_CONFLICT2, ENOTUNIQ}, -#endif - {NT_STATUS_PORT_MESSAGE_TOO_LONG, EMSGSIZE}, - {NT_STATUS_PROTOCOL_UNREACHABLE, ENOPROTOOPT}, - {NT_STATUS_ADDRESS_ALREADY_EXISTS, EADDRINUSE}, - {NT_STATUS_PORT_UNREACHABLE, EHOSTUNREACH}, - {NT_STATUS_IO_TIMEOUT, ETIMEDOUT}, - {NT_STATUS_RETRY, EAGAIN}, -#ifdef ECOMM - {NT_STATUS_NET_WRITE_FAULT, ECOMM}, -#endif - {NT_STATUS(0), 0} }; diff --git a/source3/libsmb/clifile.c b/source3/libsmb/clifile.c index 4eb5efe1935..d86f36405dd 100644 --- a/source3/libsmb/clifile.c +++ b/source3/libsmb/clifile.c @@ -942,6 +942,7 @@ BOOL cli_setatr(struct cli_state *cli, const char *fname, uint16 attr, time_t t) /**************************************************************************** Check for existance of a dir. ****************************************************************************/ + BOOL cli_chkpath(struct cli_state *cli, const char *path) { pstring path2; @@ -1048,34 +1049,3 @@ int cli_ctemp(struct cli_state *cli, const char *path, char **tmp_path) return SVAL(cli->inbuf,smb_vwv0); } - - -/* - send a raw ioctl - used by the torture code -*/ -NTSTATUS cli_raw_ioctl(struct cli_state *cli, int fnum, uint32 code, DATA_BLOB *blob) -{ - memset(cli->outbuf,'\0',smb_size); - memset(cli->inbuf,'\0',smb_size); - - set_message(cli->outbuf, 3, 0, True); - SCVAL(cli->outbuf,smb_com,SMBioctl); - cli_setup_packet(cli); - - SSVAL(cli->outbuf, smb_vwv0, fnum); - SSVAL(cli->outbuf, smb_vwv1, code>>16); - SSVAL(cli->outbuf, smb_vwv2, (code&0xFFFF)); - - cli_send_smb(cli); - if (!cli_receive_smb(cli)) { - return NT_STATUS_UNEXPECTED_NETWORK_ERROR; - } - - if (cli_is_error(cli)) { - return cli_nt_error(cli); - } - - *blob = data_blob(NULL, 0); - - return NT_STATUS_OK; -} diff --git a/source3/libsmb/clirap.c b/source3/libsmb/clirap.c index f05a65762b2..224c37046c0 100644 --- a/source3/libsmb/clirap.c +++ b/source3/libsmb/clirap.c @@ -233,7 +233,7 @@ BOOL cli_NetServerEnum(struct cli_state *cli, char *workgroup, uint32 stype, SIVAL(p,0,stype); p += 4; - push_ascii(p, workgroup, sizeof(pstring)-PTR_DIFF(p,param)-1, STR_TERMINATE|STR_UPPER); + p += push_pstring_base(p, workgroup, param); if (cli_api(cli, param, PTR_DIFF(p,param), 8, /* params, length, max */ diff --git a/source3/libsmb/clistr.c b/source3/libsmb/clistr.c index c61445c0735..bba9fcf15a0 100644 --- a/source3/libsmb/clistr.c +++ b/source3/libsmb/clistr.c @@ -3,7 +3,7 @@ client string routines Copyright (C) Andrew Tridgell 2001 Copyright (C) Andrew Bartlett 2003 - + This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or diff --git a/source3/libsmb/libsmb_cache.c b/source3/libsmb/libsmb_cache.c index 67dc686b487..b1620042f38 100644 --- a/source3/libsmb/libsmb_cache.c +++ b/source3/libsmb/libsmb_cache.c @@ -50,8 +50,8 @@ struct smbc_server_cache { * This function is only used if the external cache is not enabled */ static int smbc_add_cached_server(SMBCCTX * context, SMBCSRV * new, - const char * server, const char * share, - const char * workgroup, const char * username) + char * server, char * share, + char * workgroup, char * username) { struct smbc_server_cache * srvcache = NULL; @@ -108,8 +108,8 @@ static int smbc_add_cached_server(SMBCCTX * context, SMBCSRV * new, * returns server_fd on success, -1 on error (not found) * This function is only used if the external cache is not enabled */ -static SMBCSRV * smbc_get_cached_server(SMBCCTX * context, const char * server, - const char * share, const char * workgroup, const char * user) +static SMBCSRV * smbc_get_cached_server(SMBCCTX * context, char * server, + char * share, char * workgroup, char * user) { struct smbc_server_cache * srv = NULL; diff --git a/source3/libsmb/libsmbclient.c b/source3/libsmb/libsmbclient.c index 41a67559532..440527cd9d4 100644 --- a/source3/libsmb/libsmbclient.c +++ b/source3/libsmb/libsmbclient.c @@ -52,87 +52,6 @@ extern BOOL in_client; */ static int smbc_initialized = 0; -static int -hex2int( unsigned int _char ) -{ - if ( _char >= 'A' && _char <='F') - return _char - 'A' + 10; - if ( _char >= 'a' && _char <='f') - return _char - 'a' + 10; - if ( _char >= '0' && _char <='9') - return _char - '0'; - return -1; -} - -static void -decode_urlpart(char *segment, size_t sizeof_segment) -{ - int old_length = strlen(segment); - int new_length = 0; - int new_length2 = 0; - int i = 0; - pstring new_segment; - char *new_usegment = 0; - - if ( !old_length ) { - return; - } - - /* make a copy of the old one */ - new_usegment = (char*)malloc( old_length * 3 + 1 ); - - while( i < old_length ) { - int bReencode = False; - unsigned char character = segment[ i++ ]; - if ((character <= ' ') || (character > 127)) - bReencode = True; - - new_usegment [ new_length2++ ] = character; - if (character == '%' ) { - int a = i+1 < old_length ? hex2int( segment[i] ) : -1; - int b = i+1 < old_length ? hex2int( segment[i+1] ) : -1; - if ((a == -1) || (b == -1)) { /* Only replace if sequence is valid */ - /* Contains stray %, make sure to re-encode! */ - bReencode = True; - } else { - /* Valid %xx sequence */ - character = a * 16 + b; /* Replace with value of %dd */ - if (!character) - break; /* Stop at %00 */ - - new_usegment [ new_length2++ ] = (unsigned char) segment[i++]; - new_usegment [ new_length2++ ] = (unsigned char) segment[i++]; - } - } - if (bReencode) { - unsigned int c = character / 16; - new_length2--; - new_usegment [ new_length2++ ] = '%'; - - c += (c > 9) ? ('A' - 10) : '0'; - new_usegment[ new_length2++ ] = c; - - c = character % 16; - c += (c > 9) ? ('A' - 10) : '0'; - new_usegment[ new_length2++ ] = c; - } - - new_segment [ new_length++ ] = character; - } - new_segment [ new_length ] = 0; - - free(new_usegment); - - /* realloc it with unix charset */ - pull_utf8_allocate((void**)&new_usegment, new_segment); - - /* this assumes (very safely) that removing %aa sequences - only shortens the string */ - strncpy(segment, new_usegment, sizeof_segment); - - free(new_usegment); -} - /* * Function to parse a path and turn it into components * @@ -178,7 +97,7 @@ smbc_parse_path(SMBCCTX *context, const char *fname, char *server, char *share, p += 2; /* Skip the // or \\ */ if (*p == (char)0) - goto decoding; + return 0; if (*p == '/') { @@ -239,7 +158,7 @@ smbc_parse_path(SMBCCTX *context, const char *fname, char *server, char *share, } - if (*p == (char)0) goto decoding; /* That's it ... */ + if (*p == (char)0) return 0; /* That's it ... */ if (!next_token(&p, share, "/", sizeof(fstring))) { @@ -248,16 +167,9 @@ smbc_parse_path(SMBCCTX *context, const char *fname, char *server, char *share, } pstrcpy(path, p); - + all_string_sub(path, "/", "\\", 0); - decoding: - decode_urlpart(path, sizeof(pstring)); - decode_urlpart(server, sizeof(fstring)); - decode_urlpart(share, sizeof(fstring)); - decode_urlpart(user, sizeof(fstring)); - decode_urlpart(password, sizeof(fstring)); - return 0; } @@ -355,16 +267,15 @@ int smbc_remove_unused_server(SMBCCTX * context, SMBCSRV * srv) */ SMBCSRV *smbc_server(SMBCCTX *context, - const char *server, const char *share, - fstring workgroup, fstring username, - fstring password) + char *server, char *share, + char *workgroup, char *username, + char *password) { SMBCSRV *srv=NULL; int auth_called = 0; struct cli_state c; struct nmb_name called, calling; - char *p; - const char *server_n = server; + char *p, *server_n = server; fstring group; pstring ipenv; struct in_addr ip; @@ -818,6 +729,27 @@ static int smbc_close_ctx(SMBCCTX *context, SMBCFILE *file) } + if (!file->file) { + + return context->closedir(context, file); + + } + + if (!cli_close(&file->srv->cli, file->cli_fd)) { + DEBUG(3, ("cli_close failed on %s. purging server.\n", + file->fname)); + /* Deallocate slot and remove the server + * from the server cache if unused */ + errno = smbc_errno(context, &file->srv->cli); + srv = file->srv; + DLIST_REMOVE(context->internal->_files, file); + SAFE_FREE(file->fname); + SAFE_FREE(file); + context->callbacks.remove_unused_server_fn(context, srv); + + return -1; + } + DLIST_REMOVE(context->internal->_files, file); SAFE_FREE(file->fname); SAFE_FREE(file); @@ -1071,16 +1003,12 @@ static off_t smbc_lseek_ctx(SMBCCTX *context, SMBCFILE *file, off_t offset, int case SEEK_END: if (!cli_qfileinfo(&file->srv->cli, file->cli_fd, NULL, &size, NULL, NULL, - NULL, NULL, NULL)) - { - SMB_BIG_UINT b_size = size; - if (!cli_getattrE(&file->srv->cli, file->cli_fd, NULL, &b_size, NULL, NULL, - NULL)) - { + NULL, NULL, NULL) && + !cli_getattrE(&file->srv->cli, file->cli_fd, NULL, &size, NULL, NULL, + NULL)) { + errno = EINVAL; return -1; - } else - size = b_size; } file->offset = size + offset; break; @@ -1278,15 +1206,12 @@ static int smbc_fstat_ctx(SMBCCTX *context, SMBCFILE *file, struct stat *st) } if (!cli_qfileinfo(&file->srv->cli, file->cli_fd, - &mode, &size, &c_time, &a_time, &m_time, NULL, &ino)) { - SMB_BIG_UINT b_size = size; - if (!cli_getattrE(&file->srv->cli, file->cli_fd, - &mode, &b_size, &c_time, &a_time, &m_time)) { + &mode, &size, &c_time, &a_time, &m_time, NULL, &ino) && + !cli_getattrE(&file->srv->cli, file->cli_fd, + &mode, &size, &c_time, &a_time, &m_time)) { errno = EINVAL; return -1; - } else - size = b_size; } @@ -1339,13 +1264,6 @@ static int add_dirent(SMBCFILE *dir, const char *name, const char *comment, uint { struct smbc_dirent *dirent; int size; - char *u_name = NULL, *u_comment = NULL; - size_t u_name_len = 0, u_comment_len = 0; - - if (name) - u_name_len = push_utf8_allocate(&u_name, name); - if (comment) - u_comment_len = push_utf8_allocate(&u_comment, comment); /* * Allocate space for the dirent, which must be increased by the @@ -1353,7 +1271,8 @@ static int add_dirent(SMBCFILE *dir, const char *name, const char *comment, uint * The null on the name is already accounted for. */ - size = sizeof(struct smbc_dirent) + u_name_len + u_comment_len + 1; + size = sizeof(struct smbc_dirent) + (name?strlen(name):0) + + (comment?strlen(comment):0) + 1; dirent = malloc(size); @@ -1402,17 +1321,14 @@ static int add_dirent(SMBCFILE *dir, const char *name, const char *comment, uint dir->dir_end->dirent = dirent; dirent->smbc_type = type; - dirent->namelen = u_name_len; - dirent->commentlen = u_comment_len; + dirent->namelen = (name?strlen(name):0); + dirent->commentlen = (comment?strlen(comment):0); dirent->dirlen = size; - strncpy(dirent->name, (u_name?u_name:""), dirent->namelen + 1); + strncpy(dirent->name, (name?name:""), dirent->namelen + 1); dirent->comment = (char *)(&dirent->name + dirent->namelen + 1); - strncpy(dirent->comment, (u_comment?u_comment:""), dirent->commentlen + 1); - - SAFE_FREE(u_comment); - SAFE_FREE(u_name); + strncpy(dirent->comment, (comment?comment:""), dirent->commentlen + 1); return 0; @@ -1476,47 +1392,9 @@ dir_list_fn(file_info *finfo, const char *mask, void *state) } - -/* Return the IP address and workgroup of a master browser on the - network. */ - -static BOOL find_master_ip_bcast(pstring workgroup, struct in_addr *server_ip) -{ - struct in_addr *ip_list; - int i, count; - - /* Go looking for workgroups by broadcasting on the local network */ - - if (!name_resolve_bcast(MSBROWSE, 1, &ip_list, &count)) { - return False; - } - - for (i = count-1; i < count; i++) { - static fstring name; - - DEBUG(0, ("name_status_find %d %s\n", i, inet_ntoa(ip_list[i]))); - - if (!name_status_find("*", 0, 0x1d, ip_list[i], name)) - continue; - - if (!find_master_ip(name, server_ip)) - continue; - - pstrcpy(workgroup, name); - - DEBUG(4, ("found master browser %s, %s\n", - name, inet_ntoa(ip_list[i]))); - - return True; - } - - return False; -} - static SMBCFILE *smbc_opendir_ctx(SMBCCTX *context, const char *fname) { - fstring server, share, user, password; - pstring workgroup; + fstring server, share, user, password, workgroup; pstring path; SMBCSRV *srv = NULL; SMBCFILE *dir = NULL; @@ -1524,29 +1402,29 @@ static SMBCFILE *smbc_opendir_ctx(SMBCCTX *context, const char *fname) if (!context || !context->internal || !context->internal->_initialized) { - DEBUG(4, ("no valid context\n")); + errno = EINVAL; return NULL; } if (!fname) { - DEBUG(4, ("no valid fname\n")); + errno = EINVAL; return NULL; + } if (smbc_parse_path(context, fname, server, share, path, user, password)) { - DEBUG(4, ("no valid path\n")); + errno = EINVAL; return NULL; - } - DEBUG(4, ("parsed path: fname='%s' server='%s' share='%s' path='%s'\n", fname, server, share, path)); + } if (user[0] == (char)0) fstrcpy(user, context->user); - pstrcpy(workgroup, context->workgroup); + fstrcpy(workgroup, context->workgroup); dir = malloc(sizeof(*dir)); @@ -1567,56 +1445,64 @@ static SMBCFILE *smbc_opendir_ctx(SMBCCTX *context, const char *fname) dir->dir_list = dir->dir_next = dir->dir_end = NULL; if (server[0] == (char)0) { - struct in_addr server_ip; - DEBUG(4, ("empty server\n")); + if (share[0] != (char)0 || path[0] != (char)0) { - DEBUG(4,("share %d path %d\n", share[0], path[0])); + errno = EINVAL; if (dir) { SAFE_FREE(dir->fname); SAFE_FREE(dir); } return NULL; + } /* We have server and share and path empty ... so list the workgroups */ /* first try to get the LMB for our workgroup, and if that fails, */ /* try the DMB */ - pstrcpy(workgroup, lp_workgroup()); + if (!(resolve_name(context->workgroup, &rem_ip, 0x1d) || + resolve_name(context->workgroup, &rem_ip, 0x1b))) { + + errno = EINVAL; /* Something wrong with smb.conf? */ + return NULL; - if (!find_master_ip(lp_workgroup(), &server_ip)) { - DEBUG(4, ("Unable to find master browser for workgroup %s\n", - workgroup)); - if (!find_master_ip_bcast(workgroup, &server_ip)) { - DEBUG(4, ("Unable to find master browser by " - "broadcast\n")); - errno = ENOENT; + } + + dir->dir_type = SMBC_WORKGROUP; + + /* find the name of the server ... */ + + if (!name_status_find("*", 0, 0, rem_ip, server)) { + + DEBUG(0,("Could not get the name of local/domain master browser for server %s\n", server)); + errno = EINVAL; return NULL; - } - } - - /* - * Get a connection to IPC$ on the server if we do not already have one - */ - - srv = smbc_server(context, inet_ntoa(server_ip), "IPC$", workgroup, user, password); - - if (!srv) { - - if (dir) { - SAFE_FREE(dir->fname); - SAFE_FREE(dir); - } - return NULL; - } - + + } + + /* + * Get a connection to IPC$ on the server if we do not already have one + */ + + srv = smbc_server(context, server, "IPC$", workgroup, user, password); + + if (!srv) { + + if (dir) { + SAFE_FREE(dir->fname); + SAFE_FREE(dir); + } + + return NULL; + + } + dir->srv = srv; - dir->dir_type = SMBC_WORKGROUP; /* Now, list the stuff ... */ - if (!cli_NetServerEnum(&srv->cli, workgroup, SV_TYPE_DOMAIN_ENUM, list_fn, + if (!cli_NetServerEnum(&srv->cli, workgroup, 0x80000000, list_fn, (void *)dir)) { if (dir) { @@ -1674,7 +1560,7 @@ static SMBCFILE *smbc_opendir_ctx(SMBCCTX *context, const char *fname) srv = smbc_server(context, buserver, "IPC$", workgroup, user, password); if (!srv) { - DEBUG(0, ("got no contact to IPC$\n")); + if (dir) { SAFE_FREE(dir->fname); SAFE_FREE(dir); @@ -2172,7 +2058,6 @@ static int smbc_rmdir_ctx(SMBCCTX *context, const char *fname) static off_t smbc_telldir_ctx(SMBCCTX *context, SMBCFILE *dir) { - off_t ret_val; /* Squash warnings about cast */ if (!context || !context->internal || !context->internal->_initialized) { @@ -2196,11 +2081,7 @@ static off_t smbc_telldir_ctx(SMBCCTX *context, SMBCFILE *dir) } - /* - * We return the pointer here as the offset - */ - ret_val = (int)dir->dir_next; - return ret_val; + return (off_t) dir->dir_next; } @@ -2240,9 +2121,8 @@ struct smbc_dir_list *smbc_check_dir_ent(struct smbc_dir_list *list, static int smbc_lseekdir_ctx(SMBCCTX *context, SMBCFILE *dir, off_t offset) { - long int l_offset = offset; /* Handle problems of size */ - struct smbc_dirent *dirent = (struct smbc_dirent *)l_offset; - struct smbc_dir_list *list_ent = (struct smbc_dir_list *)NULL; + struct smbc_dirent *dirent = (struct smbc_dirent *)offset; + struct smbc_dir_list *list_ent = NULL; if (!context || !context->internal || !context->internal->_initialized) { @@ -2692,7 +2572,7 @@ SMBCCTX * smbc_init_context(SMBCCTX * context) /* Do we still need this ? */ DEBUGLEVEL = 10; - setup_logging( "libsmbclient", True); + setup_logging( "libsmbclient", False); /* Here we would open the smb.conf file if needed ... */ @@ -2760,8 +2640,8 @@ SMBCCTX * smbc_init_context(SMBCCTX * context) slprintf(context->netbios_name, 16, "smbc%s%d", context->user, pid); } } - - DEBUG(1, ("Using netbios name %s.\n", context->netbios_name)); + DEBUG(0,("Using netbios name %s.\n", context->netbios_name)); + if (!context->workgroup) { if (lp_workgroup()) { @@ -2772,8 +2652,7 @@ SMBCCTX * smbc_init_context(SMBCCTX * context) context->workgroup = strdup("samba"); } } - - DEBUG(1, ("Using workgroup %s.\n", context->workgroup)); + DEBUG(0,("Using workgroup %s.\n", context->workgroup)); /* shortest timeout is 1 second */ if (context->timeout > 0 && context->timeout < 1000) diff --git a/source3/libsmb/netlogon_unigrp.c b/source3/libsmb/netlogon_unigrp.c index 466410d8005..fa2fe32f35f 100644 --- a/source3/libsmb/netlogon_unigrp.c +++ b/source3/libsmb/netlogon_unigrp.c @@ -22,7 +22,6 @@ */ #include "includes.h" -#define UNIGROUP_PREFIX "UNIGROUP" /* Handle for netlogon_unigrp.tdb database. It is used internally @@ -51,22 +50,17 @@ BOOL uni_group_cache_init(void) BOOL uni_group_cache_store_netlogon(TALLOC_CTX *mem_ctx, NET_USER_INFO_3 *user) { TDB_DATA key,data; - fstring keystr, sid_string; - DOM_SID user_sid; - unsigned int i; + fstring keystr; + int i; if (!uni_group_cache_init()) { DEBUG(0,("uni_group_cache_store_netlogon: cannot open netlogon_unigrp.tdb for write!\n")); return False; } - sid_copy(&user_sid, &user->dom_sid.sid); - sid_append_rid(&user_sid, user->user_rid); - - /* Prepare key as USER-SID string */ - slprintf(keystr, sizeof(keystr), "%s/%s", - UNIGROUP_PREFIX, - sid_to_string(sid_string, &user_sid)); + /* Prepare key as DOMAIN-SID/USER-RID string */ + slprintf(keystr, sizeof(keystr), "%s/%d", + sid_string_static(&user->dom_sid.sid), user->user_rid); key.dptr = keystr; key.dsize = strlen(keystr) + 1; @@ -96,15 +90,14 @@ BOOL uni_group_cache_store_netlogon(TALLOC_CTX *mem_ctx, NET_USER_INFO_3 *user) and elements are array[0] ... array[num_elements-1] */ -DOM_SID **uni_group_cache_fetch(DOM_SID *domain, DOM_SID *user_sid, +uint32* uni_group_cache_fetch(DOM_SID *domain, uint32 user_rid, TALLOC_CTX *mem_ctx, uint32 *num_groups) { TDB_DATA key,data; fstring keystr; - DOM_SID **groups; + uint32 *groups; uint32 i; uint32 group_count; - fstring sid_string; if (!domain) { DEBUG(1,("uni_group_cache_fetch: expected non-null domain sid\n")); @@ -130,9 +123,8 @@ DOM_SID **uni_group_cache_fetch(DOM_SID *domain, DOM_SID *user_sid, *num_groups = 0; /* Fetch universal groups */ - slprintf(keystr, sizeof(keystr), "%s/%s", - UNIGROUP_PREFIX, - sid_to_string(sid_string, user_sid)); + slprintf(keystr, sizeof(keystr), "%s/%d", + sid_string_static(domain), user_rid); key.dptr = keystr; key.dsize = strlen(keystr) + 1; data = tdb_fetch(netlogon_unigrp_tdb, key); @@ -144,17 +136,12 @@ DOM_SID **uni_group_cache_fetch(DOM_SID *domain, DOM_SID *user_sid, /* Transfer data to receiver's memory context */ group_count = IVAL(&((uint32*)data.dptr)[0],0); - groups = talloc(mem_ctx, (group_count)*sizeof(*groups)); + groups = talloc(mem_ctx, (group_count)*sizeof(uint32)); if (groups) { for(i=0; iexpected_state)); + DEBUG(1, ("unknown NTLMSSP command %u\n", ntlmssp_command)); return NT_STATUS_INVALID_PARAMETER; } } diff --git a/source3/libsmb/trusts_util.c b/source3/libsmb/trust_passwd.c similarity index 69% rename from source3/libsmb/trusts_util.c rename to source3/libsmb/trust_passwd.c index b8f84ba890a..cf9fd58b13f 100644 --- a/source3/libsmb/trusts_util.c +++ b/source3/libsmb/trust_passwd.c @@ -1,8 +1,7 @@ /* * Unix SMB/CIFS implementation. - * Routines to operate on various trust relationships - * Copyright (C) Andrew Bartlett 2001 - * Copyright (C) Rafal Szczesniak 2003 + * Routines to change trust account passwords. + * Copyright (C) Andrew Bartlett 2001. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by @@ -114,63 +113,4 @@ NTSTATUS trust_pw_find_change_and_store_it(struct cli_state *cli, TALLOC_CTX *me return trust_pw_change_and_store_it(cli, mem_ctx, old_trust_passwd_hash); -} - - -/** - * Verify whether or not given domain is trusted. - * - * @param domain_name name of the domain to be verified - * @return true if domain is one of the trusted once or - * false if otherwise - **/ - -BOOL is_trusted_domain(const char* dom_name) -{ - int enum_ctx = 0; - const int trustdom_size = 10; - int num_domains, i; - TRUSTDOM **domains; - NTSTATUS result; - fstring trustdom_name; - DOM_SID trustdom_sid; - TALLOC_CTX *mem_ctx; - - /* - * Query the secrets db as an ultimate source of information - * about trusted domain names. This is PDC or BDC case. - */ - mem_ctx = talloc_init("is_trusted_domain"); - - do { - result = secrets_get_trusted_domains(mem_ctx, &enum_ctx, trustdom_size, - &num_domains, &domains); - /* compare each returned entry against incoming connection's domain */ - for (i = 0; i < num_domains; i++) { - pull_ucs2_fstring(trustdom_name, domains[i]->name); - if (strequal(trustdom_name, dom_name)) { - talloc_destroy(mem_ctx); - return True; - } - } - } while (NT_STATUS_EQUAL(result, STATUS_MORE_ENTRIES)); - - talloc_destroy(mem_ctx); - - /* - * Query the trustdom_cache updated periodically. The only - * way for domain member server. - */ - if (trustdom_cache_enable() && - trustdom_cache_fetch(dom_name, &trustdom_sid)) { - trustdom_cache_shutdown(); - return True; - } - - /* - * if nothing's been found, then give up here, although - * the last resort might be to query the PDC. - */ - return False; -} - +} diff --git a/source3/mainpage.dox b/source3/mainpage.dox new file mode 100644 index 00000000000..8b72f804627 --- /dev/null +++ b/source3/mainpage.dox @@ -0,0 +1,7 @@ +/** + +@mainpage + +@li \ref CodingSuggestions + +**/ diff --git a/source3/modules/developer.c b/source3/modules/developer.c deleted file mode 100644 index 7ffc3ff50d2..00000000000 --- a/source3/modules/developer.c +++ /dev/null @@ -1,132 +0,0 @@ -/* - Unix SMB/CIFS implementation. - Samba module with developer tools - Copyright (C) Andrew Tridgell 2001 - Copyright (C) Jelmer Vernooij 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" - -static struct { - char from; - char *to; - int len; -} weird_table[] = { - {'q', "^q^", 3}, - {'Q', "^Q^", 3}, - {0, NULL} -}; - -static size_t weird_pull(void *cd, char **inbuf, size_t *inbytesleft, - char **outbuf, size_t *outbytesleft) -{ - while (*inbytesleft >= 1 && *outbytesleft >= 2) { - int i; - int done = 0; - for (i=0;weird_table[i].from;i++) { - if (strncmp((*inbuf), - weird_table[i].to, - weird_table[i].len) == 0) { - if (*inbytesleft < weird_table[i].len) { - DEBUG(0,("ERROR: truncated weird string\n")); - /* smb_panic("weird_pull"); */ - - } else { - (*outbuf)[0] = weird_table[i].from; - (*outbuf)[1] = 0; - (*inbytesleft) -= weird_table[i].len; - (*outbytesleft) -= 2; - (*inbuf) += weird_table[i].len; - (*outbuf) += 2; - done = 1; - break; - } - } - } - if (done) continue; - (*outbuf)[0] = (*inbuf)[0]; - (*outbuf)[1] = 0; - (*inbytesleft) -= 1; - (*outbytesleft) -= 2; - (*inbuf) += 1; - (*outbuf) += 2; - } - - if (*inbytesleft > 0) { - errno = E2BIG; - return -1; - } - - return 0; -} - -static size_t weird_push(void *cd, char **inbuf, size_t *inbytesleft, - char **outbuf, size_t *outbytesleft) -{ - int ir_count=0; - - while (*inbytesleft >= 2 && *outbytesleft >= 1) { - int i; - int done=0; - for (i=0;weird_table[i].from;i++) { - if ((*inbuf)[0] == weird_table[i].from && - (*inbuf)[1] == 0) { - if (*outbytesleft < weird_table[i].len) { - DEBUG(0,("No room for weird character\n")); - /* smb_panic("weird_push"); */ - } else { - memcpy(*outbuf, weird_table[i].to, - weird_table[i].len); - (*inbytesleft) -= 2; - (*outbytesleft) -= weird_table[i].len; - (*inbuf) += 2; - (*outbuf) += weird_table[i].len; - done = 1; - break; - } - } - } - if (done) continue; - - (*outbuf)[0] = (*inbuf)[0]; - if ((*inbuf)[1]) ir_count++; - (*inbytesleft) -= 2; - (*outbytesleft) -= 1; - (*inbuf) += 2; - (*outbuf) += 1; - } - - if (*inbytesleft == 1) { - errno = EINVAL; - return -1; - } - - if (*inbytesleft > 1) { - errno = E2BIG; - return -1; - } - - return ir_count; -} - -struct charset_functions weird_functions = {"WEIRD", weird_pull, weird_push}; - -int charset_weird_init(void) -{ - smb_register_charset(&weird_functions); - return True; -} diff --git a/source3/modules/vfs_audit.c b/source3/modules/vfs_audit.c index fa9bf67a672..1944c98e531 100644 --- a/source3/modules/vfs_audit.c +++ b/source3/modules/vfs_audit.c @@ -98,9 +98,10 @@ static vfs_op_tuple audit_ops[] = { /* VFS initialisation function. Return vfs_op_tuple array back to SAMBA. */ -static vfs_op_tuple *audit_init(const struct vfs_ops *def_vfs_ops, +vfs_op_tuple *vfs_init(int *vfs_version, struct vfs_ops *def_vfs_ops, struct smb_vfs_handle_struct *vfs_handle) { + *vfs_version = SMB_VFS_INTERFACE_VERSION; memcpy(&default_vfs_ops, def_vfs_ops, sizeof(struct vfs_ops)); audit_handle = vfs_handle; @@ -110,6 +111,12 @@ static vfs_op_tuple *audit_init(const struct vfs_ops *def_vfs_ops, return audit_ops; } +/* VFS finalization function. */ +void vfs_done(connection_struct *conn) +{ + syslog(SYSLOG_PRIORITY, "VFS_DONE: vfs module unloaded\n"); +} + /* Implementation of vfs_ops. Pass everything on to the default operation but log event first. */ @@ -269,8 +276,3 @@ static int audit_fchmod_acl(struct files_struct *fsp, int fd, mode_t mode) return result; } - -int vfs_audit_init(void) -{ - return smb_register_vfs("audit", audit_init, SMB_VFS_INTERFACE_VERSION); -} diff --git a/source3/modules/vfs_extd_audit.c b/source3/modules/vfs_extd_audit.c index f60acab36af..c75dc1d09c2 100644 --- a/source3/modules/vfs_extd_audit.c +++ b/source3/modules/vfs_extd_audit.c @@ -99,9 +99,10 @@ static vfs_op_tuple audit_ops[] = { /* VFS initialisation function. Return vfs_op_tuple array back to SAMBA. */ -static vfs_op_tuple *audit_init(const struct vfs_ops *def_vfs_ops, +vfs_op_tuple *vfs_init(int *vfs_version, struct vfs_ops *def_vfs_ops, struct smb_vfs_handle_struct *vfs_handle) { + *vfs_version = SMB_VFS_INTERFACE_VERSION; memcpy(&default_vfs_ops, def_vfs_ops, sizeof(struct vfs_ops)); audit_handle = vfs_handle; @@ -112,6 +113,13 @@ static vfs_op_tuple *audit_init(const struct vfs_ops *def_vfs_ops, return audit_ops; } +/* VFS finalization function. */ + +void vfs_done(connection_struct *conn) +{ + syslog(SYSLOG_PRIORITY, "VFS_DONE: vfs module unloaded\n"); +} + /* Implementation of vfs_ops. Pass everything on to the default operation but log event first. */ @@ -309,8 +317,3 @@ static int audit_fchmod_acl(struct files_struct *fsp, int fd, mode_t mode) return result; } - -int vfs_extd_audit_init(void) -{ - return smb_register_vfs("extd_audit", audit_init, SMB_VFS_INTERFACE_VERSION); -} diff --git a/source3/modules/vfs_netatalk.c b/source3/modules/vfs_netatalk.c index c9e3cde6210..b69a900e144 100644 --- a/source3/modules/vfs_netatalk.c +++ b/source3/modules/vfs_netatalk.c @@ -410,9 +410,10 @@ static vfs_op_tuple atalk_ops[] = { }; /* VFS initialisation function. Return vfs_op_tuple array back to SAMBA. */ -static vfs_op_tuple *netatalk_init(const struct vfs_ops *def_vfs_ops, +vfs_op_tuple *vfs_init(int *vfs_version, struct vfs_ops *def_vfs_ops, struct smb_vfs_handle_struct *vfs_handle) { + *vfs_version = SMB_VFS_INTERFACE_VERSION; memcpy(&default_vfs_ops, def_vfs_ops, sizeof(struct vfs_ops)); atalk_handle = vfs_handle; @@ -421,7 +422,8 @@ static vfs_op_tuple *netatalk_init(const struct vfs_ops *def_vfs_ops, return atalk_ops; } -int vfs_netatalk_init(void) +/* VFS finalization function. */ +void vfs_done(connection_struct *conn) { - return smb_register_vfs("netatalk", netatalk_init, SMB_VFS_INTERFACE_VERSION); + DEBUG(3, ("ATALK: vfs module unloaded\n")); } diff --git a/source3/modules/vfs_recycle.c b/source3/modules/vfs_recycle.c index a669d864c6b..eedb65cd9d1 100644 --- a/source3/modules/vfs_recycle.c +++ b/source3/modules/vfs_recycle.c @@ -37,7 +37,7 @@ static const char *delimiter = "|"; /* delimiter for options */ typedef struct recycle_bin_struct { - TALLOC_CTX *mem_ctx; + TALLOC_CTX *ctx; char *repository; /* name of the recycle bin directory */ BOOL keep_dir_tree; /* keep directory structure of deleted file in recycle bin */ BOOL versions; /* create versions of deleted files with identical name */ @@ -48,19 +48,6 @@ typedef struct recycle_bin_struct SMB_OFF_T maxsize; /* maximum file size to be saved */ } recycle_bin_struct; -typedef struct recycle_bin_connections { - int conn; - recycle_bin_struct *data; - struct recycle_bin_connections *next; -} recycle_bin_connections; - -typedef struct recycle_bin_private_data { - TALLOC_CTX *mem_ctx; - recycle_bin_connections *conns; -} recycle_bin_private_data; - -struct smb_vfs_handle_struct *recycle_bin_private_handle; - /* VFS operations */ static struct vfs_ops default_vfs_ops; /* For passthrough operation */ @@ -82,17 +69,26 @@ static vfs_op_tuple recycle_ops[] = { {NULL, SMB_VFS_OP_NOOP, SMB_VFS_LAYER_NOOP} }; +static BOOL check_bool_param(const char *value) +{ + if (strwicmp(value, "yes") == 0 || + strwicmp(value, "true") == 0 || + strwicmp(value, "1") == 0) + return True; + + return False; +} + /** * VFS initialisation function. * * @retval initialised vfs_op_tuple array **/ -static vfs_op_tuple *recycle_init(const struct vfs_ops *def_vfs_ops, +vfs_op_tuple *vfs_init(int *vfs_version, struct vfs_ops *def_vfs_ops, struct smb_vfs_handle_struct *vfs_handle) { - TALLOC_CTX *mem_ctx = NULL; - DEBUG(10, ("Initializing VFS module recycle\n")); + *vfs_version = SMB_VFS_INTERFACE_VERSION; memcpy(&default_vfs_ops, def_vfs_ops, sizeof(struct vfs_ops)); vfs_recycle_debug_level = debug_add_class("vfs_recycle_bin"); if (vfs_recycle_debug_level == -1) { @@ -102,55 +98,41 @@ static vfs_op_tuple *recycle_init(const struct vfs_ops *def_vfs_ops, DEBUG(0, ("vfs_recycle: Debug class number of 'vfs_recycle': %d\n", vfs_recycle_debug_level)); } - recycle_bin_private_handle = vfs_handle; - if (!(mem_ctx = talloc_init("recycle bin data"))) { - DEBUG(0, ("Failed to allocate memory in VFS module recycle_bin\n")); - return NULL; - } - - recycle_bin_private_handle->data = talloc(mem_ctx, sizeof(recycle_bin_private_data)); - if (recycle_bin_private_handle->data == NULL) { - DEBUG(0, ("Failed to allocate memory in VFS module recycle_bin\n")); - return NULL; - } - ((recycle_bin_private_data *)(recycle_bin_private_handle->data))->mem_ctx = mem_ctx; - ((recycle_bin_private_data *)(recycle_bin_private_handle->data))->conns = NULL; - return recycle_ops; } +/** + * VFS finalization function. + * + **/ +void vfs_done(connection_struct *conn) +{ + DEBUG(10,("Called for connection %d\n", SNUM(conn))); +} + static int recycle_connect(struct connection_struct *conn, const char *service, const char *user) { TALLOC_CTX *ctx = NULL; recycle_bin_struct *recbin; - recycle_bin_connections *recconn; - recycle_bin_connections *recconnbase; - recycle_bin_private_data *recdata; + char *servicename; char *tmp_str; DEBUG(10, ("Called for service %s (%d) as user %s\n", service, SNUM(conn), user)); - if (recycle_bin_private_handle) - recdata = (recycle_bin_private_data *)(recycle_bin_private_handle->data); - else { - DEBUG(0, ("Recycle bin not initialized!\n")); - return -1; - } - - if (!(ctx = talloc_init("recycle bin connection"))) { + if (!(ctx = talloc_init("recycle bin"))) { DEBUG(0, ("Failed to allocate memory in VFS module recycle_bin\n")); - return -1; + return 0; } - recbin = talloc(ctx, sizeof(recycle_bin_struct)); - if (recbin == NULL) { + recbin = talloc(ctx,sizeof(recycle_bin_struct)); + if ( recbin == NULL) { DEBUG(0, ("Failed to allocate memory in VFS module recycle_bin\n")); return -1; } - recbin->mem_ctx = ctx; + recbin->ctx = ctx; /* Set defaults */ - recbin->repository = talloc_strdup(recbin->mem_ctx, ".recycle"); + recbin->repository = talloc_strdup(ctx, ".recycle"); ALLOC_CHECK(recbin->repository, error); recbin->keep_dir_tree = False; recbin->versions = False; @@ -161,61 +143,55 @@ static int recycle_connect(struct connection_struct *conn, const char *service, recbin->maxsize = 0; /* parse configuration options */ - if ((tmp_str = lp_parm_string(SNUM(conn), "vfs_recycle_bin", "repository")) != NULL) { - recbin->repository = talloc_sub_conn(recbin->mem_ctx, conn, tmp_str); + servicename = talloc_strdup(recbin->ctx, lp_servicename(SNUM(conn))); + DEBUG(10, ("servicename = %s\n",servicename)); + if ((tmp_str = lp_parm_string(servicename, "vfs_recycle_bin", "repository")) != NULL) { + recbin->repository = talloc_sub_conn(ctx, conn, tmp_str); ALLOC_CHECK(recbin->repository, error); trim_string(recbin->repository, "/", "/"); DEBUG(5, ("recycle.bin: repository = %s\n", recbin->repository)); } - - recbin->keep_dir_tree = lp_parm_bool(SNUM(conn), "vfs_recycle_bin", "keeptree"); - DEBUG(5, ("recycle.bin: keeptree = %d\n", recbin->keep_dir_tree)); - - recbin->versions = lp_parm_bool(SNUM(conn), "vfs_recycle_bin", "versions"); - DEBUG(5, ("recycle.bin: versions = %d\n", recbin->versions)); - - recbin->touch = lp_parm_bool(SNUM(conn), "vfs_recycle_bin", "touch"); - DEBUG(5, ("recycle.bin: touch = %d\n", recbin->touch)); - - recbin->maxsize = lp_parm_ulong(SNUM(conn), "vfs_recycle_bin", "maxsize"); - if (recbin->maxsize == 0) { - recbin->maxsize = -1; - DEBUG(5, ("recycle.bin: maxsize = -infinite-\n")); - } else { - DEBUG(5, ("recycle.bin: maxsize = %ld\n", (long int)recbin->maxsize)); + if ((tmp_str = lp_parm_string(servicename, "vfs_recycle_bin", "keeptree")) != NULL) { + if (check_bool_param(tmp_str) == True) + recbin->keep_dir_tree = True; + DEBUG(5, ("recycle.bin: keeptree = %s\n", tmp_str)); + } + if ((tmp_str = lp_parm_string(servicename, "vfs_recycle_bin", "versions")) != NULL) { + if (check_bool_param(tmp_str) == True) + recbin->versions = True; + DEBUG(5, ("recycle.bin: versions = %s\n", tmp_str)); + } + if ((tmp_str = lp_parm_string(servicename, "vfs_recycle_bin", "touch")) != NULL) { + if (check_bool_param(tmp_str) == True) + recbin->touch = True; + DEBUG(5, ("recycle.bin: touch = %s\n", tmp_str)); + } + if ((tmp_str = lp_parm_string(servicename, "vfs_recycle_bin", "maxsize")) != NULL) { + recbin->maxsize = strtoul(tmp_str, NULL, 10); + if (recbin->maxsize == 0) { + recbin->maxsize = -1; + DEBUG(5, ("recycle.bin: maxsize = -infinite-\n")); + } else { + DEBUG(5, ("recycle.bin: maxsize = %ld\n", (long int)recbin->maxsize)); + } } - - if ((tmp_str = lp_parm_string(SNUM(conn), "vfs_recycle_bin", "exclude")) != NULL) { - recbin->exclude = talloc_strdup(recbin->mem_ctx, tmp_str); + if ((tmp_str = lp_parm_string(servicename, "vfs_recycle_bin", "exclude")) != NULL) { + recbin->exclude = talloc_strdup(ctx, tmp_str); ALLOC_CHECK(recbin->exclude, error); DEBUG(5, ("recycle.bin: exclude = %s\n", recbin->exclude)); } - if ((tmp_str = lp_parm_string(SNUM(conn), "vfs_recycle_bin", "exclude_dir")) != NULL) { - recbin->exclude_dir = talloc_strdup(recbin->mem_ctx, tmp_str); + if ((tmp_str = lp_parm_string(servicename,"vfs_recycle_bin", "exclude_dir")) != NULL) { + recbin->exclude_dir = talloc_strdup(ctx, tmp_str); ALLOC_CHECK(recbin->exclude_dir, error); DEBUG(5, ("recycle.bin: exclude_dir = %s\n", recbin->exclude_dir)); } - if ((tmp_str = lp_parm_string(SNUM(conn), "vfs_recycle_bin", "noversions")) != NULL) { - recbin->noversions = talloc_strdup(recbin->mem_ctx, tmp_str); + if ((tmp_str = lp_parm_string(servicename,"vfs_recycle_bin", "noversions")) != NULL) { + recbin->noversions = talloc_strdup(ctx, tmp_str); ALLOC_CHECK(recbin->noversions, error); DEBUG(5, ("recycle.bin: noversions = %s\n", recbin->noversions)); } - recconn = talloc(recdata->mem_ctx, sizeof(recycle_bin_connections)); - if (recconn == NULL) { - DEBUG(0, ("Failed to allocate memory in VFS module recycle_bin\n")); - goto error; - } - recconn->conn = SNUM(conn); - recconn->data = recbin; - recconn->next = NULL; - if (recdata->conns) { - recconnbase = recdata->conns; - while (recconnbase->next != NULL) recconnbase = recconnbase->next; - recconnbase->next = recconn; - } else { - recdata->conns = recconn; - } + conn->vfs_private = (void *)recbin; return default_vfs_ops.connect(conn, service, user); error: @@ -225,35 +201,10 @@ error: static void recycle_disconnect(struct connection_struct *conn) { - recycle_bin_private_data *recdata; - recycle_bin_connections *recconn; - DEBUG(10, ("Disconnecting VFS module recycle bin\n")); - - if (recycle_bin_private_handle) - recdata = (recycle_bin_private_data *)(recycle_bin_private_handle->data); - else { - DEBUG(0, ("Recycle bin not initialized!\n")); - return; - } - - if (recdata) { - if (recdata->conns) { - if (recdata->conns->conn == SNUM(conn)) { - talloc_destroy(recdata->conns->data->mem_ctx); - recdata->conns = recdata->conns->next; - } else { - recconn = recdata->conns; - while (recconn->next) { - if (recconn->next->conn == SNUM(conn)) { - talloc_destroy(recconn->next->data->mem_ctx); - recconn->next = recconn->next->next; - break; - } - recconn = recconn->next; - } - } - } + if (conn->vfs_private) { + talloc_destroy(((recycle_bin_struct *)conn->vfs_private)->ctx); + conn->vfs_private = NULL; } default_vfs_ops.disconnect(conn); } @@ -438,35 +389,26 @@ static void recycle_touch(connection_struct *conn, const char *fname) /** * Check if file should be recycled **/ -static int recycle_unlink(connection_struct *conn, const char *file_name) +static int recycle_unlink(connection_struct *conn, const char *inname) { - recycle_bin_private_data *recdata; - recycle_bin_connections *recconn; recycle_bin_struct *recbin; + char *file_name = NULL; char *path_name = NULL; char *temp_name = NULL; char *final_name = NULL; - const char *base; + char *base; int i; -/* SMB_BIG_UINT dfree, dsize, bsize; */ - SMB_OFF_T file_size; /* space_avail; */ + SMB_BIG_UINT dfree, dsize, bsize; + SMB_OFF_T file_size, space_avail; BOOL exist; int rc = -1; - recbin = NULL; - if (recycle_bin_private_handle) { - recdata = (recycle_bin_private_data *)(recycle_bin_private_handle->data); - if (recdata) { - if (recdata->conns) { - recconn = recdata->conns; - while (recconn && recconn->conn != SNUM(conn)) recconn = recconn->next; - if (recconn != NULL) { - recbin = recconn->data; - } - } - } - } - if (recbin == NULL) { + file_name = strdup(inname); + ALLOC_CHECK(file_name, done); + + if (conn->vfs_private) + recbin = (recycle_bin_struct *)conn->vfs_private; + else { DEBUG(0, ("Recycle bin not initialized!\n")); rc = default_vfs_ops.unlink(conn, file_name); goto done; @@ -522,13 +464,14 @@ static int recycle_unlink(connection_struct *conn, const char *file_name) path_name = (char *)malloc(PATH_MAX); ALLOC_CHECK(path_name, done); *path_name = '\0'; - safe_strcpy(path_name, file_name, PATH_MAX - 1); + safe_strcpy(path_name, file_name, PATH_MAX); base = strrchr(path_name, '/'); if (base == NULL) { base = file_name; - safe_strcpy(path_name, "/", PATH_MAX - 1); + safe_strcpy(path_name, "/", PATH_MAX); } else { + *base = '\0'; base++; } @@ -552,13 +495,14 @@ static int recycle_unlink(connection_struct *conn, const char *file_name) goto done; } - temp_name = (char *)strdup(recbin->repository); + temp_name = (char *)malloc(PATH_MAX); ALLOC_CHECK(temp_name, done); + safe_strcpy(temp_name, recbin->repository, PATH_MAX); /* see if we need to recreate the original directory structure in the recycle bin */ if (recbin->keep_dir_tree == True) { - safe_strcat(temp_name, "/", PATH_MAX - 1); - safe_strcat(temp_name, path_name, PATH_MAX - 1); + safe_strcat(temp_name, "/", PATH_MAX); + safe_strcat(temp_name, path_name, PATH_MAX); } exist = recycle_directory_exist(conn, temp_name); @@ -573,10 +517,10 @@ static int recycle_unlink(connection_struct *conn, const char *file_name) } } - final_name = NULL; - asprintf(&final_name, "%s/%s", temp_name, base); + final_name = (char *)malloc(PATH_MAX); ALLOC_CHECK(final_name, done); - DEBUG(10, ("recycle.bin: recycled file name: %s\n", temp_name)); /* new filename with path */ + snprintf(final_name, PATH_MAX, "%s/%s", temp_name, base); + DEBUG(10, ("recycle.bin: recycled file name%s\n", temp_name)); /* new filename with path */ /* check if we should delete file from recycle bin */ if (recycle_file_exist(conn, final_name)) { @@ -607,13 +551,9 @@ static int recycle_unlink(connection_struct *conn, const char *file_name) recycle_touch(conn, final_name); done: + SAFE_FREE(file_name); SAFE_FREE(path_name); SAFE_FREE(temp_name); SAFE_FREE(final_name); return rc; } - -int vfs_recycle_init(void) -{ - return smb_register_vfs("recycle", recycle_init, SMB_VFS_INTERFACE_VERSION); -} diff --git a/source3/nmbd/nmbd.c b/source3/nmbd/nmbd.c index 013ef9ddb79..5685db74529 100644 --- a/source3/nmbd/nmbd.c +++ b/source3/nmbd/nmbd.c @@ -3,7 +3,7 @@ NBT netbios routines and daemon - version 2 Copyright (C) Andrew Tridgell 1994-1998 Copyright (C) Jeremy Allison 1997-2002 - Copyright (C) Jelmer Vernooij 2002,2003 (Conversion to popt) + Copyright (C) Jelmer Vernooij 2002 (Conversion to popt) This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -600,9 +600,15 @@ static BOOL open_sockets(BOOL isdaemon, int port) {"log-stdout", 'S', POPT_ARG_VAL, &log_stdout, True, "Log to stdout" }, {"hosts", 'H', POPT_ARG_STRING, dyn_LMHOSTSFILE, 'H', "Load a netbios hosts file"}, {"port", 'p', POPT_ARG_INT, &global_nmb_port, NMB_PORT, "Listen on the specified port" }, - POPT_COMMON_SAMBA + {NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_debug }, + {NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_configfile }, + {NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_socket_options }, + {NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_version }, + {NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_netbios_name }, + {NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_log_base }, { NULL } }; + int opt; pstring logfile; global_nmb_port = NMB_PORT; @@ -618,7 +624,7 @@ static BOOL open_sockets(BOOL isdaemon, int port) fault_setup((void (*)(void *))fault_continue ); /* POSIX demands that signals are inherited. If the invoking process has - * these signals masked, we will have problems, as we won't receive them. */ + * these signals masked, we will have problems, as we won't recieve them. */ BlockSignals(False, SIGHUP); BlockSignals(False, SIGUSR1); BlockSignals(False, SIGTERM); @@ -637,6 +643,9 @@ static BOOL open_sockets(BOOL isdaemon, int port) #endif pc = poptGetContext("nmbd", argc, argv, long_options, 0); + while((opt = poptGetNextOpt(pc)) != -1) + { } + poptFreeContext(pc); if ( opt_interactive ) { diff --git a/source3/nsswitch/wbinfo.c b/source3/nsswitch/wbinfo.c index 61c54b37382..4f621e7008a 100644 --- a/source3/nsswitch/wbinfo.c +++ b/source3/nsswitch/wbinfo.c @@ -447,10 +447,9 @@ static BOOL wbinfo_auth(char *username) (result == NSS_STATUS_SUCCESS) ? "succeeded" : "failed"); if (response.data.auth.nt_status) - d_printf("error code was %s (0x%x)\nerror messsage was: %s\n", + d_printf("error code was %s (0x%x)\n", response.data.auth.nt_status_string, - response.data.auth.nt_status, - response.data.auth.error_string); + response.data.auth.nt_status); return result == NSS_STATUS_SUCCESS; } @@ -503,10 +502,9 @@ static BOOL wbinfo_auth_crap(char *username) (result == NSS_STATUS_SUCCESS) ? "succeeded" : "failed"); if (response.data.auth.nt_status) - d_printf("error code was %s (0x%x)\nerror messsage was: %s\n", + d_printf("error code was %s (0x%x)\n", response.data.auth.nt_status_string, - response.data.auth.nt_status, - response.data.auth.error_string); + response.data.auth.nt_status); return result == NSS_STATUS_SUCCESS; } @@ -713,8 +711,8 @@ int main(int argc, char **argv) { "set-auth-user", 'A', POPT_ARG_STRING, &string_arg, OPT_SET_AUTH_USER, "Store user and password used by winbindd (root only)", "user%password" }, { "get-auth-user", 0, POPT_ARG_NONE, NULL, OPT_GET_AUTH_USER, "Retrieve user and password used by winbindd (root only)", NULL }, { "ping", 'p', POPT_ARG_NONE, 0, 'p', "Ping winbindd to see if it is alive" }, - POPT_COMMON_VERSION - POPT_TABLEEND + { NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_version}, + { 0, 0, 0, 0 } }; /* Samba client initialisation */ diff --git a/source3/nsswitch/winbind_nss_aix.c b/source3/nsswitch/winbind_nss_aix.c index e69de29bb2d..c06fbc7d4b8 100644 --- a/source3/nsswitch/winbind_nss_aix.c +++ b/source3/nsswitch/winbind_nss_aix.c @@ -0,0 +1,370 @@ + +#include +#include +#include +#include + +#include "winbind_client.h" + +#define MAX_GETPWENT_USERS 250 +#define MAX_GETGRENT_USERS 250 + +BOOL next_token(char **ptr,char *buff,char *sep, size_t bufsize) +{ + char *s; + BOOL quoted; + size_t len=1; + + if (!ptr) return(False); + + s = *ptr; + + /* default to simple separators */ + if (!sep) sep = " \t\n\r"; + + /* find the first non sep char */ + while (*s && strchr(sep,*s)) s++; + + /* nothing left? */ + if (! *s) return(False); + + /* copy over the token */ + for (quoted = False; len < bufsize && *s && (quoted || !strchr(sep,*s)); s++) { + if (*s == '\"') { + quoted = !quoted; + } else { + len++; + *buff++ = *s; + } + } + + *ptr = (*s) ? s+1 : s; + *buff = 0; + + return(True); +} + +static struct passwd *fill_pwent(struct winbindd_pw *pw) +{ + struct passwd *result; + + if (!(result = malloc(sizeof(struct passwd)))) { + return NULL; + } + memset(result, 0, sizeof(struct passwd)); + + /* User name */ + + if ((result->pw_name = malloc(strlen(pw->pw_name) + 1)) == NULL) { + + /* Out of memory */ + + return NULL; + } + + strcpy(result->pw_name, pw->pw_name); + + /* Password */ + + if ((result->pw_passwd = malloc(strlen(pw->pw_passwd) + 1)) == NULL) { + + /* Out of memory */ + + return NULL; + } + + strcpy(result->pw_passwd, pw->pw_passwd); + + /* [ug]id */ + + result->pw_uid = pw->pw_uid; + result->pw_gid = pw->pw_gid; + + /* GECOS */ + + if ((result->pw_gecos = malloc(strlen(pw->pw_gecos) + 1)) == NULL) { + + /* Out of memory */ + + return NULL; + } + + strcpy(result->pw_gecos, pw->pw_gecos); + + /* Home directory */ + + if ((result->pw_dir = malloc(strlen(pw->pw_dir) + 1)) == NULL) { + + /* Out of memory */ + + return NULL; + } + + strcpy(result->pw_dir, pw->pw_dir); + + /* Logon shell */ + + if ((result->pw_shell = malloc(strlen(pw->pw_shell) + 1)) == NULL) { + + /* Out of memory */ + + return NULL; + } + + strcpy(result->pw_shell, pw->pw_shell); + + return result; +} + +static struct group *fill_grent(struct winbindd_gr *gr, char *gr_mem) +{ + fstring name; + int i; + char *tst; + struct group *result; + + if (!(result = malloc(sizeof(struct group)))) { + return NULL; + } + memset(result, 0, sizeof(struct group)); + + /* Group name */ + + if ((result->gr_name = malloc(strlen(gr->gr_name) + 1)) == NULL) { + + /* Out of memory */ + + return NULL; + } + + strcpy(result->gr_name, gr->gr_name); + + /* Password */ + + if ((result->gr_passwd = malloc(strlen(gr->gr_passwd) + 1)) == NULL) { + + /* Out of memory */ + + return NULL; + } + + strcpy(result->gr_passwd, gr->gr_passwd); + + /* gid */ + + result->gr_gid = gr->gr_gid; + + /* Group membership */ + + if ((gr->num_gr_mem < 0) || !gr_mem) { + gr->num_gr_mem = 0; + } + + if (gr->num_gr_mem == 0) { + + /* Group is empty */ + + *(result->gr_mem) = NULL; + return result; + } + + if ((tst = malloc(((gr->num_gr_mem + 1) * sizeof(char *)))) == NULL) { + + /* Out of memory */ + + return NULL; + } + result->gr_mem = (char **)tst; + + /* Start looking at extra data */ + + i = 0; + + while(next_token((char **)&gr_mem, name, ",", sizeof(fstring))) { + + /* Allocate space for member */ + + if (((result->gr_mem)[i] = + malloc(strlen(name) + 1)) == NULL) { + + /* Out of memory */ + + return NULL; + } + + strcpy((result->gr_mem)[i], name); + i++; + } + + /* Terminate list */ + + (result->gr_mem)[i] = NULL; + + return result; +} + + + +static struct group * +wb_aix_getgrgid (gid_t gid) +{ +/* take a group id and return a filled struct group */ + + NSS_STATUS ret; + struct winbindd_response response; + struct winbindd_request request; + + ZERO_STRUCT(response); + ZERO_STRUCT(request); + + request.data.gid = gid; + + ret = winbindd_request(WINBINDD_GETGRGID, &request, &response); + + if (ret == NSS_STATUS_SUCCESS) { + return fill_grent(&response.data.gr, response.extra_data); + } + return NULL; +} + +static struct group * +wb_aix_getgrnam (const char *name) +{ +/* take a group name and return a filled struct group */ + + NSS_STATUS ret; + struct winbindd_response response; + struct winbindd_request request; + + ZERO_STRUCT(response); + ZERO_STRUCT(request); + + strncpy(request.data.groupname, name, + sizeof(request.data.groupname)); + request.data.groupname + [sizeof(request.data.groupname) - 1] = '\0'; + + ret = winbindd_request(WINBINDD_GETGRNAM, &request, &response); + + if (ret == NSS_STATUS_SUCCESS) { + return fill_grent(&response.data.gr, response.extra_data); + } + return NULL; +} + +static char * +wb_aix_getgrset (const char *user) +{ +/* take a username and return a string containing a comma-separated list of + group id numbers to which the user belongs */ + + NSS_STATUS ret; + struct winbindd_response response; + struct winbindd_request request; + + char *tmpbuf, *result; + int i, idx = 0; + + strncpy(request.data.username, user, + sizeof(request.data.username) - 1); + request.data.username + [sizeof(request.data.username) - 1] = '\0'; + + ret = winbindd_request(WINBINDD_GETGROUPS, &request, &response); + + if (ret == NSS_STATUS_SUCCESS) { + int num_gids = response.data.num_entries; + gid_t *gid_list = (gid_t *)response.extra_data; + + /* allocate a space large enough to contruct the string */ + if (!(tmpbuf = malloc(num_gids*12))) { + return NULL; + } + idx += sprintf(tmpbuf, "%d", gid_list[0]); + for (i = 1; i < num_gids; i++) { + tmpbuf[idx++] = ','; + idx += sprintf(tmpbuf+idx, "%d", gid_list[i]); + } + tmpbuf[idx] = '\0'; + if (!(result = malloc(idx+1))) { + /* allocate a string the right size to return, but + if that fails may as well return our working buffer + because it contains the same thing */ + return tmpbuf; + } + strcpy(result, tmpbuf); + free(tmpbuf); + return result; + } + return NULL; +} + +static struct passwd * +wb_aix_getpwuid (uid_t uid) +{ +/* take a uid and return a filled struct passwd */ + + NSS_STATUS ret; + struct winbindd_response response; + struct winbindd_request request; + + ZERO_STRUCT(response); + ZERO_STRUCT(request); + + request.data.uid = uid; + + ret = winbindd_request(WINBINDD_GETPWUID, &request, &response); + + if (ret == NSS_STATUS_SUCCESS) { + return fill_pwent(&response.data.pw); + } + return NULL; +} + +static struct passwd * +wb_aix_getpwnam (const char *name) +{ +/* take a username and return a filled struct passwd */ + + NSS_STATUS ret; + struct winbindd_response response; + struct winbindd_request request; + + ZERO_STRUCT(response); + ZERO_STRUCT(request); + + strncpy(request.data.username, name, + sizeof(request.data.username) - 1); + request.data.username + [sizeof(request.data.username) - 1] = '\0'; + + ret = winbindd_request(WINBINDD_GETPWNAM, &request, &response); + + if (ret == NSS_STATUS_SUCCESS) { + return fill_pwent(&response.data.pw); + } + return NULL; +} + +int +wb_aix_init (struct secmethod_table *methods) +{ + memset(methods, 0, sizeof(*methods)); + + /* identification methods */ + + methods->method_getgrgid = wb_aix_getgrgid; + methods->method_getgrnam = wb_aix_getgrnam; + methods->method_getgrset = wb_aix_getgrset; + methods->method_getpwnam = wb_aix_getpwnam; + methods->method_getpwuid = wb_aix_getpwuid; + + /* support methods + methods->method_open = wb_aix_open; + methods->method_close = wb_aix_close; + */ + + return AUTH_SUCCESS; +} + + diff --git a/source3/nsswitch/winbindd.c b/source3/nsswitch/winbindd.c index cd72a4f5721..3b91f2d6af9 100644 --- a/source3/nsswitch/winbindd.c +++ b/source3/nsswitch/winbindd.c @@ -5,7 +5,6 @@ Copyright (C) by Tim Potter 2000-2002 Copyright (C) Andrew Tridgell 2002 - Copyright (C) Jelmer Vernooij 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -32,6 +31,7 @@ BOOL opt_dual_daemon = False; static BOOL reload_services_file(BOOL test) { BOOL ret; + pstring logfile; if (lp_loaded()) { pstring fname; @@ -43,9 +43,15 @@ static BOOL reload_services_file(BOOL test) } } + snprintf(logfile, sizeof(logfile), "%s/log.winbindd", dyn_LOGFILEBASE); + lp_set_logfile(logfile); + reopen_logs(); ret = lp_load(dyn_CONFIGFILE,False,False,True); + snprintf(logfile, sizeof(logfile), "%s/log.winbindd", dyn_LOGFILEBASE); + lp_set_logfile(logfile); + reopen_logs(); load_interfaces(); @@ -806,23 +812,27 @@ BOOL winbind_setup_common(void) struct winbindd_state server_state; /* Server state information */ -int main(int argc, char **argv) + +static void usage(void) { + printf("Usage: winbindd [options]\n"); + printf("\t-F daemon in foreground mode\n"); + printf("\t-S log to stdout\n"); + printf("\t-i interactive mode\n"); + printf("\t-B dual daemon mode\n"); + printf("\t-n disable cacheing\n"); + printf("\t-d level set debug level\n"); + printf("\t-s configfile choose smb.conf location\n"); + printf("\t-h show this help message\n"); +} + + int main(int argc, char **argv) +{ + extern BOOL AllowDebugChange; pstring logfile; - static BOOL interactive = False; - static BOOL Fork = True; - static BOOL log_stdout = False; - struct poptOption long_options[] = { - POPT_AUTOHELP - { "stdout", 'S', POPT_ARG_VAL, &log_stdout, True, "Log to stdout" }, - { "foreground", 'F', POPT_ARG_VAL, &Fork, False, "Daemon in foreground mode" }, - { "interactive", 'i', POPT_ARG_NONE, NULL, 'i', "Interactive mode" }, - { "dual-daemon", 'B', POPT_ARG_VAL, &opt_dual_daemon, True, "Dual daemon mode" }, - { "no-caching", 'n', POPT_ARG_VAL, &opt_nocache, False, "Disable caching" }, - POPT_COMMON_SAMBA - POPT_TABLEEND - }; - poptContext pc; + BOOL interactive = False; + BOOL Fork = True; + BOOL log_stdout = False; int opt; /* glibc (?) likes to print "User defined signal 1" and exit if a @@ -833,12 +843,13 @@ int main(int argc, char **argv) fault_setup((void (*)(void *))fault_quit ); + snprintf(logfile, sizeof(logfile), "%s/log.winbindd", dyn_LOGFILEBASE); + lp_set_logfile(logfile); + /* Initialise for running in non-root mode */ sec_init(); - set_remote_machine_name("winbindd", False); - /* Set environment variable so we don't recursively call ourselves. This may also be useful interactively. */ @@ -846,24 +857,56 @@ int main(int argc, char **argv) /* Initialise samba/rpc client stuff */ - pc = poptGetContext("winbindd", argc, (const char **)argv, long_options, - POPT_CONTEXT_KEEP_FIRST); - - while ((opt = poptGetNextOpt(pc)) != -1) { + while ((opt = getopt(argc, argv, "FSid:s:nhB")) != EOF) { switch (opt) { + + case 'F': + Fork = False; + break; + case 'S': + log_stdout = True; + break; /* Don't become a daemon */ case 'i': interactive = True; log_stdout = True; Fork = False; break; + + /* dual daemon system */ + case 'B': + opt_dual_daemon = True; + break; + + /* disable cacheing */ + case 'n': + opt_nocache = True; + break; + + /* Run with specified debug level */ + case 'd': + DEBUGLEVEL = atoi(optarg); + AllowDebugChange = False; + break; + + /* Load a different smb.conf file */ + case 's': + pstrcpy(dyn_CONFIGFILE,optarg); + break; + + case 'h': + usage(); + exit(0); + + default: + printf("Unknown option %c\n", (char)opt); + exit(1); } } - if (log_stdout && Fork) { printf("Can't log to stdout (-S) unless daemon is in foreground +(-F) or interactive (-i)\n"); - poptPrintUsage(pc, stderr, 0); + usage(); exit(1); } @@ -914,7 +957,6 @@ int main(int argc, char **argv) DEBUG(0, ("unable to initialise messaging system\n")); exit(1); } - poptFreeContext(pc); register_msg_pool_usage(); message_register(MSG_REQ_TALLOC_USAGE, return_all_talloc_info); @@ -923,7 +965,6 @@ int main(int argc, char **argv) process_loop(); - trustdom_cache_shutdown(); uni_group_cache_shutdown(); return 0; } diff --git a/source3/nsswitch/winbindd.h b/source3/nsswitch/winbindd.h index 192b0588714..f6b0e735430 100644 --- a/source3/nsswitch/winbindd.h +++ b/source3/nsswitch/winbindd.h @@ -4,7 +4,6 @@ Winbind daemon for ntdom nss module Copyright (C) Tim Potter 2000 - Copyright (C) Anthony Liguori 2003 This library is free software; you can redistribute it and/or modify it under the terms of the GNU Library General Public @@ -66,8 +65,7 @@ struct getent_state { struct getpwent_user { fstring name; /* Account name */ fstring gecos; /* User information */ - DOM_SID user_sid; /* NT user and primary group SIDs */ - DOM_SID group_sid; + uint32 user_rid, group_rid; /* NT user and group rids */ }; /* Server state structure */ @@ -85,8 +83,8 @@ extern struct winbindd_state server_state; /* Server information */ typedef struct { char *acct_name; char *full_name; - DOM_SID *user_sid; /* NT user and primary group SIDs */ - DOM_SID *group_sid; + uint32 user_rid; + uint32 group_rid; /* primary group */ } WINBIND_USERINFO; /* Structures to hold per domain information */ @@ -142,7 +140,6 @@ struct winbindd_methods { /* convert one user or group name to a sid */ NTSTATUS (*name_to_sid)(struct winbindd_domain *domain, - TALLOC_CTX *mem_ctx, const char *name, DOM_SID *sid, enum SID_NAME_USE *type); @@ -154,10 +151,10 @@ struct winbindd_methods { char **name, enum SID_NAME_USE *type); - /* lookup user info for a given SID */ + /* lookup user info for a given rid */ NTSTATUS (*query_user)(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, - DOM_SID *user_sid, + uint32 user_rid, WINBIND_USERINFO *user_info); /* lookup all groups that a user is a member of. The backend @@ -165,15 +162,14 @@ struct winbindd_methods { function */ NTSTATUS (*lookup_usergroups)(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, - DOM_SID *user_sid, - uint32 *num_groups, DOM_SID ***user_gids); + uint32 user_rid, + uint32 *num_groups, uint32 **user_gids); /* find all members of the group with the specified group_rid */ NTSTATUS (*lookup_groupmem)(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, - DOM_SID *group_sid, - uint32 *num_names, - DOM_SID ***sid_mem, char ***names, + uint32 group_rid, uint32 *num_names, + uint32 **rid_mem, char ***names, uint32 **name_types); /* return the current global sequence number */ @@ -202,23 +198,6 @@ typedef struct { POLICY_HND pol; } CLI_POLICY_HND; -/* Filled out by IDMAP backends */ -struct winbindd_idmap_methods { - /* Called when backend is first loaded */ - BOOL (*init)(void); - - BOOL (*get_sid_from_uid)(uid_t uid, DOM_SID *sid); - BOOL (*get_sid_from_gid)(gid_t gid, DOM_SID *sid); - - BOOL (*get_uid_from_sid)(DOM_SID *sid, uid_t *uid); - BOOL (*get_gid_from_sid)(DOM_SID *sid, gid_t *gid); - - /* Called when backend is unloaded */ - BOOL (*close)(void); - /* Called to dump backend status */ - void (*status)(void); -}; - #include "winbindd_proto.h" #include "rpc_parse.h" diff --git a/source3/nsswitch/winbindd_ads.c b/source3/nsswitch/winbindd_ads.c index de3757aa44c..f6fc3a8d6c9 100644 --- a/source3/nsswitch/winbindd_ads.c +++ b/source3/nsswitch/winbindd_ads.c @@ -4,7 +4,6 @@ Winbind ADS backend functions Copyright (C) Andrew Tridgell 2001 - Copyright (C) Andrew Bartlett 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -89,6 +88,13 @@ static ADS_STRUCT *ads_cached_connection(struct winbindd_domain *domain) return ads; } +/* useful utility */ +static void sid_from_rid(struct winbindd_domain *domain, uint32 rid, DOM_SID *sid) +{ + sid_copy(sid, &domain->sid); + sid_append_rid(sid, rid); +} + /* Query display info for a realm. This is the basic user list fn */ static NTSTATUS query_user_list(struct winbindd_domain *domain, @@ -137,9 +143,7 @@ static NTSTATUS query_user_list(struct winbindd_domain *domain, for (msg = ads_first_entry(ads, res); msg; msg = ads_next_entry(ads, msg)) { char *name, *gecos; DOM_SID sid; - DOM_SID *sid2; - DOM_SID *group_sid; - uint32 group; + uint32 rid, group; uint32 atype; if (!ads_pull_uint32(ads, msg, "sAMAccountType", &atype) || @@ -159,20 +163,15 @@ static NTSTATUS query_user_list(struct winbindd_domain *domain, continue; } - sid2 = talloc(mem_ctx, sizeof(*sid2)); - if (!sid2) { - status = NT_STATUS_NO_MEMORY; - goto done; + if (!sid_peek_check_rid(&domain->sid, &sid, &rid)) { + DEBUG(1,("No rid for %s !?\n", name)); + continue; } - sid_copy(sid2, &sid); - - group_sid = rid_to_talloced_sid(domain, mem_ctx, group); - (*info)[i].acct_name = name; (*info)[i].full_name = gecos; - (*info)[i].user_sid = sid2; - (*info)[i].group_sid = group_sid; + (*info)[i].user_rid = rid; + (*info)[i].group_rid = group; i++; } @@ -297,7 +296,6 @@ static NTSTATUS enum_local_groups(struct winbindd_domain *domain, /* convert a single name to a sid in a domain */ static NTSTATUS name_to_sid(struct winbindd_domain *domain, - TALLOC_CTX *mem_ctx, const char *name, DOM_SID *sid, enum SID_NAME_USE *type) @@ -330,13 +328,13 @@ static NTSTATUS sid_to_name(struct winbindd_domain *domain, } -/* convert a DN to a name, SID and name type +/* convert a DN to a name, rid and name type this might become a major speed bottleneck if groups have lots of users, in which case we could cache the results */ static BOOL dn_lookup(ADS_STRUCT *ads, TALLOC_CTX *mem_ctx, const char *dn, - char **name, uint32 *name_type, DOM_SID *sid) + char **name, uint32 *name_type, uint32 *rid) { char *exp; void *res = NULL; @@ -344,6 +342,7 @@ static BOOL dn_lookup(ADS_STRUCT *ads, TALLOC_CTX *mem_ctx, "objectSid", "sAMAccountType", NULL}; ADS_STATUS rc; uint32 atype; + DOM_SID sid; char *escaped_dn = escape_ldap_string_alloc(dn); if (!escaped_dn) { @@ -366,7 +365,8 @@ static BOOL dn_lookup(ADS_STRUCT *ads, TALLOC_CTX *mem_ctx, } (*name_type) = ads_atype_map(atype); - if (!ads_pull_sid(ads, res, "objectSid", sid)) { + if (!ads_pull_sid(ads, res, "objectSid", &sid) || + !sid_peek_rid(&sid, rid)) { goto failed; } @@ -381,158 +381,76 @@ failed: /* Lookup user information from a rid */ static NTSTATUS query_user(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, - DOM_SID *sid, + uint32 user_rid, WINBIND_USERINFO *info) { ADS_STRUCT *ads = NULL; const char *attrs[] = {"userPrincipalName", "sAMAccountName", - "name", + "name", "objectSid", "primaryGroupID", NULL}; ADS_STATUS rc; int count; void *msg = NULL; char *exp; + DOM_SID sid; char *sidstr; - uint32 group_rid; NTSTATUS status = NT_STATUS_UNSUCCESSFUL; - DOM_SID *sid2; - fstring sid_string; DEBUG(3,("ads: query_user\n")); + sid_from_rid(domain, user_rid, &sid); + ads = ads_cached_connection(domain); if (!ads) goto done; - sidstr = sid_binstring(sid); + sidstr = sid_binstring(&sid); asprintf(&exp, "(objectSid=%s)", sidstr); rc = ads_search_retry(ads, &msg, exp, attrs); free(exp); free(sidstr); if (!ADS_ERR_OK(rc)) { - DEBUG(1,("query_user(sid=%s) ads_search: %s\n", sid_to_string(sid_string, sid), ads_errstr(rc))); + DEBUG(1,("query_user(rid=%d) ads_search: %s\n", user_rid, ads_errstr(rc))); goto done; } count = ads_count_replies(ads, msg); if (count != 1) { - DEBUG(1,("query_user(sid=%s): Not found\n", sid_to_string(sid_string, sid))); + DEBUG(1,("query_user(rid=%d): Not found\n", user_rid)); goto done; } info->acct_name = ads_pull_username(ads, mem_ctx, msg); info->full_name = ads_pull_string(ads, mem_ctx, msg, "name"); - - if (!ads_pull_uint32(ads, msg, "primaryGroupID", &group_rid)) { - DEBUG(1,("No primary group for %s !?\n", sid_to_string(sid_string, sid))); + if (!ads_pull_sid(ads, msg, "objectSid", &sid)) { + DEBUG(1,("No sid for %d !?\n", user_rid)); goto done; } - - sid2 = talloc(mem_ctx, sizeof(*sid2)); - if (!sid2) { - status = NT_STATUS_NO_MEMORY; + if (!ads_pull_uint32(ads, msg, "primaryGroupID", &info->group_rid)) { + DEBUG(1,("No primary group for %d !?\n", user_rid)); goto done; } - sid_copy(sid2, sid); - - info->user_sid = sid2; - - info->group_sid = rid_to_talloced_sid(domain, mem_ctx, group_rid); - - status = NT_STATUS_OK; - - DEBUG(3,("ads query_user gave %s\n", info->acct_name)); -done: - if (msg) ads_msgfree(ads, msg); - - return status; -} - -/* Lookup groups a user is a member of - alternate method, for when - tokenGroups are not available. */ -static NTSTATUS lookup_usergroups_alt(struct winbindd_domain *domain, - TALLOC_CTX *mem_ctx, - const char *user_dn, - DOM_SID *primary_group, - uint32 *num_groups, DOM_SID ***user_gids) -{ - ADS_STATUS rc; - NTSTATUS status = NT_STATUS_UNSUCCESSFUL; - int count; - void *res = NULL; - void *msg = NULL; - char *exp; - ADS_STRUCT *ads; - const char *group_attrs[] = {"objectSid", NULL}; - - ads = ads_cached_connection(domain); - if (!ads) goto done; - - /* buggy server, no tokenGroups. Instead lookup what groups this user - is a member of by DN search on member*/ - if (asprintf(&exp, "(&(member=%s)(objectClass=group))", user_dn) == -1) { - DEBUG(1,("lookup_usergroups(dn=%s) asprintf failed!\n", user_dn)); - return NT_STATUS_NO_MEMORY; - } - rc = ads_search_retry(ads, &res, exp, group_attrs); - free(exp); - - if (!ADS_ERR_OK(rc)) { - DEBUG(1,("lookup_usergroups ads_search member=%s: %s\n", user_dn, ads_errstr(rc))); - return ads_ntstatus(rc); - } - - count = ads_count_replies(ads, res); - if (count == 0) { - DEBUG(5,("lookup_usergroups: No supp groups found\n")); - - status = ads_ntstatus(rc); + if (!sid_peek_check_rid(&domain->sid,&sid, &info->user_rid)) { + DEBUG(1,("No rid for %d !?\n", user_rid)); goto done; } - - (*user_gids) = talloc_zero(mem_ctx, sizeof(**user_gids) * (count + 1)); - (*user_gids)[0] = primary_group; - - *num_groups = 1; - - for (msg = ads_first_entry(ads, res); msg; msg = ads_next_entry(ads, msg)) { - DOM_SID group_sid; - - if (!ads_pull_sid(ads, msg, "objectSid", &group_sid)) { - DEBUG(1,("No sid for this group ?!?\n")); - continue; - } - - if (sid_equal(&group_sid, primary_group)) continue; - - (*user_gids)[*num_groups] = talloc(mem_ctx, sizeof(***user_gids)); - if (!(*user_gids)[*num_groups]) { - status = NT_STATUS_NO_MEMORY; - goto done; - } - - sid_copy((*user_gids)[*num_groups], &group_sid); - - (*num_groups)++; - - } status = NT_STATUS_OK; - DEBUG(3,("ads lookup_usergroups (alt) for dn=%s\n", user_dn)); + DEBUG(3,("ads query_user gave %s\n", info->acct_name)); done: - if (res) ads_msgfree(ads, res); if (msg) ads_msgfree(ads, msg); return status; } + /* Lookup groups a user is a member of. */ static NTSTATUS lookup_usergroups(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, - DOM_SID *sid, - uint32 *num_groups, DOM_SID ***user_gids) + uint32 user_rid, + uint32 *num_groups, uint32 **user_gids) { ADS_STRUCT *ads = NULL; const char *attrs[] = {"distinguishedName", NULL}; @@ -544,94 +462,63 @@ static NTSTATUS lookup_usergroups(struct winbindd_domain *domain, char *user_dn; DOM_SID *sids; int i; - DOM_SID *primary_group; - uint32 primary_group_rid; + uint32 primary_group; + DOM_SID sid; char *sidstr; - fstring sid_string; NTSTATUS status = NT_STATUS_UNSUCCESSFUL; - DEBUG(3,("ads: lookup_usergroups\n")); *num_groups = 0; + DEBUG(3,("ads: lookup_usergroups\n")); + + (*num_groups) = 0; + + sid_from_rid(domain, user_rid, &sid); + ads = ads_cached_connection(domain); if (!ads) goto done; - if (!(sidstr = sid_binstring(sid))) { - DEBUG(1,("lookup_usergroups(sid=%s) sid_binstring returned NULL\n", sid_to_string(sid_string, sid))); - status = NT_STATUS_NO_MEMORY; - goto done; - } - if (asprintf(&exp, "(objectSid=%s)", sidstr) == -1) { - free(sidstr); - DEBUG(1,("lookup_usergroups(sid=%s) asprintf failed!\n", sid_to_string(sid_string, sid))); - status = NT_STATUS_NO_MEMORY; - goto done; - } - + sidstr = sid_binstring(&sid); + asprintf(&exp, "(objectSid=%s)", sidstr); rc = ads_search_retry(ads, &msg, exp, attrs); free(exp); free(sidstr); - if (!ADS_ERR_OK(rc)) { - DEBUG(1,("lookup_usergroups(sid=%s) ads_search: %s\n", sid_to_string(sid_string, sid), ads_errstr(rc))); + DEBUG(1,("lookup_usergroups(rid=%d) ads_search: %s\n", user_rid, ads_errstr(rc))); goto done; } user_dn = ads_pull_string(ads, mem_ctx, msg, "distinguishedName"); - if (!user_dn) { - DEBUG(1,("lookup_usergroups(sid=%s) ads_search did not return a a distinguishedName!\n", sid_to_string(sid_string, sid))); - if (msg) ads_msgfree(ads, msg); - goto done; - } if (msg) ads_msgfree(ads, msg); rc = ads_search_retry_dn(ads, &msg, user_dn, attrs2); if (!ADS_ERR_OK(rc)) { - DEBUG(1,("lookup_usergroups(sid=%s) ads_search tokenGroups: %s\n", sid_to_string(sid_string, sid), ads_errstr(rc))); + DEBUG(1,("lookup_usergroups(rid=%d) ads_search tokenGroups: %s\n", user_rid, ads_errstr(rc))); goto done; } - if (!ads_pull_uint32(ads, msg, "primaryGroupID", &primary_group_rid)) { - DEBUG(1,("%s: No primary group for sid=%s !?\n", domain->name, sid_to_string(sid_string, sid))); + if (!ads_pull_uint32(ads, msg, "primaryGroupID", &primary_group)) { + DEBUG(1,("%s: No primary group for rid=%d !?\n", domain->name, user_rid)); goto done; } - primary_group = rid_to_talloced_sid(domain, mem_ctx, primary_group_rid); - - count = ads_pull_sids(ads, mem_ctx, msg, "tokenGroups", &sids); - - if (msg) ads_msgfree(ads, msg); + count = ads_pull_sids(ads, mem_ctx, msg, "tokenGroups", &sids) + 1; + (*user_gids) = (uint32 *)talloc_zero(mem_ctx, sizeof(uint32) * count); + (*user_gids)[(*num_groups)++] = primary_group; - /* there must always be at least one group in the token, - unless we are talking to a buggy Win2k server */ - if (count == 0) { - return lookup_usergroups_alt(domain, mem_ctx, user_dn, - primary_group, - num_groups, user_gids); - } - - (*user_gids) = talloc_zero(mem_ctx, sizeof(**user_gids) * (count + 1)); - (*user_gids)[0] = primary_group; - - *num_groups = 1; - - for (i=0;isid, &sids[i-1], &rid)) continue; + (*user_gids)[*num_groups] = rid; (*num_groups)++; } status = NT_STATUS_OK; - DEBUG(3,("ads lookup_usergroups for sid=%s\n", sid_to_string(sid_string, sid))); + DEBUG(3,("ads lookup_usergroups for rid=%d\n", user_rid)); done: + if (msg) ads_msgfree(ads, msg); + return status; } @@ -640,10 +527,11 @@ done: */ static NTSTATUS lookup_groupmem(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, - DOM_SID *group_sid, uint32 *num_names, - DOM_SID ***sid_mem, char ***names, + uint32 group_rid, uint32 *num_names, + uint32 **rid_mem, char ***names, uint32 **name_types) { + DOM_SID group_sid; ADS_STATUS rc; int count; void *res=NULL; @@ -654,14 +542,14 @@ static NTSTATUS lookup_groupmem(struct winbindd_domain *domain, const char *attrs[] = {"member", NULL}; char **members; int i, num_members; - fstring sid_string; *num_names = 0; ads = ads_cached_connection(domain); if (!ads) goto done; - sidstr = sid_binstring(group_sid); + sid_from_rid(domain, group_rid, &group_sid); + sidstr = sid_binstring(&group_sid); /* search for all members of the group */ asprintf(&exp, "(objectSid=%s)",sidstr); @@ -693,30 +581,24 @@ static NTSTATUS lookup_groupmem(struct winbindd_domain *domain, for (i=0;members[i];i++) /* noop */ ; num_members = i; - (*sid_mem) = talloc_zero(mem_ctx, sizeof(**sid_mem) * num_members); - (*name_types) = talloc_zero(mem_ctx, sizeof(**name_types) * num_members); - (*names) = talloc_zero(mem_ctx, sizeof(**names) * num_members); + (*rid_mem) = talloc_zero(mem_ctx, sizeof(uint32) * num_members); + (*name_types) = talloc_zero(mem_ctx, sizeof(uint32) * num_members); + (*names) = talloc_zero(mem_ctx, sizeof(char *) * num_members); for (i=0;iofs += len; } -static void centry_put_sid(struct cache_entry *centry, const DOM_SID *sid) -{ - fstring sid_string; - centry_put_string(centry, sid_to_string(sid_string, sid)); -} - /* start a centry for output. When finished, call centry_end() */ @@ -419,7 +393,6 @@ struct cache_entry *centry_start(struct winbindd_domain *domain, NTSTATUS status /* finish a centry and write it to the tdb */ -static void centry_end(struct cache_entry *centry, const char *format, ...) PRINTF_ATTRIBUTE(2,3); static void centry_end(struct cache_entry *centry, const char *format, ...) { va_list ap; @@ -439,29 +412,39 @@ static void centry_end(struct cache_entry *centry, const char *format, ...) free(kstr); } -static void wcache_save_name_to_sid(struct winbindd_domain *domain, - NTSTATUS status, - const char *name, DOM_SID *sid, - enum SID_NAME_USE type) +/* form a sid from the domain plus rid */ +static DOM_SID *form_sid(struct winbindd_domain *domain, uint32 rid) +{ + static DOM_SID sid; + sid_copy(&sid, &domain->sid); + sid_append_rid(&sid, rid); + return &sid; +} + +static void wcache_save_name_to_sid(struct winbindd_domain *domain, NTSTATUS status, + const char *name, DOM_SID *sid, enum SID_NAME_USE type) { struct cache_entry *centry; + uint32 len; fstring uname; - fstring sid_string; centry = centry_start(domain, status); if (!centry) return; - centry_put_sid(centry, sid); + len = sid_size(sid); + centry_expand(centry, len); + centry_put_uint32(centry, type); + sid_linearize(centry->data + centry->ofs, len, sid); + centry->ofs += len; fstrcpy(uname, name); strupper(uname); - centry_end(centry, "NS/%s", sid_to_string(sid_string, sid)); + centry_end(centry, "NS/%s/%s", domain->name, uname); centry_free(centry); } static void wcache_save_sid_to_name(struct winbindd_domain *domain, NTSTATUS status, - DOM_SID *sid, const char *name, enum SID_NAME_USE type) + DOM_SID *sid, const char *name, enum SID_NAME_USE type, uint32 rid) { struct cache_entry *centry; - fstring sid_string; centry = centry_start(domain, status); if (!centry) return; @@ -469,7 +452,7 @@ static void wcache_save_sid_to_name(struct winbindd_domain *domain, NTSTATUS sta centry_put_uint32(centry, type); centry_put_string(centry, name); } - centry_end(centry, "SN/%s", sid_to_string(sid_string, sid)); + centry_end(centry, "SN/%s/%d", domain->name, rid); centry_free(centry); } @@ -477,15 +460,14 @@ static void wcache_save_sid_to_name(struct winbindd_domain *domain, NTSTATUS sta static void wcache_save_user(struct winbindd_domain *domain, NTSTATUS status, WINBIND_USERINFO *info) { struct cache_entry *centry; - fstring sid_string; centry = centry_start(domain, status); if (!centry) return; centry_put_string(centry, info->acct_name); centry_put_string(centry, info->full_name); - centry_put_sid(centry, info->user_sid); - centry_put_sid(centry, info->group_sid); - centry_end(centry, "U/%s", sid_to_string(sid_string, info->user_sid)); + centry_put_uint32(centry, info->user_rid); + centry_put_uint32(centry, info->group_rid); + centry_end(centry, "U/%s/%d", domain->name, info->user_rid); centry_free(centry); } @@ -499,7 +481,7 @@ static NTSTATUS query_user_list(struct winbindd_domain *domain, struct winbind_cache *cache = get_cache(domain); struct cache_entry *centry = NULL; NTSTATUS status; - unsigned int i; + int i; if (!cache->tdb) goto do_query; @@ -515,8 +497,8 @@ static NTSTATUS query_user_list(struct winbindd_domain *domain, for (i=0; i<(*num_entries); i++) { (*info)[i].acct_name = centry_string(centry, mem_ctx); (*info)[i].full_name = centry_string(centry, mem_ctx); - (*info)[i].user_sid = centry_sid(centry, mem_ctx); - (*info)[i].group_sid = centry_sid(centry, mem_ctx); + (*info)[i].user_rid = centry_uint32(centry); + (*info)[i].group_rid = centry_uint32(centry); } do_cached: @@ -542,18 +524,18 @@ do_query: for (i=0; i<(*num_entries); i++) { centry_put_string(centry, (*info)[i].acct_name); centry_put_string(centry, (*info)[i].full_name); - centry_put_sid(centry, (*info)[i].user_sid); - centry_put_sid(centry, (*info)[i].group_sid); + centry_put_uint32(centry, (*info)[i].user_rid); + centry_put_uint32(centry, (*info)[i].group_rid); if (cache->backend->consistent) { /* when the backend is consistent we can pre-prime some mappings */ wcache_save_name_to_sid(domain, NT_STATUS_OK, (*info)[i].acct_name, - (*info)[i].user_sid, + form_sid(domain, (*info)[i].user_rid), SID_NAME_USER); wcache_save_sid_to_name(domain, NT_STATUS_OK, - (*info)[i].user_sid, + form_sid(domain, (*info)[i].user_rid), (*info)[i].acct_name, - SID_NAME_USER); + SID_NAME_USER, (*info)[i].user_rid); wcache_save_user(domain, NT_STATUS_OK, &(*info)[i]); } } @@ -573,7 +555,7 @@ static NTSTATUS enum_dom_groups(struct winbindd_domain *domain, struct winbind_cache *cache = get_cache(domain); struct cache_entry *centry = NULL; NTSTATUS status; - unsigned int i; + int i; if (!cache->tdb) goto do_query; @@ -633,7 +615,7 @@ static NTSTATUS enum_local_groups(struct winbindd_domain *domain, struct winbind_cache *cache = get_cache(domain); struct cache_entry *centry = NULL; NTSTATUS status; - unsigned int i; + int i; if (!cache->tdb) goto do_query; @@ -687,7 +669,7 @@ do_query: centry_put_string(centry, (*info)[i].acct_name); centry_put_string(centry, (*info)[i].acct_desc); centry_put_uint32(centry, (*info)[i].rid); - } + } centry_end(centry, "GL/%s/local", domain->name); centry_free(centry); @@ -697,7 +679,6 @@ skip_save: /* convert a single name to a sid in a domain */ static NTSTATUS name_to_sid(struct winbindd_domain *domain, - TALLOC_CTX *mem_ctx, const char *name, DOM_SID *sid, enum SID_NAME_USE *type) @@ -706,7 +687,6 @@ static NTSTATUS name_to_sid(struct winbindd_domain *domain, struct cache_entry *centry = NULL; NTSTATUS status; fstring uname; - DOM_SID *sid2; if (!cache->tdb) goto do_query; @@ -715,12 +695,7 @@ static NTSTATUS name_to_sid(struct winbindd_domain *domain, centry = wcache_fetch(cache, domain, "NS/%s/%s", domain->name, uname); if (!centry) goto do_query; *type = centry_uint32(centry); - sid2 = centry_sid(centry, mem_ctx); - if (!sid2) { - ZERO_STRUCTP(sid); - } else { - sid_copy(sid, sid2); - } + sid_parse(centry->data + centry->ofs, centry->len - centry->ofs, sid); status = centry->status; centry_free(centry); @@ -732,7 +707,7 @@ do_query: if (wcache_server_down(domain)) { return NT_STATUS_SERVER_DISABLED; } - status = cache->backend->name_to_sid(domain, mem_ctx, name, sid, type); + status = cache->backend->name_to_sid(domain, name, sid, type); /* and save it */ wcache_save_name_to_sid(domain, status, name, sid, *type); @@ -754,11 +729,14 @@ static NTSTATUS sid_to_name(struct winbindd_domain *domain, struct winbind_cache *cache = get_cache(domain); struct cache_entry *centry = NULL; NTSTATUS status; - fstring sid_string; + uint32 rid = 0; + + if (!sid_peek_check_rid(&domain->sid, sid, &rid)) + return NT_STATUS_INVALID_PARAMETER; if (!cache->tdb) goto do_query; - centry = wcache_fetch(cache, domain, "SN/%s", sid_to_string(sid_string, sid)); + centry = wcache_fetch(cache, domain, "SN/%s/%d", domain->name, rid); if (!centry) goto do_query; if (NT_STATUS_IS_OK(centry->status)) { *type = centry_uint32(centry); @@ -778,7 +756,7 @@ do_query: /* and save it */ refresh_sequence_number(domain, True); - wcache_save_sid_to_name(domain, status, sid, *name, *type); + wcache_save_sid_to_name(domain, status, sid, *name, *type, rid); wcache_save_name_to_sid(domain, status, *name, sid, *type); return status; @@ -788,23 +766,22 @@ do_query: /* Lookup user information from a rid */ static NTSTATUS query_user(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, - DOM_SID *user_sid, + uint32 user_rid, WINBIND_USERINFO *info) { struct winbind_cache *cache = get_cache(domain); struct cache_entry *centry = NULL; NTSTATUS status; - fstring sid_string; if (!cache->tdb) goto do_query; - centry = wcache_fetch(cache, domain, "U/%s", sid_to_string(sid_string, user_sid)); + centry = wcache_fetch(cache, domain, "U/%s/%d", domain->name, user_rid); if (!centry) goto do_query; info->acct_name = centry_string(centry, mem_ctx); info->full_name = centry_string(centry, mem_ctx); - info->user_sid = centry_sid(centry, mem_ctx); - info->group_sid = centry_sid(centry, mem_ctx); + info->user_rid = centry_uint32(centry); + info->group_rid = centry_uint32(centry); status = centry->status; centry_free(centry); return status; @@ -816,7 +793,7 @@ do_query: return NT_STATUS_SERVER_DISABLED; } - status = cache->backend->query_user(domain, mem_ctx, user_sid, info); + status = cache->backend->query_user(domain, mem_ctx, user_rid, info); /* and save it */ refresh_sequence_number(domain, True); @@ -829,18 +806,17 @@ do_query: /* Lookup groups a user is a member of. */ static NTSTATUS lookup_usergroups(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, - DOM_SID *user_sid, - uint32 *num_groups, DOM_SID ***user_gids) + uint32 user_rid, + uint32 *num_groups, uint32 **user_gids) { struct winbind_cache *cache = get_cache(domain); struct cache_entry *centry = NULL; NTSTATUS status; - unsigned int i; - fstring sid_string; + int i; if (!cache->tdb) goto do_query; - centry = wcache_fetch(cache, domain, "UG/%s", sid_to_string(sid_string, user_sid)); + centry = wcache_fetch(cache, domain, "UG/%s/%d", domain->name, user_rid); if (!centry) goto do_query; *num_groups = centry_uint32(centry); @@ -850,7 +826,7 @@ static NTSTATUS lookup_usergroups(struct winbindd_domain *domain, (*user_gids) = talloc(mem_ctx, sizeof(**user_gids) * (*num_groups)); if (! (*user_gids)) smb_panic("lookup_usergroups out of memory"); for (i=0; i<(*num_groups); i++) { - (*user_gids)[i] = centry_sid(centry, mem_ctx); + (*user_gids)[i] = centry_uint32(centry); } do_cached: @@ -865,7 +841,7 @@ do_query: if (wcache_server_down(domain)) { return NT_STATUS_SERVER_DISABLED; } - status = cache->backend->lookup_usergroups(domain, mem_ctx, user_sid, num_groups, user_gids); + status = cache->backend->lookup_usergroups(domain, mem_ctx, user_rid, num_groups, user_gids); /* and save it */ refresh_sequence_number(domain, True); @@ -873,9 +849,9 @@ do_query: if (!centry) goto skip_save; centry_put_uint32(centry, *num_groups); for (i=0; i<(*num_groups); i++) { - centry_put_sid(centry, (*user_gids)[i]); + centry_put_uint32(centry, (*user_gids)[i]); } - centry_end(centry, "UG/%s", sid_to_string(sid_string, user_sid)); + centry_end(centry, "UG/%s/%d", domain->name, user_rid); centry_free(centry); skip_save: @@ -885,35 +861,34 @@ skip_save: static NTSTATUS lookup_groupmem(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, - DOM_SID *group_sid, uint32 *num_names, - DOM_SID ***sid_mem, char ***names, + uint32 group_rid, uint32 *num_names, + uint32 **rid_mem, char ***names, uint32 **name_types) { struct winbind_cache *cache = get_cache(domain); struct cache_entry *centry = NULL; NTSTATUS status; - unsigned int i; - fstring sid_string; + int i; if (!cache->tdb) goto do_query; - centry = wcache_fetch(cache, domain, "GM/%s", sid_to_string(sid_string, group_sid)); + centry = wcache_fetch(cache, domain, "GM/%s/%d", domain->name, group_rid); if (!centry) goto do_query; *num_names = centry_uint32(centry); if (*num_names == 0) goto do_cached; - (*sid_mem) = talloc(mem_ctx, sizeof(**sid_mem) * (*num_names)); + (*rid_mem) = talloc(mem_ctx, sizeof(**rid_mem) * (*num_names)); (*names) = talloc(mem_ctx, sizeof(**names) * (*num_names)); (*name_types) = talloc(mem_ctx, sizeof(**name_types) * (*num_names)); - if (! (*sid_mem) || ! (*names) || ! (*name_types)) { + if (! (*rid_mem) || ! (*names) || ! (*name_types)) { smb_panic("lookup_groupmem out of memory"); } for (i=0; i<(*num_names); i++) { - (*sid_mem)[i] = centry_sid(centry, mem_ctx); + (*rid_mem)[i] = centry_uint32(centry); (*names)[i] = centry_string(centry, mem_ctx); (*name_types)[i] = centry_uint32(centry); } @@ -925,7 +900,7 @@ do_cached: do_query: (*num_names) = 0; - (*sid_mem) = NULL; + (*rid_mem) = NULL; (*names) = NULL; (*name_types) = NULL; @@ -933,8 +908,8 @@ do_query: if (wcache_server_down(domain)) { return NT_STATUS_SERVER_DISABLED; } - status = cache->backend->lookup_groupmem(domain, mem_ctx, group_sid, num_names, - sid_mem, names, name_types); + status = cache->backend->lookup_groupmem(domain, mem_ctx, group_rid, num_names, + rid_mem, names, name_types); /* and save it */ refresh_sequence_number(domain, True); @@ -942,11 +917,11 @@ do_query: if (!centry) goto skip_save; centry_put_uint32(centry, *num_names); for (i=0; i<(*num_names); i++) { - centry_put_sid(centry, (*sid_mem)[i]); + centry_put_uint32(centry, (*rid_mem)[i]); centry_put_string(centry, (*names)[i]); centry_put_uint32(centry, (*name_types)[i]); } - centry_end(centry, "GM/%s", sid_to_string(sid_string, group_sid)); + centry_end(centry, "GM/%s/%d", domain->name, group_rid); centry_free(centry); skip_save: diff --git a/source3/nsswitch/winbindd_cm.c b/source3/nsswitch/winbindd_cm.c index 1b49d8ce013..706408901e5 100644 --- a/source3/nsswitch/winbindd_cm.c +++ b/source3/nsswitch/winbindd_cm.c @@ -373,7 +373,7 @@ static NTSTATUS cm_open_connection(const char *domain, const int pipe_index, } result = cli_full_connection(&new_conn->cli, global_myname(), new_conn->controller, - &dc_ip, 0, "IPC$", "IPC", ipc_username, ipc_domain, + &dc_ip, 0, "IPC$", "IPC", ipc_username, ipc_domain, ipc_password, CLI_FULL_CONNECTION_ANNONYMOUS_FALLBACK, &retry); secrets_named_mutex_release(new_conn->controller); diff --git a/source3/nsswitch/winbindd_group.c b/source3/nsswitch/winbindd_group.c index d06db5943c7..94a826fbbcc 100644 --- a/source3/nsswitch/winbindd_group.c +++ b/source3/nsswitch/winbindd_group.c @@ -49,44 +49,43 @@ static BOOL fill_grent(struct winbindd_gr *gr, const char *dom_name, return True; } -/* Fill in the group membership field of a NT group given by group_sid */ +/* Fill in the group membership field of a NT group given by group_rid */ static BOOL fill_grent_mem(struct winbindd_domain *domain, - DOM_SID *group_sid, + uint32 group_rid, enum SID_NAME_USE group_name_type, int *num_gr_mem, char **gr_mem, int *gr_mem_len) { - DOM_SID **sid_mem = NULL; - uint32 num_names = 0; + uint32 *rid_mem = NULL, num_names = 0; uint32 *name_types = NULL; - unsigned int buf_len, buf_ndx, i; + int buf_len, buf_ndx, i; char **names = NULL, *buf; BOOL result = False; TALLOC_CTX *mem_ctx; NTSTATUS status; - fstring sid_string; if (!(mem_ctx = talloc_init("fill_grent_mem(%s)", domain->name))) return False; /* Initialise group membership information */ - DEBUG(10, ("group SID %s\n", sid_to_string(sid_string, group_sid))); + DEBUG(10, ("group %s rid 0x%x\n", domain ? domain->name : "NULL", + group_rid)); *num_gr_mem = 0; if (group_name_type != SID_NAME_DOM_GRP) { - DEBUG(1, ("SID %s in domain %s isn't a domain group\n", - sid_to_string(sid_string, group_sid), domain->name)); + DEBUG(1, ("rid %d in domain %s isn't a domain group\n", + group_rid, domain->name)); goto done; } /* Lookup group members */ - status = domain->methods->lookup_groupmem(domain, mem_ctx, group_sid, &num_names, - &sid_mem, &names, &name_types); + status = domain->methods->lookup_groupmem(domain, mem_ctx, group_rid, &num_names, + &rid_mem, &names, &name_types); if (!NT_STATUS_IS_OK(status)) { - DEBUG(1, ("could not lookup membership for group rid %s in domain %s (error: %s)\n", - sid_to_string(sid_string, group_sid), domain->name, nt_errstr(status))); + DEBUG(1, ("could not lookup membership for group rid %d in domain %s (error: %s)\n", + group_rid, domain->name, nt_errstr(status))); goto done; } @@ -95,7 +94,7 @@ static BOOL fill_grent_mem(struct winbindd_domain *domain, if (DEBUGLEVEL >= 10) { for (i = 0; i < num_names; i++) - DEBUG(10, ("\t%20s %s %d\n", names[i], sid_to_string(sid_string, sid_mem[i]), + DEBUG(10, ("\t%20s %x %d\n", names[i], rid_mem[i], name_types[i])); } @@ -191,6 +190,7 @@ enum winbindd_result winbindd_getgrnam(struct winbindd_cli_state *state) DOM_SID group_sid; struct winbindd_domain *domain; enum SID_NAME_USE name_type; + uint32 group_rid; fstring name_domain, name_group; char *tmp, *gr_mem; gid_t gid; @@ -233,6 +233,10 @@ enum winbindd_result winbindd_getgrnam(struct winbindd_cli_state *state) return WINBINDD_ERROR; } + /* Fill in group structure */ + if (!sid_peek_check_rid(&domain->sid, &group_sid, &group_rid)) + return WINBINDD_ERROR; + if (!winbindd_idmap_get_gid_from_sid(&group_sid, &gid)) { DEBUG(1, ("error converting unix gid to sid\n")); return WINBINDD_ERROR; @@ -240,7 +244,7 @@ enum winbindd_result winbindd_getgrnam(struct winbindd_cli_state *state) if (!fill_grent(&state->response.data.gr, name_domain, name_group, gid) || - !fill_grent_mem(domain, &group_sid, name_type, + !fill_grent_mem(domain, group_rid, name_type, &state->response.data.gr.num_gr_mem, &gr_mem, &gr_mem_len)) { return WINBINDD_ERROR; @@ -265,6 +269,7 @@ enum winbindd_result winbindd_getgrgid(struct winbindd_cli_state *state) enum SID_NAME_USE name_type; fstring dom_name; fstring group_name; + uint32 group_rid; int gr_mem_len; char *gr_mem; @@ -279,13 +284,17 @@ enum winbindd_result winbindd_getgrgid(struct winbindd_cli_state *state) /* Get rid from gid */ - if (!winbindd_idmap_get_sid_from_gid(state->request.data.gid, &group_sid)) { + if (!winbindd_idmap_get_rid_from_gid(state->request.data.gid, + &group_rid, &domain)) { DEBUG(1, ("could not convert gid %d to rid\n", state->request.data.gid)); return WINBINDD_ERROR; } - /* Get name from sid */ + /* Get sid from gid */ + + sid_copy(&group_sid, &domain->sid); + sid_append_rid(&group_sid, group_rid); if (!winbindd_lookup_name_by_sid(&group_sid, dom_name, group_name, &name_type)) { DEBUG(1, ("could not lookup sid\n")); @@ -301,16 +310,9 @@ enum winbindd_result winbindd_getgrgid(struct winbindd_cli_state *state) /* Fill in group structure */ - domain = find_domain_from_sid(&group_sid); - - if (!domain) { - DEBUG(1,("Can't find domain from sid\n")); - return WINBINDD_ERROR; - } - if (!fill_grent(&state->response.data.gr, dom_name, group_name, state->request.data.gid) || - !fill_grent_mem(domain, &group_sid, name_type, + !fill_grent_mem(domain, group_rid, name_type, &state->response.data.gr.num_gr_mem, &gr_mem, &gr_mem_len)) return WINBINDD_ERROR; @@ -542,9 +544,7 @@ enum winbindd_result winbindd_getgrent(struct winbindd_cli_state *state) gid_t group_gid; int gr_mem_len; char *gr_mem, *new_gr_mem_list; - DOM_SID group_sid; - struct winbindd_domain *domain; - + /* Do we need to fetch another chunk of groups? */ tryagain: @@ -578,25 +578,16 @@ enum winbindd_result winbindd_getgrent(struct winbindd_cli_state *state) name_list = ent->sam_entries; - if (!(domain = - find_domain_from_name(ent->domain_name))) { - DEBUG(3, ("No such domain %s in winbindd_getgrent\n", ent->domain_name)); - result = False; - goto done; - } - /* Lookup group info */ - sid_copy(&group_sid, &domain->sid); - sid_append_rid(&group_sid, name_list[ent->sam_entry_index].rid); - - if (!winbindd_idmap_get_gid_from_sid( - &group_sid, - &group_gid)) { + if (!winbindd_idmap_get_gid_from_rid( + ent->domain_name, + name_list[ent->sam_entry_index].rid, + &group_gid)) { DEBUG(1, ("could not look up gid for group %s\n", name_list[ent->sam_entry_index].acct_name)); - + ent->sam_entry_index++; goto tryagain; } @@ -617,7 +608,15 @@ enum winbindd_result winbindd_getgrent(struct winbindd_cli_state *state) /* Fill in group membership entry */ if (result) { - DOM_SID member_sid; + struct winbindd_domain *domain; + + if (!(domain = + find_domain_from_name(ent->domain_name))) { + DEBUG(3, ("No such domain %s in winbindd_getgrent\n", ent->domain_name)); + result = False; + goto done; + } + group_list[group_list_ndx].num_gr_mem = 0; gr_mem = NULL; gr_mem_len = 0; @@ -626,11 +625,9 @@ enum winbindd_result winbindd_getgrent(struct winbindd_cli_state *state) if (state->request.cmd == WINBINDD_GETGRLST) { result = True; } else { - sid_copy(&member_sid, &domain->sid); - sid_append_rid(&member_sid, name_list[ent->sam_entry_index].rid); result = fill_grent_mem( domain, - &member_sid, + name_list[ent->sam_entry_index].rid, SID_NAME_DOM_GRP, &group_list[group_list_ndx].num_gr_mem, &gr_mem, &gr_mem_len); @@ -733,7 +730,7 @@ enum winbindd_result winbindd_list_groups(struct winbindd_cli_state *state) struct winbindd_domain *domain; char *extra_data = NULL; char *ted = NULL; - unsigned int extra_data_len = 0, i; + int extra_data_len = 0, i; DEBUG(3, ("[%5d]: list groups\n", state->pid)); @@ -808,13 +805,13 @@ enum winbindd_result winbindd_getgroups(struct winbindd_cli_state *state) fstring name_domain, name_user; DOM_SID user_sid; enum SID_NAME_USE name_type; - uint32 num_groups, num_gids; + uint32 user_rid, num_groups, num_gids; NTSTATUS status; - DOM_SID **user_gids; + uint32 *user_gids; struct winbindd_domain *domain; enum winbindd_result result = WINBINDD_ERROR; gid_t *gid_list; - unsigned int i; + int i; TALLOC_CTX *mem_ctx; /* Ensure null termination */ @@ -855,9 +852,9 @@ enum winbindd_result winbindd_getgroups(struct winbindd_cli_state *state) goto done; } - status = domain->methods->lookup_usergroups(domain, mem_ctx, - &user_sid, &num_groups, - &user_gids); + sid_split_rid(&user_sid, &user_rid); + + status = domain->methods->lookup_usergroups(domain, mem_ctx, user_rid, &num_groups, &user_gids); if (!NT_STATUS_IS_OK(status)) goto done; /* Copy data back to client */ @@ -869,13 +866,12 @@ enum winbindd_result winbindd_getgroups(struct winbindd_cli_state *state) goto done; for (i = 0; i < num_groups; i++) { - if (!winbindd_idmap_get_gid_from_sid( - user_gids[i], - &gid_list[num_gids])) { - fstring sid_string; + if (!winbindd_idmap_get_gid_from_rid(domain->name, + user_gids[i], + &gid_list[num_gids])) { - DEBUG(1, ("unable to convert group sid %s to gid\n", - sid_to_string(sid_string, user_gids[i]))); + DEBUG(1, ("unable to convert group rid %d to gid\n", + user_gids[i])); continue; } diff --git a/source3/nsswitch/winbindd_idmap.c b/source3/nsswitch/winbindd_idmap.c index 23f4b4d0815..6d184fec5fe 100644 --- a/source3/nsswitch/winbindd_idmap.c +++ b/source3/nsswitch/winbindd_idmap.c @@ -1,19 +1,20 @@ /* Unix SMB/CIFS implementation. - Winbind ID Mapping - Copyright (C) Tim Potter 2000 - Copyright (C) Anthony Liguori 2003 + Winbind daemon - user related function + + Copyright (C) Tim Potter 2000 + This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. - + This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. - + You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. @@ -21,175 +22,508 @@ #include "winbindd.h" -static struct { - const char *name; - /* Function to create a member of the idmap_methods list */ - BOOL (*reg_meth)(struct winbindd_idmap_methods **methods); - struct winbindd_idmap_methods *methods; -} builtin_winbindd_idmap_functions[] = { - { "tdb", winbind_idmap_reg_tdb, NULL }, - { "ldap", winbind_idmap_reg_ldap, NULL }, - { NULL, NULL, NULL } -}; - -/* singleton pattern: uberlazy evaluation */ -static struct winbindd_idmap_methods *impl; - -static struct winbindd_idmap_methods *get_impl(const char *name) -{ - int i = 0; - struct winbindd_idmap_methods *ret = NULL; - - while (builtin_winbindd_idmap_functions[i].name && - strcmp(builtin_winbindd_idmap_functions[i].name, name)) { - i++; - } - - if (builtin_winbindd_idmap_functions[i].name) { - if (!builtin_winbindd_idmap_functions[i].methods) { - builtin_winbindd_idmap_functions[i].reg_meth(&builtin_winbindd_idmap_functions[i].methods); - } +#undef DBGC_CLASS +#define DBGC_CLASS DBGC_WINBIND - ret = builtin_winbindd_idmap_functions[i].methods; - } +/* High water mark keys */ - return ret; -} +#define HWM_GROUP "GROUP HWM" +#define HWM_USER "USER HWM" -/* Initialize backend */ -BOOL winbindd_idmap_init(void) +/* idmap version determines auto-conversion */ +#define IDMAP_VERSION 2 + +/* Globals */ + +static TDB_CONTEXT *idmap_tdb; + +/* Allocate either a user or group id from the pool */ + +static BOOL allocate_id(uid_t *id, BOOL isgroup) { - BOOL ret = False; + int hwm; - DEBUG(3, ("winbindd_idmap_init: using '%s' as backend\n", - lp_winbind_backend())); + /* Get current high water mark */ - if (!impl) { - impl = get_impl(lp_winbind_backend()); - if (!impl) { - DEBUG(0, ("winbindd_idmap_init: could not load backend '%s'\n", - lp_winbind_backend())); + if ((hwm = tdb_fetch_int32(idmap_tdb, + isgroup ? HWM_GROUP : HWM_USER)) == -1) { + return False; } - } - if (impl) { - ret = impl->init(); - } + /* Return next available uid in list */ - DEBUG(3, ("winbind_idmap_init: returning %s\n", ret ? "true" : "false")); + if ((isgroup && (hwm > server_state.gid_high)) || + (!isgroup && (hwm > server_state.uid_high))) { + DEBUG(0, ("winbind %sid range full!\n", isgroup ? "g" : "u")); + return False; + } + + if (id) { + *id = hwm; + } + + hwm++; + + /* Store new high water mark */ + + tdb_store_int32(idmap_tdb, isgroup ? HWM_GROUP : HWM_USER, hwm); - return ret; + return True; } -/* Get UID from SID */ -BOOL winbindd_idmap_get_uid_from_sid(DOM_SID *sid, uid_t *uid) +/* Get an id from a rid */ +static BOOL get_id_from_sid(DOM_SID *sid, uid_t *id, BOOL isgroup) { - BOOL ret = False; + TDB_DATA data, key; + fstring keystr; + BOOL result = False; + + /* Check if sid is present in database */ + sid_to_string(keystr, sid); + + key.dptr = keystr; + key.dsize = strlen(keystr) + 1; + + data = tdb_fetch(idmap_tdb, key); + + if (data.dptr) { + fstring scanstr; + int the_id; + + /* Parse and return existing uid */ + fstrcpy(scanstr, isgroup ? "GID" : "UID"); + fstrcat(scanstr, " %d"); + + if (sscanf(data.dptr, scanstr, &the_id) == 1) { + /* Store uid */ + if (id) { + *id = the_id; + } - if (!impl) { - impl = get_impl(lp_winbind_backend()); - if (!impl) { - DEBUG(0, ("winbindd_idmap_init: could not load backend '%s'\n", - lp_winbind_backend())); + result = True; + } + + SAFE_FREE(data.dptr); + } else { + + /* Allocate a new id for this sid */ + + if (id && allocate_id(id, isgroup)) { + fstring keystr2; + + /* Store new id */ + + slprintf(keystr2, sizeof(keystr2), "%s %d", isgroup ? "GID" : "UID", *id); + + data.dptr = keystr2; + data.dsize = strlen(keystr2) + 1; + + tdb_store(idmap_tdb, key, data, TDB_REPLACE); + tdb_store(idmap_tdb, data, key, TDB_REPLACE); + + result = True; + } } - } - if (impl) { - ret = impl->get_uid_from_sid(sid, uid); - } + return result; +} - return ret; +/* Get a uid from a user sid */ +BOOL winbindd_idmap_get_uid_from_sid(DOM_SID *sid, uid_t *uid) +{ + return get_id_from_sid(sid, uid, False); } -/* Get GID from SID */ +/* Get a gid from a group sid */ BOOL winbindd_idmap_get_gid_from_sid(DOM_SID *sid, gid_t *gid) { - BOOL ret = False; + return get_id_from_sid(sid, gid, True); +} - if (!impl) { - impl = get_impl(lp_winbind_backend()); - if (!impl) { - DEBUG(0, ("winbindd_idmap_init: could not load backend '%s'\n", - lp_winbind_backend())); - } - } +/* Get a uid from a user rid */ +BOOL winbindd_idmap_get_uid_from_rid(const char *dom_name, uint32 rid, uid_t *uid) +{ + struct winbindd_domain *domain; + DOM_SID sid; + + if (!(domain = find_domain_from_name(dom_name))) { + return False; + } - if (impl) { - ret = impl->get_gid_from_sid(sid, gid); - } + sid_copy(&sid, &domain->sid); + sid_append_rid(&sid, rid); - return ret; + return get_id_from_sid(&sid, uid, False); } -/* Get SID from UID */ -BOOL winbindd_idmap_get_sid_from_uid(uid_t uid, DOM_SID *sid) +/* Get a gid from a group rid */ +BOOL winbindd_idmap_get_gid_from_rid(const char *dom_name, uint32 rid, gid_t *gid) +{ + struct winbindd_domain *domain; + DOM_SID sid; + + if (!(domain = find_domain_from_name(dom_name))) { + return False; + } + + sid_copy(&sid, &domain->sid); + sid_append_rid(&sid, rid); + + return get_id_from_sid(&sid, gid, True); +} + + +BOOL get_sid_from_id(int id, DOM_SID *sid, BOOL isgroup) { - BOOL ret = False; + TDB_DATA key, data; + fstring keystr; + BOOL result = False; + + slprintf(keystr, sizeof(keystr), "%s %d", isgroup ? "GID" : "UID", id); + + key.dptr = keystr; + key.dsize = strlen(keystr) + 1; - if (!impl) { - impl = get_impl(lp_winbind_backend()); - if (!impl) { - DEBUG(0, ("winbindd_idmap_init: could not load backend '%s'\n", - lp_winbind_backend())); + data = tdb_fetch(idmap_tdb, key); + + if (data.dptr) { + result = string_to_sid(sid, data.dptr); + SAFE_FREE(data.dptr); } - } - if (impl) { - ret = impl->get_sid_from_uid(uid, sid); - } + return result; +} - return ret; +/* Get a sid from a uid */ +BOOL winbindd_idmap_get_sid_from_uid(uid_t uid, DOM_SID *sid) +{ + return get_sid_from_id((int)uid, sid, False); } -/* Get SID from GID */ +/* Get a sid from a gid */ BOOL winbindd_idmap_get_sid_from_gid(gid_t gid, DOM_SID *sid) { - BOOL ret = False; + return get_sid_from_id((int)gid, sid, True); +} + +/* Get a user rid from a uid */ +BOOL winbindd_idmap_get_rid_from_uid(uid_t uid, uint32 *user_rid, + struct winbindd_domain **domain) +{ + DOM_SID sid; + + if (!get_sid_from_id((int)uid, &sid, False)) { + return False; + } - if (!impl) { - impl = get_impl(lp_winbind_backend()); - } + *domain = find_domain_from_sid(&sid); + if (! *domain) return False; - if (impl) { - ret = impl->get_sid_from_gid(gid, sid); - } else { - DEBUG(0, ("winbindd_idmap_init: could not load backend '%s'\n", - lp_winbind_backend())); - } + sid_split_rid(&sid, user_rid); - return ret; + return True; } -/* Close backend */ -BOOL winbindd_idmap_close(void) +/* Get a group rid from a gid */ + +BOOL winbindd_idmap_get_rid_from_gid(gid_t gid, uint32 *group_rid, + struct winbindd_domain **domain) +{ + DOM_SID sid; + + if (!get_sid_from_id((int)gid, &sid, True)) { + return False; + } + + *domain = find_domain_from_sid(&sid); + if (! *domain) return False; + + sid_split_rid(&sid, group_rid); + + return True; +} + +/* convert one record to the new format */ +static int convert_fn(TDB_CONTEXT *tdb, TDB_DATA key, TDB_DATA data, void *ignored) { - BOOL ret = False; + struct winbindd_domain *domain; + char *p; + DOM_SID sid; + uint32 rid; + fstring keystr; + fstring dom_name; + TDB_DATA key2; + + p = strchr(key.dptr, '/'); + if (!p) + return 0; + + *p = 0; + fstrcpy(dom_name, key.dptr); + *p++ = '/'; + + domain = find_domain_from_name(dom_name); + if (!domain) { + /* We must delete the old record. */ + DEBUG(0,("winbindd: convert_fn : Unable to find domain %s\n", dom_name )); + DEBUG(0,("winbindd: convert_fn : deleting record %s\n", key.dptr )); + tdb_delete(idmap_tdb, key); + return 0; + } + + rid = atoi(p); + + sid_copy(&sid, &domain->sid); + sid_append_rid(&sid, rid); + + sid_to_string(keystr, &sid); + key2.dptr = keystr; + key2.dsize = strlen(keystr) + 1; + + if (tdb_store(idmap_tdb, key2, data, TDB_INSERT) != 0) { + /* not good! */ + DEBUG(0,("winbindd: convert_fn : Unable to update record %s\n", key2.dptr )); + DEBUG(0,("winbindd: convert_fn : conversion failed - idmap corrupt ?\n")); + return -1; + } + + if (tdb_store(idmap_tdb, data, key2, TDB_REPLACE) != 0) { + /* not good! */ + DEBUG(0,("winbindd: convert_fn : Unable to update record %s\n", data.dptr )); + DEBUG(0,("winbindd: convert_fn : conversion failed - idmap corrupt ?\n")); + return -1; + } + + tdb_delete(idmap_tdb, key); + + return 0; +} - if (!impl) { - impl = get_impl(lp_winbind_backend()); - } +#if 0 +/***************************************************************************** + Make a backup copy of the old idmap just to be safe.... JRA. +*****************************************************************************/ - if (impl) { - ret = impl->close(); - } else { - DEBUG(0, ("winbindd_idmap_init: could not load backend '%s'\n", - lp_winbind_backend())); - } +static BOOL backup_old_idmap(const char *idmap_name) +{ + pstring new_name; + int outfd = -1; + SMB_OFF_T size; + struct stat st; + + pstrcpy(new_name, idmap_name); + pstrcat(new_name, ".bak"); + + DEBUG(10,("backup_old_idmap: backing up %s to %s before upgrade.\n", + idmap_name, new_name )); + + if (tdb_lockall(idmap_tdb) == -1) { + DEBUG(10,("backup_old_idmap: failed to lock %s. Error %s\n", + idmap_name, tdb_errorstr(idmap_tdb) )); + return False; + } + if ((outfd = open(new_name, O_CREAT|O_EXCL|O_RDWR, 0600)) == -1) { + DEBUG(10,("backup_old_idmap: failed to open %s. Error %s\n", + new_name, strerror(errno) )); + goto fail; + } + + if (fstat(idmap_tdb->fd, &st) == -1) { + DEBUG(10,("backup_old_idmap: failed to fstat %s. Error %s\n", + idmap_name, strerror(errno) )); + goto fail; + } + + size = (SMB_OFF_T)st.st_size; + + if (transfer_file(idmap_tdb->fd, outfd, size) != size ) { + DEBUG(10,("backup_old_idmap: failed to copy %s. Error %s\n", + idmap_name, strerror(errno) )); + goto fail; + } + + if (close(outfd) == -1) { + DEBUG(10,("backup_old_idmap: failed to close %s. Error %s\n", + idmap_name, strerror(errno) )); + outfd = -1; + goto fail; + } + tdb_unlockall(idmap_tdb); + return True; + +fail: + + if (outfd != -1) + close(outfd); + tdb_unlockall(idmap_tdb); + return False; +} +#endif + +/***************************************************************************** + Convert the idmap database from an older version. +*****************************************************************************/ - return ret; +static BOOL idmap_convert(const char *idmap_name) +{ + int32 vers = tdb_fetch_int32(idmap_tdb, "IDMAP_VERSION"); + BOOL bigendianheader = (idmap_tdb->flags & TDB_BIGENDIAN) ? True : False; + + if (vers == IDMAP_VERSION) + return True; + +#if 0 + /* Make a backup copy before doing anything else.... */ + if (!backup_old_idmap(idmap_name)) + return False; +#endif + + if (((vers == -1) && bigendianheader) || (IREV(vers) == IDMAP_VERSION)) { + /* Arrggghh ! Bytereversed or old big-endian - make order independent ! */ + /* + * high and low records were created on a + * big endian machine and will need byte-reversing. + */ + + int32 wm; + + wm = tdb_fetch_int32(idmap_tdb, HWM_USER); + + if (wm != -1) { + wm = IREV(wm); + } else + wm = server_state.uid_low; + + if (tdb_store_int32(idmap_tdb, HWM_USER, wm) == -1) { + DEBUG(0, ("idmap_convert: Unable to byteswap user hwm in idmap database\n")); + return False; + } + + wm = tdb_fetch_int32(idmap_tdb, HWM_GROUP); + if (wm != -1) { + wm = IREV(wm); + } else + wm = server_state.gid_low; + + if (tdb_store_int32(idmap_tdb, HWM_GROUP, wm) == -1) { + DEBUG(0, ("idmap_convert: Unable to byteswap group hwm in idmap database\n")); + return False; + } + } + + /* the old format stored as DOMAIN/rid - now we store the SID direct */ + tdb_traverse(idmap_tdb, convert_fn, NULL); + + if (tdb_store_int32(idmap_tdb, "IDMAP_VERSION", IDMAP_VERSION) == -1) { + DEBUG(0, ("idmap_convert: Unable to byteswap group hwm in idmap database\n")); + return False; + } + + return True; } -/* Dump backend status */ +/***************************************************************************** + Initialise idmap database. +*****************************************************************************/ + +BOOL winbindd_idmap_init(void) +{ + /* Open tdb cache */ + + if (!(idmap_tdb = tdb_open_log(lock_path("winbindd_idmap.tdb"), 0, + TDB_DEFAULT, O_RDWR | O_CREAT, 0600))) { + DEBUG(0, ("winbindd_idmap_init: Unable to open idmap database\n")); + return False; + } + + /* possibly convert from an earlier version */ + if (!idmap_convert(lock_path("winbindd_idmap.tdb"))) { + DEBUG(0, ("winbindd_idmap_init: Unable to open idmap database\n")); + return False; + } + + /* Create high water marks for group and user id */ + + if (tdb_fetch_int32(idmap_tdb, HWM_USER) == -1) { + if (tdb_store_int32(idmap_tdb, HWM_USER, server_state.uid_low) == -1) { + DEBUG(0, ("winbindd_idmap_init: Unable to initialise user hwm in idmap database\n")); + return False; + } + } + + if (tdb_fetch_int32(idmap_tdb, HWM_GROUP) == -1) { + if (tdb_store_int32(idmap_tdb, HWM_GROUP, server_state.gid_low) == -1) { + DEBUG(0, ("winbindd_idmap_init: Unable to initialise group hwm in idmap database\n")); + return False; + } + } + + return True; +} + +BOOL winbindd_idmap_close(void) +{ + if (idmap_tdb) + return (tdb_close(idmap_tdb) == 0); + return True; +} + +/* Dump status information to log file. Display different stuff based on + the debug level: + + Debug Level Information Displayed + ================================================================= + 0 Percentage of [ug]id range allocated + 0 High water marks (next allocated ids) +*/ + +#define DUMP_INFO 0 + void winbindd_idmap_status(void) { - if (!impl) { - impl = get_impl(lp_winbind_backend()); - } + int user_hwm, group_hwm; + + DEBUG(0, ("winbindd idmap status:\n")); + + /* Get current high water marks */ + + if ((user_hwm = tdb_fetch_int32(idmap_tdb, HWM_USER)) == -1) { + DEBUG(DUMP_INFO, ("\tCould not get userid high water mark!\n")); + } + + if ((group_hwm = tdb_fetch_int32(idmap_tdb, HWM_GROUP)) == -1) { + DEBUG(DUMP_INFO, ("\tCould not get groupid high water mark!\n")); + } + + /* Display next ids to allocate */ + + if (user_hwm != -1) { + DEBUG(DUMP_INFO, ("\tNext userid to allocate is %d\n", user_hwm)); + } + + if (group_hwm != -1) { + DEBUG(DUMP_INFO, ("\tNext groupid to allocate is %d\n", group_hwm)); + } + + /* Display percentage of id range already allocated. */ + + if (user_hwm != -1) { + int num_users = user_hwm - server_state.uid_low; + int total_users = server_state.uid_high - server_state.uid_low; + + DEBUG(DUMP_INFO, ("\tUser id range is %d%% full (%d of %d)\n", + num_users * 100 / total_users, num_users, + total_users)); + } + + if (group_hwm != -1) { + int num_groups = group_hwm - server_state.gid_low; + int total_groups = server_state.gid_high - server_state.gid_low; + + DEBUG(DUMP_INFO, ("\tGroup id range is %d%% full (%d of %d)\n", + num_groups * 100 / total_groups, num_groups, + total_groups)); + } - if (impl) { - impl->status(); - } else { - DEBUG(0, ("winbindd_idmap_init: could not load backend '%s'\n", - lp_winbind_backend())); - } + /* Display complete mapping of users and groups to rids */ } diff --git a/source3/nsswitch/winbindd_idmap_ldap.c b/source3/nsswitch/winbindd_idmap_ldap.c deleted file mode 100644 index 7ffddf9ac46..00000000000 --- a/source3/nsswitch/winbindd_idmap_ldap.c +++ /dev/null @@ -1,394 +0,0 @@ -/* - Unix SMB/CIFS implementation. - - Winbind daemon - user related function - - Copyright (C) Jim McDonough 2003 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "winbindd.h" - -#undef DBGC_CLASS -#define DBGC_CLASS DBGC_WINBIND - -#ifdef HAVE_LDAP - -#include -#include - -#include "smb_ldap.h" - -/* Globals */ -static struct smb_ldap_privates *ldap_state; - -static const char *attr[] = { "uid", "rid", "domain", "uidNumber", - "gidNumber", NULL }; - -static const char *pool_attr[] = {"uidNumber", "gidNumber", "cn", NULL}; - -static const char *group_attr[] = {"gidNumber", "ntSid", NULL}; - -static long ldap_allocate_id(BOOL is_user) -{ - int rc, count; - LDAPMessage *result; - int scope = LDAP_SCOPE_SUBTREE; - long ret = 0; - int sanity = 0; - - do { - rc = smb_ldap_search(ldap_state, lp_ldap_suffix(), scope, is_user?"cn=UID Pool":"cn=GID Pool", pool_attr, 0, &result); - - if (LDAP_SUCCESS != rc) { - DEBUG(0,("ldap_allocate_id: No ID pool found in directory\n")); - return 0; - } - - count = ldap_count_entries(ldap_state->ldap_struct, result); - - if (1 < count) { - DEBUG(0,("ldap_allocate_id: Multiple UID pools found in directory?\n")); - break; - } else if (1 == count) { - LDAPMessage *entry = - ldap_first_entry(ldap_state->ldap_struct, - result); - LDAPMod **mods = NULL; - pstring temp; - - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, is_user?"uidNumber":"gidNumber", temp)) { - return False; - } - ret = atol(temp); - smb_ldap_make_a_mod(&mods, LDAP_MOD_DELETE, - is_user?"uidNumber":"gidNumber", - temp); - slprintf(temp, sizeof(temp) - 1, "%ld", ret + 1); - smb_ldap_make_a_mod(&mods, LDAP_MOD_ADD, is_user?"uidNumber":"gidNumber", temp); - slprintf(temp, sizeof(temp) - 1, "cn=%cID Pool,%s", is_user?'U':'G', lp_ldap_user_suffix()); - rc = smb_ldap_modify(ldap_state, temp, mods); - ldap_mods_free(mods, 1); - } else { - DEBUG(0,("ldap_allocate_id: unexpected number of entries returned\n")); - break; - } - } while (LDAP_NO_SUCH_ATTRIBUTE == rc && ++sanity < 100); - - return ret; -} - -/***************************************************************************** - Initialise idmap database. -*****************************************************************************/ -static BOOL ldap_idmap_init(void) -{ - static struct smb_ldap_privates state; - ldap_state = &state; - -#ifdef WITH_LDAP_SAMCONFIG - { - int ldap_port = lp_ldap_port(); - - /* remap default port if not using SSL */ - if (lp_ldap_ssl() != LDAP_SSL_ON && ldap_port == 636) { - ldap_port = 389; - } - - ldap_state->uri = asprintf("%s://%s:d", - lp_ldap_ssl() == LDAP_SSL_ON ? "ldaps" : "ldap", - lp_ldap_server(), ldap_port); - if (!ldap_state->uri) { - DEBUG(0,("Out of memory\n")); - return False; - } - } -#else - ldap_state->uri = "ldap://localhost"; -#endif - return True; -} - -static BOOL ldap_get_sid_from_uid(uid_t uid, DOM_SID * sid) -{ - pstring filter; - int scope = LDAP_SCOPE_SUBTREE; - int rc, count; - LDAPMessage *result; - - slprintf(filter, sizeof(filter) - 1, "uidNumber=%i", uid); - - DEBUG(2, ("ldap_get_sid_from_uid: searching for:[%s]\n", filter)); - - rc = smb_ldap_search(ldap_state, lp_ldap_suffix(), scope, filter, attr, 0, &result); - if (LDAP_SUCCESS != rc) { - DEBUG(0,("ldap_get_sid_from_uid: user search failed\n")); - return False; - } - - count = ldap_count_entries(ldap_state->ldap_struct, result); - if (1 < count) { - DEBUG(0,("More than one user exists where: %s\n", filter)); - ldap_msgfree(result); - return False; - } else if (1 == count) { - /* we found the user, get the users RID */ - LDAPMessage *entry = ldap_first_entry(ldap_state->ldap_struct, - result); - pstring temp, domain; - uint32 rid; - struct winbindd_domain *wb_dom; - - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "domain", domain)) { - return False; - } - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "rid", temp)) { - return False; - } - rid = (uint32)atol(temp); - wb_dom = find_domain_from_name(domain); - - if (!wb_dom) { - DEBUG(0,("ldap_get_sid_from_uid: could not find domain %s\n", domain)); - return False; - } - - sid_copy(sid, &wb_dom->sid); - sid_append_rid(sid, rid); - } else { - /* 0 entries? that ain't right */ - DEBUG(0,("ldap_get_sid_from_uid: not user entry found for %s\n", filter)); - } - - return True; -} - -static BOOL ldap_get_uid_from_sid(DOM_SID *sid, uid_t *uid) -{ - pstring filter; - int scope = LDAP_SCOPE_SUBTREE; - int rc, count; - LDAPMessage *result; - uint32 rid = 0; - struct winbindd_domain *wb_dom; - DOM_SID dom_sid; - - sid_copy(&dom_sid, sid); - - if (!sid_split_rid(&dom_sid, &rid)) { - DEBUG(0,("ldap_get_uid_from_sid: sid does not contain an rid\n")); - return False; - } - - if (!(wb_dom = find_domain_from_sid(&dom_sid))) { - DEBUG(0,("ldap_get_uid_from_sid: cannot lookup domain from sid\n")); - return False; - } - - slprintf(filter, sizeof(filter) - 1, "rid=%d,domain=%s,objectClass=sambaAccount", rid, wb_dom->name); - - DEBUG(2, ("ldap_get_uid_from_sid: searching for:[%s]\n", filter)); - - rc = smb_ldap_search(ldap_state, lp_ldap_suffix(), scope, filter, attr, 0, &result); - if (LDAP_NO_SUCH_OBJECT == rc) { - LDAPMod **mods = NULL; - pstring temp; - fstring dom, name; - int sid_type; - - winbindd_lookup_name_by_sid(sid, dom, name, - (enum SID_USE_TYPE *)&sid_type); - slprintf(temp, sizeof(temp) - 1, "%i", rid); - smb_ldap_make_a_mod(&mods, LDAP_MOD_ADD, "rid", temp); - - *uid = ldap_allocate_id(True); - slprintf(temp, sizeof(temp) - 1, "%i", *uid); - smb_ldap_make_a_mod(&mods, LDAP_MOD_ADD, "uidNumber", temp); - - smb_ldap_make_a_mod(&mods, LDAP_MOD_ADD, "uid", name); - smb_ldap_make_a_mod(&mods, LDAP_MOD_ADD, "objectClass", "sambaAccount"); - smb_ldap_make_a_mod(&mods, LDAP_MOD_ADD, "objectClass", "account"); - slprintf(temp, sizeof(temp) - 1, "uid=%s,%s", name, lp_ldap_user_suffix()); - rc = smb_ldap_modify(ldap_state, temp, mods); - - ldap_mods_free(mods, 1); - if (LDAP_SUCCESS != rc) { - return False; - } - } else if (LDAP_SUCCESS == rc) { - count = ldap_count_entries(ldap_state->ldap_struct, result); - if (1 < count) { - DEBUG(0,("More than one user exists where: %s\n", filter)); - ldap_msgfree(result); - return False; - } else if (1 == count) { - /* we found the user, get the idNumber */ - LDAPMessage *entry = ldap_first_entry(ldap_state->ldap_struct, result); - pstring temp; - - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "uidNumber", temp)) { - return False; - } - *uid = atol(temp); - } else { - DEBUG(0,("ldap_get_uid_from_sid: zero entries returned?\n")); - return False; - } - } else { - DEBUG(0,("ldap_get_uid_from_sid: unknown error querying user info\n")); - return False; - } - - return True; -} - -static BOOL ldap_get_sid_from_gid(gid_t gid, DOM_SID * sid) -{ - pstring filter; - int scope = LDAP_SCOPE_SUBTREE; - int rc, count; - LDAPMessage *result; - - slprintf(filter, sizeof(filter) - 1, "gidNumber=%i,objectClass=sambaGroupMapping", gid); - - DEBUG(2, ("ldap_get_sid_from_gid: searching for:[%s]\n", filter)); - - rc = smb_ldap_search(ldap_state, lp_ldap_suffix(), scope, filter, attr, 0, &result); - if (LDAP_SUCCESS != rc) { - DEBUG(0,("ldap_get_sid_from_gid: user search failed\n")); - return False; - } - - count = ldap_count_entries(ldap_state->ldap_struct, result); - if (1 < count) { - DEBUG(0,("More than one group exists where: %s\n", filter)); - ldap_msgfree(result); - return False; - } else if (1 == count) { - LDAPMessage *entry = ldap_first_entry(ldap_state->ldap_struct, - result); - pstring str_sid; - - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "ntSid", str_sid)) { - return False; - } - - string_to_sid(sid, str_sid); - } else { - /* 0 entries? that ain't right */ - DEBUG(0,("ldap_get_sid_from_gid: not group entry found for %s\n", filter)); - } - - return True; -} - -static BOOL ldap_get_gid_from_sid(DOM_SID *sid, gid_t *gid) -{ - pstring filter; - int scope = LDAP_SCOPE_SUBTREE; - int rc, count; - LDAPMessage *result; - fstring str_sid; - - sid_to_string(str_sid, sid); - - slprintf(filter, sizeof(filter) - 1, "ntSid=%s,objectClass=sambaGroupMapping", str_sid); - - DEBUG(2, ("ldap_get_gid_from_sid: searching for:[%s]\n", filter)); - - rc = smb_ldap_search(ldap_state, lp_ldap_suffix(), scope, filter, attr, 0, &result); - if (LDAP_NO_SUCH_OBJECT == rc) { - LDAPMod **mods = NULL; - pstring temp; - - *gid = ldap_allocate_id(False); - slprintf(temp, sizeof(temp) - 1, "%i", *gid); - smb_ldap_make_a_mod(&mods, LDAP_MOD_ADD, "gidNumber", temp); - smb_ldap_make_a_mod(&mods, LDAP_MOD_ADD, "objectClass", "sambaGroupMapping"); - smb_ldap_make_a_mod(&mods, LDAP_MOD_ADD, "objectClass", "account"); - slprintf(temp, sizeof(temp) - 1, "gidNumber=%i,%s", *gid, lp_ldap_user_suffix()); - rc = smb_ldap_modify(ldap_state, temp, mods); - - ldap_mods_free(mods, 1); - if (LDAP_SUCCESS != rc) { - return False; - } - } else if (LDAP_SUCCESS == rc) { - count = ldap_count_entries(ldap_state->ldap_struct, result); - if (1 < count) { - DEBUG(0,("More than one group exists where: %s\n", filter)); - ldap_msgfree(result); - return False; - } else if (1 == count) { - LDAPMessage *entry = ldap_first_entry(ldap_state->ldap_struct, result); - pstring temp; - - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "gidNumber", temp)) { - return False; - } - *gid = atol(temp); - } else { - DEBUG(0,("ldap_get_gid_from_sid: zero entries returned?\n")); - return False; - } - } else { - DEBUG(0,("ldap_get_gid_from_sid: unknown error querying user info\n")); - return False; - } - - return True; -} - -static BOOL ldap_idmap_close(void) -{ - smb_ldap_close(ldap_state); - ldap_state = 0; - return True; -} - -static void ldap_idmap_status(void) -{ - DEBUG(0, ("winbindd idmap status:\n")); - DEBUG(0, ("Using LDAP\n")); -} - -struct winbindd_idmap_methods ldap_idmap_methods = { - ldap_idmap_init, - - ldap_get_sid_from_uid, - ldap_get_sid_from_gid, - - ldap_get_uid_from_sid, - ldap_get_gid_from_sid, - - ldap_idmap_close, - - ldap_idmap_status -}; - -#endif - -BOOL winbind_idmap_reg_ldap(struct winbindd_idmap_methods **meth) -{ -#ifdef HAVE_LDAP - *meth = &ldap_idmap_methods; - - return True; -#else - DEBUG(0,("winbind_idmap_reg_ldap: LDAP support not compiled\n")); - return False; -#endif -} diff --git a/source3/nsswitch/winbindd_idmap_tdb.c b/source3/nsswitch/winbindd_idmap_tdb.c deleted file mode 100644 index b47b7ed07d4..00000000000 --- a/source3/nsswitch/winbindd_idmap_tdb.c +++ /dev/null @@ -1,441 +0,0 @@ -/* - Unix SMB/CIFS implementation. - - Winbind daemon - user related function - - Copyright (C) Tim Potter 2000 - Copyright (C) Anthony Liguori 2003 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "winbindd.h" - -#undef DBGC_CLASS -#define DBGC_CLASS DBGC_WINBIND - -/* High water mark keys */ -#define HWM_GROUP "GROUP HWM" -#define HWM_USER "USER HWM" - -/* idmap version determines auto-conversion */ -#define IDMAP_VERSION 2 - -/* Globals */ -static TDB_CONTEXT *idmap_tdb; - -/* convert one record to the new format */ -static int tdb_convert_fn(TDB_CONTEXT * tdb, TDB_DATA key, TDB_DATA data, - void *ignored) -{ - struct winbindd_domain *domain; - char *p; - DOM_SID sid; - uint32 rid; - fstring keystr; - fstring dom_name; - TDB_DATA key2; - - p = strchr(key.dptr, '/'); - if (!p) - return 0; - - *p = 0; - fstrcpy(dom_name, key.dptr); - *p++ = '/'; - - domain = find_domain_from_name(dom_name); - if (!domain) { - /* We must delete the old record. */ - DEBUG(0, - ("winbindd: tdb_convert_fn : Unable to find domain %s\n", - dom_name)); - DEBUG(0, - ("winbindd: tdb_convert_fn : deleting record %s\n", - key.dptr)); - tdb_delete(idmap_tdb, key); - return 0; - } - - rid = atoi(p); - - sid_copy(&sid, &domain->sid); - sid_append_rid(&sid, rid); - - sid_to_string(keystr, &sid); - key2.dptr = keystr; - key2.dsize = strlen(keystr) + 1; - - if (tdb_store(idmap_tdb, key2, data, TDB_INSERT) != 0) { - /* not good! */ - DEBUG(0, - ("winbindd: tdb_convert_fn : Unable to update record %s\n", - key2.dptr)); - DEBUG(0, - ("winbindd: tdb_convert_fn : conversion failed - idmap corrupt ?\n")); - return -1; - } - - if (tdb_store(idmap_tdb, data, key2, TDB_REPLACE) != 0) { - /* not good! */ - DEBUG(0, - ("winbindd: tdb_convert_fn : Unable to update record %s\n", - data.dptr)); - DEBUG(0, - ("winbindd: tdb_convert_fn : conversion failed - idmap corrupt ?\n")); - return -1; - } - - tdb_delete(idmap_tdb, key); - - return 0; -} - -/***************************************************************************** - Convert the idmap database from an older version. -*****************************************************************************/ -static BOOL tdb_idmap_convert(const char *idmap_name) -{ - int32 vers = tdb_fetch_int32(idmap_tdb, "IDMAP_VERSION"); - BOOL bigendianheader = - (idmap_tdb->flags & TDB_BIGENDIAN) ? True : False; - - if (vers == IDMAP_VERSION) - return True; - - if (((vers == -1) && bigendianheader) - || (IREV(vers) == IDMAP_VERSION)) { - /* Arrggghh ! Bytereversed or old big-endian - make order independent ! */ - /* - * high and low records were created on a - * big endian machine and will need byte-reversing. - */ - - int32 wm; - - wm = tdb_fetch_int32(idmap_tdb, HWM_USER); - - if (wm != -1) { - wm = IREV(wm); - } else - wm = server_state.uid_low; - - if (tdb_store_int32(idmap_tdb, HWM_USER, wm) == -1) { - DEBUG(0, - ("tdb_idmap_convert: Unable to byteswap user hwm in idmap database\n")); - return False; - } - - wm = tdb_fetch_int32(idmap_tdb, HWM_GROUP); - if (wm != -1) { - wm = IREV(wm); - } else - wm = server_state.gid_low; - - if (tdb_store_int32(idmap_tdb, HWM_GROUP, wm) == -1) { - DEBUG(0, - ("tdb_idmap_convert: Unable to byteswap group hwm in idmap database\n")); - return False; - } - } - - /* the old format stored as DOMAIN/rid - now we store the SID direct */ - tdb_traverse(idmap_tdb, tdb_convert_fn, NULL); - - if (tdb_store_int32(idmap_tdb, "IDMAP_VERSION", IDMAP_VERSION) == - -1) { - DEBUG(0, - ("tdb_idmap_convert: Unable to byteswap group hwm in idmap database\n")); - return False; - } - - return True; -} - -/* Allocate either a user or group id from the pool */ -static BOOL tdb_allocate_id(uid_t * id, BOOL isgroup) -{ - int hwm; - - /* Get current high water mark */ - if ((hwm = tdb_fetch_int32(idmap_tdb, - isgroup ? HWM_GROUP : HWM_USER)) == - -1) { - return False; - } - - /* Return next available uid in list */ - if ((isgroup && (hwm > server_state.gid_high)) || - (!isgroup && (hwm > server_state.uid_high))) { - DEBUG(0, - ("winbind %sid range full!\n", isgroup ? "g" : "u")); - return False; - } - - if (id) { - *id = hwm; - } - - hwm++; - - /* Store new high water mark */ - tdb_store_int32(idmap_tdb, isgroup ? HWM_GROUP : HWM_USER, hwm); - - return True; -} - -/* Get a sid from an id */ -static BOOL tdb_get_sid_from_id(int id, DOM_SID * sid, BOOL isgroup) -{ - TDB_DATA key, data; - fstring keystr; - BOOL result = False; - - slprintf(keystr, sizeof(keystr), "%s %d", isgroup ? "GID" : "UID", - id); - - key.dptr = keystr; - key.dsize = strlen(keystr) + 1; - - data = tdb_fetch(idmap_tdb, key); - - if (data.dptr) { - result = string_to_sid(sid, data.dptr); - SAFE_FREE(data.dptr); - } - - return result; -} - -/* Get an id from a sid */ -static BOOL tdb_get_id_from_sid(DOM_SID * sid, uid_t * id, BOOL isgroup) -{ - TDB_DATA data, key; - fstring keystr; - BOOL result = False; - - /* Check if sid is present in database */ - sid_to_string(keystr, sid); - - key.dptr = keystr; - key.dsize = strlen(keystr) + 1; - - data = tdb_fetch(idmap_tdb, key); - - if (data.dptr) { - fstring scanstr; - int the_id; - - /* Parse and return existing uid */ - fstrcpy(scanstr, isgroup ? "GID" : "UID"); - fstrcat(scanstr, " %d"); - - if (sscanf(data.dptr, scanstr, &the_id) == 1) { - /* Store uid */ - if (id) { - *id = the_id; - } - - result = True; - } - - SAFE_FREE(data.dptr); - } else { - - /* Allocate a new id for this sid */ - if (id && tdb_allocate_id(id, isgroup)) { - fstring keystr2; - - /* Store new id */ - slprintf(keystr2, sizeof(keystr2), "%s %d", - isgroup ? "GID" : "UID", *id); - - data.dptr = keystr2; - data.dsize = strlen(keystr2) + 1; - - tdb_store(idmap_tdb, key, data, TDB_REPLACE); - tdb_store(idmap_tdb, data, key, TDB_REPLACE); - - result = True; - } - } - - return result; -} - -/***************************************************************************** - Initialise idmap database. -*****************************************************************************/ -static BOOL tdb_idmap_init(void) -{ - /* Open tdb cache */ - if (!(idmap_tdb = tdb_open_log(lock_path("winbindd_idmap.tdb"), 0, - TDB_DEFAULT, O_RDWR | O_CREAT, - 0600))) { - DEBUG(0, - ("winbindd_idmap_init: Unable to open idmap database\n")); - return False; - } - - /* possibly convert from an earlier version */ - if (!tdb_idmap_convert(lock_path("winbindd_idmap.tdb"))) { - DEBUG(0, - ("winbindd_idmap_init: Unable to open idmap database\n")); - return False; - } - - /* Create high water marks for group and user id */ - if (tdb_fetch_int32(idmap_tdb, HWM_USER) == -1) { - if (tdb_store_int32 - (idmap_tdb, HWM_USER, server_state.uid_low) == -1) { - DEBUG(0, - ("winbindd_idmap_init: Unable to initialise user hwm in idmap database\n")); - return False; - } - } - - if (tdb_fetch_int32(idmap_tdb, HWM_GROUP) == -1) { - if (tdb_store_int32 - (idmap_tdb, HWM_GROUP, server_state.gid_low) == -1) { - DEBUG(0, - ("winbindd_idmap_init: Unable to initialise group hwm in idmap database\n")); - return False; - } - } - - return True; -} - -/* Get a sid from a uid */ -static BOOL tdb_get_sid_from_uid(uid_t uid, DOM_SID * sid) -{ - return tdb_get_sid_from_id((int) uid, sid, False); -} - -/* Get a sid from a gid */ -static BOOL tdb_get_sid_from_gid(gid_t gid, DOM_SID * sid) -{ - return tdb_get_sid_from_id((int) gid, sid, True); -} - -/* Get a uid from a sid */ -static BOOL tdb_get_uid_from_sid(DOM_SID * sid, uid_t * uid) -{ - return tdb_get_id_from_sid(sid, uid, False); -} - -/* Get a gid from a group sid */ -static BOOL tdb_get_gid_from_sid(DOM_SID * sid, gid_t * gid) -{ - return tdb_get_id_from_sid(sid, gid, True); -} - -/* Close the tdb */ -static BOOL tdb_idmap_close(void) -{ - if (idmap_tdb) - return (tdb_close(idmap_tdb) == 0); - return True; -} - - -/* Dump status information to log file. Display different stuff based on - the debug level: - - Debug Level Information Displayed - ================================================================= - 0 Percentage of [ug]id range allocated - 0 High water marks (next allocated ids) -*/ - -#define DUMP_INFO 0 - -static void tdb_idmap_status(void) -{ - int user_hwm, group_hwm; - - DEBUG(0, ("winbindd idmap status:\n")); - - /* Get current high water marks */ - - if ((user_hwm = tdb_fetch_int32(idmap_tdb, HWM_USER)) == -1) { - DEBUG(DUMP_INFO, - ("\tCould not get userid high water mark!\n")); - } - - if ((group_hwm = tdb_fetch_int32(idmap_tdb, HWM_GROUP)) == -1) { - DEBUG(DUMP_INFO, - ("\tCould not get groupid high water mark!\n")); - } - - /* Display next ids to allocate */ - - if (user_hwm != -1) { - DEBUG(DUMP_INFO, - ("\tNext userid to allocate is %d\n", user_hwm)); - } - - if (group_hwm != -1) { - DEBUG(DUMP_INFO, - ("\tNext groupid to allocate is %d\n", group_hwm)); - } - - /* Display percentage of id range already allocated. */ - - if (user_hwm != -1) { - int num_users = user_hwm - server_state.uid_low; - int total_users = - server_state.uid_high - server_state.uid_low; - - DEBUG(DUMP_INFO, - ("\tUser id range is %d%% full (%d of %d)\n", - num_users * 100 / total_users, num_users, - total_users)); - } - - if (group_hwm != -1) { - int num_groups = group_hwm - server_state.gid_low; - int total_groups = - server_state.gid_high - server_state.gid_low; - - DEBUG(DUMP_INFO, - ("\tGroup id range is %d%% full (%d of %d)\n", - num_groups * 100 / total_groups, num_groups, - total_groups)); - } - - /* Display complete mapping of users and groups to rids */ -} - -struct winbindd_idmap_methods tdb_idmap_methods = { - tdb_idmap_init, - - tdb_get_sid_from_uid, - tdb_get_sid_from_gid, - - tdb_get_uid_from_sid, - tdb_get_gid_from_sid, - - tdb_idmap_close, - - tdb_idmap_status -}; - -BOOL winbind_idmap_reg_tdb(struct winbindd_idmap_methods **meth) -{ - *meth = &tdb_idmap_methods; - - return True; -} diff --git a/source3/nsswitch/winbindd_pam.c b/source3/nsswitch/winbindd_pam.c index e65d2bb0f69..d408a8b3ae4 100644 --- a/source3/nsswitch/winbindd_pam.c +++ b/source3/nsswitch/winbindd_pam.c @@ -140,12 +140,7 @@ enum winbindd_result winbindd_pam_auth(struct winbindd_cli_state *state) uni_group_cache_store_netlogon(mem_ctx, &info3); done: - - /* give us a more useful (more correct?) error code */ - if ((NT_STATUS_EQUAL(result, NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND) || (NT_STATUS_EQUAL(result, NT_STATUS_UNSUCCESSFUL)))) { - result = NT_STATUS_NO_LOGON_SERVERS; - } - + state->response.data.auth.nt_status = NT_STATUS_V(result); fstrcpy(state->response.data.auth.nt_status_string, nt_errstr(result)); fstrcpy(state->response.data.auth.error_string, get_friendly_nt_error_msg(result)); @@ -181,8 +176,6 @@ enum winbindd_result winbindd_pam_auth_crap(struct winbindd_cli_state *state) if (!state->privilaged) { DEBUG(2, ("winbindd_pam_auth_crap: non-privilaged access denied!\n")); - /* send a better message than ACCESS_DENIED */ - push_utf8_fstring(state->response.data.auth.error_string, "winbind client not authorized to use winbindd_pam_auth_crap"); result = NT_STATUS_ACCESS_DENIED; goto done; } @@ -289,21 +282,15 @@ enum winbindd_result winbindd_pam_auth_crap(struct winbindd_cli_state *state) memcpy(state->response.data.auth.nt_session_key, info3.user_sess_key, sizeof(state->response.data.auth.nt_session_key) /* 16 */); } if (state->request.data.auth_crap.flags & WINBIND_PAM_LMKEY) { - memcpy(state->response.data.auth.first_8_lm_hash, info3.padding, sizeof(state->response.data.auth.first_8_lm_hash) /* 8 */); + memcpy(state->response.data.auth.first_8_lm_hash, info3.padding, sizeof(state->response.data.auth.nt_session_key) /* 16 */); } } done: - /* give us a more useful (more correct?) error code */ - if ((NT_STATUS_EQUAL(result, NT_STATUS_DOMAIN_CONTROLLER_NOT_FOUND) || (NT_STATUS_EQUAL(result, NT_STATUS_UNSUCCESSFUL)))) { - result = NT_STATUS_NO_LOGON_SERVERS; - } - state->response.data.auth.nt_status = NT_STATUS_V(result); push_utf8_fstring(state->response.data.auth.nt_status_string, nt_errstr(result)); - if (!*state->response.data.auth.error_string) - push_utf8_fstring(state->response.data.auth.error_string, get_friendly_nt_error_msg(result)); + push_utf8_fstring(state->response.data.auth.error_string, nt_errstr(result)); state->response.data.auth.pam_error = nt_status_to_pam(result); DEBUG(NT_STATUS_IS_OK(result) ? 5 : 2, diff --git a/source3/nsswitch/winbindd_rpc.c b/source3/nsswitch/winbindd_rpc.c index 9ec35617f11..48f528f5206 100644 --- a/source3/nsswitch/winbindd_rpc.c +++ b/source3/nsswitch/winbindd_rpc.c @@ -3,7 +3,7 @@ Winbind rpc backend functions - Copyright (C) Tim Potter 2000-2001,2003 + Copyright (C) Tim Potter 2000-2001 Copyright (C) Andrew Tridgell 2001 This program is free software; you can redistribute it and/or modify @@ -26,7 +26,6 @@ #undef DBGC_CLASS #define DBGC_CLASS DBGC_WINBIND - /* Query display info for a domain. This returns enough information plus a bit extra to give an overview of domain users for the User Manager application. */ @@ -40,17 +39,18 @@ static NTSTATUS query_user_list(struct winbindd_domain *domain, POLICY_HND dom_pol; BOOL got_dom_pol = False; uint32 des_access = SEC_RIGHTS_MAXIMUM_ALLOWED; - unsigned int i, start_idx, retry; + int i, loop_count = 0; + int retry; DEBUG(3,("rpc: query_user_list\n")); *num_entries = 0; *info = NULL; + /* Get sam handle */ + retry = 0; do { - /* Get sam handle */ - if (!(hnd = cm_get_sam_handle(domain->name))) goto done; @@ -66,39 +66,50 @@ static NTSTATUS query_user_list(struct winbindd_domain *domain, got_dom_pol = True; - i = start_idx = 0; + i = 0; do { + SAM_DISPINFO_CTR ctr; + SAM_DISPINFO_1 info1; + uint32 count = 0, start=i, max_entries, max_size; + int j; TALLOC_CTX *ctx2; - char **dom_users; - uint32 num_dom_users, *dom_rids, j, size = 0xffff; - uint16 acb_mask = ACB_NORMAL; - if (!(ctx2 = talloc_init("winbindd enum_users"))) { + ctr.sam.info1 = &info1; + + ctx2 = talloc_init("winbindd dispinfo"); + if (!ctx2) { result = NT_STATUS_NO_MEMORY; goto done; - } + } + + get_query_dispinfo_params( + loop_count, &max_entries, &max_size); - result = cli_samr_enum_dom_users( - hnd->cli, ctx2, &dom_pol, &start_idx, acb_mask, - size, &dom_users, &dom_rids, &num_dom_users); + /* Query display info level 1 */ + result = cli_samr_query_dispinfo( + hnd->cli, ctx2, &dom_pol, &start, 1, &count, + max_entries, max_size, &ctr); - *num_entries += num_dom_users; + loop_count++; - *info = talloc_realloc( - mem_ctx, *info, - (*num_entries) * sizeof(WINBIND_USERINFO)); + if (!NT_STATUS_IS_OK(result) && + !NT_STATUS_EQUAL(result, STATUS_MORE_ENTRIES)) break; + (*num_entries) += count; + + /* now map the result into the WINBIND_USERINFO structure */ + (*info) = talloc_realloc(mem_ctx, *info, + (*num_entries)*sizeof(WINBIND_USERINFO)); if (!(*info)) { result = NT_STATUS_NO_MEMORY; talloc_destroy(ctx2); goto done; } - for (j = 0; j < num_dom_users; i++, j++) { - (*info)[i].acct_name = - talloc_strdup(mem_ctx, dom_users[j]); - (*info)[i].full_name = talloc_strdup(mem_ctx, ""); - (*info)[i].user_sid = rid_to_talloced_sid(domain, mem_ctx, dom_rids[j]); + for (j=0;jname, name))) { + DEBUG(0, ("talloc_init failed!\n")); + return NT_STATUS_NO_MEMORY; + } + full_name = talloc_asprintf(mem_ctx, "%s\\%s", domain->name, name); if (!full_name) { DEBUG(0, ("talloc_asprintf failed!\n")); + talloc_destroy(mem_ctx); return NT_STATUS_NO_MEMORY; } retry = 0; do { if (!(hnd = cm_get_lsa_handle(domain->name))) { + talloc_destroy(mem_ctx); return NT_STATUS_UNSUCCESSFUL; } @@ -294,6 +308,7 @@ static NTSTATUS name_to_sid(struct winbindd_domain *domain, *type = types[0]; } + talloc_destroy(mem_ctx); return status; } @@ -341,22 +356,17 @@ static NTSTATUS sid_to_name(struct winbindd_domain *domain, /* Lookup user information from a rid or username. */ static NTSTATUS query_user(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, - DOM_SID *user_sid, + uint32 user_rid, WINBIND_USERINFO *user_info) { - CLI_POLICY_HND *hnd = NULL; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; + CLI_POLICY_HND *hnd; + NTSTATUS result; POLICY_HND dom_pol, user_pol; BOOL got_dom_pol = False, got_user_pol = False; SAM_USERINFO_CTR *ctr; int retry; - fstring sid_string; - uint32 user_rid; - DEBUG(3,("rpc: query_user rid=%s\n", sid_to_string(sid_string, user_sid))); - if (!sid_peek_check_rid(&domain->sid, user_sid, &user_rid)) { - goto done; - } + DEBUG(3,("rpc: query_user rid=%u\n", user_rid)); retry = 0; do { @@ -395,8 +405,8 @@ static NTSTATUS query_user(struct winbindd_domain *domain, cli_samr_close(hnd->cli, mem_ctx, &user_pol); got_user_pol = False; - user_info->user_sid = rid_to_talloced_sid(domain, mem_ctx, user_rid); - user_info->group_sid = rid_to_talloced_sid(domain, mem_ctx, ctr->info.id21->group_rid); + user_info->user_rid = user_rid; + user_info->group_rid = ctr->info.id21->group_rid; user_info->acct_name = unistr2_tdup(mem_ctx, &ctr->info.id21->uni_user_name); user_info->full_name = unistr2_tdup(mem_ctx, @@ -416,8 +426,8 @@ static NTSTATUS query_user(struct winbindd_domain *domain, /* Lookup groups a user is a member of. I wish Unix had a call like this! */ static NTSTATUS lookup_usergroups(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, - DOM_SID *user_sid, - uint32 *num_groups, DOM_SID ***user_gids) + uint32 user_rid, + uint32 *num_groups, uint32 **user_gids) { CLI_POLICY_HND *hnd; NTSTATUS result = NT_STATUS_UNSUCCESSFUL; @@ -425,17 +435,15 @@ static NTSTATUS lookup_usergroups(struct winbindd_domain *domain, uint32 des_access = SEC_RIGHTS_MAXIMUM_ALLOWED; BOOL got_dom_pol = False, got_user_pol = False; DOM_GID *user_groups; - unsigned int i; - unsigned int retry; - fstring sid_string; - uint32 user_rid; + int i; + int retry; - DEBUG(3,("rpc: lookup_usergroups sid=%s\n", sid_to_string(sid_string, user_sid))); + DEBUG(3,("rpc: lookup_usergroups rid=%u\n", user_rid)); *num_groups = 0; /* First try cached universal groups from logon */ - *user_gids = uni_group_cache_fetch(&domain->sid, user_sid, mem_ctx, num_groups); + *user_gids = uni_group_cache_fetch(&domain->sid, user_rid, mem_ctx, num_groups); if((*num_groups > 0) && *user_gids) { return NT_STATUS_OK; } else { @@ -451,7 +459,7 @@ static NTSTATUS lookup_usergroups(struct winbindd_domain *domain, /* Get domain handle */ result = cli_samr_open_domain(hnd->cli, mem_ctx, &hnd->pol, - des_access, &domain->sid, &dom_pol); + des_access, &domain->sid, &dom_pol); } while (!NT_STATUS_IS_OK(result) && (retry++ < 1) && hnd && hnd->cli && hnd->cli->fd == -1); if (!NT_STATUS_IS_OK(result)) @@ -459,11 +467,6 @@ static NTSTATUS lookup_usergroups(struct winbindd_domain *domain, got_dom_pol = True; - - if (!sid_peek_check_rid(&domain->sid, user_sid, &user_rid)) { - goto done; - } - /* Get user handle */ result = cli_samr_open_user(hnd->cli, mem_ctx, &dom_pol, des_access, user_rid, &user_pol); @@ -481,13 +484,8 @@ static NTSTATUS lookup_usergroups(struct winbindd_domain *domain, goto done; (*user_gids) = talloc(mem_ctx, sizeof(uint32) * (*num_groups)); - if (!(*user_gids)) { - result = NT_STATUS_NO_MEMORY; - goto done; - } - for (i=0;i<(*num_groups);i++) { - (*user_gids)[i] = rid_to_talloced_sid(domain, mem_ctx, user_groups[i].g_rid); + (*user_gids)[i] = user_groups[i].g_rid; } done: @@ -505,27 +503,19 @@ static NTSTATUS lookup_usergroups(struct winbindd_domain *domain, /* Lookup group membership given a rid. */ static NTSTATUS lookup_groupmem(struct winbindd_domain *domain, TALLOC_CTX *mem_ctx, - DOM_SID *group_sid, uint32 *num_names, - DOM_SID ***sid_mem, char ***names, + uint32 group_rid, uint32 *num_names, + uint32 **rid_mem, char ***names, uint32 **name_types) { - CLI_POLICY_HND *hnd = NULL; + CLI_POLICY_HND *hnd; NTSTATUS result = NT_STATUS_UNSUCCESSFUL; uint32 i, total_names = 0; POLICY_HND dom_pol, group_pol; uint32 des_access = SEC_RIGHTS_MAXIMUM_ALLOWED; BOOL got_dom_pol = False, got_group_pol = False; - uint32 *rid_mem = NULL; - uint32 group_rid; int retry; - unsigned int j; - fstring sid_string; - DEBUG(10,("rpc: lookup_groupmem %s sid=%s\n", domain->name, sid_to_string(sid_string, group_sid))); - - if (!sid_peek_check_rid(&domain->sid, group_sid, &group_rid)) { - goto done; - } + DEBUG(10,("rpc: lookup_groupmem %s rid=%u\n", domain->name, group_rid)); *num_names = 0; @@ -560,7 +550,7 @@ static NTSTATUS lookup_groupmem(struct winbindd_domain *domain, group. */ result = cli_samr_query_groupmem(hnd->cli, mem_ctx, - &group_pol, num_names, &rid_mem, + &group_pol, num_names, rid_mem, name_types); if (!NT_STATUS_IS_OK(result)) @@ -575,16 +565,6 @@ static NTSTATUS lookup_groupmem(struct winbindd_domain *domain, *names = talloc_zero(mem_ctx, *num_names * sizeof(char *)); *name_types = talloc_zero(mem_ctx, *num_names * sizeof(uint32)); - *sid_mem = talloc_zero(mem_ctx, *num_names * sizeof(DOM_SID *)); - - for (j=0;j<(*num_names);j++) { - (*sid_mem)[j] = rid_to_talloced_sid(domain, mem_ctx, (rid_mem)[j]); - } - - if (!*names || !*name_types) { - result = NT_STATUS_NO_MEMORY; - goto done; - } for (i = 0; i < *num_names; i += MAX_LOOKUP_RIDS) { int num_lookup_rids = MIN(*num_names - i, MAX_LOOKUP_RIDS); @@ -597,7 +577,7 @@ static NTSTATUS lookup_groupmem(struct winbindd_domain *domain, result = cli_samr_lookup_rids(hnd->cli, mem_ctx, &dom_pol, 1000, /* flags */ num_lookup_rids, - &rid_mem[i], + &(*rid_mem)[i], &tmp_num_names, &tmp_names, &tmp_types); @@ -612,7 +592,7 @@ static NTSTATUS lookup_groupmem(struct winbindd_domain *domain, memcpy(&(*name_types)[i], tmp_types, sizeof(uint32) * tmp_num_names); - + total_names += tmp_num_names; } diff --git a/source3/nsswitch/winbindd_user.c b/source3/nsswitch/winbindd_user.c index d2bd231918a..6c544d7cf25 100644 --- a/source3/nsswitch/winbindd_user.c +++ b/source3/nsswitch/winbindd_user.c @@ -29,30 +29,29 @@ /* Fill a pwent structure with information we have obtained */ static BOOL winbindd_fill_pwent(char *dom_name, char *user_name, - DOM_SID *user_sid, DOM_SID *group_sid, + uint32 user_rid, uint32 group_rid, char *full_name, struct winbindd_pw *pw) { extern userdom_struct current_user_info; fstring output_username; pstring homedir; - fstring sid_string; if (!pw || !dom_name || !user_name) return False; /* Resolve the uid number */ - if (!winbindd_idmap_get_uid_from_sid(user_sid, + if (!winbindd_idmap_get_uid_from_rid(dom_name, user_rid, &pw->pw_uid)) { - DEBUG(1, ("error getting user id for sid %s\n", sid_to_string(sid_string, user_sid))); + DEBUG(1, ("error getting user id for rid %d\n", user_rid)); return False; } /* Resolve the gid number */ - if (!winbindd_idmap_get_gid_from_sid(group_sid, + if (!winbindd_idmap_get_gid_from_rid(dom_name, group_rid, &pw->pw_gid)) { - DEBUG(1, ("error getting group id for sid %s\n", sid_to_string(sid_string, group_sid))); + DEBUG(1, ("error getting group id for rid %d\n", group_rid)); return False; } @@ -96,6 +95,7 @@ static BOOL winbindd_fill_pwent(char *dom_name, char *user_name, enum winbindd_result winbindd_getpwnam(struct winbindd_cli_state *state) { + uint32 user_rid; WINBIND_USERINFO user_info; DOM_SID user_sid; NTSTATUS status; @@ -144,7 +144,9 @@ enum winbindd_result winbindd_getpwnam(struct winbindd_cli_state *state) return WINBINDD_ERROR; } - status = domain->methods->query_user(domain, mem_ctx, &user_sid, + sid_split_rid(&user_sid, &user_rid); + + status = domain->methods->query_user(domain, mem_ctx, user_rid, &user_info); if (!NT_STATUS_IS_OK(status)) { @@ -156,7 +158,7 @@ enum winbindd_result winbindd_getpwnam(struct winbindd_cli_state *state) /* Now take all this information and fill in a passwd structure */ if (!winbindd_fill_pwent(name_domain, name_user, - user_info.user_sid, user_info.group_sid, + user_rid, user_info.group_rid, user_info.full_name, &state->response.data.pw)) { talloc_destroy(mem_ctx); @@ -174,6 +176,7 @@ enum winbindd_result winbindd_getpwuid(struct winbindd_cli_state *state) { DOM_SID user_sid; struct winbindd_domain *domain; + uint32 user_rid; fstring dom_name; fstring user_name; enum SID_NAME_USE name_type; @@ -193,15 +196,18 @@ enum winbindd_result winbindd_getpwuid(struct winbindd_cli_state *state) /* Get rid from uid */ - if (!winbindd_idmap_get_sid_from_uid(state->request.data.uid, - &user_sid)) { - DEBUG(1, ("could not convert uid %d to SID\n", + if (!winbindd_idmap_get_rid_from_uid(state->request.data.uid, + &user_rid, &domain)) { + DEBUG(1, ("could not convert uid %d to rid\n", state->request.data.uid)); return WINBINDD_ERROR; } /* Get name and name type from rid */ + sid_copy(&user_sid, &domain->sid); + sid_append_rid(&user_sid, user_rid); + if (!winbindd_lookup_name_by_sid(&user_sid, dom_name, user_name, &name_type)) { fstring temp; @@ -210,13 +216,6 @@ enum winbindd_result winbindd_getpwuid(struct winbindd_cli_state *state) return WINBINDD_ERROR; } - domain = find_domain_from_sid(&user_sid); - - if (!domain) { - DEBUG(1,("Can't find domain from sid\n")); - return WINBINDD_ERROR; - } - /* Get some user info */ if (!(mem_ctx = talloc_init("winbind_getpwuid(%d)", @@ -226,7 +225,7 @@ enum winbindd_result winbindd_getpwuid(struct winbindd_cli_state *state) return WINBINDD_ERROR; } - status = domain->methods->query_user(domain, mem_ctx, &user_sid, + status = domain->methods->query_user(domain, mem_ctx, user_rid, &user_info); if (!NT_STATUS_IS_OK(status)) { @@ -238,7 +237,7 @@ enum winbindd_result winbindd_getpwuid(struct winbindd_cli_state *state) /* Resolve gid number */ - if (!winbindd_idmap_get_gid_from_sid(user_info.group_sid, &gid)) { + if (!winbindd_idmap_get_gid_from_rid(domain->name, user_info.group_rid, &gid)) { DEBUG(1, ("error getting group id for user %s\n", user_name)); talloc_destroy(mem_ctx); return WINBINDD_ERROR; @@ -246,8 +245,7 @@ enum winbindd_result winbindd_getpwuid(struct winbindd_cli_state *state) /* Fill in password structure */ - if (!winbindd_fill_pwent(domain->name, user_name, user_info.user_sid, - user_info.group_sid, + if (!winbindd_fill_pwent(domain->name, user_name, user_rid, user_info.group_rid, user_info.full_name, &state->response.data.pw)) { talloc_destroy(mem_ctx); return WINBINDD_ERROR; @@ -334,13 +332,13 @@ static BOOL get_sam_user_entries(struct getent_state *ent) TALLOC_CTX *mem_ctx; struct winbindd_domain *domain; struct winbindd_methods *methods; - unsigned int i; + int i; if (ent->num_sam_entries) return False; if (!(mem_ctx = talloc_init("get_sam_user_entries(%s)", - ent->domain_name))) + ent->domain_name))) return False; if (!(domain = find_domain_from_name(ent->domain_name))) { @@ -395,8 +393,8 @@ static BOOL get_sam_user_entries(struct getent_state *ent) } /* User and group ids */ - sid_copy(&name_list[ent->num_sam_entries+i].user_sid, info[i].user_sid); - sid_copy(&name_list[ent->num_sam_entries+i].group_sid, info[i].group_sid); + name_list[ent->num_sam_entries+i].user_rid = info[i].user_rid; + name_list[ent->num_sam_entries+i].group_rid = info[i].group_rid; } ent->num_sam_entries += num_entries; @@ -493,8 +491,8 @@ enum winbindd_result winbindd_getpwent(struct winbindd_cli_state *state) result = winbindd_fill_pwent( ent->domain_name, name_list[ent->sam_entry_index].name, - &name_list[ent->sam_entry_index].user_sid, - &name_list[ent->sam_entry_index].group_sid, + name_list[ent->sam_entry_index].user_rid, + name_list[ent->sam_entry_index].group_rid, name_list[ent->sam_entry_index].gecos, &user_list[user_list_ndx]); @@ -541,7 +539,7 @@ enum winbindd_result winbindd_list_users(struct winbindd_cli_state *state) for (domain = domain_list(); domain; domain = domain->next) { NTSTATUS status; struct winbindd_methods *methods; - unsigned int i; + int i; methods = domain->methods; diff --git a/source3/nsswitch/winbindd_util.c b/source3/nsswitch/winbindd_util.c index ac0b317b427..262d862b8aa 100644 --- a/source3/nsswitch/winbindd_util.c +++ b/source3/nsswitch/winbindd_util.c @@ -179,7 +179,7 @@ void rescan_trusted_domains(BOOL force) int i; result = domain->methods->trusted_domains(domain, mem_ctx, &num_domains, - &names, &alt_names, &dom_sids); + &names, &alt_names, &dom_sids); if (!NT_STATUS_IS_OK(result)) { continue; } @@ -188,12 +188,9 @@ void rescan_trusted_domains(BOOL force) the access methods of its parent */ for(i = 0; i < num_domains; i++) { DEBUG(10,("Found domain %s\n", names[i])); - add_trusted_domain(names[i], alt_names?alt_names[i]:NULL, - domain->methods, &dom_sids[i]); - - /* store trusted domain in the cache */ - trustdom_cache_store(names[i], alt_names ? alt_names[i] : NULL, - &dom_sids[i], t + WINBINDD_RESCAN_FREQ); + add_trusted_domain(names[i], + alt_names?alt_names[i]:NULL, + domain->methods, &dom_sids[i]); } } @@ -271,20 +268,14 @@ BOOL winbindd_lookup_sid_by_name(struct winbindd_domain *domain, enum SID_NAME_USE *type) { NTSTATUS result; - TALLOC_CTX *mem_ctx; + /* Don't bother with machine accounts */ - + if (name[strlen(name) - 1] == '$') return False; - mem_ctx = talloc_init("lookup_sid_by_name for %s\n", name); - if (!mem_ctx) - return False; - /* Lookup name */ - result = domain->methods->name_to_sid(domain, mem_ctx, name, sid, type); - - talloc_destroy(mem_ctx); + result = domain->methods->name_to_sid(domain, name, sid, type); /* Return rid and type if lookup successful */ if (!NT_STATUS_IS_OK(result)) { @@ -380,12 +371,12 @@ BOOL winbindd_param_init(void) { /* Parse winbind uid and winbind_gid parameters */ - if (!lp_idmap_uid(&server_state.uid_low, &server_state.uid_high)) { + if (!lp_winbind_uid(&server_state.uid_low, &server_state.uid_high)) { DEBUG(0, ("winbind uid range missing or invalid\n")); return False; } - if (!lp_idmap_gid(&server_state.gid_low, &server_state.gid_high)) { + if (!lp_winbind_gid(&server_state.gid_low, &server_state.gid_high)) { DEBUG(0, ("winbind gid range missing or invalid\n")); return False; } @@ -558,20 +549,3 @@ int winbindd_num_clients(void) { return _num_clients; } - -/* Help with RID -> SID conversion */ - -DOM_SID *rid_to_talloced_sid(struct winbindd_domain *domain, - TALLOC_CTX *mem_ctx, - uint32 rid) -{ - DOM_SID *sid; - sid = talloc(mem_ctx, sizeof(*sid)); - if (!sid) { - smb_panic("rid_to_to_talloced_sid: talloc for DOM_SID failed!\n"); - } - sid_copy(sid, &domain->sid); - sid_append_rid(sid, rid); - return sid; -} - diff --git a/source3/param/loadparm.c b/source3/param/loadparm.c index 4e2536cf894..606c4d605a6 100644 --- a/source3/param/loadparm.c +++ b/source3/param/loadparm.c @@ -8,7 +8,6 @@ Copyright (C) Simo Sorce 2001 Copyright (C) Alexander Bokovoy 2002 Copyright (C) Stefan (metze) Metzmacher 2002 - Copyright (C) Anthony Liguori 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -82,13 +81,6 @@ extern int extra_time_offset; static BOOL defaults_saved = False; -typedef struct _param_opt_struct param_opt_struct; -struct _param_opt_struct { - param_opt_struct *prev, *next; - char *key; - char *value; -}; - /* * This structure describes global (ie., server-wide) parameters. */ @@ -119,8 +111,6 @@ typedef struct char *szSMBPasswdFile; char *szPrivateDir; char **szPassdbBackend; - char **szSamBackend; - char **szPreloadModules; char *szPasswordServer; char *szSocketOptions; char *szRealm; @@ -162,18 +152,16 @@ typedef struct BOOL bUtmp; #endif char *szSourceEnv; - char *szIdmapUID; - char *szIdmapGID; + char *szWinbindUID; + char *szWinbindGID; char *szNonUnixAccountRange; - int AlgorithmicRidBase; + BOOL bAlgorithmicRidBase; char *szTemplateHomedir; char *szTemplateShell; char *szWinbindSeparator; BOOL bWinbindEnumUsers; BOOL bWinbindEnumGroups; BOOL bWinbindUseDefaultDomain; - char *szWinbindBackend; - char *szIdmapBackend; char *szAddShareCommand; char *szChangeShareCommand; char *szDeleteShareCommand; @@ -286,7 +274,6 @@ typedef struct int restrict_anonymous; int name_cache_timeout; BOOL client_signing; - param_opt_struct *param_opt; } global; @@ -409,7 +396,6 @@ typedef struct BOOL bNTAclSupport; BOOL bUseSendfile; BOOL bProfileAcls; - param_opt_struct *param_opt; char dummy[3]; /* for alignment */ } @@ -530,8 +516,6 @@ static service sDefault = { True, /* bNTAclSupport */ False, /* bUseSendfile */ False, /* bProfileAcls */ - - NULL, /* Parametric options */ "" /* dummy */ }; @@ -550,10 +534,11 @@ static int default_server_announce; /* prototypes for the special type handlers */ static BOOL handle_include(const char *pszParmValue, char **ptr); static BOOL handle_copy(const char *pszParmValue, char **ptr); +static BOOL handle_vfs_object(const char *pszParmValue, char **ptr); static BOOL handle_source_env(const char *pszParmValue, char **ptr); static BOOL handle_netbios_name(const char *pszParmValue, char **ptr); -static BOOL handle_idmap_uid(const char *pszParmValue, char **ptr); -static BOOL handle_idmap_gid(const char *pszParmValue, char **ptr); +static BOOL handle_winbind_uid(const char *pszParmValue, char **ptr); +static BOOL handle_winbind_gid(const char *pszParmValue, char **ptr); static BOOL handle_non_unix_account_range(const char *pszParmValue, char **ptr); static BOOL handle_debug_list( const char *pszParmValue, char **ptr ); static BOOL handle_workgroup( const char *pszParmValue, char **ptr ); @@ -752,7 +737,6 @@ static struct parm_struct parm_table[] = { {"update encrypted", P_BOOL, P_GLOBAL, &Globals.bUpdateEncrypt, NULL, NULL, FLAG_BASIC | FLAG_ADVANCED | FLAG_DEVELOPER}, {"allow trusted domains", P_BOOL, P_GLOBAL, &Globals.bAllowTrustedDomains, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, {"hosts equiv", P_STRING, P_GLOBAL, &Globals.szHostsEquiv, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, - {"idmap backend", P_STRING, P_GLOBAL, &Globals.szIdmapBackend, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, {"min passwd length", P_INTEGER, P_GLOBAL, &Globals.min_passwd_length, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, {"min password length", P_INTEGER, P_GLOBAL, &Globals.min_passwd_length, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, {"map to guest", P_ENUM, P_GLOBAL, &Globals.map_to_guest, NULL, enum_map_to_guest, FLAG_ADVANCED | FLAG_DEVELOPER}, @@ -761,10 +745,9 @@ static struct parm_struct parm_table[] = { {"password server", P_STRING, P_GLOBAL, &Globals.szPasswordServer, NULL, NULL, FLAG_ADVANCED | FLAG_WIZARD | FLAG_DEVELOPER}, {"smb passwd file", P_STRING, P_GLOBAL, &Globals.szSMBPasswdFile, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, {"private dir", P_STRING, P_GLOBAL, &Globals.szPrivateDir, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, - {"passdb backend", P_LIST, P_GLOBAL, &Globals.szPassdbBackend, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, - {"sam backend", P_LIST, P_GLOBAL, &Globals.szSamBackend, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, + {"passdb backend", P_LIST, P_GLOBAL, &Globals.szPassdbBackend, NULL, NULL, FLAG_ADVANCED | FLAG_WIZARD | FLAG_DEVELOPER}, {"non unix account range", P_STRING, P_GLOBAL, &Globals.szNonUnixAccountRange, handle_non_unix_account_range, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, - {"algorithmic rid base", P_INTEGER, P_GLOBAL, &Globals.AlgorithmicRidBase, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, + {"algorithmic rid base", P_INTEGER, P_GLOBAL, &Globals.bAlgorithmicRidBase, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, {"root directory", P_STRING, P_GLOBAL, &Globals.szRootdir, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, {"root dir", P_STRING, P_GLOBAL, &Globals.szRootdir, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, {"root", P_STRING, P_GLOBAL, &Globals.szRootdir, NULL, NULL, FLAG_HIDE | FLAG_DEVELOPER}, @@ -826,7 +809,6 @@ static struct parm_struct parm_table[] = { {"allow hosts", P_LIST, P_LOCAL, &sDefault.szHostsallow, NULL, NULL, FLAG_HIDE}, {"hosts deny", P_LIST, P_LOCAL, &sDefault.szHostsdeny, NULL, NULL, FLAG_GLOBAL | FLAG_BASIC | FLAG_ADVANCED | FLAG_SHARE | FLAG_PRINT | FLAG_DEVELOPER}, {"deny hosts", P_LIST, P_LOCAL, &sDefault.szHostsdeny, NULL, NULL, FLAG_HIDE}, - {"preload modules", P_LIST, P_GLOBAL, &Globals.szPreloadModules, NULL, NULL, FLAG_BASIC | FLAG_GLOBAL}, {"Logging Options", P_SEP, P_SEPARATOR}, @@ -1106,7 +1088,7 @@ static struct parm_struct parm_table[] = { {"VFS module options", P_SEP, P_SEPARATOR}, - {"vfs object", P_LIST, P_LOCAL, &sDefault.szVfsObjectFile, NULL, NULL, FLAG_SHARE}, + {"vfs object", P_STRING, P_LOCAL, &sDefault.szVfsObjectFile, handle_vfs_object, NULL, FLAG_SHARE}, {"vfs options", P_STRING, P_LOCAL, &sDefault.szVfsOptions, NULL, NULL, FLAG_SHARE}, {"vfs path", P_STRING, P_LOCAL, &sDefault.szVfsPath, NULL, NULL, FLAG_SHARE}, @@ -1117,10 +1099,8 @@ static struct parm_struct parm_table[] = { {"Winbind options", P_SEP, P_SEPARATOR}, - {"idmap uid", P_STRING, P_GLOBAL, &Globals.szIdmapUID, handle_idmap_uid, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, - {"winbind uid", P_STRING, P_GLOBAL, &Globals.szIdmapUID, handle_idmap_uid, NULL, FLAG_ADVANCED | FLAG_DEVELOPER | FLAG_HIDE}, - {"idmap gid", P_STRING, P_GLOBAL, &Globals.szIdmapGID, handle_idmap_gid, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, - {"winbind gid", P_STRING, P_GLOBAL, &Globals.szIdmapGID, handle_idmap_gid, NULL, FLAG_ADVANCED | FLAG_DEVELOPER | FLAG_HIDE}, + {"winbind uid", P_STRING, P_GLOBAL, &Globals.szWinbindUID, handle_winbind_uid, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, + {"winbind gid", P_STRING, P_GLOBAL, &Globals.szWinbindGID, handle_winbind_gid, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, {"template homedir", P_STRING, P_GLOBAL, &Globals.szTemplateHomedir, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, {"template shell", P_STRING, P_GLOBAL, &Globals.szTemplateShell, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, {"winbind separator", P_STRING, P_GLOBAL, &Globals.szWinbindSeparator, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, @@ -1128,7 +1108,6 @@ static struct parm_struct parm_table[] = { {"winbind enum users", P_BOOL, P_GLOBAL, &Globals.bWinbindEnumUsers, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, {"winbind enum groups", P_BOOL, P_GLOBAL, &Globals.bWinbindEnumGroups, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, {"winbind use default domain", P_BOOL, P_GLOBAL, &Globals.bWinbindUseDefaultDomain, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, - {"winbind backend", P_STRING, P_GLOBAL, &Globals.szWinbindBackend, NULL, NULL, FLAG_ADVANCED | FLAG_DEVELOPER}, {NULL, P_BOOL, P_NONE, NULL, NULL, NULL, 0} }; @@ -1328,7 +1307,7 @@ static void init_globals(void) string_set(&Globals.szNameResolveOrder, "lmhosts wins host bcast"); string_set(&Globals.szPasswordServer, "*"); - Globals.AlgorithmicRidBase = BASE_RID; + Globals.bAlgorithmicRidBase = BASE_RID; Globals.bLoadPrinters = True; Globals.mangled_stack = 50; @@ -1473,8 +1452,6 @@ static void init_globals(void) Globals.bWinbindEnumGroups = True; Globals.bWinbindUseDefaultDomain = False; - string_set(&Globals.szWinbindBackend, "tdb"); - Globals.name_cache_timeout = 660; /* In seconds */ Globals.bUseSpnego = True; @@ -1525,9 +1502,6 @@ static char *lp_string(const char *s) if (!ret) return NULL; - /* Note: StrnCpy touches len+1 bytes, but we allocate 100 - * extra bytes so we're OK. */ - if (!s) *ret = 0; else @@ -1623,8 +1597,6 @@ FN_GLOBAL_STRING(lp_nis_home_map_name, &Globals.szNISHomeMapName) static FN_GLOBAL_STRING(lp_announce_version, &Globals.szAnnounceVersion) FN_GLOBAL_LIST(lp_netbios_aliases, &Globals.szNetbiosAliases) FN_GLOBAL_LIST(lp_passdb_backend, &Globals.szPassdbBackend) -FN_GLOBAL_LIST(lp_sam_backend, &Globals.szSamBackend) -FN_GLOBAL_LIST(lp_preload_modules, &Globals.szPreloadModules) FN_GLOBAL_STRING(lp_panic_action, &Globals.szPanicAction) FN_GLOBAL_STRING(lp_adduser_script, &Globals.szAddUserScript) FN_GLOBAL_STRING(lp_deluser_script, &Globals.szDelUserScript) @@ -1650,9 +1622,6 @@ FN_GLOBAL_STRING(lp_acl_compatibility, &Globals.szAclCompat) FN_GLOBAL_BOOL(lp_winbind_enum_users, &Globals.bWinbindEnumUsers) FN_GLOBAL_BOOL(lp_winbind_enum_groups, &Globals.bWinbindEnumGroups) FN_GLOBAL_BOOL(lp_winbind_use_default_domain, &Globals.bWinbindUseDefaultDomain) -FN_GLOBAL_STRING(lp_winbind_backend, &Globals.szWinbindBackend) - -FN_GLOBAL_STRING(lp_idmap_backend, &Globals.szIdmapBackend) #ifdef WITH_LDAP_SAMCONFIG FN_GLOBAL_STRING(lp_ldap_server, &Globals.szLdapServer) @@ -1786,7 +1755,7 @@ FN_LOCAL_LIST(lp_readlist, readlist) FN_LOCAL_LIST(lp_writelist, writelist) FN_LOCAL_LIST(lp_printer_admin, printer_admin) FN_LOCAL_STRING(lp_fstype, fstype) -FN_LOCAL_LIST(lp_vfsobj, szVfsObjectFile) +FN_LOCAL_STRING(lp_vfsobj, szVfsObjectFile) FN_LOCAL_STRING(lp_vfs_options, szVfsOptions) FN_LOCAL_STRING(lp_vfs_path, szVfsPath) FN_LOCAL_STRING(lp_msdfs_proxy, szMSDfsProxy) @@ -1864,10 +1833,53 @@ FN_LOCAL_INTEGER(lp_block_size, iBlock_size) FN_LOCAL_CHAR(lp_magicchar, magic_char) FN_GLOBAL_INTEGER(lp_winbind_cache_time, &Globals.winbind_cache_time) FN_GLOBAL_BOOL(lp_hide_local_users, &Globals.bHideLocalUsers) -FN_GLOBAL_INTEGER(lp_algorithmic_rid_base, &Globals.AlgorithmicRidBase) +FN_GLOBAL_BOOL(lp_algorithmic_rid_base, &Globals.bAlgorithmicRidBase) FN_GLOBAL_INTEGER(lp_name_cache_timeout, &Globals.name_cache_timeout) FN_GLOBAL_BOOL(lp_client_signing, &Globals.client_signing) +typedef struct _param_opt_struct param_opt_struct; +struct _param_opt_struct { + char *key; + char *value; + param_opt_struct *prev, *next; +}; + +static param_opt_struct *param_opt = NULL; + +/* Return parametric option from given service. Type is a part of option before ':' */ +/* Parametric option has following syntax: 'Type: option = value' */ +/* Returned value is allocated in 'lp_talloc' context */ + +char *lp_parm_string(const char *servicename, const char *type, const char *option) +{ + param_opt_struct *data; + pstring vfskey; + + if (param_opt != NULL) { + ZERO_STRUCT(vfskey); + pstr_sprintf(vfskey, "%s:%s:%s", (servicename==NULL) ? "global" : servicename, + type, option); + data = param_opt; + while (data) { + if (strcmp(data->key, vfskey) == 0) { + return lp_string(data->value); + } + data = data->next; + } + /* Try to fetch the same option but from globals */ + pstr_sprintf(vfskey, "global:%s:%s", type, option); + data = param_opt; + while (data) { + if (strcmp(data->key, vfskey) == 0) { + return lp_string(data->value); + } + data = data->next; + } + + } + return NULL; +} + /* local prototypes */ static int map_parameter(const char *pszParmName); @@ -1881,198 +1893,6 @@ static BOOL do_parameter(const char *pszParmName, const char *pszParmValue); static BOOL do_section(const char *pszSectionName); static void init_copymap(service * pservice); -/* This is a helper function for parametrical options support. */ -/* It returns a pointer to parametrical option value if it exists or NULL otherwise */ -/* Actual parametrical functions are quite simple */ -static const char *get_parametrics(int lookup_service, const char *type, const char *option) -{ - char* vfskey; - param_opt_struct *data; - - if (lookup_service >= iNumServices) return NULL; - - data = (lookup_service < 0) ? - Globals.param_opt : ServicePtrs[lookup_service]->param_opt; - - asprintf(&vfskey, "%s:%s", type, option); - while (data) { - if (strcmp(data->key, vfskey) == 0) { - string_free(&vfskey); - return data->value; - } - data = data->next; - } - - if (lookup_service >= 0) { - /* Try to fetch the same option but from globals */ - /* but only if we are not already working with Globals */ - data = Globals.param_opt; - while (data) { - if (strcmp(data->key, vfskey) == 0) { - string_free(&vfskey); - return data->value; - } - data = data->next; - } - } - - string_free(&vfskey); - - return NULL; -} - - -/******************************************************************* -convenience routine to return int parameters. -********************************************************************/ -static int lp_int(const char *s) -{ - - if (!s) { - DEBUG(0,("lp_int(%s): is called with NULL!\n",s)); - return (-1); - } - - return atoi(s); -} - -/******************************************************************* -convenience routine to return unsigned long parameters. -********************************************************************/ -static int lp_ulong(const char *s) -{ - - if (!s) { - DEBUG(0,("lp_int(%s): is called with NULL!\n",s)); - return (-1); - } - - return strtoul(s, NULL, 10); -} - -/******************************************************************* -convenience routine to return boolean parameters. -********************************************************************/ -static BOOL lp_bool(const char *s) -{ - BOOL ret = False; - - if (!s) { - DEBUG(0,("lp_bool(%s): is called with NULL!\n",s)); - return False; - } - - if (!set_boolean(&ret,s)) { - DEBUG(0,("lp_bool(%s): value is not boolean!\n",s)); - return False; - } - - return ret; -} - -/******************************************************************* -convenience routine to return enum parameters. -********************************************************************/ -static int lp_enum(const char *s,const struct enum_list *_enum) -{ - int i; - - if (!s || !_enum) { - DEBUG(0,("lp_enum(%s,enum): is called with NULL!\n",s)); - return False; - } - - for (i=0; _enum[i].name; i++) { - if (strcasecmp(_enum[i].name,s)==0) - return _enum[i].value; - } - - DEBUG(0,("lp_enum(%s,enum): value is not in enum_list!\n",s)); - return (-1); -} - -/* Return parametric option from a given service. Type is a part of option before ':' */ -/* Parametric option has following syntax: 'Type: option = value' */ -/* Returned value is allocated in 'lp_talloc' context */ - -char *lp_parm_string(int lookup_service, const char *type, const char *option) -{ - const char *value = get_parametrics(lookup_service, type, option); - - if (value) - return lp_string(value); - - return NULL; -} - -/* Return parametric option from a given service. Type is a part of option before ':' */ -/* Parametric option has following syntax: 'Type: option = value' */ -/* Returned value is allocated in 'lp_talloc' context */ - -char **lp_parm_string_list(int lookup_service, const char *type, const char *option, - const char *separator) -{ - const char *value = get_parametrics(lookup_service, type, option); - - if (value) - return str_list_make(value, separator); - - return NULL; -} - -/* Return parametric option from a given service. Type is a part of option before ':' */ -/* Parametric option has following syntax: 'Type: option = value' */ - -int lp_parm_int(int lookup_service, const char *type, const char *option) -{ - const char *value = get_parametrics(lookup_service, type, option); - - if (value) - return lp_int(value); - - return (-1); -} - -/* Return parametric option from a given service. Type is a part of option before ':' */ -/* Parametric option has following syntax: 'Type: option = value' */ - -unsigned long lp_parm_ulong(int lookup_service, const char *type, const char *option) -{ - const char *value = get_parametrics(lookup_service, type, option); - - if (value) - return lp_ulong(value); - - return (0); -} - -/* Return parametric option from a given service. Type is a part of option before ':' */ -/* Parametric option has following syntax: 'Type: option = value' */ - -BOOL lp_parm_bool(int lookup_service, const char *type, const char *option) -{ - const char *value = get_parametrics(lookup_service, type, option); - - if (value) - return lp_bool(value); - - return False; -} - -/* Return parametric option from a given service. Type is a part of option before ':' */ -/* Parametric option has following syntax: 'Type: option = value' */ - -int lp_parm_enum(int lookup_service, const char *type, const char *option, - const struct enum_list *_enum) -{ - const char *value = get_parametrics(lookup_service, type, option); - - if (value) - return lp_enum(value, _enum); - - return (-1); -} - /*************************************************************************** Initialise a service to the defaults. @@ -2091,7 +1911,6 @@ static void init_service(service * pservice) static void free_service(service *pservice) { int i; - param_opt_struct *data, *pdata; if (!pservice) return; @@ -2116,16 +1935,6 @@ static void free_service(service *pservice) PTR_DIFF(parm_table[i].ptr, &sDefault))); } - DEBUG(5,("Freeing parametrics:\n")); - data = pservice->param_opt; - while (data) { - DEBUG(5,("[%s = %s]\n", data->key, data->value)); - string_free(&data->key); - string_free(&data->value); - pdata = data->next; - SAFE_FREE(data); - data = pdata; - } ZERO_STRUCTP(pservice); } @@ -2140,27 +1949,14 @@ static int add_a_service(const service *pservice, const char *name) int i; service tservice; int num_to_alloc = iNumServices + 1; - param_opt_struct *data, *pdata; tservice = *pservice; /* it might already exist */ if (name) { i = getservicebyname(name, NULL); - if (i >= 0) { - /* Clean all parametric options for service */ - /* They will be added during parsing again */ - data = ServicePtrs[i]->param_opt; - while (data) { - string_free(&data->key); - string_free(&data->value); - pdata = data->next; - SAFE_FREE(data); - data = pdata; - } - ServicePtrs[i]->param_opt = NULL; + if (i >= 0) return (i); - } } /* find an invalid one */ @@ -2403,8 +2199,6 @@ static void copy_service(service * pserviceDest, service * pserviceSource, BOOL { int i; BOOL bcopyall = (pcopymapDest == NULL); - param_opt_struct *data, *pdata, *paramo; - BOOL not_added; for (i = 0; parm_table[i].label; i++) if (parm_table[i].ptr && parm_table[i].class == P_LOCAL && @@ -2458,30 +2252,6 @@ static void copy_service(service * pserviceDest, service * pserviceSource, BOOL (void *)pserviceSource->copymap, sizeof(BOOL) * NUMPARAMETERS); } - - data = pserviceSource->param_opt; - while (data) { - not_added = True; - pdata = pserviceDest->param_opt; - /* Traverse destination */ - while (pdata) { - /* If we already have same option, override it */ - if (strcmp(pdata->key, data->key) == 0) { - string_free(&pdata->value); - pdata->value = strdup(data->value); - not_added = False; - break; - } - pdata = pdata->next; - } - if (not_added) { - paramo = smb_xmalloc(sizeof(param_opt_struct)); - paramo->key = strdup(data->key); - paramo->value = strdup(data->value); - DLIST_ADD(pserviceDest->param_opt, paramo); - } - data = data->next; - } } /*************************************************************************** @@ -2750,6 +2520,22 @@ static BOOL handle_source_env(const char *pszParmValue, char **ptr) return (result); } +/*************************************************************************** + Handle the interpretation of the vfs object parameter. +*************************************************************************/ + +static BOOL handle_vfs_object(const char *pszParmValue, char **ptr) +{ + /* Set string value */ + + string_set(ptr, pszParmValue); + + /* Do any other initialisation required for vfs. Note that + anything done here may have linking repercussions in nmbd. */ + + return True; +} + /*************************************************************************** Handle the include operation. ***************************************************************************/ @@ -2810,49 +2596,49 @@ static BOOL handle_copy(const char *pszParmValue, char **ptr) } /*************************************************************************** - Handle idmap/non unix account uid and gid allocation parameters. The format of these + Handle winbind/non unix account uid and gid allocation parameters. The format of these parameters is: [global] - idmap uid = 1000-1999 - idmap gid = 700-899 + winbind uid = 1000-1999 + winbind gid = 700-899 We only do simple parsing checks here. The strings are parsed into useful - structures in the idmap daemon code. + structures in the winbind daemon code. ***************************************************************************/ -/* Some lp_ routines to return idmap [ug]id information */ +/* Some lp_ routines to return winbind [ug]id information */ -static uid_t idmap_uid_low, idmap_uid_high; -static gid_t idmap_gid_low, idmap_gid_high; +static uid_t winbind_uid_low, winbind_uid_high; +static gid_t winbind_gid_low, winbind_gid_high; static uint32 non_unix_account_low, non_unix_account_high; -BOOL lp_idmap_uid(uid_t *low, uid_t *high) +BOOL lp_winbind_uid(uid_t *low, uid_t *high) { - if (idmap_uid_low == 0 || idmap_uid_high == 0) + if (winbind_uid_low == 0 || winbind_uid_high == 0) return False; if (low) - *low = idmap_uid_low; + *low = winbind_uid_low; if (high) - *high = idmap_uid_high; + *high = winbind_uid_high; return True; } -BOOL lp_idmap_gid(gid_t *low, gid_t *high) +BOOL lp_winbind_gid(gid_t *low, gid_t *high) { - if (idmap_gid_low == 0 || idmap_gid_high == 0) + if (winbind_gid_low == 0 || winbind_gid_high == 0) return False; if (low) - *low = idmap_gid_low; + *low = winbind_gid_low; if (high) - *high = idmap_gid_high; + *high = winbind_gid_high; return True; } @@ -2871,9 +2657,9 @@ BOOL lp_non_unix_account_range(uint32 *low, uint32 *high) return True; } -/* Do some simple checks on "idmap [ug]id" parameter values */ +/* Do some simple checks on "winbind [ug]id" parameter values */ -static BOOL handle_idmap_uid(const char *pszParmValue, char **ptr) +static BOOL handle_winbind_uid(const char *pszParmValue, char **ptr) { uint32 low, high; @@ -2884,13 +2670,13 @@ static BOOL handle_idmap_uid(const char *pszParmValue, char **ptr) string_set(ptr, pszParmValue); - idmap_uid_low = low; - idmap_uid_high = high; + winbind_uid_low = low; + winbind_uid_high = high; return True; } -static BOOL handle_idmap_gid(const char *pszParmValue, char **ptr) +static BOOL handle_winbind_gid(const char *pszParmValue, char **ptr) { uint32 low, high; @@ -2901,8 +2687,8 @@ static BOOL handle_idmap_gid(const char *pszParmValue, char **ptr) string_set(ptr, pszParmValue); - idmap_gid_low = low; - idmap_gid_high = high; + winbind_gid_low = low; + winbind_gid_high = high; return True; } @@ -3080,8 +2866,7 @@ BOOL lp_do_parameter(int snum, const char *pszParmName, const char *pszParmValue void *def_ptr = NULL; pstring vfskey; char *sep; - param_opt_struct *paramo, *data; - BOOL not_added; + param_opt_struct *paramo; parmnum = map_parameter(pszParmName); @@ -3089,35 +2874,15 @@ BOOL lp_do_parameter(int snum, const char *pszParmName, const char *pszParmValue if ((sep=strchr(pszParmName, ':')) != NULL) { *sep = 0; ZERO_STRUCT(vfskey); - pstr_sprintf(vfskey, "%s:", pszParmName); + pstr_sprintf(vfskey, "%s:%s:", + (snum >= 0) ? lp_servicename(snum) : "global", pszParmName); slen = strlen(vfskey); pstrcat(vfskey, sep+1); trim_string(vfskey+slen, " ", " "); - not_added = True; - data = (snum < 0) ? Globals.param_opt : - ServicePtrs[snum]->param_opt; - /* Traverse destination */ - while (data) { - /* If we already have same option, override it */ - if (strcmp(data->key, vfskey) == 0) { - string_free(&data->value); - data->value = strdup(pszParmValue); - not_added = False; - break; - } - data = data->next; - } - if (not_added) { - paramo = smb_xmalloc(sizeof(param_opt_struct)); - paramo->key = strdup(vfskey); - paramo->value = strdup(pszParmValue); - if (snum < 0) { - DLIST_ADD(Globals.param_opt, paramo); - } else { - DLIST_ADD(ServicePtrs[snum]->param_opt, paramo); - } - } - + paramo = smb_xmalloc(sizeof(param_opt_struct)); + paramo->key = strdup(vfskey); + paramo->value = strdup(pszParmValue); + DLIST_ADD(param_opt, paramo); *sep = ':'; return (True); } @@ -3467,6 +3232,7 @@ static void dump_globals(FILE *f) { int i; param_opt_struct *data; + char *s; fprintf(f, "# Global parameters\n[global]\n"); @@ -3480,11 +3246,14 @@ static void dump_globals(FILE *f) print_parameter(&parm_table[i], parm_table[i].ptr, f); fprintf(f, "\n"); } - if (Globals.param_opt != NULL) { - data = Globals.param_opt; + if (param_opt != NULL) { + data = param_opt; while(data) { - fprintf(f, "\t%s = %s\n", data->key, data->value); - data = data->next; + if (((s=strstr(data->key, "global")) == data->key) && + (*(s+strlen("global")) == ':')) { + fprintf(f, "\t%s = %s\n", s+strlen("global")+1, data->value); + } + data = data->next; } } @@ -3511,6 +3280,8 @@ static void dump_a_service(service * pService, FILE * f) { int i; param_opt_struct *data; + const char *sn; + char *s; if (pService != &sDefault) fprintf(f, "\n[%s]\n", pService->szService); @@ -3539,11 +3310,15 @@ static void dump_a_service(service * pService, FILE * f) ((char *)pService) + pdiff, f); fprintf(f, "\n"); } - if (pService->param_opt != NULL) { - data = pService->param_opt; + if (param_opt != NULL) { + data = param_opt; + sn = (pService == &sDefault) ? "global" : pService->szService; while(data) { - fprintf(f, "\t%s = %s\n", data->key, data->value); - data = data->next; + if (((s=strstr(data->key, sn)) == data->key) && + (*(s+strlen(sn)) == ':')) { + fprintf(f, "\t%s = %s\n", s+strlen(sn)+1, data->value); + } + data = data->next; } } } @@ -3805,18 +3580,7 @@ static void set_server_role(void) DEBUG(0, ("Server's Role (logon server) conflicts with share-level security\n")); break; case SEC_SERVER: - if (lp_domain_logons()) - DEBUG(0, ("Server's Role (logon server) conflicts with server-level security\n")); - server_role = ROLE_DOMAIN_MEMBER; - break; case SEC_DOMAIN: - if (lp_domain_logons()) { - DEBUG(1, ("Server's Role (logon server) NOT ADVISED with domain-level security\n")); - server_role = ROLE_DOMAIN_BDC; - break; - } - server_role = ROLE_DOMAIN_MEMBER; - break; case SEC_ADS: if (lp_domain_logons()) { server_role = ROLE_DOMAIN_PDC; @@ -3889,16 +3653,16 @@ BOOL lp_load(const char *pszFname, BOOL global_only, BOOL save_defaults, lp_save_defaults(); } - if (Globals.param_opt != NULL) { - data = Globals.param_opt; + if (param_opt != NULL) { + data = param_opt; while (data) { - string_free(&data->key); - string_free(&data->value); + SAFE_FREE(data->key); + SAFE_FREE(data->value); pdata = data->next; SAFE_FREE(data); data = pdata; } - Globals.param_opt = NULL; + param_opt = NULL; } /* We get sections first, so have to start 'behind' to make up */ diff --git a/source3/passdb/pdb_get_set.c b/source3/passdb/pdb_get_set.c index a86d9362630..80b4bb4dc3b 100644 --- a/source3/passdb/pdb_get_set.c +++ b/source3/passdb/pdb_get_set.c @@ -490,7 +490,7 @@ BOOL pdb_set_init_flags (SAM_ACCOUNT *sampass, enum pdb_elements element, enum p DEBUG(0,("Can't set flag: %d in set_flags.\n",element)); return False; } - DEBUG(10, ("element %d -> now SET\n", element)); + DEBUG(11, ("element %d -> now SET\n", element)); break; case PDB_DEFAULT: default: @@ -502,7 +502,7 @@ BOOL pdb_set_init_flags (SAM_ACCOUNT *sampass, enum pdb_elements element, enum p DEBUG(0,("Can't set flag: %d in set_flags.\n",element)); return False; } - DEBUG(11, ("element %d -> now DEFAULT\n", element)); + DEBUG(10, ("element %d -> now DEFAULT\n", element)); break; } diff --git a/source3/passdb/pdb_guest.c b/source3/passdb/pdb_guest.c index f5a15057e09..88a75aa667b 100644 --- a/source3/passdb/pdb_guest.c +++ b/source3/passdb/pdb_guest.c @@ -122,8 +122,3 @@ NTSTATUS pdb_init_guestsam(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_method, c return NT_STATUS_OK; } -int pdb_guest_init(void) -{ - return smb_register_passdb("guest", pdb_init_guestsam, PASSDB_INTERFACE_VERSION); -} - diff --git a/source3/passdb/pdb_interface.c b/source3/passdb/pdb_interface.c index 8adcd9dbfa6..42be673d25a 100644 --- a/source3/passdb/pdb_interface.c +++ b/source3/passdb/pdb_interface.c @@ -24,57 +24,21 @@ #undef DBGC_CLASS #define DBGC_CLASS DBGC_PASSDB -static struct pdb_init_function_entry *backends = NULL; - -static void lazy_initialize_passdb(void) -{ - static BOOL initialized = False; - if(initialized)return; - static_init_pdb; - initialized = True; -} - -BOOL smb_register_passdb(const char *name, pdb_init_function init, int version) -{ - struct pdb_init_function_entry *entry = backends; - - if(version != PASSDB_INTERFACE_VERSION) - return False; - - DEBUG(5,("Attempting to register passdb backend %s\n", name)); - - /* Check for duplicates */ - while(entry) { - if(strcasecmp(name, entry->name) == 0) { - DEBUG(0,("There already is a passdb backend registered with the name %s!\n", name)); - return False; - } - entry = entry->next; - } - - entry = smb_xmalloc(sizeof(struct pdb_init_function_entry)); - entry->name = smb_xstrdup(name); - entry->init = init; - - DLIST_ADD(backends, entry); - DEBUG(5,("Successfully added passdb backend '%s'\n", name)); - return True; -} - -static struct pdb_init_function_entry *pdb_find_backend_entry(const char *name) -{ - struct pdb_init_function_entry *entry = backends; - pstring stripped; - - module_path_get_name(name, stripped); - - while(entry) { - if (strequal(entry->name, stripped)) return entry; - entry = entry->next; - } - - return NULL; -} +/** List of various built-in passdb modules */ + +const struct pdb_init_function_entry builtin_pdb_init_functions[] = { + { "smbpasswd", pdb_init_smbpasswd }, + { "smbpasswd_nua", pdb_init_smbpasswd_nua }, + { "tdbsam", pdb_init_tdbsam }, + { "tdbsam_nua", pdb_init_tdbsam_nua }, + { "ldapsam", pdb_init_ldapsam }, + { "ldapsam_nua", pdb_init_ldapsam_nua }, + { "unixsam", pdb_init_unixsam }, + { "guest", pdb_init_guestsam }, + { "nisplussam", pdb_init_nisplussam }, + { "plugin", pdb_init_plugin }, + { NULL, NULL} +}; static NTSTATUS context_setsampwent(struct pdb_context *context, BOOL update) { @@ -408,10 +372,8 @@ static NTSTATUS make_pdb_methods_name(struct pdb_methods **methods, struct pdb_c { char *module_name = smb_xstrdup(selected); char *module_location = NULL, *p; - struct pdb_init_function_entry *entry; NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; - - lazy_initialize_passdb(); + int i; p = strchr(module_name, ':'); @@ -423,37 +385,27 @@ static NTSTATUS make_pdb_methods_name(struct pdb_methods **methods, struct pdb_c trim_string(module_name, " ", " "); - DEBUG(5,("Attempting to find an passdb backend to match %s (%s)\n", selected, module_name)); - - entry = pdb_find_backend_entry(module_name); - - /* Try to find a module that contains this module */ - if (!entry) { - DEBUG(2,("No builtin backend found, trying to load plugin\n")); - if(smb_probe_module("passdb", module_name) && !(entry = pdb_find_backend_entry(module_name))) { - DEBUG(0,("Plugin is available, but doesn't register passdb backend %s\n", module_name)); + for (i = 0; builtin_pdb_init_functions[i].name; i++) + { + if (strequal(builtin_pdb_init_functions[i].name, module_name)) + { + DEBUG(5,("Found pdb backend %s (at pos %d)\n", module_name, i)); + nt_status = builtin_pdb_init_functions[i].init(context, methods, module_location); + if (NT_STATUS_IS_OK(nt_status)) { + DEBUG(5,("pdb backend %s has a valid init\n", selected)); + } else { + DEBUG(0,("pdb backend %s did not correctly init (error was %s)\n", selected, nt_errstr(nt_status))); + } SAFE_FREE(module_name); - return NT_STATUS_UNSUCCESSFUL; + return nt_status; + break; /* unreached */ } } - + /* No such backend found */ - if(!entry) { - DEBUG(0,("No builtin nor plugin backend for %s found\n", module_name)); - SAFE_FREE(module_name); - return NT_STATUS_INVALID_PARAMETER; - } - - DEBUG(5,("Found pdb backend %s\n", module_name)); - nt_status = entry->init(context, methods, module_location); - if (NT_STATUS_IS_OK(nt_status)) { - DEBUG(5,("pdb backend %s has a valid init\n", selected)); - } else { - DEBUG(0,("pdb backend %s did not correctly init (error was %s)\n", selected, nt_errstr(nt_status))); - } SAFE_FREE(module_name); - return nt_status; + return NT_STATUS_INVALID_PARAMETER; } /****************************************************************** diff --git a/source3/passdb/pdb_ldap.c b/source3/passdb/pdb_ldap.c index eaef7f37a7b..026056dc7f6 100644 --- a/source3/passdb/pdb_ldap.c +++ b/source3/passdb/pdb_ldap.c @@ -6,7 +6,6 @@ Copyright (C) Shahms King 2001 Copyright (C) Andrew Bartlett 2002 Copyright (C) Stefan (metze) Metzmacher 2002 - Copyright (C) Jim McDonough 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -29,6 +28,7 @@ #undef DBGC_CLASS #define DBGC_CLASS DBGC_PASSDB +#ifdef HAVE_LDAP /* TODO: * persistent connections: if using NSS LDAP, many connections are made * however, using only one within Samba would be nice @@ -52,13 +52,36 @@ #include #include -#include "smb_ldap.h" - #ifndef SAM_ACCOUNT #define SAM_ACCOUNT struct sam_passwd #endif -static uint32 ldapsam_get_next_available_nua_rid(struct smb_ldap_privates *ldap_state); +struct ldapsam_privates { + + /* Former statics */ + LDAP *ldap_struct; + LDAPMessage *result; + LDAPMessage *entry; + int index; + + time_t last_ping; + /* retrive-once info */ + const char *uri; + + BOOL permit_non_unix_accounts; + + uint32 low_nua_rid; + uint32 high_nua_rid; + + char *bind_dn; + char *bind_secret; +}; + +#define LDAPSAM_DONT_PING_TIME 10 /* ping only all 10 seconds */ + +static struct ldapsam_privates *static_ldap_state; + +static uint32 ldapsam_get_next_available_nua_rid(struct ldapsam_privates *ldap_state); /******************************************************************* find the ldap password @@ -135,24 +158,503 @@ static const char *attr[] = {"uid", "pwdLastSet", "logonTime", "uidNumber", "gidNumber", "homeDirectory", NULL }; +/******************************************************************* + open a connection to the ldap server. +******************************************************************/ +static int ldapsam_open_connection (struct ldapsam_privates *ldap_state, LDAP ** ldap_struct) +{ + int rc = LDAP_SUCCESS; + int version; + BOOL ldap_v3 = False; + +#if defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000) + DEBUG(10, ("ldapsam_open_connection: %s\n", ldap_state->uri)); + + if ((rc = ldap_initialize(ldap_struct, ldap_state->uri)) != LDAP_SUCCESS) { + DEBUG(0, ("ldap_initialize: %s\n", ldap_err2string(rc))); + return rc; + } + +#else + + /* Parse the string manually */ + + { + int port = 0; + fstring protocol; + fstring host; + const char *p = ldap_state->uri; + SMB_ASSERT(sizeof(protocol)>10 && sizeof(host)>254); + + /* skip leading "URL:" (if any) */ + if ( strncasecmp( p, "URL:", 4 ) == 0 ) { + p += 4; + } + + sscanf(p, "%10[^:]://%254s[^:]:%d", protocol, host, &port); + + if (port == 0) { + if (strequal(protocol, "ldap")) { + port = LDAP_PORT; + } else if (strequal(protocol, "ldaps")) { + port = LDAPS_PORT; + } else { + DEBUG(0, ("unrecognised protocol (%s)!\n", protocol)); + } + } + + if ((*ldap_struct = ldap_init(host, port)) == NULL) { + DEBUG(0, ("ldap_init failed !\n")); + return LDAP_OPERATIONS_ERROR; + } + + if (strequal(protocol, "ldaps")) { +#ifdef LDAP_OPT_X_TLS + int tls = LDAP_OPT_X_TLS_HARD; + if (ldap_set_option (*ldap_struct, LDAP_OPT_X_TLS, &tls) != LDAP_SUCCESS) + { + DEBUG(0, ("Failed to setup a TLS session\n")); + } + + DEBUG(3,("LDAPS option set...!\n")); +#else + DEBUG(0,("ldapsam_open_connection: Secure connection not supported by LDAP client libraries!\n")); + return LDAP_OPERATIONS_ERROR; +#endif + } + } +#endif + + if (ldap_get_option(*ldap_struct, LDAP_OPT_PROTOCOL_VERSION, &version) == LDAP_OPT_SUCCESS) + { + if (version != LDAP_VERSION3) + { + version = LDAP_VERSION3; + if (ldap_set_option (*ldap_struct, LDAP_OPT_PROTOCOL_VERSION, &version) == LDAP_OPT_SUCCESS) { + ldap_v3 = True; + } + } else { + ldap_v3 = True; + } + } + + if (lp_ldap_ssl() == LDAP_SSL_START_TLS) { +#ifdef LDAP_OPT_X_TLS + if (ldap_v3) { + if ((rc = ldap_start_tls_s (*ldap_struct, NULL, NULL)) != LDAP_SUCCESS) + { + DEBUG(0,("Failed to issue the StartTLS instruction: %s\n", + ldap_err2string(rc))); + return rc; + } + DEBUG (3, ("StartTLS issued: using a TLS connection\n")); + } else { + + DEBUG(0, ("Need LDAPv3 for Start TLS\n")); + return LDAP_OPERATIONS_ERROR; + } +#else + DEBUG(0,("ldapsam_open_connection: StartTLS not supported by LDAP client libraries!\n")); + return LDAP_OPERATIONS_ERROR; +#endif + } + + DEBUG(2, ("ldapsam_open_connection: connection opened\n")); + return rc; +} + + +/******************************************************************* + a rebind function for authenticated referrals + This version takes a void* that we can shove useful stuff in :-) +******************************************************************/ +#if defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000) +#else +static int rebindproc_with_state (LDAP * ld, char **whop, char **credp, + int *methodp, int freeit, void *arg) +{ + struct ldapsam_privates *ldap_state = arg; + + /** @TODO Should we be doing something to check what servers we rebind to? + Could we get a referral to a machine that we don't want to give our + username and password to? */ + + if (freeit) { + SAFE_FREE(*whop); + memset(*credp, '\0', strlen(*credp)); + SAFE_FREE(*credp); + } else { + DEBUG(5,("rebind_proc_with_state: Rebinding as \"%s\"\n", + ldap_state->bind_dn)); + + *whop = strdup(ldap_state->bind_dn); + if (!*whop) { + return LDAP_NO_MEMORY; + } + *credp = strdup(ldap_state->bind_secret); + if (!*credp) { + SAFE_FREE(*whop); + return LDAP_NO_MEMORY; + } + *methodp = LDAP_AUTH_SIMPLE; + } + return 0; +} +#endif /*defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000)*/ + +/******************************************************************* + a rebind function for authenticated referrals + This version takes a void* that we can shove useful stuff in :-) + and actually does the connection. +******************************************************************/ +#if defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000) +static int rebindproc_connect_with_state (LDAP *ldap_struct, + LDAP_CONST char *url, + ber_tag_t request, + ber_int_t msgid, void *arg) +{ + struct ldapsam_privates *ldap_state = arg; + int rc; + DEBUG(5,("rebindproc_connect_with_state: Rebinding as \"%s\"\n", + ldap_state->bind_dn)); + + /** @TODO Should we be doing something to check what servers we rebind to? + Could we get a referral to a machine that we don't want to give our + username and password to? */ + + rc = ldap_simple_bind_s(ldap_struct, ldap_state->bind_dn, ldap_state->bind_secret); + + return rc; +} +#endif /*defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000)*/ + +/******************************************************************* + Add a rebind function for authenticated referrals +******************************************************************/ +#if defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000) +#else +# if LDAP_SET_REBIND_PROC_ARGS == 2 +static int rebindproc (LDAP *ldap_struct, char **whop, char **credp, + int *method, int freeit ) +{ + return rebindproc_with_state(ldap_struct, whop, credp, + method, freeit, static_ldap_state); + +} +# endif /*LDAP_SET_REBIND_PROC_ARGS == 2*/ +#endif /*defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000)*/ + +/******************************************************************* + a rebind function for authenticated referrals + this also does the connection, but no void*. +******************************************************************/ +#if defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000) +# if LDAP_SET_REBIND_PROC_ARGS == 2 +static int rebindproc_connect (LDAP * ld, LDAP_CONST char *url, int request, + ber_int_t msgid) +{ + return rebindproc_connect_with_state(ld, url, (ber_tag_t)request, msgid, + static_ldap_state); +} +# endif /*LDAP_SET_REBIND_PROC_ARGS == 2*/ +#endif /*defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000)*/ + +/******************************************************************* + connect to the ldap server under system privilege. +******************************************************************/ +static int ldapsam_connect_system(struct ldapsam_privates *ldap_state, LDAP * ldap_struct) +{ + int rc; + char *ldap_dn; + char *ldap_secret; + + /* The rebind proc needs this *HACK*. We are not multithreaded, so + this will work, but it's not nice. */ + static_ldap_state = ldap_state; + + /* get the password */ + if (!fetch_ldapsam_pw(&ldap_dn, &ldap_secret)) + { + DEBUG(0, ("ldap_connect_system: Failed to retrieve password from secrets.tdb\n")); + return LDAP_INVALID_CREDENTIALS; + } + + ldap_state->bind_dn = ldap_dn; + ldap_state->bind_secret = ldap_secret; + + /* removed the sasl_bind_s "EXTERNAL" stuff, as my testsuite + (OpenLDAP) doesnt' seem to support it */ + + DEBUG(10,("ldap_connect_system: Binding to ldap server %s as \"%s\"\n", + ldap_state->uri, ldap_dn)); + +#if defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000) +# if LDAP_SET_REBIND_PROC_ARGS == 2 + ldap_set_rebind_proc(ldap_struct, &rebindproc_connect); +# endif +# if LDAP_SET_REBIND_PROC_ARGS == 3 + ldap_set_rebind_proc(ldap_struct, &rebindproc_connect_with_state, (void *)ldap_state); +# endif +#else /*defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000)*/ +# if LDAP_SET_REBIND_PROC_ARGS == 2 + ldap_set_rebind_proc(ldap_struct, &rebindproc); +# endif +# if LDAP_SET_REBIND_PROC_ARGS == 3 + ldap_set_rebind_proc(ldap_struct, &rebindproc_with_state, (void *)ldap_state); +# endif +#endif /*defined(LDAP_API_FEATURE_X_OPENLDAP) && (LDAP_API_VERSION > 2000)*/ + + rc = ldap_simple_bind_s(ldap_struct, ldap_dn, ldap_secret); + + if (rc != LDAP_SUCCESS) { + char *ld_error; + ldap_get_option(ldap_state->ldap_struct, LDAP_OPT_ERROR_STRING, + &ld_error); + DEBUG(0, + ("failed to bind to server with dn= %s Error: %s\n\t%s\n", + ldap_dn, ldap_err2string(rc), + ld_error)); + free(ld_error); + return rc; + } + + DEBUG(2, ("ldap_connect_system: succesful connection to the LDAP server\n")); + return rc; +} + +/********************************************************************** +Connect to LDAP server +*********************************************************************/ +static int ldapsam_open(struct ldapsam_privates *ldap_state) +{ + int rc; + SMB_ASSERT(ldap_state); + +#ifndef NO_LDAP_SECURITY + if (geteuid() != 0) { + DEBUG(0, ("ldapsam_open: cannot access LDAP when not root..\n")); + return LDAP_INSUFFICIENT_ACCESS; + } +#endif + + if ((ldap_state->ldap_struct != NULL) && ((ldap_state->last_ping + LDAPSAM_DONT_PING_TIME) < time(NULL))) { + struct sockaddr_un addr; + socklen_t len; + int sd; + if (ldap_get_option(ldap_state->ldap_struct, LDAP_OPT_DESC, &sd) == 0 && + getpeername(sd, (struct sockaddr *) &addr, &len) < 0) { + /* the other end has died. reopen. */ + ldap_unbind_ext(ldap_state->ldap_struct, NULL, NULL); + ldap_state->ldap_struct = NULL; + ldap_state->last_ping = (time_t)0; + } else { + ldap_state->last_ping = time(NULL); + } + } + + if (ldap_state->ldap_struct != NULL) { + DEBUG(5,("ldapsam_open: allready connected to the LDAP server\n")); + return LDAP_SUCCESS; + } + + if ((rc = ldapsam_open_connection(ldap_state, &ldap_state->ldap_struct))) { + return rc; + } + + if ((rc = ldapsam_connect_system(ldap_state, ldap_state->ldap_struct))) { + ldap_unbind_ext(ldap_state->ldap_struct, NULL, NULL); + ldap_state->ldap_struct = NULL; + return rc; + } + + + ldap_state->last_ping = time(NULL); + DEBUG(4,("The LDAP server is succesful connected\n")); + + return LDAP_SUCCESS; +} + +/********************************************************************** +Disconnect from LDAP server +*********************************************************************/ +static NTSTATUS ldapsam_close(struct ldapsam_privates *ldap_state) +{ + if (!ldap_state) + return NT_STATUS_INVALID_PARAMETER; + + if (ldap_state->ldap_struct != NULL) { + ldap_unbind_ext(ldap_state->ldap_struct, NULL, NULL); + ldap_state->ldap_struct = NULL; + } + + DEBUG(5,("The connection to the LDAP server was closed\n")); + /* maybe free the results here --metze */ + + return NT_STATUS_OK; +} + +static int ldapsam_retry_open(struct ldapsam_privates *ldap_state, int *attempts) +{ + int rc; + + SMB_ASSERT(ldap_state && attempts); + + if (*attempts != 0) { + /* we retry after 0.5, 2, 4.5, 8, 12.5, 18, 24.5 seconds */ + msleep((((*attempts)*(*attempts))/2)*1000); + } + (*attempts)++; + + if ((rc = ldapsam_open(ldap_state))) { + DEBUG(0,("Connection to LDAP Server failed for the %d try!\n",*attempts)); + return rc; + } + + return LDAP_SUCCESS; +} + + +static int ldapsam_search(struct ldapsam_privates *ldap_state, + const char *base, int scope, const char *filter, + const char *attrs[], int attrsonly, + LDAPMessage **res) +{ + int rc = LDAP_SERVER_DOWN; + int attempts = 0; + + SMB_ASSERT(ldap_state); + + while ((rc == LDAP_SERVER_DOWN) && (attempts < 8)) { + + if ((rc = ldapsam_retry_open(ldap_state,&attempts)) != LDAP_SUCCESS) + continue; + + rc = ldap_search_s(ldap_state->ldap_struct, base, scope, + filter, attrs, attrsonly, res); + } + + if (rc == LDAP_SERVER_DOWN) { + DEBUG(0,("%s: LDAP server is down!\n",FUNCTION_MACRO)); + ldapsam_close(ldap_state); + } + + return rc; +} + +static int ldapsam_modify(struct ldapsam_privates *ldap_state, char *dn, LDAPMod *attrs[]) +{ + int rc = LDAP_SERVER_DOWN; + int attempts = 0; + + if (!ldap_state) + return (-1); + + while ((rc == LDAP_SERVER_DOWN) && (attempts < 8)) { + + if ((rc = ldapsam_retry_open(ldap_state,&attempts)) != LDAP_SUCCESS) + continue; + + rc = ldap_modify_s(ldap_state->ldap_struct, dn, attrs); + } + + if (rc == LDAP_SERVER_DOWN) { + DEBUG(0,("%s: LDAP server is down!\n",FUNCTION_MACRO)); + ldapsam_close(ldap_state); + } + + return rc; +} + +static int ldapsam_add(struct ldapsam_privates *ldap_state, const char *dn, LDAPMod *attrs[]) +{ + int rc = LDAP_SERVER_DOWN; + int attempts = 0; + + if (!ldap_state) + return (-1); + + while ((rc == LDAP_SERVER_DOWN) && (attempts < 8)) { + + if ((rc = ldapsam_retry_open(ldap_state,&attempts)) != LDAP_SUCCESS) + continue; + + rc = ldap_add_s(ldap_state->ldap_struct, dn, attrs); + } + + if (rc == LDAP_SERVER_DOWN) { + DEBUG(0,("%s: LDAP server is down!\n",FUNCTION_MACRO)); + ldapsam_close(ldap_state); + } + + return rc; +} + +static int ldapsam_delete(struct ldapsam_privates *ldap_state, char *dn) +{ + int rc = LDAP_SERVER_DOWN; + int attempts = 0; + + if (!ldap_state) + return (-1); + + while ((rc == LDAP_SERVER_DOWN) && (attempts < 8)) { + + if ((rc = ldapsam_retry_open(ldap_state,&attempts)) != LDAP_SUCCESS) + continue; + + rc = ldap_delete_s(ldap_state->ldap_struct, dn); + } + + if (rc == LDAP_SERVER_DOWN) { + DEBUG(0,("%s: LDAP server is down!\n",FUNCTION_MACRO)); + ldapsam_close(ldap_state); + } + + return rc; +} + +static int ldapsam_extended_operation(struct ldapsam_privates *ldap_state, LDAP_CONST char *reqoid, struct berval *reqdata, LDAPControl **serverctrls, LDAPControl **clientctrls, char **retoidp, struct berval **retdatap) +{ + int rc = LDAP_SERVER_DOWN; + int attempts = 0; + + if (!ldap_state) + return (-1); + + while ((rc == LDAP_SERVER_DOWN) && (attempts < 8)) { + + if ((rc = ldapsam_retry_open(ldap_state,&attempts)) != LDAP_SUCCESS) + continue; + + rc = ldap_extended_operation_s(ldap_state->ldap_struct, reqoid, reqdata, serverctrls, clientctrls, retoidp, retdatap); + } + + if (rc == LDAP_SERVER_DOWN) { + DEBUG(0,("%s: LDAP server is down!\n",FUNCTION_MACRO)); + ldapsam_close(ldap_state); + } + + return rc; +} + /******************************************************************* run the search by name. ******************************************************************/ -static int ldapsam_search_one_user (struct smb_ldap_privates *ldap_state, const char *filter, LDAPMessage ** result) +static int ldapsam_search_one_user (struct ldapsam_privates *ldap_state, const char *filter, LDAPMessage ** result) { int scope = LDAP_SCOPE_SUBTREE; int rc; DEBUG(2, ("ldapsam_search_one_user: searching for:[%s]\n", filter)); - rc = smb_ldap_search(ldap_state, lp_ldap_suffix (), scope, filter, attr, 0, result); + rc = ldapsam_search(ldap_state, lp_ldap_suffix (), scope, filter, attr, 0, result); if (rc != LDAP_SUCCESS) { - char *ld_error = NULL; + char *ld_error; ldap_get_option(ldap_state->ldap_struct, LDAP_OPT_ERROR_STRING, &ld_error); DEBUG(0,("ldapsam_search_one_user: Problem during the LDAP search: %s (%s)\n", - ld_error?ld_error:"(unknown)", ldap_err2string (rc))); + ld_error, ldap_err2string (rc))); DEBUG(3,("ldapsam_search_one_user: Query was: %s, %s\n", lp_ldap_suffix(), filter)); SAFE_FREE(ld_error); @@ -164,7 +666,7 @@ static int ldapsam_search_one_user (struct smb_ldap_privates *ldap_state, const /******************************************************************* run the search by name. ******************************************************************/ -static int ldapsam_search_one_user_by_name (struct smb_ldap_privates *ldap_state, const char *user, +static int ldapsam_search_one_user_by_name (struct ldapsam_privates *ldap_state, const char *user, LDAPMessage ** result) { pstring filter; @@ -195,7 +697,7 @@ static int ldapsam_search_one_user_by_name (struct smb_ldap_privates *ldap_state /******************************************************************* run the search by uid. ******************************************************************/ -static int ldapsam_search_one_user_by_uid(struct smb_ldap_privates *ldap_state, +static int ldapsam_search_one_user_by_uid(struct ldapsam_privates *ldap_state, int uid, LDAPMessage ** result) { @@ -229,7 +731,7 @@ static int ldapsam_search_one_user_by_uid(struct smb_ldap_privates *ldap_state, /******************************************************************* run the search by rid. ******************************************************************/ -static int ldapsam_search_one_user_by_rid (struct smb_ldap_privates *ldap_state, +static int ldapsam_search_one_user_by_rid (struct ldapsam_privates *ldap_state, uint32 rid, LDAPMessage ** result) { @@ -249,11 +751,111 @@ static int ldapsam_search_one_user_by_rid (struct smb_ldap_privates *ldap_state, return rc; } +/******************************************************************* +search an attribute and return the first value found. +******************************************************************/ +static BOOL get_single_attribute (LDAP * ldap_struct, LDAPMessage * entry, + const char *attribute, pstring value) +{ + char **values; + + if ((values = ldap_get_values (ldap_struct, entry, attribute)) == NULL) { + value = NULL; + DEBUG (10, ("get_single_attribute: [%s] = []\n", attribute)); + + return False; + } + + pstrcpy(value, values[0]); + ldap_value_free(values); +#ifdef DEBUG_PASSWORDS + DEBUG (100, ("get_single_attribute: [%s] = [%s]\n", attribute, value)); +#endif + return True; +} + +/************************************************************************ +Routine to manage the LDAPMod structure array +manage memory used by the array, by each struct, and values + +************************************************************************/ +static void make_a_mod (LDAPMod *** modlist, int modop, const char *attribute, const char *value) +{ + LDAPMod **mods; + int i; + int j; + + mods = *modlist; + + if (attribute == NULL || *attribute == '\0') + return; + +#if 0 + /* Why do we need this??? -- vl */ + if (value == NULL || *value == '\0') + return; +#endif + + if (mods == NULL) + { + mods = (LDAPMod **) malloc(sizeof(LDAPMod *)); + if (mods == NULL) + { + DEBUG(0, ("make_a_mod: out of memory!\n")); + return; + } + mods[0] = NULL; + } + + for (i = 0; mods[i] != NULL; ++i) { + if (mods[i]->mod_op == modop && !strcasecmp(mods[i]->mod_type, attribute)) + break; + } + + if (mods[i] == NULL) + { + mods = (LDAPMod **) Realloc (mods, (i + 2) * sizeof (LDAPMod *)); + if (mods == NULL) + { + DEBUG(0, ("make_a_mod: out of memory!\n")); + return; + } + mods[i] = (LDAPMod *) malloc(sizeof(LDAPMod)); + if (mods[i] == NULL) + { + DEBUG(0, ("make_a_mod: out of memory!\n")); + return; + } + mods[i]->mod_op = modop; + mods[i]->mod_values = NULL; + mods[i]->mod_type = strdup(attribute); + mods[i + 1] = NULL; + } + + if (value != NULL) + { + j = 0; + if (mods[i]->mod_values != NULL) { + for (; mods[i]->mod_values[j] != NULL; j++); + } + mods[i]->mod_values = (char **)Realloc(mods[i]->mod_values, + (j + 2) * sizeof (char *)); + + if (mods[i]->mod_values == NULL) { + DEBUG (0, ("make_a_mod: Memory allocation failure!\n")); + return; + } + mods[i]->mod_values[j] = strdup(value); + mods[i]->mod_values[j + 1] = NULL; + } + *modlist = mods; +} + /******************************************************************* Delete complete object or objectclass and attrs from object found in search_result depending on lp_ldap_delete_dn ******************************************************************/ -static NTSTATUS ldapsam_delete_entry(struct smb_ldap_privates *ldap_state, +static NTSTATUS ldapsam_delete_entry(struct ldapsam_privates *ldap_state, LDAPMessage *result, const char *objectclass, const char **attrs) @@ -276,7 +878,7 @@ static NTSTATUS ldapsam_delete_entry(struct smb_ldap_privates *ldap_state, if (lp_ldap_delete_dn()) { NTSTATUS ret = NT_STATUS_OK; - rc = smb_ldap_delete(ldap_state, dn); + rc = ldapsam_delete(ldap_state, dn); if (rc != LDAP_SUCCESS) { DEBUG(0, ("Could not delete object %s\n", dn)); @@ -300,7 +902,7 @@ static NTSTATUS ldapsam_delete_entry(struct smb_ldap_privates *ldap_state, for (attrib = attrs; *attrib != NULL; attrib++) { if (StrCaseCmp(*attrib, name) == 0) { DEBUG(10, ("deleting attribute %s\n", name)); - smb_ldap_make_a_mod(&mods, LDAP_MOD_DELETE, name, NULL); + make_a_mod(&mods, LDAP_MOD_DELETE, name, NULL); } } @@ -311,18 +913,18 @@ static NTSTATUS ldapsam_delete_entry(struct smb_ldap_privates *ldap_state, ber_free(ptr, 0); } - smb_ldap_make_a_mod(&mods, LDAP_MOD_DELETE, "objectClass", objectclass); + make_a_mod(&mods, LDAP_MOD_DELETE, "objectClass", objectclass); - rc = smb_ldap_modify(ldap_state, dn, mods); + rc = ldapsam_modify(ldap_state, dn, mods); ldap_mods_free(mods, 1); if (rc != LDAP_SUCCESS) { - char *ld_error = NULL; + char *ld_error; ldap_get_option(ldap_state->ldap_struct, LDAP_OPT_ERROR_STRING, &ld_error); DEBUG(0, ("could not delete attributes for %s, error: %s (%s)\n", - dn, ldap_err2string(rc), ld_error?ld_error:"unknown")); + dn, ldap_err2string(rc), ld_error)); SAFE_FREE(ld_error); ldap_memfree(dn); return NT_STATUS_UNSUCCESSFUL; @@ -337,7 +939,7 @@ static NTSTATUS ldapsam_delete_entry(struct smb_ldap_privates *ldap_state, /********************************************************************** Initialize SAM_ACCOUNT from an LDAP query (unix attributes only) *********************************************************************/ -static BOOL get_unix_attributes (struct smb_ldap_privates *ldap_state, +static BOOL get_unix_attributes (struct ldapsam_privates *ldap_state, SAM_ACCOUNT * sampass, LDAPMessage * entry) { @@ -366,15 +968,15 @@ static BOOL get_unix_attributes (struct smb_ldap_privates *ldap_state, } ldap_value_free(ldap_values); - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "homeDirectory", homedir)) + if (!get_single_attribute(ldap_state->ldap_struct, entry, "homeDirectory", homedir)) return False; - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "uidNumber", temp)) + if (!get_single_attribute(ldap_state->ldap_struct, entry, "uidNumber", temp)) return False; uid = (uid_t)atol(temp); - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "gidNumber", temp)) + if (!get_single_attribute(ldap_state->ldap_struct, entry, "gidNumber", temp)) return False; gid = (gid_t)atol(temp); @@ -392,7 +994,7 @@ static BOOL get_unix_attributes (struct smb_ldap_privates *ldap_state, Initialize SAM_ACCOUNT from an LDAP query (Based on init_sam_from_buffer in pdb_tdb.c) *********************************************************************/ -static BOOL init_sam_from_ldap (struct smb_ldap_privates *ldap_state, +static BOOL init_sam_from_ldap (struct ldapsam_privates *ldap_state, SAM_ACCOUNT * sampass, LDAPMessage * entry) { @@ -453,7 +1055,7 @@ static BOOL init_sam_from_ldap (struct smb_ldap_privates *ldap_state, return False; } - smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "uid", username); + get_single_attribute(ldap_state->ldap_struct, entry, "uid", username); DEBUG(2, ("Entry found for user: %s\n", username)); pstrcpy(nt_username, username); @@ -465,12 +1067,12 @@ static BOOL init_sam_from_ldap (struct smb_ldap_privates *ldap_state, pdb_set_domain(sampass, domain, PDB_DEFAULT); pdb_set_nt_username(sampass, nt_username, PDB_SET); - smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "rid", temp); + get_single_attribute(ldap_state->ldap_struct, entry, "rid", temp); user_rid = (uint32)atol(temp); pdb_set_user_sid_from_rid(sampass, user_rid, PDB_SET); - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "primaryGroupID", temp)) { + if (!get_single_attribute(ldap_state->ldap_struct, entry, "primaryGroupID", temp)) { group_rid = 0; } else { group_rid = (uint32)atol(temp); @@ -518,42 +1120,42 @@ static BOOL init_sam_from_ldap (struct smb_ldap_privates *ldap_state, } } - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "pwdLastSet", temp)) { + if (!get_single_attribute(ldap_state->ldap_struct, entry, "pwdLastSet", temp)) { /* leave as default */ } else { pass_last_set_time = (time_t) atol(temp); pdb_set_pass_last_set_time(sampass, pass_last_set_time, PDB_SET); } - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "logonTime", temp)) { + if (!get_single_attribute(ldap_state->ldap_struct, entry, "logonTime", temp)) { /* leave as default */ } else { logon_time = (time_t) atol(temp); pdb_set_logon_time(sampass, logon_time, PDB_SET); } - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "logoffTime", temp)) { + if (!get_single_attribute(ldap_state->ldap_struct, entry, "logoffTime", temp)) { /* leave as default */ } else { logoff_time = (time_t) atol(temp); pdb_set_logoff_time(sampass, logoff_time, PDB_SET); } - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "kickoffTime", temp)) { + if (!get_single_attribute(ldap_state->ldap_struct, entry, "kickoffTime", temp)) { /* leave as default */ } else { kickoff_time = (time_t) atol(temp); pdb_set_kickoff_time(sampass, kickoff_time, PDB_SET); } - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "pwdCanChange", temp)) { + if (!get_single_attribute(ldap_state->ldap_struct, entry, "pwdCanChange", temp)) { /* leave as default */ } else { pass_can_change_time = (time_t) atol(temp); pdb_set_pass_can_change_time(sampass, pass_can_change_time, PDB_SET); } - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "pwdMustChange", temp)) { + if (!get_single_attribute(ldap_state->ldap_struct, entry, "pwdMustChange", temp)) { /* leave as default */ } else { pass_must_change_time = (time_t) atol(temp); @@ -566,9 +1168,9 @@ static BOOL init_sam_from_ldap (struct smb_ldap_privates *ldap_state, * that fits your needs; using cn then displayName rather than 'userFullName' */ - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, + if (!get_single_attribute(ldap_state->ldap_struct, entry, "displayName", fullname)) { - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, + if (!get_single_attribute(ldap_state->ldap_struct, entry, "cn", fullname)) { /* leave as default */ } else { @@ -578,7 +1180,7 @@ static BOOL init_sam_from_ldap (struct smb_ldap_privates *ldap_state, pdb_set_fullname(sampass, fullname, PDB_SET); } - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "homeDrive", dir_drive)) { + if (!get_single_attribute(ldap_state->ldap_struct, entry, "homeDrive", dir_drive)) { pdb_set_dir_drive(sampass, talloc_sub_specified(sampass->mem_ctx, lp_logon_drive(), username, domain, @@ -588,7 +1190,7 @@ static BOOL init_sam_from_ldap (struct smb_ldap_privates *ldap_state, pdb_set_dir_drive(sampass, dir_drive, PDB_SET); } - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "smbHome", homedir)) { + if (!get_single_attribute(ldap_state->ldap_struct, entry, "smbHome", homedir)) { pdb_set_homedir(sampass, talloc_sub_specified(sampass->mem_ctx, lp_logon_home(), username, domain, @@ -598,7 +1200,7 @@ static BOOL init_sam_from_ldap (struct smb_ldap_privates *ldap_state, pdb_set_homedir(sampass, homedir, PDB_SET); } - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "scriptPath", logon_script)) { + if (!get_single_attribute(ldap_state->ldap_struct, entry, "scriptPath", logon_script)) { pdb_set_logon_script(sampass, talloc_sub_specified(sampass->mem_ctx, lp_logon_script(), username, domain, @@ -608,7 +1210,7 @@ static BOOL init_sam_from_ldap (struct smb_ldap_privates *ldap_state, pdb_set_logon_script(sampass, logon_script, PDB_SET); } - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "profilePath", profile_path)) { + if (!get_single_attribute(ldap_state->ldap_struct, entry, "profilePath", profile_path)) { pdb_set_profile_path(sampass, talloc_sub_specified(sampass->mem_ctx, lp_logon_path(), username, domain, @@ -618,13 +1220,13 @@ static BOOL init_sam_from_ldap (struct smb_ldap_privates *ldap_state, pdb_set_profile_path(sampass, profile_path, PDB_SET); } - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "description", acct_desc)) { + if (!get_single_attribute(ldap_state->ldap_struct, entry, "description", acct_desc)) { /* leave as default */ } else { pdb_set_acct_desc(sampass, acct_desc, PDB_SET); } - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "userWorkstations", workstations)) { + if (!get_single_attribute(ldap_state->ldap_struct, entry, "userWorkstations", workstations)) { /* leave as default */; } else { pdb_set_workstations(sampass, workstations, PDB_SET); @@ -636,7 +1238,7 @@ static BOOL init_sam_from_ldap (struct smb_ldap_privates *ldap_state, hours_len = 21; memset(hours, 0xff, hours_len); - if (!smb_ldap_get_single_attribute (ldap_state->ldap_struct, entry, "lmPassword", temp)) { + if (!get_single_attribute (ldap_state->ldap_struct, entry, "lmPassword", temp)) { /* leave as default */ } else { pdb_gethexpwd(temp, smblmpwd); @@ -646,7 +1248,7 @@ static BOOL init_sam_from_ldap (struct smb_ldap_privates *ldap_state, ZERO_STRUCT(smblmpwd); } - if (!smb_ldap_get_single_attribute (ldap_state->ldap_struct, entry, "ntPassword", temp)) { + if (!get_single_attribute (ldap_state->ldap_struct, entry, "ntPassword", temp)) { /* leave as default */ } else { pdb_gethexpwd(temp, smbntpwd); @@ -656,7 +1258,7 @@ static BOOL init_sam_from_ldap (struct smb_ldap_privates *ldap_state, ZERO_STRUCT(smbntpwd); } - if (!smb_ldap_get_single_attribute (ldap_state->ldap_struct, entry, "acctFlags", temp)) { + if (!get_single_attribute (ldap_state->ldap_struct, entry, "acctFlags", temp)) { acct_ctrl |= ACB_NORMAL; } else { acct_ctrl = pdb_decode_acct_ctrl(temp); @@ -724,7 +1326,7 @@ static void make_ldap_mod(LDAP *ldap_struct, LDAPMessage *existing, the old value, should it exist. */ if ((newval != NULL) && (strlen(newval) > 0)) { - smb_ldap_make_a_mod(mods, LDAP_MOD_ADD, attribute, newval); + make_a_mod(mods, LDAP_MOD_ADD, attribute, newval); } if (values == NULL) { @@ -739,7 +1341,7 @@ static void make_ldap_mod(LDAP *ldap_struct, LDAPMessage *existing, deny the complete operation if somebody changed the attribute behind our back. */ - smb_ldap_make_a_mod(mods, LDAP_MOD_DELETE, attribute, values[0]); + make_a_mod(mods, LDAP_MOD_DELETE, attribute, values[0]); ldap_value_free(values); } @@ -747,7 +1349,7 @@ static void make_ldap_mod(LDAP *ldap_struct, LDAPMessage *existing, Initialize SAM_ACCOUNT from an LDAP query (Based on init_buffer_from_sam in pdb_tdb.c) *********************************************************************/ -static BOOL init_ldap_from_sam (struct smb_ldap_privates *ldap_state, +static BOOL init_ldap_from_sam (struct ldapsam_privates *ldap_state, LDAPMessage *existing, LDAPMod *** mods, const SAM_ACCOUNT * sampass, BOOL (*need_update)(const SAM_ACCOUNT *, @@ -933,7 +1535,7 @@ static BOOL init_ldap_from_sam (struct smb_ldap_privates *ldap_state, /********************************************************************** Connect to LDAP server and find the next available RID. *********************************************************************/ -static uint32 check_nua_rid_is_avail(struct smb_ldap_privates *ldap_state, uint32 top_rid) +static uint32 check_nua_rid_is_avail(struct ldapsam_privates *ldap_state, uint32 top_rid) { LDAPMessage *result; uint32 final_rid = (top_rid & (~USER_RID_TYPE)) + RID_MULTIPLIER; @@ -964,7 +1566,7 @@ static uint32 check_nua_rid_is_avail(struct smb_ldap_privates *ldap_state, uint3 /********************************************************************** Extract the RID from an LDAP entry *********************************************************************/ -static uint32 entry_to_user_rid(struct smb_ldap_privates *ldap_state, LDAPMessage *entry) { +static uint32 entry_to_user_rid(struct ldapsam_privates *ldap_state, LDAPMessage *entry) { uint32 rid; SAM_ACCOUNT *user = NULL; if (!NT_STATUS_IS_OK(pdb_init_sam(&user))) { @@ -987,7 +1589,7 @@ static uint32 entry_to_user_rid(struct smb_ldap_privates *ldap_state, LDAPMessag /********************************************************************** Connect to LDAP server and find the next available RID. *********************************************************************/ -static uint32 search_top_nua_rid(struct smb_ldap_privates *ldap_state) +static uint32 search_top_nua_rid(struct ldapsam_privates *ldap_state) { int rc; pstring filter; @@ -1008,7 +1610,7 @@ static uint32 search_top_nua_rid(struct smb_ldap_privates *ldap_state) #endif DEBUG(2, ("ldapsam_get_next_available_nua_rid: searching for:[%s]\n", final_filter)); - rc = smb_ldap_search(ldap_state, lp_ldap_suffix(), + rc = ldapsam_search(ldap_state, lp_ldap_suffix(), LDAP_SCOPE_SUBTREE, final_filter, attr, 0, &result); @@ -1057,7 +1659,7 @@ static uint32 search_top_nua_rid(struct smb_ldap_privates *ldap_state) /********************************************************************** Connect to LDAP server and find the next available RID. *********************************************************************/ -static uint32 ldapsam_get_next_available_nua_rid(struct smb_ldap_privates *ldap_state) { +static uint32 ldapsam_get_next_available_nua_rid(struct ldapsam_privates *ldap_state) { uint32 next_nua_rid; uint32 top_nua_rid; @@ -1074,14 +1676,14 @@ Connect to LDAP server for password enumeration *********************************************************************/ static NTSTATUS ldapsam_setsampwent(struct pdb_methods *my_methods, BOOL update) { - struct smb_ldap_privates *ldap_state = (struct smb_ldap_privates *)my_methods->private_data; + struct ldapsam_privates *ldap_state = (struct ldapsam_privates *)my_methods->private_data; int rc; pstring filter; pstrcpy(filter, lp_ldap_filter()); all_string_sub(filter, "%u", "*", sizeof(pstring)); - rc = smb_ldap_search(ldap_state, lp_ldap_suffix(), + rc = ldapsam_search(ldap_state, lp_ldap_suffix(), LDAP_SCOPE_SUBTREE, filter, attr, 0, &ldap_state->result); @@ -1109,7 +1711,7 @@ End enumeration of the LDAP password list *********************************************************************/ static void ldapsam_endsampwent(struct pdb_methods *my_methods) { - struct smb_ldap_privates *ldap_state = (struct smb_ldap_privates *)my_methods->private_data; + struct ldapsam_privates *ldap_state = (struct ldapsam_privates *)my_methods->private_data; if (ldap_state->result) { ldap_msgfree(ldap_state->result); ldap_state->result = NULL; @@ -1122,9 +1724,13 @@ Get the next entry in the LDAP password database static NTSTATUS ldapsam_getsampwent(struct pdb_methods *my_methods, SAM_ACCOUNT *user) { NTSTATUS ret = NT_STATUS_UNSUCCESSFUL; - struct smb_ldap_privates *ldap_state = (struct smb_ldap_privates *)my_methods->private_data; + struct ldapsam_privates *ldap_state = (struct ldapsam_privates *)my_methods->private_data; BOOL bret = False; + /* The rebind proc needs this *HACK*. We are not multithreaded, so + this will work, but it's not nice. */ + static_ldap_state = ldap_state; + while (!bret) { if (!ldap_state->entry) return ret; @@ -1145,7 +1751,7 @@ Get SAM_ACCOUNT entry from LDAP by username static NTSTATUS ldapsam_getsampwnam(struct pdb_methods *my_methods, SAM_ACCOUNT *user, const char *sname) { NTSTATUS ret = NT_STATUS_UNSUCCESSFUL; - struct smb_ldap_privates *ldap_state = (struct smb_ldap_privates *)my_methods->private_data; + struct ldapsam_privates *ldap_state = (struct ldapsam_privates *)my_methods->private_data; LDAPMessage *result; LDAPMessage *entry; int count; @@ -1189,8 +1795,8 @@ Get SAM_ACCOUNT entry from LDAP by rid static NTSTATUS ldapsam_getsampwrid(struct pdb_methods *my_methods, SAM_ACCOUNT *user, uint32 rid) { NTSTATUS ret = NT_STATUS_UNSUCCESSFUL; - struct smb_ldap_privates *ldap_state = - (struct smb_ldap_privates *)my_methods->private_data; + struct ldapsam_privates *ldap_state = + (struct ldapsam_privates *)my_methods->private_data; LDAPMessage *result; LDAPMessage *entry; int count; @@ -1245,7 +1851,7 @@ static NTSTATUS ldapsam_modify_entry(struct pdb_methods *my_methods, SAM_ACCOUNT *newpwd, char *dn, LDAPMod **mods, int ldap_op, BOOL pdb_add) { - struct smb_ldap_privates *ldap_state = (struct smb_ldap_privates *)my_methods->private_data; + struct ldapsam_privates *ldap_state = (struct ldapsam_privates *)my_methods->private_data; int rc; if (!my_methods || !newpwd || !dn) { @@ -1259,11 +1865,11 @@ static NTSTATUS ldapsam_modify_entry(struct pdb_methods *my_methods, switch(ldap_op) { case LDAP_MOD_ADD: - smb_ldap_make_a_mod(&mods, LDAP_MOD_ADD, "objectclass", "account"); - rc = smb_ldap_add(ldap_state, dn, mods); + make_a_mod(&mods, LDAP_MOD_ADD, "objectclass", "account"); + rc = ldapsam_add(ldap_state, dn, mods); break; case LDAP_MOD_REPLACE: - rc = smb_ldap_modify(ldap_state, dn ,mods); + rc = ldapsam_modify(ldap_state, dn ,mods); break; default: DEBUG(0,("Wrong LDAP operation type: %d!\n", ldap_op)); @@ -1271,15 +1877,15 @@ static NTSTATUS ldapsam_modify_entry(struct pdb_methods *my_methods, } if (rc!=LDAP_SUCCESS) { - char *ld_error = NULL; + char *ld_error; ldap_get_option(ldap_state->ldap_struct, LDAP_OPT_ERROR_STRING, &ld_error); DEBUG(1, ("failed to %s user dn= %s with: %s\n\t%s\n", ldap_op == LDAP_MOD_ADD ? "add" : "modify", dn, ldap_err2string(rc), - ld_error?ld_error:"unknown")); - SAFE_FREE(ld_error); + ld_error)); + free(ld_error); return NT_STATUS_UNSUCCESSFUL; } } @@ -1310,7 +1916,7 @@ static NTSTATUS ldapsam_modify_entry(struct pdb_methods *my_methods, ber_free(ber,1); - if ((rc = smb_ldap_extended_operation(ldap_state, LDAP_EXOP_X_MODIFY_PASSWD, + if ((rc = ldapsam_extended_operation(ldap_state, LDAP_EXOP_X_MODIFY_PASSWD, bv, NULL, NULL, &retoid, &retdata))!=LDAP_SUCCESS) { DEBUG(0,("LDAP Password could not be changed for user %s: %s\n", pdb_get_username(newpwd),ldap_err2string(rc))); @@ -1333,7 +1939,7 @@ Delete entry from LDAP for username *********************************************************************/ static NTSTATUS ldapsam_delete_sam_account(struct pdb_methods *my_methods, SAM_ACCOUNT * sam_acct) { - struct smb_ldap_privates *ldap_state = (struct smb_ldap_privates *)my_methods->private_data; + struct ldapsam_privates *ldap_state = (struct ldapsam_privates *)my_methods->private_data; const char *sname; int rc; LDAPMessage *result; @@ -1380,7 +1986,7 @@ Update SAM_ACCOUNT static NTSTATUS ldapsam_update_sam_account(struct pdb_methods *my_methods, SAM_ACCOUNT * newpwd) { NTSTATUS ret = NT_STATUS_UNSUCCESSFUL; - struct smb_ldap_privates *ldap_state = (struct smb_ldap_privates *)my_methods->private_data; + struct ldapsam_privates *ldap_state = (struct ldapsam_privates *)my_methods->private_data; int rc; char *dn; LDAPMessage *result; @@ -1421,11 +2027,11 @@ static NTSTATUS ldapsam_update_sam_account(struct pdb_methods *my_methods, SAM_A ldap_mods_free(mods,1); if (!NT_STATUS_IS_OK(ret)) { - char *ld_error = NULL; + char *ld_error; ldap_get_option(ldap_state->ldap_struct, LDAP_OPT_ERROR_STRING, &ld_error); DEBUG(0,("failed to modify user with uid = %s, error: %s (%s)\n", - pdb_get_username(newpwd), ld_error?ld_error:"(unknwon)", ldap_err2string(rc))); + pdb_get_username(newpwd), ld_error, ldap_err2string(rc))); SAFE_FREE(ld_error); return ret; } @@ -1452,7 +2058,7 @@ Add SAM_ACCOUNT to LDAP static NTSTATUS ldapsam_add_sam_account(struct pdb_methods *my_methods, SAM_ACCOUNT * newpwd) { NTSTATUS ret = NT_STATUS_UNSUCCESSFUL; - struct smb_ldap_privates *ldap_state = (struct smb_ldap_privates *)my_methods->private_data; + struct ldapsam_privates *ldap_state = (struct ldapsam_privates *)my_methods->private_data; int rc; pstring filter; LDAPMessage *result = NULL; @@ -1531,7 +2137,7 @@ static NTSTATUS ldapsam_add_sam_account(struct pdb_methods *my_methods, SAM_ACCO return NT_STATUS_UNSUCCESSFUL; } - smb_ldap_make_a_mod(&mods, LDAP_MOD_ADD, "objectclass", "sambaAccount"); + make_a_mod(&mods, LDAP_MOD_ADD, "objectclass", "sambaAccount"); ret = ldapsam_modify_entry(my_methods,newpwd,dn,mods,ldap_op, True); if (NT_STATUS_IS_ERR(ret)) { @@ -1548,15 +2154,15 @@ static NTSTATUS ldapsam_add_sam_account(struct pdb_methods *my_methods, SAM_ACCO static void free_private_data(void **vp) { - struct smb_ldap_privates **ldap_state = (struct smb_ldap_privates **)vp; + struct ldapsam_privates **ldap_state = (struct ldapsam_privates **)vp; - smb_ldap_close(*ldap_state); + ldapsam_close(*ldap_state); if ((*ldap_state)->bind_secret) { memset((*ldap_state)->bind_secret, '\0', strlen((*ldap_state)->bind_secret)); } - smb_ldap_close(*ldap_state); + ldapsam_close(*ldap_state); SAFE_FREE((*ldap_state)->bind_dn); SAFE_FREE((*ldap_state)->bind_secret); @@ -1571,7 +2177,7 @@ static const char *group_attr[] = {"cn", "ntSid", "ntGroupType", "displayName", "description", NULL }; -static int ldapsam_search_one_group (struct smb_ldap_privates *ldap_state, +static int ldapsam_search_one_group (struct ldapsam_privates *ldap_state, const char *filter, LDAPMessage ** result) { @@ -1580,16 +2186,16 @@ static int ldapsam_search_one_group (struct smb_ldap_privates *ldap_state, DEBUG(2, ("ldapsam_search_one_group: searching for:[%s]\n", filter)); - rc = smb_ldap_search(ldap_state, lp_ldap_suffix (), scope, + rc = ldapsam_search(ldap_state, lp_ldap_suffix (), scope, filter, group_attr, 0, result); if (rc != LDAP_SUCCESS) { - char *ld_error = NULL; + char *ld_error; ldap_get_option(ldap_state->ldap_struct, LDAP_OPT_ERROR_STRING, &ld_error); DEBUG(0, ("ldapsam_search_one_group: " "Problem during the LDAP search: LDAP error: %s (%s)", - ld_error?ld_error:"(unknown)", ldap_err2string(rc))); + ld_error, ldap_err2string(rc))); DEBUG(3, ("ldapsam_search_one_group: Query was: %s, %s\n", lp_ldap_suffix(), filter)); SAFE_FREE(ld_error); @@ -1598,7 +2204,7 @@ static int ldapsam_search_one_group (struct smb_ldap_privates *ldap_state, return rc; } -static BOOL init_group_from_ldap(struct smb_ldap_privates *ldap_state, +static BOOL init_group_from_ldap(struct ldapsam_privates *ldap_state, GROUP_MAP *map, LDAPMessage *entry) { pstring temp; @@ -1609,7 +2215,7 @@ static BOOL init_group_from_ldap(struct smb_ldap_privates *ldap_state, return False; } - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "gidNumber", + if (!get_single_attribute(ldap_state->ldap_struct, entry, "gidNumber", temp)) { DEBUG(0, ("Mandatory attribute gidNumber not found\n")); return False; @@ -1618,14 +2224,14 @@ static BOOL init_group_from_ldap(struct smb_ldap_privates *ldap_state, map->gid = (gid_t)atol(temp); - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "ntSid", + if (!get_single_attribute(ldap_state->ldap_struct, entry, "ntSid", temp)) { DEBUG(0, ("Mandatory attribute ntSid not found\n")); return False; } string_to_sid(&map->sid, temp); - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "ntGroupType", + if (!get_single_attribute(ldap_state->ldap_struct, entry, "ntGroupType", temp)) { DEBUG(0, ("Mandatory attribute ntGroupType not found\n")); return False; @@ -1638,11 +2244,11 @@ static BOOL init_group_from_ldap(struct smb_ldap_privates *ldap_state, return False; } - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "displayName", + if (!get_single_attribute(ldap_state->ldap_struct, entry, "displayName", temp)) { DEBUG(3, ("Attribute displayName not found\n")); temp[0] = '\0'; - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "cn", + if (!get_single_attribute(ldap_state->ldap_struct, entry, "cn", temp)) { DEBUG(0, ("Attributes cn not found either " "for gidNumber(%i)\n",map->gid)); @@ -1651,7 +2257,7 @@ static BOOL init_group_from_ldap(struct smb_ldap_privates *ldap_state, } fstrcpy(map->nt_name, temp); - if (!smb_ldap_get_single_attribute(ldap_state->ldap_struct, entry, "description", + if (!get_single_attribute(ldap_state->ldap_struct, entry, "description", temp)) { DEBUG(3, ("Attribute description not found\n")); temp[0] = '\0'; @@ -1693,8 +2299,8 @@ static NTSTATUS ldapsam_getgroup(struct pdb_methods *methods, const char *filter, GROUP_MAP *map) { - struct smb_ldap_privates *ldap_state = - (struct smb_ldap_privates *)methods->private_data; + struct ldapsam_privates *ldap_state = + (struct ldapsam_privates *)methods->private_data; LDAPMessage *result; LDAPMessage *entry; int count; @@ -1773,7 +2379,7 @@ static NTSTATUS ldapsam_getgrnam(struct pdb_methods *methods, GROUP_MAP *map, return ldapsam_getgroup(methods, filter, map); } -static int ldapsam_search_one_group_by_gid(struct smb_ldap_privates *ldap_state, +static int ldapsam_search_one_group_by_gid(struct ldapsam_privates *ldap_state, gid_t gid, LDAPMessage **result) { @@ -1788,8 +2394,8 @@ static int ldapsam_search_one_group_by_gid(struct smb_ldap_privates *ldap_state, static NTSTATUS ldapsam_add_group_mapping_entry(struct pdb_methods *methods, GROUP_MAP *map) { - struct smb_ldap_privates *ldap_state = - (struct smb_ldap_privates *)methods->private_data; + struct ldapsam_privates *ldap_state = + (struct ldapsam_privates *)methods->private_data; LDAPMessage *result = NULL; LDAPMod **mods = NULL; @@ -1839,18 +2445,18 @@ static NTSTATUS ldapsam_add_group_mapping_entry(struct pdb_methods *methods, return NT_STATUS_UNSUCCESSFUL; } - smb_ldap_make_a_mod(&mods, LDAP_MOD_ADD, "objectClass", + make_a_mod(&mods, LDAP_MOD_ADD, "objectClass", "sambaGroupMapping"); - rc = smb_ldap_modify(ldap_state, dn, mods); + rc = ldapsam_modify(ldap_state, dn, mods); ldap_mods_free(mods, 1); if (rc != LDAP_SUCCESS) { - char *ld_error = NULL; + char *ld_error; ldap_get_option(ldap_state->ldap_struct, LDAP_OPT_ERROR_STRING, &ld_error); DEBUG(0, ("failed to add group %i error: %s (%s)\n", map->gid, - ld_error ? ld_error : "(unknown)", ldap_err2string(rc))); + ld_error, ldap_err2string(rc))); SAFE_FREE(ld_error); return NT_STATUS_UNSUCCESSFUL; } @@ -1862,8 +2468,8 @@ static NTSTATUS ldapsam_add_group_mapping_entry(struct pdb_methods *methods, static NTSTATUS ldapsam_update_group_mapping_entry(struct pdb_methods *methods, GROUP_MAP *map) { - struct smb_ldap_privates *ldap_state = - (struct smb_ldap_privates *)methods->private_data; + struct ldapsam_privates *ldap_state = + (struct ldapsam_privates *)methods->private_data; int rc; char *dn; LDAPMessage *result; @@ -1899,16 +2505,16 @@ static NTSTATUS ldapsam_update_group_mapping_entry(struct pdb_methods *methods, return NT_STATUS_UNSUCCESSFUL; } - rc = smb_ldap_modify(ldap_state, dn, mods); + rc = ldapsam_modify(ldap_state, dn, mods); ldap_mods_free(mods, 1); if (rc != LDAP_SUCCESS) { - char *ld_error = NULL; + char *ld_error; ldap_get_option(ldap_state->ldap_struct, LDAP_OPT_ERROR_STRING, &ld_error); DEBUG(0, ("failed to modify group %i error: %s (%s)\n", map->gid, - ld_error ? ld_error : "(unknown)", ldap_err2string(rc))); + ld_error, ldap_err2string(rc))); SAFE_FREE(ld_error); } @@ -1919,8 +2525,8 @@ static NTSTATUS ldapsam_update_group_mapping_entry(struct pdb_methods *methods, static NTSTATUS ldapsam_delete_group_mapping_entry(struct pdb_methods *methods, DOM_SID sid) { - struct smb_ldap_privates *ldap_state = - (struct smb_ldap_privates *)methods->private_data; + struct ldapsam_privates *ldap_state = + (struct ldapsam_privates *)methods->private_data; pstring sidstring, filter; LDAPMessage *result; int rc; @@ -1948,12 +2554,12 @@ static NTSTATUS ldapsam_delete_group_mapping_entry(struct pdb_methods *methods, static NTSTATUS ldapsam_setsamgrent(struct pdb_methods *my_methods, BOOL update) { - struct smb_ldap_privates *ldap_state = - (struct smb_ldap_privates *)my_methods->private_data; + struct ldapsam_privates *ldap_state = + (struct ldapsam_privates *)my_methods->private_data; const char *filter = "(objectClass=sambaGroupMapping)"; int rc; - rc = smb_ldap_search(ldap_state, lp_ldap_suffix(), + rc = ldapsam_search(ldap_state, lp_ldap_suffix(), LDAP_SCOPE_SUBTREE, filter, group_attr, 0, &ldap_state->result); @@ -1985,9 +2591,13 @@ static NTSTATUS ldapsam_getsamgrent(struct pdb_methods *my_methods, GROUP_MAP *map) { NTSTATUS ret = NT_STATUS_UNSUCCESSFUL; - struct smb_ldap_privates *ldap_state = (struct smb_ldap_privates *)my_methods->private_data; + struct ldapsam_privates *ldap_state = (struct ldapsam_privates *)my_methods->private_data; BOOL bret = False; + /* The rebind proc needs this *HACK*. We are not multithreaded, so + this will work, but it's not nice. */ + static_ldap_state = ldap_state; + while (!bret) { if (!ldap_state->entry) return ret; @@ -2055,7 +2665,7 @@ static NTSTATUS ldapsam_enum_group_mapping(struct pdb_methods *methods, NTSTATUS pdb_init_ldapsam(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_method, const char *location) { NTSTATUS nt_status; - struct smb_ldap_privates *ldap_state; + struct ldapsam_privates *ldap_state; if (!NT_STATUS_IS_OK(nt_status = make_pdb_methods(pdb_context->mem_ctx, pdb_method))) { return nt_status; @@ -2082,7 +2692,7 @@ NTSTATUS pdb_init_ldapsam(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_method, co /* TODO: Setup private data and free */ - ldap_state = talloc_zero(pdb_context->mem_ctx, sizeof(struct smb_ldap_privates)); + ldap_state = talloc_zero(pdb_context->mem_ctx, sizeof(struct ldapsam_privates)); if (!ldap_state) { DEBUG(0, ("talloc() failed for ldapsam private_data!\n")); @@ -2120,7 +2730,7 @@ NTSTATUS pdb_init_ldapsam(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_method, co NTSTATUS pdb_init_ldapsam_nua(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_method, const char *location) { NTSTATUS nt_status; - struct smb_ldap_privates *ldap_state; + struct ldapsam_privates *ldap_state; uint32 low_nua_uid, high_nua_uid; if (!NT_STATUS_IS_OK(nt_status = pdb_init_ldapsam(pdb_context, pdb_method, location))) { @@ -2145,9 +2755,20 @@ NTSTATUS pdb_init_ldapsam_nua(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_method return NT_STATUS_OK; } -int pdb_ldap_init(void) + +#else + +NTSTATUS pdb_init_ldapsam(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_method, const char *location) +{ + DEBUG(0, ("ldap not detected at configure time, ldapsam not availalble!\n")); + return NT_STATUS_UNSUCCESSFUL; +} + +NTSTATUS pdb_init_ldapsam_nua(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_method, const char *location) { - smb_register_passdb("ldapsam", pdb_init_ldapsam, PASSDB_INTERFACE_VERSION); - smb_register_passdb("ldapsam_nua", pdb_init_ldapsam_nua, PASSDB_INTERFACE_VERSION); - return True; + DEBUG(0, ("ldap not dectected at configure time, ldapsam_nua not available!\n")); + return NT_STATUS_UNSUCCESSFUL; } + + +#endif diff --git a/source3/modules/mysql.c b/source3/passdb/pdb_mysql.c similarity index 93% rename from source3/modules/mysql.c rename to source3/passdb/pdb_mysql.c index 684eb96645e..d0f30c63946 100644 --- a/source3/modules/mysql.c +++ b/source3/passdb/pdb_mysql.c @@ -1,4 +1,3 @@ - /* * MySQL password backend for samba * Copyright (C) Jelmer Vernooij 2002 @@ -64,10 +63,12 @@ static int mysqlsam_debug_level = DBGC_ALL; #undef DBGC_CLASS #define DBGC_CLASS mysqlsam_debug_level +PDB_MODULE_VERSIONING_MAGIC + typedef struct pdb_mysql_data { MYSQL *handle; MYSQL_RES *pwent; - const char *location; + char *location; } pdb_mysql_data; /* Used to construct insert and update queries */ @@ -893,8 +894,61 @@ static NTSTATUS mysqlsam_update_sam_account(struct pdb_methods *methods, return mysqlsam_replace_sam_account(methods, newpwd, 1); } -static NTSTATUS mysqlsam_init(struct pdb_context * pdb_context, struct pdb_methods ** pdb_method, - const char *location) +static NTSTATUS mysqlsam_getgrsid(struct pdb_methods *methods, GROUP_MAP *map, + DOM_SID sid, BOOL with_priv) +{ + return get_group_map_from_sid(sid, map, with_priv) ? + NT_STATUS_OK : NT_STATUS_UNSUCCESSFUL; +} + +static NTSTATUS mysqlsam_getgrgid(struct pdb_methods *methods, GROUP_MAP *map, + gid_t gid, BOOL with_priv) +{ + return get_group_map_from_gid(gid, map, with_priv) ? + NT_STATUS_OK : NT_STATUS_UNSUCCESSFUL; +} + +static NTSTATUS mysqlsam_getgrnam(struct pdb_methods *methods, GROUP_MAP *map, + char *name, BOOL with_priv) +{ + return get_group_map_from_ntname(name, map, with_priv) ? + NT_STATUS_OK : NT_STATUS_UNSUCCESSFUL; +} + +static NTSTATUS mysqlsam_add_group_mapping_entry(struct pdb_methods *methods, + GROUP_MAP *map) +{ + return add_mapping_entry(map, TDB_INSERT) ? + NT_STATUS_OK : NT_STATUS_UNSUCCESSFUL; +} + +static NTSTATUS mysqlsam_update_group_mapping_entry(struct pdb_methods *methods, + GROUP_MAP *map) +{ + return add_mapping_entry(map, TDB_REPLACE) ? + NT_STATUS_OK : NT_STATUS_UNSUCCESSFUL; +} + +static NTSTATUS mysqlsam_delete_group_mapping_entry(struct pdb_methods *methods, + DOM_SID sid) +{ + return group_map_remove(sid) ? + NT_STATUS_OK : NT_STATUS_UNSUCCESSFUL; +} + +static NTSTATUS mysqlsam_enum_group_mapping(struct pdb_methods *methods, + enum SID_NAME_USE sid_name_use, + GROUP_MAP **rmap, int *num_entries, + BOOL unix_only, BOOL with_priv) +{ + return enum_group_mapping(sid_name_use, rmap, num_entries, unix_only, + with_priv) ? + NT_STATUS_OK : NT_STATUS_UNSUCCESSFUL; +} + + +NTSTATUS pdb_init(PDB_CONTEXT * pdb_context, PDB_METHODS ** pdb_method, + char *location) { NTSTATUS nt_status; struct pdb_mysql_data *data; @@ -926,6 +980,13 @@ static NTSTATUS mysqlsam_init(struct pdb_context * pdb_context, struct pdb_metho (*pdb_method)->add_sam_account = mysqlsam_add_sam_account; (*pdb_method)->update_sam_account = mysqlsam_update_sam_account; (*pdb_method)->delete_sam_account = mysqlsam_delete_sam_account; + (*pdb_method)->getgrsid = mysqlsam_getgrsid; + (*pdb_method)->getgrgid = mysqlsam_getgrgid; + (*pdb_method)->getgrnam = mysqlsam_getgrnam; + (*pdb_method)->add_group_mapping_entry = mysqlsam_add_group_mapping_entry; + (*pdb_method)->update_group_mapping_entry = mysqlsam_update_group_mapping_entry; + (*pdb_method)->delete_group_mapping_entry = mysqlsam_delete_group_mapping_entry; + (*pdb_method)->enum_group_mapping = mysqlsam_enum_group_mapping; data = talloc(pdb_context->mem_ctx, sizeof(struct pdb_mysql_data)); (*pdb_method)->private_data = data; @@ -933,7 +994,7 @@ static NTSTATUS mysqlsam_init(struct pdb_context * pdb_context, struct pdb_metho data->pwent = NULL; if (!location) { - DEBUG(0, ("No identifier specified. Check the Samba HOWTO Collection for details\n")); + DEBUG(0, ("No identifier specified. See README for details\n")); return NT_STATUS_INVALID_PARAMETER; } @@ -971,8 +1032,3 @@ static NTSTATUS mysqlsam_init(struct pdb_context * pdb_context, struct pdb_metho return NT_STATUS_OK; } - -int pdb_mysql_init(void) -{ - return smb_register_passdb("mysql", mysqlsam_init, PASSDB_INTERFACE_VERSION); -} diff --git a/source3/passdb/pdb_nisplus.c b/source3/passdb/pdb_nisplus.c index 73d65af1c6f..0a42c36ea02 100644 --- a/source3/passdb/pdb_nisplus.c +++ b/source3/passdb/pdb_nisplus.c @@ -24,6 +24,8 @@ #include "includes.h" +#ifdef WITH_NISPLUS_SAM + #ifdef BROKEN_NISPLUS_INCLUDE_FILES /* @@ -1553,7 +1555,11 @@ NTSTATUS pdb_init_nisplussam (PDB_CONTEXT * pdb_context, return NT_STATUS_OK; } -int pdb_nisplus_init(void) +#else +NTSTATUS pdb_init_nisplussam (PDB_CONTEXT * c, PDB_METHODS ** m, + const char *l) { - return smb_register_passdb("nisplussam", pdb_init_nisplussam, PASSDB_INTERFACE_VERSION); + DEBUG (0, ("nisplus sam not compiled in!\n")); + return NT_STATUS_UNSUCCESSFUL; } +#endif /* WITH_NISPLUS_SAM */ diff --git a/source3/sam/sam_plugin.c b/source3/passdb/pdb_plugin.c similarity index 57% rename from source3/sam/sam_plugin.c rename to source3/passdb/pdb_plugin.c index fd26c4b8d3c..ea67da23a55 100644 --- a/source3/sam/sam_plugin.c +++ b/source3/passdb/pdb_plugin.c @@ -1,9 +1,8 @@ /* Unix SMB/CIFS implementation. - Loadable san module interface. - Copyright (C) Jelmer Vernooij 2002 - Copyright (C) Andrew Bartlett 2002 - Copyright (C) Stefan (metze) Metzmacher 2002 + Loadable passdb module interface. + Copyright (C) Jelmer Vernooij 2002 + Copyright (C) Andrew Bartlett 2002 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -23,57 +22,57 @@ #include "includes.h" #undef DBGC_CLASS -#define DBGC_CLASS DBGC_SAM +#define DBGC_CLASS DBGC_PASSDB -NTSTATUS sam_init_plugin(SAM_METHODS *sam_methods, const char *module_params) +NTSTATUS pdb_init_plugin(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_method, const char *location) { - void *dl_handle; - char *plugin_params, *plugin_name, *p; - sam_init_function plugin_init; + void * dl_handle; + char *plugin_location, *plugin_name, *p; + pdb_init_function plugin_init; int (*plugin_version)(void); - if (module_params == NULL) { + if (location == NULL) { DEBUG(0, ("The plugin module needs an argument!\n")); return NT_STATUS_UNSUCCESSFUL; } - plugin_name = smb_xstrdup(module_params); + plugin_name = smb_xstrdup(location); p = strchr(plugin_name, ':'); if (p) { *p = 0; - plugin_params = p+1; - trim_string(plugin_params, " ", " "); - } else plugin_params = NULL; + plugin_location = p+1; + trim_string(plugin_location, " ", " "); + } else plugin_location = NULL; trim_string(plugin_name, " ", " "); DEBUG(5, ("Trying to load sam plugin %s\n", plugin_name)); - dl_handle = sys_dlopen(plugin_name, RTLD_NOW); + dl_handle = sys_dlopen(plugin_name, RTLD_NOW ); if (!dl_handle) { DEBUG(0, ("Failed to load sam plugin %s using sys_dlopen (%s)\n", plugin_name, sys_dlerror())); return NT_STATUS_UNSUCCESSFUL; } - plugin_version = sys_dlsym(dl_handle, "sam_version"); + plugin_version = sys_dlsym(dl_handle, "pdb_version"); if (!plugin_version) { sys_dlclose(dl_handle); - DEBUG(0, ("Failed to find function 'sam_version' using sys_dlsym in sam plugin %s (%s)\n", plugin_name, sys_dlerror())); + DEBUG(0, ("Failed to find function 'pdb_version' using sys_dlsym in sam plugin %s (%s)\n", plugin_name, sys_dlerror())); return NT_STATUS_UNSUCCESSFUL; } - if (plugin_version()!=SAM_INTERFACE_VERSION) { + if (plugin_version() != PASSDB_INTERFACE_VERSION) { sys_dlclose(dl_handle); - DEBUG(0, ("Wrong SAM_INTERFACE_VERSION! sam plugin has version %d and version %d is needed! Please update!\n", - plugin_version(),SAM_INTERFACE_VERSION)); + DEBUG(0, ("Wrong PASSDB_INTERFACE_VERSION! sam plugin has version %d and version %d is needed! Please update!\n", + plugin_version(),PASSDB_INTERFACE_VERSION)); return NT_STATUS_UNSUCCESSFUL; } - plugin_init = sys_dlsym(dl_handle, "sam_init"); + plugin_init = sys_dlsym(dl_handle, "pdb_init"); if (!plugin_init) { sys_dlclose(dl_handle); - DEBUG(0, ("Failed to find function 'sam_init' using sys_dlsym in sam plugin %s (%s)\n", plugin_name, sys_dlerror())); + DEBUG(0, ("Failed to find function 'pdb_init' using sys_dlsym in sam plugin %s (%s)\n", plugin_name, sys_dlerror())); return NT_STATUS_UNSUCCESSFUL; } - DEBUG(5, ("Starting sam plugin %s with parameters %s for domain %s\n", plugin_name, plugin_params, sam_methods->domain_name)); - return plugin_init(sam_methods, plugin_params); + DEBUG(5, ("Starting sam plugin %s with location %s\n", plugin_name, plugin_location)); + return plugin_init(pdb_context, pdb_method, plugin_location); } diff --git a/source3/passdb/pdb_smbpasswd.c b/source3/passdb/pdb_smbpasswd.c index 7f74196633f..b5a2bbbfe7c 100644 --- a/source3/passdb/pdb_smbpasswd.c +++ b/source3/passdb/pdb_smbpasswd.c @@ -1579,10 +1579,3 @@ NTSTATUS pdb_init_smbpasswd_nua(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_meth return NT_STATUS_OK; } - -int pdb_smbpasswd_init(void) -{ - smb_register_passdb("smbpasswd", pdb_init_smbpasswd, PASSDB_INTERFACE_VERSION); - smb_register_passdb("smbpasswd_nua", pdb_init_smbpasswd_nua, PASSDB_INTERFACE_VERSION); - return True; -} diff --git a/source3/passdb/pdb_tdb.c b/source3/passdb/pdb_tdb.c index 7e2f4b832f4..c48c9567b16 100644 --- a/source3/passdb/pdb_tdb.c +++ b/source3/passdb/pdb_tdb.c @@ -37,6 +37,8 @@ static int tdbsam_debug_level = DBGC_ALL; #endif +#ifdef WITH_TDB_SAM + #define PDB_VERSION "20010830" #define PASSDB_FILE_NAME "passdb.tdb" #define TDB_FORMAT_STRING "ddddddBBBBBBBBBBBBddBBwdwdBdd" @@ -986,10 +988,20 @@ NTSTATUS pdb_init_tdbsam_nua(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_method, return NT_STATUS_OK; } -int pdb_tdbsam_init(void) + +#else + +NTSTATUS pdb_init_tdbsam(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_method, const char *location) { - smb_register_passdb("tdbsam", pdb_init_tdbsam, PASSDB_INTERFACE_VERSION); - smb_register_passdb("tdbsam_nua", pdb_init_tdbsam_nua, PASSDB_INTERFACE_VERSION); - return True; + DEBUG(0, ("tdbsam not compiled in!\n")); + return NT_STATUS_UNSUCCESSFUL; } +NTSTATUS pdb_init_tdbsam_nua(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_method, const char *location) +{ + DEBUG(0, ("tdbsam_nua not compiled in!\n")); + return NT_STATUS_UNSUCCESSFUL; +} + + +#endif diff --git a/source3/passdb/pdb_unix.c b/source3/passdb/pdb_unix.c index dcdf5cf50b1..07acd08a4e5 100644 --- a/source3/passdb/pdb_unix.c +++ b/source3/passdb/pdb_unix.c @@ -123,8 +123,3 @@ NTSTATUS pdb_init_unixsam(PDB_CONTEXT *pdb_context, PDB_METHODS **pdb_method, co /* There's not very much to initialise here */ return NT_STATUS_OK; } - -int pdb_unix_init(void) -{ - return smb_register_passdb("unixsam", pdb_init_unixsam, PASSDB_INTERFACE_VERSION); -} diff --git a/source3/modules/xml.c b/source3/passdb/pdb_xml.c similarity index 97% rename from source3/modules/xml.c rename to source3/passdb/pdb_xml.c index 1a4aeeeac05..edf70250e22 100644 --- a/source3/modules/xml.c +++ b/source3/passdb/pdb_xml.c @@ -40,6 +40,8 @@ static int xmlsam_debug_level = DBGC_ALL; #undef DBGC_CLASS #define DBGC_CLASS xmlsam_debug_level +PDB_MODULE_VERSIONING_MAGIC + static char * iota(int a) { static char tmp[10]; @@ -47,7 +49,7 @@ static char * iota(int a) { return tmp; } -static BOOL parsePass(xmlDocPtr doc, xmlNsPtr ns, xmlNodePtr cur, SAM_ACCOUNT * u) +BOOL parsePass(xmlDocPtr doc, xmlNsPtr ns, xmlNodePtr cur, SAM_ACCOUNT * u) { pstring temp; @@ -76,7 +78,7 @@ static BOOL parsePass(xmlDocPtr doc, xmlNsPtr ns, xmlNodePtr cur, SAM_ACCOUNT * return True; } -static BOOL parseUser(xmlDocPtr doc, xmlNsPtr ns, xmlNodePtr cur, SAM_ACCOUNT * u) +BOOL parseUser(xmlDocPtr doc, xmlNsPtr ns, xmlNodePtr cur, SAM_ACCOUNT * u) { char *tmp; DOM_SID sid; @@ -245,7 +247,7 @@ typedef struct pdb_xml { xmlNsPtr ns; } pdb_xml; -static xmlNodePtr parseSambaXMLFile(struct pdb_xml *data) +xmlNodePtr parseSambaXMLFile(struct pdb_xml *data) { xmlNodePtr cur; @@ -512,7 +514,7 @@ static NTSTATUS xmlsam_add_sam_account(struct pdb_methods *methods, SAM_ACCOUNT return NT_STATUS_OK; } -NTSTATUS xmlsam_init(PDB_CONTEXT * pdb_context, PDB_METHODS ** pdb_method, +NTSTATUS pdb_init(PDB_CONTEXT * pdb_context, PDB_METHODS ** pdb_method, const char *location) { NTSTATUS nt_status; @@ -563,8 +565,3 @@ NTSTATUS xmlsam_init(PDB_CONTEXT * pdb_context, PDB_METHODS ** pdb_method, return NT_STATUS_OK; } - -int pdb_xml_init(void) -{ - return smb_register_passdb("xml", xmlsam_init, PASSDB_INTERFACE_VERSION); -} diff --git a/source3/passdb/secrets.c b/source3/passdb/secrets.c index 4c9802dd298..db08d027145 100644 --- a/source3/passdb/secrets.c +++ b/source3/passdb/secrets.c @@ -265,44 +265,38 @@ BOOL secrets_fetch_trust_account_password(const char *domain, uint8 ret_pwd[16], ************************************************************************/ BOOL secrets_fetch_trusted_domain_password(const char *domain, char** pwd, - DOM_SID *sid, time_t *pass_last_set_time) + DOM_SID *sid, time_t *pass_last_set_time) { - struct trusted_dom_pass pass; + struct trusted_dom_pass *pass; size_t size; - - /* unpacking structures */ - char* pass_buf; - int pass_len = 0; - - ZERO_STRUCT(pass); /* fetching trusted domain password structure */ - if (!(pass_buf = secrets_fetch(trustdom_keystr(domain), &size))) { + if (!(pass = secrets_fetch(trustdom_keystr(domain), &size))) { DEBUG(5, ("secrets_fetch failed!\n")); return False; } - /* unpack trusted domain password */ - pass_len = tdb_trusted_dom_pass_unpack(pass_buf, size, &pass); - if (pass_len != size) { - DEBUG(5, ("Invalid secrets size. Unpacked data doesn't match trusted_dom_pass structure.\n")); + if (size != sizeof(*pass)) { + DEBUG(0, ("secrets were of incorrect size!\n")); return False; } - + /* the trust's password */ if (pwd) { - *pwd = strdup(pass.pass); + *pwd = strdup(pass->pass); if (!*pwd) { return False; } } /* last change time */ - if (pass_last_set_time) *pass_last_set_time = pass.mod_time; + if (pass_last_set_time) *pass_last_set_time = pass->mod_time; /* domain sid */ - sid_copy(sid, &pass.domain_sid); - + memcpy(&sid, &(pass->domain_sid), sizeof(sid)); + + SAFE_FREE(pass); + return True; } @@ -321,7 +315,7 @@ BOOL secrets_store_trust_account_password(const char *domain, uint8 new_pwd[16]) } /** - * Routine to store the password for trusted domain + * Routine to set the password for trusted domain * * @param domain remote domain name * @param pwd plain text password of trust relationship @@ -331,17 +325,12 @@ BOOL secrets_store_trust_account_password(const char *domain, uint8 new_pwd[16]) **/ BOOL secrets_store_trusted_domain_password(const char* domain, smb_ucs2_t *uni_dom_name, - size_t uni_name_len, const char* pwd, - DOM_SID sid) -{ - /* packing structures */ - pstring pass_buf; - int pass_len = 0; - int pass_buf_len = sizeof(pass_buf); - + size_t uni_name_len, const char* pwd, + DOM_SID sid) +{ struct trusted_dom_pass pass; ZERO_STRUCT(pass); - + /* unicode domain name and its length */ if (!uni_dom_name) return False; @@ -357,11 +346,9 @@ BOOL secrets_store_trusted_domain_password(const char* domain, smb_ucs2_t *uni_d fstrcpy(pass.pass, pwd); /* domain sid */ - sid_copy(&pass.domain_sid, &sid); - - pass_len = tdb_trusted_dom_pass_pack(pass_buf, pass_buf_len, &pass); + memcpy(&(pass.domain_sid), &sid, sizeof(sid)); - return secrets_store(trustdom_keystr(domain), (void *)&pass_buf, pass_len); + return secrets_store(trustdom_keystr(domain), (void *)&pass, sizeof(pass)); } /************************************************************************ @@ -488,10 +475,9 @@ NTSTATUS secrets_get_trusted_domains(TALLOC_CTX* ctx, int* enum_ctx, unsigned in char *pattern; unsigned int start_idx; uint32 idx = 0; - size_t size, packed_size = 0; + size_t size; fstring dom_name; - char *packed_pass; - struct trusted_dom_pass *pass = talloc_zero(ctx, sizeof(struct trusted_dom_pass)); + struct trusted_dom_pass *pass; NTSTATUS status; if (!secrets_init()) return NT_STATUS_ACCESS_DENIED; @@ -519,7 +505,7 @@ NTSTATUS secrets_get_trusted_domains(TALLOC_CTX* ctx, int* enum_ctx, unsigned in */ status = NT_STATUS_NO_MORE_ENTRIES; - /* searching for keys in secrets db -- way to go ... */ + /* searching for keys in sectrets db -- way to go ... */ for (k = keys; k; k = k->next) { char *secrets_key; @@ -530,19 +516,14 @@ NTSTATUS secrets_get_trusted_domains(TALLOC_CTX* ctx, int* enum_ctx, unsigned in return NT_STATUS_NO_MEMORY; } - packed_pass = secrets_fetch(secrets_key, &size); - packed_size = tdb_trusted_dom_pass_unpack(packed_pass, size, pass); - - if (size != packed_size) { + pass = secrets_fetch(secrets_key, &size); + + if (size != sizeof(*pass)) { DEBUG(2, ("Secrets record %s is invalid!\n", secrets_key)); - if (size) SAFE_FREE(packed_pass); - - return NT_STATUS_UNSUCCESSFUL; + SAFE_FREE(pass); + continue; } - /* packed representation isn't needed anymore */ - SAFE_FREE(packed_pass); - pull_ucs2_fstring(dom_name, pass->uni_name); DEBUG(18, ("Fetched secret record num %d.\nDomain name: %s, SID: %s\n", idx, dom_name, sid_string_static(&pass->domain_sid))); @@ -553,6 +534,8 @@ NTSTATUS secrets_get_trusted_domains(TALLOC_CTX* ctx, int* enum_ctx, unsigned in dom = talloc_zero(ctx, sizeof(*dom)); if (!dom) { /* free returned tdb record */ + SAFE_FREE(pass); + return NT_STATUS_NO_MEMORY; } @@ -586,7 +569,10 @@ NTSTATUS secrets_get_trusted_domains(TALLOC_CTX* ctx, int* enum_ctx, unsigned in start_idx, max_num_domains)); } - idx++; + idx++; + + /* free returned tdb record */ + SAFE_FREE(pass); } DEBUG(5, ("secrets_get_trusted_domains: got %d domains\n", *num_domains)); @@ -609,9 +595,9 @@ BOOL secrets_named_mutex(const char *name, unsigned int timeout) if (!message_init()) return False; - ret = tdb_lock_bystring(tdb, name, timeout); - if (ret == 0) - DEBUG(10,("secrets_named_mutex: got mutex for %s\n", name )); + ret = tdb_lock_bystring(tdb, name, timeout); + if (ret == 0) + DEBUG(10,("secrets_named_mutex: got mutex for %s\n", name )); return (ret == 0); } @@ -622,8 +608,8 @@ BOOL secrets_named_mutex(const char *name, unsigned int timeout) void secrets_named_mutex_release(const char *name) { - tdb_unlock_bystring(tdb, name); - DEBUG(10,("secrets_named_mutex: released mutex for %s\n", name )); + tdb_unlock_bystring(tdb, name); + DEBUG(10,("secrets_named_mutex: released mutex for %s\n", name )); } /********************************************************* diff --git a/source3/printing/nt_printing.c b/source3/printing/nt_printing.c index a486fb9c003..3f5bf555349 100644 --- a/source3/printing/nt_printing.c +++ b/source3/printing/nt_printing.c @@ -2110,7 +2110,7 @@ done: NT_DEVICEMODE *construct_nt_devicemode(const fstring default_devicename) { - char adevice[MAXDEVICENAME]; + char adevice[MAXDEVICENAME+1]; NT_DEVICEMODE *nt_devmode = (NT_DEVICEMODE *)malloc(sizeof(NT_DEVICEMODE)); if (nt_devmode == NULL) { diff --git a/source3/printing/printing.c b/source3/printing/printing.c index 79cab3d9fae..e7886453066 100644 --- a/source3/printing/printing.c +++ b/source3/printing/printing.c @@ -855,7 +855,7 @@ static void store_queue_struct(struct tdb_print_db *pdb, struct traverse_struct /* Work out the size. */ data.dsize = 0; - data.dsize += tdb_pack(NULL, 0, "d", qcount); + data.dsize += tdb_pack(NULL, 0, NULL, "d", qcount); for (i = 0; i < pts->qcount; i++) { data.dsize += tdb_pack(NULL, 0, "ddddddff", diff --git a/source3/python/py_samr.c b/source3/python/py_samr.c index 57acd74bedb..182671d0478 100644 --- a/source3/python/py_samr.c +++ b/source3/python/py_samr.c @@ -31,272 +31,6 @@ PyObject *samr_ntstatus; /* This exception is raised when a RPC call returns a status code other than NT_STATUS_OK */ -/* SAMR group handle object */ - -static void py_samr_group_hnd_dealloc(PyObject* self) -{ - PyObject_Del(self); -} - -static PyMethodDef samr_group_methods[] = { - { NULL } -}; - -static PyObject *py_samr_group_hnd_getattr(PyObject *self, char *attrname) -{ - return Py_FindMethod(samr_group_methods, self, attrname); -} - -PyTypeObject samr_group_hnd_type = { - PyObject_HEAD_INIT(NULL) - 0, - "SAMR Group Handle", - sizeof(samr_group_hnd_object), - 0, - py_samr_group_hnd_dealloc, /*tp_dealloc*/ - 0, /*tp_print*/ - py_samr_group_hnd_getattr, /*tp_getattr*/ - 0, /*tp_setattr*/ - 0, /*tp_compare*/ - 0, /*tp_repr*/ - 0, /*tp_as_number*/ - 0, /*tp_as_sequence*/ - 0, /*tp_as_mapping*/ - 0, /*tp_hash */ -}; - -PyObject *new_samr_group_hnd_object(struct cli_state *cli, TALLOC_CTX *mem_ctx, - POLICY_HND *pol) -{ - samr_group_hnd_object *o; - - o = PyObject_New(samr_group_hnd_object, &samr_group_hnd_type); - - o->cli = cli; - o->mem_ctx = mem_ctx; - memcpy(&o->group_pol, pol, sizeof(POLICY_HND)); - - return (PyObject*)o; -} - -/* Alias handle object */ - -static void py_samr_alias_hnd_dealloc(PyObject* self) -{ - PyObject_Del(self); -} - -static PyMethodDef samr_alias_methods[] = { - { NULL } -}; - -static PyObject *py_samr_alias_hnd_getattr(PyObject *self, char *attrname) -{ - return Py_FindMethod(samr_alias_methods, self, attrname); -} - -PyTypeObject samr_alias_hnd_type = { - PyObject_HEAD_INIT(NULL) - 0, - "SAMR Alias Handle", - sizeof(samr_alias_hnd_object), - 0, - py_samr_alias_hnd_dealloc, /*tp_dealloc*/ - 0, /*tp_print*/ - py_samr_alias_hnd_getattr, /*tp_getattr*/ - 0, /*tp_setattr*/ - 0, /*tp_compare*/ - 0, /*tp_repr*/ - 0, /*tp_as_number*/ - 0, /*tp_as_sequence*/ - 0, /*tp_as_mapping*/ - 0, /*tp_hash */ -}; - -PyObject *new_samr_alias_hnd_object(struct cli_state *cli, TALLOC_CTX *mem_ctx, - POLICY_HND *pol) -{ - samr_alias_hnd_object *o; - - o = PyObject_New(samr_alias_hnd_object, &samr_alias_hnd_type); - - o->cli = cli; - o->mem_ctx = mem_ctx; - memcpy(&o->alias_pol, pol, sizeof(POLICY_HND)); - - return (PyObject*)o; -} - -/* SAMR user handle object */ - -static void py_samr_user_hnd_dealloc(PyObject* self) -{ - PyObject_Del(self); -} - -static PyObject *samr_set_user_info2(PyObject *self, PyObject *args, - PyObject *kw) -{ - samr_user_hnd_object *user_hnd = (samr_user_hnd_object *)self; - static char *kwlist[] = { "dict", NULL }; - PyObject *info, *result = NULL; - SAM_USERINFO_CTR ctr; - TALLOC_CTX *mem_ctx; - uchar sess_key[16]; - NTSTATUS ntstatus; - int level; - union { - SAM_USER_INFO_10 id10; - SAM_USER_INFO_21 id21; - } pinfo; - - if (!PyArg_ParseTupleAndKeywords( - args, kw, "O!", kwlist, &PyDict_Type, &info)) - return NULL; - - if (!get_level_value(info, &level)) { - PyErr_SetString(samr_error, "invalid info level"); - return NULL; - } - - ZERO_STRUCT(ctr); - - ctr.switch_value = level; - - switch(level) { - case 0x10: - ctr.info.id10 = &pinfo.id10; - - if (!py_to_SAM_USER_INFO_10(ctr.info.id10, info)) { - PyErr_SetString( - samr_error, "error converting user info"); - goto done; - } - - break; - case 21: - ctr.info.id21 = &pinfo.id21; - - if (!py_to_SAM_USER_INFO_21(ctr.info.id21, info)) { - PyErr_SetString( - samr_error, "error converting user info"); - goto done; - } - - break; - default: - PyErr_SetString(samr_error, "unsupported info level"); - goto done; - } - - /* Call RPC function */ - - if (!(mem_ctx = talloc_init("samr_set_user_info2"))) { - PyErr_SetString( - samr_error, "unable to init talloc context\n"); - goto done; - } - - ntstatus = cli_samr_set_userinfo2( - user_hnd->cli, mem_ctx, &user_hnd->user_pol, level, - sess_key, &ctr); - - talloc_destroy(mem_ctx); - - if (!NT_STATUS_IS_OK(ntstatus)) { - PyErr_SetObject(samr_ntstatus, py_ntstatus_tuple(ntstatus)); - goto done; - } - - Py_INCREF(Py_None); - result = Py_None; - -done: - return result; -} - -static PyObject *samr_delete_dom_user(PyObject *self, PyObject *args, - PyObject *kw) -{ - samr_user_hnd_object *user_hnd = (samr_user_hnd_object *)self; - static char *kwlist[] = { NULL }; - NTSTATUS ntstatus; - TALLOC_CTX *mem_ctx; - PyObject *result = NULL; - - if (!PyArg_ParseTupleAndKeywords( - args, kw, "", kwlist)) - return NULL; - - if (!(mem_ctx = talloc_init("samr_delete_dom_user"))) { - PyErr_SetString(samr_error, "unable to init talloc context"); - return NULL; - } - - ntstatus = cli_samr_delete_dom_user( - user_hnd->cli, mem_ctx, &user_hnd->user_pol); - - if (!NT_STATUS_IS_OK(ntstatus)) { - PyErr_SetObject(samr_ntstatus, py_ntstatus_tuple(ntstatus)); - goto done; - } - - Py_INCREF(Py_None); - result = Py_None; - -done: - talloc_destroy(mem_ctx); - - return result; -} - -static PyMethodDef samr_user_methods[] = { - { "delete_domain_user", (PyCFunction)samr_delete_dom_user, - METH_VARARGS | METH_KEYWORDS, - "Delete domain user." }, - { "set_user_info2", (PyCFunction)samr_set_user_info2, - METH_VARARGS | METH_KEYWORDS, - "Set user info 2" }, - { NULL } -}; - -static PyObject *py_samr_user_hnd_getattr(PyObject *self, char *attrname) -{ - return Py_FindMethod(samr_user_methods, self, attrname); -} - -PyTypeObject samr_user_hnd_type = { - PyObject_HEAD_INIT(NULL) - 0, - "SAMR User Handle", - sizeof(samr_user_hnd_object), - 0, - py_samr_user_hnd_dealloc, /*tp_dealloc*/ - 0, /*tp_print*/ - py_samr_user_hnd_getattr, /*tp_getattr*/ - 0, /*tp_setattr*/ - 0, /*tp_compare*/ - 0, /*tp_repr*/ - 0, /*tp_as_number*/ - 0, /*tp_as_sequence*/ - 0, /*tp_as_mapping*/ - 0, /*tp_hash */ -}; - -PyObject *new_samr_user_hnd_object(struct cli_state *cli, TALLOC_CTX *mem_ctx, - POLICY_HND *pol) -{ - samr_user_hnd_object *o; - - o = PyObject_New(samr_user_hnd_object, &samr_user_hnd_type); - - o->cli = cli; - o->mem_ctx = mem_ctx; - memcpy(&o->user_pol, pol, sizeof(POLICY_HND)); - - return (PyObject*)o; -} - /* SAMR connect handle object */ static void py_samr_connect_hnd_dealloc(PyObject* self) @@ -429,7 +163,8 @@ static PyObject *samr_enum_dom_groups(PyObject *self, PyObject *args, NTSTATUS result; PyObject *py_result = NULL; - if (!PyArg_ParseTupleAndKeywords(args, kw, "", kwlist)) + if (!PyArg_ParseTupleAndKeywords( + args, kw, "", kwlist)) return NULL; if (!(mem_ctx = talloc_init("samr_enum_dom_groups"))) { @@ -456,52 +191,9 @@ static PyObject *samr_enum_dom_groups(PyObject *self, PyObject *args, return py_result; } -static PyObject *samr_create_dom_user(PyObject *self, PyObject *args, - PyObject *kw) -{ - samr_domain_hnd_object *domain_hnd = (samr_domain_hnd_object *)self; - static char *kwlist[] = { "account_name", "acb_info", NULL }; - char *account_name; - NTSTATUS ntstatus; - uint32 unknown = 0xe005000b; /* Access mask? */ - uint32 user_rid; - PyObject *result = NULL; - TALLOC_CTX *mem_ctx; - uint16 acb_info = ACB_NORMAL; - POLICY_HND user_pol; - - if (!PyArg_ParseTupleAndKeywords( - args, kw, "s|i", kwlist, &account_name, &acb_info)) - return NULL; - - if (!(mem_ctx = talloc_init("samr_create_dom_user"))) { - PyErr_SetString(samr_error, "unable to init talloc context"); - return NULL; - } - - ntstatus = cli_samr_create_dom_user( - domain_hnd->cli, mem_ctx, &domain_hnd->domain_pol, - account_name, acb_info, unknown, &user_pol, &user_rid); - - if (!NT_STATUS_IS_OK(ntstatus)) { - PyErr_SetObject(samr_ntstatus, py_ntstatus_tuple(ntstatus)); - talloc_destroy(mem_ctx); - goto done; - } - - result = new_samr_user_hnd_object( - domain_hnd->cli, mem_ctx, &user_pol); - -done: - - return result; -} - static PyMethodDef samr_domain_methods[] = { { "enum_domain_groups", (PyCFunction)samr_enum_dom_groups, METH_VARARGS | METH_KEYWORDS, "Enumerate domain groups" }, - { "create_domain_user", (PyCFunction)samr_create_dom_user, - METH_VARARGS | METH_KEYWORDS, "Create domain user" }, { NULL } }; @@ -528,6 +220,150 @@ PyTypeObject samr_domain_hnd_type = { 0, /*tp_hash */ }; +/* SAMR user handle object */ + +static void py_samr_user_hnd_dealloc(PyObject* self) +{ + PyObject_Del(self); +} + +static PyMethodDef samr_user_methods[] = { + { NULL } +}; + +static PyObject *py_samr_user_hnd_getattr(PyObject *self, char *attrname) +{ + return Py_FindMethod(samr_user_methods, self, attrname); +} + +PyTypeObject samr_user_hnd_type = { + PyObject_HEAD_INIT(NULL) + 0, + "SAMR User Handle", + sizeof(samr_user_hnd_object), + 0, + py_samr_user_hnd_dealloc, /*tp_dealloc*/ + 0, /*tp_print*/ + py_samr_user_hnd_getattr, /*tp_getattr*/ + 0, /*tp_setattr*/ + 0, /*tp_compare*/ + 0, /*tp_repr*/ + 0, /*tp_as_number*/ + 0, /*tp_as_sequence*/ + 0, /*tp_as_mapping*/ + 0, /*tp_hash */ +}; + +PyObject *new_samr_user_hnd_object(struct cli_state *cli, TALLOC_CTX *mem_ctx, + POLICY_HND *pol) +{ + samr_user_hnd_object *o; + + o = PyObject_New(samr_user_hnd_object, &samr_user_hnd_type); + + o->cli = cli; + o->mem_ctx = mem_ctx; + memcpy(&o->user_pol, pol, sizeof(POLICY_HND)); + + return (PyObject*)o; +} + +/* SAMR group handle object */ + +static void py_samr_group_hnd_dealloc(PyObject* self) +{ + PyObject_Del(self); +} + +static PyMethodDef samr_group_methods[] = { + { NULL } +}; + +static PyObject *py_samr_group_hnd_getattr(PyObject *self, char *attrname) +{ + return Py_FindMethod(samr_group_methods, self, attrname); +} + +PyTypeObject samr_group_hnd_type = { + PyObject_HEAD_INIT(NULL) + 0, + "SAMR Group Handle", + sizeof(samr_group_hnd_object), + 0, + py_samr_group_hnd_dealloc, /*tp_dealloc*/ + 0, /*tp_print*/ + py_samr_group_hnd_getattr, /*tp_getattr*/ + 0, /*tp_setattr*/ + 0, /*tp_compare*/ + 0, /*tp_repr*/ + 0, /*tp_as_number*/ + 0, /*tp_as_sequence*/ + 0, /*tp_as_mapping*/ + 0, /*tp_hash */ +}; + +PyObject *new_samr_group_hnd_object(struct cli_state *cli, TALLOC_CTX *mem_ctx, + POLICY_HND *pol) +{ + samr_group_hnd_object *o; + + o = PyObject_New(samr_group_hnd_object, &samr_group_hnd_type); + + o->cli = cli; + o->mem_ctx = mem_ctx; + memcpy(&o->group_pol, pol, sizeof(POLICY_HND)); + + return (PyObject*)o; +} + +/* Alias handle object */ + +static void py_samr_alias_hnd_dealloc(PyObject* self) +{ + PyObject_Del(self); +} + +static PyMethodDef samr_alias_methods[] = { + { NULL } +}; + +static PyObject *py_samr_alias_hnd_getattr(PyObject *self, char *attrname) +{ + return Py_FindMethod(samr_alias_methods, self, attrname); +} + +PyTypeObject samr_alias_hnd_type = { + PyObject_HEAD_INIT(NULL) + 0, + "SAMR Alias Handle", + sizeof(samr_alias_hnd_object), + 0, + py_samr_alias_hnd_dealloc, /*tp_dealloc*/ + 0, /*tp_print*/ + py_samr_alias_hnd_getattr, /*tp_getattr*/ + 0, /*tp_setattr*/ + 0, /*tp_compare*/ + 0, /*tp_repr*/ + 0, /*tp_as_number*/ + 0, /*tp_as_sequence*/ + 0, /*tp_as_mapping*/ + 0, /*tp_hash */ +}; + +PyObject *new_samr_alias_hnd_object(struct cli_state *cli, TALLOC_CTX *mem_ctx, + POLICY_HND *pol) +{ + samr_alias_hnd_object *o; + + o = PyObject_New(samr_alias_hnd_object, &samr_alias_hnd_type); + + o->cli = cli; + o->mem_ctx = mem_ctx; + memcpy(&o->alias_pol, pol, sizeof(POLICY_HND)); + + return (PyObject*)o; +} + static PyObject *samr_connect(PyObject *self, PyObject *args, PyObject *kw) { static char *kwlist[] = { "server", "creds", "access", NULL }; @@ -610,21 +446,6 @@ static struct const_vals { char *name; uint32 value; } module_const_vals[] = { - - /* Account control bits */ - - { "ACB_DISABLED", 0x0001 }, - { "ACB_HOMDIRREQ", 0x0002 }, - { "ACB_PWNOTREQ", 0x0004 }, - { "ACB_TEMPDUP", 0x0008 }, - { "ACB_NORMAL", 0x0010 }, - { "ACB_MNS", 0x0020 }, - { "ACB_DOMTRUST", 0x0040 }, - { "ACB_WSTRUST", 0x0080 }, - { "ACB_SVRTRUST", 0x0100 }, - { "ACB_PWNOEXP", 0x0200 }, - { "ACB_AUTOLOCK", 0x0400 }, - { NULL } }; diff --git a/source3/python/py_samr.h b/source3/python/py_samr.h index 4d2b0675b47..3292eb97ec6 100644 --- a/source3/python/py_samr.h +++ b/source3/python/py_samr.h @@ -78,9 +78,4 @@ extern PyObject *samr_error; /* The following definitions are from py_samr_conv.c */ BOOL py_from_acct_info(PyObject **array, struct acct_info *info, int num_accts); -BOOL py_from_SAM_USER_INFO_10(PyObject **dict, SAM_USER_INFO_10 *info); -BOOL py_to_SAM_USER_INFO_10(SAM_USER_INFO_10 *info, PyObject *dict); -BOOL py_from_SAM_USER_INFO_21(PyObject **dict, SAM_USER_INFO_21 *info); -BOOL py_to_SAM_USER_INFO_21(SAM_USER_INFO_21 *info, PyObject *dict); - #endif /* _PY_SAMR_H */ diff --git a/source3/python/py_samr_conv.c b/source3/python/py_samr_conv.c index 7523ee7dfcb..fdf71641e07 100644 --- a/source3/python/py_samr_conv.c +++ b/source3/python/py_samr_conv.c @@ -21,79 +21,6 @@ #include "python/py_samr.h" #include "python/py_conv.h" -/* - * Convert between SAM_USER_INFO_10 and Python - */ - -struct pyconv py_SAM_USER_INFO_10[] = { - { "acb_info", PY_UINT32, offsetof(SAM_USER_INFO_10, acb_info) }, - { NULL } -}; - -BOOL py_from_SAM_USER_INFO_10(PyObject **dict, SAM_USER_INFO_10 *info) -{ - *dict = from_struct(info, py_SAM_USER_INFO_10); - PyDict_SetItemString(*dict, "level", PyInt_FromLong(0x10)); - return True; -} - -BOOL py_to_SAM_USER_INFO_10(SAM_USER_INFO_10 *info, PyObject *dict) -{ - PyObject *obj, *dict_copy = PyDict_Copy(dict); - BOOL result = False; - - if (!(obj = PyDict_GetItemString(dict_copy, "level")) || - !PyInt_Check(obj)) - goto done; - - PyDict_DelItemString(dict_copy, "level"); - - if (!to_struct(info, dict_copy, py_SAM_USER_INFO_10)) - goto done; - - result = True; - -done: - Py_DECREF(dict_copy); - return result; -} - -/* - * Convert between SAM_USER_INFO_21 and Python - */ - -struct pyconv py_SAM_USER_INFO_21[] = { - { NULL } -}; - -BOOL py_from_SAM_USER_INFO_21(PyObject **dict, SAM_USER_INFO_21 *info) -{ - *dict = from_struct(info, py_SAM_USER_INFO_21); - PyDict_SetItemString(*dict, "level", PyInt_FromLong(21)); - return True; -} - -BOOL py_to_SAM_USER_INFO_21(SAM_USER_INFO_21 *info, PyObject *dict) -{ - PyObject *obj, *dict_copy = PyDict_Copy(dict); - BOOL result = False; - - if (!(obj = PyDict_GetItemString(dict_copy, "level")) || - !PyInt_Check(obj)) - goto done; - - PyDict_DelItemString(dict_copy, "level"); - - if (!to_struct(info, dict_copy, py_SAM_USER_INFO_21)) - goto done; - - result = True; - -done: - Py_DECREF(dict_copy); - return result; -} - /* * Convert between acct_info and Python */ diff --git a/source3/python/setup.py b/source3/python/setup.py index 65693310318..8bc8868a70c 100755 --- a/source3/python/setup.py +++ b/source3/python/setup.py @@ -116,7 +116,6 @@ setup( Extension(name = "samr", sources = [samba_srcdir + "python/py_samr.c", - samba_srcdir + "python/py_conv.c", samba_srcdir + "python/py_samr_conv.c", samba_srcdir + "python/py_common.c"], libraries = lib_list, diff --git a/source3/rpc_client/cli_lsarpc.c b/source3/rpc_client/cli_lsarpc.c index 9002ad3d1b5..db873236e46 100644 --- a/source3/rpc_client/cli_lsarpc.c +++ b/source3/rpc_client/cli_lsarpc.c @@ -1164,7 +1164,7 @@ NTSTATUS cli_lsa_enum_account_rights(struct cli_state *cli, TALLOC_CTX *mem_ctx, LSA_Q_ENUM_ACCT_RIGHTS q; LSA_R_ENUM_ACCT_RIGHTS r; NTSTATUS result; - unsigned int i; + int i; ZERO_STRUCT(q); ZERO_STRUCT(r); @@ -1199,7 +1199,7 @@ NTSTATUS cli_lsa_enum_account_rights(struct cli_state *cli, TALLOC_CTX *mem_ctx, *privs_name = (char **)talloc(mem_ctx, (*count) * sizeof(char **)); for (i=0;i<*count;i++) { - (*privs_name)[i] = unistr2_tdup(mem_ctx, &r.rights.strings[i].string); + pull_ucs2_talloc(mem_ctx, &(*privs_name)[i], r.rights.strings[i].string.buffer); } done: @@ -1293,58 +1293,6 @@ done: } -/* list account SIDs that have the specified right */ - -NTSTATUS cli_lsa_enum_account_with_right(struct cli_state *cli, TALLOC_CTX *mem_ctx, - POLICY_HND *pol, const char *right, - uint32 *count, DOM_SID **sids) -{ - prs_struct qbuf, rbuf; - LSA_Q_ENUM_ACCT_WITH_RIGHT q; - LSA_R_ENUM_ACCT_WITH_RIGHT r; - NTSTATUS result; - - ZERO_STRUCT(q); - - /* Initialise parse structures */ - prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL); - prs_init(&rbuf, 0, mem_ctx, UNMARSHALL); - - /* Marshall data and send request */ - init_q_enum_acct_with_right(&q, pol, right); - - if (!lsa_io_q_enum_acct_with_right("", &q, &qbuf, 0) || - !rpc_api_pipe_req(cli, LSA_ENUMACCTWITHRIGHT, &qbuf, &rbuf)) { - result = NT_STATUS_UNSUCCESSFUL; - goto done; - } - - /* Unmarshall response */ - - if (!lsa_io_r_enum_acct_with_right("", &r, &rbuf, 0)) { - result = NT_STATUS_UNSUCCESSFUL; - goto done; - } - - *count = r.count; - - if (!NT_STATUS_IS_OK(result = r.status)) { - goto done; - } - - if (*count) { - int i; - (*sids) = (DOM_SID *)talloc(mem_ctx, sizeof(DOM_SID) * (*count)); - for (i=0; i<*count; i++) { - sid_copy(&(*sids)[i], &r.sids.sids[i].sid.sid); - } - } -done: - - return result; -} - - #if 0 /** An example of how to use the routines in this file. Fetch a DOMAIN diff --git a/source3/rpc_client/cli_samr.c b/source3/rpc_client/cli_samr.c index 9d0b48796c0..c451ee2e420 100644 --- a/source3/rpc_client/cli_samr.c +++ b/source3/rpc_client/cli_samr.c @@ -1464,49 +1464,3 @@ NTSTATUS cli_samr_get_dom_pwinfo(struct cli_state *cli, TALLOC_CTX *mem_ctx, return result; } - -/* Lookup Domain Name */ - -NTSTATUS cli_samr_lookup_domain(struct cli_state *cli, TALLOC_CTX *mem_ctx, - POLICY_HND *user_pol, char *domain_name, - DOM_SID *sid) -{ - prs_struct qbuf, rbuf; - SAMR_Q_LOOKUP_DOMAIN q; - SAMR_R_LOOKUP_DOMAIN r; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - - ZERO_STRUCT(q); - ZERO_STRUCT(r); - - /* Initialise parse structures */ - - prs_init(&qbuf, MAX_PDU_FRAG_LEN, mem_ctx, MARSHALL); - prs_init(&rbuf, 0, mem_ctx, UNMARSHALL); - - /* Marshall data and send request */ - - init_samr_q_lookup_domain(&q, user_pol, domain_name); - - if (!samr_io_q_lookup_domain("", &q, &qbuf, 0) || - !rpc_api_pipe_req(cli, SAMR_LOOKUP_DOMAIN, &qbuf, &rbuf)) - goto done; - - /* Unmarshall response */ - - if (!samr_io_r_lookup_domain("", &r, &rbuf, 0)) - goto done; - - /* Return output parameters */ - - result = r.status; - - if (NT_STATUS_IS_OK(result)) - sid_copy(sid, &r.dom_sid.sid); - - done: - prs_mem_free(&qbuf); - prs_mem_free(&rbuf); - - return result; -} diff --git a/source3/rpc_parse/parse_lsa.c b/source3/rpc_parse/parse_lsa.c index fc9999dc4dc..0b45c0baf37 100644 --- a/source3/rpc_parse/parse_lsa.c +++ b/source3/rpc_parse/parse_lsa.c @@ -2219,21 +2219,18 @@ BOOL lsa_io_r_query_info2(const char *desc, LSA_R_QUERY_INFO2 *r_c, if(!prs_uint32("ptr", ps, depth, &r_c->ptr)) return False; - - if (r_c->ptr != 0) { - if(!prs_uint16("info_class", ps, depth, &r_c->info_class)) + if(!prs_uint16("info_class", ps, depth, &r_c->info_class)) + return False; + switch(r_c->info_class) { + case 0x000c: + if (!lsa_io_dns_dom_info("info12", &r_c->info.dns_dom_info, + ps, depth)) return False; - switch(r_c->info_class) { - case 0x000c: - if (!lsa_io_dns_dom_info("info12", &r_c->info.dns_dom_info, - ps, depth)) - return False; break; - default: - DEBUG(0,("lsa_io_r_query_info2: unknown info class %d\n", - r_c->info_class)); - return False; - } + default: + DEBUG(0,("lsa_io_r_query_info2: unknown info class %d\n", + r_c->info_class)); + return False; } if(!prs_align(ps)) @@ -2304,19 +2301,6 @@ BOOL lsa_io_r_enum_acct_rights(const char *desc, LSA_R_ENUM_ACCT_RIGHTS *r_c, pr return True; } -/******************************************************************* - Inits an LSA_R_ENUM_ACCT_RIGHTS structure. -********************************************************************/ -void init_r_enum_acct_rights(LSA_R_ENUM_ACCT_RIGHTS *q_r, - uint32 count, - const char **rights) -{ - DEBUG(5, ("init_r_enum_acct_rights\n")); - - q_r->count = count; - init_unistr2_array(&q_r->rights, count, rights); -} - /******************************************************************* Inits an LSA_Q_ADD_ACCT_RIGHTS structure. @@ -2332,6 +2316,7 @@ void init_q_add_acct_rights(LSA_Q_ADD_ACCT_RIGHTS *q_q, q_q->pol = *hnd; init_dom_sid2(&q_q->sid, sid); init_unistr2_array(&q_q->rights, count, rights); + q_q->count = 5; } @@ -2372,15 +2357,6 @@ BOOL lsa_io_r_add_acct_rights(const char *desc, LSA_R_ADD_ACCT_RIGHTS *r_c, prs_ return True; } -/******************************************************************* - Inits an LSA_R_ADD_ACCT_RIGHTS structure. -********************************************************************/ -void init_r_add_acct_rights(LSA_R_ADD_ACCT_RIGHTS *q_r) -{ - DEBUG(5, ("init_r_add_acct_rights\n")); - /* oh what a silly function! */ -} - /******************************************************************* Inits an LSA_Q_REMOVE_ACCT_RIGHTS structure. @@ -2398,6 +2374,7 @@ void init_q_remove_acct_rights(LSA_Q_REMOVE_ACCT_RIGHTS *q_q, init_dom_sid2(&q_q->sid, sid); q_q->removeall = removeall; init_unistr2_array(&q_q->rights, count, rights); + q_q->count = 5; } @@ -2428,7 +2405,7 @@ BOOL lsa_io_q_remove_acct_rights(const char *desc, LSA_Q_REMOVE_ACCT_RIGHTS *q_q } /******************************************************************* -reads or writes a LSA_R_REMOVE_ACCT_RIGHTS structure. +reads or writes a LSA_R_ENUM_ACCT_RIGHTS structure. ********************************************************************/ BOOL lsa_io_r_remove_acct_rights(const char *desc, LSA_R_REMOVE_ACCT_RIGHTS *r_c, prs_struct *ps, int depth) { @@ -2440,89 +2417,3 @@ BOOL lsa_io_r_remove_acct_rights(const char *desc, LSA_R_REMOVE_ACCT_RIGHTS *r_c return True; } - -/******************************************************************* - Inits an LSA_R_REMOVE_ACCT_RIGHTS structure. -********************************************************************/ -void init_r_remove_acct_rights(LSA_R_REMOVE_ACCT_RIGHTS *q_r) -{ - DEBUG(5, ("init_r_remove_acct_rights\n")); -} - -/******************************************************************* - Inits an LSA_Q_ENUM_ACCT_WITH_RIGHT structure. -********************************************************************/ -void init_q_enum_acct_with_right(LSA_Q_ENUM_ACCT_WITH_RIGHT *q_q, - POLICY_HND *hnd, - const char *right) -{ - DEBUG(5, ("init_q_enum_acct_with_right\n")); - - q_q->pol = *hnd; - init_unistr2(&q_q->right, right, strlen(right)); - init_str_hdr(&q_q->right_hdr, - q_q->right.uni_max_len*2, - q_q->right.uni_max_len*2, right?1:0); -} - - -/******************************************************************* -reads or writes a LSA_Q_ENUM_ACCT_WITH_RIGHT structure. -********************************************************************/ -BOOL lsa_io_q_enum_acct_with_right(const char *desc, LSA_Q_ENUM_ACCT_WITH_RIGHT *q_q, prs_struct *ps, int depth) -{ - prs_debug(ps, depth, desc, "lsa_io_q_enum_acct_with_right"); - depth++; - - if (!smb_io_pol_hnd("", &q_q->pol, ps, depth)) - return False; - - if (!prs_uint32("ref_id ", ps, depth, &q_q->right_hdr.buffer)) - return False; - - if (UNMARSHALLING(ps) && q_q->right_hdr.buffer == 0) { - return True; - } - - if (!smb_io_strhdr("", &q_q->right_hdr, ps, depth)) - return False; - - if (!smb_io_unistr2("", &q_q->right, q_q->right_hdr.buffer, ps, depth)) - return False; - - return True; -} - - -/******************************************************************* -reads or writes a LSA_R_ENUM_ACCT_WITH_RIGHT structure. -********************************************************************/ -BOOL lsa_io_r_enum_acct_with_right(const char *desc, LSA_R_ENUM_ACCT_WITH_RIGHT *r_c, prs_struct *ps, int depth) -{ - prs_debug(ps, depth, desc, "lsa_io_r_enum_acct_with_right"); - depth++; - - if (!prs_uint32("count ", ps, depth, &r_c->count)) - return False; - - if (!smb_io_sid_array("sids ", &r_c->sids, ps, depth)) - return False; - - if(!prs_ntstatus("status", ps, depth, &r_c->status)) - return False; - - return True; -} - -/******************************************************************* - Inits an LSA_R_ENUM_ACCT_WITH_RIGHT structure. -********************************************************************/ -void init_r_enum_acct_with_right(LSA_R_ENUM_ACCT_WITH_RIGHT *r_c, - uint32 count, - DOM_SID *sids) -{ - DEBUG(5, ("init_r_enum_acct_with_right\n")); - - r_c->count = count; - init_sid_array(&r_c->sids, count, sids); -} diff --git a/source3/rpc_parse/parse_misc.c b/source3/rpc_parse/parse_misc.c index a39e3391bbe..f0d4c67d9f4 100644 --- a/source3/rpc_parse/parse_misc.c +++ b/source3/rpc_parse/parse_misc.c @@ -1122,78 +1122,6 @@ BOOL smb_io_unistr2_array(const char *desc, UNISTR2_ARRAY *array, prs_struct *ps } -/* - initialise a SID_ARRAY from a list of sids -*/ -BOOL init_sid_array(SID_ARRAY *array, - uint32 count, DOM_SID *sids) -{ - unsigned int i; - - array->count = count; - array->ref_id = count?1:0; - if (array->count == 0) { - return True; - } - - array->sids = (SID_ARRAY_EL *)talloc_zero(get_talloc_ctx(), count * sizeof(SID_ARRAY_EL)); - if (!array->sids) { - return False; - } - - for (i=0;isids[i].ref_id = 1; - init_dom_sid2(&array->sids[i].sid, &sids[i]); - } - - return True; -} - - -/******************************************************************* - Reads or writes a SID_ARRAY structure. -********************************************************************/ -BOOL smb_io_sid_array(const char *desc, SID_ARRAY *array, prs_struct *ps, int depth) -{ - unsigned int i; - - prs_debug(ps, depth, desc, "smb_io_sid_array"); - depth++; - - if(!prs_uint32("ref_id", ps, depth, &array->ref_id)) - return False; - - if (! array->ref_id) { - return True; - } - - if(!prs_uint32("count", ps, depth, &array->count)) - return False; - - if (array->count == 0) { - return True; - } - - if (UNMARSHALLING(ps)) { - array->sids = talloc_zero(get_talloc_ctx(), array->count * sizeof(array->sids[0])); - } - if (! array->sids) { - return False; - } - - for (i=0;icount;i++) { - if(!prs_uint32("ref_id", ps, depth, &array->sids[i].ref_id)) - return False; - } - - for (i=0;icount;i++) { - if (!smb_io_dom_sid2("sid", &array->sids[i].sid, ps, depth)) - return False; - } - - return True; -} - /******************************************************************* Inits a DOM_RID2 structure. ********************************************************************/ @@ -1289,22 +1217,22 @@ void init_dom_rid4(DOM_RID4 *rid4, uint16 unknown, uint16 attr, uint32 rid) Inits a DOM_CLNT_SRV structure. ********************************************************************/ -static void init_clnt_srv(DOM_CLNT_SRV *dlog, const char *logon_srv, const char *comp_name) +static void init_clnt_srv(DOM_CLNT_SRV *log, const char *logon_srv, const char *comp_name) { DEBUG(5,("init_clnt_srv: %d\n", __LINE__)); if (logon_srv != NULL) { - dlog->undoc_buffer = 1; - init_unistr2(&dlog->uni_logon_srv, logon_srv, strlen(logon_srv)+1); + log->undoc_buffer = 1; + init_unistr2(&log->uni_logon_srv, logon_srv, strlen(logon_srv)+1); } else { - dlog->undoc_buffer = 0; + log->undoc_buffer = 0; } if (comp_name != NULL) { - dlog->undoc_buffer2 = 1; - init_unistr2(&dlog->uni_comp_name, comp_name, strlen(comp_name)+1); + log->undoc_buffer2 = 1; + init_unistr2(&log->uni_comp_name, comp_name, strlen(comp_name)+1); } else { - dlog->undoc_buffer2 = 0; + log->undoc_buffer2 = 0; } } @@ -1312,9 +1240,9 @@ static void init_clnt_srv(DOM_CLNT_SRV *dlog, const char *logon_srv, const char Inits or writes a DOM_CLNT_SRV structure. ********************************************************************/ -static BOOL smb_io_clnt_srv(const char *desc, DOM_CLNT_SRV *dlog, prs_struct *ps, int depth) +static BOOL smb_io_clnt_srv(const char *desc, DOM_CLNT_SRV *log, prs_struct *ps, int depth) { - if (dlog == NULL) + if (log == NULL) return False; prs_debug(ps, depth, desc, "smb_io_clnt_srv"); @@ -1323,22 +1251,22 @@ static BOOL smb_io_clnt_srv(const char *desc, DOM_CLNT_SRV *dlog, prs_struct *ps if(!prs_align(ps)) return False; - if(!prs_uint32("undoc_buffer ", ps, depth, &dlog->undoc_buffer)) + if(!prs_uint32("undoc_buffer ", ps, depth, &log->undoc_buffer)) return False; - if (dlog->undoc_buffer != 0) { - if(!smb_io_unistr2("unistr2", &dlog->uni_logon_srv, dlog->undoc_buffer, ps, depth)) + if (log->undoc_buffer != 0) { + if(!smb_io_unistr2("unistr2", &log->uni_logon_srv, log->undoc_buffer, ps, depth)) return False; } if(!prs_align(ps)) return False; - if(!prs_uint32("undoc_buffer2", ps, depth, &dlog->undoc_buffer2)) + if(!prs_uint32("undoc_buffer2", ps, depth, &log->undoc_buffer2)) return False; - if (dlog->undoc_buffer2 != 0) { - if(!smb_io_unistr2("unistr2", &dlog->uni_comp_name, dlog->undoc_buffer2, ps, depth)) + if (log->undoc_buffer2 != 0) { + if(!smb_io_unistr2("unistr2", &log->uni_comp_name, log->undoc_buffer2, ps, depth)) return False; } @@ -1349,28 +1277,28 @@ static BOOL smb_io_clnt_srv(const char *desc, DOM_CLNT_SRV *dlog, prs_struct *ps Inits a DOM_LOG_INFO structure. ********************************************************************/ -void init_log_info(DOM_LOG_INFO *dlog, const char *logon_srv, const char *acct_name, +void init_log_info(DOM_LOG_INFO *log, const char *logon_srv, const char *acct_name, uint16 sec_chan, const char *comp_name) { DEBUG(5,("make_log_info %d\n", __LINE__)); - dlog->undoc_buffer = 1; + log->undoc_buffer = 1; - init_unistr2(&dlog->uni_logon_srv, logon_srv, strlen(logon_srv)+1); - init_unistr2(&dlog->uni_acct_name, acct_name, strlen(acct_name)+1); + init_unistr2(&log->uni_logon_srv, logon_srv, strlen(logon_srv)+1); + init_unistr2(&log->uni_acct_name, acct_name, strlen(acct_name)+1); - dlog->sec_chan = sec_chan; + log->sec_chan = sec_chan; - init_unistr2(&dlog->uni_comp_name, comp_name, strlen(comp_name)+1); + init_unistr2(&log->uni_comp_name, comp_name, strlen(comp_name)+1); } /******************************************************************* Reads or writes a DOM_LOG_INFO structure. ********************************************************************/ -BOOL smb_io_log_info(const char *desc, DOM_LOG_INFO *dlog, prs_struct *ps, int depth) +BOOL smb_io_log_info(const char *desc, DOM_LOG_INFO *log, prs_struct *ps, int depth) { - if (dlog == NULL) + if (log == NULL) return False; prs_debug(ps, depth, desc, "smb_io_log_info"); @@ -1379,18 +1307,18 @@ BOOL smb_io_log_info(const char *desc, DOM_LOG_INFO *dlog, prs_struct *ps, int d if(!prs_align(ps)) return False; - if(!prs_uint32("undoc_buffer", ps, depth, &dlog->undoc_buffer)) + if(!prs_uint32("undoc_buffer", ps, depth, &log->undoc_buffer)) return False; - if(!smb_io_unistr2("unistr2", &dlog->uni_logon_srv, True, ps, depth)) + if(!smb_io_unistr2("unistr2", &log->uni_logon_srv, True, ps, depth)) return False; - if(!smb_io_unistr2("unistr2", &dlog->uni_acct_name, True, ps, depth)) + if(!smb_io_unistr2("unistr2", &log->uni_acct_name, True, ps, depth)) return False; - if(!prs_uint16("sec_chan", ps, depth, &dlog->sec_chan)) + if(!prs_uint16("sec_chan", ps, depth, &log->sec_chan)) return False; - if(!smb_io_unistr2("unistr2", &dlog->uni_comp_name, True, ps, depth)) + if(!smb_io_unistr2("unistr2", &log->uni_comp_name, True, ps, depth)) return False; return True; @@ -1529,21 +1457,21 @@ BOOL smb_io_clnt_info(const char *desc, DOM_CLNT_INFO *clnt, prs_struct *ps, in Inits a DOM_LOGON_ID structure. ********************************************************************/ -void init_logon_id(DOM_LOGON_ID *dlog, uint32 log_id_low, uint32 log_id_high) +void init_logon_id(DOM_LOGON_ID *log, uint32 log_id_low, uint32 log_id_high) { DEBUG(5,("make_logon_id: %d\n", __LINE__)); - dlog->low = log_id_low; - dlog->high = log_id_high; + log->low = log_id_low; + log->high = log_id_high; } /******************************************************************* Reads or writes a DOM_LOGON_ID structure. ********************************************************************/ -BOOL smb_io_logon_id(const char *desc, DOM_LOGON_ID *dlog, prs_struct *ps, int depth) +BOOL smb_io_logon_id(const char *desc, DOM_LOGON_ID *log, prs_struct *ps, int depth) { - if (dlog == NULL) + if (log == NULL) return False; prs_debug(ps, depth, desc, "smb_io_logon_id"); @@ -1552,9 +1480,9 @@ BOOL smb_io_logon_id(const char *desc, DOM_LOGON_ID *dlog, prs_struct *ps, int d if(!prs_align(ps)) return False; - if(!prs_uint32("low ", ps, depth, &dlog->low )) + if(!prs_uint32("low ", ps, depth, &log->low )) return False; - if(!prs_uint32("high", ps, depth, &dlog->high)) + if(!prs_uint32("high", ps, depth, &log->high)) return False; return True; diff --git a/source3/rpc_parse/parse_net.c b/source3/rpc_parse/parse_net.c index a660084250e..163e6bab3ca 100644 --- a/source3/rpc_parse/parse_net.c +++ b/source3/rpc_parse/parse_net.c @@ -1808,9 +1808,9 @@ static BOOL net_io_sam_domain_info(const char *desc, SAM_DOMAIN_INFO * info, if (!smb_io_unihdr("hdr_unknown", &info->hdr_unknown, ps, depth)) return False; - if (prs_offset(ps) + 40 > prs_data_size(ps)) + if (ps->data_offset + 40 > ps->buffer_size) return False; - prs_set_offset(ps, prs_offset(ps) + 40); + ps->data_offset += 40; if (!smb_io_unistr2("uni_dom_name", &info->uni_dom_name, info->hdr_dom_name.buffer, ps, depth)) @@ -1847,9 +1847,9 @@ static BOOL net_io_sam_group_info(const char *desc, SAM_GROUP_INFO * info, if (!smb_io_bufhdr2("hdr_sec_desc", &info->hdr_sec_desc, ps, depth)) return False; - if (prs_offset(ps) + 48 > prs_data_size(ps)) + if (ps->data_offset + 48 > ps->buffer_size) return False; - prs_set_offset(ps, prs_offset(ps) + 48); + ps->data_offset += 48; if (!smb_io_unistr2("uni_grp_name", &info->uni_grp_name, info->hdr_grp_name.buffer, ps, depth)) @@ -2128,13 +2128,13 @@ static BOOL net_io_sam_account_info(const char *desc, uint8 sess_key[16], uint32 len = 0x44; if (!prs_uint32("pwd_len", ps, depth, &len)) return False; - old_offset = prs_offset(ps); + old_offset = ps->data_offset; if (len == 0x44) { if (ps->io) { /* reading */ - if (!prs_hash1(ps, prs_offset(ps), sess_key)) + if (!prs_hash1(ps, ps->data_offset, sess_key)) return False; } if (!net_io_sam_passwd_info("pass", &info->pass, @@ -2148,9 +2148,9 @@ static BOOL net_io_sam_account_info(const char *desc, uint8 sess_key[16], return False; } } - if (old_offset + len > prs_data_size(ps)) + if (old_offset + len > ps->buffer_size) return False; - prs_set_offset(ps, old_offset + len); + ps->data_offset = old_offset + len; } if (!smb_io_buffer4("buf_sec_desc", &info->buf_sec_desc, info->hdr_sec_desc.buffer, ps, depth)) @@ -2185,9 +2185,9 @@ static BOOL net_io_sam_group_mem_info(const char *desc, SAM_GROUP_MEM_INFO * inf if (!prs_uint32("num_members", ps, depth, &info->num_members)) return False; - if (prs_offset(ps) + 16 > prs_data_size(ps)) + if (ps->data_offset + 16 > ps->buffer_size) return False; - prs_set_offset(ps, prs_offset(ps) + 16); + ps->data_offset += 16; if (info->ptr_rids != 0) { @@ -2267,9 +2267,9 @@ static BOOL net_io_sam_alias_info(const char *desc, SAM_ALIAS_INFO * info, if (!smb_io_unihdr("hdr_als_desc", &info->hdr_als_desc, ps, depth)) return False; - if (prs_offset(ps) + 40 > prs_data_size(ps)) + if (ps->data_offset + 40 > ps->buffer_size) return False; - prs_set_offset(ps, prs_offset(ps) + 40); + ps->data_offset += 40; if (!smb_io_unistr2("uni_als_name", &info->uni_als_name, info->hdr_als_name.buffer, ps, depth)) @@ -2304,9 +2304,9 @@ static BOOL net_io_sam_alias_mem_info(const char *desc, SAM_ALIAS_MEM_INFO * inf if (info->ptr_members != 0) { - if (prs_offset(ps) + 16 > prs_data_size(ps)) + if (ps->data_offset + 16 > ps->buffer_size) return False; - prs_set_offset(ps, prs_offset(ps) + 16); + ps->data_offset += 16; if (!prs_uint32("num_sids", ps, depth, &info->num_sids)) return False; diff --git a/source3/rpc_parse/parse_sec.c b/source3/rpc_parse/parse_sec.c index 081173cf8de..47300e083ab 100644 --- a/source3/rpc_parse/parse_sec.c +++ b/source3/rpc_parse/parse_sec.c @@ -569,6 +569,24 @@ SEC_DESC_BUF *sec_desc_merge(TALLOC_CTX *ctx, SEC_DESC_BUF *new_sdb, SEC_DESC_BU return(return_sdb); } +/******************************************************************* + Tallocs a duplicate SID. +********************************************************************/ + +static DOM_SID *sid_dup_talloc(TALLOC_CTX *ctx, DOM_SID *src) +{ + DOM_SID *dst; + + if(!src) + return NULL; + + if((dst = talloc_zero(ctx, sizeof(DOM_SID))) != NULL) { + sid_copy( dst, src); + } + + return dst; +} + /******************************************************************* Creates a SEC_DESC structure ********************************************************************/ diff --git a/source3/rpc_server/srv_dfs.c b/source3/rpc_server/srv_dfs.c index 0807efd550c..f6e9ca3d567 100644 --- a/source3/rpc_server/srv_dfs.c +++ b/source3/rpc_server/srv_dfs.c @@ -158,7 +158,11 @@ static BOOL api_dfs_enum(pipes_struct *p) \pipe\netdfs commands ********************************************************************/ +#ifdef RPC_DFS_DYNAMIC +int rpc_pipe_init(void) +#else int rpc_dfs_init(void) +#endif { struct api_struct api_netdfs_cmds[] = { diff --git a/source3/rpc_server/srv_lsa.c b/source3/rpc_server/srv_lsa.c index bfa706acf24..11388a00b10 100644 --- a/source3/rpc_server/srv_lsa.c +++ b/source3/rpc_server/srv_lsa.c @@ -642,164 +642,38 @@ static BOOL api_lsa_query_info2(pipes_struct *p) } - -/*************************************************************************** - api_lsa_enum_acctrights - ***************************************************************************/ -static BOOL api_lsa_enum_acct_rights(pipes_struct *p) -{ - LSA_Q_ENUM_ACCT_RIGHTS q_u; - LSA_R_ENUM_ACCT_RIGHTS r_u; - - prs_struct *data = &p->in_data.data; - prs_struct *rdata = &p->out_data.rdata; - - ZERO_STRUCT(q_u); - ZERO_STRUCT(r_u); - - if(!lsa_io_q_enum_acct_rights("", &q_u, data, 0)) { - DEBUG(0,("api_lsa_enum_acct_rights: failed to unmarshall LSA_Q_ENUM_ACCT_RIGHTS.\n")); - return False; - } - - r_u.status = _lsa_enum_acct_rights(p, &q_u, &r_u); - - /* store the response in the SMB stream */ - if(!lsa_io_r_enum_acct_rights("", &r_u, rdata, 0)) { - DEBUG(0,("api_lsa_enum_acct_rights: Failed to marshall LSA_R_ENUM_ACCT_RIGHTS.\n")); - return False; - } - - return True; -} - - -/*************************************************************************** - api_lsa_enum_acct_with_right - ***************************************************************************/ -static BOOL api_lsa_enum_acct_with_right(pipes_struct *p) -{ - LSA_Q_ENUM_ACCT_WITH_RIGHT q_u; - LSA_R_ENUM_ACCT_WITH_RIGHT r_u; - - prs_struct *data = &p->in_data.data; - prs_struct *rdata = &p->out_data.rdata; - - ZERO_STRUCT(q_u); - ZERO_STRUCT(r_u); - - if(!lsa_io_q_enum_acct_with_right("", &q_u, data, 0)) { - DEBUG(0,("api_lsa_enum_acct_with_right: failed to unmarshall LSA_Q_ENUM_ACCT_WITH_RIGHT.\n")); - return False; - } - - r_u.status = _lsa_enum_acct_with_right(p, &q_u, &r_u); - - /* store the response in the SMB stream */ - if(!lsa_io_r_enum_acct_with_right("", &r_u, rdata, 0)) { - DEBUG(0,("api_lsa_enum_acct_with_right: Failed to marshall LSA_R_ENUM_ACCT_WITH_RIGHT.\n")); - return False; - } - - return True; -} - - -/*************************************************************************** - api_lsa_add_acctrights - ***************************************************************************/ -static BOOL api_lsa_add_acct_rights(pipes_struct *p) -{ - LSA_Q_ADD_ACCT_RIGHTS q_u; - LSA_R_ADD_ACCT_RIGHTS r_u; - - prs_struct *data = &p->in_data.data; - prs_struct *rdata = &p->out_data.rdata; - - ZERO_STRUCT(q_u); - ZERO_STRUCT(r_u); - - if(!lsa_io_q_add_acct_rights("", &q_u, data, 0)) { - DEBUG(0,("api_lsa_add_acct_rights: failed to unmarshall LSA_Q_ADD_ACCT_RIGHTS.\n")); - return False; - } - - r_u.status = _lsa_add_acct_rights(p, &q_u, &r_u); - - /* store the response in the SMB stream */ - if(!lsa_io_r_add_acct_rights("", &r_u, rdata, 0)) { - DEBUG(0,("api_lsa_add_acct_rights: Failed to marshall LSA_R_ADD_ACCT_RIGHTS.\n")); - return False; - } - - return True; -} - - -/*************************************************************************** - api_lsa_remove_acctrights - ***************************************************************************/ -static BOOL api_lsa_remove_acct_rights(pipes_struct *p) -{ - LSA_Q_REMOVE_ACCT_RIGHTS q_u; - LSA_R_REMOVE_ACCT_RIGHTS r_u; - - prs_struct *data = &p->in_data.data; - prs_struct *rdata = &p->out_data.rdata; - - ZERO_STRUCT(q_u); - ZERO_STRUCT(r_u); - - if(!lsa_io_q_remove_acct_rights("", &q_u, data, 0)) { - DEBUG(0,("api_lsa_remove_acct_rights: failed to unmarshall LSA_Q_REMOVE_ACCT_RIGHTS.\n")); - return False; - } - - r_u.status = _lsa_remove_acct_rights(p, &q_u, &r_u); - - /* store the response in the SMB stream */ - if(!lsa_io_r_remove_acct_rights("", &r_u, rdata, 0)) { - DEBUG(0,("api_lsa_remove_acct_rights: Failed to marshall LSA_R_REMOVE_ACCT_RIGHTS.\n")); - return False; - } - - return True; -} - - /*************************************************************************** \PIPE\ntlsa commands ***************************************************************************/ - +#ifdef RPC_LSA_DYNAMIC +int rpc_pipe_init(void) +#else int rpc_lsa_init(void) +#endif +{ +static const struct api_struct api_lsa_cmds[] = { - static const struct api_struct api_lsa_cmds[] = - { - { "LSA_OPENPOLICY2" , LSA_OPENPOLICY2 , api_lsa_open_policy2 }, - { "LSA_OPENPOLICY" , LSA_OPENPOLICY , api_lsa_open_policy }, - { "LSA_QUERYINFOPOLICY" , LSA_QUERYINFOPOLICY , api_lsa_query_info }, - { "LSA_ENUMTRUSTDOM" , LSA_ENUMTRUSTDOM , api_lsa_enum_trust_dom }, - { "LSA_CLOSE" , LSA_CLOSE , api_lsa_close }, - { "LSA_OPENSECRET" , LSA_OPENSECRET , api_lsa_open_secret }, - { "LSA_LOOKUPSIDS" , LSA_LOOKUPSIDS , api_lsa_lookup_sids }, - { "LSA_LOOKUPNAMES" , LSA_LOOKUPNAMES , api_lsa_lookup_names }, - { "LSA_ENUM_PRIVS" , LSA_ENUM_PRIVS , api_lsa_enum_privs }, - { "LSA_PRIV_GET_DISPNAME",LSA_PRIV_GET_DISPNAME,api_lsa_priv_get_dispname}, - { "LSA_ENUM_ACCOUNTS" , LSA_ENUM_ACCOUNTS , api_lsa_enum_accounts }, - { "LSA_UNK_GET_CONNUSER", LSA_UNK_GET_CONNUSER, api_lsa_unk_get_connuser }, - { "LSA_OPENACCOUNT" , LSA_OPENACCOUNT , api_lsa_open_account }, - { "LSA_ENUMPRIVSACCOUNT", LSA_ENUMPRIVSACCOUNT, api_lsa_enum_privsaccount}, - { "LSA_GETSYSTEMACCOUNT", LSA_GETSYSTEMACCOUNT, api_lsa_getsystemaccount }, - { "LSA_SETSYSTEMACCOUNT", LSA_SETSYSTEMACCOUNT, api_lsa_setsystemaccount }, - { "LSA_ADDPRIVS" , LSA_ADDPRIVS , api_lsa_addprivs }, - { "LSA_REMOVEPRIVS" , LSA_REMOVEPRIVS , api_lsa_removeprivs }, - { "LSA_QUERYSECOBJ" , LSA_QUERYSECOBJ , api_lsa_query_secobj }, - { "LSA_QUERYINFO2" , LSA_QUERYINFO2 , api_lsa_query_info2 }, - { "LSA_ENUMACCTRIGHTS" , LSA_ENUMACCTRIGHTS , api_lsa_enum_acct_rights }, - { "LSA_ENUMACCTWITHRIGHT", LSA_ENUMACCTWITHRIGHT, api_lsa_enum_acct_with_right }, - { "LSA_ADDACCTRIGHTS" , LSA_ADDACCTRIGHTS , api_lsa_add_acct_rights }, - { "LSA_REMOVEACCTRIGHTS", LSA_REMOVEACCTRIGHTS, api_lsa_remove_acct_rights}, - }; + { "LSA_OPENPOLICY2" , LSA_OPENPOLICY2 , api_lsa_open_policy2 }, + { "LSA_OPENPOLICY" , LSA_OPENPOLICY , api_lsa_open_policy }, + { "LSA_QUERYINFOPOLICY" , LSA_QUERYINFOPOLICY , api_lsa_query_info }, + { "LSA_ENUMTRUSTDOM" , LSA_ENUMTRUSTDOM , api_lsa_enum_trust_dom }, + { "LSA_CLOSE" , LSA_CLOSE , api_lsa_close }, + { "LSA_OPENSECRET" , LSA_OPENSECRET , api_lsa_open_secret }, + { "LSA_LOOKUPSIDS" , LSA_LOOKUPSIDS , api_lsa_lookup_sids }, + { "LSA_LOOKUPNAMES" , LSA_LOOKUPNAMES , api_lsa_lookup_names }, + { "LSA_ENUM_PRIVS" , LSA_ENUM_PRIVS , api_lsa_enum_privs }, + { "LSA_PRIV_GET_DISPNAME",LSA_PRIV_GET_DISPNAME,api_lsa_priv_get_dispname}, + { "LSA_ENUM_ACCOUNTS" , LSA_ENUM_ACCOUNTS , api_lsa_enum_accounts }, + { "LSA_UNK_GET_CONNUSER", LSA_UNK_GET_CONNUSER, api_lsa_unk_get_connuser }, + { "LSA_OPENACCOUNT" , LSA_OPENACCOUNT , api_lsa_open_account }, + { "LSA_ENUMPRIVSACCOUNT", LSA_ENUMPRIVSACCOUNT, api_lsa_enum_privsaccount}, + { "LSA_GETSYSTEMACCOUNT", LSA_GETSYSTEMACCOUNT, api_lsa_getsystemaccount }, + { "LSA_SETSYSTEMACCOUNT", LSA_SETSYSTEMACCOUNT, api_lsa_setsystemaccount }, + { "LSA_ADDPRIVS" , LSA_ADDPRIVS , api_lsa_addprivs }, + { "LSA_REMOVEPRIVS" , LSA_REMOVEPRIVS , api_lsa_removeprivs }, + { "LSA_QUERYSECOBJ" , LSA_QUERYSECOBJ , api_lsa_query_secobj }, + { "LSA_QUERYINFO2" , LSA_QUERYINFO2 , api_lsa_query_info2 } +}; return rpc_pipe_register_commands("lsarpc", "lsass", api_lsa_cmds, sizeof(api_lsa_cmds) / sizeof(struct api_struct)); diff --git a/source3/rpc_server/srv_lsa_nt.c b/source3/rpc_server/srv_lsa_nt.c index fb6538db39f..10c583b70d6 100644 --- a/source3/rpc_server/srv_lsa_nt.c +++ b/source3/rpc_server/srv_lsa_nt.c @@ -645,7 +645,7 @@ NTSTATUS _lsa_lookup_sids(pipes_struct *p, LSA_Q_LOOKUP_SIDS *q_u, LSA_R_LOOKUP_ num_entries = MAX_LOOKUP_SIDS; DEBUG(5,("_lsa_lookup_sids: truncating SID lookup list to %d\n", num_entries)); } - + ref = (DOM_R_REF *)talloc_zero(p->mem_ctx, sizeof(DOM_R_REF)); names = (LSA_TRANS_NAME_ENUM *)talloc_zero(p->mem_ctx, sizeof(LSA_TRANS_NAME_ENUM)); @@ -1265,140 +1265,3 @@ NTSTATUS _lsa_query_info2(pipes_struct *p, LSA_Q_QUERY_INFO2 *q_u, LSA_R_QUERY_I return r_u->status; } - - -/*************************************************************************** - For a given SID, enumerate all the privilege this account has. - ***************************************************************************/ -NTSTATUS _lsa_enum_acct_rights(pipes_struct *p, LSA_Q_ENUM_ACCT_RIGHTS *q_u, LSA_R_ENUM_ACCT_RIGHTS *r_u) -{ - struct lsa_info *info=NULL; - char **rights = NULL; - int num_rights = 0; - int i; - - r_u->status = NT_STATUS_OK; - - /* find the connection policy handle. */ - if (!find_policy_by_hnd(p, &q_u->pol, (void **)&info)) - return NT_STATUS_INVALID_HANDLE; - - r_u->status = privilege_enum_account_rights(&q_u->sid.sid, &num_rights, &rights); - - init_r_enum_acct_rights(r_u, num_rights, (const char **)rights); - - for (i=0;istatus; -} - -/*************************************************************************** -return a list of SIDs for a particular privilege - ***************************************************************************/ -NTSTATUS _lsa_enum_acct_with_right(pipes_struct *p, - LSA_Q_ENUM_ACCT_WITH_RIGHT *q_u, - LSA_R_ENUM_ACCT_WITH_RIGHT *r_u) -{ - struct lsa_info *info=NULL; - char *right; - DOM_SID *sids = NULL; - uint32 count = 0; - - r_u->status = NT_STATUS_OK; - - /* find the connection policy handle. */ - if (!find_policy_by_hnd(p, &q_u->pol, (void **)&info)) - return NT_STATUS_INVALID_HANDLE; - - right = unistr2_tdup(p->mem_ctx, &q_u->right); - - DEBUG(5,("lsa_enum_acct_with_right on right %s\n", right)); - - r_u->status = privilege_enum_account_with_right(right, &count, &sids); - - init_r_enum_acct_with_right(r_u, count, sids); - - safe_free(sids); - - return r_u->status; -} - -/*************************************************************************** - add privileges to a acct by SID - ***************************************************************************/ -NTSTATUS _lsa_add_acct_rights(pipes_struct *p, LSA_Q_ADD_ACCT_RIGHTS *q_u, LSA_R_ADD_ACCT_RIGHTS *r_u) -{ - struct lsa_info *info=NULL; - int i; - - r_u->status = NT_STATUS_OK; - - /* find the connection policy handle. */ - if (!find_policy_by_hnd(p, &q_u->pol, (void **)&info)) - return NT_STATUS_INVALID_HANDLE; - - DEBUG(5,("_lsa_add_acct_rights to %s (%d rights)\n", - sid_string_static(&q_u->sid.sid), q_u->rights.count)); - - for (i=0;irights.count;i++) { - DEBUG(5,("\t%s\n", unistr2_static(&q_u->rights.strings[i].string))); - } - - - for (i=0;irights.count;i++) { - r_u->status = privilege_add_account_right(unistr2_static(&q_u->rights.strings[i].string), - &q_u->sid.sid); - if (!NT_STATUS_IS_OK(r_u->status)) { - DEBUG(2,("Failed to add right '%s'\n", - unistr2_static(&q_u->rights.strings[i].string))); - break; - } - } - - init_r_add_acct_rights(r_u); - - return r_u->status; -} - - -/*************************************************************************** - remove privileges from a acct by SID - ***************************************************************************/ -NTSTATUS _lsa_remove_acct_rights(pipes_struct *p, LSA_Q_REMOVE_ACCT_RIGHTS *q_u, LSA_R_REMOVE_ACCT_RIGHTS *r_u) -{ - struct lsa_info *info=NULL; - int i; - - r_u->status = NT_STATUS_OK; - - /* find the connection policy handle. */ - if (!find_policy_by_hnd(p, &q_u->pol, (void **)&info)) - return NT_STATUS_INVALID_HANDLE; - - - DEBUG(5,("_lsa_remove_acct_rights from %s all=%d (%d rights)\n", - sid_string_static(&q_u->sid.sid), - q_u->removeall, - q_u->rights.count)); - - for (i=0;irights.count;i++) { - DEBUG(5,("\t%s\n", unistr2_static(&q_u->rights.strings[i].string))); - } - - for (i=0;irights.count;i++) { - r_u->status = privilege_remove_account_right(unistr2_static(&q_u->rights.strings[i].string), - &q_u->sid.sid); - if (!NT_STATUS_IS_OK(r_u->status)) { - DEBUG(2,("Failed to remove right '%s'\n", - unistr2_static(&q_u->rights.strings[i].string))); - break; - } - } - - init_r_remove_acct_rights(r_u); - - return r_u->status; -} diff --git a/source3/rpc_server/srv_netlog.c b/source3/rpc_server/srv_netlog.c index 7dc0f57f34f..f377d3952bf 100644 --- a/source3/rpc_server/srv_netlog.c +++ b/source3/rpc_server/srv_netlog.c @@ -321,7 +321,11 @@ static BOOL api_net_logon_ctrl(pipes_struct *p) array of \PIPE\NETLOGON operations ********************************************************************/ +#ifdef RPC_NETLOG_DYNAMIC +int rpc_pipe_init(void) +#else int rpc_net_init(void) +#endif { static struct api_struct api_net_cmds [] = { diff --git a/source3/rpc_server/srv_pipe.c b/source3/rpc_server/srv_pipe.c index 5d8b7d39e91..588d6644b1d 100644 --- a/source3/rpc_server/srv_pipe.c +++ b/source3/rpc_server/srv_pipe.c @@ -454,6 +454,41 @@ failed authentication on named pipe %s.\n", domain, user_name, wks, p->name )); The switch table for the pipe names and the functions to handle them. *******************************************************************/ +struct api_cmd +{ + const char *name; + int (*init)(void); +}; + +static struct api_cmd api_fd_commands[] = +{ +#ifndef RPC_LSA_DYNAMIC + { "lsarpc", rpc_lsa_init }, +#endif +#ifndef RPC_SAMR_DYNAMIC + { "samr", rpc_samr_init }, +#endif +#ifndef RPC_SVC_DYNAMIC + { "srvsvc", rpc_srv_init }, +#endif +#ifndef RPC_WKS_DYNAMIC + { "wkssvc", rpc_wks_init }, +#endif +#ifndef RPC_NETLOG_DYNAMIC + { "NETLOGON", rpc_net_init }, +#endif +#ifndef RPC_REG_DYNAMIC + { "winreg", rpc_reg_init }, +#endif +#ifndef RPC_SPOOLSS_DYNAMIC + { "spoolss", rpc_spoolss_init }, +#endif +#ifndef RPC_DFS_DYNAMIC + { "netdfs", rpc_dfs_init }, +#endif + { NULL, NULL } +}; + struct rpc_table { struct @@ -756,6 +791,47 @@ int rpc_pipe_register_commands(const char *clnt, const char *srv, const struct a return size; } +/******************************************************************* + Register commands to an RPC pipe +*******************************************************************/ +int rpc_load_module(const char *module) +{ +#ifdef HAVE_DLOPEN + void *handle; + int (*module_init)(void); + pstring full_path; + const char *error; + + pstrcpy(full_path, lib_path("rpc")); + pstrcat(full_path, "/librpc_"); + pstrcat(full_path, module); + pstrcat(full_path, "."); + pstrcat(full_path, shlib_ext()); + + handle = sys_dlopen(full_path, RTLD_LAZY); + if (!handle) { + DEBUG(0, ("Could not load requested pipe %s as %s\n", + module, full_path)); + DEBUG(0, (" Error: %s\n", dlerror())); + return 0; + } + + DEBUG(3, ("Module '%s' loaded\n", full_path)); + + module_init = sys_dlsym(handle, "rpc_pipe_init"); + if ((error = sys_dlerror()) != NULL) { + DEBUG(0, ("Error trying to resolve symbol 'rpc_pipe_init' in %s: %s\n", + full_path, error)); + return 0; + } + + return module_init(); +#else + DEBUG(0,("Attempting to load a dynamic RPC pipe when dlopen isn't available\n")); + return 0; +#endif +} + /******************************************************************* Respond to a pipe bind request. *******************************************************************/ @@ -794,7 +870,14 @@ BOOL api_pipe_bind_req(pipes_struct *p, prs_struct *rpc_in_p) } if (i == rpc_lookup_size) { - if (!smb_probe_module("rpc", p->name)) { + for (i = 0; api_fd_commands[i].name; i++) { + if (strequal(api_fd_commands[i].name, p->name)) { + api_fd_commands[i].init(); + break; + } + } + + if (!api_fd_commands[i].name && !rpc_load_module(p->name)) { DEBUG(3,("api_pipe_bind_req: Unknown pipe name %s in bind request.\n", p->name )); if(!setup_bind_nak(p)) @@ -810,11 +893,6 @@ BOOL api_pipe_bind_req(pipes_struct *p, prs_struct *rpc_in_p) break; } } - - if (i == rpc_lookup_size) { - DEBUG(0, ("module %s doesn't provide functions for pipe %s!\n", p->name, p->name)); - return False; - } } /* decode the bind request */ @@ -1214,7 +1292,16 @@ BOOL api_pipe_request(pipes_struct *p) if (i == rpc_lookup_size) { - smb_probe_module("rpc", p->name); + for (i = 0; api_fd_commands[i].name; i++) { + if (strequal(api_fd_commands[i].name, p->name)) { + api_fd_commands[i].init(); + break; + } + } + + if (!api_fd_commands[i].name) { + rpc_load_module(p->name); + } for (i = 0; i < rpc_lookup_size; i++) { if (strequal(rpc_lookup[i].pipe.clnt, p->name)) { diff --git a/source3/rpc_server/srv_reg.c b/source3/rpc_server/srv_reg.c index f72d8e4f295..04960f8e3a3 100644 --- a/source3/rpc_server/srv_reg.c +++ b/source3/rpc_server/srv_reg.c @@ -373,7 +373,11 @@ static BOOL api_reg_save_key(pipes_struct *p) array of \PIPE\reg operations ********************************************************************/ +#ifdef RPC_REG_DYNAMIC +int rpc_pipe_init(void) +#else int rpc_reg_init(void) +#endif { static struct api_struct api_reg_cmds[] = { diff --git a/source3/rpc_server/srv_samr.c b/source3/rpc_server/srv_samr.c index 67c092775b9..3a31ec82e14 100644 --- a/source3/rpc_server/srv_samr.c +++ b/source3/rpc_server/srv_samr.c @@ -1443,7 +1443,11 @@ static BOOL api_samr_set_dom_info(pipes_struct *p) array of \PIPE\samr operations ********************************************************************/ +#ifdef RPC_SAMR_DYNAMIC +int rpc_pipe_init(void) +#else int rpc_samr_init(void) +#endif { static struct api_struct api_samr_cmds [] = { diff --git a/source3/rpc_server/srv_samr_nt.c b/source3/rpc_server/srv_samr_nt.c index 6e1b6f2160a..f174114473b 100644 --- a/source3/rpc_server/srv_samr_nt.c +++ b/source3/rpc_server/srv_samr_nt.c @@ -915,7 +915,7 @@ static NTSTATUS get_group_alias_entries(TALLOC_CTX *ctx, DOMAIN_GRP **d_grp, DOM struct sys_grent *grp; struct passwd *pw; gid_t winbind_gid_low, winbind_gid_high; - BOOL winbind_groups_exist = lp_idmap_gid(&winbind_gid_low, &winbind_gid_high); + BOOL winbind_groups_exist = lp_winbind_gid(&winbind_gid_low, &winbind_gid_high); /* local aliases */ /* we return the UNIX groups here. This seems to be the right */ @@ -2324,11 +2324,11 @@ NTSTATUS _api_samr_create_user(pipes_struct *p, SAMR_Q_CREATE_USER *q_u, SAMR_R_ } else { DEBUG(3,("attempting to create non-unix account %s\n", account)); - } - - if (!pdb_set_username(sam_pass, account, PDB_CHANGED)) { - pdb_free_sam(&sam_pass); - return NT_STATUS_NO_MEMORY; + } + + if (!pdb_set_username(sam_pass, account, PDB_CHANGED)) { + pdb_free_sam(&sam_pass); + return NT_STATUS_NO_MEMORY; } pdb_set_acct_ctrl(sam_pass, acb_info, PDB_CHANGED); diff --git a/source3/rpc_server/srv_spoolss.c b/source3/rpc_server/srv_spoolss.c index a7dd7a6cef5..5832ae876bf 100755 --- a/source3/rpc_server/srv_spoolss.c +++ b/source3/rpc_server/srv_spoolss.c @@ -1580,7 +1580,11 @@ static BOOL api_spoolss_replycloseprinter(pipes_struct *p) \pipe\spoolss commands ********************************************************************/ +#ifdef RPC_SPOOLSS_DYNAMIC +int rpc_pipe_init(void) +#else int rpc_spoolss_init(void) +#endif { struct api_struct api_spoolss_cmds[] = { diff --git a/source3/rpc_server/srv_spoolss_nt.c b/source3/rpc_server/srv_spoolss_nt.c index 71d7530410c..1c203733b59 100644 --- a/source3/rpc_server/srv_spoolss_nt.c +++ b/source3/rpc_server/srv_spoolss_nt.c @@ -526,7 +526,7 @@ static BOOL open_printer_hnd(pipes_struct *p, POLICY_HND *hnd, char *name, uint3 /* Add to the internal list. */ DLIST_ADD(printers_list, new_printer); - + new_printer->notify.option=NULL; if ( !(new_printer->ctx = talloc_init("Printer Entry [0x%x]", (uint32)hnd)) ) { @@ -534,7 +534,7 @@ static BOOL open_printer_hnd(pipes_struct *p, POLICY_HND *hnd, char *name, uint3 close_printer_handle(p, hnd); return False; } - + if (!set_printer_hnd_printertype(new_printer, name)) { close_printer_handle(p, hnd); return False; @@ -1018,9 +1018,9 @@ static void send_notify2_changes( SPOOLSS_NOTIFY_MSG_CTR *ctr, uint32 idx ) } if ( sending_msg_count ) { - cli_spoolss_rrpcn( ¬ify_cli, mem_ctx, &p->notify.client_hnd, - data_len, data, p->notify.change, 0 ); - } + cli_spoolss_rrpcn( ¬ify_cli, mem_ctx, &p->notify.client_hnd, + data_len, data, p->notify.change, 0 ); + } } done: diff --git a/source3/rpc_server/srv_srvsvc.c b/source3/rpc_server/srv_srvsvc.c index 96820ae74bc..983c6609651 100644 --- a/source3/rpc_server/srv_srvsvc.c +++ b/source3/rpc_server/srv_srvsvc.c @@ -526,7 +526,11 @@ static BOOL api_srv_net_file_set_secdesc(pipes_struct *p) \PIPE\srvsvc commands ********************************************************************/ +#ifdef RPC_SVC_DYNAMIC +int rpc_pipe_init(void) +#else int rpc_srv_init(void) +#endif { static const struct api_struct api_srv_cmds[] = { diff --git a/source3/rpc_server/srv_srvsvc_nt.c b/source3/rpc_server/srv_srvsvc_nt.c index 4d9130fb970..1a7b64858b5 100644 --- a/source3/rpc_server/srv_srvsvc_nt.c +++ b/source3/rpc_server/srv_srvsvc_nt.c @@ -1840,8 +1840,6 @@ WERROR _srv_net_file_query_secdesc(pipes_struct *p, SRV_Q_NET_FILE_QUERY_SECDESC struct current_user user; connection_struct *conn = NULL; BOOL became_user = False; - fstring dev; - fstrcpy(dev, "A:"); ZERO_STRUCT(st); @@ -1855,7 +1853,7 @@ WERROR _srv_net_file_query_secdesc(pipes_struct *p, SRV_Q_NET_FILE_QUERY_SECDESC get_current_user(&user, p); become_root(); - conn = make_connection(qualname, null_pw, dev, user.vuid, &nt_status); + conn = make_connection(qualname, null_pw, "A:", user.vuid, &nt_status); unbecome_root(); if (conn == NULL) { @@ -1945,12 +1943,9 @@ WERROR _srv_net_file_set_secdesc(pipes_struct *p, SRV_Q_NET_FILE_SET_SECDESC *q_ struct current_user user; connection_struct *conn = NULL; BOOL became_user = False; - fstring dev; - fstrcpy(dev, "A:"); ZERO_STRUCT(st); - r_u->status = WERR_OK; unistr2_to_ascii(qualname, &q_u->uni_qual_name, sizeof(qualname)); @@ -1961,7 +1956,7 @@ WERROR _srv_net_file_set_secdesc(pipes_struct *p, SRV_Q_NET_FILE_SET_SECDESC *q_ get_current_user(&user, p); become_root(); - conn = make_connection(qualname, null_pw, dev, user.vuid, &nt_status); + conn = make_connection(qualname, null_pw, "A:", user.vuid, &nt_status); unbecome_root(); if (conn == NULL) { diff --git a/source3/rpc_server/srv_util.c b/source3/rpc_server/srv_util.c index 4656efb6fae..4eba9c7d1f5 100644 --- a/source3/rpc_server/srv_util.c +++ b/source3/rpc_server/srv_util.c @@ -112,7 +112,7 @@ NTSTATUS get_alias_user_groups(TALLOC_CTX *ctx, DOM_SID *sid, int *numgroups, ui *prids=NULL; *numgroups=0; - winbind_groups_exist = lp_idmap_gid(&winbind_gid_low, &winbind_gid_high); + winbind_groups_exist = lp_winbind_gid(&winbind_gid_low, &winbind_gid_high); DEBUG(10,("get_alias_user_groups: looking if SID %s is a member of groups in the SID domain %s\n", diff --git a/source3/rpc_server/srv_wkssvc.c b/source3/rpc_server/srv_wkssvc.c index ddcbadd1d44..1fed2cc6db0 100644 --- a/source3/rpc_server/srv_wkssvc.c +++ b/source3/rpc_server/srv_wkssvc.c @@ -60,7 +60,11 @@ static BOOL api_wks_query_info(pipes_struct *p) \PIPE\wkssvc commands ********************************************************************/ +#ifdef RPC_WKS_DYNAMIC +int rpc_pipe_init(void) +#else int rpc_wks_init(void) +#endif { static struct api_struct api_wks_cmds[] = { diff --git a/source3/rpcclient/cmd_lsarpc.c b/source3/rpcclient/cmd_lsarpc.c index 808ef50a455..db74370bc0b 100644 --- a/source3/rpcclient/cmd_lsarpc.c +++ b/source3/rpcclient/cmd_lsarpc.c @@ -543,50 +543,6 @@ static NTSTATUS cmd_lsa_enum_acct_rights(struct cli_state *cli, } -/* Enumerate the accounts with a specific right */ - -static NTSTATUS cmd_lsa_enum_acct_with_right(struct cli_state *cli, - TALLOC_CTX *mem_ctx, int argc, - const char **argv) -{ - POLICY_HND dom_pol; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - DOM_SID *sids; - uint32 count; - const char *right; - - int i; - - if (argc != 2 ) { - printf("Usage: %s \n", argv[0]); - return NT_STATUS_OK; - } - - right = argv[1]; - - result = cli_lsa_open_policy2(cli, mem_ctx, True, - SEC_RIGHTS_MAXIMUM_ALLOWED, - &dom_pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_enum_account_with_right(cli, mem_ctx, &dom_pol, right, &count, &sids); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - printf("found %d SIDs for '%s'\n", count, right); - - for (i = 0; i < count; i++) { - printf("\t%s\n", sid_string_static(&sids[i])); - } - - done: - return result; -} - - /* add some privileges to a SID via LsaAddAccountRights */ static NTSTATUS cmd_lsa_add_acct_rights(struct cli_state *cli, @@ -750,7 +706,6 @@ struct cmd_set lsarpc_commands[] = { { "lsaenumsid", RPC_RTYPE_NTSTATUS, cmd_lsa_enum_sids, NULL, PI_LSARPC, "Enumerate the LSA SIDS", "" }, { "lsaenumprivsaccount", RPC_RTYPE_NTSTATUS, cmd_lsa_enum_privsaccounts, NULL, PI_LSARPC, "Enumerate the privileges of an SID", "" }, { "lsaenumacctrights", RPC_RTYPE_NTSTATUS, cmd_lsa_enum_acct_rights, NULL, PI_LSARPC, "Enumerate the rights of an SID", "" }, - { "lsaenumacctwithright",RPC_RTYPE_NTSTATUS, cmd_lsa_enum_acct_with_right,NULL, PI_LSARPC,"Enumerate accounts with a right", "" }, { "lsaaddacctrights", RPC_RTYPE_NTSTATUS, cmd_lsa_add_acct_rights, NULL, PI_LSARPC, "Add rights to an account", "" }, { "lsaremoveacctrights", RPC_RTYPE_NTSTATUS, cmd_lsa_remove_acct_rights, NULL, PI_LSARPC, "Remove rights from an account", "" }, { "lsalookupprivvalue", RPC_RTYPE_NTSTATUS, cmd_lsa_lookupprivvalue, NULL, PI_LSARPC, "Get a privilege value given its name", "" }, diff --git a/source3/rpcclient/cmd_samr.c b/source3/rpcclient/cmd_samr.c index e2232f0da77..866381456b2 100644 --- a/source3/rpcclient/cmd_samr.c +++ b/source3/rpcclient/cmd_samr.c @@ -1487,49 +1487,6 @@ static NTSTATUS cmd_samr_get_dom_pwinfo(struct cli_state *cli, return result; } -/* Look up domain name */ - -static NTSTATUS cmd_samr_lookup_domain(struct cli_state *cli, - TALLOC_CTX *mem_ctx, - int argc, const char **argv) -{ - POLICY_HND connect_pol, domain_pol; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - uint32 access_mask = MAXIMUM_ALLOWED_ACCESS; - fstring domain_name,sid_string; - DOM_SID sid; - - if (argc != 2) { - printf("Usage: %s domain_name\n", argv[0]); - return NT_STATUS_OK; - } - - sscanf(argv[1], "%s", domain_name); - - result = try_samr_connects(cli, mem_ctx, access_mask, &connect_pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_samr_open_domain(cli, mem_ctx, &connect_pol, - access_mask, &domain_sid, &domain_pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_samr_lookup_domain( - cli, mem_ctx, &connect_pol, domain_name, &sid); - - sid_to_string(sid_string,&sid); - - if (NT_STATUS_IS_OK(result)) - printf("SAMR_LOOKUP_DOMAIN: Domain Name: %s Domain SID: %s\n", - domain_name,sid_string); - -done: - return result; -} - /* List of commands exported by this module */ @@ -1556,6 +1513,5 @@ struct cmd_set samr_commands[] = { { "samquerysecobj", RPC_RTYPE_NTSTATUS, cmd_samr_query_sec_obj, NULL, PI_SAMR, "Query SAMR security object", "" }, { "getdompwinfo", RPC_RTYPE_NTSTATUS, cmd_samr_get_dom_pwinfo, NULL, PI_SAMR, "Retrieve domain password info", "" }, - { "lookupdomain", RPC_RTYPE_NTSTATUS, cmd_samr_lookup_domain, NULL, PI_SAMR, "Lookup Domain Name", "" }, { NULL } }; diff --git a/source3/rpcclient/rpcclient.c b/source3/rpcclient/rpcclient.c index 6c1d05b3e93..2338d72f192 100644 --- a/source3/rpcclient/rpcclient.c +++ b/source3/rpcclient/rpcclient.c @@ -97,6 +97,70 @@ static char **completion_fn(char *text, int start, int end) return matches; } +/*********************************************************************** + * read in username/password credentials from a file + */ +static void read_authfile ( + char *filename, + char* username, + char* password, + char* domain +) +{ + FILE *auth; + fstring buf; + uint16 len = 0; + char *ptr, *val, *param; + + if ((auth=sys_fopen(filename, "r")) == NULL) + { + printf ("ERROR: Unable to open credentials file!\n"); + return; + } + + while (!feof(auth)) + { + /* get a line from the file */ + if (!fgets (buf, sizeof(buf), auth)) + continue; + + len = strlen(buf); + + /* skip empty lines */ + if ((len) && (buf[len-1]=='\n')) + { + buf[len-1] = '\0'; + len--; + } + if (len == 0) + continue; + + /* break up the line into parameter & value. + will need to eat a little whitespace possibly */ + param = buf; + if (!(ptr = strchr_m(buf, '='))) + continue; + val = ptr+1; + *ptr = '\0'; + + /* eat leading white space */ + while ((*val!='\0') && ((*val==' ') || (*val=='\t'))) + val++; + + if (strwicmp("password", param) == 0) + fstrcpy (password, val); + else if (strwicmp("username", param) == 0) + fstrcpy (username, val); + else if (strwicmp("domain", param) == 0) + fstrcpy (domain, val); + + memset(buf, 0, sizeof(buf)); + } + fclose(auth); + + return; +} + static char* next_command (char** cmdstr) { static pstring command; @@ -117,6 +181,28 @@ static char* next_command (char** cmdstr) return command; } + +/** + * Find default username from environment variables. + * + * @param username fstring to receive username; not touched if none is + * known. + **/ +static void get_username (char *username) +{ + if (getenv("USER")) + fstrcpy(username,getenv("USER")); + + if (*username == 0 && getenv("LOGNAME")) + fstrcpy(username,getenv("LOGNAME")); + + if (*username == 0) { + fstrcpy(username,"GUEST"); + } + + return; +} + /* Fetch the SID for this computer */ static void fetch_machine_sid(struct cli_state *cli) @@ -489,12 +575,21 @@ out_free: int main(int argc, char *argv[]) { + static int got_pass = 0; BOOL interactive = True; int opt; - static char *cmdstr = NULL; + static char *cmdstr = ""; const char *server; struct cli_state *cli; - static char *opt_ipaddr=NULL; + fstring password="", + username="", + domain=""; + static char *opt_authfile=NULL, + *opt_username=NULL, + *opt_domain=NULL, + *opt_logfile=NULL, + *opt_ipaddr=NULL; + pstring logfile; struct cmd_set **cmd_set; struct in_addr server_ip; NTSTATUS nt_status; @@ -504,12 +599,17 @@ out_free: poptContext pc; struct poptOption long_options[] = { POPT_AUTOHELP + {"authfile", 'A', POPT_ARG_STRING, &opt_authfile, 'A', "File containing user credentials", "AUTHFILE"}, + {"nopass", 'N', POPT_ARG_NONE, &got_pass, 'N', "Don't ask for a password"}, + {"user", 'U', POPT_ARG_STRING, &opt_username, 'U', "Set the network username", "USER"}, + {"workgroup", 'W', POPT_ARG_STRING, &opt_domain, 'W', "Set the domain name for user account", "DOMAIN"}, {"command", 'c', POPT_ARG_STRING, &cmdstr, 'c', "Execute semicolon separated cmds", "COMMANDS"}, + {"logfile", 'l', POPT_ARG_STRING, &opt_logfile, 'l', "Logfile to use instead of stdout", "LOGFILE" }, {"dest-ip", 'I', POPT_ARG_STRING, &opt_ipaddr, 'I', "Specify destination IP address", "IP"}, - POPT_COMMON_SAMBA - POPT_COMMON_CONNECTION - POPT_COMMON_CREDENTIALS - POPT_TABLEEND + { NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_debug }, + { NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_configfile }, + { NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_version}, + { NULL } }; ZERO_STRUCT(server_ip); @@ -528,13 +628,43 @@ out_free: while((opt = poptGetNextOpt(pc)) != -1) { switch (opt) { + case 'A': + /* only get the username, password, and domain from the file */ + read_authfile (opt_authfile, username, password, domain); + if (strlen (password)) + got_pass = 1; + break; + + case 'l': + slprintf(logfile, sizeof(logfile) - 1, "%s.client", + opt_logfile); + lp_set_logfile(logfile); + interactive = False; + break; + + case 'U': { + char *lp; + fstrcpy(username,opt_username); + + if ((lp=strchr_m(username,'%'))) { + *lp = 0; + fstrcpy(password,lp+1); + got_pass = 1; + memset(strchr_m(opt_username,'%') + 1, 'X', + strlen(password)); + } + break; + } case 'I': if ( (server_ip.s_addr=inet_addr(opt_ipaddr)) == INADDR_NONE ) { fprintf(stderr, "%s not a valid IP address\n", opt_ipaddr); return 1; } + case 'W': + fstrcpy(domain, opt_domain); + break; } } @@ -571,25 +701,28 @@ out_free: * from stdin if necessary */ - if (!cmdline_auth_info.got_pass) { + if (!got_pass) { char *pass = getpass("Password:"); if (pass) { - pstrcpy(cmdline_auth_info.password, pass); + fstrcpy(password, pass); } } + if (!strlen(username) && !got_pass) + get_username(username); + nt_status = cli_full_connection(&cli, global_myname(), server, opt_ipaddr ? &server_ip : NULL, 0, "IPC$", "IPC", - cmdline_auth_info.username, lp_workgroup(), - cmdline_auth_info.password, 0, NULL); + username, domain, + password, 0, NULL); if (!NT_STATUS_IS_OK(nt_status)) { DEBUG(0,("Cannot connect to server. Error was %s\n", nt_errstr(nt_status))); return 1; } - memset(cmdline_auth_info.password,'X',sizeof(cmdline_auth_info.password)); + memset(password,'X',sizeof(password)); /* Load command lists */ @@ -604,7 +737,7 @@ out_free: fetch_machine_sid(cli); /* Do anything specified with -c */ - if (cmdstr && cmdstr[0]) { + if (cmdstr[0]) { char *cmd; char *p = cmdstr; diff --git a/source3/sam/SAM-interface_handles.txt b/source3/sam/SAM-interface_handles.txt deleted file mode 100644 index 1c164bd198b..00000000000 --- a/source3/sam/SAM-interface_handles.txt +++ /dev/null @@ -1,123 +0,0 @@ -SAM API - -NTSTATUS sam_get_sec_obj(NT_USER_TOKEN *access, DOM_SID *sid, SEC_DESC **sd) -NTSTATUS sam_set_sec_obj(NT_USER_TOKEN *access, DOM_SID *sid, SEC_DESC *sd) - -NTSTATUS sam_lookup_name(NT_USER_TOKEN *access, DOM_SID *domain, char *name, DOM_SID **sid, uint32 *type) -NTSTATUS sam_lookup_sid(NT_USER_TOKEN *access, DOM_SID *sid, char **name, uint32 *type) - - -Domain API - -NTSTATUS sam_update_domain(SAM_DOMAIN_HANDLE *domain) - -NTSTATUS sam_enum_domains(NT_USER_TOKEN *access, int32 *domain_count, DOM_SID **domains, char **domain_names) -NTSTATUS sam_lookup_domain(NT_USER_TOKEN *access, char *domain, DOM_SID **domainsid) - -NTSTATUS sam_get_domain_by_sid(NT_USER_TOKEN *access, uint32 access_desired, DOM_SID *domainsid, SAM_DOMAIN_HANDLE **domain) - - -User API - -NTSTATUS sam_create_user(NT_USER_TOKEN *access, uint32 access_desired, SAM_USER_HANDLE **user) -NTSTATUS sam_add_user(SAM_USER_HANDLE *user) -NTSTATUS sam_update_user(SAM_USER_HANDLE *user) -NTSTATUS sam_delete_user(SAM_USER_HANDLE * user) - -NTSTATUS sam_enum_users(NT_USER_TOKEN *access, DOM_SID *domain, int32 *user_count, SAM_USER_ENUM **users) - -NTSTATUS sam_get_user_by_sid(NT_USER_TOKEN *access, uint32 access_desired, DOM_SID *usersid, SAM_USER_HANDLE **user) -NTSTATUS sam_get_user_by_name(NT_USER_TOKEN *access, uint32 access_desired, char *domain, char *name, SAM_USER_HANDLE **user) - - -Group API - -NTSTATUS sam_create_group(NT_USER_TOKEN *access, uint32 access_desired, uint32 typ, SAM_GROUP_HANDLE **group) -NTSTATUS sam_add_group(SAM_GROUP_HANDLE *samgroup) -NTSTATUS sam_update_group(SAM_GROUP_HANDLE *samgroup) -NTSTATUS sam_delete_group(SAM_GROUP_HANDLE *groupsid) - -NTSTATUS sam_enum_groups(NT_USER_TOKEN *access, DOM_SID *domainsid, uint32 typ, uint32 *groups_count, SAM_GROUP_ENUM **groups) - -NTSTATUS sam_get_group_by_sid(NT_USER_TOKEN *access, uint32 access_desired, DOM_SID *groupsid, SAM_GROUP_HANDLE **group) -NTSTATUS sam_get_group_by_name(NT_USER_TOKEN *access, uint32 access_desired, char *domain, char *name, SAM_GROUP_HANDLE **group) - -NTSTATUS sam_add_member_to_group(SAM_GROUP_HANDLE *group, SAM_GROUP_MEMBER *member) -NTSTATUS sam_delete_member_from_group(SAM_GROUP_HANDLE *group, SAM_GROUP_MEMBER *member) -NTSTATUS sam_enum_groupmembers(SAM_GROUP_HANLDE *group, uint32 *members_count, SAM_GROUP_MEMBER **members) - -NTSTATUS sam_get_groups_of_user(SAM_USER_HANDLE *user, uint32 typ, uint32 *group_count, SAM_GROUP_ENUM **groups) - - - -structures - -typedef _SAM_GROUP_MEMBER { - DOM_SID sid; - BOOL group; /* specifies if it is a group or a user */ - -} SAM_GROUP_MEMBER - -typedef struct sam_user_enum { - DOM_SID sid; - char *username; - char *full_name; - char *user_desc; - uint16 acc_ctrl; -} SAM_USER_ENUM; - -typedef struct sam_group_enum { - DOM_SID sid; - char *groupname; - char *comment; -} SAM_GROUP_ENUM - -NTSTATUS sam_get_domain_sid(SAM_DOMAIN_HANDLE *domain, DOM_SID **sid) -NTSTATUS sam_get_domain_num_users(SAM_DOMAIN_HANDLE *domain, uint32 *num_users) -NTSTATUS sam_get_domain_num_groups(SAM_DOMAIN_HANDLE *domain, uint32 *num_groups) -NTSTATUS sam_get_domain_num_aliases(SAM_DOMAIN_HANDLE *domain, uint32 *num_aliases) -NTSTATUS sam_{get,set}_domain_name(SAM_DOMAIN_HANDLE *domain, char **domain_name) -NTSTATUS sam_{get,set}_domain_server(SAM_DOMAIN_HANDLE *domain, char **server_name) -NTSTATUS sam_{get,set}_domain_max_pwdage(SAM_DOMAIN_HANDLE *domain, NTTIME *max_passwordage) -NTSTATUS sam_{get,set}_domain_min_pwdage(SAM_DOMAIN_HANDLE *domain, NTTIME *min_passwordage) -NTSTATUS sam_{get,set}_domain_lockout_duration(SAM_DOMAIN_HANDLE *domain, NTTIME *lockout_duration) -NTSTATUS sam_{get,set}_domain_reset_count(SAM_DOMAIN_HANDLE *domain, NTTIME *reset_lockout_count) -NTSTATUS sam_{get,set}_domain_min_pwdlength(SAM_DOMAIN_HANDLE *domain, uint16 *min_passwordlength) -NTSTATUS sam_{get,set}_domain_pwd_history(SAM_DOMAIN_HANDLE *domain, uin16 *password_history) -NTSTATUS sam_{get,set}_domain_lockout_count(SAM_DOMAIN_HANDLE *domain, uint16 *lockout_count) -NTSTATUS sam_{get,set}_domain_force_logoff(SAM_DOMAIN_HANDLE *domain, BOOL *force_logoff) -NTSTATUS sam_{get,set}_domain_login_pwdchange(SAM_DOMAIN_HANDLE *domain, BOOL *login_pwdchange) - -NTSTATUS sam_get_user_sid(SAM_USER_HANDLE *user, DOM_SID **sid) -NTSTATUS sam_{get,set}_user_pgroup(SAM_USER_HANDLE *user, DOM_SID **pgroup) -NTSTATUS sam_{get,set}_user_name(SAM_USER_HANDLE *user, char **username) -NTSTATUS sam_{get,set}_user_fullname(SAM_USER_HANDLE *user, char** fullname) -NTSTATUS sam_{get,set}_user_description(SAM_USER_HANDLE *user, char **description) -NTSTATUS sam_{get,set}_user_home_dir(SAM_USER_HANDLE *user, char **home_dir) -NTSTATUS sam_{get,set}_user_dir_drive(SAM_USER_HANDLE *user, char **dir_drive) -NTSTATUS sam_{get,set}_user_logon_script(SAM_USER_HANDLE *user, char **logon_script) -NTSTATUS sam_{get,set}_user_profile_path(SAM_USER_HANDLE *user, char **profile_path) -NTSTATUS sam_{get,set}_user_workstations(SAM_USER_HANDLE *user, char **workstations) -NTSTATUS sam_{get,set}_user_munged_dial(SAM_USER_HANDLE *user, char **munged_dial) -NTSTATUS sam_{get,set}_user_lm_pwd(SAM_USER_HANDLE *user, DATA_BLOB *lm_pwd) -NTSTATUS sam_{get,set}_user_nt_pwd(SAM_USER_HANDLE *user, DATA_BLOB *nt_pwd) -NTSTATUS sam_{get,set}_user_plain_pwd(SAM_USER_HANDLE *user, DATA_BLOB *plaintext_pwd) -NTSTATUS sam_{get,set}_user_acct_ctrl(SAM_USER_HANDLE *user, uint16 *acct_ctrl) -NTSTATUS sam_{get,set}_user_logon_divs(SAM_USER_HANDLE *user, uint16 *logon_divs) -NTSTATUS sam_{get,set}_user_hours(SAM_USER_HANDLE *user, uint32 *hours_len, uint8 **hours) -NTSTATUS sam_{get,set}_user_logon_time(SAM_USER_HANDLE *user, NTTIME *logon_time) -NTSTATUS sam_{get,set}_user_logoff_time(SAM_USER_HANDLE *user, NTTIME *logoff_time) -NTSTATUS sam_{get,set}_user_kickoff_time(SAM_USER_HANDLE *user, NTTIME kickoff_time) -NTSTATUS sam_{get,set}_user_pwd_last_set(SAM_USER_HANDLE *user, NTTIME pwd_last_set) -NTSTATUS sam_{get,set}_user_pwd_can_change(SAM_USER_HANDLE *user, NTTIME pwd_can_change) -NTSTATUS sam_{get,set}_user_pwd_must_change(SAM_USER_HANDLE *user, NTTIME pwd_must_change) -NTSTATUS sam_{get,set}_user_unknown_1(SAM_USER_HANDLE *user, char **unknown_1) -NTSTATUS sam_{get,set}_user_unknown_2(SAM_USER_HANDLE *user, uint32 *unknown_2) -NTSTATUS sam_{get,set}_user_unknown_3(SAM_USER_HANDLE *user, uint32 *unknown_3) -NTSTATUS sam_{get,set}_user_unknown_4(SAM_USER_HANDLE *user, uint32 *unknown_4) - -NTSTATUS sam_get_group_sid(SAM_GROUP_HANDLE *group, DOM_SID **sid) -NTSTATUS sam_get_group_typ(SAM_GROUP_HANDLE *group, uint32 *typ) -NTSTATUS sam_{get,set}_group_name(SAM_GROUP_HANDLE *group, char **group_name) -NTSTATUS sam_{get,set}_group_comment(SAM_GROUP_HANDLE *group, char **comment) -NTSTATUS sam_{get,set}_group_priv_set(SAM_GROUP_HANDLE *group, PRIVILEGE_SET *priv_set) \ No newline at end of file diff --git a/source3/sam/account.c b/source3/sam/account.c deleted file mode 100644 index b8336146cda..00000000000 --- a/source3/sam/account.c +++ /dev/null @@ -1,305 +0,0 @@ -/* - Unix SMB/CIFS implementation. - Password and authentication handling - Copyright (C) Jeremy Allison 1996-2001 - Copyright (C) Luke Kenneth Casson Leighton 1996-1998 - Copyright (C) Gerald (Jerry) Carter 2000-2001 - Copyright (C) Andrew Bartlett 2001-2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" - -#undef DBGC_CLASS -#define DBGC_CLASS DBGC_SAM - -/************************************************************ - Fill the SAM_ACCOUNT_HANDLE with default values. - ***********************************************************/ - -static void sam_fill_default_account(SAM_ACCOUNT_HANDLE *account) -{ - ZERO_STRUCT(account->private); /* Don't touch the talloc context */ - - /* Don't change these timestamp settings without a good reason. - They are important for NT member server compatibility. */ - - /* FIXME: We should actually call get_nt_time_max() or sthng - * here */ - unix_to_nt_time(&(account->private.logoff_time),get_time_t_max()); - unix_to_nt_time(&(account->private.kickoff_time),get_time_t_max()); - unix_to_nt_time(&(account->private.pass_must_change_time),get_time_t_max()); - account->private.unknown_1 = 0x00ffffff; /* don't know */ - account->private.logon_divs = 168; /* hours per week */ - account->private.hours_len = 21; /* 21 times 8 bits = 168 */ - memset(account->private.hours, 0xff, account->private.hours_len); /* available at all hours */ - account->private.unknown_2 = 0x00000000; /* don't know */ - account->private.unknown_3 = 0x000004ec; /* don't know */ -} - -static void destroy_sam_talloc(SAM_ACCOUNT_HANDLE **account) -{ - if (*account) { - data_blob_clear_free(&((*account)->private.lm_pw)); - data_blob_clear_free(&((*account)->private.nt_pw)); - if((*account)->private.plaintext_pw!=NULL) - memset((*account)->private.plaintext_pw,'\0',strlen((*account)->private.plaintext_pw)); - - talloc_destroy((*account)->mem_ctx); - *account = NULL; - } -} - - -/********************************************************************** - Alloc memory and initialises a SAM_ACCOUNT_HANDLE on supplied mem_ctx. -***********************************************************************/ - -NTSTATUS sam_init_account_talloc(TALLOC_CTX *mem_ctx, SAM_ACCOUNT_HANDLE **account) -{ - SMB_ASSERT(*account != NULL); - - if (!mem_ctx) { - DEBUG(0,("sam_init_account_talloc: mem_ctx was NULL!\n")); - return NT_STATUS_UNSUCCESSFUL; - } - - *account=(SAM_ACCOUNT_HANDLE *)talloc(mem_ctx, sizeof(SAM_ACCOUNT_HANDLE)); - - if (*account==NULL) { - DEBUG(0,("sam_init_account_talloc: error while allocating memory\n")); - return NT_STATUS_NO_MEMORY; - } - - (*account)->mem_ctx = mem_ctx; - - (*account)->free_fn = NULL; - - sam_fill_default_account(*account); - - return NT_STATUS_OK; -} - - -/************************************************************* - Alloc memory and initialises a struct sam_passwd. - ************************************************************/ - -NTSTATUS sam_init_account(SAM_ACCOUNT_HANDLE **account) -{ - TALLOC_CTX *mem_ctx; - NTSTATUS nt_status; - - mem_ctx = talloc_init("sam internal SAM_ACCOUNT_HANDLE allocation"); - - if (!mem_ctx) { - DEBUG(0,("sam_init_account: error while doing talloc_init()\n")); - return NT_STATUS_NO_MEMORY; - } - - if (!NT_STATUS_IS_OK(nt_status = sam_init_account_talloc(mem_ctx, account))) { - talloc_destroy(mem_ctx); - return nt_status; - } - - (*account)->free_fn = destroy_sam_talloc; - - return NT_STATUS_OK; -} - -/** - * Free the contents of the SAM_ACCOUNT_HANDLE, but not the structure. - * - * Also wipes the LM and NT hashes and plaintext password from - * memory. - * - * @param account SAM_ACCOUNT_HANDLE to free members of. - **/ - -static void sam_free_account_contents(SAM_ACCOUNT_HANDLE *account) -{ - - /* Kill off sensitive data. Free()ed by the - talloc mechinism */ - - data_blob_clear_free(&(account->private.lm_pw)); - data_blob_clear_free(&(account->private.nt_pw)); - if (account->private.plaintext_pw) - memset(account->private.plaintext_pw,'\0',strlen(account->private.plaintext_pw)); -} - - -/************************************************************ - Reset the SAM_ACCOUNT_HANDLE and free the NT/LM hashes. - ***********************************************************/ - -NTSTATUS sam_reset_sam(SAM_ACCOUNT_HANDLE *account) -{ - SMB_ASSERT(account != NULL); - - sam_free_account_contents(account); - - sam_fill_default_account(account); - - return NT_STATUS_OK; -} - - -/************************************************************ - Free the SAM_ACCOUNT_HANDLE and the member pointers. - ***********************************************************/ - -NTSTATUS sam_free_account(SAM_ACCOUNT_HANDLE **account) -{ - SMB_ASSERT(*account != NULL); - - sam_free_account_contents(*account); - - if ((*account)->free_fn) { - (*account)->free_fn(account); - } - - return NT_STATUS_OK; -} - - -/********************************************************** - Encode the account control bits into a string. - length = length of string to encode into (including terminating - null). length *MUST BE MORE THAN 2* ! - **********************************************************/ - -char *sam_encode_acct_ctrl(uint16 acct_ctrl, size_t length) -{ - static fstring acct_str; - size_t i = 0; - - acct_str[i++] = '['; - - if (acct_ctrl & ACB_PWNOTREQ ) acct_str[i++] = 'N'; - if (acct_ctrl & ACB_DISABLED ) acct_str[i++] = 'D'; - if (acct_ctrl & ACB_HOMDIRREQ) acct_str[i++] = 'H'; - if (acct_ctrl & ACB_TEMPDUP ) acct_str[i++] = 'T'; - if (acct_ctrl & ACB_NORMAL ) acct_str[i++] = 'U'; - if (acct_ctrl & ACB_MNS ) acct_str[i++] = 'M'; - if (acct_ctrl & ACB_WSTRUST ) acct_str[i++] = 'W'; - if (acct_ctrl & ACB_SVRTRUST ) acct_str[i++] = 'S'; - if (acct_ctrl & ACB_AUTOLOCK ) acct_str[i++] = 'L'; - if (acct_ctrl & ACB_PWNOEXP ) acct_str[i++] = 'X'; - if (acct_ctrl & ACB_DOMTRUST ) acct_str[i++] = 'I'; - - for ( ; i < length - 2 ; i++ ) - acct_str[i] = ' '; - - i = length - 2; - acct_str[i++] = ']'; - acct_str[i++] = '\0'; - - return acct_str; -} - -/********************************************************** - Decode the account control bits from a string. - **********************************************************/ - -uint16 sam_decode_acct_ctrl(const char *p) -{ - uint16 acct_ctrl = 0; - BOOL finished = False; - - /* - * Check if the account type bits have been encoded after the - * NT password (in the form [NDHTUWSLXI]). - */ - - if (*p != '[') - return 0; - - for (p++; *p && !finished; p++) { - switch (*p) { - case 'N': { acct_ctrl |= ACB_PWNOTREQ ; break; /* 'N'o password. */ } - case 'D': { acct_ctrl |= ACB_DISABLED ; break; /* 'D'isabled. */ } - case 'H': { acct_ctrl |= ACB_HOMDIRREQ; break; /* 'H'omedir required. */ } - case 'T': { acct_ctrl |= ACB_TEMPDUP ; break; /* 'T'emp account. */ } - case 'U': { acct_ctrl |= ACB_NORMAL ; break; /* 'U'ser account (normal). */ } - case 'M': { acct_ctrl |= ACB_MNS ; break; /* 'M'NS logon user account. What is this ? */ } - case 'W': { acct_ctrl |= ACB_WSTRUST ; break; /* 'W'orkstation account. */ } - case 'S': { acct_ctrl |= ACB_SVRTRUST ; break; /* 'S'erver account. */ } - case 'L': { acct_ctrl |= ACB_AUTOLOCK ; break; /* 'L'ocked account. */ } - case 'X': { acct_ctrl |= ACB_PWNOEXP ; break; /* No 'X'piry on password */ } - case 'I': { acct_ctrl |= ACB_DOMTRUST ; break; /* 'I'nterdomain trust account. */ } - case ' ': { break; } - case ':': - case '\n': - case '\0': - case ']': - default: { finished = True; } - } - } - - return acct_ctrl; -} - -/************************************************************* - Routine to set 32 hex password characters from a 16 byte array. -**************************************************************/ - -void sam_sethexpwd(char *p, const unsigned char *pwd, uint16 acct_ctrl) -{ - if (pwd != NULL) { - int i; - for (i = 0; i < 16; i++) - slprintf(&p[i*2], 3, "%02X", pwd[i]); - } else { - if (acct_ctrl & ACB_PWNOTREQ) - safe_strcpy(p, "NO PASSWORDXXXXXXXXXXXXXXXXXXXXX", 33); - else - safe_strcpy(p, "XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX", 33); - } -} - -/************************************************************* - Routine to get the 32 hex characters and turn them - into a 16 byte array. -**************************************************************/ - -BOOL sam_gethexpwd(const char *p, unsigned char *pwd) -{ - int i; - unsigned char lonybble, hinybble; - char *hexchars = "0123456789ABCDEF"; - char *p1, *p2; - - if (!p) - return (False); - - for (i = 0; i < 32; i += 2) { - hinybble = toupper(p[i]); - lonybble = toupper(p[i + 1]); - - p1 = strchr(hexchars, hinybble); - p2 = strchr(hexchars, lonybble); - - if (!p1 || !p2) - return (False); - - hinybble = PTR_DIFF(p1, hexchars); - lonybble = PTR_DIFF(p2, hexchars); - - pwd[i / 2] = (hinybble << 4) | lonybble; - } - return (True); -} diff --git a/source3/sam/get_set_account.c b/source3/sam/get_set_account.c deleted file mode 100644 index acac281d21a..00000000000 --- a/source3/sam/get_set_account.c +++ /dev/null @@ -1,845 +0,0 @@ -/* - Unix SMB/CIFS implementation. - SAM_ACCOUNT_HANDLE access routines - Copyright (C) Andrew Bartlett 2002 - Copyright (C) Stefan (metze) Metzmacher 2002 - Copyright (C) Jelmer Vernooij 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" - -#undef DBGC_CLASS -#define DBGC_CLASS DBGC_SAM - -NTSTATUS sam_get_account_domain_sid(const SAM_ACCOUNT_HANDLE *sampass, const DOM_SID **sid) -{ - NTSTATUS status; - SAM_DOMAIN_HANDLE *domain; - SAM_ASSERT(!sampass || !sid); - - if (!NT_STATUS_IS_OK(status = sam_get_account_domain(sampass, &domain))){ - DEBUG(0, ("sam_get_account_domain_sid: Can't get domain for account\n")); - return status; - } - - return sam_get_domain_sid(domain, sid); -} - -NTSTATUS sam_get_account_domain_name(const SAM_ACCOUNT_HANDLE *sampass, const char **domain_name) -{ - NTSTATUS status; - SAM_DOMAIN_HANDLE *domain; - SAM_ASSERT(sampass && domain_name); - - if (!NT_STATUS_IS_OK(status = sam_get_account_domain(sampass, &domain))){ - DEBUG(0, ("sam_get_account_domain_name: Can't get domain for account\n")); - return status; - } - - return sam_get_domain_name(domain, domain_name); -} - -NTSTATUS sam_get_account_acct_ctrl(const SAM_ACCOUNT_HANDLE *sampass, uint16 *acct_ctrl) -{ - SAM_ASSERT(sampass && acct_ctrl); - - *acct_ctrl = sampass->private.acct_ctrl; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_logon_time(const SAM_ACCOUNT_HANDLE *sampass, NTTIME *logon_time) -{ - SAM_ASSERT(sampass && logon_time) ; - - *logon_time = sampass->private.logon_time; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_logoff_time(const SAM_ACCOUNT_HANDLE *sampass, NTTIME *logoff_time) -{ - SAM_ASSERT(sampass && logoff_time) ; - - *logoff_time = sampass->private.logoff_time; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_kickoff_time(const SAM_ACCOUNT_HANDLE *sampass, NTTIME *kickoff_time) -{ - SAM_ASSERT(sampass && kickoff_time); - - *kickoff_time = sampass->private.kickoff_time; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_pass_last_set_time(const SAM_ACCOUNT_HANDLE *sampass, NTTIME *pass_last_set_time) -{ - SAM_ASSERT(sampass && pass_last_set_time); - - *pass_last_set_time = sampass->private.pass_last_set_time; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_pass_can_change_time(const SAM_ACCOUNT_HANDLE *sampass, NTTIME *pass_can_change_time) -{ - SAM_ASSERT(sampass && pass_can_change_time); - - *pass_can_change_time = sampass->private.pass_can_change_time; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_pass_must_change_time(const SAM_ACCOUNT_HANDLE *sampass, NTTIME *pass_must_change_time) -{ - SAM_ASSERT(sampass && pass_must_change_time); - - *pass_must_change_time = sampass->private.pass_must_change_time; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_logon_divs(const SAM_ACCOUNT_HANDLE *sampass, uint16 *logon_divs) -{ - SAM_ASSERT(sampass && logon_divs); - - *logon_divs = sampass->private.logon_divs; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_hours_len(const SAM_ACCOUNT_HANDLE *sampass, uint32 *hours_len) -{ - SAM_ASSERT(sampass && hours_len); - - *hours_len = sampass->private.hours_len; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_hours(const SAM_ACCOUNT_HANDLE *sampass, const uint8 **hours) -{ - SAM_ASSERT(sampass && hours); - - *hours = sampass->private.hours; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_nt_pwd(const SAM_ACCOUNT_HANDLE *sampass, DATA_BLOB *nt_pwd) -{ - SAM_ASSERT(sampass); - - SMB_ASSERT((!sampass->private.nt_pw.data) - || sampass->private.nt_pw.length == NT_HASH_LEN); - - *nt_pwd = sampass->private.nt_pw; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_lm_pwd(const SAM_ACCOUNT_HANDLE *sampass, DATA_BLOB *lm_pwd) -{ - SAM_ASSERT(sampass); - - SMB_ASSERT((!sampass->private.lm_pw.data) - || sampass->private.lm_pw.length == LM_HASH_LEN); - - *lm_pwd = sampass->private.lm_pw; - - return NT_STATUS_OK; -} - -/* Return the plaintext password if known. Most of the time - it isn't, so don't assume anything magic about this function. - - Used to pass the plaintext to sam backends that might - want to store more than just the NTLM hashes. -*/ - -NTSTATUS sam_get_account_plaintext_pwd(const SAM_ACCOUNT_HANDLE *sampass, char **plain_pwd) -{ - SAM_ASSERT(sampass && plain_pwd); - - *plain_pwd = sampass->private.plaintext_pw; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_sid(const SAM_ACCOUNT_HANDLE *sampass, const DOM_SID **sid) -{ - SAM_ASSERT(sampass); - - *sid = &(sampass->private.account_sid); - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_pgroup(const SAM_ACCOUNT_HANDLE *sampass, const DOM_SID **sid) -{ - SAM_ASSERT(sampass); - - *sid = &(sampass->private.group_sid); - - return NT_STATUS_OK; -} - -/** - * Get flags showing what is initalised in the SAM_ACCOUNT_HANDLE - * @param sampass the SAM_ACCOUNT_HANDLE in question - * @return the flags indicating the members initialised in the struct. - **/ - -NTSTATUS sam_get_account_init_flag(const SAM_ACCOUNT_HANDLE *sampass, uint32 *initflag) -{ - SAM_ASSERT(sampass); - - *initflag = sampass->private.init_flag; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_name(const SAM_ACCOUNT_HANDLE *sampass, char **account_name) -{ - SAM_ASSERT(sampass); - - *account_name = sampass->private.account_name; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_domain(const SAM_ACCOUNT_HANDLE *sampass, SAM_DOMAIN_HANDLE **domain) -{ - SAM_ASSERT(sampass); - - *domain = sampass->private.domain; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_fullname(const SAM_ACCOUNT_HANDLE *sampass, char **fullname) -{ - SAM_ASSERT(sampass); - - *fullname = sampass->private.full_name; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_homedir(const SAM_ACCOUNT_HANDLE *sampass, char **homedir) -{ - SAM_ASSERT(sampass); - - *homedir = sampass->private.home_dir; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_unix_home_dir(const SAM_ACCOUNT_HANDLE *sampass, char **uhomedir) -{ - SAM_ASSERT(sampass); - - *uhomedir = sampass->private.unix_home_dir; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_dir_drive(const SAM_ACCOUNT_HANDLE *sampass, char **dirdrive) -{ - SAM_ASSERT(sampass); - - *dirdrive = sampass->private.dir_drive; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_logon_script(const SAM_ACCOUNT_HANDLE *sampass, char **logon_script) -{ - SAM_ASSERT(sampass); - - *logon_script = sampass->private.logon_script; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_profile_path(const SAM_ACCOUNT_HANDLE *sampass, char **profile_path) -{ - SAM_ASSERT(sampass); - - *profile_path = sampass->private.profile_path; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_description(const SAM_ACCOUNT_HANDLE *sampass, char **description) -{ - SAM_ASSERT(sampass); - - *description = sampass->private.acct_desc; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_workstations(const SAM_ACCOUNT_HANDLE *sampass, char **workstations) -{ - SAM_ASSERT(sampass); - - *workstations = sampass->private.workstations; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_unknown_str(const SAM_ACCOUNT_HANDLE *sampass, char **unknown_str) -{ - SAM_ASSERT(sampass); - - *unknown_str = sampass->private.unknown_str; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_munged_dial(const SAM_ACCOUNT_HANDLE *sampass, char **munged_dial) -{ - SAM_ASSERT(sampass); - - *munged_dial = sampass->private.munged_dial; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_unknown_1(const SAM_ACCOUNT_HANDLE *sampass, uint32 *unknown1) -{ - SAM_ASSERT(sampass && unknown1); - - *unknown1 = sampass->private.unknown_1; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_unknown_2(const SAM_ACCOUNT_HANDLE *sampass, uint32 *unknown2) -{ - SAM_ASSERT(sampass && unknown2); - - *unknown2 = sampass->private.unknown_2; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_unknown_3(const SAM_ACCOUNT_HANDLE *sampass, uint32 *unknown3) -{ - SAM_ASSERT(sampass && unknown3); - - *unknown3 = sampass->private.unknown_3; - - return NT_STATUS_OK; -} - -/********************************************************************* - Collection of set...() functions for SAM_ACCOUNT_HANDLE_INFO. - ********************************************************************/ - -NTSTATUS sam_set_account_acct_ctrl(SAM_ACCOUNT_HANDLE *sampass, uint16 acct_ctrl) -{ - SAM_ASSERT(sampass); - - sampass->private.acct_ctrl = acct_ctrl; - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_account_logon_time(SAM_ACCOUNT_HANDLE *sampass, NTTIME mytime, BOOL store) -{ - SAM_ASSERT(sampass); - - sampass->private.logon_time = mytime; - - - return NT_STATUS_UNSUCCESSFUL; -} - -NTSTATUS sam_set_account_logoff_time(SAM_ACCOUNT_HANDLE *sampass, NTTIME mytime, BOOL store) -{ - SAM_ASSERT(sampass); - - sampass->private.logoff_time = mytime; - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_account_kickoff_time(SAM_ACCOUNT_HANDLE *sampass, NTTIME mytime, BOOL store) -{ - SAM_ASSERT(sampass); - - sampass->private.kickoff_time = mytime; - - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_account_pass_can_change_time(SAM_ACCOUNT_HANDLE *sampass, NTTIME mytime, BOOL store) -{ - SAM_ASSERT(sampass); - - sampass->private.pass_can_change_time = mytime; - - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_account_pass_must_change_time(SAM_ACCOUNT_HANDLE *sampass, NTTIME mytime, BOOL store) -{ - SAM_ASSERT(sampass); - - sampass->private.pass_must_change_time = mytime; - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_account_pass_last_set_time(SAM_ACCOUNT_HANDLE *sampass, NTTIME mytime) -{ - SAM_ASSERT(sampass); - - sampass->private.pass_last_set_time = mytime; - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_account_hours_len(SAM_ACCOUNT_HANDLE *sampass, uint32 len) -{ - SAM_ASSERT(sampass); - - sampass->private.hours_len = len; - return NT_STATUS_OK; -} - -NTSTATUS sam_set_account_logon_divs(SAM_ACCOUNT_HANDLE *sampass, uint16 hours) -{ - SAM_ASSERT(sampass); - - sampass->private.logon_divs = hours; - return NT_STATUS_OK; -} - -/** - * Set flags showing what is initalised in the SAM_ACCOUNT_HANDLE - * @param sampass the SAM_ACCOUNT_HANDLE in question - * @param flag The *new* flag to be set. Old flags preserved - * this flag is only added. - **/ - -NTSTATUS sam_set_account_init_flag(SAM_ACCOUNT_HANDLE *sampass, uint32 flag) -{ - SAM_ASSERT(sampass); - - sampass->private.init_flag |= flag; - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_account_sid(SAM_ACCOUNT_HANDLE *sampass, const DOM_SID *u_sid) -{ - SAM_ASSERT(sampass && u_sid); - - sid_copy(&sampass->private.account_sid, u_sid); - - DEBUG(10, ("sam_set_account_sid: setting account sid %s\n", - sid_string_static(&sampass->private.account_sid))); - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_account_sid_from_string(SAM_ACCOUNT_HANDLE *sampass, const char *u_sid) -{ - DOM_SID new_sid; - SAM_ASSERT(sampass && u_sid); - - DEBUG(10, ("sam_set_account_sid_from_string: setting account sid %s\n", - u_sid)); - - if (!string_to_sid(&new_sid, u_sid)) { - DEBUG(1, ("sam_set_account_sid_from_string: %s isn't a valid SID!\n", u_sid)); - return NT_STATUS_UNSUCCESSFUL; - } - - if (!NT_STATUS_IS_OK(sam_set_account_sid(sampass, &new_sid))) { - DEBUG(1, ("sam_set_account_sid_from_string: could not set sid %s on SAM_ACCOUNT_HANDLE!\n", u_sid)); - return NT_STATUS_UNSUCCESSFUL; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_account_pgroup_sid(SAM_ACCOUNT_HANDLE *sampass, const DOM_SID *g_sid) -{ - SAM_ASSERT(sampass && g_sid); - - sid_copy(&sampass->private.group_sid, g_sid); - - DEBUG(10, ("sam_set_group_sid: setting group sid %s\n", - sid_string_static(&sampass->private.group_sid))); - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_account_pgroup_string(SAM_ACCOUNT_HANDLE *sampass, const char *g_sid) -{ - DOM_SID new_sid; - SAM_ASSERT(sampass && g_sid); - - DEBUG(10, ("sam_set_group_sid_from_string: setting group sid %s\n", - g_sid)); - - if (!string_to_sid(&new_sid, g_sid)) { - DEBUG(1, ("sam_set_group_sid_from_string: %s isn't a valid SID!\n", g_sid)); - return NT_STATUS_UNSUCCESSFUL; - } - - if (!NT_STATUS_IS_OK(sam_set_account_pgroup_sid(sampass, &new_sid))) { - DEBUG(1, ("sam_set_group_sid_from_string: could not set sid %s on SAM_ACCOUNT_HANDLE!\n", g_sid)); - return NT_STATUS_UNSUCCESSFUL; - } - return NT_STATUS_OK; -} - -/********************************************************************* - Set the domain name. - ********************************************************************/ - -NTSTATUS sam_set_account_domain(SAM_ACCOUNT_HANDLE *sampass, SAM_DOMAIN_HANDLE *domain) -{ - SAM_ASSERT(sampass); - - sampass->private.domain = domain; - - return NT_STATUS_OK; -} - -/********************************************************************* - Set the account's NT name. - ********************************************************************/ - -NTSTATUS sam_set_account_name(SAM_ACCOUNT_HANDLE *sampass, const char *account_name) -{ - SAM_ASSERT(sampass); - - DEBUG(10, ("sam_set_account_name: setting nt account_name %s, was %s\n", account_name, sampass->private.account_name)); - - sampass->private.account_name = talloc_strdup(sampass->mem_ctx, account_name); - - return NT_STATUS_OK; -} - -/********************************************************************* - Set the account's full name. - ********************************************************************/ - -NTSTATUS sam_set_account_fullname(SAM_ACCOUNT_HANDLE *sampass, const char *full_name) -{ - SAM_ASSERT(sampass); - - DEBUG(10, ("sam_set_account_fullname: setting full name %s, was %s\n", full_name, sampass->private.full_name)); - - sampass->private.full_name = talloc_strdup(sampass->mem_ctx, full_name); - - return NT_STATUS_OK; -} - -/********************************************************************* - Set the account's logon script. - ********************************************************************/ - -NTSTATUS sam_set_account_logon_script(SAM_ACCOUNT_HANDLE *sampass, const char *logon_script, BOOL store) -{ - SAM_ASSERT(sampass); - - DEBUG(10, ("sam_set_logon_script: from %s to %s\n", logon_script, sampass->private.logon_script)); - - sampass->private.logon_script = talloc_strdup(sampass->mem_ctx, logon_script); - - - return NT_STATUS_OK; -} - -/********************************************************************* - Set the account's profile path. - ********************************************************************/ - -NTSTATUS sam_set_account_profile_path(SAM_ACCOUNT_HANDLE *sampass, const char *profile_path, BOOL store) -{ - SAM_ASSERT(sampass); - - DEBUG(10, ("sam_set_profile_path: setting profile path %s, was %s\n", profile_path, sampass->private.profile_path)); - - sampass->private.profile_path = talloc_strdup(sampass->mem_ctx, profile_path); - - return NT_STATUS_OK; -} - -/********************************************************************* - Set the account's directory drive. - ********************************************************************/ - -NTSTATUS sam_set_account_dir_drive(SAM_ACCOUNT_HANDLE *sampass, const char *dir_drive, BOOL store) -{ - SAM_ASSERT(sampass); - - DEBUG(10, ("sam_set_dir_drive: setting dir drive %s, was %s\n", dir_drive, - sampass->private.dir_drive)); - - sampass->private.dir_drive = talloc_strdup(sampass->mem_ctx, dir_drive); - - return NT_STATUS_OK; -} - -/********************************************************************* - Set the account's home directory. - ********************************************************************/ - -NTSTATUS sam_set_account_homedir(SAM_ACCOUNT_HANDLE *sampass, const char *home_dir, BOOL store) -{ - SAM_ASSERT(sampass); - - DEBUG(10, ("sam_set_homedir: setting home dir %s, was %s\n", home_dir, - sampass->private.home_dir)); - - sampass->private.home_dir = talloc_strdup(sampass->mem_ctx, home_dir); - - return NT_STATUS_OK; -} - -/********************************************************************* - Set the account's unix home directory. - ********************************************************************/ - -NTSTATUS sam_set_account_unix_homedir(SAM_ACCOUNT_HANDLE *sampass, const char *unix_home_dir) -{ - SAM_ASSERT(sampass); - - DEBUG(10, ("sam_set_unix_homedir: setting home dir %s, was %s\n", unix_home_dir, - sampass->private.unix_home_dir)); - - sampass->private.unix_home_dir = talloc_strdup(sampass->mem_ctx, unix_home_dir); - - return NT_STATUS_OK; -} - -/********************************************************************* - Set the account's account description. - ********************************************************************/ - -NTSTATUS sam_set_account_acct_desc(SAM_ACCOUNT_HANDLE *sampass, const char *acct_desc) -{ - SAM_ASSERT(sampass); - - sampass->private.acct_desc = talloc_strdup(sampass->mem_ctx, acct_desc); - - return NT_STATUS_OK; -} - -/********************************************************************* - Set the account's workstation allowed list. - ********************************************************************/ - -NTSTATUS sam_set_account_workstations(SAM_ACCOUNT_HANDLE *sampass, const char *workstations) -{ - SAM_ASSERT(sampass); - - DEBUG(10, ("sam_set_workstations: setting workstations %s, was %s\n", workstations, - sampass->private.workstations)); - - sampass->private.workstations = talloc_strdup(sampass->mem_ctx, workstations); - - return NT_STATUS_OK; -} - -/********************************************************************* - Set the account's 'unknown_str', whatever the heck this actually is... - ********************************************************************/ - -NTSTATUS sam_set_account_unknown_str(SAM_ACCOUNT_HANDLE *sampass, const char *unknown_str) -{ - SAM_ASSERT(sampass); - - sampass->private.unknown_str = talloc_strdup(sampass->mem_ctx, unknown_str); - - return NT_STATUS_OK; -} - -/********************************************************************* - Set the account's dial string. - ********************************************************************/ - -NTSTATUS sam_set_account_munged_dial(SAM_ACCOUNT_HANDLE *sampass, const char *munged_dial) -{ - SAM_ASSERT(sampass); - - sampass->private.munged_dial = talloc_strdup(sampass->mem_ctx, munged_dial); - - return NT_STATUS_OK; -} - -/********************************************************************* - Set the account's NT hash. - ********************************************************************/ - -NTSTATUS sam_set_account_nt_pwd(SAM_ACCOUNT_HANDLE *sampass, const DATA_BLOB data) -{ - SAM_ASSERT(sampass); - - sampass->private.nt_pw = data; - - return NT_STATUS_OK; -} - -/********************************************************************* - Set the account's LM hash. - ********************************************************************/ - -NTSTATUS sam_set_account_lm_pwd(SAM_ACCOUNT_HANDLE *sampass, const DATA_BLOB data) -{ - SAM_ASSERT(sampass); - - sampass->private.lm_pw = data; - - return NT_STATUS_OK; -} - -/********************************************************************* - Set the account's plaintext password only (base procedure, see helper - below) - ********************************************************************/ - -NTSTATUS sam_set_account_plaintext_pwd(SAM_ACCOUNT_HANDLE *sampass, const char *plain_pwd) -{ - SAM_ASSERT(sampass); - - sampass->private.plaintext_pw = talloc_strdup(sampass->mem_ctx, plain_pwd); - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_account_unknown_1(SAM_ACCOUNT_HANDLE *sampass, uint32 unkn) -{ - SAM_ASSERT(sampass); - - sampass->private.unknown_1 = unkn; - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_account_unknown_2(SAM_ACCOUNT_HANDLE *sampass, uint32 unkn) -{ - SAM_ASSERT(sampass); - - sampass->private.unknown_2 = unkn; - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_account_unknown_3(SAM_ACCOUNT_HANDLE *sampass, uint32 unkn) -{ - SAM_ASSERT(sampass); - - sampass->private.unknown_3 = unkn; - return NT_STATUS_OK; -} - -NTSTATUS sam_set_account_hours(SAM_ACCOUNT_HANDLE *sampass, const uint8 *hours) -{ - SAM_ASSERT(sampass); - - if (!hours) { - memset ((char *)sampass->private.hours, 0, MAX_HOURS_LEN); - return NT_STATUS_OK; - } - - memcpy(sampass->private.hours, hours, MAX_HOURS_LEN); - - return NT_STATUS_OK; -} - -/* Helpful interfaces to the above */ - -/********************************************************************* - Sets the last changed times and must change times for a normal - password change. - ********************************************************************/ - -NTSTATUS sam_set_account_pass_changed_now(SAM_ACCOUNT_HANDLE *sampass) -{ - uint32 expire; - NTTIME temptime; - - SAM_ASSERT(sampass); - - unix_to_nt_time(&temptime, time(NULL)); - if (!NT_STATUS_IS_OK(sam_set_account_pass_last_set_time(sampass, temptime))) - return NT_STATUS_UNSUCCESSFUL; - - if (!account_policy_get(AP_MAX_PASSWORD_AGE, &expire) - || (expire==(uint32)-1)) { - - get_nttime_max(&temptime); - if (!NT_STATUS_IS_OK(sam_set_account_pass_must_change_time(sampass, temptime, False))) - return NT_STATUS_UNSUCCESSFUL; - - } else { - /* FIXME: Add expire to temptime */ - - if (!NT_STATUS_IS_OK(sam_get_account_pass_last_set_time(sampass,&temptime)) || !NT_STATUS_IS_OK(sam_set_account_pass_must_change_time(sampass, temptime,True))) - return NT_STATUS_UNSUCCESSFUL; - } - - return NT_STATUS_OK; -} - -/********************************************************************* - Set the account's PLAINTEXT password. Used as an interface to the above. - Also sets the last change time to NOW. - ********************************************************************/ - -NTSTATUS sam_set_account_passwd(SAM_ACCOUNT_HANDLE *sampass, const char *plaintext) -{ - DATA_BLOB data; - uchar new_lanman_p16[16]; - uchar new_nt_p16[16]; - - SAM_ASSERT(sampass && plaintext); - - nt_lm_owf_gen(plaintext, new_nt_p16, new_lanman_p16); - - data = data_blob(new_nt_p16, 16); - if (!NT_STATUS_IS_OK(sam_set_account_nt_pwd(sampass, data))) - return NT_STATUS_UNSUCCESSFUL; - - data = data_blob(new_lanman_p16, 16); - - if (!NT_STATUS_IS_OK(sam_set_account_lm_pwd(sampass, data))) - return NT_STATUS_UNSUCCESSFUL; - - if (!NT_STATUS_IS_OK(sam_set_account_plaintext_pwd(sampass, plaintext))) - return NT_STATUS_UNSUCCESSFUL; - - if (!NT_STATUS_IS_OK(sam_set_account_pass_changed_now(sampass))) - return NT_STATUS_UNSUCCESSFUL; - - return NT_STATUS_OK; -} - diff --git a/source3/sam/get_set_domain.c b/source3/sam/get_set_domain.c deleted file mode 100644 index c70a4a3f097..00000000000 --- a/source3/sam/get_set_domain.c +++ /dev/null @@ -1,263 +0,0 @@ -/* - Unix SMB/CIFS implementation. - SAM_DOMAIN access routines - Copyright (C) Andrew Bartlett 2002 - Copyright (C) Stefan (metze) Metzmacher 2002 - Copyright (C) Jelmer Vernooij 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" - -#undef DBGC_CLASS -#define DBGC_CLASS DBGC_SAM - -NTSTATUS sam_get_domain_sid(SAM_DOMAIN_HANDLE *domain, const DOM_SID **sid) -{ - SAM_ASSERT(domain &&sid); - - *sid = &(domain->private.sid); - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_domain_num_accounts(SAM_DOMAIN_HANDLE *domain, uint32 *num_accounts) -{ - SAM_ASSERT(domain &&num_accounts); - - *num_accounts = domain->private.num_accounts; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_domain_num_groups(SAM_DOMAIN_HANDLE *domain, uint32 *num_groups) -{ - SAM_ASSERT(domain &&num_groups); - - *num_groups = domain->private.num_groups; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_domain_num_aliases(SAM_DOMAIN_HANDLE *domain, uint32 *num_aliases) -{ - SAM_ASSERT(domain &&num_aliases); - - *num_aliases = domain->private.num_aliases; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_domain_name(SAM_DOMAIN_HANDLE *domain, const char **domain_name) -{ - SAM_ASSERT(domain &&domain_name); - - *domain_name = domain->private.name; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_domain_server(SAM_DOMAIN_HANDLE *domain, const char **server_name) -{ - SAM_ASSERT(domain &&server_name); - - *server_name = domain->private.servername; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_domain_max_pwdage(SAM_DOMAIN_HANDLE *domain, NTTIME *max_passwordage) -{ - SAM_ASSERT(domain &&max_passwordage); - - *max_passwordage = domain->private.max_passwordage; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_domain_min_pwdage(SAM_DOMAIN_HANDLE *domain, NTTIME *min_passwordage) -{ - SAM_ASSERT(domain &&min_passwordage); - - *min_passwordage = domain->private.min_passwordage; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_domain_lockout_duration(SAM_DOMAIN_HANDLE *domain, NTTIME *lockout_duration) -{ - SAM_ASSERT(domain &&lockout_duration); - - *lockout_duration = domain->private.lockout_duration; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_domain_reset_count(SAM_DOMAIN_HANDLE *domain, NTTIME *reset_lockout_count) -{ - SAM_ASSERT(domain &&reset_lockout_count); - - *reset_lockout_count = domain->private.reset_count; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_domain_min_pwdlength(SAM_DOMAIN_HANDLE *domain, uint16 *min_passwordlength) -{ - SAM_ASSERT(domain &&min_passwordlength); - - *min_passwordlength = domain->private.min_passwordlength; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_domain_pwd_history(SAM_DOMAIN_HANDLE *domain, uint16 *password_history) -{ - SAM_ASSERT(domain &&password_history); - - *password_history = domain->private.password_history; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_domain_lockout_count(SAM_DOMAIN_HANDLE *domain, uint16 *lockout_count) -{ - SAM_ASSERT(domain &&lockout_count); - - *lockout_count = domain->private.lockout_count; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_domain_force_logoff(SAM_DOMAIN_HANDLE *domain, BOOL *force_logoff) -{ - SAM_ASSERT(domain &&force_logoff); - - *force_logoff = domain->private.force_logoff; - - return NT_STATUS_OK; -} - - -NTSTATUS sam_get_domain_login_pwdchange(SAM_DOMAIN_HANDLE *domain, BOOL *login_pwdchange) -{ - SAM_ASSERT(domain && login_pwdchange); - - *login_pwdchange = domain->private.login_pwdchange; - - return NT_STATUS_OK; -} - -/* Set */ - -NTSTATUS sam_set_domain_name(SAM_DOMAIN_HANDLE *domain, const char *domain_name) -{ - SAM_ASSERT(domain); - - domain->private.name = talloc_strdup(domain->mem_ctx, domain_name); - - return NT_STATUS_OK; -} - - -NTSTATUS sam_set_domain_max_pwdage(SAM_DOMAIN_HANDLE *domain, NTTIME max_passwordage) -{ - SAM_ASSERT(domain); - - domain->private.max_passwordage = max_passwordage; - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_domain_min_pwdage(SAM_DOMAIN_HANDLE *domain, NTTIME min_passwordage) -{ - SAM_ASSERT(domain); - - domain->private.min_passwordage = min_passwordage; - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_domain_lockout_duration(SAM_DOMAIN_HANDLE *domain, NTTIME lockout_duration) -{ - SAM_ASSERT(domain); - - domain->private.lockout_duration = lockout_duration; - - return NT_STATUS_OK; -} -NTSTATUS sam_set_domain_reset_count(SAM_DOMAIN_HANDLE *domain, NTTIME reset_lockout_count) -{ - SAM_ASSERT(domain); - - domain->private.reset_count = reset_lockout_count; - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_domain_min_pwdlength(SAM_DOMAIN_HANDLE *domain, uint16 min_passwordlength) -{ - SAM_ASSERT(domain); - - domain->private.min_passwordlength = min_passwordlength; - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_domain_pwd_history(SAM_DOMAIN_HANDLE *domain, uint16 password_history) -{ - SAM_ASSERT(domain); - - domain->private.password_history = password_history; - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_domain_lockout_count(SAM_DOMAIN_HANDLE *domain, uint16 lockout_count) -{ - SAM_ASSERT(domain); - - domain->private.lockout_count = lockout_count; - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_domain_force_logoff(SAM_DOMAIN_HANDLE *domain, BOOL force_logoff) -{ - SAM_ASSERT(domain); - - domain->private.force_logoff = force_logoff; - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_domain_login_pwdchange(SAM_DOMAIN_HANDLE *domain, BOOL login_pwdchange) -{ - SAM_ASSERT(domain); - - domain->private.login_pwdchange = login_pwdchange; - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_domain_server(SAM_DOMAIN_HANDLE *domain, const char *server_name) -{ - SAM_ASSERT(domain); - - domain->private.servername = talloc_strdup(domain->mem_ctx, server_name); - - return NT_STATUS_OK; -} diff --git a/source3/sam/get_set_group.c b/source3/sam/get_set_group.c deleted file mode 100644 index 11ea9258a70..00000000000 --- a/source3/sam/get_set_group.c +++ /dev/null @@ -1,106 +0,0 @@ -/* - Unix SMB/CIFS implementation. - SAM_USER_HANDLE access routines - Copyright (C) Andrew Bartlett 2002 - Copyright (C) Stefan (metze) Metzmacher 2002 - Copyright (C) Jelmer Vernooij 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" - -#undef DBGC_CLASS -#define DBGC_CLASS DBGC_SAM - -/* sam group get functions */ - -NTSTATUS sam_get_group_sid(const SAM_GROUP_HANDLE *group, const DOM_SID **sid) -{ - SAM_ASSERT(group && sid); - - *sid = &(group->private.sid); - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_group_ctrl(const SAM_GROUP_HANDLE *group, uint32 *group_ctrl) -{ - SAM_ASSERT(group && group_ctrl); - - *group_ctrl = group->private.group_ctrl; - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_group_name(const SAM_GROUP_HANDLE *group, const char **group_name) -{ - SAM_ASSERT(group); - - *group_name = group->private.group_name; - - return NT_STATUS_OK; - -} -NTSTATUS sam_get_group_comment(const SAM_GROUP_HANDLE *group, const char **group_desc) -{ - SAM_ASSERT(group); - - *group_desc = group->private.group_desc; - - return NT_STATUS_OK; -} - -/* sam group set functions */ - -NTSTATUS sam_set_group_sid(SAM_GROUP_HANDLE *group, const DOM_SID *sid) -{ - SAM_ASSERT(group); - - if (!sid) - ZERO_STRUCT(group->private.sid); - else - sid_copy(&(group->private.sid), sid); - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_group_group_ctrl(SAM_GROUP_HANDLE *group, uint32 group_ctrl) -{ - SAM_ASSERT(group); - - group->private.group_ctrl = group_ctrl; - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_group_name(SAM_GROUP_HANDLE *group, const char *group_name) -{ - SAM_ASSERT(group); - - group->private.group_name = talloc_strdup(group->mem_ctx, group_name); - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_group_description(SAM_GROUP_HANDLE *group, const char *group_desc) -{ - SAM_ASSERT(group); - - group->private.group_desc = talloc_strdup(group->mem_ctx, group_desc); - - return NT_STATUS_OK; - -} diff --git a/source3/sam/group.c b/source3/sam/group.c deleted file mode 100644 index 101e3dd7ce1..00000000000 --- a/source3/sam/group.c +++ /dev/null @@ -1,193 +0,0 @@ -/* - Unix SMB/CIFS implementation. - SAM_GROUP_HANDLE /SAM_GROUP_ENUM helpers - - Copyright (C) Stefan (metze) Metzmacher 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" - -#undef DBGC_CLASS -#define DBGC_CLASS DBGC_SAM - -/************************************************************ - Fill the SAM_GROUP_HANDLE with default values. - ***********************************************************/ - -static void sam_fill_default_group(SAM_GROUP_HANDLE *group) -{ - ZERO_STRUCT(group->private); /* Don't touch the talloc context */ - -} - -static void destroy_sam_group_handle_talloc(SAM_GROUP_HANDLE **group) -{ - if (*group) { - - talloc_destroy((*group)->mem_ctx); - *group = NULL; - } -} - - -/********************************************************************** - Alloc memory and initialises a SAM_GROUP_HANDLE on supplied mem_ctx. -***********************************************************************/ - -NTSTATUS sam_init_group_talloc(TALLOC_CTX *mem_ctx, SAM_GROUP_HANDLE **group) -{ - SMB_ASSERT(*group != NULL); - - if (!mem_ctx) { - DEBUG(0,("sam_init_group_talloc: mem_ctx was NULL!\n")); - return NT_STATUS_UNSUCCESSFUL; - } - - *group=(SAM_GROUP_HANDLE *)talloc(mem_ctx, sizeof(SAM_GROUP_HANDLE)); - - if (*group==NULL) { - DEBUG(0,("sam_init_group_talloc: error while allocating memory\n")); - return NT_STATUS_NO_MEMORY; - } - - (*group)->mem_ctx = mem_ctx; - - (*group)->free_fn = NULL; - - sam_fill_default_group(*group); - - return NT_STATUS_OK; -} - - -/************************************************************* - Alloc memory and initialises a struct SAM_GROUP_HANDLE. - ************************************************************/ - -NTSTATUS sam_init_group(SAM_GROUP_HANDLE **group) -{ - TALLOC_CTX *mem_ctx; - NTSTATUS nt_status; - - mem_ctx = talloc_init("sam internal SAM_GROUP_HANDLE allocation"); - - if (!mem_ctx) { - DEBUG(0,("sam_init_group: error while doing talloc_init()\n")); - return NT_STATUS_NO_MEMORY; - } - - if (!NT_STATUS_IS_OK(nt_status = sam_init_group_talloc(mem_ctx, group))) { - talloc_destroy(mem_ctx); - return nt_status; - } - - (*group)->free_fn = destroy_sam_group_handle_talloc; - - return NT_STATUS_OK; -} - - -/************************************************************ - Reset the SAM_GROUP_HANDLE. - ***********************************************************/ - -NTSTATUS sam_reset_group(SAM_GROUP_HANDLE *group) -{ - SMB_ASSERT(group != NULL); - - sam_fill_default_group(group); - - return NT_STATUS_OK; -} - - -/************************************************************ - Free the SAM_GROUP_HANDLE and the member pointers. - ***********************************************************/ - -NTSTATUS sam_free_group(SAM_ACCOUNT_HANDLE **group) -{ - SMB_ASSERT(*group != NULL); - - if ((*group)->free_fn) { - (*group)->free_fn(group); - } - - return NT_STATUS_OK; -} - - -/********************************************************** - Encode the group control bits into a string. - length = length of string to encode into (including terminating - null). length *MUST BE MORE THAN 2* ! - **********************************************************/ - -char *sam_encode_acct_ctrl(uint16 group_ctrl, size_t length) -{ - static fstring group_str; - size_t i = 0; - - group_str[i++] = '['; - - if (group_ctrl & GCB_LOCAL_GROUP ) group_str[i++] = 'L'; - if (group_ctrl & GCB_GLOBAL_GROUP ) group_str[i++] = 'G'; - - for ( ; i < length - 2 ; i++ ) - group_str[i] = ' '; - - i = length - 2; - group_str[i++] = ']'; - group_str[i++] = '\0'; - - return group_str; -} - -/********************************************************** - Decode the group control bits from a string. - **********************************************************/ - -uint16 sam_decode_group_ctrl(const char *p) -{ - uint16 group_ctrl = 0; - BOOL finished = False; - - /* - * Check if the account type bits have been encoded after the - * NT password (in the form [NDHTUWSLXI]). - */ - - if (*p != '[') - return 0; - - for (p++; *p && !finished; p++) { - switch (*p) { - case 'L': { group_ctrl |= GCB_LOCAL_GROUP; break; /* 'L'ocal Aliases Group. */ } - case 'G': { group_ctrl |= GCB_GLOBAL_GROUP; break; /* 'G'lobal Domain Group. */ } - - case ' ': { break; } - case ':': - case '\n': - case '\0': - case ']': - default: { finished = True; } - } - } - - return group_ctrl; -} - diff --git a/source3/sam/gumm_tdb.c b/source3/sam/gumm_tdb.c deleted file mode 100644 index 5e390490cf0..00000000000 --- a/source3/sam/gumm_tdb.c +++ /dev/null @@ -1,1193 +0,0 @@ -/* - * Unix SMB/CIFS implementation. - * SMB parameters and setup - * Copyright (C) Andrew Tridgell 1992-1998 - * Copyright (C) Simo Sorce 2000-2002 - * Copyright (C) Gerald Carter 2000 - * Copyright (C) Jeremy Allison 2001 - * Copyright (C) Andrew Bartlett 2002 - * - * This program is free software; you can redistribute it and/or modify it under - * the terms of the GNU General Public License as published by the Free - * Software Foundation; either version 2 of the License, or (at your option) - * any later version. - * - * This program is distributed in the hope that it will be useful, but WITHOUT - * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or - * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for - * more details. - * - * You should have received a copy of the GNU General Public License along with - * this program; if not, write to the Free Software Foundation, Inc., 675 - * Mass Ave, Cambridge, MA 02139, USA. - */ - -#include "includes.h" -#include "tdbsam2.h" -#include "tdbsam2_parse_info.h" - -static int tdbgumm_debug_level = DBGC_ALL; -#undef DBGC_CLASS -#define DBGC_CLASS tdbgumm_debug_level - -#define TDBSAM_VERSION 20021215 -#define TDB_FILE_NAME "tdbsam2.tdb" -#define NAMEPREFIX "NAME_" -#define SIDPREFIX "SID_" -#define PRIVILEGEPREFIX "PRIV_" - -#define TDB_FORMAT_STRING "ddB" - -#define TALLOC_CHECK(ptr, err, label) do { if ((ptr) == NULL) { DEBUG(0, ("%s: Out of memory!\n", FUNCTION_MACRO)); err = NT_STATUS_NO_MEMORY; goto label; } } while(0) -#define SET_OR_FAIL(func, label) do { if (NT_STATUS_IS_ERR(func)) { DEBUG(0, ("%s: Setting gums object data failed!\n", FUNCTION_MACRO)); goto label; } } while(0) - -struct tdbsam2_enum_objs { - uint32 type; - fstring dom_sid; - TDB_CONTEXT *db; - TDB_DATA key; - struct tdbsam2_enum_objs *next; -}; - -union tdbsam2_data { - struct tdbsam2_domain_data *domain; - struct tdbsam2_user_data *user; - struct tdbsam2_group_data *group; -}; - -struct tdbsam2_object { - uint32 type; - uint32 version; - union tdbsam2_data data; -}; - -static TDB_CONTEXT *tdbsam2_db; - -struct tdbsam2_enum_objs **teo_handlers; - -static NTSTATUS init_tdbsam2_object_from_buffer(struct tdbsam2_object *object, TALLOC_CTX *mem_ctx, char *buffer, int size) -{ - - NTSTATUS ret = NT_STATUS_UNSUCCESSFUL; - int iret; - char *obj_data; - int data_size = 0; - int len; - - len = tdb_unpack (buffer, size, TDB_FORMAT_STRING, - &(object->version), - &(object->type), - &data_size, &obj_data); - - if (len == -1) - goto done; - - /* version is checked inside this function so that backward compatibility code can be - called eventually. - this way we can easily handle database format upgrades */ - if (object->version != TDBSAM_VERSION) { - DEBUG(3,("init_tdbsam2_object_from_buffer: Error, db object has wrong tdbsam version!\n")); - goto done; - } - - /* be sure the string is terminated before trying to parse it */ - if (obj_data[data_size - 1] != '\0') - obj_data[data_size - 1] = '\0'; - - switch (object->type) { - case GUMS_OBJ_DOMAIN: - object->data.domain = (struct tdbsam2_domain_data *)talloc(mem_ctx, sizeof(struct tdbsam2_domain_data)); - TALLOC_CHECK(object->data.domain, ret, done); - memset(object->data.domain, 0, sizeof(struct tdbsam2_domain_data)); - - iret = gen_parse(mem_ctx, pinfo_tdbsam2_domain_data, (char *)(object->data.domain), obj_data); - break; - case GUMS_OBJ_GROUP: - case GUMS_OBJ_ALIAS: - object->data.group = (struct tdbsam2_group_data *)talloc(mem_ctx, sizeof(struct tdbsam2_group_data)); - TALLOC_CHECK(object->data.group, ret, done); - memset(object->data.group, 0, sizeof(struct tdbsam2_group_data)); - - iret = gen_parse(mem_ctx, pinfo_tdbsam2_group_data, (char *)(object->data.group), obj_data); - break; - case GUMS_OBJ_NORMAL_USER: - object->data.user = (struct tdbsam2_user_data *)talloc(mem_ctx, sizeof(struct tdbsam2_user_data)); - TALLOC_CHECK(object->data.user, ret, done); - memset(object->data.user, 0, sizeof(struct tdbsam2_user_data)); - - iret = gen_parse(mem_ctx, pinfo_tdbsam2_user_data, (char *)(object->data.user), obj_data); - break; - default: - DEBUG(3,("init_tdbsam2_object_from_buffer: Error, wrong object type number!\n")); - goto done; - } - - if (iret != 0) { - DEBUG(0,("init_tdbsam2_object_from_buffer: Fatal Error! Unable to parse object!\n")); - DEBUG(0,("init_tdbsam2_object_from_buffer: DB Corrupted ?")); - goto done; - } - - ret = NT_STATUS_OK; -done: - SAFE_FREE(obj_data); - return ret; -} - -static NTSTATUS init_buffer_from_tdbsam2_object(char **buffer, size_t *len, TALLOC_CTX *mem_ctx, struct tdbsam2_object *object) -{ - - NTSTATUS ret; - char *buf1 = NULL; - size_t buflen; - - if (!buffer) - return NT_STATUS_INVALID_PARAMETER; - - switch (object->type) { - case GUMS_OBJ_DOMAIN: - buf1 = gen_dump(mem_ctx, pinfo_tdbsam2_domain_data, (char *)(object->data.domain), 0); - break; - case GUMS_OBJ_GROUP: - case GUMS_OBJ_ALIAS: - buf1 = gen_dump(mem_ctx, pinfo_tdbsam2_group_data, (char *)(object->data.group), 0); - break; - case GUMS_OBJ_NORMAL_USER: - buf1 = gen_dump(mem_ctx, pinfo_tdbsam2_user_data, (char *)(object->data.user), 0); - break; - default: - DEBUG(3,("init_buffer_from_tdbsam2_object: Error, wrong object type number!\n")); - return NT_STATUS_UNSUCCESSFUL; - } - - if (buf1 == NULL) { - DEBUG(0, ("init_buffer_from_tdbsam2_object: Fatal Error! Unable to dump object!\n")); - return NT_STATUS_UNSUCCESSFUL; - } - - buflen = tdb_pack(NULL, 0, TDB_FORMAT_STRING, - TDBSAM_VERSION, - object->type, - strlen(buf1) + 1, buf1); - - *buffer = talloc(mem_ctx, buflen); - TALLOC_CHECK(*buffer, ret, done); - - *len = tdb_pack(*buffer, buflen, TDB_FORMAT_STRING, - TDBSAM_VERSION, - object->type, - strlen(buf1) + 1, buf1); - - if (*len != buflen) { - DEBUG(0, ("init_tdb_data_from_tdbsam2_object: somthing odd is going on here: bufflen (%d) != len (%d) in tdb_pack operations!\n", - buflen, *len)); - *buffer = NULL; - ret = NT_STATUS_UNSUCCESSFUL; - goto done; - } - - ret = NT_STATUS_OK; -done: - return ret; -} - -static NTSTATUS opentdb(void) -{ - if (!tdbsam2_db) { - pstring tdbfile; - get_private_directory(tdbfile); - pstrcat(tdbfile, "/"); - pstrcat(tdbfile, TDB_FILE_NAME); - - tdbsam2_db = tdb_open_log(tdbfile, 0, TDB_DEFAULT, O_RDWR | O_CREAT, 0600); - if (!tdbsam2_db) - { - DEBUG(0, ("opentdb: Unable to open database (%s)!\n", tdbfile)); - return NT_STATUS_UNSUCCESSFUL; - } - } - - return NT_STATUS_OK; -} - -static NTSTATUS get_object_by_sid(TALLOC_CTX *mem_ctx, struct tdbsam2_object *obj, const DOM_SID *sid) -{ - NTSTATUS ret; - TDB_DATA data, key; - fstring keystr; - - if (!obj || !mem_ctx || !sid) - return NT_STATUS_INVALID_PARAMETER; - - if (NT_STATUS_IS_ERR(ret = opentdb())) { - return ret; - } - - slprintf(keystr, sizeof(keystr)-1, "%s%s", SIDPREFIX, sid_string_static(sid)); - key.dptr = keystr; - key.dsize = strlen(keystr) + 1; - - data = tdb_fetch(tdbsam2_db, key); - if (!data.dptr) { - DEBUG(5, ("get_object_by_sid: Error fetching database, domain entry not found!\n")); - DEBUGADD(5, (" Error: %s\n", tdb_errorstr(tdbsam2_db))); - DEBUGADD(5, (" Key: %s\n", keystr)); - return NT_STATUS_UNSUCCESSFUL; - } - - if (NT_STATUS_IS_ERR(init_tdbsam2_object_from_buffer(obj, mem_ctx, data.dptr, data.dsize))) { - SAFE_FREE(data.dptr); - DEBUG(0, ("get_object_by_sid: Error fetching database, malformed entry!\n")); - return NT_STATUS_UNSUCCESSFUL; - } - SAFE_FREE(data.dptr); - - return NT_STATUS_OK; - -} - -static NTSTATUS get_object_by_name(TALLOC_CTX *mem_ctx, struct tdbsam2_object *obj, const char* name) -{ - - NTSTATUS ret; - TDB_DATA data, key; - fstring keystr; - fstring objname; - DOM_SID sid; - char *obj_sidstr; - int obj_version, obj_type, obj_sidstr_len, len; - - if (!obj || !mem_ctx || !name) - return NT_STATUS_INVALID_PARAMETER; - - if (NT_STATUS_IS_ERR(ret = opentdb())) { - return ret; - } - - unix_strlower(name, -1, objname, sizeof(objname)); - - slprintf(keystr, sizeof(keystr)-1, "%s%s", NAMEPREFIX, objname); - key.dptr = keystr; - key.dsize = strlen(keystr) + 1; - - data = tdb_fetch(tdbsam2_db, key); - if (!data.dptr) { - DEBUG(5, ("get_object_by_name: Error fetching database, domain entry not found!\n")); - DEBUGADD(5, (" Error: %s\n", tdb_errorstr(tdbsam2_db))); - DEBUGADD(5, (" Key: %s\n", keystr)); - return NT_STATUS_UNSUCCESSFUL; - } - - len = tdb_unpack(data.dptr, data.dsize, TDB_FORMAT_STRING, - &obj_version, - &obj_type, - &obj_sidstr_len, &obj_sidstr); - - SAFE_FREE(data.dptr); - - if (len == -1 || obj_version != TDBSAM_VERSION || obj_sidstr_len <= 0) { - DEBUG(5, ("get_object_by_name: Error unpacking database object!\n")); - return NT_STATUS_UNSUCCESSFUL; - } - - if (!string_to_sid(&sid, obj_sidstr)) { - DEBUG(5, ("get_object_by_name: Error invalid sid string found in database object!\n")); - SAFE_FREE(obj_sidstr); - return NT_STATUS_UNSUCCESSFUL; - } - SAFE_FREE(obj_sidstr); - - return get_object_by_sid(mem_ctx, obj, &sid); -} - -static NTSTATUS store_object(TALLOC_CTX *mem_ctx, struct tdbsam2_object *object, BOOL new_obj) -{ - - NTSTATUS ret; - TDB_DATA data, key, key2; - fstring keystr; - fstring namestr; - int flag, r; - - if (NT_STATUS_IS_ERR(ret = opentdb())) { - return ret; - } - - if (new_obj) { - flag = TDB_INSERT; - } else { - flag = TDB_MODIFY; - } - - ret = init_buffer_from_tdbsam2_object(&(data.dptr), &(data.dsize), mem_ctx, object); - if (NT_STATUS_IS_ERR(ret)) - return ret; - - switch (object->type) { - case GUMS_OBJ_DOMAIN: - slprintf(keystr, sizeof(keystr) - 1, "%s%s", SIDPREFIX, sid_string_static(object->data.domain->dom_sid)); - slprintf(namestr, sizeof(namestr) - 1, "%s%s", NAMEPREFIX, object->data.domain->name); - break; - case GUMS_OBJ_GROUP: - case GUMS_OBJ_ALIAS: - slprintf(keystr, sizeof(keystr) - 1, "%s%s", SIDPREFIX, sid_string_static(object->data.group->group_sid)); - slprintf(namestr, sizeof(namestr) - 1, "%s%s", NAMEPREFIX, object->data.group->name); - break; - case GUMS_OBJ_NORMAL_USER: - slprintf(keystr, sizeof(keystr) - 1, "%s%s", SIDPREFIX, sid_string_static(object->data.user->user_sid)); - slprintf(namestr, sizeof(namestr) - 1, "%s%s", NAMEPREFIX, object->data.user->name); - break; - default: - return NT_STATUS_UNSUCCESSFUL; - } - - key.dptr = keystr; - key.dsize = strlen(keystr) + 1; - - if ((r = tdb_store(tdbsam2_db, key, data, flag)) != TDB_SUCCESS) { - DEBUG(0, ("store_object: Unable to modify SAM!\n")); - DEBUGADD(0, (" Error: %s", tdb_errorstr(tdbsam2_db))); - DEBUGADD(0, (" occured while storing the main record (%s)\n", keystr)); - if (r == TDB_ERR_EXISTS) return NT_STATUS_UNSUCCESSFUL; - return NT_STATUS_INTERNAL_DB_ERROR; - } - - key2.dptr = namestr; - key2.dsize = strlen(namestr) + 1; - - if ((r = tdb_store(tdbsam2_db, key2, key, flag)) != TDB_SUCCESS) { - DEBUG(0, ("store_object: Unable to modify SAM!\n")); - DEBUGADD(0, (" Error: %s", tdb_errorstr(tdbsam2_db))); - DEBUGADD(0, (" occured while storing the main record (%s)\n", keystr)); - if (r == TDB_ERR_EXISTS) return NT_STATUS_UNSUCCESSFUL; - return NT_STATUS_INTERNAL_DB_ERROR; - } -/* TODO: update the general database counter */ -/* TODO: update this entry counter too */ - - return NT_STATUS_OK; -} - -static NTSTATUS get_next_sid(TALLOC_CTX *mem_ctx, DOM_SID **sid) -{ - NTSTATUS ret; - struct tdbsam2_object obj; - DOM_SID *dom_sid = get_global_sam_sid(); - uint32 new_rid; - -/* TODO: LOCK DOMAIN OBJECT */ - ret = get_object_by_sid(mem_ctx, &obj, dom_sid); - if (NT_STATUS_IS_ERR(ret)) { - DEBUG(0, ("get_next_sid: unable to get root Domain object!\n")); - ret = NT_STATUS_INTERNAL_DB_ERROR; - goto error; - } - - new_rid = obj.data.domain->next_rid; - - /* Increment the RID Counter */ - obj.data.domain->next_rid++; - - /* Store back Domain object */ - ret = store_object(mem_ctx, &obj, False); - if (NT_STATUS_IS_ERR(ret)) { - DEBUG(0, ("get_next_sid: unable to update root Domain object!\n")); - ret = NT_STATUS_INTERNAL_DB_ERROR; - goto error; - } -/* TODO: UNLOCK DOMAIN OBJECT */ - - *sid = sid_dup_talloc(mem_ctx, dom_sid); - TALLOC_CHECK(*sid, ret, error); - - if (!sid_append_rid(*sid, new_rid)) { - DEBUG(0, ("get_next_sid: unable to build new SID !?!\n")); - ret = NT_STATUS_UNSUCCESSFUL; - goto error; - } - - return NT_STATUS_OK; - -error: - return ret; -} - -static NTSTATUS user_data_to_gums_object(GUMS_OBJECT **object, struct tdbsam2_user_data *userdata) -{ - NTSTATUS ret; - - if (!object || !userdata) { - DEBUG(0, ("tdbsam2_user_data_to_gums_object: no NULL pointers are accepted here!\n")); - return NT_STATUS_UNSUCCESSFUL; - } - - /* userdata->xcounter */ - /* userdata->sec_desc */ - - SET_OR_FAIL(gums_set_object_sid(*object, userdata->user_sid), error); - SET_OR_FAIL(gums_set_object_name(*object, userdata->name), error); - - SET_OR_FAIL(gums_set_user_pri_group(*object, userdata->group_sid), error); - - if (userdata->description) - SET_OR_FAIL(gums_set_object_description(*object, userdata->description), error); - - if (userdata->full_name) - SET_OR_FAIL(gums_set_user_fullname(*object, userdata->full_name), error); - - if (userdata->home_dir) - SET_OR_FAIL(gums_set_user_homedir(*object, userdata->home_dir), error); - - if (userdata->dir_drive) - SET_OR_FAIL(gums_set_user_dir_drive(*object, userdata->dir_drive), error); - - if (userdata->logon_script) - SET_OR_FAIL(gums_set_user_logon_script(*object, userdata->logon_script), error); - - if (userdata->profile_path) - SET_OR_FAIL(gums_set_user_profile_path(*object, userdata->profile_path), error); - - if (userdata->workstations) - SET_OR_FAIL(gums_set_user_workstations(*object, userdata->workstations), error); - - if (userdata->unknown_str) - SET_OR_FAIL(gums_set_user_unknown_str(*object, userdata->unknown_str), error); - - if (userdata->munged_dial) - SET_OR_FAIL(gums_set_user_munged_dial(*object, userdata->munged_dial), error); - - SET_OR_FAIL(gums_set_user_logon_divs(*object, userdata->logon_divs), error); - SET_OR_FAIL(gums_set_user_hours_len(*object, userdata->hours_len), error); - - if (userdata->hours) - SET_OR_FAIL(gums_set_user_hours(*object, userdata->hours), error); - - SET_OR_FAIL(gums_set_user_unknown_3(*object, userdata->unknown_3), error); - SET_OR_FAIL(gums_set_user_unknown_5(*object, userdata->unknown_5), error); - SET_OR_FAIL(gums_set_user_unknown_6(*object, userdata->unknown_6), error); - - SET_OR_FAIL(gums_set_user_logon_time(*object, *(userdata->logon_time)), error); - SET_OR_FAIL(gums_set_user_logoff_time(*object, *(userdata->logoff_time)), error); - SET_OR_FAIL(gums_set_user_kickoff_time(*object, *(userdata->kickoff_time)), error); - SET_OR_FAIL(gums_set_user_pass_last_set_time(*object, *(userdata->pass_last_set_time)), error); - SET_OR_FAIL(gums_set_user_pass_can_change_time(*object, *(userdata->pass_can_change_time)), error); - SET_OR_FAIL(gums_set_user_pass_must_change_time(*object, *(userdata->pass_must_change_time)), error); - - ret = NT_STATUS_OK; - return ret; - -error: - talloc_destroy((*object)->mem_ctx); - *object = NULL; - return ret; -} - -static NTSTATUS group_data_to_gums_object(GUMS_OBJECT **object, struct tdbsam2_group_data *groupdata) -{ - NTSTATUS ret; - - if (!object || !groupdata) { - DEBUG(0, ("tdbsam2_group_data_to_gums_object: no NULL pointers are accepted here!\n")); - return NT_STATUS_UNSUCCESSFUL; - } - - /* groupdata->xcounter */ - /* groupdata->sec_desc */ - - SET_OR_FAIL(gums_set_object_sid(*object, groupdata->group_sid), error); - SET_OR_FAIL(gums_set_object_name(*object, groupdata->name), error); - - if (groupdata->description) - SET_OR_FAIL(gums_set_object_description(*object, groupdata->description), error); - - if (groupdata->count) - SET_OR_FAIL(gums_set_group_members(*object, groupdata->count, groupdata->members), error); - - ret = NT_STATUS_OK; - return ret; - -error: - talloc_destroy((*object)->mem_ctx); - *object = NULL; - return ret; -} - -static NTSTATUS domain_data_to_gums_object(GUMS_OBJECT **object, struct tdbsam2_domain_data *domdata) -{ - - NTSTATUS ret; - - if (!object || !*object || !domdata) { - DEBUG(0, ("tdbsam2_domain_data_to_gums_object: no NULL pointers are accepted here!\n")); - return NT_STATUS_UNSUCCESSFUL; - } - - /* domdata->xcounter */ - /* domdata->sec_desc */ - - SET_OR_FAIL(gums_set_object_sid(*object, domdata->dom_sid), error); - SET_OR_FAIL(gums_set_object_name(*object, domdata->name), error); - - if (domdata->description) - SET_OR_FAIL(gums_set_object_description(*object, domdata->description), error); - - ret = NT_STATUS_OK; - return ret; - -error: - talloc_destroy((*object)->mem_ctx); - *object = NULL; - return ret; -} - -static NTSTATUS data_to_gums_object(GUMS_OBJECT **object, struct tdbsam2_object *data) -{ - - NTSTATUS ret; - - if (!object || !data) { - DEBUG(0, ("tdbsam2_user_data_to_gums_object: no NULL structure pointers are accepted here!\n")); - ret = NT_STATUS_INVALID_PARAMETER; - goto done; - } - - ret = gums_create_object(object, data->type); - if (NT_STATUS_IS_ERR(ret)) { - DEBUG(5, ("tdbsam2_user_data_to_gums_object: error creating gums object!\n")); - goto done; - } - - switch (data->type) { - case GUMS_OBJ_DOMAIN: - ret = domain_data_to_gums_object(object, data->data.domain); - break; - - case GUMS_OBJ_NORMAL_USER: - ret = user_data_to_gums_object(object, data->data.user); - break; - - case GUMS_OBJ_GROUP: - case GUMS_OBJ_ALIAS: - ret = group_data_to_gums_object(object, data->data.group); - break; - - default: - ret = NT_STATUS_UNSUCCESSFUL; - } - -done: - return ret; -} - - -/* GUMM object functions */ - -static NTSTATUS tdbsam2_get_domain_sid(DOM_SID *sid, const char* name) -{ - - NTSTATUS ret; - struct tdbsam2_object obj; - TALLOC_CTX *mem_ctx; - fstring domname; - - if (!sid || !name) - return NT_STATUS_INVALID_PARAMETER; - - mem_ctx = talloc_init("tdbsam2_get_domain_sid"); - if (!mem_ctx) { - DEBUG(0, ("tdbsam2_new_object: Out of memory!\n")); - return NT_STATUS_NO_MEMORY; - } - - if (NT_STATUS_IS_ERR(ret = opentdb())) { - goto done; - } - - unix_strlower(name, -1, domname, sizeof(domname)); - - ret = get_object_by_name(mem_ctx, &obj, domname); - - if (NT_STATUS_IS_ERR(ret)) { - DEBUG(0, ("tdbsam2_get_domain_sid: Error fetching database!\n")); - goto done; - } - - if (obj.type != GUMS_OBJ_DOMAIN) { - DEBUG(5, ("tdbsam2_get_domain_sid: Requested object is not a domain!\n")); - ret = NT_STATUS_UNSUCCESSFUL; - goto done; - } - - sid_copy(sid, obj.data.domain->dom_sid); - - ret = NT_STATUS_OK; - -done: - talloc_destroy(mem_ctx); - return ret; -} - -static NTSTATUS tdbsam2_set_domain_sid (const DOM_SID *sid, const char *name) -{ - - NTSTATUS ret; - struct tdbsam2_object obj; - TALLOC_CTX *mem_ctx; - fstring domname; - - if (!sid || !name) - return NT_STATUS_INVALID_PARAMETER; - - mem_ctx = talloc_init("tdbsam2_set_domain_sid"); - if (!mem_ctx) { - DEBUG(0, ("tdbsam2_new_object: Out of memory!\n")); - return NT_STATUS_NO_MEMORY; - } - - if (tdbsam2_db == NULL) { - if (NT_STATUS_IS_ERR(ret = opentdb())) { - goto done; - } - } - - unix_strlower(name, -1, domname, sizeof(domname)); - -/* TODO: we need to lock this entry until updated! */ - - ret = get_object_by_name(mem_ctx, &obj, domname); - - if (NT_STATUS_IS_ERR(ret)) { - DEBUG(0, ("tdbsam2_get_domain_sid: Error fetching database!\n")); - goto done; - } - - if (obj.type != GUMS_OBJ_DOMAIN) { - DEBUG(5, ("tdbsam2_get_domain_sid: Requested object is not a domain!\n")); - ret = NT_STATUS_UNSUCCESSFUL; - goto done; - } - - sid_copy(obj.data.domain->dom_sid, sid); - - ret = store_object(mem_ctx, &obj, False); - -done: -/* TODO: unlock here */ - if (mem_ctx) talloc_destroy(mem_ctx); - return ret; -} - -/* TODO */ - NTSTATUS (*get_sequence_number) (void); - - -extern DOM_SID global_sid_NULL; - -static NTSTATUS tdbsam2_new_object(DOM_SID *sid, const char *name, const int obj_type) -{ - - NTSTATUS ret; - struct tdbsam2_object obj; - TALLOC_CTX *mem_ctx; - NTTIME zero_time = {0,0}; - const char *defpw = "NOPASSWORDXXXXXX"; - uint8 defhours[21] = {255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255,255}; - - if (!sid || !name) { - DEBUG(0, ("tdbsam2_new_object: no NULL pointers are accepted here!\n")); - return NT_STATUS_INVALID_PARAMETER; - } - - mem_ctx = talloc_init("tdbsam2_new_object"); - if (!mem_ctx) { - DEBUG(0, ("tdbsam2_new_object: Out of memory!\n")); - return NT_STATUS_NO_MEMORY; - } - - obj.type = obj_type; - obj.version = TDBSAM_VERSION; - - switch (obj_type) { - case GUMS_OBJ_NORMAL_USER: - obj.data.user = (struct tdbsam2_user_data *)talloc_zero(mem_ctx, sizeof(struct tdbsam2_user_data)); - TALLOC_CHECK(obj.data.user, ret, done); - - get_next_sid(mem_ctx, &(obj.data.user->user_sid)); - TALLOC_CHECK(obj.data.user->user_sid, ret, done); - sid_copy(sid, obj.data.user->user_sid); - - obj.data.user->name = talloc_strdup(mem_ctx, name); - TALLOC_CHECK(obj.data.user, ret, done); - - obj.data.user->xcounter = 1; - /*obj.data.user->sec_desc*/ - obj.data.user->description = ""; - obj.data.user->group_sid = &global_sid_NULL; - obj.data.user->logon_time = &zero_time; - obj.data.user->logoff_time = &zero_time; - obj.data.user->kickoff_time = &zero_time; - obj.data.user->pass_last_set_time = &zero_time; - obj.data.user->pass_can_change_time = &zero_time; - obj.data.user->pass_must_change_time = &zero_time; - - obj.data.user->full_name = ""; - obj.data.user->home_dir = ""; - obj.data.user->dir_drive = ""; - obj.data.user->logon_script = ""; - obj.data.user->profile_path = ""; - obj.data.user->workstations = ""; - obj.data.user->unknown_str = ""; - obj.data.user->munged_dial = ""; - - obj.data.user->lm_pw_ptr = defpw; - obj.data.user->nt_pw_ptr = defpw; - - obj.data.user->logon_divs = 168; - obj.data.user->hours_len = 21; - obj.data.user->hours = &defhours; - - obj.data.user->unknown_3 = 0x00ffffff; - obj.data.user->unknown_5 = 0x00020000; - obj.data.user->unknown_6 = 0x000004ec; - break; - - case GUMS_OBJ_GROUP: - case GUMS_OBJ_ALIAS: - obj.data.group = (struct tdbsam2_group_data *)talloc_zero(mem_ctx, sizeof(struct tdbsam2_group_data)); - TALLOC_CHECK(obj.data.group, ret, done); - - get_next_sid(mem_ctx, &(obj.data.group->group_sid)); - TALLOC_CHECK(obj.data.group->group_sid, ret, done); - sid_copy(sid, obj.data.group->group_sid); - - obj.data.group->name = talloc_strdup(mem_ctx, name); - TALLOC_CHECK(obj.data.group, ret, done); - - obj.data.group->xcounter = 1; - /*obj.data.group->sec_desc*/ - obj.data.group->description = ""; - - break; - - case GUMS_OBJ_DOMAIN: - - /* FIXME: should we check against global_sam_sid to make it impossible - to store more than one domain ? */ - - obj.data.domain = (struct tdbsam2_domain_data *)talloc_zero(mem_ctx, sizeof(struct tdbsam2_domain_data)); - TALLOC_CHECK(obj.data.domain, ret, done); - - obj.data.domain->dom_sid = sid_dup_talloc(mem_ctx, get_global_sam_sid()); - TALLOC_CHECK(obj.data.domain->dom_sid, ret, done); - sid_copy(sid, obj.data.domain->dom_sid); - - obj.data.domain->name = talloc_strdup(mem_ctx, name); - TALLOC_CHECK(obj.data.domain, ret, done); - - obj.data.domain->xcounter = 1; - /*obj.data.domain->sec_desc*/ - obj.data.domain->next_rid = 0x3e9; - obj.data.domain->description = ""; - - ret = NT_STATUS_OK; - break; - - default: - ret = NT_STATUS_UNSUCCESSFUL; - goto done; - } - - ret = store_object(mem_ctx, &obj, True); - -done: - talloc_destroy(mem_ctx); - return ret; -} - -static NTSTATUS tdbsam2_delete_object(const DOM_SID *sid) -{ - NTSTATUS ret; - struct tdbsam2_object obj; - TALLOC_CTX *mem_ctx; - TDB_DATA data, key; - fstring keystr; - - if (!sid) { - DEBUG(0, ("tdbsam2_delete_object: no NULL pointers are accepted here!\n")); - return NT_STATUS_INVALID_PARAMETER; - } - - mem_ctx = talloc_init("tdbsam2_delete_object"); - if (!mem_ctx) { - DEBUG(0, ("tdbsam2_delete_object: Out of memory!\n")); - return NT_STATUS_NO_MEMORY; - } - - if (tdbsam2_db == NULL) { - if (NT_STATUS_IS_ERR(ret = opentdb())) { - goto done; - } - } - - slprintf(keystr, sizeof(keystr)-1, "%s%s", SIDPREFIX, sid_string_static(sid)); - key.dptr = keystr; - key.dsize = strlen(keystr) + 1; - - data = tdb_fetch(tdbsam2_db, key); - if (!data.dptr) { - DEBUG(5, ("tdbsam2_delete_object: Error fetching database, SID entry not found!\n")); - DEBUGADD(5, (" Error: %s\n", tdb_errorstr(tdbsam2_db))); - DEBUGADD(5, (" Key: %s\n", keystr)); - ret = NT_STATUS_UNSUCCESSFUL; - goto done; - } - - if (tdb_delete(tdbsam2_db, key) != TDB_SUCCESS) { - DEBUG(5, ("tdbsam2_delete_object: Error deleting object!\n")); - DEBUGADD(5, (" Error: %s\n", tdb_errorstr(tdbsam2_db))); - DEBUGADD(5, (" Key: %s\n", keystr)); - ret = NT_STATUS_UNSUCCESSFUL; - goto done; - } - - if (NT_STATUS_IS_ERR(init_tdbsam2_object_from_buffer(&obj, mem_ctx, data.dptr, data.dsize))) { - SAFE_FREE(data.dptr); - DEBUG(0, ("tdbsam2_delete_object: Error fetching database, malformed entry!\n")); - ret = NT_STATUS_UNSUCCESSFUL; - goto done; - } - - switch (obj.type) { - case GUMS_OBJ_DOMAIN: - /* TODO: SHOULD WE ALLOW TO DELETE DOMAINS ? */ - slprintf(keystr, sizeof(keystr) - 1, "%s%s", NAMEPREFIX, obj.data.domain->name); - break; - case GUMS_OBJ_GROUP: - case GUMS_OBJ_ALIAS: - slprintf(keystr, sizeof(keystr) - 1, "%s%s", NAMEPREFIX, obj.data.group->name); - break; - case GUMS_OBJ_NORMAL_USER: - slprintf(keystr, sizeof(keystr) - 1, "%s%s", NAMEPREFIX, obj.data.user->name); - break; - default: - ret = NT_STATUS_UNSUCCESSFUL; - goto done; - } - - key.dptr = keystr; - key.dsize = strlen(keystr) + 1; - - if (tdb_delete(tdbsam2_db, key) != TDB_SUCCESS) { - DEBUG(5, ("tdbsam2_delete_object: Error deleting object!\n")); - DEBUGADD(5, (" Error: %s\n", tdb_errorstr(tdbsam2_db))); - DEBUGADD(5, (" Key: %s\n", keystr)); - ret = NT_STATUS_UNSUCCESSFUL; - goto done; - } - -/* TODO: update the general database counter */ - -done: - SAFE_FREE(data.dptr); - talloc_destroy(mem_ctx); - return ret; -} - -static NTSTATUS tdbsam2_get_object_from_sid(GUMS_OBJECT **object, const DOM_SID *sid, const int obj_type) -{ - NTSTATUS ret; - struct tdbsam2_object obj; - TALLOC_CTX *mem_ctx; - - if (!object || !sid) { - DEBUG(0, ("tdbsam2_get_object_from_sid: no NULL pointers are accepted here!\n")); - return NT_STATUS_INVALID_PARAMETER; - } - - mem_ctx = talloc_init("tdbsam2_get_object_from_sid"); - if (!mem_ctx) { - DEBUG(0, ("tdbsam2_get_object_from_sid: Out of memory!\n")); - return NT_STATUS_NO_MEMORY; - } - - ret = get_object_by_sid(mem_ctx, &obj, sid); - if (NT_STATUS_IS_ERR(ret) || (obj_type && obj.type != obj_type)) { - DEBUG(0, ("tdbsam2_get_object_from_sid: error fetching object or wrong object type!\n")); - goto done; - } - - ret = data_to_gums_object(object, &obj); - if (NT_STATUS_IS_ERR(ret)) { - DEBUG(0, ("tdbsam2_get_object_from_sid: error setting object data!\n")); - goto done; - } - -done: - talloc_destroy(mem_ctx); - return ret; -} - -static NTSTATUS tdbsam2_get_object_from_name(GUMS_OBJECT **object, const char *name, const int obj_type) -{ - NTSTATUS ret; - struct tdbsam2_object obj; - TALLOC_CTX *mem_ctx; - - if (!object || !name) { - DEBUG(0, ("tdbsam2_get_object_from_sid: no NULL pointers are accepted here!\n")); - return NT_STATUS_INVALID_PARAMETER; - } - - mem_ctx = talloc_init("tdbsam2_get_object_from_sid"); - if (!mem_ctx) { - DEBUG(0, ("tdbsam2_get_object_from_sid: Out of memory!\n")); - return NT_STATUS_NO_MEMORY; - } - - ret = get_object_by_name(mem_ctx, &obj, name); - if (NT_STATUS_IS_ERR(ret) || (obj_type && obj.type != obj_type)) { - DEBUG(0, ("tdbsam2_get_object_from_sid: error fetching object or wrong object type!\n")); - goto done; - } - - ret = data_to_gums_object(object, &obj); - if (NT_STATUS_IS_ERR(ret)) { - DEBUG(0, ("tdbsam2_get_object_from_sid: error setting object data!\n")); - goto done; - } - -done: - talloc_destroy(mem_ctx); - return ret; -} - - /* This function is used to get the list of all objects changed since base_time, it is - used to support PDC<->BDC synchronization */ - NTSTATUS (*get_updated_objects) (GUMS_OBJECT **objects, const NTTIME base_time); - -static NTSTATUS tdbsam2_enumerate_objects_start(void *handle, const DOM_SID *sid, const int obj_type) -{ - struct tdbsam2_enum_objs *teo, *t; - pstring tdbfile; - - teo = (struct tdbsam2_enum_objs *)calloc(1, sizeof(struct tdbsam2_enum_objs)); - if (!teo) { - DEBUG(0, ("tdbsam2_enumerate_objects_start: Out of Memory!\n")); - return NT_STATUS_NO_MEMORY; - } - - teo->type = obj_type; - if (sid) { - sid_to_string(teo->dom_sid, sid); - } - - get_private_directory(tdbfile); - pstrcat(tdbfile, "/"); - pstrcat(tdbfile, TDB_FILE_NAME); - - teo->db = tdb_open_log(tdbfile, 0, TDB_DEFAULT, O_RDONLY, 0600); - if (!teo->db) - { - DEBUG(0, ("tdbsam2_enumerate_objects_start: Unable to open database (%s)!\n", tdbfile)); - SAFE_FREE(teo); - return NT_STATUS_UNSUCCESSFUL; - } - - if (!teo_handlers) { - *teo_handlers = teo; - } else { - t = *teo_handlers; - while (t->next) { - t = t->next; - } - t->next = teo; - } - - handle = teo; - - teo->key = tdb_firstkey(teo->db); - - return NT_STATUS_OK; -} - -static NTSTATUS tdbsam2_enumerate_objects_get_next(GUMS_OBJECT **object, void *handle) -{ - NTSTATUS ret; - TALLOC_CTX *mem_ctx; - TDB_DATA data; - struct tdbsam2_enum_objs *teo; - struct tdbsam2_object obj; - const char *prefix = SIDPREFIX; - const int preflen = strlen(prefix); - - if (!object || !handle) { - DEBUG(0, ("tdbsam2_get_object_from_sid: no NULL pointers are accepted here!\n")); - return NT_STATUS_INVALID_PARAMETER; - } - - teo = (struct tdbsam2_enum_objs *)handle; - - mem_ctx = talloc_init("tdbsam2_enumerate_objects_get_next"); - if (!mem_ctx) { - DEBUG(0, ("tdbsam2_enumerate_objects_get_next: Out of memory!\n")); - return NT_STATUS_NO_MEMORY; - } - - while ((teo->key.dsize != 0)) { - int len, version, type, size; - char *ptr; - - if (strncmp(teo->key.dptr, prefix, preflen)) { - teo->key = tdb_nextkey(teo->db, teo->key); - continue; - } - - if (teo->dom_sid) { - if (strncmp(&(teo->key.dptr[preflen]), teo->dom_sid, strlen(teo->dom_sid))) { - teo->key = tdb_nextkey(teo->db, teo->key); - continue; - } - } - - data = tdb_fetch(teo->db, teo->key); - if (!data.dptr) { - DEBUG(5, ("tdbsam2_enumerate_objects_get_next: Error fetching database, SID entry not found!\n")); - DEBUGADD(5, (" Error: %s\n", tdb_errorstr(teo->db))); - DEBUGADD(5, (" Key: %s\n", teo->key.dptr)); - ret = NT_STATUS_UNSUCCESSFUL; - goto done; - } - - len = tdb_unpack (data.dptr, data.dsize, TDB_FORMAT_STRING, - &version, - &type, - &size, &ptr); - - if (len == -1) { - DEBUG(5, ("tdbsam2_enumerate_objects_get_next: Error unable to unpack data!\n")); - ret = NT_STATUS_UNSUCCESSFUL; - goto done; - } - SAFE_FREE(ptr); - - if (teo->type && type != teo->type) { - SAFE_FREE(data.dptr); - data.dsize = 0; - teo->key = tdb_nextkey(teo->db, teo->key); - continue; - } - - break; - } - - if (data.dsize != 0) { - if (NT_STATUS_IS_ERR(init_tdbsam2_object_from_buffer(&obj, mem_ctx, data.dptr, data.dsize))) { - SAFE_FREE(data.dptr); - DEBUG(0, ("tdbsam2_enumerate_objects_get_next: Error fetching database, malformed entry!\n")); - ret = NT_STATUS_UNSUCCESSFUL; - goto done; - } - SAFE_FREE(data.dptr); - } - - ret = data_to_gums_object(object, &obj); - -done: - talloc_destroy(mem_ctx); - return ret; -} - -static NTSTATUS tdbsam2_enumerate_objects_stop(void *handle) -{ - struct tdbsam2_enum_objs *teo, *t, *p; - - teo = (struct tdbsam2_enum_objs *)handle; - - if (*teo_handlers == teo) { - *teo_handlers = teo->next; - } else { - t = *teo_handlers; - while (t != teo) { - p = t; - t = t->next; - if (t == NULL) { - DEBUG(0, ("tdbsam2_enumerate_objects_stop: Error, handle not found!\n")); - return NT_STATUS_UNSUCCESSFUL; - } - } - p = t->next; - } - - tdb_close(teo->db); - SAFE_FREE(teo); - - return NT_STATUS_OK; -} - - /* This function MUST be used ONLY by PDC<->BDC replication code or recovery tools. - Never use this function to update an object in the database, use set_object_values() */ - NTSTATUS (*set_object) (const GUMS_OBJECT *object); - - /* set object values function */ - NTSTATUS (*set_object_values) (DOM_SID *sid, uint32 count, GUMS_DATA_SET *data_set); - - /* Group related functions */ - NTSTATUS (*add_memberss_to_group) (const DOM_SID *group, const DOM_SID **members); - NTSTATUS (*delete_members_from_group) (const DOM_SID *group, const DOM_SID **members); - NTSTATUS (*enumerate_group_members) (DOM_SID **members, const DOM_SID *sid, const int type); - - NTSTATUS (*get_sid_groups) (DOM_SID **groups, const DOM_SID *sid); - - NTSTATUS (*lock_sid) (const DOM_SID *sid); - NTSTATUS (*unlock_sid) (const DOM_SID *sid); - - /* privileges related functions */ - - NTSTATUS (*add_members_to_privilege) (const LUID_ATTR *priv, const DOM_SID **members); - NTSTATUS (*delete_members_from_privilege) (const LUID_ATTR *priv, const DOM_SID **members); - NTSTATUS (*enumerate_privilege_members) (DOM_SID **members, const LUID_ATTR *priv); - NTSTATUS (*get_sid_privileges) (DOM_SID **privs, const DOM_SID *sid); - /* warning!: set_privilege will overwrite a prior existing privilege if such exist */ - NTSTATUS (*set_privilege) (GUMS_PRIVILEGE *priv); - - -int gumm_init(GUMS_FUNCTIONS **storage) -{ - tdbsam2_db = NULL; - teo_handlers = 0; - - return 0; -} - -#if 0 -int main(int argc, char *argv[]) -{ - NTSTATUS ret; - DOM_SID dsid; - - if (argc < 2) { - printf ("not enough arguments!\n"); - exit(0); - } - - if (!lp_load(dyn_CONFIGFILE,True,False,False)) { - fprintf(stderr, "Can't load %s - run testparm to debug it\n", dyn_CONFIGFILE); - exit(1); - } - - ret = tdbsam2_new_object(&dsid, "_domain_", GUMS_OBJ_DOMAIN); - if (NT_STATUS_IS_OK(ret)) { - printf ("_domain_ created, sid=%s\n", sid_string_static(&dsid)); - } else { - printf ("_domain_ creation error n. 0x%08x\n", ret.v); - } - ret = tdbsam2_new_object(&dsid, argv[1], GUMS_OBJ_NORMAL_USER); - if (NT_STATUS_IS_OK(ret)) { - printf ("%s user created, sid=%s\n", argv[1], sid_string_static(&dsid)); - } else { - printf ("%s user creation error n. 0x%08x\n", argv[1], ret.v); - } - - exit(0); -} -#endif diff --git a/source3/sam/gums.c b/source3/sam/gums.c deleted file mode 100644 index a1187406377..00000000000 --- a/source3/sam/gums.c +++ /dev/null @@ -1,161 +0,0 @@ -/* - Unix SMB/CIFS implementation. - Grops and Users Management System initializations. - Copyright (C) Simo Sorce 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" - -/*#undef DBGC_CLASS -#define DBGC_CLASS DBGC_GUMS*/ - -#define GMV_MAJOR 0 -#define GMV_MINOR 1 - -#define PRIV_NONE 0 -#define PRIV_CREATE_TOKEN 1 -#define PRIV_ASSIGNPRIMARYTOKEN 2 -#define PRIV_LOCK_MEMORY 3 -#define PRIV_INCREASE_QUOTA 4 -#define PRIV_MACHINE_ACCOUNT 5 -#define PRIV_TCB 6 -#define PRIV_SECURITY 7 -#define PRIV_TAKE_OWNERSHIP 8 -#define PRIV_LOAD_DRIVER 9 -#define PRIV_SYSTEM_PROFILE 10 -#define PRIV_SYSTEMTIME 11 -#define PRIV_PROF_SINGLE_PROCESS 12 -#define PRIV_INC_BASE_PRIORITY 13 -#define PRIV_CREATE_PAGEFILE 14 -#define PRIV_CREATE_PERMANENT 15 -#define PRIV_BACKUP 16 -#define PRIV_RESTORE 17 -#define PRIV_SHUTDOWN 18 -#define PRIV_DEBUG 19 -#define PRIV_AUDIT 20 -#define PRIV_SYSTEM_ENVIRONMENT 21 -#define PRIV_CHANGE_NOTIFY 22 -#define PRIV_REMOTE_SHUTDOWN 23 -#define PRIV_UNDOCK 24 -#define PRIV_SYNC_AGENT 25 -#define PRIV_ENABLE_DELEGATION 26 -#define PRIV_ALL 255 - - -GUMS_FUNCTIONS *gums_storage; -static void *dl_handle; - -static PRIVS gums_privs[] = { - {PRIV_NONE, "no_privs", "No privilege"}, /* this one MUST be first */ - {PRIV_CREATE_TOKEN, "SeCreateToken", "Create Token"}, - {PRIV_ASSIGNPRIMARYTOKEN, "SeAssignPrimaryToken", "Assign Primary Token"}, - {PRIV_LOCK_MEMORY, "SeLockMemory", "Lock Memory"}, - {PRIV_INCREASE_QUOTA, "SeIncreaseQuotaPrivilege", "Increase Quota Privilege"}, - {PRIV_MACHINE_ACCOUNT, "SeMachineAccount", "Machine Account"}, - {PRIV_TCB, "SeTCB", "TCB"}, - {PRIV_SECURITY, "SeSecurityPrivilege", "Security Privilege"}, - {PRIV_TAKE_OWNERSHIP, "SeTakeOwnershipPrivilege", "Take Ownership Privilege"}, - {PRIV_LOAD_DRIVER, "SeLocalDriverPrivilege", "Local Driver Privilege"}, - {PRIV_SYSTEM_PROFILE, "SeSystemProfilePrivilege", "System Profile Privilege"}, - {PRIV_SYSTEMTIME, "SeSystemtimePrivilege", "System Time"}, - {PRIV_PROF_SINGLE_PROCESS, "SeProfileSingleProcessPrivilege", "Profile Single Process Privilege"}, - {PRIV_INC_BASE_PRIORITY, "SeIncreaseBasePriorityPrivilege", "Increase Base Priority Privilege"}, - {PRIV_CREATE_PAGEFILE, "SeCreatePagefilePrivilege", "Create Pagefile Privilege"}, - {PRIV_CREATE_PERMANENT, "SeCreatePermanent", "Create Permanent"}, - {PRIV_BACKUP, "SeBackupPrivilege", "Backup Privilege"}, - {PRIV_RESTORE, "SeRestorePrivilege", "Restore Privilege"}, - {PRIV_SHUTDOWN, "SeShutdownPrivilege", "Shutdown Privilege"}, - {PRIV_DEBUG, "SeDebugPrivilege", "Debug Privilege"}, - {PRIV_AUDIT, "SeAudit", "Audit"}, - {PRIV_SYSTEM_ENVIRONMENT, "SeSystemEnvironmentPrivilege", "System Environment Privilege"}, - {PRIV_CHANGE_NOTIFY, "SeChangeNotify", "Change Notify"}, - {PRIV_REMOTE_SHUTDOWN, "SeRemoteShutdownPrivilege", "Remote Shutdown Privilege"}, - {PRIV_UNDOCK, "SeUndock", "Undock"}, - {PRIV_SYNC_AGENT, "SeSynchronizationAgent", "Synchronization Agent"}, - {PRIV_ENABLE_DELEGATION, "SeEnableDelegation", "Enable Delegation"}, - {PRIV_ALL, "SaAllPrivs", "All Privileges"} -}; - -NTSTATUS gums_init(const char *module_name) -{ - int (*module_version)(int); - NTSTATUS (*module_init)(); -/* gums_module_init module_init;*/ - NTSTATUS ret = NT_STATUS_UNSUCCESSFUL; - - DEBUG(5, ("Opening gums module %s\n", module_name)); - dl_handle = sys_dlopen(module_name, RTLD_NOW); - if (!dl_handle) { - DEBUG(0, ("ERROR: Failed to load gums module %s, error: %s\n", module_name, sys_dlerror())); - return NT_STATUS_UNSUCCESSFUL; - } - - module_version = sys_dlsym(dl_handle, "gumm_version"); - if (!module_version) { - DEBUG(0, ("ERROR: Failed to find gums module version!\n")); - goto error; - } - - if (module_version(GMV_MAJOR) != GUMS_VERSION_MAJOR) { - DEBUG(0, ("ERROR: Module's major version does not match gums version!\n")); - goto error; - } - - if (module_version(GMV_MINOR) != GUMS_VERSION_MINOR) { - DEBUG(1, ("WARNING: Module's minor version does not match gums version!\n")); - } - - module_init = sys_dlsym(dl_handle, "gumm_init"); - if (!module_init) { - DEBUG(0, ("ERROR: Failed to find gums module's init function!\n")); - goto error; - } - - DEBUG(5, ("Initializing module %s\n", module_name)); - - ret = module_init(&gums_storage); - goto done; - -error: - ret = NT_STATUS_UNSUCCESSFUL; - sys_dlclose(dl_handle); - -done: - return ret; -} - -NTSTATUS gums_unload(void) -{ - NTSTATUS ret; - NTSTATUS (*module_finalize)(); - - if (!dl_handle) - return NT_STATUS_UNSUCCESSFUL; - - module_finalize = sys_dlsym(dl_handle, "gumm_finalize"); - if (!module_finalize) { - DEBUG(0, ("ERROR: Failed to find gums module's init function!\n")); - return NT_STATUS_UNSUCCESSFUL; - } - - DEBUG(5, ("Finalizing module")); - - ret = module_finalize(); - sys_dlclose(dl_handle); - - return ret; -} diff --git a/source3/sam/gums_api.c b/source3/sam/gums_api.c deleted file mode 100644 index 2e5dcd143a8..00000000000 --- a/source3/sam/gums_api.c +++ /dev/null @@ -1,1470 +0,0 @@ -/* - Unix SMB/CIFS implementation. - GUMS structures - Copyright (C) Simo Sorce 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" - - -/******************************************************************* - Create a SEC_ACL structure. -********************************************************************/ - -static SEC_ACL *make_sec_acl(TALLOC_CTX *ctx, uint16 revision, int num_aces, SEC_ACE *ace_list) -{ - SEC_ACL *dst; - int i; - - if((dst = (SEC_ACL *)talloc_zero(ctx,sizeof(SEC_ACL))) == NULL) - return NULL; - - dst->revision = revision; - dst->num_aces = num_aces; - dst->size = SEC_ACL_HEADER_SIZE; - - /* Now we need to return a non-NULL address for the ace list even - if the number of aces required is zero. This is because there - is a distinct difference between a NULL ace and an ace with zero - entries in it. This is achieved by checking that num_aces is a - positive number. */ - - if ((num_aces) && - ((dst->ace = (SEC_ACE *)talloc(ctx, sizeof(SEC_ACE) * num_aces)) - == NULL)) { - return NULL; - } - - for (i = 0; i < num_aces; i++) { - dst->ace[i] = ace_list[i]; /* Structure copy. */ - dst->size += ace_list[i].size; - } - - return dst; -} - - - -/******************************************************************* - Duplicate a SEC_ACL structure. -********************************************************************/ - -static SEC_ACL *dup_sec_acl(TALLOC_CTX *ctx, SEC_ACL *src) -{ - if(src == NULL) - return NULL; - - return make_sec_acl(ctx, src->revision, src->num_aces, src->ace); -} - - - -/******************************************************************* - Creates a SEC_DESC structure -********************************************************************/ - -static SEC_DESC *make_sec_desc(TALLOC_CTX *ctx, uint16 revision, - DOM_SID *owner_sid, DOM_SID *grp_sid, - SEC_ACL *sacl, SEC_ACL *dacl, size_t *sd_size) -{ - SEC_DESC *dst; - uint32 offset = 0; - uint32 offset_sid = SEC_DESC_HEADER_SIZE; - uint32 offset_acl = 0; - - *sd_size = 0; - - if(( dst = (SEC_DESC *)talloc_zero(ctx, sizeof(SEC_DESC))) == NULL) - return NULL; - - dst->revision = revision; - dst->type = SEC_DESC_SELF_RELATIVE; - - if (sacl) dst->type |= SEC_DESC_SACL_PRESENT; - if (dacl) dst->type |= SEC_DESC_DACL_PRESENT; - - dst->off_owner_sid = 0; - dst->off_grp_sid = 0; - dst->off_sacl = 0; - dst->off_dacl = 0; - - if(owner_sid && ((dst->owner_sid = sid_dup_talloc(ctx,owner_sid)) == NULL)) - goto error_exit; - - if(grp_sid && ((dst->grp_sid = sid_dup_talloc(ctx,grp_sid)) == NULL)) - goto error_exit; - - if(sacl && ((dst->sacl = dup_sec_acl(ctx, sacl)) == NULL)) - goto error_exit; - - if(dacl && ((dst->dacl = dup_sec_acl(ctx, dacl)) == NULL)) - goto error_exit; - - offset = 0; - - /* - * Work out the linearization sizes. - */ - if (dst->owner_sid != NULL) { - - if (offset == 0) - offset = SEC_DESC_HEADER_SIZE; - - offset += sid_size(dst->owner_sid); - } - - if (dst->grp_sid != NULL) { - - if (offset == 0) - offset = SEC_DESC_HEADER_SIZE; - - offset += sid_size(dst->grp_sid); - } - - if (dst->sacl != NULL) { - - offset_acl = SEC_DESC_HEADER_SIZE; - - dst->off_sacl = offset_acl; - offset_acl += dst->sacl->size; - offset += dst->sacl->size; - offset_sid += dst->sacl->size; - } - - if (dst->dacl != NULL) { - - if (offset_acl == 0) - offset_acl = SEC_DESC_HEADER_SIZE; - - dst->off_dacl = offset_acl; - offset_acl += dst->dacl->size; - offset += dst->dacl->size; - offset_sid += dst->dacl->size; - } - - *sd_size = (size_t)((offset == 0) ? SEC_DESC_HEADER_SIZE : offset); - - if (dst->owner_sid != NULL) - dst->off_owner_sid = offset_sid; - - /* sid_size() returns 0 if the sid is NULL so this is ok */ - - if (dst->grp_sid != NULL) - dst->off_grp_sid = offset_sid + sid_size(dst->owner_sid); - - return dst; - -error_exit: - - *sd_size = 0; - return NULL; -} - -/******************************************************************* - Duplicate a SEC_DESC structure. -********************************************************************/ - -static SEC_DESC *dup_sec_desc( TALLOC_CTX *ctx, SEC_DESC *src) -{ - size_t dummy; - - if(src == NULL) - return NULL; - - return make_sec_desc( ctx, src->revision, - src->owner_sid, src->grp_sid, src->sacl, - src->dacl, &dummy); -} - - - - - - - -extern GUMS_FUNCTIONS *gums_storage; - -/* Functions to get/set info from a GUMS object */ - -NTSTATUS gums_get_object_type(uint32 *type, const GUMS_OBJECT *obj) -{ - if (!obj) - return NT_STATUS_INVALID_PARAMETER; - - *type = obj->type; - return NT_STATUS_OK; -} - -NTSTATUS gums_create_object(GUMS_OBJECT **obj, uint32 type) -{ - TALLOC_CTX *mem_ctx = talloc_init("gums_create_object"); - GUMS_OBJECT *go; - NTSTATUS ret; - - go = talloc_zero(mem_ctx, sizeof(GUMS_OBJECT)); - go->mem_ctx = mem_ctx; - go->type = type; - go->version = GUMS_OBJECT_VERSION; - - switch(type) { - case GUMS_OBJ_DOMAIN: - break; - -/* - case GUMS_OBJ_WORKSTATION_TRUST: - case GUMS_OBJ_SERVER_TRUST: - case GUMS_OBJ_DOMAIN_TRUST: -*/ - case GUMS_OBJ_NORMAL_USER: - go->data.user = (GUMS_USER *)talloc_zero(mem_ctx, sizeof(GUMS_USER)); - break; - - case GUMS_OBJ_GROUP: - case GUMS_OBJ_ALIAS: - go->data.group = (GUMS_GROUP *)talloc_zero(mem_ctx, sizeof(GUMS_GROUP)); - break; - - default: - /* TODO: throw error */ - ret = NT_STATUS_OBJECT_TYPE_MISMATCH; - goto error; - } - - if (!(go->data.user)) { - ret = NT_STATUS_NO_MEMORY; - DEBUG(0, ("gums_create_object: Out of memory!\n")); - goto error; - } - - *obj = go; - return NT_STATUS_OK; - -error: - talloc_destroy(go->mem_ctx); - *obj = NULL; - return ret; -} - -NTSTATUS gums_get_object_seq_num(uint32 *version, const GUMS_OBJECT *obj) -{ - if (!version || !obj) - return NT_STATUS_INVALID_PARAMETER; - - *version = obj->version; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_object_seq_num(GUMS_OBJECT *obj, uint32 version) -{ - if (!obj) - return NT_STATUS_INVALID_PARAMETER; - - obj->version = version; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_sec_desc(SEC_DESC **sec_desc, const GUMS_OBJECT *obj) -{ - if (!sec_desc || !obj) - return NT_STATUS_INVALID_PARAMETER; - - *sec_desc = obj->sec_desc; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_sec_desc(GUMS_OBJECT *obj, const SEC_DESC *sec_desc) -{ - if (!obj || !sec_desc) - return NT_STATUS_INVALID_PARAMETER; - - obj->sec_desc = dup_sec_desc(obj->mem_ctx, sec_desc); - if (!(obj->sec_desc)) return NT_STATUS_UNSUCCESSFUL; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_object_sid(DOM_SID **sid, const GUMS_OBJECT *obj) -{ - if (!sid || !obj) - return NT_STATUS_INVALID_PARAMETER; - - *sid = obj->sid; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_object_sid(GUMS_OBJECT *obj, const DOM_SID *sid) -{ - if (!obj || !sid) - return NT_STATUS_INVALID_PARAMETER; - - obj->sid = sid_dup_talloc(obj->mem_ctx, sid); - if (!(obj->sid)) return NT_STATUS_UNSUCCESSFUL; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_object_name(char **name, const GUMS_OBJECT *obj) -{ - if (!name || !obj) - return NT_STATUS_INVALID_PARAMETER; - - *name = obj->name; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_object_name(GUMS_OBJECT *obj, const char *name) -{ - if (!obj || !name) - return NT_STATUS_INVALID_PARAMETER; - - obj->name = (char *)talloc_strdup(obj->mem_ctx, name); - if (!(obj->name)) return NT_STATUS_UNSUCCESSFUL; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_object_description(char **description, const GUMS_OBJECT *obj) -{ - if (!description || !obj) - return NT_STATUS_INVALID_PARAMETER; - - *description = obj->description; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_object_description(GUMS_OBJECT *obj, const char *description) -{ - if (!obj || !description) - return NT_STATUS_INVALID_PARAMETER; - - obj->description = (char *)talloc_strdup(obj->mem_ctx, description); - if (!(obj->description)) return NT_STATUS_UNSUCCESSFUL; - return NT_STATUS_OK; -} - -/* User specific functions */ - -/* -NTSTATUS gums_get_object_privileges(PRIVILEGE_SET **priv_set, const GUMS_OBJECT *obj) -{ - if (!priv_set) - return NT_STATUS_INVALID_PARAMETER; - - *priv_set = obj->priv_set; - return NT_STATUS_OK; -} -*/ - -NTSTATUS gums_get_domain_next_rid(uint32 *rid, const GUMS_OBJECT *obj) -{ - if (!obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_DOMAIN) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *rid = obj->data.domain->next_rid; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_domain_next_rid(GUMS_OBJECT *obj, uint32 rid) -{ - if (!obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_DOMAIN) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.domain->next_rid = rid; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_pri_group(DOM_SID **sid, const GUMS_OBJECT *obj) -{ - if (!sid || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *sid = obj->data.user->group_sid; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_pri_group(GUMS_OBJECT *obj, const DOM_SID *sid) -{ - if (!obj || !sid) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->group_sid = sid_dup_talloc(obj->mem_ctx, sid); - if (!(obj->data.user->group_sid)) return NT_STATUS_NO_MEMORY; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_nt_pwd(DATA_BLOB **nt_pwd, const GUMS_OBJECT *obj) -{ - if (!nt_pwd || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *nt_pwd = &(obj->data.user->nt_pw); - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_nt_pwd(GUMS_OBJECT *obj, const DATA_BLOB nt_pwd) -{ - if (!obj || nt_pwd.length != NT_HASH_LEN) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->nt_pw = data_blob_talloc(obj->mem_ctx, nt_pwd.data, nt_pwd.length); - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_lm_pwd(DATA_BLOB **lm_pwd, const GUMS_OBJECT *obj) -{ - if (!lm_pwd || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *lm_pwd = &(obj->data.user->lm_pw); - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_lm_pwd(GUMS_OBJECT *obj, const DATA_BLOB lm_pwd) -{ - if (!obj || lm_pwd.length != LM_HASH_LEN) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->lm_pw = data_blob_talloc(obj->mem_ctx, lm_pwd.data, lm_pwd.length); - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_fullname(char **fullname, const GUMS_OBJECT *obj) -{ - if (!fullname || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *fullname = obj->data.user->full_name; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_fullname(GUMS_OBJECT *obj, const char *fullname) -{ - if (!obj || !fullname) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->full_name = (char *)talloc_strdup(obj->mem_ctx, fullname); - if (!(obj->data.user->full_name)) return NT_STATUS_NO_MEMORY; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_homedir(char **homedir, const GUMS_OBJECT *obj) -{ - if (!homedir || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *homedir = obj->data.user->home_dir; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_homedir(GUMS_OBJECT *obj, const char *homedir) -{ - if (!obj || !homedir) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->home_dir = (char *)talloc_strdup(obj->mem_ctx, homedir); - if (!(obj->data.user->home_dir)) return NT_STATUS_NO_MEMORY; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_dir_drive(char **dirdrive, const GUMS_OBJECT *obj) -{ - if (!dirdrive || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *dirdrive = obj->data.user->dir_drive; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_dir_drive(GUMS_OBJECT *obj, const char *dir_drive) -{ - if (!obj || !dir_drive) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->dir_drive = (char *)talloc_strdup(obj->mem_ctx, dir_drive); - if (!(obj->data.user->dir_drive)) return NT_STATUS_NO_MEMORY; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_logon_script(char **logon_script, const GUMS_OBJECT *obj) -{ - if (!logon_script || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *logon_script = obj->data.user->logon_script; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_logon_script(GUMS_OBJECT *obj, const char *logon_script) -{ - if (!obj || !logon_script) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->logon_script = (char *)talloc_strdup(obj->mem_ctx, logon_script); - if (!(obj->data.user->logon_script)) return NT_STATUS_NO_MEMORY; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_profile_path(char **profile_path, const GUMS_OBJECT *obj) -{ - if (!profile_path || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *profile_path = obj->data.user->profile_path; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_profile_path(GUMS_OBJECT *obj, const char *profile_path) -{ - if (!obj || !profile_path) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->profile_path = (char *)talloc_strdup(obj->mem_ctx, profile_path); - if (!(obj->data.user->profile_path)) return NT_STATUS_NO_MEMORY; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_workstations(char **workstations, const GUMS_OBJECT *obj) -{ - if (!workstations || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *workstations = obj->data.user->workstations; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_workstations(GUMS_OBJECT *obj, const char *workstations) -{ - if (!obj || !workstations) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->workstations = (char *)talloc_strdup(obj->mem_ctx, workstations); - if (!(obj->data.user->workstations)) return NT_STATUS_NO_MEMORY; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_unknown_str(char **unknown_str, const GUMS_OBJECT *obj) -{ - if (!unknown_str || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *unknown_str = obj->data.user->unknown_str; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_unknown_str(GUMS_OBJECT *obj, const char *unknown_str) -{ - if (!obj || !unknown_str) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->unknown_str = (char *)talloc_strdup(obj->mem_ctx, unknown_str); - if (!(obj->data.user->unknown_str)) return NT_STATUS_NO_MEMORY; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_munged_dial(char **munged_dial, const GUMS_OBJECT *obj) -{ - if (!munged_dial || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *munged_dial = obj->data.user->munged_dial; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_munged_dial(GUMS_OBJECT *obj, const char *munged_dial) -{ - if (!obj || !munged_dial) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->munged_dial = (char *)talloc_strdup(obj->mem_ctx, munged_dial); - if (!(obj->data.user->munged_dial)) return NT_STATUS_NO_MEMORY; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_logon_time(NTTIME *logon_time, const GUMS_OBJECT *obj) -{ - if (!logon_time || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *logon_time = obj->data.user->logon_time; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_logon_time(GUMS_OBJECT *obj, NTTIME logon_time) -{ - if (!obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->logon_time = logon_time; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_logoff_time(NTTIME *logoff_time, const GUMS_OBJECT *obj) -{ - if (!logoff_time || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *logoff_time = obj->data.user->logoff_time; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_logoff_time(GUMS_OBJECT *obj, NTTIME logoff_time) -{ - if (!obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->logoff_time = logoff_time; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_kickoff_time(NTTIME *kickoff_time, const GUMS_OBJECT *obj) -{ - if (!kickoff_time || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *kickoff_time = obj->data.user->kickoff_time; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_kickoff_time(GUMS_OBJECT *obj, NTTIME kickoff_time) -{ - if (!obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->kickoff_time = kickoff_time; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_pass_last_set_time(NTTIME *pass_last_set_time, const GUMS_OBJECT *obj) -{ - if (!pass_last_set_time || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *pass_last_set_time = obj->data.user->pass_last_set_time; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_pass_last_set_time(GUMS_OBJECT *obj, NTTIME pass_last_set_time) -{ - if (!obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->pass_last_set_time = pass_last_set_time; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_pass_can_change_time(NTTIME *pass_can_change_time, const GUMS_OBJECT *obj) -{ - if (!pass_can_change_time || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *pass_can_change_time = obj->data.user->pass_can_change_time; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_pass_can_change_time(GUMS_OBJECT *obj, NTTIME pass_can_change_time) -{ - if (!obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->pass_can_change_time = pass_can_change_time; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_pass_must_change_time(NTTIME *pass_must_change_time, const GUMS_OBJECT *obj) -{ - if (!pass_must_change_time || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *pass_must_change_time = obj->data.user->pass_must_change_time; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_pass_must_change_time(GUMS_OBJECT *obj, NTTIME pass_must_change_time) -{ - if (!obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->pass_must_change_time = pass_must_change_time; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_logon_divs(uint16 *logon_divs, const GUMS_OBJECT *obj) -{ - if (!logon_divs || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *logon_divs = obj->data.user->logon_divs; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_logon_divs(GUMS_OBJECT *obj, uint16 logon_divs) -{ - if (!obj || !logon_divs) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->logon_divs = logon_divs; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_hours_len(uint32 *hours_len, const GUMS_OBJECT *obj) -{ - if (!hours_len || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *hours_len = obj->data.user->hours_len; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_hours_len(GUMS_OBJECT *obj, uint32 hours_len) -{ - if (!obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->hours_len = hours_len; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_hours(uint8 **hours, const GUMS_OBJECT *obj) -{ - if (!hours || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *hours = obj->data.user->hours; - return NT_STATUS_OK; -} - -/* WARNING: always set hours_len before hours */ -NTSTATUS gums_set_user_hours(GUMS_OBJECT *obj, const uint8 *hours) -{ - if (!obj || !hours) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - if (obj->data.user->hours_len == 0) - DEBUG(10, ("gums_set_user_hours: Warning, hours_len is zero!\n")); - - obj->data.user->hours = (uint8 *)talloc_memdup(obj->mem_ctx, hours, obj->data.user->hours_len); - if (!(obj->data.user->hours) & (obj->data.user->hours_len != 0)) return NT_STATUS_NO_MEMORY; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_unknown_3(uint32 *unknown_3, const GUMS_OBJECT *obj) -{ - if (!unknown_3 || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *unknown_3 = obj->data.user->unknown_3; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_unknown_3(GUMS_OBJECT *obj, uint32 unknown_3) -{ - if (!obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->unknown_3 = unknown_3; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_unknown_5(uint32 *unknown_5, const GUMS_OBJECT *obj) -{ - if (!unknown_5 || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *unknown_5 = obj->data.user->unknown_5; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_unknown_5(GUMS_OBJECT *obj, uint32 unknown_5) -{ - if (!obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->unknown_5 = unknown_5; - return NT_STATUS_OK; -} - -NTSTATUS gums_get_user_unknown_6(uint32 *unknown_6, const GUMS_OBJECT *obj) -{ - if (!unknown_6 || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *unknown_6 = obj->data.user->unknown_6; - return NT_STATUS_OK; -} - -NTSTATUS gums_set_user_unknown_6(GUMS_OBJECT *obj, uint32 unknown_6) -{ - if (!obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.user->unknown_6 = unknown_6; - return NT_STATUS_OK; -} - -/* Group specific functions */ - -NTSTATUS gums_get_group_members(uint32 *count, DOM_SID **members, const GUMS_OBJECT *obj) -{ - if (!count || !members || !obj) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_GROUP && - obj->type != GUMS_OBJ_ALIAS) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - *count = obj->data.group->count; - *members = *(obj->data.group->members); - return NT_STATUS_OK; -} - -NTSTATUS gums_set_group_members(GUMS_OBJECT *obj, uint32 count, DOM_SID **members) -{ - uint32 n; - - if (!obj || !members || !members) - return NT_STATUS_INVALID_PARAMETER; - - if (obj->type != GUMS_OBJ_GROUP && - obj->type != GUMS_OBJ_ALIAS) - return NT_STATUS_OBJECT_TYPE_MISMATCH; - - obj->data.group->count = count; - n = 0; - do { - obj->data.group->members[n] = sid_dup_talloc(obj->mem_ctx, members[n]); - if (!(obj->data.group->members[n])) return NT_STATUS_NO_MEMORY; - n++; - } while (n < count); - return NT_STATUS_OK; -} - -/* data_store set functions */ - -NTSTATUS gums_create_commit_set(GUMS_COMMIT_SET **com_set, TALLOC_CTX *ctx, DOM_SID *sid, uint32 type) -{ - TALLOC_CTX *mem_ctx; - GUMS_COMMIT_SET *set; - - mem_ctx = talloc_init("commit_set"); - if (mem_ctx == NULL) - return NT_STATUS_NO_MEMORY; - set = (GUMS_COMMIT_SET *)talloc(mem_ctx, sizeof(GUMS_COMMIT_SET)); - if (set == NULL) { - talloc_destroy(mem_ctx); - return NT_STATUS_NO_MEMORY; - } - - set->mem_ctx = mem_ctx; - set->type = type; - sid_copy(&(set->sid), sid); - set->count = 0; - set->data = NULL; - *com_set = set; - - return NT_STATUS_OK; -} - -NTSTATUS gums_cs_set_sec_desc(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, SEC_DESC *sec_desc) -{ - GUMS_DATA_SET *data_set; - SEC_DESC *new_sec_desc; - - if (!mem_ctx || !com_set || !sec_desc) - return NT_STATUS_INVALID_PARAMETER; - - com_set->count = com_set->count + 1; - if (com_set->count == 1) { /* first data set */ - data_set = (GUMS_DATA_SET *)talloc(mem_ctx, sizeof(GUMS_DATA_SET)); - } else { - data_set = (GUMS_DATA_SET *)talloc_realloc(mem_ctx, com_set->data, sizeof(GUMS_DATA_SET) * com_set->count); - } - if (data_set == NULL) - return NT_STATUS_NO_MEMORY; - - com_set->data[0] = data_set; - data_set = ((com_set->data)[com_set->count - 1]); - - data_set->type = GUMS_SET_SEC_DESC; - new_sec_desc = dup_sec_desc(mem_ctx, sec_desc); - if (new_sec_desc == NULL) - return NT_STATUS_NO_MEMORY; - - (SEC_DESC *)(data_set->data) = new_sec_desc; - - return NT_STATUS_OK; -} - -/* -NTSTATUS gums_cs_add_privilege(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, LUID_ATTR priv) -{ - GUMS_DATA_SET *data_set; - LUID_ATTR *new_priv; - - if (!mem_ctx || !com_set) - return NT_STATUS_INVALID_PARAMETER; - - com_set->count = com_set->count + 1; - if (com_set->count == 1) { - data_set = (GUMS_DATA_SET *)talloc(mem_ctx, sizeof(GUMS_DATA_SET)); - } else { - data_set = (GUMS_DATA_SET *)talloc_realloc(mem_ctx, com_set->data, sizeof(GUMS_DATA_SET) * com_set->count); - } - if (data_set == NULL) - return NT_STATUS_NO_MEMORY; - - com_set->data[0] = data_set; - data_set = ((com_set->data)[com_set->count - 1]); - - data_set->type = GUMS_ADD_PRIVILEGE; - if (NT_STATUS_IS_ERR(dupalloc_luid_attr(mem_ctx, &new_priv, priv))) - return NT_STATUS_NO_MEMORY; - - (SEC_DESC *)(data_set->data) = new_priv; - - return NT_STATUS_OK; -} - -NTSTATUS gums_cs_del_privilege(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, LUID_ATTR priv) -{ - GUMS_DATA_SET *data_set; - LUID_ATTR *new_priv; - - if (!mem_ctx || !com_set) - return NT_STATUS_INVALID_PARAMETER; - - com_set->count = com_set->count + 1; - if (com_set->count == 1) { - data_set = (GUMS_DATA_SET *)talloc(mem_ctx, sizeof(GUMS_DATA_SET)); - } else { - data_set = (GUMS_DATA_SET *)talloc_realloc(mem_ctx, com_set->data, sizeof(GUMS_DATA_SET) * com_set->count); - } - if (data_set == NULL) - return NT_STATUS_NO_MEMORY; - - com_set->data[0] = data_set; - data_set = ((com_set->data)[com_set->count - 1]); - - data_set->type = GUMS_DEL_PRIVILEGE; - if (NT_STATUS_IS_ERR(dupalloc_luid_attr(mem_ctx, &new_priv, priv))) - return NT_STATUS_NO_MEMORY; - - (SEC_DESC *)(data_set->data) = new_priv; - - return NT_STATUS_OK; -} - -NTSTATUS gums_cs_set_privilege_set(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, PRIVILEGE_SET *priv_set) -{ - GUMS_DATA_SET *data_set; - PRIVILEGE_SET *new_priv_set; - - if (!mem_ctx || !com_set || !priv_set) - return NT_STATUS_INVALID_PARAMETER; - - com_set->count = com_set->count + 1; - if (com_set->count == 1) { - data_set = (GUMS_DATA_SET *)talloc(mem_ctx, sizeof(GUMS_DATA_SET)); - } else { - data_set = (GUMS_DATA_SET *)talloc_realloc(mem_ctx, com_set->data, sizeof(GUMS_DATA_SET) * com_set->count); - } - if (data_set == NULL) - return NT_STATUS_NO_MEMORY; - - com_set->data[0] = data_set; - data_set = ((com_set->data)[com_set->count - 1]); - - data_set->type = GUMS_SET_PRIVILEGE; - if (NT_STATUS_IS_ERR(dup_priv_set(&new_priv_set, mem_ctx, priv_set))) - return NT_STATUS_NO_MEMORY; - - (SEC_DESC *)(data_set->data) = new_priv_set; - - return NT_STATUS_OK; -} -*/ - -NTSTATUS gums_cs_set_string(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, uint32 type, char *str) -{ - GUMS_DATA_SET *data_set; - char *new_str; - - if (!mem_ctx || !com_set || !str || type < GUMS_SET_NAME || type > GUMS_SET_MUNGED_DIAL) - return NT_STATUS_INVALID_PARAMETER; - - com_set->count = com_set->count + 1; - if (com_set->count == 1) { /* first data set */ - data_set = (GUMS_DATA_SET *)talloc(mem_ctx, sizeof(GUMS_DATA_SET)); - } else { - data_set = (GUMS_DATA_SET *)talloc_realloc(mem_ctx, com_set->data, sizeof(GUMS_DATA_SET) * com_set->count); - } - if (data_set == NULL) - return NT_STATUS_NO_MEMORY; - - com_set->data[0] = data_set; - data_set = ((com_set->data)[com_set->count - 1]); - - data_set->type = type; - new_str = talloc_strdup(mem_ctx, str); - if (new_str == NULL) - return NT_STATUS_NO_MEMORY; - - (char *)(data_set->data) = new_str; - - return NT_STATUS_OK; -} - -NTSTATUS gums_cs_set_name(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, char *name) -{ - return gums_cs_set_string(mem_ctx, com_set, GUMS_SET_NAME, name); -} - -NTSTATUS gums_cs_set_description(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, char *desc) -{ - return gums_cs_set_string(mem_ctx, com_set, GUMS_SET_DESCRIPTION, desc); -} - -NTSTATUS gums_cs_set_full_name(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, char *full_name) -{ - if (com_set->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_INVALID_PARAMETER; - - return gums_cs_set_string(mem_ctx, com_set, GUMS_SET_NAME, full_name); -} - -NTSTATUS gums_cs_set_home_directory(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, char *home_dir) -{ - if (com_set->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_INVALID_PARAMETER; - - return gums_cs_set_string(mem_ctx, com_set, GUMS_SET_NAME, home_dir); -} - -NTSTATUS gums_cs_set_drive(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, char *drive) -{ - if (com_set->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_INVALID_PARAMETER; - - return gums_cs_set_string(mem_ctx, com_set, GUMS_SET_NAME, drive); -} - -NTSTATUS gums_cs_set_logon_script(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, char *logon_script) -{ - if (com_set->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_INVALID_PARAMETER; - - return gums_cs_set_string(mem_ctx, com_set, GUMS_SET_NAME, logon_script); -} - -NTSTATUS gums_cs_set_profile_path(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, char *prof_path) -{ - if (com_set->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_INVALID_PARAMETER; - - return gums_cs_set_string(mem_ctx, com_set, GUMS_SET_NAME, prof_path); -} - -NTSTATUS gums_cs_set_workstations(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, char *wks) -{ - if (com_set->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_INVALID_PARAMETER; - - return gums_cs_set_string(mem_ctx, com_set, GUMS_SET_NAME, wks); -} - -NTSTATUS gums_cs_set_unknown_string(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, char *unkn_str) -{ - if (com_set->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_INVALID_PARAMETER; - - return gums_cs_set_string(mem_ctx, com_set, GUMS_SET_NAME, unkn_str); -} - -NTSTATUS gums_cs_set_munged_dial(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, char *munged_dial) -{ - if (com_set->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_INVALID_PARAMETER; - - return gums_cs_set_string(mem_ctx, com_set, GUMS_SET_NAME, munged_dial); -} - -NTSTATUS gums_cs_set_nttime(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, uint32 type, NTTIME *nttime) -{ - GUMS_DATA_SET *data_set; - NTTIME *new_time; - - if (!mem_ctx || !com_set || !nttime || type < GUMS_SET_LOGON_TIME || type > GUMS_SET_PASS_MUST_CHANGE_TIME) - return NT_STATUS_INVALID_PARAMETER; - - com_set->count = com_set->count + 1; - if (com_set->count == 1) { /* first data set */ - data_set = (GUMS_DATA_SET *)talloc(mem_ctx, sizeof(GUMS_DATA_SET)); - } else { - data_set = (GUMS_DATA_SET *)talloc_realloc(mem_ctx, com_set->data, sizeof(GUMS_DATA_SET) * com_set->count); - } - if (data_set == NULL) - return NT_STATUS_NO_MEMORY; - - com_set->data[0] = data_set; - data_set = ((com_set->data)[com_set->count - 1]); - - data_set->type = type; - new_time = talloc(mem_ctx, sizeof(NTTIME)); - if (new_time == NULL) - return NT_STATUS_NO_MEMORY; - - new_time->low = nttime->low; - new_time->high = nttime->high; - (char *)(data_set->data) = new_time; - - return NT_STATUS_OK; -} - -NTSTATUS gums_cs_set_logon_time(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, NTTIME *logon_time) -{ - if (com_set->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_INVALID_PARAMETER; - - return gums_cs_set_nttime(mem_ctx, com_set, GUMS_SET_LOGON_TIME, logon_time); -} - -NTSTATUS gums_cs_set_logoff_time(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, NTTIME *logoff_time) -{ - if (com_set->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_INVALID_PARAMETER; - - return gums_cs_set_nttime(mem_ctx, com_set, GUMS_SET_LOGOFF_TIME, logoff_time); -} - -NTSTATUS gums_cs_set_kickoff_time(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, NTTIME *kickoff_time) -{ - if (com_set->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_INVALID_PARAMETER; - - return gums_cs_set_nttime(mem_ctx, com_set, GUMS_SET_KICKOFF_TIME, kickoff_time); -} - -NTSTATUS gums_cs_set_pass_last_set_time(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, NTTIME *pls_time) -{ - if (com_set->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_INVALID_PARAMETER; - - return gums_cs_set_nttime(mem_ctx, com_set, GUMS_SET_LOGON_TIME, pls_time); -} - -NTSTATUS gums_cs_set_pass_can_change_time(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, NTTIME *pcc_time) -{ - if (com_set->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_INVALID_PARAMETER; - - return gums_cs_set_nttime(mem_ctx, com_set, GUMS_SET_LOGON_TIME, pcc_time); -} - -NTSTATUS gums_cs_set_pass_must_change_time(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, NTTIME *pmc_time) -{ - if (com_set->type != GUMS_OBJ_NORMAL_USER) - return NT_STATUS_INVALID_PARAMETER; - - return gums_cs_set_nttime(mem_ctx, com_set, GUMS_SET_LOGON_TIME, pmc_time); -} - -NTSTATUS gums_cs_add_sids_to_group(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, const DOM_SID **sids, const uint32 count) -{ - GUMS_DATA_SET *data_set; - DOM_SID **new_sids; - int i; - - if (!mem_ctx || !com_set || !sids) - return NT_STATUS_INVALID_PARAMETER; - - com_set->count = com_set->count + 1; - if (com_set->count == 1) { /* first data set */ - data_set = (GUMS_DATA_SET *)talloc(mem_ctx, sizeof(GUMS_DATA_SET)); - } else { - data_set = (GUMS_DATA_SET *)talloc_realloc(mem_ctx, com_set->data, sizeof(GUMS_DATA_SET) * com_set->count); - } - if (data_set == NULL) - return NT_STATUS_NO_MEMORY; - - com_set->data[0] = data_set; - data_set = ((com_set->data)[com_set->count - 1]); - - data_set->type = GUMS_ADD_SID_LIST; - new_sids = (DOM_SID **)talloc(mem_ctx, (sizeof(void *) * count)); - if (new_sids == NULL) - return NT_STATUS_NO_MEMORY; - for (i = 0; i < count; i++) { - new_sids[i] = sid_dup_talloc(mem_ctx, sids[i]); - if (new_sids[i] == NULL) - return NT_STATUS_NO_MEMORY; - } - - (SEC_DESC *)(data_set->data) = new_sids; - - return NT_STATUS_OK; -} - -NTSTATUS gums_cs_add_users_to_group(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, const DOM_SID **sids, const uint32 count) -{ - if (!mem_ctx || !com_set || !sids) - return NT_STATUS_INVALID_PARAMETER; - if (com_set->type != GUMS_OBJ_GROUP || com_set->type != GUMS_OBJ_ALIAS) - return NT_STATUS_INVALID_PARAMETER; - - return gums_cs_add_sids_to_group(mem_ctx, com_set, sids, count); -} - -NTSTATUS gums_cs_add_groups_to_group(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, const DOM_SID **sids, const uint32 count) -{ - if (!mem_ctx || !com_set || !sids) - return NT_STATUS_INVALID_PARAMETER; - if (com_set->type != GUMS_OBJ_ALIAS) - return NT_STATUS_INVALID_PARAMETER; - - return gums_cs_add_sids_to_group(mem_ctx, com_set, sids, count); -} - -NTSTATUS gums_cs_del_sids_from_group(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, const DOM_SID **sids, const uint32 count) -{ - GUMS_DATA_SET *data_set; - DOM_SID **new_sids; - int i; - - if (!mem_ctx || !com_set || !sids) - return NT_STATUS_INVALID_PARAMETER; - if (com_set->type != GUMS_OBJ_GROUP || com_set->type != GUMS_OBJ_ALIAS) - return NT_STATUS_INVALID_PARAMETER; - - com_set->count = com_set->count + 1; - if (com_set->count == 1) { /* first data set */ - data_set = (GUMS_DATA_SET *)talloc(mem_ctx, sizeof(GUMS_DATA_SET)); - } else { - data_set = (GUMS_DATA_SET *)talloc_realloc(mem_ctx, com_set->data, sizeof(GUMS_DATA_SET) * com_set->count); - } - if (data_set == NULL) - return NT_STATUS_NO_MEMORY; - - com_set->data[0] = data_set; - data_set = ((com_set->data)[com_set->count - 1]); - - data_set->type = GUMS_DEL_SID_LIST; - new_sids = (DOM_SID **)talloc(mem_ctx, (sizeof(void *) * count)); - if (new_sids == NULL) - return NT_STATUS_NO_MEMORY; - for (i = 0; i < count; i++) { - new_sids[i] = sid_dup_talloc(mem_ctx, sids[i]); - if (new_sids[i] == NULL) - return NT_STATUS_NO_MEMORY; - } - - (SEC_DESC *)(data_set->data) = new_sids; - - return NT_STATUS_OK; -} - -NTSTATUS gums_ds_set_sids_in_group(TALLOC_CTX *mem_ctx, GUMS_COMMIT_SET *com_set, const DOM_SID **sids, const uint32 count) -{ - GUMS_DATA_SET *data_set; - DOM_SID **new_sids; - int i; - - if (!mem_ctx || !com_set || !sids) - return NT_STATUS_INVALID_PARAMETER; - if (com_set->type != GUMS_OBJ_GROUP || com_set->type != GUMS_OBJ_ALIAS) - return NT_STATUS_INVALID_PARAMETER; - - com_set->count = com_set->count + 1; - if (com_set->count == 1) { /* first data set */ - data_set = (GUMS_DATA_SET *)talloc(mem_ctx, sizeof(GUMS_DATA_SET)); - } else { - data_set = (GUMS_DATA_SET *)talloc_realloc(mem_ctx, com_set->data, sizeof(GUMS_DATA_SET) * com_set->count); - } - if (data_set == NULL) - return NT_STATUS_NO_MEMORY; - - com_set->data[0] = data_set; - data_set = ((com_set->data)[com_set->count - 1]); - - data_set->type = GUMS_SET_SID_LIST; - new_sids = (DOM_SID **)talloc(mem_ctx, (sizeof(void *) * count)); - if (new_sids == NULL) - return NT_STATUS_NO_MEMORY; - for (i = 0; i < count; i++) { - new_sids[i] = sid_dup_talloc(mem_ctx, sids[i]); - if (new_sids[i] == NULL) - return NT_STATUS_NO_MEMORY; - } - - (SEC_DESC *)(data_set->data) = new_sids; - - return NT_STATUS_OK; -} - - -NTSTATUS gums_commit_data(GUMS_COMMIT_SET *set) -{ - return gums_storage->set_object_values(&(set->sid), set->count, set->data); -} - -NTSTATUS gums_destroy_commit_set(GUMS_COMMIT_SET **com_set) -{ - talloc_destroy((*com_set)->mem_ctx); - *com_set = NULL; - - return NT_STATUS_OK; -} - diff --git a/source3/sam/gums_helper.c b/source3/sam/gums_helper.c deleted file mode 100644 index c22e6cf7ff8..00000000000 --- a/source3/sam/gums_helper.c +++ /dev/null @@ -1,610 +0,0 @@ -/* - Unix SMB/CIFS implementation. - GUMS backends helper functions - Copyright (C) Simo Sorce 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" - -extern GUMS_FUNCTIONS *gums_storage; - -extern DOM_SID global_sid_World; -extern DOM_SID global_sid_Builtin_Administrators; -extern DOM_SID global_sid_Builtin_Power_Users; -extern DOM_SID global_sid_Builtin_Account_Operators; -extern DOM_SID global_sid_Builtin_Server_Operators; -extern DOM_SID global_sid_Builtin_Print_Operators; -extern DOM_SID global_sid_Builtin_Backup_Operators; -extern DOM_SID global_sid_Builtin_Replicator; -extern DOM_SID global_sid_Builtin_Users; -extern DOM_SID global_sid_Builtin_Guests; - - -/* defines */ - -#define ALLOC_CHECK(str, ptr, err, label) do { if ((ptr) == NULL) { DEBUG(0, ("%s: out of memory!\n", str)); err = NT_STATUS_NO_MEMORY; goto label; } } while(0) -#define NTSTATUS_CHECK(str1, str2, err, label) do { if (NT_STATUS_IS_ERR(err)) { DEBUG(0, ("%s: %s failed!\n", str1, str2)); } } while(0) - -/**************************************************************************** - Check if a user is a mapped group. - - This function will check if the group SID is mapped onto a - system managed gid or onto a winbind manged sid. - In the first case it will be threated like a mapped group - and the backend should take the member list with a getgrgid - and ignore any user that have been possibly set into the group - object. - - In the second case, the group is a fully SAM managed group - served back to the system through winbind. In this case the - members of a Local group are "unrolled" to cope with the fact - that unix cannot contain groups inside groups. - The backend MUST never call any getgr* / getpw* function or - loops with winbind may happen. - ****************************************************************************/ - -#if 0 -NTSTATUS is_mapped_group(BOOL *mapped, const DOM_SID *sid) -{ - NTSTATUS result; - gid_t id; - - /* look if mapping exist, do not make idmap alloc an uid if SID is not found */ - result = idmap_get_gid_from_sid(&id, sid, False); - if (NT_STATUS_IS_OK(result)) { - *mapped = gid_is_in_winbind_range(id); - } else { - *mapped = False; - } - - return result; -} -#endif - -/**************************************************************************** - duplicate alloc luid_attr - ****************************************************************************/ -NTSTATUS dupalloc_luid_attr(TALLOC_CTX *ctx, LUID_ATTR **new_la, LUID_ATTR old_la) -{ - *new_la = (LUID_ATTR *)talloc(ctx, sizeof(LUID_ATTR)); - if (*new_la == NULL) { - DEBUG(0,("dupalloc_luid_attr: could not Alloc memory to duplicate LUID_ATTR\n")); - return NT_STATUS_NO_MEMORY; - } - - (*new_la)->luid.high = old_la.luid.high; - (*new_la)->luid.low = old_la.luid.low; - (*new_la)->attr = old_la.attr; - - return NT_STATUS_OK; -} - -/**************************************************************************** - initialise a privilege list - ****************************************************************************/ -void gums_init_privilege(PRIVILEGE_SET *priv_set) -{ - priv_set->count=0; - priv_set->control=0; - priv_set->set=NULL; -} - -/**************************************************************************** - add a privilege to a privilege array - ****************************************************************************/ -NTSTATUS gums_add_privilege(PRIVILEGE_SET *priv_set, TALLOC_CTX *ctx, LUID_ATTR set) -{ - LUID_ATTR *new_set; - - /* check if the privilege is not already in the list */ - if (gums_check_priv_in_privilege(priv_set, set)) - return NT_STATUS_UNSUCCESSFUL; - - /* we can allocate memory to add the new privilege */ - - new_set=(LUID_ATTR *)talloc_realloc(ctx, priv_set->set, (priv_set->count+1)*(sizeof(LUID_ATTR))); - if (new_set==NULL) { - DEBUG(0,("add_privilege: could not Realloc memory to add a new privilege\n")); - return NT_STATUS_NO_MEMORY; - } - - new_set[priv_set->count].luid.high=set.luid.high; - new_set[priv_set->count].luid.low=set.luid.low; - new_set[priv_set->count].attr=set.attr; - - priv_set->count++; - priv_set->set=new_set; - - return NT_STATUS_OK; -} - -/**************************************************************************** - add all the privileges to a privilege array - ****************************************************************************/ -NTSTATUS gums_add_all_privilege(PRIVILEGE_SET *priv_set, TALLOC_CTX *ctx) -{ - NTSTATUS result = NT_STATUS_OK; - LUID_ATTR set; - - set.attr=0; - set.luid.high=0; - - set.luid.low=SE_PRIV_ADD_USERS; - result = gums_add_privilege(priv_set, ctx, set); - NTSTATUS_CHECK("add_all_privilege", "add_privilege", result, done); - - set.luid.low=SE_PRIV_ADD_MACHINES; - result = gums_add_privilege(priv_set, ctx, set); - NTSTATUS_CHECK("add_all_privilege", "add_privilege", result, done); - - set.luid.low=SE_PRIV_PRINT_OPERATOR; - result = gums_add_privilege(priv_set, ctx, set); - NTSTATUS_CHECK("add_all_privilege", "add_privilege", result, done); - -done: - return result; -} - -/**************************************************************************** - check if the privilege list is empty - ****************************************************************************/ -BOOL gums_check_empty_privilege(PRIVILEGE_SET *priv_set) -{ - return (priv_set->count == 0); -} - -/**************************************************************************** - check if the privilege is in the privilege list - ****************************************************************************/ -BOOL gums_check_priv_in_privilege(PRIVILEGE_SET *priv_set, LUID_ATTR set) -{ - int i; - - /* if the list is empty, obviously we can't have it */ - if (gums_check_empty_privilege(priv_set)) - return False; - - for (i=0; icount; i++) { - LUID_ATTR *cur_set; - - cur_set=&priv_set->set[i]; - /* check only the low and high part. Checking the attr field has no meaning */ - if( (cur_set->luid.low==set.luid.low) && (cur_set->luid.high==set.luid.high) ) - return True; - } - - return False; -} - -/**************************************************************************** - remove a privilege from a privilege array - ****************************************************************************/ -NTSTATUS gums_remove_privilege(PRIVILEGE_SET *priv_set, TALLOC_CTX *ctx, LUID_ATTR set) -{ - LUID_ATTR *new_set; - LUID_ATTR *old_set; - int i,j; - - /* check if the privilege is in the list */ - if (!gums_check_priv_in_privilege(priv_set, set)) - return NT_STATUS_UNSUCCESSFUL; - - /* special case if it's the only privilege in the list */ - if (priv_set->count==1) { - gums_init_privilege(priv_set); - return NT_STATUS_OK; - } - - /* - * the privilege is there, create a new list, - * and copy the other privileges - */ - - old_set = priv_set->set; - - new_set=(LUID_ATTR *)talloc(ctx, (priv_set->count - 1) * (sizeof(LUID_ATTR))); - if (new_set==NULL) { - DEBUG(0,("remove_privilege: could not malloc memory for new privilege list\n")); - return NT_STATUS_NO_MEMORY; - } - - for (i=0, j=0; icount; i++) { - if ((old_set[i].luid.low == set.luid.low) && - (old_set[i].luid.high == set.luid.high)) { - continue; - } - - new_set[j].luid.low = old_set[i].luid.low; - new_set[j].luid.high = old_set[i].luid.high; - new_set[j].attr = old_set[i].attr; - - j++; - } - - if (j != priv_set->count - 1) { - DEBUG(0,("remove_privilege: mismatch ! difference is not -1\n")); - DEBUGADD(0,("old count:%d, new count:%d\n", priv_set->count, j)); - return NT_STATUS_INTERNAL_ERROR; - } - - /* ok everything is fine */ - - priv_set->count--; - priv_set->set=new_set; - - return NT_STATUS_OK; -} - -/**************************************************************************** - duplicates a privilege array - ****************************************************************************/ -NTSTATUS gums_dup_priv_set(PRIVILEGE_SET **new_priv_set, TALLOC_CTX *mem_ctx, PRIVILEGE_SET *priv_set) -{ - LUID_ATTR *new_set; - LUID_ATTR *old_set; - int i; - - *new_priv_set = (PRIVILEGE_SET *)talloc(mem_ctx, sizeof(PRIVILEGE_SET)); - gums_init_privilege(*new_priv_set); - - /* special case if there are no privileges in the list */ - if (priv_set->count == 0) { - return NT_STATUS_OK; - } - - /* - * create a new list, - * and copy the other privileges - */ - - old_set = priv_set->set; - - new_set = (LUID_ATTR *)talloc(mem_ctx, (priv_set->count - 1) * (sizeof(LUID_ATTR))); - if (new_set==NULL) { - DEBUG(0,("remove_privilege: could not malloc memory for new privilege list\n")); - return NT_STATUS_NO_MEMORY; - } - - for (i=0; i < priv_set->count; i++) { - - new_set[i].luid.low = old_set[i].luid.low; - new_set[i].luid.high = old_set[i].luid.high; - new_set[i].attr = old_set[i].attr; - } - - (*new_priv_set)->count = priv_set->count; - (*new_priv_set)->control = priv_set->control; - (*new_priv_set)->set = new_set; - - return NT_STATUS_OK; -} - -#define ALIAS_DEFAULT_SACL_SA_RIGHTS 0x01050013 -#define ALIAS_DEFAULT_DACL_SA_RIGHTS \ - (READ_CONTROL_ACCESS | \ - SA_RIGHT_ALIAS_LOOKUP_INFO | \ - SA_RIGHT_ALIAS_GET_MEMBERS) /* 0x0002000c */ - -#define ALIAS_DEFAULT_SACL_SEC_ACE_FLAG (SEC_ACE_FLAG_FAILED_ACCESS | SEC_ACE_FLAG_SUCCESSFUL_ACCESS) /* 0xc0 */ - - -#if 0 -NTSTATUS create_builtin_alias_default_sec_desc(SEC_DESC **sec_desc, TALLOC_CTX *ctx) -{ - DOM_SID *world = &global_sid_World; - DOM_SID *admins = &global_sid_Builtin_Administrators; - SEC_ACCESS sa; - SEC_ACE sacl_ace; - SEC_ACE dacl_aces[2]; - SEC_ACL *sacl = NULL; - SEC_ACL *dacl = NULL; - size_t psize; - - init_sec_access(&sa, ALIAS_DEFAULT_SACL_SA_RIGHTS); - init_sec_ace(&sacl_ace, world, SEC_ACE_TYPE_SYSTEM_AUDIT, sa, ALIAS_DEFAULT_SACL_SEC_ACE_FLAG); - - sacl = make_sec_acl(ctx, NT4_ACL_REVISION, 1, &sacl_ace); - if (!sacl) { - DEBUG(0, ("build_init_sec_desc: Failed to make SEC_ACL.\n")); - return NT_STATUS_NO_MEMORY; - } - - init_sec_access(&sa, ALIAS_DEFAULT_DACL_SA_RIGHTS); - init_sec_ace(&(dacl_aces[0]), world, SEC_ACE_TYPE_ACCESS_ALLOWED, sa, 0); - init_sec_access(&sa, SA_RIGHT_ALIAS_ALL_ACCESS); - init_sec_ace(&(dacl_aces[1]), admins, SEC_ACE_TYPE_ACCESS_ALLOWED, sa, 0); - - dacl = make_sec_acl(ctx, NT4_ACL_REVISION, 2, dacl_aces); - if (!sacl) { - DEBUG(0, ("build_init_sec_desc: Failed to make SEC_ACL.\n")); - return NT_STATUS_NO_MEMORY; - } - - *sec_desc = make_sec_desc(ctx, SEC_DESC_REVISION, admins, admins, sacl, dacl, &psize); - if (!(*sec_desc)) { - DEBUG(0,("get_share_security: Failed to make SEC_DESC.\n")); - return NT_STATUS_NO_MEMORY; - } - - return NT_STATUS_OK; -} - -NTSTATUS sec_desc_add_ace_to_dacl(SEC_DESC *sec_desc, TALLOC_CTX *ctx, DOM_SID *sid, uint32 mask) -{ - NTSTATUS result; - SEC_ACE *new_aces; - unsigned num_aces; - int i; - - num_aces = sec_desc->dacl->num_aces + 1; - result = sec_ace_add_sid(ctx, &new_aces, sec_desc->dacl->ace, &num_aces, sid, mask); - if (NT_STATUS_IS_OK(result)) { - sec_desc->dacl->ace = new_aces; - sec_desc->dacl->num_aces = num_aces; - sec_desc->dacl->size = SEC_ACL_HEADER_SIZE; - for (i = 0; i < num_aces; i++) { - sec_desc->dacl->size += sec_desc->dacl->ace[i].size; - } - } - return result; -} - -NTSTATUS gums_init_builtin_groups(void) -{ - NTSTATUS result; - GUMS_OBJECT g_obj; - GUMS_GROUP *g_grp; - GUMS_PRIVILEGE g_priv; - - /* Build the well known Builtin Local Groups */ - g_obj.type = GUMS_OBJ_GROUP; - g_obj.version = 1; - g_obj.seq_num = 0; - g_obj.mem_ctx = talloc_init("gums_init_backend_acct"); - if (g_obj.mem_ctx == NULL) { - DEBUG(0, ("gums_init_backend: Out of Memory!\n")); - return NT_STATUS_NO_MEMORY; - } - - /* Administrators * / - - /* alloc group structure */ - g_obj.data.group = (GUMS_GROUP *)talloc(g_obj.mem_ctx, sizeof(GUMS_GROUP)); - ALLOC_CHECK("gums_init_backend", g_obj.data.group, result, done); - - /* make admins sid */ - g_grp = (GUMS_GROUP *)g_obj.data.group; - sid_copy(g_obj.sid, &global_sid_Builtin_Administrators); - - /* make security descriptor */ - result = create_builtin_alias_default_sec_desc(&(g_obj.sec_desc), g_obj.mem_ctx); - NTSTATUS_CHECK("gums_init_backend", "create_builtin_alias_default_sec_desc", result, done); - - /* make privilege set */ - /* From BDC join trace: - SeSecurityPrivilege - SeBackupPrivilege - SeRestorePrivilege - SeSystemtimePrivilege - SeShutdownPrivilege - SeRemoteShutdownPrivilege - SeTakeOwnershipPrivilege - SeDebugPrivilege - SeSystemEnvironmentPrivilege - SeSystemProfilePrivilege - SeProfileSingleProcessPrivilege - SeIncreaseBasePriorityPrivilege - SeLocalDriverPrivilege - SeCreatePagefilePrivilege - SeIncreaseQuotaPrivilege - */ - - /* set name */ - g_obj.name = talloc_strdup(g_obj.mem_ctx, "Administrators"); - ALLOC_CHECK("gums_init_backend", g_obj.name, result, done); - - /* set description */ - g_obj.description = talloc_strdup(g_obj.mem_ctx, "Members can fully administer the computer/domain"); - ALLOC_CHECK("gums_init_backend", g_obj.description, result, done); - - /* numebr of group members */ - g_grp->count = 0; - g_grp->members = NULL; - - /* store Administrators group */ - result = gums_storage->set_object(&g_obj); - - /* Power Users */ - /* Domain Controllers Does NOT have power Users */ - - sid_copy(g_obj.sid, &global_sid_Builtin_Power_Users); - - /* make privilege set */ - /* SE_PRIV_??? */ - - /* set name */ - g_obj.name = talloc_strdup(g_obj.mem_ctx, "Power Users"); - ALLOC_CHECK("gums_init_backend", g_obj.name, result, done); - - /* set description */ -/* > */ g_obj.description = talloc_strdup(g_obj.mem_ctx, "Power Users"); - ALLOC_CHECK("gums_init_backend", g_obj.description, result, done); - - /* store Power Users group */ - result = gums_storage->set_object(&g_obj); - - /* Account Operators */ - - sid_copy(g_obj.sid, &global_sid_Builtin_Account_Operators); - - /* make privilege set */ - /* From BDC join trace: - SeShutdownPrivilege - */ - - /* set name */ - g_obj.name = talloc_strdup(g_obj.mem_ctx, "Account Operators"); - ALLOC_CHECK("gums_init_backend", g_obj.name, result, done); - - /* set description */ - g_obj.description = talloc_strdup(g_obj.mem_ctx, "Members can administer domain user and group accounts"); - ALLOC_CHECK("gums_init_backend", g_obj.description, result, done); - - /* store Account Operators group */ - result = gums_storage->set_object(&g_obj); - - /* Server Operators */ - - sid_copy(g_obj.sid, &global_sid_Builtin_Server_Operators); - - /* make privilege set */ - /* From BDC join trace: - SeBackupPrivilege - SeRestorePrivilege - SeSystemtimePrivilege - SeShutdownPrivilege - SeRemoteShutdownPrivilege - */ - - /* set name */ - g_obj.name = talloc_strdup(g_obj.mem_ctx, "Server Operators"); - ALLOC_CHECK("gums_init_backend", g_obj.name, result, done); - - /* set description */ - g_obj.description = talloc_strdup(g_obj.mem_ctx, "Members can administer domain servers"); - ALLOC_CHECK("gums_init_backend", g_obj.description, result, done); - - /* store Server Operators group */ - result = gums_storage->set_object(&g_obj); - - /* Print Operators */ - - sid_copy(g_obj.sid, &global_sid_Builtin_Print_Operators); - - /* make privilege set */ - /* From BDC join trace: - SeShutdownPrivilege - */ - - /* set name */ - g_obj.name = talloc_strdup(g_obj.mem_ctx, "Print Operators"); - ALLOC_CHECK("gums_init_backend", g_obj.name, result, done); - - /* set description */ - g_obj.description = talloc_strdup(g_obj.mem_ctx, "Members can administer domain printers"); - ALLOC_CHECK("gums_init_backend", g_obj.description, result, done); - - /* store Print Operators group */ - result = gums_storage->set_object(&g_obj); - - /* Backup Operators */ - - sid_copy(g_obj.sid, &global_sid_Builtin_Backup_Operators); - - /* make privilege set */ - /* From BDC join trace: - SeBackupPrivilege - SeRestorePrivilege - SeShutdownPrivilege - */ - - /* set name */ - g_obj.name = talloc_strdup(g_obj.mem_ctx, "Backup Operators"); - ALLOC_CHECK("gums_init_backend", g_obj.name, result, done); - - /* set description */ - g_obj.description = talloc_strdup(g_obj.mem_ctx, "Members can bypass file security to backup files"); - ALLOC_CHECK("gums_init_backend", g_obj.description, result, done); - - /* store Backup Operators group */ - result = gums_storage->set_object(&g_obj); - - /* Replicator */ - - sid_copy(g_obj.sid, &global_sid_Builtin_Replicator); - - /* make privilege set */ - /* From BDC join trace: - SeBackupPrivilege - SeRestorePrivilege - SeShutdownPrivilege - */ - - /* set name */ - g_obj.name = talloc_strdup(g_obj.mem_ctx, "Replicator"); - ALLOC_CHECK("gums_init_backend", g_obj.name, result, done); - - /* set description */ - g_obj.description = talloc_strdup(g_obj.mem_ctx, "Supports file replication in a domain"); - ALLOC_CHECK("gums_init_backend", g_obj.description, result, done); - - /* store Replicator group */ - result = gums_storage->set_object(&g_obj); - - /* Users */ - - sid_copy(g_obj.sid, &global_sid_Builtin_Users); - - /* add ACE to sec dsec dacl */ - sec_desc_add_ace_to_dacl(g_obj.sec_desc, g_obj.mem_ctx, &global_sid_Builtin_Account_Operators, ALIAS_DEFAULT_DACL_SA_RIGHTS); - sec_desc_add_ace_to_dacl(g_obj.sec_desc, g_obj.mem_ctx, &global_sid_Builtin_Power_Users, ALIAS_DEFAULT_DACL_SA_RIGHTS); - - /* set name */ - g_obj.name = talloc_strdup(g_obj.mem_ctx, "Users"); - ALLOC_CHECK("gums_init_backend", g_obj.name, result, done); - - /* set description */ - g_obj.description = talloc_strdup(g_obj.mem_ctx, "Ordinary users"); - ALLOC_CHECK("gums_init_backend", g_obj.description, result, done); - - /* store Users group */ - result = gums_storage->set_object(&g_obj); - - /* Guests */ - - sid_copy(g_obj.sid, &global_sid_Builtin_Guests); - - /* set name */ - g_obj.name = talloc_strdup(g_obj.mem_ctx, "Guests"); - ALLOC_CHECK("gums_init_backend", g_obj.name, result, done); - - /* set description */ - g_obj.description = talloc_strdup(g_obj.mem_ctx, "Users granted guest access to the computer/domain"); - ALLOC_CHECK("gums_init_backend", g_obj.description, result, done); - - /* store Guests group */ - result = gums_storage->set_object(&g_obj); - - /* set default privileges */ - g_priv.type = GUMS_OBJ_GROUP; - g_priv.version = 1; - g_priv.seq_num = 0; - g_priv.mem_ctx = talloc_init("gums_init_backend_priv"); - if (g_priv.mem_ctx == NULL) { - DEBUG(0, ("gums_init_backend: Out of Memory!\n")); - return NT_STATUS_NO_MEMORY; - } - - - -done: - talloc_destroy(g_obj.mem_ctx); - talloc_destroy(g_priv.mem_ctx); - return result; -} -#endif - diff --git a/source3/sam/idmap.c b/source3/sam/idmap.c deleted file mode 100644 index 0e55ca51412..00000000000 --- a/source3/sam/idmap.c +++ /dev/null @@ -1,191 +0,0 @@ -/* - Unix SMB/CIFS implementation. - Winbind ID Mapping - Copyright (C) Tim Potter 2000 - Copyright (C) Anthony Liguori 2003 - Copyright (C) Simo Sorce 2003 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.*/ - -#include "includes.h" - -#undef DBGC_CLASS -#define DBGC_CLASS DBGC_IDMAP - -static struct { - - const char *name; - /* Function to create a member of the idmap_methods list */ - NTSTATUS (*reg_meth)(struct idmap_methods **methods); - struct idmap_methods *methods; - -} remote_idmap_functions[] = { - - { "winbind", idmap_reg_winbind, NULL }, - { NULL, NULL, NULL } - -}; - -static struct idmap_methods *local_map; -static struct idmap_methods *remote_map; - -static struct idmap_methods *get_methods(const char *name) -{ - int i = 0; - struct idmap_methods *ret = NULL; - - while (remote_idmap_functions[i].name && strcmp(remote_idmap_functions[i].name, name)) { - i++; - } - - if (remote_idmap_functions[i].name) { - - if (!remote_idmap_functions[i].methods) { - remote_idmap_functions[i].reg_meth(&remote_idmap_functions[i].methods); - } - - ret = remote_idmap_functions[i].methods; - } - - return ret; -} - -/* Initialize backend */ -BOOL idmap_init(const char *remote_backend) -{ - if (!local_map) { - idmap_reg_tdb(&local_map); - local_map->init("idmap.tdb"); - } - - if (!remote_map && remote_backend && *remote_backend != 0) { - DEBUG(3, ("load_methods: using '%s' as remote backend\n", remote_backend)); - - remote_map = get_methods(remote_backend); - if (!remote_map) { - DEBUG(0, ("load_methods: could not load remote backend '%s'\n", remote_backend)); - return False; - } - remote_map->init(""); - } - - return True; -} - -NTSTATUS idmap_set_mapping(const DOM_SID *sid, unid_t id, int id_type) -{ - NTSTATUS ret; - - ret = local_map->set_mapping(sid, id, id_type); - if (NT_STATUS_IS_ERR(ret)) { - DEBUG (0, ("idmap_set_mapping: Error, unable to modify local cache!\n")); - return ret; - } - - /* Being able to update the remote cache is seldomly right. - Generally this is a forbidden operation. */ - if (!(id_type & ID_CACHE) && (remote_map != NULL)) { - remote_map->set_mapping(sid, id, id_type); - if (NT_STATUS_IS_ERR(ret)) { - DEBUG (0, ("idmap_set_mapping: Error, unable to modify remote cache!\n")); - } - } - - return ret; -} - -/* Get ID from SID */ -NTSTATUS idmap_get_id_from_sid(unid_t *id, int *id_type, const DOM_SID *sid) -{ - NTSTATUS ret; - int loc_type; - - loc_type = *id_type; - if (remote_map) { /* We have a central remote idmap */ - loc_type |= ID_NOMAP; - } - ret = local_map->get_id_from_sid(id, &loc_type, sid); - if (NT_STATUS_IS_ERR(ret)) { - if (remote_map) { - ret = remote_map->get_id_from_sid(id, id_type, sid); - if (NT_STATUS_IS_ERR(ret)) { - DEBUG(3, ("idmap_get_id_from_sid: error fetching id!\n")); - return ret; - } else { - loc_type |= ID_CACHE; - idmap_set_mapping(sid, *id, loc_type); - } - } - } else { - *id_type = loc_type & ID_TYPEMASK; - } - - return ret; -} - -/* Get SID from ID */ -NTSTATUS idmap_get_sid_from_id(DOM_SID *sid, unid_t id, int id_type) -{ - NTSTATUS ret; - int loc_type; - - loc_type = id_type; - if (remote_map) { - loc_type = id_type | ID_NOMAP; - } - ret = local_map->get_sid_from_id(sid, id, loc_type); - if (NT_STATUS_IS_ERR(ret)) { - if (remote_map) { - ret = remote_map->get_sid_from_id(sid, id, id_type); - if (NT_STATUS_IS_ERR(ret)) { - DEBUG(3, ("idmap_get_sid_from_id: unable to fetch sid!\n")); - return ret; - } else { - loc_type |= ID_CACHE; - idmap_set_mapping(sid, id, loc_type); - } - } - } - - return ret; -} - -/* Close backend */ -NTSTATUS idmap_close(void) -{ - NTSTATUS ret; - - ret = local_map->close(); - if (NT_STATUS_IS_ERR(ret)) { - DEBUG(3, ("idmap_close: failed to close local cache!\n")); - } - - if (remote_map) { - ret = remote_map->close(); - if (NT_STATUS_IS_ERR(ret)) { - DEBUG(3, ("idmap_close: failed to close remote idmap repository!\n")); - } - } - - return ret; -} - -/* Dump backend status */ -void idmap_status(void) -{ - local_map->status(); - if (remote_map) remote_map->status(); -} - diff --git a/source3/sam/idmap_tdb.c b/source3/sam/idmap_tdb.c deleted file mode 100644 index ec365b603dd..00000000000 --- a/source3/sam/idmap_tdb.c +++ /dev/null @@ -1,526 +0,0 @@ -/* - Unix SMB/CIFS implementation. - - idmap TDB backend - - Copyright (C) Tim Potter 2000 - Copyright (C) Anthony Liguori 2003 - Copyright (C) Simo Sorce 2003 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" - -#undef DBGC_CLASS -#define DBGC_CLASS DBGC_IDMAP - -/* High water mark keys */ -#define HWM_GROUP "GROUP HWM" -#define HWM_USER "USER HWM" - -/* idmap version determines auto-conversion */ -#define IDMAP_VERSION 2 - -/* Globals */ -static TDB_CONTEXT *idmap_tdb; - -static struct idmap_state { - - /* User and group id pool */ - - uid_t uid_low, uid_high; /* Range of uids to allocate */ - gid_t gid_low, gid_high; /* Range of gids to allocate */ -} idmap_state; - - -/* FIXME: let handle conversions when all things work ok. - I think it is better to handle the conversion at - upgrade time and leave the old db intact. - That would also make easier to go back to 2.2 if needed - ---SSS */ -#if 0 - -/* convert one record to the new format */ -static int tdb_convert_fn(TDB_CONTEXT * tdb, TDB_DATA key, TDB_DATA data, - void *ignored) -{ - struct winbindd_domain *domain; - char *p; - DOM_SID sid; - uint32 rid; - fstring keystr; - fstring dom_name; - TDB_DATA key2; - - p = strchr(key.dptr, '/'); - if (!p) - return 0; - - *p = 0; - fstrcpy(dom_name, key.dptr); - *p++ = '/'; - - domain = find_domain_from_name(dom_name); - if (!domain) { - /* We must delete the old record. */ - DEBUG(0, - ("winbindd: tdb_convert_fn : Unable to find domain %s\n", - dom_name)); - DEBUG(0, - ("winbindd: tdb_convert_fn : deleting record %s\n", - key.dptr)); - tdb_delete(idmap_tdb, key); - return 0; - } - - rid = atoi(p); - - sid_copy(&sid, &domain->sid); - sid_append_rid(&sid, rid); - - sid_to_string(keystr, &sid); - key2.dptr = keystr; - key2.dsize = strlen(keystr) + 1; - - if (tdb_store(idmap_tdb, key2, data, TDB_INSERT) != 0) { - /* not good! */ - DEBUG(0, - ("winbindd: tdb_convert_fn : Unable to update record %s\n", - key2.dptr)); - DEBUG(0, - ("winbindd: tdb_convert_fn : conversion failed - idmap corrupt ?\n")); - return -1; - } - - if (tdb_store(idmap_tdb, data, key2, TDB_REPLACE) != 0) { - /* not good! */ - DEBUG(0, - ("winbindd: tdb_convert_fn : Unable to update record %s\n", - data.dptr)); - DEBUG(0, - ("winbindd: tdb_convert_fn : conversion failed - idmap corrupt ?\n")); - return -1; - } - - tdb_delete(idmap_tdb, key); - - return 0; -} - -/***************************************************************************** - Convert the idmap database from an older version. -*****************************************************************************/ -static BOOL tdb_idmap_convert(const char *idmap_name) -{ - int32 vers = tdb_fetch_int32(idmap_tdb, "IDMAP_VERSION"); - BOOL bigendianheader = - (idmap_tdb->flags & TDB_BIGENDIAN) ? True : False; - - if (vers == IDMAP_VERSION) - return True; - - if (((vers == -1) && bigendianheader) - || (IREV(vers) == IDMAP_VERSION)) { - /* Arrggghh ! Bytereversed or old big-endian - make order independent ! */ - /* - * high and low records were created on a - * big endian machine and will need byte-reversing. - */ - - int32 wm; - - wm = tdb_fetch_int32(idmap_tdb, HWM_USER); - - if (wm != -1) { - wm = IREV(wm); - } else - wm = server_state.uid_low; - - if (tdb_store_int32(idmap_tdb, HWM_USER, wm) == -1) { - DEBUG(0, - ("tdb_idmap_convert: Unable to byteswap user hwm in idmap database\n")); - return False; - } - - wm = tdb_fetch_int32(idmap_tdb, HWM_GROUP); - if (wm != -1) { - wm = IREV(wm); - } else - wm = server_state.gid_low; - - if (tdb_store_int32(idmap_tdb, HWM_GROUP, wm) == -1) { - DEBUG(0, - ("tdb_idmap_convert: Unable to byteswap group hwm in idmap database\n")); - return False; - } - } - - /* the old format stored as DOMAIN/rid - now we store the SID direct */ - tdb_traverse(idmap_tdb, tdb_convert_fn, NULL); - - if (tdb_store_int32(idmap_tdb, "IDMAP_VERSION", IDMAP_VERSION) == - -1) { - DEBUG(0, - ("tdb_idmap_convert: Unable to byteswap group hwm in idmap database\n")); - return False; - } - - return True; -} -#endif - -/* Allocate either a user or group id from the pool */ -static NTSTATUS db_allocate_id(unid_t *id, int id_type) -{ - int hwm; - - if (!id) return NT_STATUS_INVALID_PARAMETER; - - /* Get current high water mark */ - switch (id_type & ID_TYPEMASK) { - case ID_USERID: - if ((hwm = tdb_fetch_int32(idmap_tdb, HWM_USER)) == -1) { - return NT_STATUS_INTERNAL_DB_ERROR; - } - - if (hwm > idmap_state.uid_high) { - DEBUG(0, ("idmap Fatal Error: UID range full!!\n")); - return NT_STATUS_UNSUCCESSFUL; - } - - (*id).uid = hwm++; - - /* Store new high water mark */ - tdb_store_int32(idmap_tdb, HWM_USER, hwm); - break; - case ID_GROUPID: - if ((hwm = tdb_fetch_int32(idmap_tdb, HWM_GROUP)) == -1) { - return NT_STATUS_INTERNAL_DB_ERROR; - } - - if (hwm > idmap_state.gid_high) { - DEBUG(0, ("idmap Fatal Error: GID range full!!\n")); - return NT_STATUS_UNSUCCESSFUL; - } - - (*id).gid = hwm++; - - /* Store new high water mark */ - tdb_store_int32(idmap_tdb, HWM_GROUP, hwm); - break; - default: - return NT_STATUS_INVALID_PARAMETER; - } - - return NT_STATUS_OK; -} - -/* Get a sid from an id */ -static NTSTATUS db_get_sid_from_id(DOM_SID *sid, unid_t id, int id_type) -{ - TDB_DATA key, data; - fstring keystr; - NTSTATUS ret = NT_STATUS_UNSUCCESSFUL; - - if (!sid) return NT_STATUS_INVALID_PARAMETER; - - switch (id_type & ID_TYPEMASK) { - case ID_USERID: - slprintf(keystr, sizeof(keystr), "UID %d", id.uid); - break; - case ID_GROUPID: - slprintf(keystr, sizeof(keystr), "GID %d", id.gid); - break; - default: - return NT_STATUS_UNSUCCESSFUL; - } - - key.dptr = keystr; - key.dsize = strlen(keystr) + 1; - - data = tdb_fetch(idmap_tdb, key); - - if (data.dptr) { - if (string_to_sid(sid, data.dptr)) { - ret = NT_STATUS_OK; - } - SAFE_FREE(data.dptr); - } - - return ret; -} - -/* Get an id from a sid */ -static NTSTATUS db_get_id_from_sid(unid_t *id, int *id_type, const DOM_SID *sid) -{ - TDB_DATA data, key; - fstring keystr; - NTSTATUS ret = NT_STATUS_UNSUCCESSFUL; - - if (!sid || !id || !id_type) return NT_STATUS_INVALID_PARAMETER; - - /* Check if sid is present in database */ - sid_to_string(keystr, sid); - - key.dptr = keystr; - key.dsize = strlen(keystr) + 1; - - data = tdb_fetch(idmap_tdb, key); - - if (data.dptr) { - int type = *id_type & ID_TYPEMASK; - fstring scanstr; - - if (type == ID_EMPTY || type == ID_USERID) { - /* Parse and return existing uid */ - fstrcpy(scanstr, "UID %d"); - - if (sscanf(data.dptr, scanstr, &((*id).uid)) == 1) { - /* uid ok? */ - if (type == ID_EMPTY) { - *id_type = ID_USERID; - } - ret = NT_STATUS_OK; - goto idok; - } - } - - if (type == ID_EMPTY || type == ID_GROUPID) { - /* Parse and return existing gid */ - fstrcpy(scanstr, "GID %d"); - - if (sscanf(data.dptr, scanstr, &((*id).gid)) == 1) { - /* gid ok? */ - if (type == ID_EMPTY) { - *id_type = ID_GROUPID; - } - ret = NT_STATUS_OK; - } - } -idok: - SAFE_FREE(data.dptr); - - } else if (!(*id_type & ID_NOMAP) && - (((*id_type & ID_TYPEMASK) == ID_USERID) - || (*id_type & ID_TYPEMASK) == ID_GROUPID)) { - - /* Allocate a new id for this sid */ - ret = db_allocate_id(id, *id_type); - if (NT_STATUS_IS_OK(ret)) { - fstring keystr2; - - /* Store new id */ - if (*id_type & ID_USERID) { - slprintf(keystr2, sizeof(keystr2), "UID %d", (*id).uid); - } else { - slprintf(keystr2, sizeof(keystr2), "GID %d", (*id).gid); - } - - data.dptr = keystr2; - data.dsize = strlen(keystr2) + 1; - - if (tdb_store(idmap_tdb, key, data, TDB_REPLACE) == -1) { - /* TODO: print tdb error !! */ - return NT_STATUS_UNSUCCESSFUL; - } - if (tdb_store(idmap_tdb, data, key, TDB_REPLACE) == -1) { - /* TODO: print tdb error !! */ - return NT_STATUS_UNSUCCESSFUL; - } - - ret = NT_STATUS_OK; - } - } - - return ret; -} - -static NTSTATUS db_set_mapping(DOM_SID *sid, unid_t id, int id_type) -{ - TDB_DATA ksid, kid; - fstring ksidstr; - fstring kidstr; - - if (!sid) return NT_STATUS_INVALID_PARAMETER; - - sid_to_string(ksidstr, sid); - - ksid.dptr = ksidstr; - ksid.dsize = strlen(ksidstr) + 1; - - id_type &= ID_TYPEMASK; - if (id_type & ID_USERID) { - slprintf(kidstr, sizeof(kidstr), "UID %d", id.uid); - } else if (id_type & ID_GROUPID) { - slprintf(kidstr, sizeof(kidstr), "GID %d", id.gid); - } else { - return NT_STATUS_INVALID_PARAMETER; - } - - kid.dptr = kidstr; - kid.dsize = strlen(kidstr) + 1; - - if (tdb_store(idmap_tdb, ksid, kid, TDB_INSERT) == -1) { - /* TODO: print tdb error !! */ - return NT_STATUS_UNSUCCESSFUL; - } - if (tdb_store(idmap_tdb, kid, ksid, TDB_INSERT) == -1) { - /* TODO: print tdb error !! */ - return NT_STATUS_UNSUCCESSFUL; - } - return NT_STATUS_OK; -} - -/***************************************************************************** - Initialise idmap database. -*****************************************************************************/ -static NTSTATUS db_idmap_init(const char *db_name) -{ - /* Open tdb cache */ - if (!(idmap_tdb = tdb_open_log(lock_path(db_name), 0, - TDB_DEFAULT, O_RDWR | O_CREAT, - 0600))) { - DEBUG(0, ("idmap_init: Unable to open idmap database\n")); - return NT_STATUS_UNSUCCESSFUL; - } - -#if 0 - /* possibly convert from an earlier version */ - if (!tdb_idmap_convert(lock_path("winbind_idmap.tdb"))) { - DEBUG(0, - ("idmap_init: Unable to open old idmap database\n")); - return False; - } -#endif - - /* Create high water marks for group and user id */ - if (tdb_fetch_int32(idmap_tdb, HWM_USER) == -1) { - if (tdb_store_int32(idmap_tdb, HWM_USER, idmap_state.uid_low) == -1) { - DEBUG(0, ("idmap_init: Unable to initialise user hwm in idmap database\n")); - return NT_STATUS_INTERNAL_DB_ERROR; - } - } - - if (tdb_fetch_int32(idmap_tdb, HWM_GROUP) == -1) { - if (tdb_store_int32(idmap_tdb, HWM_GROUP, idmap_state.gid_low) == -1) { - DEBUG(0, ("idmap_init: Unable to initialise group hwm in idmap database\n")); - return NT_STATUS_INTERNAL_DB_ERROR; - } - } - - return NT_STATUS_OK; -} - -/* Close the tdb */ -static NTSTATUS db_idmap_close(void) -{ - if (idmap_tdb) { - if (tdb_close(idmap_tdb) == 0) { - return NT_STATUS_OK; - } else { - return NT_STATUS_UNSUCCESSFUL; - } - } - return NT_STATUS_OK; -} - - -/* Dump status information to log file. Display different stuff based on - the debug level: - - Debug Level Information Displayed - ================================================================= - 0 Percentage of [ug]id range allocated - 0 High water marks (next allocated ids) -*/ - -#define DUMP_INFO 0 - -static void db_idmap_status(void) -{ - int user_hwm, group_hwm; - - DEBUG(0, ("winbindd idmap status:\n")); - - /* Get current high water marks */ - - if ((user_hwm = tdb_fetch_int32(idmap_tdb, HWM_USER)) == -1) { - DEBUG(DUMP_INFO, - ("\tCould not get userid high water mark!\n")); - } - - if ((group_hwm = tdb_fetch_int32(idmap_tdb, HWM_GROUP)) == -1) { - DEBUG(DUMP_INFO, - ("\tCould not get groupid high water mark!\n")); - } - - /* Display next ids to allocate */ - - if (user_hwm != -1) { - DEBUG(DUMP_INFO, - ("\tNext userid to allocate is %d\n", user_hwm)); - } - - if (group_hwm != -1) { - DEBUG(DUMP_INFO, - ("\tNext groupid to allocate is %d\n", group_hwm)); - } - - /* Display percentage of id range already allocated. */ - - if (user_hwm != -1) { - int num_users = user_hwm - idmap_state.uid_low; - int total_users = - idmap_state.uid_high - idmap_state.uid_low; - - DEBUG(DUMP_INFO, - ("\tUser id range is %d%% full (%d of %d)\n", - num_users * 100 / total_users, num_users, - total_users)); - } - - if (group_hwm != -1) { - int num_groups = group_hwm - idmap_state.gid_low; - int total_groups = - idmap_state.gid_high - idmap_state.gid_low; - - DEBUG(DUMP_INFO, - ("\tGroup id range is %d%% full (%d of %d)\n", - num_groups * 100 / total_groups, num_groups, - total_groups)); - } - - /* Display complete mapping of users and groups to rids */ -} - -struct idmap_methods db_methods = { - - db_idmap_init, - db_get_sid_from_id, - db_get_id_from_sid, - db_set_mapping, - db_idmap_close, - db_idmap_status - -}; - -NTSTATUS idmap_reg_tdb(struct idmap_methods **meth) -{ - *meth = &db_methods; - - return NT_STATUS_OK; -} - diff --git a/source3/sam/idmap_winbind.c b/source3/sam/idmap_winbind.c deleted file mode 100644 index a5ba6586749..00000000000 --- a/source3/sam/idmap_winbind.c +++ /dev/null @@ -1,108 +0,0 @@ -/* - Unix SMB/CIFS implementation. - - idmap Winbind backend - - Copyright (C) Simo Sorce 2003 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" - -#undef DBGC_CLASS -#define DBGC_CLASS DBGC_IDMAP - -/* Get a sid from an id */ -static NTSTATUS db_get_sid_from_id(DOM_SID *sid, unid_t id, int id_type) { - switch (id_type & ID_TYPEMASK) { - case ID_USERID: - if (winbind_uid_to_sid(sid, id.uid)) { - return NT_STATUS_OK; - } - break; - case ID_GROUPID: - if (winbind_gid_to_sid(sid, id.gid)) { - return NT_STATUS_OK; - } - break; - default: - return NT_STATUS_INVALID_PARAMETER; - } - - return NT_STATUS_UNSUCCESSFUL; -} - -/* Get an id from a sid */ -static NTSTATUS db_get_id_from_sid(unid_t *id, int *id_type, const DOM_SID *sid) { - switch (*id_type & ID_TYPEMASK) { - case ID_USERID: - if (winbind_sid_to_uid(&((*id).uid), sid)) { - return NT_STATUS_OK; - } - break; - case ID_GROUPID: - if (winbind_sid_to_gid(&((*id).gid), sid)) { - return NT_STATUS_OK; - } - break; - default: - if (winbind_sid_to_uid(&((*id).uid), sid) || - winbind_sid_to_gid(&((*id).gid), sid)) { - return NT_STATUS_OK; - } - } - - return NT_STATUS_UNSUCCESSFUL; -} - -static NTSTATUS db_set_mapping(DOM_SID *sid, unid_t id, int id_type) { - return NT_STATUS_UNSUCCESSFUL; -} - -/***************************************************************************** - Initialise idmap database. -*****************************************************************************/ -static NTSTATUS db_init(const char *db_name) { - return NT_STATUS_OK; -} - -/* Close the tdb */ -static NTSTATUS db_close(void) { - return NT_STATUS_OK; -} - -static void db_status(void) { - return; -} - -struct idmap_methods winbind_methods = { - - db_init, - db_get_sid_from_id, - db_get_id_from_sid, - db_set_mapping, - db_close, - db_status - -}; - -NTSTATUS idmap_reg_winbind(struct idmap_methods **meth) -{ - *meth = &winbind_methods; - - return NT_STATUS_OK; -} - diff --git a/source3/sam/interface.c b/source3/sam/interface.c deleted file mode 100644 index 51ae561999c..00000000000 --- a/source3/sam/interface.c +++ /dev/null @@ -1,1338 +0,0 @@ -/* - Unix SMB/CIFS implementation. - Password and authentication handling - Copyright (C) Andrew Bartlett 2002 - Copyright (C) Jelmer Vernooij 2002 - Copyright (C) Stefan (metze) Metzmacher 2002 - Copyright (C) Kai Krüger 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" - -#undef DBGC_CLASS -#define DBGC_CLASS DBGC_SAM - -extern DOM_SID global_sid_Builtin; - -/** List of various built-in sam modules */ - -const struct sam_init_function_entry builtin_sam_init_functions[] = { - { "plugin", sam_init_plugin }, -#ifdef HAVE_LDAP - { "ads", sam_init_ads }, -#endif - { "skel", sam_init_skel }, - { NULL, NULL} -}; - - -static NTSTATUS sam_get_methods_by_sid(const SAM_CONTEXT *context, SAM_METHODS **sam_method, const DOM_SID *domainsid) -{ - SAM_METHODS *tmp_methods; - - DEBUG(5,("sam_get_methods_by_sid: %d\n", __LINE__)); - - /* invalid sam_context specified */ - SAM_ASSERT(context && context->methods); - - tmp_methods = context->methods; - - while (tmp_methods) { - if (sid_equal(domainsid, &(tmp_methods->domain_sid))) - { - (*sam_method) = tmp_methods; - return NT_STATUS_OK; - } - tmp_methods = tmp_methods->next; - } - - DEBUG(3,("sam_get_methods_by_sid: There is no backend specified for domain %s\n", sid_string_static(domainsid))); - - return NT_STATUS_NO_SUCH_DOMAIN; -} - -static NTSTATUS sam_get_methods_by_name(const SAM_CONTEXT *context, SAM_METHODS **sam_method, const char *domainname) -{ - SAM_METHODS *tmp_methods; - - DEBUG(5,("sam_get_methods_by_name: %d\n", __LINE__)); - - /* invalid sam_context specified */ - SAM_ASSERT(context && context->methods); - - tmp_methods = context->methods; - - while (tmp_methods) { - if (strequal(domainname, tmp_methods->domain_name)) - { - (*sam_method) = tmp_methods; - return NT_STATUS_OK; - } - tmp_methods = tmp_methods->next; - } - - DEBUG(3,("sam_get_methods_by_sid: There is no backend specified for domain %s\n", domainname)); - - return NT_STATUS_NO_SUCH_DOMAIN; -} - -static NTSTATUS make_sam_methods(TALLOC_CTX *mem_ctx, SAM_METHODS **methods) -{ - *methods = talloc(mem_ctx, sizeof(SAM_METHODS)); - - if (!*methods) { - return NT_STATUS_NO_MEMORY; - } - - ZERO_STRUCTP(*methods); - - return NT_STATUS_OK; -} - -/****************************************************************** - Free and cleanup a sam context, any associated data and anything - that the attached modules might have associated. - *******************************************************************/ - -void free_sam_context(SAM_CONTEXT **context) -{ - SAM_METHODS *sam_selected = (*context)->methods; - - while (sam_selected) { - if (sam_selected->free_private_data) { - sam_selected->free_private_data(&(sam_selected->private_data)); - } - sam_selected = sam_selected->next; - } - - talloc_destroy((*context)->mem_ctx); - *context = NULL; -} - -/****************************************************************** - Make a backend_entry from scratch - *******************************************************************/ - -static NTSTATUS make_backend_entry(SAM_BACKEND_ENTRY *backend_entry, char *sam_backend_string) -{ - char *tmp = NULL; - char *tmp_string = sam_backend_string; - - DEBUG(5,("make_backend_entry: %d\n", __LINE__)); - - SAM_ASSERT(sam_backend_string && backend_entry); - - backend_entry->module_name = sam_backend_string; - - DEBUG(5,("makeing backend_entry for %s\n", backend_entry->module_name)); - - if ((tmp = strrchr(tmp_string, '|')) != NULL) { - DEBUGADD(20,("a domain name has been specified\n")); - *tmp = 0; - backend_entry->domain_name = smb_xstrdup(tmp + 1); - tmp_string = tmp + 1; - } - - if ((tmp = strchr(tmp_string, ':')) != NULL) { - DEBUG(20,("options for the backend have been specified\n")); - *tmp = 0; - backend_entry->module_params = smb_xstrdup(tmp + 1); - tmp_string = tmp + 1; - } - - if (backend_entry->domain_name == NULL) { - DEBUG(10,("make_backend_entry: no domain was specified for sam module %s. Using default domain %s\n", - backend_entry->module_name, lp_workgroup())); - backend_entry->domain_name = smb_xstrdup(lp_workgroup()); - } - - if ((backend_entry->domain_sid = (DOM_SID *)malloc(sizeof(DOM_SID))) == NULL) { - DEBUG(0,("make_backend_entry: failed to malloc domain_sid\n")); - return NT_STATUS_NO_MEMORY; - } - - DEBUG(10,("looking up sid for domain %s\n", backend_entry->domain_name)); - - if (!secrets_fetch_domain_sid(backend_entry->domain_name, backend_entry->domain_sid)) { - DEBUG(2,("make_backend_entry: There is no SID stored for domain %s. Creating a new one.\n", - backend_entry->domain_name)); - DEBUG(0, ("FIXME in %s:%d\n", __FILE__, __LINE__)); - ZERO_STRUCTP(backend_entry->domain_sid); - } - - DEBUG(5,("make_backend_entry: module name: %s, module parameters: %s, domain name: %s, domain sid: %s\n", - backend_entry->module_name, backend_entry->module_params, backend_entry->domain_name, sid_string_static(backend_entry->domain_sid))); - - return NT_STATUS_OK; -} - -/****************************************************************** - create sam_methods struct based on sam_backend_entry - *****************************************************************/ - -static NTSTATUS make_sam_methods_backend_entry(SAM_CONTEXT *context, SAM_METHODS **methods_ptr, SAM_BACKEND_ENTRY *backend_entry) -{ - NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; - SAM_METHODS *methods; - int i; - - DEBUG(5,("make_sam_methods_backend_entry: %d\n", __LINE__)); - - if (!NT_STATUS_IS_OK(nt_status = make_sam_methods(context->mem_ctx, methods_ptr))) { - return nt_status; - } - - methods = *methods_ptr; - methods->backendname = talloc_strdup(context->mem_ctx, backend_entry->module_name); - methods->domain_name = talloc_strdup(context->mem_ctx, backend_entry->domain_name); - sid_copy(&methods->domain_sid, backend_entry->domain_sid); - methods->parent = context; - - DEBUG(5,("Attempting to find sam backend %s\n", backend_entry->module_name)); - for (i = 0; builtin_sam_init_functions[i].module_name; i++) - { - if (strequal(builtin_sam_init_functions[i].module_name, backend_entry->module_name)) - { - DEBUG(5,("Found sam backend %s (at pos %d)\n", backend_entry->module_name, i)); - DEBUGADD(5,("initialising it with options=%s for domain %s\n", backend_entry->module_params, sid_string_static(backend_entry->domain_sid))); - nt_status = builtin_sam_init_functions[i].init(methods, backend_entry->module_params); - if (NT_STATUS_IS_OK(nt_status)) { - DEBUG(5,("sam backend %s has a valid init\n", backend_entry->module_name)); - } else { - DEBUG(2,("sam backend %s did not correctly init (error was %s)\n", - backend_entry->module_name, nt_errstr(nt_status))); - } - return nt_status; - } - } - - DEBUG(2,("could not find backend %s\n", backend_entry->module_name)); - - return NT_STATUS_INVALID_PARAMETER; -} - -static NTSTATUS sam_context_check_default_backends(SAM_CONTEXT *context) -{ - SAM_BACKEND_ENTRY entry; - DOM_SID *global_sam_sid = get_global_sam_sid(); /* lp_workgroup doesn't play nicely with multiple domains */ - SAM_METHODS *methods, *tmpmethods; - NTSTATUS ntstatus; - - DEBUG(5,("sam_context_check_default_backends: %d\n", __LINE__)); - - /* Make sure domain lp_workgroup() is available */ - - ntstatus = sam_get_methods_by_sid(context, &methods, &global_sid_Builtin); - - if (NT_STATUS_EQUAL(ntstatus, NT_STATUS_NO_SUCH_DOMAIN)) { - DEBUG(4,("There was no backend specified for domain %s(%s); using %s\n", - lp_workgroup(), sid_string_static(global_sam_sid), SAM_DEFAULT_BACKEND)); - - SAM_ASSERT(global_sam_sid); - - entry.module_name = SAM_DEFAULT_BACKEND; - entry.module_params = NULL; - entry.domain_name = lp_workgroup(); - entry.domain_sid = (DOM_SID *)malloc(sizeof(DOM_SID)); - sid_copy(entry.domain_sid, global_sam_sid); - - if (!NT_STATUS_IS_OK(ntstatus = make_sam_methods_backend_entry(context, &methods, &entry))) { - DEBUG(4,("make_sam_methods_backend_entry failed\n")); - return ntstatus; - } - - DLIST_ADD_END(context->methods, methods, tmpmethods); - - } else if (!NT_STATUS_IS_OK(ntstatus)) { - DEBUG(2, ("sam_get_methods_by_sid failed for %s\n", lp_workgroup())); - return ntstatus; - } - - /* Make sure the BUILTIN domain is available */ - - ntstatus = sam_get_methods_by_sid(context, &methods, global_sam_sid); - - if (NT_STATUS_EQUAL(ntstatus, NT_STATUS_NO_SUCH_DOMAIN)) { - DEBUG(4,("There was no backend specified for domain BUILTIN; using %s\n", - SAM_DEFAULT_BACKEND)); - entry.module_name = SAM_DEFAULT_BACKEND; - entry.module_params = NULL; - entry.domain_name = "BUILTIN"; - entry.domain_sid = (DOM_SID *)malloc(sizeof(DOM_SID)); - sid_copy(entry.domain_sid, &global_sid_Builtin); - - if (!NT_STATUS_IS_OK(ntstatus = make_sam_methods_backend_entry(context, &methods, &entry))) { - DEBUG(4,("make_sam_methods_backend_entry failed\n")); - return ntstatus; - } - - DLIST_ADD_END(context->methods, methods, tmpmethods); - } else if (!NT_STATUS_IS_OK(ntstatus)) { - DEBUG(2, ("sam_get_methods_by_sid failed for BUILTIN\n")); - return ntstatus; - } - - return NT_STATUS_OK; -} - -static NTSTATUS check_duplicate_backend_entries(SAM_BACKEND_ENTRY **backend_entries, int *nBackends) -{ - int i, j; - - DEBUG(5,("check_duplicate_backend_entries: %d\n", __LINE__)); - - for (i = 0; i < *nBackends; i++) { - for (j = i + 1; j < *nBackends; j++) { - if (sid_equal((*backend_entries)[i].domain_sid, (*backend_entries)[j].domain_sid)) { - DEBUG(0,("two backend modules claim the same domain %s\n", - sid_string_static((*backend_entries)[j].domain_sid))); - return NT_STATUS_INVALID_PARAMETER; - } - } - } - - return NT_STATUS_OK; -} - -NTSTATUS make_sam_context_list(SAM_CONTEXT **context, char **sam_backends_param) -{ - int i = 0, j = 0; - SAM_METHODS *curmethods, *tmpmethods; - int nBackends = 0; - SAM_BACKEND_ENTRY *backends = NULL; - NTSTATUS nt_status = NT_STATUS_UNSUCCESSFUL; - - DEBUG(5,("make_sam_context_from_conf: %d\n", __LINE__)); - - if (!sam_backends_param) { - DEBUG(1, ("no SAM backeds specified!\n")); - return NT_STATUS_INVALID_PARAMETER; - } - - if (!NT_STATUS_IS_OK(nt_status = make_sam_context(context))) { - DEBUG(4,("make_sam_context failed\n")); - return nt_status; - } - - while (sam_backends_param[nBackends]) - nBackends++; - - DEBUG(6,("There are %d domains listed with their backends\n", nBackends)); - - if ((backends = (SAM_BACKEND_ENTRY *)malloc(sizeof(*backends)*nBackends)) == NULL) { - DEBUG(0,("make_sam_context_list: failed to allocate backends\n")); - return NT_STATUS_NO_MEMORY; - } - - memset(backends, '\0', sizeof(*backends)*nBackends); - - for (i = 0; i < nBackends; i++) { - DEBUG(8,("processing %s\n",sam_backends_param[i])); - if (!NT_STATUS_IS_OK(nt_status = make_backend_entry(&backends[i], sam_backends_param[i]))) { - DEBUG(4,("make_backend_entry failed\n")); - for (j = 0; j < nBackends; j++) SAFE_FREE(backends[j].domain_sid); - SAFE_FREE(backends); - free_sam_context(context); - return nt_status; - } - } - - if (!NT_STATUS_IS_OK(nt_status = check_duplicate_backend_entries(&backends, &nBackends))) { - DEBUG(4,("check_duplicate_backend_entries failed\n")); - for (j = 0; j < nBackends; j++) SAFE_FREE(backends[j].domain_sid); - SAFE_FREE(backends); - free_sam_context(context); - return nt_status; - } - - for (i = 0; i < nBackends; i++) { - if (!NT_STATUS_IS_OK(nt_status = make_sam_methods_backend_entry(*context, &curmethods, &backends[i]))) { - DEBUG(4,("make_sam_methods_backend_entry failed\n")); - for (j = 0; j < nBackends; j++) SAFE_FREE(backends[j].domain_sid); - SAFE_FREE(backends); - free_sam_context(context); - return nt_status; - } - DLIST_ADD_END((*context)->methods, curmethods, tmpmethods); - } - - for (i = 0; i < nBackends; i++) SAFE_FREE(backends[i].domain_sid); - - SAFE_FREE(backends); - return NT_STATUS_OK; -} - -/****************************************************************** - Make a sam_context from scratch. - *******************************************************************/ - -NTSTATUS make_sam_context(SAM_CONTEXT **context) -{ - TALLOC_CTX *mem_ctx; - - mem_ctx = talloc_init("sam_context internal allocation context"); - - if (!mem_ctx) { - DEBUG(0, ("make_sam_context: talloc init failed!\n")); - return NT_STATUS_NO_MEMORY; - } - - *context = talloc(mem_ctx, sizeof(**context)); - if (!*context) { - DEBUG(0, ("make_sam_context: talloc failed!\n")); - return NT_STATUS_NO_MEMORY; - } - - ZERO_STRUCTP(*context); - - (*context)->mem_ctx = mem_ctx; - - (*context)->free_fn = free_sam_context; - - return NT_STATUS_OK; -} - -/****************************************************************** - Return an already initialised sam_context, to facilitate backward - compatibility (see functions below). - *******************************************************************/ - -static struct sam_context *sam_get_static_context(BOOL reload) -{ - static SAM_CONTEXT *sam_context = NULL; - - if ((sam_context) && (reload)) { - sam_context->free_fn(&sam_context); - sam_context = NULL; - } - - if (!sam_context) { - if (!NT_STATUS_IS_OK(make_sam_context_list(&sam_context, lp_sam_backend()))) { - DEBUG(4,("make_sam_context_list failed\n")); - return NULL; - } - - /* Make sure the required domains (default domain, builtin) are available */ - if (!NT_STATUS_IS_OK(sam_context_check_default_backends(sam_context))) { - DEBUG(4,("sam_context_check_default_backends failed\n")); - return NULL; - } - } - - return sam_context; -} - -/*************************************************************** - Initialize the static context (at smbd startup etc). - - If uninitialised, context will auto-init on first use. - ***************************************************************/ - -BOOL initialize_sam(BOOL reload) -{ - return (sam_get_static_context(reload) != NULL); -} - - -/************************************************************** - External API. This is what the rest of the world calls... -***************************************************************/ - -/****************************************************************** - sam_* functions are used to link the external SAM interface - with the internal backends. These functions lookup the appropriate - backends for the domain and pass on to the function in sam_methods - in the selected backend - - When the context parmater is NULL, the default is used. - *******************************************************************/ - -#define SAM_SETUP_CONTEXT if (!context) \ - context = sam_get_static_context(False);\ - if (!context) {\ - return NT_STATUS_UNSUCCESSFUL; \ - }\ - - - -NTSTATUS sam_get_sec_desc(const SAM_CONTEXT *context, const NT_USER_TOKEN *access_token, const DOM_SID *sid, SEC_DESC **sd) -{ - SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - DEBUG(5,("sam_get_sec_desc: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - if (!NT_STATUS_IS_OK(nt_status = sam_get_methods_by_sid(context, &tmp_methods, sid))) { - DEBUG(4,("sam_get_methods_by_sid failed\n")); - return nt_status; - } - - if (!tmp_methods->sam_get_sec_desc) { - DEBUG(3, ("sam_get_sec_desc: sam_methods of the domain did not specify sam_get_sec_desc\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_get_sec_desc(tmp_methods, access_token, sid, sd))) { - DEBUG(4,("sam_get_sec_desc for %s in backend %s failed\n", sid_string_static(sid), tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_set_sec_desc(const SAM_CONTEXT *context, const NT_USER_TOKEN *access_token, const DOM_SID *sid, const SEC_DESC *sd) -{ - SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - DEBUG(5,("sam_set_sec_desc: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - if (!NT_STATUS_IS_OK(nt_status = sam_get_methods_by_sid(context, &tmp_methods, sid))) { - DEBUG(4,("sam_get_methods_by_sid failed\n")); - return nt_status; - } - - if (!tmp_methods->sam_set_sec_desc) { - DEBUG(3, ("sam_set_sec_desc: sam_methods of the domain did not specify sam_set_sec_desc\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_set_sec_desc(tmp_methods, access_token, sid, sd))) { - DEBUG(4,("sam_set_sec_desc for %s in backend %s failed\n", sid_string_static(sid), tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - - -NTSTATUS sam_lookup_name(const SAM_CONTEXT *context, const NT_USER_TOKEN *access_token, const char *domain, const char *name, DOM_SID *sid, uint32 *type) -{ - SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - DEBUG(5,("sam_lookup_name: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - if (!NT_STATUS_IS_OK(nt_status = sam_get_methods_by_name(context, &tmp_methods, domain))) { - DEBUG(4,("sam_get_methods_by_name failed\n")); - return nt_status; - } - - if (!tmp_methods->sam_lookup_name) { - DEBUG(3, ("sam_lookup_name: sam_methods of the domain did not specify sam_lookup_name\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_lookup_name(tmp_methods, access_token, name, sid, type))) { - DEBUG(4,("sam_lookup_name for %s\\%s in backend %s failed\n", - tmp_methods->domain_name, name, tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_lookup_sid(const SAM_CONTEXT *context, const NT_USER_TOKEN *access_token, TALLOC_CTX *mem_ctx, const DOM_SID *sid, char **name, uint32 *type) -{ - SAM_METHODS *tmp_methods; - uint32 rid; - NTSTATUS nt_status; - DOM_SID domainsid; - - DEBUG(5,("sam_lookup_sid: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - sid_copy(&domainsid, sid); - if (!sid_split_rid(&domainsid, &rid)) { - DEBUG(3,("sam_lookup_sid: failed to split the sid\n")); - return NT_STATUS_INVALID_SID; - } - - if (!NT_STATUS_IS_OK(nt_status = sam_get_methods_by_sid(context, &tmp_methods, &domainsid))) { - DEBUG(4,("sam_get_methods_by_sid failed\n")); - return nt_status; - } - - if (!tmp_methods->sam_lookup_sid) { - DEBUG(3, ("sam_lookup_sid: sam_methods of the domain did not specify sam_lookup_sid\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_lookup_sid(tmp_methods, access_token, mem_ctx, sid, name, type))) { - DEBUG(4,("sam_lookup_name for %s in backend %s failed\n", - sid_string_static(sid), tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - - -NTSTATUS sam_update_domain(const SAM_CONTEXT *context, const SAM_DOMAIN_HANDLE *domain) -{ - const SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - DEBUG(5,("sam_update_domain: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - /* invalid domain specified */ - SAM_ASSERT(domain && domain->current_sam_methods); - - tmp_methods = domain->current_sam_methods; - - if (!tmp_methods->sam_update_domain) { - DEBUG(3, ("sam_update_domain: sam_methods of the domain did not specify sam_update_domain\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_update_domain(tmp_methods, domain))){ - DEBUG(4,("sam_update_domain in backend %s failed\n", - tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_enum_domains(const SAM_CONTEXT *context, const NT_USER_TOKEN *access_token, int32 *domain_count, DOM_SID **domains, char ***domain_names) -{ - SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - SEC_DESC *sd; - size_t sd_size; - uint32 acc_granted; - int i = 0; - - DEBUG(5,("sam_enum_domains: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - /* invalid parmaters specified */ - SAM_ASSERT(domain_count && domains && domain_names); - - if (!NT_STATUS_IS_OK(nt_status = samr_make_sam_obj_sd(context->mem_ctx, &sd, &sd_size))) { - DEBUG(4,("samr_make_sam_obj_sd failed\n")); - return nt_status; - } - - if (!se_access_check(sd, access_token, SA_RIGHT_SAM_ENUM_DOMAINS, &acc_granted, &nt_status)) { - DEBUG(3,("sam_enum_domains: ACCESS DENIED\n")); - return nt_status; - } - - tmp_methods= context->methods; - *domain_count = 0; - - while (tmp_methods) { - (*domain_count)++; - tmp_methods= tmp_methods->next; - } - - DEBUG(6,("sam_enum_domains: enumerating %d domains\n", (*domain_count))); - - tmp_methods = context->methods; - - if (((*domains) = malloc( sizeof(DOM_SID) * (*domain_count))) == NULL) { - DEBUG(0,("sam_enum_domains: Out of memory allocating domain SID list\n")); - return NT_STATUS_NO_MEMORY; - } - - if (((*domain_names) = malloc( sizeof(char*) * (*domain_count))) == NULL) { - DEBUG(0,("sam_enum_domains: Out of memory allocating domain name list\n")); - SAFE_FREE((*domains)); - return NT_STATUS_NO_MEMORY; - } - - while (tmp_methods) { - DEBUGADD(7,(" [%d] %s: %s\n", i, tmp_methods->domain_name, sid_string_static(&tmp_methods->domain_sid))); - sid_copy(domains[i],&tmp_methods->domain_sid); - *domain_names[i] = smb_xstrdup(tmp_methods->domain_name); - i++; - tmp_methods= tmp_methods->next; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_lookup_domain(const SAM_CONTEXT *context, const NT_USER_TOKEN *access_token, const char *domain, DOM_SID **domainsid) -{ - SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - SEC_DESC *sd; - size_t sd_size; - uint32 acc_granted; - - DEBUG(5,("sam_lookup_domain: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - /* invalid paramters */ - SAM_ASSERT(access_token && domain && domainsid); - - if (!NT_STATUS_IS_OK(nt_status = samr_make_sam_obj_sd(context->mem_ctx, &sd, &sd_size))) { - DEBUG(4,("samr_make_sam_obj_sd failed\n")); - return nt_status; - } - - if (!se_access_check(sd, access_token, SA_RIGHT_SAM_OPEN_DOMAIN, &acc_granted, &nt_status)) { - DEBUG(3,("sam_lookup_domain: ACCESS DENIED\n")); - return nt_status; - } - - tmp_methods= context->methods; - - while (tmp_methods) { - if (strcmp(domain, tmp_methods->domain_name) == 0) { - (*domainsid) = (DOM_SID *)malloc(sizeof(DOM_SID)); - sid_copy((*domainsid), &tmp_methods->domain_sid); - return NT_STATUS_OK; - } - tmp_methods= tmp_methods->next; - } - - return NT_STATUS_NO_SUCH_DOMAIN; -} - - -NTSTATUS sam_get_domain_by_sid(const SAM_CONTEXT *context, const NT_USER_TOKEN *access_token, uint32 access_desired, const DOM_SID *domainsid, SAM_DOMAIN_HANDLE **domain) -{ - SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - DEBUG(5,("sam_get_domain_by_sid: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - SAM_ASSERT(access_token && domainsid && domain); - - if (!NT_STATUS_IS_OK(nt_status = sam_get_methods_by_sid(context, &tmp_methods, domainsid))) { - DEBUG(4,("sam_get_methods_by_sid failed\n")); - return nt_status; - } - - if (!tmp_methods->sam_get_domain_handle) { - DEBUG(3, ("sam_get_domain_by_sid: sam_methods of the domain did not specify sam_get_domain_handle\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_get_domain_handle(tmp_methods, access_token, access_desired, domain))) { - DEBUG(4,("sam_get_domain_handle for %s in backend %s failed\n", - sid_string_static(domainsid), tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_create_account(const SAM_CONTEXT *context, const NT_USER_TOKEN *access_token, uint32 access_desired, const DOM_SID *domainsid, const char *account_name, uint16 acct_ctrl, SAM_ACCOUNT_HANDLE **account) -{ - SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - DEBUG(5,("sam_create_account: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - /* invalid parmaters */ - SAM_ASSERT(access_token && domainsid && account_name && account); - - if (!NT_STATUS_IS_OK(nt_status = sam_get_methods_by_sid(context, &tmp_methods, domainsid))) { - DEBUG(4,("sam_get_methods_by_sid failed\n")); - return nt_status; - } - - if (!tmp_methods->sam_create_account) { - DEBUG(3, ("sam_create_account: sam_methods of the domain did not specify sam_create_account\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_create_account(tmp_methods, access_token, access_desired, account_name, acct_ctrl, account))) { - DEBUG(4,("sam_create_account in backend %s failed\n", - tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_add_account(const SAM_CONTEXT *context, const SAM_ACCOUNT_HANDLE *account) -{ - DOM_SID domainsid; - const DOM_SID *accountsid; - SAM_METHODS *tmp_methods; - uint32 rid; - NTSTATUS nt_status; - - DEBUG(5,("sam_add_account: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - /* invalid parmaters */ - SAM_ASSERT(account); - - if (!NT_STATUS_IS_OK(nt_status = sam_get_account_sid(account, &accountsid))) { - DEBUG(0,("Can't get account SID\n")); - return nt_status; - } - - sid_copy(&domainsid, accountsid); - if (!sid_split_rid(&domainsid, &rid)) { - DEBUG(3,("sam_get_account_by_sid: failed to split the sid\n")); - return NT_STATUS_INVALID_SID; - } - - if (!NT_STATUS_IS_OK(nt_status = sam_get_methods_by_sid(context, &tmp_methods, &domainsid))) { - DEBUG(4,("sam_get_methods_by_sid failed\n")); - return nt_status; - } - - if (!tmp_methods->sam_add_account) { - DEBUG(3, ("sam_add_account: sam_methods of the domain did not specify sam_add_account\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_add_account(tmp_methods, account))){ - DEBUG(4,("sam_add_account in backend %s failed\n", - tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_update_account(const SAM_CONTEXT *context, const SAM_ACCOUNT_HANDLE *account) -{ - const SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - DEBUG(5,("sam_update_account: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - /* invalid account specified */ - SAM_ASSERT(account && account->current_sam_methods); - - tmp_methods = account->current_sam_methods; - - if (!tmp_methods->sam_update_account) { - DEBUG(3, ("sam_update_account: sam_methods of the domain did not specify sam_update_account\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_update_account(tmp_methods, account))){ - DEBUG(4,("sam_update_account in backend %s failed\n", - tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_delete_account(const SAM_CONTEXT *context, const SAM_ACCOUNT_HANDLE *account) -{ - const SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - DEBUG(5,("sam_delete_account: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - /* invalid account specified */ - SAM_ASSERT(account && account->current_sam_methods); - - tmp_methods = account->current_sam_methods; - - if (!tmp_methods->sam_delete_account) { - DEBUG(3, ("sam_delete_account: sam_methods of the domain did not specify sam_delete_account\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_delete_account(tmp_methods, account))){ - DEBUG(4,("sam_delete_account in backend %s failed\n", - tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_enum_accounts(const SAM_CONTEXT *context, const NT_USER_TOKEN *access_token, const DOM_SID *domainsid, uint16 acct_ctrl, int32 *account_count, SAM_ACCOUNT_ENUM **accounts) -{ - SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - DEBUG(5,("sam_enum_accounts: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - SAM_ASSERT(access_token && domainsid && account_count && accounts); - - if (!NT_STATUS_IS_OK(nt_status = sam_get_methods_by_sid(context, &tmp_methods, domainsid))) { - DEBUG(4,("sam_get_methods_by_sid failed\n")); - return nt_status; - } - - if (!tmp_methods->sam_enum_accounts) { - DEBUG(3, ("sam_enum_accounts: sam_methods of the domain did not specify sam_enum_accounts\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_enum_accounts(tmp_methods, access_token, acct_ctrl, account_count, accounts))) { - DEBUG(4,("sam_enum_accounts for domain %s in backend %s failed\n", - tmp_methods->domain_name, tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - - -NTSTATUS sam_get_account_by_sid(const SAM_CONTEXT *context, const NT_USER_TOKEN *access_token, uint32 access_desired, const DOM_SID *accountsid, SAM_ACCOUNT_HANDLE **account) -{ - SAM_METHODS *tmp_methods; - uint32 rid; - DOM_SID domainsid; - NTSTATUS nt_status; - - DEBUG(5,("sam_get_account_by_sid: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - SAM_ASSERT(access_token && accountsid && account); - - sid_copy(&domainsid, accountsid); - if (!sid_split_rid(&domainsid, &rid)) { - DEBUG(3,("sam_get_account_by_sid: failed to split the sid\n")); - return NT_STATUS_INVALID_SID; - } - - - if (!NT_STATUS_IS_OK(nt_status = sam_get_methods_by_sid(context, &tmp_methods, &domainsid))) { - DEBUG(4,("sam_get_methods_by_sid failed\n")); - return nt_status; - } - - if (!tmp_methods->sam_get_account_by_sid) { - DEBUG(3, ("sam_get_account_by_sid: sam_methods of the domain did not specify sam_get_account_by_sid\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_get_account_by_sid(tmp_methods, access_token, access_desired, accountsid, account))) { - DEBUG(4,("sam_get_account_by_sid for %s in backend %s failed\n", - sid_string_static(accountsid), tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_account_by_name(const SAM_CONTEXT *context, const NT_USER_TOKEN *access_token, uint32 access_desired, const char *domain, const char *name, SAM_ACCOUNT_HANDLE **account) -{ - SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - DEBUG(5,("sam_get_account_by_name: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - SAM_ASSERT(access_token && domain && name && account); - - if (!NT_STATUS_IS_OK(nt_status = sam_get_methods_by_name(context, &tmp_methods, domain))) { - DEBUG(4,("sam_get_methods_by_name failed\n")); - return nt_status; - } - - if (!tmp_methods->sam_get_account_by_name) { - DEBUG(3, ("sam_get_account_by_name: sam_methods of the domain did not specify sam_get_account_by_name\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_get_account_by_name(tmp_methods, access_token, access_desired, name, account))) { - DEBUG(4,("sam_get_account_by_name for %s\\%s in backend %s failed\n", - domain, name, tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_create_group(const SAM_CONTEXT *context, const NT_USER_TOKEN *access_token, uint32 access_desired, const DOM_SID *domainsid, const char *group_name, uint16 group_ctrl, SAM_GROUP_HANDLE **group) -{ - SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - DEBUG(5,("sam_create_group: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - SAM_ASSERT(access_token && domainsid && group_name && group); - - if (!NT_STATUS_IS_OK(nt_status = sam_get_methods_by_sid(context, &tmp_methods, domainsid))) { - DEBUG(4,("sam_get_methods_by_sid failed\n")); - return nt_status; - } - - if (!tmp_methods->sam_create_group) { - DEBUG(3, ("sam_create_group: sam_methods of the domain did not specify sam_create_group\n")); - return NT_STATUS_UNSUCCESSFUL; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_create_group(tmp_methods, access_token, access_desired, group_name, group_ctrl, group))) { - DEBUG(4,("sam_create_group in backend %s failed\n", - tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_add_group(const SAM_CONTEXT *context, const SAM_GROUP_HANDLE *group) -{ - DOM_SID domainsid; - const DOM_SID *groupsid; - SAM_METHODS *tmp_methods; - uint32 rid; - NTSTATUS nt_status; - - DEBUG(5,("sam_add_group: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - SAM_ASSERT(group); - - if (!NT_STATUS_IS_OK(nt_status = sam_get_group_sid(group, &groupsid))) { - DEBUG(0,("Can't get group SID\n")); - return nt_status; - } - - sid_copy(&domainsid, groupsid); - if (!sid_split_rid(&domainsid, &rid)) { - DEBUG(3,("sam_get_group_by_sid: failed to split the sid\n")); - return NT_STATUS_INVALID_SID; - } - - if (!NT_STATUS_IS_OK(nt_status = sam_get_methods_by_sid(context, &tmp_methods, &domainsid))) { - DEBUG(4,("sam_get_methods_by_sid failed\n")); - return nt_status; - } - - if (!tmp_methods->sam_add_group) { - DEBUG(3, ("sam_add_group: sam_methods of the domain did not specify sam_add_group\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_add_group(tmp_methods, group))){ - DEBUG(4,("sam_add_group in backend %s failed\n", - tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_update_group(const SAM_CONTEXT *context, const SAM_GROUP_HANDLE *group) -{ - const SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - DEBUG(5,("sam_update_group: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - /* invalid group specified */ - SAM_ASSERT(group && group->current_sam_methods); - - tmp_methods = group->current_sam_methods; - - if (!tmp_methods->sam_update_group) { - DEBUG(3, ("sam_update_group: sam_methods of the domain did not specify sam_update_group\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_update_group(tmp_methods, group))){ - DEBUG(4,("sam_update_group in backend %s failed\n", - tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_delete_group(const SAM_CONTEXT *context, const SAM_GROUP_HANDLE *group) -{ - const SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - DEBUG(5,("sam_delete_group: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - /* invalid group specified */ - SAM_ASSERT(group && group->current_sam_methods); - - tmp_methods = group->current_sam_methods; - - if (!tmp_methods->sam_delete_group) { - DEBUG(3, ("sam_delete_group: sam_methods of the domain did not specify sam_delete_group\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_delete_group(tmp_methods, group))){ - DEBUG(4,("sam_delete_group in backend %s failed\n", - tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_enum_groups(const SAM_CONTEXT *context, const NT_USER_TOKEN *access_token, const DOM_SID *domainsid, uint16 group_ctrl, uint32 *groups_count, SAM_GROUP_ENUM **groups) -{ - SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - DEBUG(5,("sam_enum_groups: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - SAM_ASSERT(access_token && domainsid && groups_count && groups); - - if (!NT_STATUS_IS_OK(nt_status = sam_get_methods_by_sid(context, &tmp_methods, domainsid))) { - DEBUG(4,("sam_get_methods_by_sid failed\n")); - return nt_status; - } - - if (!tmp_methods->sam_enum_accounts) { - DEBUG(3, ("sam_enum_groups: sam_methods of the domain did not specify sam_enum_groups\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_enum_groups(tmp_methods, access_token, group_ctrl, groups_count, groups))) { - DEBUG(4,("sam_enum_groups for domain %s in backend %s failed\n", - tmp_methods->domain_name, tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_group_by_sid(const SAM_CONTEXT *context, const NT_USER_TOKEN *access_token, uint32 access_desired, const DOM_SID *groupsid, SAM_GROUP_HANDLE **group) -{ - SAM_METHODS *tmp_methods; - uint32 rid; - NTSTATUS nt_status; - DOM_SID domainsid; - - DEBUG(5,("sam_get_group_by_sid: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - SAM_ASSERT(access_token && groupsid && group); - - sid_copy(&domainsid, groupsid); - if (!sid_split_rid(&domainsid, &rid)) { - DEBUG(3,("sam_get_group_by_sid: failed to split the sid\n")); - return NT_STATUS_INVALID_SID; - } - - - if (!NT_STATUS_IS_OK(nt_status = sam_get_methods_by_sid(context, &tmp_methods, &domainsid))) { - DEBUG(4,("sam_get_methods_by_sid failed\n")); - return nt_status; - } - - if (!tmp_methods->sam_get_group_by_sid) { - DEBUG(3, ("sam_get_group_by_sid: sam_methods of the domain did not specify sam_get_group_by_sid\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_get_group_by_sid(tmp_methods, access_token, access_desired, groupsid, group))) { - DEBUG(4,("sam_get_group_by_sid for %s in backend %s failed\n", - sid_string_static(groupsid), tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_group_by_name(const SAM_CONTEXT *context, const NT_USER_TOKEN *access_token, uint32 access_desired, const char *domain, const char *name, SAM_GROUP_HANDLE **group) -{ - SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - DEBUG(5,("sam_get_group_by_name: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - SAM_ASSERT(access_token && domain && name && group); - - if (!NT_STATUS_IS_OK(nt_status = sam_get_methods_by_name(context, &tmp_methods, domain))) { - DEBUG(4,("sam_get_methods_by_name failed\n")); - return nt_status; - } - - if (!tmp_methods->sam_get_group_by_name) { - DEBUG(3, ("sam_get_group_by_name: sam_methods of the domain did not specify sam_get_group_by_name\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_get_group_by_name(tmp_methods, access_token, access_desired, name, group))) { - DEBUG(4,("sam_get_group_by_name for %s\\%s in backend %s failed\n", - domain, name, tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_add_member_to_group(const SAM_CONTEXT *context, const SAM_GROUP_HANDLE *group, const SAM_GROUP_MEMBER *member) -{ - const SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - SAM_SETUP_CONTEXT; - - /* invalid group or member specified */ - SAM_ASSERT(group && group->current_sam_methods && member); - - tmp_methods = group->current_sam_methods; - - if (!tmp_methods->sam_add_member_to_group) { - DEBUG(3, ("sam_add_member_to_group: sam_methods of the domain did not specify sam_add_member_to_group\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_add_member_to_group(tmp_methods, group, member))) { - DEBUG(4,("sam_add_member_to_group in backend %s failed\n", tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; - -} - -NTSTATUS sam_delete_member_from_group(const SAM_CONTEXT *context, const SAM_GROUP_HANDLE *group, const SAM_GROUP_MEMBER *member) -{ - const SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - SAM_SETUP_CONTEXT; - - /* invalid group or member specified */ - SAM_ASSERT(group && group->current_sam_methods && member); - - tmp_methods = group->current_sam_methods; - - if (!tmp_methods->sam_delete_member_from_group) { - DEBUG(3, ("sam_delete_member_from_group: sam_methods of the domain did not specify sam_delete_member_from_group\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_delete_member_from_group(tmp_methods, group, member))) { - DEBUG(4,("sam_delete_member_from_group in backend %s failed\n", tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_enum_groupmembers(const SAM_CONTEXT *context, const SAM_GROUP_HANDLE *group, uint32 *members_count, SAM_GROUP_MEMBER **members) -{ - const SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - SAM_SETUP_CONTEXT; - - /* invalid group specified */ - SAM_ASSERT(group && group->current_sam_methods && members_count && members); - - tmp_methods = group->current_sam_methods; - - if (!tmp_methods->sam_enum_groupmembers) { - DEBUG(3, ("sam_enum_groupmembers: sam_methods of the domain did not specify sam_enum_group_members\n")); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_enum_groupmembers(tmp_methods, group, members_count, members))) { - DEBUG(4,("sam_enum_groupmembers in backend %s failed\n", tmp_methods->backendname)); - return nt_status; - } - - return NT_STATUS_OK; -} - -NTSTATUS sam_get_groups_of_sid(const SAM_CONTEXT *context, const NT_USER_TOKEN *access_token, const DOM_SID **sids, uint16 group_ctrl, uint32 *group_count, SAM_GROUP_ENUM **groups) -{ - SAM_METHODS *tmp_methods; - NTSTATUS nt_status; - - uint32 tmp_group_count; - SAM_GROUP_ENUM *tmp_groups; - - DEBUG(5,("sam_get_groups_of_sid: %d\n", __LINE__)); - - SAM_SETUP_CONTEXT; - - /* invalid sam_context specified */ - SAM_ASSERT(access_token && sids && context && context->methods); - - *group_count = 0; - - *groups = NULL; - - tmp_methods= context->methods; - - while (tmp_methods) { - DEBUG(5,("getting groups from domain \n")); - if (!tmp_methods->sam_get_groups_of_sid) { - DEBUG(3, ("sam_get_groups_of_sid: sam_methods of domain did not specify sam_get_groups_of_sid\n")); - SAFE_FREE(*groups); - return NT_STATUS_NOT_IMPLEMENTED; - } - - if (!NT_STATUS_IS_OK(nt_status = tmp_methods->sam_get_groups_of_sid(tmp_methods, access_token, sids, group_ctrl, &tmp_group_count, &tmp_groups))) { - DEBUG(4,("sam_get_groups_of_sid in backend %s failed\n", tmp_methods->backendname)); - SAFE_FREE(*groups); - return nt_status; - } - - *groups = Realloc(*groups, ((*group_count) + tmp_group_count) * sizeof(SAM_GROUP_ENUM)); - - memcpy(&(*groups)[*group_count], tmp_groups, tmp_group_count); - - SAFE_FREE(tmp_groups); - - *group_count += tmp_group_count; - - tmp_methods = tmp_methods->next; - } - - return NT_STATUS_OK; -} - - diff --git a/source3/sam/sam_ads.c b/source3/sam/sam_ads.c deleted file mode 100755 index 13e03690049..00000000000 --- a/source3/sam/sam_ads.c +++ /dev/null @@ -1,1378 +0,0 @@ -/* - Unix SMB/CIFS implementation. - Active Directory SAM backend, for simulate a W2K DC in mixed mode. - - Copyright (C) Stefan (metze) Metzmacher 2002 - Copyright (C) Andrew Bartlett 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" - - -#ifdef HAVE_LDAP - -static int sam_ads_debug_level = DBGC_SAM; - -#undef DBGC_CLASS -#define DBGC_CLASS sam_ads_debug_level - -#ifndef FIXME -#define FIXME( body ) { DEBUG(0,("FIXME: "));\ - DEBUGADD(0,(body));} -#endif - -#define ADS_STATUS_OK ADS_ERROR(0) -#define ADS_STATUS_UNSUCCESSFUL ADS_ERROR_NT(NT_STATUS_UNSUCCESSFUL) -#define ADS_STATUS_NOT_IMPLEMENTED ADS_ERROR_NT(NT_STATUS_NOT_IMPLEMENTED) - - -#define ADS_SUBTREE_BUILTIN "CN=Builtin," -#define ADS_SUBTREE_COMPUTERS "CN=Computers," -#define ADS_SUBTREE_DC "CN=Domain Controllers," -#define ADS_SUBTREE_USERS "CN=Users," -#define ADS_ROOT_TREE "" -/* Here are private module structs and functions */ - -typedef struct sam_ads_privates { - ADS_STRUCT *ads_struct; - TALLOC_CTX *mem_ctx; - BOOL bind_plaintext; - char *ads_bind_dn; - char *ads_bind_pw; - char *ldap_uri; - /* did we need something more? */ -}SAM_ADS_PRIVATES; - - -/* get only these LDAP attributes, witch we really need for an account */ -const char *account_attrs[] = { "objectSid", - "objectGUID", - "sAMAccountType", - "sAMAcountName", - "userPrincipalName", - "accountExpires", - "badPasswordTime", - "badPwdCount", - "lastLogoff", - "lastLogon", - "userWorkstations", - "dBCSPwd", - "unicodePwd", - "pwdLastSet", - "userAccountControl", - "profilePath", - "homeDrive", - "scriptPath", - "homeDirectory", - "cn", - "primaryGroupID",/* 513 */ - "nsNPAllowDialIn",/* TRUE */ - "userParameters",/* Dial Back number ...*/ - "codePage",/* 0 */ - "countryCode",/* 0 */ - "adminCount",/* 1 or 0 */ - "logonCount",/* 0 */ - "managedObjects", - "memberOf",/* dn */ - "instanceType",/* 4 */ - "name", /* sync with cn */ - "description", - /* "nTSecurityDescriptor", */ - NULL}; - -/* get only these LDAP attributes, witch we really need for a group */ -const char *group_attrs[] = {"objectSid", - /* "objectGUID", */ - "sAMAccountType", - "sAMAcountName", - "groupType", - /* "member", */ - "description", - "name", /* sync with cn */ - /* "nTSecurityDescriptor", */ - NULL}; - - -/*************************************************** - return our ads connection. We keep the connection - open to make things faster -****************************************************/ -static ADS_STATUS sam_ads_cached_connection(SAM_ADS_PRIVATES *privates) -{ - ADS_STRUCT *ads_struct; - ADS_STATUS ads_status; - - if (!privates->ads_struct) { - privates->ads_struct = ads_init_simple(); - ads_struct = privates->ads_struct; - ads_struct->server.ldap_uri = smb_xstrdup(privates->ldap_uri); - if ((!privates->ads_bind_dn) || (!*privates->ads_bind_dn)) { - ads_struct->auth.flags |= ADS_AUTH_ANON_BIND; - } else { - ads_struct->auth.user_name - = smb_xstrdup(privates->ads_bind_dn); - if (privates->ads_bind_pw) { - ads_struct->auth.password - = smb_xstrdup(privates->ads_bind_pw); - } - } - if (privates->bind_plaintext) { - ads_struct->auth.flags |= ADS_AUTH_SIMPLE_BIND; - } - } else { - ads_struct = privates->ads_struct; - } - - if (ads_struct->ld != NULL) { - /* connection has been opened. ping server. */ - struct sockaddr_un addr; - socklen_t len; - int sd; - if (ldap_get_option(ads_struct->ld, LDAP_OPT_DESC, &sd) == 0 && - getpeername(sd, (struct sockaddr *) &addr, &len) < 0) { - /* the other end has died. reopen. */ - ldap_unbind_ext(ads_struct->ld, NULL, NULL); - ads_struct->ld = NULL; - } - } - - if (ads_struct->ld != NULL) { - DEBUG(5,("sam_ads_cached_connection: allready connected to the LDAP server\n")); - return ADS_SUCCESS; - } - - ads_status = ads_connect(ads_struct); - - ads_status = ads_server_info(ads_struct); - if (!ADS_ERR_OK(ads_status)) { - DEBUG(0,("Can't set server info: %s\n",ads_errstr(ads_status))); - /* return ads_status; */ FIXME("for now we only warn!\n"); - } - - DEBUG(2, ("sam_ads_cached_connection: succesful connection to the LDAP server\n")); - return ADS_SUCCESS; -} - -static ADS_STATUS sam_ads_do_search(SAM_ADS_PRIVATES *privates, const char *bind_path, int scope, const char *exp, const char **attrs, void **res) -{ - ADS_STATUS ads_status = ADS_ERROR_NT(NT_STATUS_UNSUCCESSFUL); - - ads_status = sam_ads_cached_connection(privates); - if (!ADS_ERR_OK(ads_status)) - return ads_status; - - return ads_do_search_retry(privates->ads_struct, bind_path, scope, exp, attrs, res); -} - - -/********************************************* -here we have to check the update serial number - - this is the core of the ldap cache -*********************************************/ -static ADS_STATUS sam_ads_usn_is_valid(SAM_ADS_PRIVATES *privates, uint32 usn_in, uint32 *usn_out) -{ - ADS_STATUS ads_status = ADS_ERROR_NT(NT_STATUS_UNSUCCESSFUL); - - SAM_ASSERT(privates && privates->ads_struct && usn_out); - - ads_status = ads_USN(privates->ads_struct, usn_out); - if (!ADS_ERR_OK(ads_status)) - return ads_status; - - if (*usn_out == usn_in) - return ADS_SUCCESS; - - return ads_status; -} - -/*********************************************** -Initialize SAM_ACCOUNT_HANDLE from an ADS query -************************************************/ -/* not ready :-( */ -static ADS_STATUS ads_entry2sam_account_handle(SAM_ADS_PRIVATES *privates, SAM_ACCOUNT_HANDLE *account ,void *msg) -{ - ADS_STATUS ads_status = ADS_ERROR_NT(NT_STATUS_NO_SUCH_USER); - NTSTATUS nt_status = NT_STATUS_NO_SUCH_USER; - ADS_STRUCT *ads_struct = privates->ads_struct; - TALLOC_CTX *mem_ctx = account->mem_ctx; - char *tmp_str = NULL; - - SAM_ASSERT(privates && ads_struct && account && mem_ctx && msg); - - FIXME("should we really use ads_pull_username()(or ads_pull_string())?\n"); - if ((account->private.account_name = ads_pull_username(ads_struct, mem_ctx, msg))==NULL) { - DEBUG(0,("ads_pull_username failed\n")); - return ADS_ERROR_NT(NT_STATUS_NO_SUCH_USER); - } - - if ((account->private.full_name = ads_pull_string(ads_struct, mem_ctx, msg,"name"))==NULL) { - DEBUG(3,("ads_pull_string for 'name' failed - skip\n")); - } - - if ((account->private.acct_desc = ads_pull_string(ads_struct, mem_ctx, msg,"description"))!=NULL) { - DEBUG(3,("ads_pull_string for 'acct_desc' failed - skip\n")); - } - - if ((account->private.home_dir = ads_pull_string(ads_struct, mem_ctx, msg,"homeDirectory"))!=NULL) { - DEBUG(3,("ads_pull_string for 'homeDirectory' failed - skip\n")); - } - - if ((account->private.dir_drive = ads_pull_string(ads_struct, mem_ctx, msg,"homeDrive"))!=NULL) { - DEBUG(3,("ads_pull_string for 'homeDrive' failed - skip\n")); - } - - if ((account->private.profile_path = ads_pull_string(ads_struct, mem_ctx, msg,"profilePath"))!=NULL) { - DEBUG(3,("ads_pull_string for 'profilePath' failed - skip\n")); - } - - if ((account->private.logon_script = ads_pull_string(ads_struct, mem_ctx, msg,"scriptPath"))!=NULL) { - DEBUG(3,("ads_pull_string for 'scriptPath' failed - skip\n")); - } - - FIXME("check 'nsNPAllowDialIn' for munged_dial!\n"); - if ((account->private.munged_dial = ads_pull_string(ads_struct, mem_ctx, msg,"userParameters"))!=NULL) { - DEBUG(3,("ads_pull_string for 'userParameters' failed - skip\n")); - } - - if ((account->private.unix_home_dir = ads_pull_string(ads_struct, mem_ctx, msg,"msSFUHomeDrirectory"))!=NULL) { - DEBUG(3,("ads_pull_string for 'msSFUHomeDrirectory' failed - skip\n")); - } - -#if 0 - FIXME("use function intern mem_ctx for pwdLastSet\n"); - if ((tmp_str = ads_pull_string(ads_struct, mem_ctx, msg,"pwdLastSet"))!=NULL) { - DEBUG(3,("ads_pull_string for 'pwdLastSet' failed - skip\n")); - } else { - account->private.pass_last_set_time = ads_parse_nttime(tmp_str); - tmp_str = NULL; - - } -#endif - -#if 0 -typedef struct sam_account_handle { - TALLOC_CTX *mem_ctx; - uint32 access_granted; - const struct sam_methods *current_sam_methods; /* sam_methods creating this handle */ - void (*free_fn)(struct sam_account_handle **); - struct sam_account_data { - uint32 init_flag; - NTTIME logon_time; /* logon time */ - NTTIME logoff_time; /* logoff time */ - NTTIME kickoff_time; /* kickoff time */ - NTTIME pass_last_set_time; /* password last set time */ - NTTIME pass_can_change_time; /* password can change time */ - NTTIME pass_must_change_time; /* password must change time */ - char * account_name; /* account_name string */ - SAM_DOMAIN_HANDLE * domain; /* domain of account */ - char *full_name; /* account's full name string */ - char *unix_home_dir; /* UNIX home directory string */ - char *home_dir; /* home directory string */ - char *dir_drive; /* home directory drive string */ - char *logon_script; /* logon script string */ - char *profile_path; /* profile path string */ - char *acct_desc; /* account description string */ - char *workstations; /* login from workstations string */ - char *unknown_str; /* don't know what this is, yet. */ - char *munged_dial; /* munged path name and dial-back tel number */ - DOM_SID account_sid; /* Primary Account SID */ - DOM_SID group_sid; /* Primary Group SID */ - DATA_BLOB lm_pw; /* .data is Null if no password */ - DATA_BLOB nt_pw; /* .data is Null if no password */ - char *plaintext_pw; /* if Null not available */ - uint16 acct_ctrl; /* account info (ACB_xxxx bit-mask) */ - uint32 unknown_1; /* 0x00ff ffff */ - uint16 logon_divs; /* 168 - number of hours in a week */ - uint32 hours_len; /* normally 21 bytes */ - uint8 hours[MAX_HOURS_LEN]; - uint32 unknown_2; /* 0x0002 0000 */ - uint32 unknown_3; /* 0x0000 04ec */ - } private; -} SAM_ACCOUNT_HANDLE; -#endif - - return ads_status; -} - - -/*********************************************** -Initialize SAM_GROUP_ENUM from an ads entry -************************************************/ -/* not ready :-( */ -static ADS_STATUS ads_entry2sam_group_enum(SAM_ADS_PRIVATES *privates, TALLOC_CTX *mem_ctx, SAM_GROUP_ENUM **group_enum,const void *entry) -{ - ADS_STATUS ads_status = ADS_STATUS_UNSUCCESSFUL; - ADS_STRUCT *ads_struct = privates->ads_struct; - SAM_GROUP_ENUM __group_enum; - SAM_GROUP_ENUM *_group_enum = &__group_enum; - - SAM_ASSERT(privates && ads_struct && mem_ctx && group_enum && entry); - - *group_enum = _group_enum; - - DEBUG(3,("sam_ads: ads_entry2sam_account_handle\n")); - - if (!ads_pull_sid(ads_struct, &entry, "objectSid", &(_group_enum->sid))) { - DEBUG(0,("No sid for!?\n")); - return ADS_STATUS_UNSUCCESSFUL; - } - - if (!(_group_enum->group_name = ads_pull_string(ads_struct, mem_ctx, &entry, "sAMAccountName"))) { - DEBUG(0,("No groupname found")); - return ADS_STATUS_UNSUCCESSFUL; - } - - if (!(_group_enum->group_desc = ads_pull_string(ads_struct, mem_ctx, &entry, "desciption"))) { - DEBUG(0,("No description found")); - return ADS_STATUS_UNSUCCESSFUL; - } - - DEBUG(0,("sAMAccountName: %s\ndescription: %s\nobjectSid: %s\n", - _group_enum->group_name, - _group_enum->group_desc, - sid_string_static(&(_group_enum->sid)) - )); - - return ads_status; -} - -static ADS_STATUS sam_ads_access_check(SAM_ADS_PRIVATES *privates, const SEC_DESC *sd, const NT_USER_TOKEN *access_token, uint32 access_desired, uint32 *acc_granted) -{ - ADS_STATUS ads_status = ADS_ERROR_NT(NT_STATUS_ACCESS_DENIED); - NTSTATUS nt_status; - uint32 my_acc_granted; - - SAM_ASSERT(privates && sd && access_token); - /* acc_granted can be set to NULL */ - - /* the steps you need are: - 1. get_sec_desc for sid - 2. se_map_generic(accessdesired, generic_mapping) - 3. se_access_check() */ - - if (!se_access_check(sd, access_token, access_desired, (acc_granted)?acc_granted:&my_acc_granted, &nt_status)) { - DEBUG(3,("sam_ads_access_check: ACCESS DENIED\n")); - ads_status = ADS_ERROR_NT(nt_status); - return ads_status; - } - ads_status = ADS_ERROR_NT(nt_status); - return ads_status; -} - -static ADS_STATUS sam_ads_get_tree_sec_desc(SAM_ADS_PRIVATES *privates, const char *subtree, SEC_DESC **sd) -{ - ADS_STATUS ads_status = ADS_ERROR_NT(NT_STATUS_INVALID_PARAMETER); - ADS_STRUCT *ads_struct = privates->ads_struct; - TALLOC_CTX *mem_ctx = privates->mem_ctx; - char *search_path; - void *sec_desc_res; - void *sec_desc_msg; - const char *sec_desc_attrs[] = {"nTSecurityDescriptor",NULL}; - - SAM_ASSERT(privates && ads_struct && mem_ctx && sd); - *sd = NULL; - - if (subtree) { - asprintf(&search_path, "%s%s",subtree,ads_struct->config.bind_path); - } else { - asprintf(&search_path, "%s",""); - } - ads_status = sam_ads_do_search(privates, search_path, LDAP_SCOPE_BASE, "(objectClass=*)", sec_desc_attrs, &sec_desc_res); - SAFE_FREE(search_path); - if (!ADS_ERR_OK(ads_status)) - return ads_status; - - if ((sec_desc_msg = ads_first_entry(ads_struct, sec_desc_res))==NULL) { - ads_status = ADS_ERROR_NT(NT_STATUS_INVALID_PARAMETER); - return ads_status; - } - - if (!ads_pull_sd(ads_struct, mem_ctx, sec_desc_msg, sec_desc_attrs[0], sd)) { - *sd = NULL; - ads_status = ADS_ERROR_NT(NT_STATUS_INVALID_PARAMETER); - return ads_status; - } - - return ads_status; -} - -static ADS_STATUS sam_ads_account_policy_get(SAM_ADS_PRIVATES *privates, int field, uint32 *value) -{ - ADS_STATUS ads_status = ADS_ERROR_NT(NT_STATUS_INVALID_PARAMETER); - ADS_STRUCT *ads_struct = privates->ads_struct; - void *ap_res; - void *ap_msg; - const char *ap_attrs[] = {"minPwdLength",/* AP_MIN_PASSWORD_LEN */ - "pwdHistoryLength",/* AP_PASSWORD_HISTORY */ - "AP_USER_MUST_LOGON_TO_CHG_PASS",/* AP_USER_MUST_LOGON_TO_CHG_PASS */ - "maxPwdAge",/* AP_MAX_PASSWORD_AGE */ - "minPwdAge",/* AP_MIN_PASSWORD_AGE */ - "lockoutDuration",/* AP_LOCK_ACCOUNT_DURATION */ - "AP_RESET_COUNT_TIME",/* AP_RESET_COUNT_TIME */ - "AP_BAD_ATTEMPT_LOCKOUT",/* AP_BAD_ATTEMPT_LOCKOUT */ - "AP_TIME_TO_LOGOUT",/* AP_TIME_TO_LOGOUT */ - NULL}; - /*lockOutObservationWindow - lockoutThreshold $ pwdProperties*/ - static uint32 ap[9]; - static uint32 ap_usn = 0; - uint32 tmp_usn = 0; - - SAM_ASSERT(privates && ads_struct && value); - - FIXME("We need to decode all account_policy attributes!\n"); - - ads_status = sam_ads_usn_is_valid(privates,ap_usn,&tmp_usn); - if (!ADS_ERR_OK(ads_status)) { - ads_status = sam_ads_do_search(privates, ads_struct->config.bind_path, LDAP_SCOPE_BASE, "(objectClass=*)", ap_attrs, &ap_res); - if (!ADS_ERR_OK(ads_status)) - return ads_status; - - if (ads_count_replies(ads_struct, ap_res) != 1) { - ads_msgfree(ads_struct, ap_res); - return ADS_ERROR(LDAP_NO_RESULTS_RETURNED); - } - - if (!(ap_msg = ads_first_entry(ads_struct, ap_res))) { - ads_msgfree(ads_struct, ap_res); - return ADS_ERROR(LDAP_NO_RESULTS_RETURNED); - } - - if (!ads_pull_uint32(ads_struct, ap_msg, ap_attrs[0], &ap[0])) { - /* AP_MIN_PASSWORD_LEN */ - ap[0] = MINPASSWDLENGTH;/* 5 chars minimum */ - } - if (!ads_pull_uint32(ads_struct, ap_msg, ap_attrs[1], &ap[1])) { - /* AP_PASSWORD_HISTORY */ - ap[1] = 0;/* don't keep any old password */ - } - if (!ads_pull_uint32(ads_struct, ap_msg, ap_attrs[2], &ap[2])) { - /* AP_USER_MUST_LOGON_TO_CHG_PASS */ - ap[2] = 0;/* don't force user to logon */ - } - if (!ads_pull_uint32(ads_struct, ap_msg, ap_attrs[3], &ap[3])) { - /* AP_MAX_PASSWORD_AGE */ - ap[3] = MAX_PASSWORD_AGE;/* 21 days */ - } - if (!ads_pull_uint32(ads_struct, ap_msg, ap_attrs[4], &ap[4])) { - /* AP_MIN_PASSWORD_AGE */ - ap[4] = 0;/* 0 days */ - } - if (!ads_pull_uint32(ads_struct, ap_msg, ap_attrs[5], &ap[5])) { - /* AP_LOCK_ACCOUNT_DURATION */ - ap[5] = 0;/* lockout for 0 minutes */ - } - if (!ads_pull_uint32(ads_struct, ap_msg, ap_attrs[6], &ap[6])) { - /* AP_RESET_COUNT_TIME */ - ap[6] = 0;/* reset immediatly */ - } - if (!ads_pull_uint32(ads_struct, ap_msg, ap_attrs[7], &ap[7])) { - /* AP_BAD_ATTEMPT_LOCKOUT */ - ap[7] = 0;/* don't lockout */ - } - if (!ads_pull_uint32(ads_struct, ap_msg, ap_attrs[8], &ap[8])) { - /* AP_TIME_TO_LOGOUT */ - ap[8] = -1;/* don't force logout */ - } - - ads_msgfree(ads_struct, ap_res); - ap_usn = tmp_usn; - } - - switch(field) { - case AP_MIN_PASSWORD_LEN: - *value = ap[0]; - ads_status = ADS_ERROR_NT(NT_STATUS_OK); - break; - case AP_PASSWORD_HISTORY: - *value = ap[1]; - ads_status = ADS_ERROR_NT(NT_STATUS_OK); - break; - case AP_USER_MUST_LOGON_TO_CHG_PASS: - *value = ap[2]; - ads_status = ADS_ERROR_NT(NT_STATUS_OK); - break; - case AP_MAX_PASSWORD_AGE: - *value = ap[3]; - ads_status = ADS_ERROR_NT(NT_STATUS_OK); - break; - case AP_MIN_PASSWORD_AGE: - *value = ap[4]; - ads_status = ADS_ERROR_NT(NT_STATUS_OK); - break; - case AP_LOCK_ACCOUNT_DURATION: - *value = ap[5]; - ads_status = ADS_ERROR_NT(NT_STATUS_OK); - break; - case AP_RESET_COUNT_TIME: - *value = ap[6]; - ads_status = ADS_ERROR_NT(NT_STATUS_OK); - break; - case AP_BAD_ATTEMPT_LOCKOUT: - *value = ap[7]; - ads_status = ADS_ERROR_NT(NT_STATUS_OK); - break; - case AP_TIME_TO_LOGOUT: - *value = ap[8]; - ads_status = ADS_ERROR_NT(NT_STATUS_OK); - break; - default: *value = 0; break; - } - - return ads_status; -} - - -/********************************** -Now the functions off the SAM API -***********************************/ - -/* General API */ -static NTSTATUS sam_ads_get_sec_desc(const SAM_METHODS *sam_method, const NT_USER_TOKEN *access_token, - const DOM_SID *sid, SEC_DESC **sd) -{ - ADS_STATUS ads_status = ADS_ERROR_NT(NT_STATUS_UNSUCCESSFUL); - SAM_ADS_PRIVATES *privates = (struct sam_ads_privates *)sam_method->private_data; - ADS_STRUCT *ads_struct = privates->ads_struct; - TALLOC_CTX *mem_ctx; - char *sidstr,*filter; - void *sec_desc_res; - void *sec_desc_msg; - const char *sec_desc_attrs[] = {"nTSecurityDescriptor",NULL}; - fstring sid_str; - SEC_DESC *my_sd; - - SAM_ASSERT(sam_method && access_token && sid && sd); - - ads_status = sam_ads_get_tree_sec_desc(privates, ADS_ROOT_TREE, &my_sd); - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - ads_status = sam_ads_access_check(privates, my_sd, access_token, GENERIC_RIGHTS_DOMAIN_READ, NULL); - - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - sidstr = sid_binstring(sid); - if (asprintf(&filter, "(objectSid=%s)", sidstr) == -1) { - SAFE_FREE(sidstr); - return NT_STATUS_NO_MEMORY; - } - - SAFE_FREE(sidstr); - - ads_status = sam_ads_do_search(privates,ads_struct->config.bind_path, - LDAP_SCOPE_SUBTREE, filter, sec_desc_attrs, - &sec_desc_res); - SAFE_FREE(filter); - - if (!ADS_ERR_OK(ads_status)) { - return ads_ntstatus(ads_status); - } - - if (!(mem_ctx = talloc_init("sec_desc parse in sam_ads"))) { - DEBUG(1, ("talloc_init() failed for sec_desc parse context in sam_ads")); - ads_msgfree(ads_struct, sec_desc_res); - return NT_STATUS_NO_MEMORY; - } - - if (ads_count_replies(ads_struct, sec_desc_res) != 1) { - DEBUG(1,("sam_ads_get_sec_desc: duplicate or 0 results for sid %s\n", - sid_to_string(sid_str, sid))); - talloc_destroy(mem_ctx); - ads_msgfree(ads_struct, sec_desc_res); - return NT_STATUS_UNSUCCESSFUL; - } - - if (!(sec_desc_msg = ads_first_entry(ads_struct, sec_desc_res))) { - talloc_destroy(mem_ctx); - ads_msgfree(ads_struct, sec_desc_res); - return NT_STATUS_INVALID_PARAMETER; - } - - if (!ads_pull_sd(ads_struct, mem_ctx, sec_desc_msg, sec_desc_attrs[0], sd)) { - ads_status = ADS_ERROR_NT(NT_STATUS_INVALID_PARAMETER); - talloc_destroy(mem_ctx); - ads_msgfree(ads_struct, sec_desc_res); - return ads_ntstatus(ads_status); - } - - /* now, were we allowed to see the SD we just got? */ - - ads_msgfree(ads_struct, sec_desc_res); - talloc_destroy(mem_ctx); - return ads_ntstatus(ads_status); -} - -static NTSTATUS sam_ads_set_sec_desc(const SAM_METHODS *sam_method, const NT_USER_TOKEN *access_token, - const DOM_SID *sid, const SEC_DESC *sd) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - return ads_ntstatus(ads_status); -} - - -static NTSTATUS sam_ads_lookup_sid(const SAM_METHODS *sam_method, const NT_USER_TOKEN *access_token, - TALLOC_CTX *mem_ctx, const DOM_SID *sid, char **name, - enum SID_NAME_USE *type) -{ - ADS_STATUS ads_status = ADS_ERROR_NT(NT_STATUS_UNSUCCESSFUL); - SAM_ADS_PRIVATES *privates = (struct sam_ads_privates *)sam_method->private_data; - ADS_STRUCT *ads_struct = privates->ads_struct; - SEC_DESC *my_sd; - - SAM_ASSERT(sam_method && access_token && mem_ctx && sid && name && type); - - ads_status = sam_ads_get_tree_sec_desc(privates, ADS_ROOT_TREE, &my_sd); - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - ads_status = sam_ads_access_check(privates, my_sd, access_token, GENERIC_RIGHTS_DOMAIN_READ, NULL); - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - return ads_sid_to_name(ads_struct, mem_ctx, sid, name, type); -} - -static NTSTATUS sam_ads_lookup_name(const SAM_METHODS *sam_method, const NT_USER_TOKEN *access_token, - const char *name, DOM_SID *sid, enum SID_NAME_USE *type) -{ - ADS_STATUS ads_status = ADS_ERROR_NT(NT_STATUS_UNSUCCESSFUL); - SAM_ADS_PRIVATES *privates = (struct sam_ads_privates *)sam_method->private_data; - ADS_STRUCT *ads_struct = privates->ads_struct; - SEC_DESC *my_sd; - - SAM_ASSERT(sam_method && access_token && name && sid && type); - - ads_status = sam_ads_get_tree_sec_desc(privates, ADS_ROOT_TREE, &my_sd); - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - ads_status = sam_ads_access_check(privates, my_sd, access_token, GENERIC_RIGHTS_DOMAIN_READ, NULL); - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - return ads_name_to_sid(ads_struct, name, sid, type); -} - - -/* Domain API */ - -static NTSTATUS sam_ads_update_domain(const SAM_METHODS *sam_method, const SAM_DOMAIN_HANDLE *domain) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - return ads_ntstatus(ads_status); -} - -static NTSTATUS sam_ads_get_domain_handle(const SAM_METHODS *sam_method, const NT_USER_TOKEN *access_token, - const uint32 access_desired, SAM_DOMAIN_HANDLE **domain) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - SAM_ADS_PRIVATES *privates = (struct sam_ads_privates *)sam_method->private_data; - TALLOC_CTX *mem_ctx = privates->mem_ctx; /*Fix me is this right??? */ - SAM_DOMAIN_HANDLE *dom_handle = NULL; - SEC_DESC *sd; - uint32 acc_granted; - uint32 tmp_value; - - DEBUG(5,("sam_ads_get_domain_handle: %d\n",__LINE__)); - - SAM_ASSERT(sam_method && access_token && domain); - - (*domain) = NULL; - - if ((dom_handle = talloc(mem_ctx, sizeof(SAM_DOMAIN_HANDLE))) == NULL) { - DEBUG(0,("failed to talloc dom_handle\n")); - ads_status = ADS_ERROR_NT(NT_STATUS_NO_MEMORY); - return ads_ntstatus(ads_status); - } - - ZERO_STRUCTP(dom_handle); - - dom_handle->mem_ctx = mem_ctx; /*Fix me is this right??? */ - dom_handle->free_fn = NULL; - dom_handle->current_sam_methods = sam_method; - - /* check if access can be granted as requested */ - - ads_status = sam_ads_get_tree_sec_desc(privates, ADS_ROOT_TREE, &sd); - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - ads_status = sam_ads_access_check(privates, sd, access_token, access_desired, &acc_granted); - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - dom_handle->access_granted = acc_granted; - - /* fill all the values of dom_handle */ - sid_copy(&dom_handle->private.sid, &sam_method->domain_sid); - dom_handle->private.name = smb_xstrdup(sam_method->domain_name); - dom_handle->private.servername = "WHOKNOWS"; /* what is the servername */ - - /*Fix me: sam_ads_account_policy_get() return ADS_STATUS! */ - ads_status = sam_ads_account_policy_get(privates, AP_MAX_PASSWORD_AGE, &tmp_value); - if (!ADS_ERR_OK(ads_status)) { - DEBUG(4,("sam_ads_account_policy_get failed for max password age. Useing default\n")); - tmp_value = MAX_PASSWORD_AGE; - } - unix_to_nt_time_abs(&dom_handle->private.max_passwordage,tmp_value); - - ads_status = sam_ads_account_policy_get(privates, AP_MIN_PASSWORD_AGE, &tmp_value); - if (!ADS_ERR_OK(ads_status)) { - DEBUG(4,("sam_ads_account_policy_get failed for min password age. Useing default\n")); - tmp_value = 0; - } - unix_to_nt_time_abs(&dom_handle->private.min_passwordage, tmp_value); - - ads_status = sam_ads_account_policy_get(privates, AP_LOCK_ACCOUNT_DURATION, &tmp_value); - if (!ADS_ERR_OK(ads_status)) { - DEBUG(4,("sam_ads_account_policy_get failed for lockout duration. Useing default\n")); - tmp_value = 0; - } - unix_to_nt_time_abs(&dom_handle->private.lockout_duration, tmp_value); - - ads_status = sam_ads_account_policy_get(privates, AP_RESET_COUNT_TIME, &tmp_value); - if (!ADS_ERR_OK(ads_status)) { - DEBUG(4,("sam_ads_account_policy_get failed for time till locout count is reset. Useing default\n")); - tmp_value = 0; - } - unix_to_nt_time_abs(&dom_handle->private.reset_count, tmp_value); - - ads_status = sam_ads_account_policy_get(privates, AP_MIN_PASSWORD_LEN, &tmp_value); - if (!ADS_ERR_OK(ads_status)) { - DEBUG(4,("sam_ads_account_policy_get failed for min password length. Useing default\n")); - tmp_value = 0; - } - dom_handle->private.min_passwordlength = (uint16)tmp_value; - - ads_status = sam_ads_account_policy_get(privates, AP_PASSWORD_HISTORY, &tmp_value); - if (!ADS_ERR_OK(ads_status)) { - DEBUG(4,("sam_ads_account_policy_get failed password history. Useing default\n")); - tmp_value = 0; - } - dom_handle->private.password_history = (uint16)tmp_value; - - ads_status = sam_ads_account_policy_get(privates, AP_BAD_ATTEMPT_LOCKOUT, &tmp_value); - if (!ADS_ERR_OK(ads_status)) { - DEBUG(4,("sam_ads_account_policy_get failed for bad attempts till lockout. Useing default\n")); - tmp_value = 0; - } - dom_handle->private.lockout_count = (uint16)tmp_value; - - ads_status = sam_ads_account_policy_get(privates, AP_TIME_TO_LOGOUT, &tmp_value); - if (!ADS_ERR_OK(ads_status)) { - DEBUG(4,("sam_ads_account_policy_get failed for force logout. Useing default\n")); - tmp_value = -1; - } - - ads_status = sam_ads_account_policy_get(privates, AP_USER_MUST_LOGON_TO_CHG_PASS, &tmp_value); - if (!ADS_ERR_OK(ads_status)) { - DEBUG(4,("sam_ads_account_policy_get failed for user must login to change password. Useing default\n")); - tmp_value = 0; - } - - /* should the real values of num_accounts, num_groups and num_aliases be retreved? - * I think it is to expensive to bother - */ - dom_handle->private.num_accounts = 3; - dom_handle->private.num_groups = 4; - dom_handle->private.num_aliases = 5; - - *domain = dom_handle; - - ads_status = ADS_ERROR_NT(NT_STATUS_OK); - return ads_ntstatus(ads_status); -} - -/* Account API */ -static NTSTATUS sam_ads_create_account(const SAM_METHODS *sam_method, - const NT_USER_TOKEN *access_token, uint32 access_desired, - const char *account_name, uint16 acct_ctrl, SAM_ACCOUNT_HANDLE **account) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - SAM_ADS_PRIVATES *privates = (struct sam_ads_privates *)sam_method->private_data; - SEC_DESC *sd = NULL; - uint32 acc_granted; - - SAM_ASSERT(sam_method && privates && access_token && account_name && account); - - ads_status = sam_ads_get_tree_sec_desc(privates, ADS_SUBTREE_USERS, &sd); - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - ads_status = sam_ads_access_check(privates, sd, access_token, access_desired, &acc_granted); - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - ads_status = ADS_ERROR_NT(sam_init_account(account)); - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - (*account)->access_granted = acc_granted; - - return ads_ntstatus(ads_status); -} - -static NTSTATUS sam_ads_add_account(const SAM_METHODS *sam_method, const SAM_ACCOUNT_HANDLE *account) -{ - ADS_STATUS ads_status = ADS_ERROR(LDAP_NO_MEMORY); - SAM_ADS_PRIVATES *privates = (struct sam_ads_privates *)sam_method->private_data; - ADS_STRUCT *ads_struct = privates->ads_struct; - TALLOC_CTX *mem_ctx = privates->mem_ctx; - ADS_MODLIST mods; - uint16 acct_ctrl; - char *new_dn; - SEC_DESC *sd; - uint32 acc_granted; - - SAM_ASSERT(sam_method && account); - - ads_status = ADS_ERROR_NT(sam_get_account_acct_ctrl(account,&acct_ctrl)); - if (!ADS_ERR_OK(ads_status)) - goto done; - - if ((acct_ctrl & ACB_WSTRUST)||(acct_ctrl & ACB_SVRTRUST)) { - /* Computer account */ - char *name,*controlstr; - char *hostname,*host_upn,*host_spn; - const char *objectClass[] = {"top", "person", "organizationalPerson", - "user", "computer", NULL}; - - ads_status = ADS_ERROR_NT(sam_get_account_name(account,&name)); - if (!ADS_ERR_OK(ads_status)) - goto done; - - if (!(host_upn = talloc_asprintf(mem_ctx, "%s@%s", name, ads_struct->config.realm))) { - ads_status = ADS_ERROR_NT(NT_STATUS_NO_MEMORY); - goto done; - } - - if (!(new_dn = talloc_asprintf(mem_ctx, "CN=%s,CN=Computers,%s", hostname, - ads_struct->config.bind_path))) { - ads_status = ADS_ERROR_NT(NT_STATUS_NO_MEMORY); - goto done; - } - - if (!(controlstr = talloc_asprintf(mem_ctx, "%u", ads_acb2uf(acct_ctrl)))) { - ads_status = ADS_ERROR_NT(NT_STATUS_NO_MEMORY); - goto done; - } - - if (!(mods = ads_init_mods(mem_ctx))) { - ads_status = ADS_ERROR_NT(NT_STATUS_NO_MEMORY); - goto done; - } - - ads_status = ads_mod_str(mem_ctx, &mods, "cn", hostname); - if (!ADS_ERR_OK(ads_status)) - goto done; - ads_status = ads_mod_strlist(mem_ctx, &mods, "objectClass", objectClass); - if (!ADS_ERR_OK(ads_status)) - goto done; - ads_status = ads_mod_str(mem_ctx, &mods, "userPrincipalName", host_upn); - if (!ADS_ERR_OK(ads_status)) - goto done; - ads_status = ads_mod_str(mem_ctx, &mods, "displayName", hostname); - if (!ADS_ERR_OK(ads_status)) - goto done; - ads_status = ads_mod_str(mem_ctx, &mods, "sAMAccountName", name); - if (!ADS_ERR_OK(ads_status)) - goto done; - ads_status = ads_mod_str(mem_ctx, &mods, "userAccountControl", controlstr); - if (!ADS_ERR_OK(ads_status)) - goto done; - - ads_status = ads_mod_str(mem_ctx, &mods, "servicePrincipalName", host_spn); - if (!ADS_ERR_OK(ads_status)) - goto done; - ads_status = ads_mod_str(mem_ctx, &mods, "dNSHostName", hostname); - if (!ADS_ERR_OK(ads_status)) - goto done; - ads_status = ads_mod_str(mem_ctx, &mods, "userAccountControl", controlstr); - if (!ADS_ERR_OK(ads_status)) - goto done; - /* ads_status = ads_mod_str(mem_ctx, &mods, "operatingSystem", "Samba"); - if (!ADS_ERR_OK(ads_status)) - goto done; - *//* ads_status = ads_mod_str(mem_ctx, &mods, "operatingSystemVersion", VERSION); - if (!ADS_ERR_OK(ads_status)) - goto done; - */ - /* End Computer account */ - } else { - /* User account*/ - char *upn, *controlstr; - char *name, *fullname; - const char *objectClass[] = {"top", "person", "organizationalPerson", - "user", NULL}; - - ads_status = ADS_ERROR_NT(sam_get_account_name(account,&name)); - if (!ADS_ERR_OK(ads_status)) - goto done; - - ads_status = ADS_ERROR_NT(sam_get_account_fullname(account,&fullname)); - if (!ADS_ERR_OK(ads_status)) - goto done; - - if (!(upn = talloc_asprintf(mem_ctx, "%s@%s", name, ads_struct->config.realm))) { - ads_status = ADS_ERROR_NT(NT_STATUS_NO_MEMORY); - goto done; - } - - if (!(new_dn = talloc_asprintf(mem_ctx, "CN=%s,CN=Users,%s", fullname, - ads_struct->config.bind_path))) { - ads_status = ADS_ERROR_NT(NT_STATUS_NO_MEMORY); - goto done; - } - - if (!(controlstr = talloc_asprintf(mem_ctx, "%u", ads_acb2uf(acct_ctrl)))) { - ads_status = ADS_ERROR_NT(NT_STATUS_NO_MEMORY); - goto done; - } - - if (!(mods = ads_init_mods(mem_ctx))) { - ads_status = ADS_ERROR_NT(NT_STATUS_NO_MEMORY); - goto done; - } - - ads_status = ads_mod_str(mem_ctx, &mods, "cn", fullname); - if (!ADS_ERR_OK(ads_status)) - goto done; - ads_status = ads_mod_strlist(mem_ctx, &mods, "objectClass", objectClass); - if (!ADS_ERR_OK(ads_status)) - goto done; - ads_status = ads_mod_str(mem_ctx, &mods, "userPrincipalName", upn); - if (!ADS_ERR_OK(ads_status)) - goto done; - ads_status = ads_mod_str(mem_ctx, &mods, "displayName", fullname); - if (!ADS_ERR_OK(ads_status)) - goto done; - ads_status = ads_mod_str(mem_ctx, &mods, "sAMAccountName", name); - if (!ADS_ERR_OK(ads_status)) - goto done; - ads_status = ads_mod_str(mem_ctx, &mods, "userAccountControl", controlstr); - if (!ADS_ERR_OK(ads_status)) - goto done; - }/* End User account */ - - /* Finally at the account */ - ads_status = ads_gen_add(ads_struct, new_dn, mods); - -done: - return ads_ntstatus(ads_status); -} - -static NTSTATUS sam_ads_update_account(const SAM_METHODS *sam_method, const SAM_ACCOUNT_HANDLE *account) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - return ads_ntstatus(ads_status); -} - -static NTSTATUS sam_ads_delete_account(const SAM_METHODS *sam_method, const SAM_ACCOUNT_HANDLE *account) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - - - - return ads_ntstatus(ads_status); -} - -static NTSTATUS sam_ads_enum_accounts(const SAM_METHODS *sam_method, const NT_USER_TOKEN *access_token, uint16 acct_ctrl, uint32 *account_count, SAM_ACCOUNT_ENUM **accounts) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - return ads_ntstatus(ads_status); -} - -#if 0 -static NTSTATUS sam_ads_get_account_by_sid(const SAM_METHODS *sam_method, const NT_USER_TOKEN *access_token, const uint32 access_desired, const DOM_SID *account_sid, SAM_ACCOUNT_HANDLE **account) -{ - ADS_STATUS ads_status = ADS_ERROR_NT(NT_STATUS_UNSUCCESSFUL); - SAM_ADS_PRIVATES *privates = (struct sam_ads_privates *)sam_method->private_data; - ADS_STRUCT *ads_struct = privates->ads_struct; - TALLOC_CTX *mem_ctx = privates->mem_ctx; - SEC_DESC *sd = NULL; - uint32 acc_granted; - - SAM_ASSERT(sam_method && privates && ads_struct && access_token && account_sid && account); - - ads_status = ADS_ERROR_NT(sam_ads_get_sec_desc(sam_method, access_token, account_sid, &my_sd)); - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - ads_status = sam_ads_access_check(privates, sd, access_token, access_desired, &acc_granted); - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - ads_status = ADS_ERROR_NT(sam_init_account(account)); - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - (*account)->access_granted = acc_granted; - - return ads_ntstatus(ads_status); -} -#else -static NTSTATUS sam_ads_get_account_by_sid(const SAM_METHODS *sam_method, const NT_USER_TOKEN *access_token, const uint32 access_desired, const DOM_SID *account_sid, SAM_ACCOUNT_HANDLE **account) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - return ads_ntstatus(ads_status); -} -#endif - -#if 0 -static NTSTATUS sam_ads_get_account_by_name(const SAM_METHODS *sam_method, const NT_USER_TOKEN *access_token, const uint32 access_desired, const char *account_name, SAM_ACCOUNT_HANDLE **account) -{ - ADS_STATUS ads_status = ADS_ERROR_NT(NT_STATUS_UNSUCCESSFUL); - SAM_ADS_PRIVATES *privates = (struct sam_ads_privates *)sam_method->private_data; - ADS_STRUCT *ads_struct = privates->ads_struct; - TALLOC_CTX *mem_ctx = privates->mem_ctx; - SEC_DESC *sd = NULL; - uint32 acc_granted; - - SAM_ASSERT(sam_method && privates && ads_struct && access_token && account_name && account); - - ads_status = sam_ads_get_tree_sec_desc(privates, ADS_ROOT_TREE, &sd); - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - ads_status = sam_ads_access_check(privates, sd, access_token, access_desired, &acc_granted); - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - ads_status = ADS_ERROR_NT(sam_init_account(account)); - if (!ADS_ERR_OK(ads_status)) - return ads_ntstatus(ads_status); - - (*account)->access_granted = acc_granted; - - return ads_ntstatus(ads_status); -} -#else -static NTSTATUS sam_ads_get_account_by_name(const SAM_METHODS *sam_method, const NT_USER_TOKEN *access_token, const uint32 access_desired, const char *account_name, SAM_ACCOUNT_HANDLE **account) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - return ads_ntstatus(ads_status); -} -#endif - -/* Group API */ -static NTSTATUS sam_ads_create_group(const SAM_METHODS *sam_method, const NT_USER_TOKEN *access_token, uint32 access_desired, const char *group_name, uint16 group_ctrl, SAM_GROUP_HANDLE **group) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - return ads_ntstatus(ads_status); -} - -static NTSTATUS sam_ads_add_group(const SAM_METHODS *sam_method, const SAM_GROUP_HANDLE *group) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - return ads_ntstatus(ads_status); -} - -static NTSTATUS sam_ads_update_group(const SAM_METHODS *sam_method, const SAM_GROUP_HANDLE *group) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - return ads_ntstatus(ads_status); -} - -static NTSTATUS sam_ads_delete_group(const SAM_METHODS *sam_method, const SAM_GROUP_HANDLE *group) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - return ads_ntstatus(ads_status); -} - -static NTSTATUS sam_ads_enum_groups(const SAM_METHODS *sam_method, const NT_USER_TOKEN *access_token, const uint16 group_ctrl, uint32 *groups_count, SAM_GROUP_ENUM **groups) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - SAM_ADS_PRIVATES *privates = (struct sam_ads_privates *)sam_method->private_data; - ADS_STRUCT *ads_struct = privates->ads_struct; - TALLOC_CTX *mem_ctx = privates->mem_ctx; - void *res = NULL; - void *msg = NULL; - char *filter = NULL; - int i = 0; - - /* get only these LDAP attributes, witch we really need for a group */ - const char *group_enum_attrs[] = {"objectSid", - "description", - "sAMAcountName", - NULL}; - - SAM_ASSERT(sam_method && access_token && groups_count && groups); - - *groups_count = 0; - - DEBUG(3,("ads: enum_dom_groups\n")); - - FIXME("get only group from the wanted Type!\n"); - asprintf(&filter, "(&(objectClass=group)(groupType=%s))", "*"); - ads_status = sam_ads_do_search(privates, ads_struct->config.bind_path, LDAP_SCOPE_SUBTREE, filter, group_enum_attrs, &res); - if (!ADS_ERR_OK(ads_status)) { - DEBUG(1,("enum_groups ads_search: %s\n", ads_errstr(ads_status))); - } - - *groups_count = ads_count_replies(ads_struct, res); - if (*groups_count == 0) { - DEBUG(1,("enum_groups: No groups found\n")); - } - - (*groups) = talloc_zero(mem_ctx, (*groups_count) * sizeof(**groups)); - if (!*groups) { - ads_status = ADS_ERROR_NT(NT_STATUS_NO_MEMORY); - } - - for (msg = ads_first_entry(ads_struct, res); msg; msg = ads_next_entry(ads_struct, msg)) { - uint32 grouptype; - - if (!ads_pull_uint32(ads_struct, msg, "groupType", &grouptype)) { - ; - } else { - (*groups)->group_ctrl = ads_gtype2gcb(grouptype); - } - - if (!((*groups)->group_name = ads_pull_string(ads_struct, mem_ctx, msg, "sAMAccountName"))) { - ; - } - - if (!((*groups)->group_desc = ads_pull_string(ads_struct, mem_ctx, msg, "description"))) { - ; - } - - if (!ads_pull_sid(ads_struct, msg, "objectSid", &((*groups)->sid))) { - DEBUG(1,("No sid for group %s !?\n", (*groups)->group_name)); - continue; - } - - i++; - } - - (*groups_count) = i; - - ads_status = ADS_ERROR_NT(NT_STATUS_OK); - - DEBUG(3,("ads enum_dom_groups gave %d entries\n", (*groups_count))); - - if (res) ads_msgfree(ads_struct, res); - - return ads_ntstatus(ads_status); -} - -static NTSTATUS sam_ads_get_group_by_sid(const SAM_METHODS *sam_method, const NT_USER_TOKEN *access_token, const uint32 access_desired, const DOM_SID *groupsid, SAM_GROUP_HANDLE **group) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - return ads_ntstatus(ads_status); -} - -static NTSTATUS sam_ads_get_group_by_name(const SAM_METHODS *sam_method, const NT_USER_TOKEN *access_token, const uint32 access_desired, const char *name, SAM_GROUP_HANDLE **group) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - return ads_ntstatus(ads_status); -} - -static NTSTATUS sam_ads_add_member_to_group(const SAM_METHODS *sam_method, const SAM_GROUP_HANDLE *group, const SAM_GROUP_MEMBER *member) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - return ads_ntstatus(ads_status); -} - -static NTSTATUS sam_ads_delete_member_from_group(const SAM_METHODS *sam_method, const SAM_GROUP_HANDLE *group, const SAM_GROUP_MEMBER *member) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - return ads_ntstatus(ads_status); -} - -static NTSTATUS sam_ads_enum_groupmembers(const SAM_METHODS *sam_method, const SAM_GROUP_HANDLE *group, uint32 *members_count, SAM_GROUP_MEMBER **members) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - return ads_ntstatus(ads_status); -} - -static NTSTATUS sam_ads_get_groups_of_sid(const SAM_METHODS *sam_method, const NT_USER_TOKEN *access_token, const DOM_SID **sids, const uint16 group_ctrl, uint32 *group_count, SAM_GROUP_ENUM **groups) -{ - ADS_STATUS ads_status = ADS_STATUS_NOT_IMPLEMENTED; - DEBUG(0,("sam_ads: %s was called!\n",FUNCTION_MACRO)); - SAM_ASSERT(sam_method); - return ads_ntstatus(ads_status); -} - -/********************************** -Free our private data -***********************************/ -static void sam_ads_free_private_data(void **vp) -{ - SAM_ADS_PRIVATES **sam_ads_state = (SAM_ADS_PRIVATES **)vp; - - if ((*sam_ads_state)->ads_struct->ld) { - ldap_unbind((*sam_ads_state)->ads_struct->ld); - } - - ads_destroy(&((*sam_ads_state)->ads_struct)); - - talloc_destroy((*sam_ads_state)->mem_ctx); - FIXME("maybe we must free some other stuff here\n"); - - *sam_ads_state = NULL; -} - - - -/***************************************************** -Init the ADS SAM backend -******************************************************/ -NTSTATUS sam_init_ads(SAM_METHODS *sam_method, const char *module_params) -{ - ADS_STATUS ads_status; - SAM_ADS_PRIVATES *sam_ads_state; - TALLOC_CTX *mem_ctx; - - SAM_ASSERT(sam_method && sam_method->parent); - - mem_ctx = sam_method->parent->mem_ctx; - - /* Here the SAM API functions of the sam_ads module */ - - /* General API */ - - sam_method->sam_get_sec_desc = sam_ads_get_sec_desc; - sam_method->sam_set_sec_desc = sam_ads_set_sec_desc; - - sam_method->sam_lookup_sid = sam_ads_lookup_sid; - sam_method->sam_lookup_name = sam_ads_lookup_name; - - /* Domain API */ - - sam_method->sam_update_domain = sam_ads_update_domain; - sam_method->sam_get_domain_handle = sam_ads_get_domain_handle; - - /* Account API */ - - sam_method->sam_create_account = sam_ads_create_account; - sam_method->sam_add_account = sam_ads_add_account; - sam_method->sam_update_account = sam_ads_update_account; - sam_method->sam_delete_account = sam_ads_delete_account; - sam_method->sam_enum_accounts = sam_ads_enum_accounts; - - sam_method->sam_get_account_by_sid = sam_ads_get_account_by_sid; - sam_method->sam_get_account_by_name = sam_ads_get_account_by_name; - - /* Group API */ - - sam_method->sam_create_group = sam_ads_create_group; - sam_method->sam_add_group = sam_ads_add_group; - sam_method->sam_update_group = sam_ads_update_group; - sam_method->sam_delete_group = sam_ads_delete_group; - sam_method->sam_enum_groups = sam_ads_enum_groups; - sam_method->sam_get_group_by_sid = sam_ads_get_group_by_sid; - sam_method->sam_get_group_by_name = sam_ads_get_group_by_name; - - sam_method->sam_add_member_to_group = sam_ads_add_member_to_group; - sam_method->sam_delete_member_from_group = sam_ads_delete_member_from_group; - sam_method->sam_enum_groupmembers = sam_ads_enum_groupmembers; - - sam_method->sam_get_groups_of_sid = sam_ads_get_groups_of_sid; - - sam_ads_state = talloc_zero(mem_ctx, sizeof(SAM_ADS_PRIVATES)); - if (!sam_ads_state) { - DEBUG(0, ("talloc() failed for sam_ads private_data!\n")); - return NT_STATUS_NO_MEMORY; - } - - if (!(sam_ads_state->mem_ctx = talloc_init("sam_ads_method"))) { - DEBUG(0, ("talloc_init() failed for sam_ads_state->mem_ctx\n")); - return NT_STATUS_NO_MEMORY; - } - - sam_ads_state->ads_bind_dn = talloc_strdup(sam_ads_state->mem_ctx, lp_parm_string(NULL,"sam_ads","bind as")); - sam_ads_state->ads_bind_pw = talloc_strdup(sam_ads_state->mem_ctx, lp_parm_string(NULL,"sam_ads","bind pw")); - - sam_ads_state->bind_plaintext = strequal(lp_parm_string(NULL, "sam_ads", "plaintext bind"), "yes"); - - if (!sam_ads_state->ads_bind_dn || !sam_ads_state->ads_bind_pw) { - DEBUG(0, ("talloc_strdup() failed for bind dn or password\n")); - return NT_STATUS_NO_MEMORY; - } - - /* Maybe we should not check the result here? Server down on startup? */ - - if (module_params && *module_params) { - sam_ads_state->ldap_uri = talloc_strdup(sam_ads_state->mem_ctx, module_params); - if (!sam_ads_state->ldap_uri) { - DEBUG(0, ("talloc_strdup() failed for bind dn or password\n")); - return NT_STATUS_NO_MEMORY; - } - } else { - sam_ads_state->ldap_uri = "ldapi://"; - } - - ads_status = sam_ads_cached_connection(sam_ads_state); - if (!ADS_ERR_OK(ads_status)) { - return ads_ntstatus(ads_status); - } - - sam_method->private_data = sam_ads_state; - sam_method->free_private_data = sam_ads_free_private_data; - - sam_ads_debug_level = debug_add_class("sam_ads"); - if (sam_ads_debug_level == -1) { - sam_ads_debug_level = DBGC_ALL; - DEBUG(0, ("sam_ads: Couldn't register custom debugging class!\n")); - } else DEBUG(2, ("sam_ads: Debug class number of 'sam_ads': %d\n", sam_ads_debug_level)); - - DEBUG(5, ("Initializing sam_ads\n")); - if (module_params) - DEBUG(10, ("Module Parameters for Domain %s[%s]: %s\n", sam_method->domain_name, sam_method->domain_name, module_params)); - return NT_STATUS_OK; -} - -#else /* HAVE_LDAP */ -void sam_ads_dummy(void) -{ - DEBUG(0,("sam_ads: not supported!\n")); -} -#endif /* HAVE_LDAP */ diff --git a/source3/sam/sam_skel.c b/source3/sam/sam_skel.c deleted file mode 100644 index b4d64bb6da7..00000000000 --- a/source3/sam/sam_skel.c +++ /dev/null @@ -1,251 +0,0 @@ -/* - Unix SMB/CIFS implementation. - this is a skeleton for SAM backend modules. - - Copyright (C) Stefan (metze) Metzmacher 2002 - Copyright (C) Jelmer Vernooij 2002 - Copyright (C) Andrew Bartlett 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" - -static int sam_skel_debug_level = DBGC_SAM; - -#undef DBGC_CLASS -#define DBGC_CLASS sam_skel_debug_level - -/* define the version of the SAM interface */ -SAM_MODULE_VERSIONING_MAGIC - -/* General API */ - -static NTSTATUS sam_skel_get_sec_desc(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, const DOM_SID *sid, SEC_DESC **sd) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS sam_skel_set_sec_desc(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, const DOM_SID *sid, const SEC_DESC *sd) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - - -static NTSTATUS sam_skel_lookup_sid(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, TALLOC_CTX *mem_ctx, const DOM_SID *sid, char **name, uint32 *type) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS sam_skel_lookup_name(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, const char *name, DOM_SID *sid, uint32 *type) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - - -/* Domain API */ - -static NTSTATUS sam_skel_update_domain(const SAM_METHODS *sam_methods, const SAM_DOMAIN_HANDLE *domain) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS sam_skel_get_domain_handle(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint32 access_desired, SAM_DOMAIN_HANDLE **domain) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - - -/* Account API */ - -static NTSTATUS sam_skel_create_account(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint32 access_desired, const char *account_name, uint16 acct_ctrl, SAM_ACCOUNT_HANDLE **account) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS sam_skel_add_account(const SAM_METHODS *sam_methods, const SAM_ACCOUNT_HANDLE *account) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS sam_skel_update_account(const SAM_METHODS *sam_methods, const SAM_ACCOUNT_HANDLE *account) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS sam_skel_delete_account(const SAM_METHODS *sam_methods, const SAM_ACCOUNT_HANDLE *account) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS sam_skel_enum_accounts(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint16 acct_ctrl, uint32 *account_count, SAM_ACCOUNT_ENUM **accounts) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - - -static NTSTATUS sam_skel_get_account_by_sid(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint32 access_desired, const DOM_SID *accountsid, SAM_ACCOUNT_HANDLE **account) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS sam_skel_get_account_by_name(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint32 access_desired, const char *name, SAM_ACCOUNT_HANDLE **account) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - - -/* Group API */ - -static NTSTATUS sam_skel_create_group(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint32 access_desired, const char *account_name, uint16 group_ctrl, SAM_GROUP_HANDLE **group) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS sam_skel_add_group(const SAM_METHODS *sam_methods, const SAM_GROUP_HANDLE *group) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS sam_skel_update_group(const SAM_METHODS *sam_methods, const SAM_GROUP_HANDLE *group) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS sam_skel_delete_group(const SAM_METHODS *sam_methods, const SAM_GROUP_HANDLE *group) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS sam_skel_enum_groups(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint16 group_ctrl, uint32 *groups_count, SAM_GROUP_ENUM **groups) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS sam_skel_get_group_by_sid(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint32 access_desired, const DOM_SID *groupsid, SAM_GROUP_HANDLE **group) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS sam_skel_get_group_by_name(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, uint32 access_desired, const char *name, SAM_GROUP_HANDLE **group) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - - -static NTSTATUS sam_skel_add_member_to_group(const SAM_METHODS *sam_methods, const SAM_GROUP_HANDLE *group, const SAM_GROUP_MEMBER *member) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS sam_skel_delete_member_from_group(const SAM_METHODS *sam_methods, const SAM_GROUP_HANDLE *group, const SAM_GROUP_MEMBER *member) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS sam_skel_enum_groupmembers(const SAM_METHODS *sam_methods, const SAM_GROUP_HANDLE *group, uint32 *members_count, SAM_GROUP_MEMBER **members) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - - -static NTSTATUS sam_skel_get_groups_of_sid(const SAM_METHODS *sam_methods, const NT_USER_TOKEN *access_token, const DOM_SID **sids, uint16 group_ctrl, uint32 *group_count, SAM_GROUP_ENUM **groups) -{ - DEBUG(0,("sam_skel: %s was called!\n",FUNCTION_MACRO)); - return NT_STATUS_NOT_IMPLEMENTED; -} - -NTSTATUS sam_init_skel(SAM_METHODS *sam_methods, const char *module_params) -{ - /* Functions your SAM module doesn't provide should be set - * to NULL */ - - sam_methods->sam_get_sec_desc = sam_skel_get_sec_desc; - sam_methods->sam_set_sec_desc = sam_skel_set_sec_desc; - - sam_methods->sam_lookup_sid = sam_skel_lookup_sid; - sam_methods->sam_lookup_name = sam_skel_lookup_name; - - /* Domain API */ - - sam_methods->sam_update_domain = sam_skel_update_domain; - sam_methods->sam_get_domain_handle = sam_skel_get_domain_handle; - - /* Account API */ - - sam_methods->sam_create_account = sam_skel_create_account; - sam_methods->sam_add_account = sam_skel_add_account; - sam_methods->sam_update_account = sam_skel_update_account; - sam_methods->sam_delete_account = sam_skel_delete_account; - sam_methods->sam_enum_accounts = sam_skel_enum_accounts; - - sam_methods->sam_get_account_by_sid = sam_skel_get_account_by_sid; - sam_methods->sam_get_account_by_name = sam_skel_get_account_by_name; - - /* Group API */ - - sam_methods->sam_create_group = sam_skel_create_group; - sam_methods->sam_add_group = sam_skel_add_group; - sam_methods->sam_update_group = sam_skel_update_group; - sam_methods->sam_delete_group = sam_skel_delete_group; - sam_methods->sam_enum_groups = sam_skel_enum_groups; - sam_methods->sam_get_group_by_sid = sam_skel_get_group_by_sid; - sam_methods->sam_get_group_by_name = sam_skel_get_group_by_name; - - sam_methods->sam_add_member_to_group = sam_skel_add_member_to_group; - sam_methods->sam_delete_member_from_group = sam_skel_delete_member_from_group; - sam_methods->sam_enum_groupmembers = sam_skel_enum_groupmembers; - - sam_methods->sam_get_groups_of_sid = sam_skel_get_groups_of_sid; - - sam_methods->free_private_data = NULL; - - - sam_skel_debug_level = debug_add_class("sam_skel"); - if (sam_skel_debug_level == -1) { - sam_skel_debug_level = DBGC_SAM; - DEBUG(0, ("sam_skel: Couldn't register custom debugging class!\n")); - } else DEBUG(2, ("sam_skel: Debug class number of 'sam_skel': %d\n", sam_skel_debug_level)); - - if(module_params) - DEBUG(0, ("Starting 'sam_skel' with parameters '%s' for domain %s\n", module_params, sam_methods->domain_name)); - else - DEBUG(0, ("Starting 'sam_skel' for domain %s without paramters\n", sam_methods->domain_name)); - - return NT_STATUS_OK; -} diff --git a/source3/script/find_missing_doc.pl b/source3/script/find_missing_doc.pl index b27a405e4dd..b5824465697 100755 --- a/source3/script/find_missing_doc.pl +++ b/source3/script/find_missing_doc.pl @@ -30,7 +30,7 @@ close(IN); open(IN,$topdir.$doc_file) || die("Can't open $topdir$doc_file"); while() { - if( /([^<]*?)([ ]*)\(.\)([ ]*)<\/term>/g ) { + if( /([^<]*?)([ ]*)\(.\)([ ]*)<\/term>/g ) { $key = $1; $value = $2; $doc{$value} = $key; diff --git a/source3/script/genstruct.pl b/source3/script/genstruct.pl deleted file mode 100755 index a6abd718c95..00000000000 --- a/source3/script/genstruct.pl +++ /dev/null @@ -1,299 +0,0 @@ -#!/usr/bin/perl -w -# a simple system for generating C parse info -# this can be used to write generic C structer load/save routines -# Copyright 2002 Andrew Tridgell -# released under the GNU General Public License v2 or later - -use strict; - -my(%enum_done) = (); -my(%struct_done) = (); - -################################################### -# general handler -sub handle_general($$$$$$$$) -{ - my($name) = shift; - my($ptr_count) = shift; - my($size) = shift; - my($element) = shift; - my($flags) = shift; - my($dump_fn) = shift; - my($parse_fn) = shift; - my($tflags) = shift; - my($array_len) = 0; - my($dynamic_len) = "NULL"; - - # handle arrays, currently treat multidimensional arrays as 1 dimensional - while ($element =~ /(.*)\[(.*?)\]$/) { - $element = $1; - if ($array_len == 0) { - $array_len = $2; - } else { - $array_len = "$2 * $array_len"; - } - } - - if ($flags =~ /_LEN\((\w*?)\)/) { - $dynamic_len = "\"$1\""; - } - - if ($flags =~ /_NULLTERM/) { - $tflags = "FLAG_NULLTERM"; - } - - print OFILE "{\"$element\", $ptr_count, $size, offsetof(struct $name, $element), $array_len, $dynamic_len, $tflags, $dump_fn, $parse_fn},\n"; -} - - -#################################################### -# parse one element -sub parse_one($$$$) -{ - my($name) = shift; - my($type) = shift; - my($element) = shift; - my($flags) = shift; - my($ptr_count) = 0; - my($size) = "sizeof($type)"; - my($tflags) = "0"; - - # enums get the FLAG_ALWAYS flag - if ($type =~ /^enum /) { - $tflags = "FLAG_ALWAYS"; - } - - - # make the pointer part of the base type - while ($element =~ /^\*(.*)/) { - $ptr_count++; - $element = $1; - } - - # convert spaces to _ - $type =~ s/ /_/g; - - my($dump_fn) = "gen_dump_$type"; - my($parse_fn) = "gen_parse_$type"; - - handle_general($name, $ptr_count, $size, $element, $flags, $dump_fn, $parse_fn, $tflags); -} - -#################################################### -# parse one element -sub parse_element($$$) -{ - my($name) = shift; - my($element) = shift; - my($flags) = shift; - my($type); - my($data); - - # pull the base type - if ($element =~ /^struct (\S*) (.*)/) { - $type = "struct $1"; - $data = $2; - } elsif ($element =~ /^enum (\S*) (.*)/) { - $type = "enum $1"; - $data = $2; - } elsif ($element =~ /^unsigned (\S*) (.*)/) { - $type = "unsigned $1"; - $data = $2; - } elsif ($element =~ /^(\S*) (.*)/) { - $type = $1; - $data = $2; - } else { - die "Can't parse element '$element'"; - } - - # handle comma separated lists - while ($data =~ /(\S*),[\s]?(.*)/) { - parse_one($name, $type, $1, $flags); - $data = $2; - } - parse_one($name, $type, $data, $flags); -} - - -my($first_struct) = 1; - -#################################################### -# parse the elements of one structure -sub parse_elements($$) -{ - my($name) = shift; - my($elements) = shift; - - if ($first_struct) { - $first_struct = 0; - print "Parsing structs: $name"; - } else { - print ", $name"; - } - - print OFILE "int gen_dump_struct_$name(TALLOC_CTX *mem_ctx, struct parse_string *, const char *, unsigned);\n"; - print OFILE "int gen_parse_struct_$name(TALLOC_CTX *mem_ctx, char *, const char *);\n"; - - print OFILE "static const struct parse_struct pinfo_" . $name . "[] = {\n"; - - - while ($elements =~ /^.*?([a-z].*?);\s*?(\S*?)\s*?$(.*)/msi) { - my($element) = $1; - my($flags) = $2; - $elements = $3; - parse_element($name, $element, $flags); - } - - print OFILE "{NULL, 0, 0, 0, 0, NULL, 0, NULL, NULL}};\n"; - - print OFILE " -int gen_dump_struct_$name(TALLOC_CTX *mem_ctx, struct parse_string *p, const char *ptr, unsigned indent) { - return gen_dump_struct(mem_ctx, pinfo_$name, p, ptr, indent); -} -int gen_parse_struct_$name(TALLOC_CTX *mem_ctx, char *ptr, const char *str) { - return gen_parse_struct(mem_ctx, pinfo_$name, ptr, str); -} - -"; -} - -my($first_enum) = 1; - -#################################################### -# parse out the enum declarations -sub parse_enum_elements($$) -{ - my($name) = shift; - my($elements) = shift; - - if ($first_enum) { - $first_enum = 0; - print "Parsing enums: $name"; - } else { - print ", $name"; - } - - print OFILE "static const struct enum_struct einfo_" . $name . "[] = {\n"; - - my(@enums) = split(/,/s, $elements); - for (my($i)=0; $i <= $#{@enums}; $i++) { - my($enum) = $enums[$i]; - if ($enum =~ /\s*(\w*)/) { - my($e) = $1; - print OFILE "{\"$e\", $e},\n"; - } - } - - print OFILE "{NULL, 0}};\n"; - - print OFILE " -int gen_dump_enum_$name(struct parse_string *p, const char *ptr, unsigned indent) { - return gen_dump_enum(einfo_$name, p, ptr, indent); -} - -int gen_parse_enum_$name(char *ptr, const char *str) { - return gen_parse_enum(einfo_$name, ptr, str); -} - -"; -} - -#################################################### -# parse out the enum declarations -sub parse_enums($) -{ - my($data) = shift; - - while ($data =~ /^GENSTRUCT\s+enum\s+(\w*?)\s*{(.*?)}\s*;(.*)/ms) { - my($name) = $1; - my($elements) = $2; - $data = $3; - - if (!defined($enum_done{$name})) { - $enum_done{$name} = 1; - parse_enum_elements($name, $elements); - } - } - - if (! $first_enum) { - print "\n"; - } -} - -#################################################### -# parse all the structures -sub parse_structs($) -{ - my($data) = shift; - - # parse into structures - while ($data =~ /^GENSTRUCT\s+struct\s+(\w+?)\s*{\s*(.*?)\s*}\s*;(.*)/ms) { - my($name) = $1; - my($elements) = $2; - $data = $3; - if (!defined($struct_done{$name})) { - $struct_done{$name} = 1; - parse_elements($name, $elements); - } - } - - if (! $first_struct) { - print "\n"; - } else { - print "No GENSTRUCT structures found?\n"; - } -} - - -#################################################### -# parse a header file, generating a dumper structure -sub parse_data($) -{ - my($data) = shift; - - # collapse spaces - $data =~ s/[\t ]+/ /sg; - $data =~ s/\s*\n\s+/\n/sg; - # strip debug lines - $data =~ s/^\#.*?\n//smg; - - parse_enums($data); - parse_structs($data); -} - - -######################################### -# display help text -sub ShowHelp() -{ - print " -generator for C structure dumpers -Copyright Andrew Tridgell - -Sample usage: - genstruct -o output.h gcc -E -O2 -g test.h - -Options: - --help this help page - -o OUTPUT place output in OUTPUT -"; - exit(0); -} - -######################################## -# main program -if ($ARGV[0] ne "-o" || $#ARGV < 2) { - ShowHelp(); -} - -shift; -my($opt_ofile)=shift; - -print "creating $opt_ofile\n"; - -open(OFILE, ">$opt_ofile") || die "can't open $opt_ofile"; - -print OFILE "/* This is an automatically generated file - DO NOT EDIT! */\n\n"; - -parse_data(`@ARGV -DGENSTRUCT=GENSTRUCT`); -exit(0); diff --git a/source3/smbd/build_options.c b/source3/smbd/build_options.c index 43335666a63..da5accebab6 100644 --- a/source3/smbd/build_options.c +++ b/source3/smbd/build_options.c @@ -104,6 +104,15 @@ void build_options(BOOL screen) #ifdef WITH_PAM output(screen," WITH_PAM\n"); #endif +#ifdef WITH_TDB_SAM + output(screen," WITH_TDB_SAM\n"); +#endif +#ifdef WITH_SMBPASSWD_SAM + output(screen," WITH_SMBPASSWD_SAM\n"); +#endif +#ifdef WITH_NISPLUS_SAM + output(screen," WITH_NISPLUS_SAM\n"); +#endif #ifdef WITH_NISPLUS_HOME output(screen," WITH_NISPLUS_HOME\n"); #endif @@ -523,9 +532,6 @@ void build_options(BOOL screen) output(screen," sizeof(uint32): %d\n",sizeof(uint32)); output(screen," sizeof(short): %d\n",sizeof(short)); output(screen," sizeof(void*): %d\n",sizeof(void*)); - - output(screen,"\nBuiltin modules:\n"); - output(screen,"%s\n", STRING_STATIC_MODULES); } diff --git a/source3/smbd/conn.c b/source3/smbd/conn.c index b6c7aa1076e..38fa2e02376 100644 --- a/source3/smbd/conn.c +++ b/source3/smbd/conn.c @@ -201,18 +201,15 @@ void conn_free(connection_struct *conn) /* Free vfs_connection_struct */ handle = conn->vfs_private; while(handle) { - /* Only call dlclose for the old modules */ - if (handle->handle) { - /* Close dlopen() handle */ - done_fptr = (void (*)(connection_struct *))sys_dlsym(handle->handle, "vfs_done"); - - if (done_fptr == NULL) { - DEBUG(3, ("No vfs_done() symbol found in module with handle %p, ignoring\n", handle->handle)); - } else { - done_fptr(conn); - } - sys_dlclose(handle->handle); - } + /* Close dlopen() handle */ + done_fptr = (void (*)(connection_struct *))sys_dlsym(handle->handle, "vfs_done"); + + if (done_fptr == NULL) { + DEBUG(3, ("No vfs_done() symbol found in module with handle %p, ignoring\n", handle->handle)); + } else { + done_fptr(conn); + } + sys_dlclose(handle->handle); DLIST_REMOVE(conn->vfs_private, handle); thandle = handle->next; SAFE_FREE(handle); diff --git a/source3/smbd/connection.c b/source3/smbd/connection.c index 5547309a818..17b5be8a7bb 100644 --- a/source3/smbd/connection.c +++ b/source3/smbd/connection.c @@ -172,7 +172,7 @@ BOOL claim_connection(connection_struct *conn, const char *name,int max_connecti crec.uid = conn->uid; crec.gid = conn->gid; safe_strcpy(crec.name, - lp_servicename(SNUM(conn)),sizeof(crec.name)-1); + lp_servicename(SNUM(conn)),sizeof(crec.name)-1); } crec.start = time(NULL); crec.bcast_msg_flags = msg_flags; diff --git a/source3/smbd/dir.c b/source3/smbd/dir.c index 6cf56fd373b..3f29ac892c7 100644 --- a/source3/smbd/dir.c +++ b/source3/smbd/dir.c @@ -627,8 +627,8 @@ BOOL get_dir_entry(connection_struct *conn,char *mask,int dirtype, pstring fname see masktest for a demo */ if ((strcmp(mask,"*.*") == 0) || - mask_match(filename,mask,False) || - mangle_mask_match(conn,filename,mask)) { + mask_match(filename,mask,False) || + mangle_mask_match(conn,filename,mask)) { if (isrootdir && (strequal(filename,"..") || strequal(filename,"."))) continue; diff --git a/source3/smbd/ipc.c b/source3/smbd/ipc.c index 85e28f5d172..c4a12ab531b 100644 --- a/source3/smbd/ipc.c +++ b/source3/smbd/ipc.c @@ -138,9 +138,9 @@ void send_trans_reply(char *outbuf, set_message(outbuf,10,1+this_ldata+this_lparam+align,False); copy_trans_params_and_data(outbuf, align, - rparam, tot_param_sent, this_lparam, - rdata, tot_data_sent, this_ldata); - + rparam, tot_param_sent, this_lparam, + rdata, tot_data_sent, this_ldata); + SSVAL(outbuf,smb_vwv3,this_lparam); SSVAL(outbuf,smb_vwv4,smb_offset(smb_buf(outbuf)+1,outbuf)); SSVAL(outbuf,smb_vwv5,tot_param_sent); diff --git a/source3/smbd/process.c b/source3/smbd/process.c index de1bea493fa..16ef30c46c8 100644 --- a/source3/smbd/process.c +++ b/source3/smbd/process.c @@ -44,7 +44,7 @@ extern userdom_struct current_user_info; extern int smb_read_error; SIG_ATOMIC_T reload_after_sighup = 0; SIG_ATOMIC_T got_sig_term = 0; -BOOL global_machine_password_needs_changing = False; +extern BOOL global_machine_password_needs_changing; extern int max_send; /**************************************************************************** diff --git a/source3/smbd/reply.c b/source3/smbd/reply.c index c4e95b75620..77f4c6783ff 100644 --- a/source3/smbd/reply.c +++ b/source3/smbd/reply.c @@ -148,7 +148,7 @@ int reply_tcon(connection_struct *conn, const char *service; pstring service_buf; pstring password; - fstring dev; + pstring dev; int outsize = 0; uint16 vuid = SVAL(inbuf,smb_uid); int pwlen=0; @@ -204,7 +204,7 @@ int reply_tcon_and_X(connection_struct *conn, char *inbuf,char *outbuf,int lengt { fstring service; DATA_BLOB password; - + /* what the cleint thinks the device is */ fstring client_devicetype; /* what the server tells the client the share represents */ @@ -286,12 +286,13 @@ int reply_tcon_and_X(connection_struct *conn, char *inbuf,char *outbuf,int lengt const char *fsname = IS_IPC(conn) ? "" : lp_fstype(SNUM(conn)); set_message(outbuf,3,0,True); - - p = smb_buf(outbuf); + + p = smb_buf(outbuf); p += srvstr_push(outbuf, p, server_devicetype, -1, - STR_TERMINATE|STR_ASCII); - p += srvstr_push(outbuf, p, fsname, -1, - STR_TERMINATE); + STR_TERMINATE|STR_ASCII); + p += srvstr_push(outbuf, p, fsname, -1, + STR_TERMINATE); + set_message_end(outbuf,p); /* what does setting this bit do? It is set by NT4 and diff --git a/source3/smbd/server.c b/source3/smbd/server.c index ae587ea251e..056231c344a 100644 --- a/source3/smbd/server.c +++ b/source3/smbd/server.c @@ -3,7 +3,7 @@ Main SMB server routines Copyright (C) Andrew Tridgell 1992-1998 Copyright (C) Martin Pool 2002 - Copyright (C) Jelmer Vernooij 2002-2003 + Copyright (C) Jelmer Vernooij 2002 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -669,7 +669,11 @@ static BOOL init_structs(void ) {"log-stdout", 'S', POPT_ARG_VAL, &log_stdout, True, "Log to stdout" }, {"build-options", 'b', POPT_ARG_NONE, NULL, 'b', "Print build options" }, {"port", 'p', POPT_ARG_STRING, &ports, 0, "Listen on the specified ports"}, - POPT_COMMON_SAMBA + {NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_debug}, + {NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_configfile}, + {NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_socket_options}, + {NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_log_base}, + {NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_version}, { NULL } }; @@ -856,16 +860,9 @@ static BOOL init_structs(void ) if (!init_registry()) exit(1); - if (!idmap_init(lp_idmap_backend())) - exit(1); - if(!initialize_password_db(False)) exit(1); - static_init_rpc; - - init_modules(); - uni_group_cache_init(); /* Non-critical */ /* possibly reload the services file. */ @@ -894,10 +891,6 @@ static BOOL init_structs(void ) if (!init_change_notify()) exit(1); - /* Setup privileges database */ - if (!privilege_init()) - exit(1); - /* re-initialise the timezone */ TimeInit(); @@ -907,7 +900,6 @@ static BOOL init_structs(void ) smbd_process(); uni_group_cache_shutdown(); - namecache_shutdown(); exit_server("normal exit"); return(0); } diff --git a/source3/smbd/service.c b/source3/smbd/service.c index 5c87eb0729b..080e2f76dfe 100644 --- a/source3/smbd/service.c +++ b/source3/smbd/service.c @@ -762,7 +762,7 @@ connection_struct *make_connection(const char *service_in, DATA_BLOB password, fstring service; fstring dev; int snum = -1; - + fstrcpy(dev, pdev); /* This must ONLY BE CALLED AS ROOT. As it exits this function as root. */ diff --git a/source3/smbd/uid.c b/source3/smbd/uid.c index 0fa65f47cae..b9cf0de3bd6 100644 --- a/source3/smbd/uid.c +++ b/source3/smbd/uid.c @@ -722,33 +722,6 @@ static void store_gid_sid_cache(const DOM_SID *psid, const enum SID_NAME_USE sid DOM_SID *uid_to_sid(DOM_SID *psid, uid_t uid) { -#ifdef WITH_IDMAP - unid_t id; - - DEBUG(10,("uid_to_sid: uid = [%d]\n", uid)); - - id.uid = uid; - if (NT_STATUS_IS_OK(idmap_get_sid_from_id(psid, id, ID_USERID))) { - DEBUG(10, ("uid_to_sid: sid = [%s]\n", sid_string_static(psid))); - return psid; - } - - /* If mapping is not found in idmap try with traditional method, - then stores the result in idmap. - We may add a switch in future to allow smooth migrations to - idmap-only db ---Simo */ - - become_root(); - psid = local_uid_to_sid(psid, uid); - unbecome_root(); - - DEBUG(10,("uid_to_sid: algorithmic %u -> %s\n", (unsigned int)uid, sid_string_static(psid))); - if (psid) - idmap_set_mapping(psid, id, ID_USERID); - - return psid; - -#else uid_t low, high; enum SID_NAME_USE sidtype; fstring sid; @@ -756,7 +729,7 @@ DOM_SID *uid_to_sid(DOM_SID *psid, uid_t uid) if (fetch_sid_from_uid_cache(psid, &sidtype, uid)) return psid; - if (lp_idmap_uid(&low, &high) && uid >= low && uid <= high) { + if (lp_winbind_uid(&low, &high) && uid >= low && uid <= high) { if (winbind_uid_to_sid(psid, uid)) { DEBUG(10,("uid_to_sid: winbindd %u -> %s\n", @@ -778,7 +751,6 @@ DOM_SID *uid_to_sid(DOM_SID *psid, uid_t uid) store_uid_sid_cache(psid, SID_NAME_USER, uid); return psid; -#endif } /***************************************************************** @@ -789,33 +761,6 @@ DOM_SID *uid_to_sid(DOM_SID *psid, uid_t uid) DOM_SID *gid_to_sid(DOM_SID *psid, gid_t gid) { -#ifdef WITH_IDMAP - unid_t id; - - DEBUG(10,("gid_to_sid: gid = [%d]\n", gid)); - - id.gid = gid; - if (NT_STATUS_IS_OK(idmap_get_sid_from_id(psid, id, ID_GROUPID))) { - DEBUG(10, ("gid_to_sid: sid = [%s]\n", sid_string_static(psid))); - return psid; - } - - /* If mapping is not found in idmap try with traditional method, - then stores the result in idmap. - We may add a switch in future to allow smooth migrations to - idmap-only db ---Simo */ - - become_root(); - psid = local_gid_to_sid(psid, gid); - unbecome_root(); - - DEBUG(10,("gid_to_sid: algorithmic %u -> %s\n", (unsigned int)gid, sid_string_static(psid))); - if (psid) - idmap_set_mapping(psid, id, ID_GROUPID); - - return psid; - -#else gid_t low, high; enum SID_NAME_USE sidtype; fstring sid; @@ -823,7 +768,7 @@ DOM_SID *gid_to_sid(DOM_SID *psid, gid_t gid) if (fetch_sid_from_gid_cache(psid, &sidtype, gid)) return psid; - if (lp_idmap_gid(&low, &high) && gid >= low && gid <= high) { + if (lp_winbind_gid(&low, &high) && gid >= low && gid <= high) { if (winbind_gid_to_sid(psid, gid)) { DEBUG(10,("gid_to_sid: winbindd %u -> %s\n", @@ -844,7 +789,6 @@ DOM_SID *gid_to_sid(DOM_SID *psid, gid_t gid) store_gid_sid_cache(psid, SID_NAME_DOM_GRP, gid); return psid; -#endif } /***************************************************************** @@ -856,35 +800,6 @@ DOM_SID *gid_to_sid(DOM_SID *psid, gid_t gid) BOOL sid_to_uid(const DOM_SID *psid, uid_t *puid, enum SID_NAME_USE *sidtype) { -#ifdef WITH_IDMAP - unid_t id; - int type; - - DEBUG(10,("sid_to_uid: sid = [%s]\n", sid_string_static(psid))); - - *sidtype = SID_NAME_USER; - - type = ID_USERID; - if (NT_STATUS_IS_OK(idmap_get_id_from_sid(&id, &type, psid))) { - DEBUG(10,("sid_to_uid: uid = [%d]\n", id.uid)); - *puid = id.uid; - return True; - } - - if (sid_compare_domain(get_global_sam_sid(), psid) == 0) { - BOOL result; - become_root(); - result = local_sid_to_uid(puid, psid, sidtype); - unbecome_root(); - if (result) { - id.uid = *puid; - DEBUG(10,("sid_to_uid: uid = [%d]\n", id.uid)); - idmap_set_mapping(psid, id, ID_USERID); - return True; - } - } - return False; -#else fstring sid_str; if (fetch_uid_from_cache(puid, psid, *sidtype)) @@ -958,7 +873,6 @@ BOOL sid_to_uid(const DOM_SID *psid, uid_t *puid, enum SID_NAME_USE *sidtype) store_uid_sid_cache(psid, *sidtype, *puid); return True; -#endif } /***************************************************************** @@ -970,37 +884,6 @@ BOOL sid_to_uid(const DOM_SID *psid, uid_t *puid, enum SID_NAME_USE *sidtype) BOOL sid_to_gid(const DOM_SID *psid, gid_t *pgid, enum SID_NAME_USE *sidtype) { -#ifdef WITH_IDMAP - unid_t id; - int type; - - DEBUG(10,("sid_to_gid: sid = [%s]\n", sid_string_static(psid))); - - *sidtype = SID_NAME_ALIAS; - - type = ID_GROUPID; - if (NT_STATUS_IS_OK(idmap_get_id_from_sid(&id, &type, psid))) { - DEBUG(10,("sid_to_gid: gid = [%d]\n", id.gid)); - *pgid = id.gid; - return True; - } - - if (sid_compare_domain(get_global_sam_sid(), psid) == 0) { - BOOL result; - become_root(); - result = local_sid_to_gid(pgid, psid, sidtype); - unbecome_root(); - if (result) { - id.gid = *pgid; - DEBUG(10,("sid_to_gid: gid = [%d]\n", id.gid)); - idmap_set_mapping(psid, id, ID_GROUPID); - return True; - } - } - - return False; - -#else fstring dom_name, name, sid_str; enum SID_NAME_USE name_type; @@ -1061,6 +944,5 @@ BOOL sid_to_gid(const DOM_SID *psid, gid_t *pgid, enum SID_NAME_USE *sidtype) store_gid_sid_cache(psid, *sidtype, *pgid); return True; -#endif } diff --git a/source3/smbd/vfs.c b/source3/smbd/vfs.c index 06aca513221..533c64b229f 100644 --- a/source3/smbd/vfs.c +++ b/source3/smbd/vfs.c @@ -27,13 +27,6 @@ #undef DBGC_CLASS #define DBGC_CLASS DBGC_VFS -struct vfs_init_function_entry { - char *name; - vfs_op_tuple *ops, *(*init)(const struct vfs_ops *, struct smb_vfs_handle_struct *); - struct vfs_init_function_entry *prev, *next; -}; - -static struct vfs_init_function_entry *backends = NULL; /* Some structures to help us initialise the vfs operations table */ @@ -134,59 +127,6 @@ static struct vfs_ops default_vfs_ops = { vfswrap_sys_acl_free_qualifier }; -/**************************************************************************** - maintain the list of available backends -****************************************************************************/ - -static struct vfs_init_function_entry *vfs_find_backend_entry(const char *name) -{ - struct vfs_init_function_entry *entry = backends; - pstring stripped; - - module_path_get_name(name, stripped); - - while(entry) { - if (strequal(entry->name, stripped)) return entry; - entry = entry->next; - } - - return NULL; -} - -BOOL smb_register_vfs(const char *name, vfs_op_tuple *(*init)(const struct vfs_ops *, struct smb_vfs_handle_struct *), int version) -{ - struct vfs_init_function_entry *entry = backends; - - if ((version < SMB_VFS_INTERFACE_CASCADED)) { - DEBUG(0, ("vfs_init() returned wrong interface version info (was %d, should be no less than %d)\n", - version, SMB_VFS_INTERFACE_VERSION )); - return False; - } - - if ((version < SMB_VFS_INTERFACE_VERSION)) { - DEBUG(0, ("Warning: vfs_init() states that module confirms interface version #%d, current interface version is #%d.\n\ - Proceeding in compatibility mode, new operations (since version #%d) will fallback to default ones.\n", - version, SMB_VFS_INTERFACE_VERSION, version )); - return False; - } - - while(entry) { - if (strequal(entry->name, name)) { - DEBUG(0,("VFS module %s already loaded!\n", name)); - return False; - } - entry = entry->next; - } - - entry = smb_xmalloc(sizeof(struct vfs_init_function_entry)); - entry->name = smb_xstrdup(name); - entry->init = init; - - DLIST_ADD(backends, entry); - DEBUG(5, ("Successfully added vfs backend '%s'\n", name)); - return True; -} - /**************************************************************************** initialise default vfs hooks ****************************************************************************/ @@ -199,19 +139,23 @@ static void vfs_init_default(connection_struct *conn) conn->vfs_private = NULL; } -/*************************************************************************** - Function to load old VFS modules. Should go away after a while. - **************************************************************************/ +/**************************************************************************** + initialise custom vfs hooks +****************************************************************************/ -static vfs_op_tuple *vfs_load_old_plugin(connection_struct *conn, const char *vfs_object) +BOOL vfs_init_custom(connection_struct *conn, const char *vfs_object) { int vfs_version = -1; - vfs_op_tuple *ops, *(*init_fptr)(int *, const struct vfs_ops *, struct smb_vfs_handle_struct *); + vfs_op_tuple *ops, *(*init_fptr)(int *, const struct vfs_ops *, struct smb_vfs_handle_struct *); + int i; + + DEBUG(3, ("Initialising custom vfs hooks from %s\n", vfs_object)); + /* Open object file */ if ((conn->vfs_private->handle = sys_dlopen(vfs_object, RTLD_NOW)) == NULL) { DEBUG(0, ("Error opening %s: %s\n", vfs_object, sys_dlerror())); - return NULL; + return False; } /* Get handle on vfs_init() symbol */ @@ -221,73 +165,32 @@ static vfs_op_tuple *vfs_load_old_plugin(connection_struct *conn, const char *vf if (init_fptr == NULL) { DEBUG(0, ("No vfs_init() symbol found in %s\n", vfs_object)); sys_dlclose(conn->vfs_private->handle); - return NULL; + return False; } /* Initialise vfs_ops structure */ - if ((ops = init_fptr(&vfs_version, &conn->vfs_ops, conn->vfs_private)) == NULL) { - DEBUG(0, ("vfs_init() function from %s failed\n", vfs_object)); - sys_dlclose(conn->vfs_private->handle); - return NULL; - } - if ((vfs_version < SMB_VFS_INTERFACE_CASCADED)) { - DEBUG(0, ("vfs_init() returned wrong interface version info (was %d, should be no less than %d)\n", - vfs_version, SMB_VFS_INTERFACE_VERSION )); + if ((ops = init_fptr(&vfs_version, &conn->vfs_ops, conn->vfs_private)) == NULL) { + DEBUG(0, ("vfs_init() function from %s failed\n", vfs_object)); sys_dlclose(conn->vfs_private->handle); - return NULL; - } - - if ((vfs_version < SMB_VFS_INTERFACE_VERSION)) { - DEBUG(0, ("Warning: vfs_init() states that module confirms interface version #%d, current interface version is #%d.\n\ - Proceeding in compatibility mode, new operations (since version #%d) will fallback to default ones.\n", - vfs_version, SMB_VFS_INTERFACE_VERSION, vfs_version )); + return False; + } + + if ((vfs_version < SMB_VFS_INTERFACE_CASCADED)) { + DEBUG(0, ("vfs_init() returned wrong interface version info (was %d, should be no less than %d)\n", + vfs_version, SMB_VFS_INTERFACE_VERSION )); sys_dlclose(conn->vfs_private->handle); - return NULL; - } - - return ops; -} - - - -/**************************************************************************** - initialise custom vfs hooks - ****************************************************************************/ - -BOOL vfs_init_custom(connection_struct *conn, const char *vfs_object) -{ - vfs_op_tuple *ops; - int i; - struct vfs_init_function_entry *entry; - - DEBUG(3, ("Initialising custom vfs hooks from %s\n", vfs_object)); - - if(!backends) static_init_vfs; - - /* First, try to load the module with the new module system */ - if((entry = vfs_find_backend_entry(vfs_object)) || - (smb_probe_module("vfs", vfs_object) && - (entry = vfs_find_backend_entry(vfs_object)))) { - - DEBUG(3,("Successfully loaded %s with the new modules system\n", vfs_object)); - - if ((ops = entry->init(&conn->vfs_ops, conn->vfs_private)) == NULL) { - DEBUG(0, ("vfs init function from %s failed\n", vfs_object)); - return False; - } - } else { - /* If that doesn't work, fall back to the old system - * (This part should go away after a while, it's only here - * for backwards compatibility) */ - DEBUG(2, ("Can't load module %s with new modules system, falling back to compatibility\n", - vfs_object)); - if ((ops = vfs_load_old_plugin(conn, vfs_object)) == NULL) { - DEBUG(0, ("vfs init function from %s failed\n", vfs_object)); - return False; - } - } - + return False; + } + + if ((vfs_version < SMB_VFS_INTERFACE_VERSION)) { + DEBUG(0, ("Warning: vfs_init() states that module confirms interface version #%d, current interface version is #%d.\n\ +Proceeding in compatibility mode, new operations (since version #%d) will fallback to default ones.\n", + vfs_version, SMB_VFS_INTERFACE_VERSION, vfs_version )); + sys_dlclose(conn->vfs_private->handle); + return False; + } + for(i=0; ops[i].op != NULL; i++) { DEBUG(3, ("Checking operation #%d (type %d, layer %d)\n", i, ops[i].type, ops[i].layer)); if(ops[i].layer == SMB_VFS_LAYER_OPAQUE) { @@ -312,50 +215,54 @@ BOOL vfs_init_custom(connection_struct *conn, const char *vfs_object) BOOL smbd_vfs_init(connection_struct *conn) { - const char **vfs_objects; - char *vfs_module, *vfs_path; - unsigned int i = 0; - int j = 0; + char **vfs_objects, *vfsobj, *vfs_module, *vfs_path; + int nobj, i; struct smb_vfs_handle_struct *handle; /* Normal share - initialise with disk access functions */ vfs_init_default(conn); - vfs_objects = lp_vfsobj(SNUM(conn)); /* Override VFS functions if 'vfs object' was specified*/ - if (!vfs_objects) - return True; - - for(i=0; i= 0; j--) { - conn->vfs_private = NULL; - handle = (struct smb_vfs_handle_struct *) smb_xmalloc(sizeof(smb_vfs_handle_struct)); - /* Loadable object file */ - handle->handle = NULL; - DLIST_ADD(conn->vfs_private, handle); - vfs_module = NULL; - if (vfs_path && *vfs_path) { - asprintf(&vfs_module, "%s/%s", vfs_path, vfs_objects[j]); - } else { - asprintf(&vfs_module, "%s", vfs_objects[j]); + if (*lp_vfsobj(SNUM(conn))) { + vfsobj = NULL; + for(i=0; ivfs_private, handle); - SAFE_FREE(handle); - return False; + if (string_set(&vfsobj, lp_vfsobj(SNUM(conn)))) { + /* Parse passed modules specification to array of modules */ + set_first_token(vfsobj); + /* We are using default separators: ' \t\r\n' */ + vfs_objects = toktocliplist(&nobj, NULL); + if (vfs_objects) { + vfs_path = lp_vfs_path(SNUM(conn)); + conn->vfs_private = NULL; + for(i=nobj-1; i>=0; i--) { + handle = (struct smb_vfs_handle_struct *) smb_xmalloc(sizeof(smb_vfs_handle_struct)); + /* Loadable object file */ + handle->handle = NULL; + DLIST_ADD(conn->vfs_private, handle) + vfs_module = NULL; + if (vfs_path) { + asprintf(&vfs_module, "%s/%s", vfs_path, vfs_objects[i]); + } else { + asprintf(&vfs_module, "%s", vfs_objects[i]); + } + if (!vfs_init_custom(conn, vfs_module)) { + DEBUG(0, ("smbd_vfs_init: vfs_init_custom failed for %s\n", vfs_module)); + string_free(&vfsobj); + SAFE_FREE(vfs_module); + DLIST_REMOVE(conn->vfs_private, handle); + SAFE_FREE(handle); + return False; + } + SAFE_FREE(vfs_module); + } + } + string_free(&vfsobj); + return True; } - SAFE_FREE(vfs_module); } return True; } diff --git a/source3/tdb/spinlock.h b/source3/tdb/spinlock.h index 8b0e833ff56..d6a2ac6eb88 100644 --- a/source3/tdb/spinlock.h +++ b/source3/tdb/spinlock.h @@ -1,7 +1,7 @@ #ifndef __SPINLOCK_H__ #define __SPINLOCK_H__ -#ifdef HAVE_CONFIG_H +#if HAVE_CONFIG_H #include #endif diff --git a/source3/tdb/tdb.c b/source3/tdb/tdb.c index c414ae0d310..442baed9362 100644 --- a/source3/tdb/tdb.c +++ b/source3/tdb/tdb.c @@ -20,27 +20,6 @@ along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. */ - - -/* NOTE: If you use tdbs under valgrind, and in particular if you run - * tdbtorture, you may get spurious "uninitialized value" warnings. I - * think this is because valgrind doesn't understand that the mmap'd - * area may be written to by other processes. Memory can, from the - * point of view of the grinded process, spontaneously become - * initialized. - * - * I can think of a few solutions. [mbp 20030311] - * - * 1 - Write suppressions for Valgrind so that it doesn't complain - * about this. Probably the most reasonable but people need to - * remember to use them. - * - * 2 - Use IO not mmap when running under valgrind. Not so nice. - * - * 3 - Use the special valgrind macros to mark memory as valid at the - * right time. Probably too hard -- the process just doesn't know. - */ - #ifdef STANDALONE #if HAVE_CONFIG_H #include diff --git a/source3/tdb/tdbbackup.c b/source3/tdb/tdbbackup.c index 36ba7db9188..7b344de6c45 100644 --- a/source3/tdb/tdbbackup.c +++ b/source3/tdb/tdbbackup.c @@ -303,3 +303,13 @@ static void usage(void) return ret; } + +#ifdef VALGRIND +size_t valgrind_strlen(const char *s) +{ + size_t count; + for(count = 0; *s++; count++) + ; + return count; +} +#endif diff --git a/source3/tdb/tdbutil.c b/source3/tdb/tdbutil.c index b153d442bd6..0d8f6128cc5 100644 --- a/source3/tdb/tdbutil.c +++ b/source3/tdb/tdbutil.c @@ -42,7 +42,7 @@ static void gotalarm_sig(void) static TDB_DATA make_tdb_data(const char *dptr, size_t dsize) { TDB_DATA ret; - ret.dptr = smb_xstrdup(dptr); + ret.dptr = dptr; ret.dsize = dsize; return ret; } @@ -387,7 +387,6 @@ BOOL tdb_change_uint32_atomic(TDB_CONTEXT *tdb, const char *keystr, uint32 *oldv size_t tdb_pack(char *buf, int bufsize, const char *fmt, ...) { va_list ap; - uint8 bt; uint16 w; uint32 d; int i; @@ -403,46 +402,40 @@ size_t tdb_pack(char *buf, int bufsize, const char *fmt, ...) while (*fmt) { switch ((c = *fmt++)) { - case 'b': /* unsigned 8-bit integer */ - len = 1; - bt = (uint8)va_arg(ap, int); - if (bufsize >= len) - SSVAL(buf, 0, bt); - break; - case 'w': /* unsigned 16-bit integer */ + case 'w': len = 2; w = (uint16)va_arg(ap, int); if (bufsize >= len) SSVAL(buf, 0, w); break; - case 'd': /* signed 32-bit integer (standard int in most systems) */ + case 'd': len = 4; d = va_arg(ap, uint32); if (bufsize >= len) SIVAL(buf, 0, d); break; - case 'p': /* pointer */ + case 'p': len = 4; p = va_arg(ap, void *); d = p?1:0; if (bufsize >= len) SIVAL(buf, 0, d); break; - case 'P': /* null-terminated string */ + case 'P': s = va_arg(ap,char *); w = strlen(s); len = w + 1; if (bufsize >= len) memcpy(buf, s, len); break; - case 'f': /* null-terminated string */ + case 'f': s = va_arg(ap,char *); w = strlen(s); len = w + 1; if (bufsize >= len) memcpy(buf, s, len); break; - case 'B': /* fixed-length string */ + case 'B': i = va_arg(ap, int); s = va_arg(ap, char *); len = 4+i; @@ -478,7 +471,6 @@ size_t tdb_pack(char *buf, int bufsize, const char *fmt, ...) int tdb_unpack(char *buf, int bufsize, const char *fmt, ...) { va_list ap; - uint8 *bt; uint16 *w; uint32 *d; int len; @@ -494,13 +486,6 @@ int tdb_unpack(char *buf, int bufsize, const char *fmt, ...) while (*fmt) { switch ((c=*fmt++)) { - case 'b': - len = 1; - bt = va_arg(ap, uint8 *); - if (bufsize < len) - goto no_space; - *bt = SVAL(buf, 0); - break; case 'w': len = 2; w = va_arg(ap, uint16 *); @@ -578,130 +563,6 @@ int tdb_unpack(char *buf, int bufsize, const char *fmt, ...) return -1; } - -/** - * Pack SID passed by pointer - * - * @param pack_buf pointer to buffer which is to be filled with packed data - * @param bufsize size of packing buffer - * @param sid pointer to sid to be packed - * - * @return length of the packed representation of the whole structure - **/ -size_t tdb_sid_pack(char* pack_buf, int bufsize, DOM_SID* sid) -{ - int idx; - size_t len = 0; - - if (!sid || !pack_buf) return -1; - - len += tdb_pack(pack_buf + len, bufsize - len, "bb", sid->sid_rev_num, - sid->num_auths); - - for (idx = 0; idx < 6; idx++) { - len += tdb_pack(pack_buf + len, bufsize - len, "b", sid->id_auth[idx]); - } - - for (idx = 0; idx < MAXSUBAUTHS; idx++) { - len += tdb_pack(pack_buf + len, bufsize - len, "d", sid->sub_auths[idx]); - } - - return len; -} - - -/** - * Unpack SID into a pointer - * - * @param pack_buf pointer to buffer with packed representation - * @param bufsize size of the buffer - * @param sid pointer to sid structure to be filled with unpacked data - * - * @return size of structure unpacked from buffer - **/ -size_t tdb_sid_unpack(char* pack_buf, int bufsize, DOM_SID* sid) -{ - int idx, len = 0; - - if (!sid || !pack_buf) return -1; - - len += tdb_unpack(pack_buf + len, bufsize - len, "bb", - &sid->sid_rev_num, &sid->num_auths); - - for (idx = 0; idx < 6; idx++) { - len += tdb_unpack(pack_buf + len, bufsize - len, "b", &sid->id_auth[idx]); - } - - for (idx = 0; idx < MAXSUBAUTHS; idx++) { - len += tdb_unpack(pack_buf + len, bufsize - len, "d", &sid->sub_auths[idx]); - } - - return len; -} - - -/** - * Pack TRUSTED_DOM_PASS passed by pointer - * - * @param pack_buf pointer to buffer which is to be filled with packed data - * @param bufsize size of the buffer - * @param pass pointer to trusted domain password to be packed - * - * @return length of the packed representation of the whole structure - **/ -size_t tdb_trusted_dom_pass_pack(char* pack_buf, int bufsize, TRUSTED_DOM_PASS* pass) -{ - int idx, len = 0; - - if (!pack_buf || !pass) return -1; - - /* packing unicode domain name and password */ - len += tdb_pack(pack_buf + len, bufsize - len, "d", pass->uni_name_len); - - for (idx = 0; idx < 32; idx++) - len += tdb_pack(pack_buf + len, bufsize - len, "w", pass->uni_name[idx]); - - len += tdb_pack(pack_buf + len, bufsize - len, "dPd", pass->pass_len, - pass->pass, pass->mod_time); - - /* packing SID structure */ - len += tdb_sid_pack(pack_buf + len, bufsize - len, &pass->domain_sid); - - return len; -} - - -/** - * Unpack TRUSTED_DOM_PASS passed by pointer - * - * @param pack_buf pointer to buffer with packed representation - * @param bufsize size of the buffer - * @param pass pointer to trusted domain password to be filled with unpacked data - * - * @return size of structure unpacked from buffer - **/ -size_t tdb_trusted_dom_pass_unpack(char* pack_buf, int bufsize, TRUSTED_DOM_PASS* pass) -{ - int idx, len = 0; - - if (!pack_buf || !pass) return -1; - - /* unpack unicode domain name and plaintext password */ - len += tdb_unpack(pack_buf, bufsize - len, "d", &pass->uni_name_len); - - for (idx = 0; idx < 32; idx++) - len += tdb_unpack(pack_buf + len, bufsize - len, "w", &pass->uni_name[idx]); - - len += tdb_unpack(pack_buf + len, bufsize - len, "dPd", &pass->pass_len, &pass->pass, - &pass->mod_time); - - /* unpack domain sid */ - len += tdb_sid_unpack(pack_buf + len, bufsize - len, &pass->domain_sid); - - return len; -} - - /**************************************************************************** Log tdb messages via DEBUG(). ****************************************************************************/ diff --git a/source3/torture/cmd_sam.c b/source3/torture/cmd_sam.c deleted file mode 100644 index 3f7f7dfe27e..00000000000 --- a/source3/torture/cmd_sam.c +++ /dev/null @@ -1,514 +0,0 @@ -/* - Unix SMB/CIFS implementation. - SAM module functions - - Copyright (C) Jelmer Vernooij 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" -#include "samtest.h" - -static void print_account(SAM_ACCOUNT_HANDLE *a) -{ - /* FIXME */ -} - -static NTSTATUS cmd_context(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - NTSTATUS status; - char **plugins; - int i; - - plugins = malloc(argc * sizeof(char *)); - - for(i = 1; i < argc; i++) - plugins[i-1] = argv[i]; - - plugins[argc-1] = NULL; - - if(!NT_STATUS_IS_OK(status = make_sam_context_list(&st->context, plugins))) { - printf("make_sam_context_list failed: %s\n", nt_errstr(status)); - SAFE_FREE(plugins); - return status; - } - - SAFE_FREE(plugins); - - return NT_STATUS_OK; -} - -static NTSTATUS cmd_load_module(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - char *plugin_arg[2]; - NTSTATUS status; - if (argc != 2 && argc != 3) { - printf("Usage: load [domain-name]\n"); - return NT_STATUS_OK; - } - - if (argc == 3) - asprintf(&plugin_arg[0], "plugin:%s|%s", argv[1], argv[2]); - else - asprintf(&plugin_arg[0], "plugin:%s", argv[1]); - - plugin_arg[1] = NULL; - - if(!NT_STATUS_IS_OK(status = make_sam_context_list(&st->context, plugin_arg))) { - free(plugin_arg[0]); - return status; - } - - free(plugin_arg[0]); - - printf("load: ok\n"); - return NT_STATUS_OK; -} - -static NTSTATUS cmd_get_sec_desc(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS cmd_set_sec_desc(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS cmd_lookup_sid(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - char *name; - uint32 type; - NTSTATUS status; - DOM_SID sid; - if (argc != 2) { - printf("Usage: lookup_sid \n"); - return NT_STATUS_INVALID_PARAMETER; - } - - if (!string_to_sid(&sid, argv[1])){ - printf("Unparseable SID specified!\n"); - return NT_STATUS_INVALID_PARAMETER; - } - - if (!NT_STATUS_IS_OK(status = sam_lookup_sid(st->context, st->token, mem_ctx, &sid, &name, &type))) { - printf("sam_lookup_sid failed!\n"); - return status; - } - - printf("Name: %s\n", name); - printf("Type: %d\n", type); /* FIXME: What kind of an integer is type ? */ - - return NT_STATUS_OK; -} - -static NTSTATUS cmd_lookup_name(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - DOM_SID sid; - uint32 type; - NTSTATUS status; - if (argc != 3) { - printf("Usage: lookup_name \n"); - return NT_STATUS_INVALID_PARAMETER; - } - - if (!NT_STATUS_IS_OK(status = sam_lookup_name(st->context, st->token, argv[1], argv[2], &sid, &type))) { - printf("sam_lookup_name failed!\n"); - return status; - } - - printf("SID: %s\n", sid_string_static(&sid)); - printf("Type: %d\n", type); - - return NT_STATUS_OK; -} - -static NTSTATUS cmd_lookup_account(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS cmd_lookup_group(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS cmd_lookup_domain(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - DOM_SID *sid; - NTSTATUS status; - if (argc != 2) { - printf("Usage: lookup_domain \n"); - return NT_STATUS_INVALID_PARAMETER; - } - - if (!NT_STATUS_IS_OK(status = sam_lookup_domain(st->context, st->token, argv[1], &sid))) { - printf("sam_lookup_name failed!\n"); - return status; - } - - printf("SID: %s\n", sid_string_static(sid)); - - return NT_STATUS_OK; -} - -static NTSTATUS cmd_enum_domains(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - int32 domain_count, i; - DOM_SID *domain_sids; - char **domain_names; - NTSTATUS status; - - if (!NT_STATUS_IS_OK(status = sam_enum_domains(st->context, st->token, &domain_count, &domain_sids, &domain_names))) { - printf("sam_enum_domains failed!\n"); - return status; - } - - if (domain_count == 0) { - printf("No domains found!\n"); - return NT_STATUS_OK; - } - - for (i = 0; i < domain_count; i++) { - printf("%s %s\n", domain_names[i], sid_string_static(&domain_sids[i])); - } - - SAFE_FREE(domain_sids); - SAFE_FREE(domain_names); - - return NT_STATUS_OK; -} - -static NTSTATUS cmd_update_domain(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS cmd_show_domain(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - NTSTATUS status; - DOM_SID sid; - SAM_DOMAIN_HANDLE *domain; - uint32 tmp_uint32; - uint16 tmp_uint16; - NTTIME tmp_nttime; - BOOL tmp_bool; - const char *tmp_string; - - if (argc != 2) { - printf("Usage: show_domain \n"); - return status; - } - - if (!string_to_sid(&sid, argv[1])){ - printf("Unparseable SID specified!\n"); - return NT_STATUS_INVALID_PARAMETER; - } - - if (!NT_STATUS_IS_OK(status = sam_get_domain_by_sid(st->context, st->token, GENERIC_RIGHTS_DOMAIN_ALL_ACCESS, &sid, &domain))) { - printf("sam_get_domain_by_sid failed\n"); - return status; - } - - if (!NT_STATUS_IS_OK(status = sam_get_domain_num_accounts(domain, &tmp_uint32))) { - printf("sam_get_domain_num_accounts failed: %s\n", nt_errstr(status)); - } else { - printf("Number of accounts: %d\n", tmp_uint32); - } - - if (!NT_STATUS_IS_OK(status = sam_get_domain_num_groups(domain, &tmp_uint32))) { - printf("sam_get_domain_num_groups failed: %s\n", nt_errstr(status)); - } else { - printf("Number of groups: %u\n", tmp_uint32); - } - - if (!NT_STATUS_IS_OK(status = sam_get_domain_num_aliases(domain, &tmp_uint32))) { - printf("sam_get_domain_num_aliases failed: %s\n", nt_errstr(status)); - } else { - printf("Number of aliases: %u\n", tmp_uint32); - } - - if (!NT_STATUS_IS_OK(status = sam_get_domain_name(domain, &tmp_string))) { - printf("sam_get_domain_name failed: %s\n", nt_errstr(status)); - } else { - printf("Domain Name: %s\n", tmp_string); - } - - if (!NT_STATUS_IS_OK(status = sam_get_domain_lockout_count(domain, &tmp_uint16))) { - printf("sam_get_domain_lockout_count failed: %s\n", nt_errstr(status)); - } else { - printf("Lockout Count: %u\n", tmp_uint16); - } - - if (!NT_STATUS_IS_OK(status = sam_get_domain_force_logoff(domain, &tmp_bool))) { - printf("sam_get_domain_force_logoff failed: %s\n", nt_errstr(status)); - } else { - printf("Force Logoff: %s\n", (tmp_bool?"Yes":"No")); - } - - if (!NT_STATUS_IS_OK(status = sam_get_domain_lockout_duration(domain, &tmp_nttime))) { - printf("sam_get_domain_lockout_duration failed: %s\n", nt_errstr(status)); - } else { - printf("Lockout duration: %u\n", tmp_nttime.low); - } - - if (!NT_STATUS_IS_OK(status = sam_get_domain_login_pwdchange(domain, &tmp_bool))) { - printf("sam_get_domain_login_pwdchange failed: %s\n", nt_errstr(status)); - } else { - printf("Password changing allowed: %s\n", (tmp_bool?"Yes":"No")); - } - - if (!NT_STATUS_IS_OK(status = sam_get_domain_max_pwdage(domain, &tmp_nttime))) { - printf("sam_get_domain_max_pwdage failed: %s\n", nt_errstr(status)); - } else { - printf("Maximum password age: %u\n", tmp_nttime.low); - } - - if (!NT_STATUS_IS_OK(status = sam_get_domain_min_pwdage(domain, &tmp_nttime))) { - printf("sam_get_domain_min_pwdage failed: %s\n", nt_errstr(status)); - } else { - printf("Minimal password age: %u\n", tmp_nttime.low); - } - - if (!NT_STATUS_IS_OK(status = sam_get_domain_min_pwdlength(domain, &tmp_uint16))) { - printf("sam_get_domain_min_pwdlength: %s\n", nt_errstr(status)); - } else { - printf("Minimal Password Length: %u\n", tmp_uint16); - } - - if (!NT_STATUS_IS_OK(status = sam_get_domain_pwd_history(domain, &tmp_uint16))) { - printf("sam_get_domain_pwd_history failed: %s\n", nt_errstr(status)); - } else { - printf("Password history: %u\n", tmp_uint16); - } - - if (!NT_STATUS_IS_OK(status = sam_get_domain_reset_count(domain, &tmp_nttime))) { - printf("sam_get_domain_reset_count failed: %s\n", nt_errstr(status)); - } else { - printf("Reset count: %u\n", tmp_nttime.low); - } - - if (!NT_STATUS_IS_OK(status = sam_get_domain_server(domain, &tmp_string))) { - printf("sam_get_domain_server failed: %s\n", nt_errstr(status)); - } else { - printf("Server: %s\n", tmp_string); - } - - return NT_STATUS_OK; -} - -static NTSTATUS cmd_create_account(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS cmd_update_account(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS cmd_delete_account(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS cmd_enum_accounts(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - NTSTATUS status; - DOM_SID sid; - int32 account_count, i; - SAM_ACCOUNT_ENUM *accounts; - - if (argc != 2) { - printf("Usage: enum_accounts \n"); - return NT_STATUS_INVALID_PARAMETER; - } - - if (!string_to_sid(&sid, argv[1])){ - printf("Unparseable SID specified!\n"); - return NT_STATUS_INVALID_PARAMETER; - } - - if (!NT_STATUS_IS_OK(status = sam_enum_accounts(st->context, st->token, &sid, 0, &account_count, &accounts))) { - printf("sam_enum_accounts failed: %s\n", nt_errstr(status)); - return status; - } - - if (account_count == 0) { - printf("No accounts found!\n"); - return NT_STATUS_OK; - } - - for (i = 0; i < account_count; i++) - printf("SID: %s\nName: %s\nFullname: %s\nDescription: %s\nACB_BITS: %08X\n\n", - sid_string_static(&accounts[i].sid), accounts[i].account_name, - accounts[i].full_name, accounts[i].account_desc, - accounts[i].acct_ctrl); - - SAFE_FREE(accounts); - - return NT_STATUS_OK; -} - -static NTSTATUS cmd_lookup_account_sid(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - NTSTATUS status; - DOM_SID sid; - SAM_ACCOUNT_HANDLE *account; - - if (argc != 2) { - printf("Usage: lookup_account_sid \n"); - return NT_STATUS_INVALID_PARAMETER; - } - - if (!string_to_sid(&sid, argv[1])){ - printf("Unparseable SID specified!\n"); - return NT_STATUS_INVALID_PARAMETER; - } - - if (!NT_STATUS_IS_OK(status = sam_get_account_by_sid(st->context, st->token, GENERIC_RIGHTS_USER_ALL_ACCESS, &sid, &account))) { - printf("context_sam_get_account_by_sid failed: %s\n", nt_errstr(status)); - return status; - } - - print_account(account); - - return NT_STATUS_OK; -} - -static NTSTATUS cmd_lookup_account_name(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - NTSTATUS status; - SAM_ACCOUNT_HANDLE *account; - - if (argc != 3) { - printf("Usage: lookup_account_name \n"); - return NT_STATUS_INVALID_PARAMETER; - } - - - if (!NT_STATUS_IS_OK(status = sam_get_account_by_name(st->context, st->token, GENERIC_RIGHTS_USER_ALL_ACCESS, argv[1], argv[2], &account))) { - printf("context_sam_get_account_by_sid failed: %s\n", nt_errstr(status)); - return status; - } - - print_account(account); - - return NT_STATUS_OK; -} - -static NTSTATUS cmd_create_group(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS cmd_update_group(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS cmd_delete_group(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS cmd_enum_groups(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS cmd_lookup_group_sid(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS cmd_lookup_group_name(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS cmd_group_add_member(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - -static NTSTATUS cmd_group_del_member(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - - -static NTSTATUS cmd_group_enum(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - - -static NTSTATUS cmd_get_sid_groups(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - return NT_STATUS_NOT_IMPLEMENTED; -} - -struct cmd_set sam_general_commands[] = { - - { "General SAM Commands" }, - - { "load", cmd_load_module, "Load a module", "load [domain-sid]" }, - { "context", cmd_context, "Load specified context", "context [DOMAIN|]backend1[:options] [DOMAIN|]backend2[:options]" }, - { "get_sec_desc", cmd_get_sec_desc, "Get security descriptor info", "get_sec_desc " }, - { "set_sec_desc", cmd_set_sec_desc, "Set security descriptor info", "set_sec_desc " }, - { "lookup_sid", cmd_lookup_sid, "Lookup type of specified SID", "lookup_sid " }, - { "lookup_name", cmd_lookup_name, "Lookup type of specified name", "lookup_name " }, - { NULL } -}; - -struct cmd_set sam_domain_commands[] = { - { "Domain Commands" }, - { "update_domain", cmd_update_domain, "Update domain information", "update_domain [domain-options] domain-name | domain-sid" }, - { "show_domain", cmd_show_domain, "Show domain information", "show_domain domain-sid | domain-name" }, - { "enum_domains", cmd_enum_domains, "Enumerate all domains", "enum_domains " }, - { "lookup_domain", cmd_lookup_domain, "Lookup a domain by name", "lookup_domain domain-name" }, - { NULL } -}; - -struct cmd_set sam_account_commands[] = { - { "Account Commands" }, - { "create_account", cmd_create_account, "Create a new account with specified properties", "create_account [account-options]" }, - { "update_account", cmd_update_account, "Update an existing account", "update_account [account-options] account-sid | account-name" }, - { "delete_account", cmd_delete_account, "Delete an account", "delete_account account-sid | account-name" }, - { "enum_accounts", cmd_enum_accounts, "Enumerate all accounts", "enum_accounts " }, - { "lookup_account", cmd_lookup_account, "Lookup an account by either sid or name", "lookup_account account-sid | account-name" }, - { "lookup_account_sid", cmd_lookup_account_sid, "Lookup an account by sid", "lookup_account_sid account-sid" }, - { "lookup_account_name", cmd_lookup_account_name, "Lookup an account by name", "lookup_account_name account-name" }, - { NULL } -}; - -struct cmd_set sam_group_commands[] = { - { "Group Commands" }, - { "create_group", cmd_create_group, "Create a new group", "create_group [group-opts]" }, - { "update_group", cmd_update_group, "Update an existing group", "update_group [group-opts] group-name | group-sid" }, - { "delete_group", cmd_delete_group, "Delete an existing group", "delete_group group-name | group-sid" }, - { "enum_groups", cmd_enum_groups, "Enumerate all groups", "enum_groups " }, - { "lookup_group", cmd_lookup_group, "Lookup a group by SID or name", "lookup_group group-sid | group-name" }, - { "lookup_group_sid", cmd_lookup_group_sid, "Lookup a group by SID", "lookup_group_sid " }, - { "lookup_group_name", cmd_lookup_group_name, "Lookup a group by name", "lookup_group_name " }, - { "group_add_member", cmd_group_add_member, "Add group member to group", "group_add_member " }, - { "group_del_member", cmd_group_del_member, "Delete group member from group", "group_del_member " }, - { "group_enum", cmd_group_enum, "Enumerate all members of specified group", "group_enum group-sid | group-name" }, - - { "get_sid_groups", cmd_get_sid_groups, "Get a list of groups specified sid is a member of", "group_enum " }, - { NULL } -}; diff --git a/source3/torture/denytest.c b/source3/torture/denytest.c index 3a7906fb33b..017bb1c06d6 100644 --- a/source3/torture/denytest.c +++ b/source3/torture/denytest.c @@ -1408,7 +1408,7 @@ static void progress_bar(unsigned i, unsigned total) */ BOOL torture_denytest1(int dummy) { - struct cli_state *cli1; + static struct cli_state cli1; int fnum1, fnum2; int i; BOOL correct = True; @@ -1421,10 +1421,10 @@ BOOL torture_denytest1(int dummy) printf("starting denytest1\n"); for (i=0;i<2;i++) { - cli_unlink(cli1, fnames[i]); - fnum1 = cli_open(cli1, fnames[i], O_RDWR|O_CREAT, DENY_NONE); - cli_write(cli1, fnum1, 0, fnames[i], 0, strlen(fnames[i])); - cli_close(cli1, fnum1); + cli_unlink(&cli1, fnames[i]); + fnum1 = cli_open(&cli1, fnames[i], O_RDWR|O_CREAT, DENY_NONE); + cli_write(&cli1, fnum1, 0, fnames[i], 0, strlen(fnames[i])); + cli_close(&cli1, fnum1); } printf("testing %d entries\n", ARRAY_SIZE(denytable1)); @@ -1435,10 +1435,10 @@ BOOL torture_denytest1(int dummy) progress_bar(i, ARRAY_SIZE(denytable1)); - fnum1 = cli_open(cli1, fname, + fnum1 = cli_open(&cli1, fname, denytable1[i].mode1, denytable1[i].deny1); - fnum2 = cli_open(cli1, fname, + fnum2 = cli_open(&cli1, fname, denytable1[i].mode2, denytable1[i].deny2); @@ -1449,10 +1449,10 @@ BOOL torture_denytest1(int dummy) } else { char x = 1; res = A_0; - if (cli_read(cli1, fnum2, (void *)&x, 0, 1) == 1) { + if (cli_read(&cli1, fnum2, (void *)&x, 0, 1) == 1) { res += A_R; } - if (cli_write(cli1, fnum2, 0, (void *)&x, 0, 1) == 1) { + if (cli_write(&cli1, fnum2, 0, (void *)&x, 0, 1) == 1) { res += A_W; } } @@ -1472,15 +1472,15 @@ BOOL torture_denytest1(int dummy) resultstr(denytable1[i].result)); } - cli_close(cli1, fnum1); - cli_close(cli1, fnum2); + cli_close(&cli1, fnum1); + cli_close(&cli1, fnum2); } for (i=0;i<2;i++) { - cli_unlink(cli1, fnames[i]); + cli_unlink(&cli1, fnames[i]); } - if (!torture_close_connection(cli1)) { + if (!torture_close_connection(&cli1)) { correct = False; } @@ -1494,7 +1494,7 @@ BOOL torture_denytest1(int dummy) */ BOOL torture_denytest2(int dummy) { - static struct cli_state *cli1, *cli2; + static struct cli_state cli1, cli2; int fnum1, fnum2; int i; BOOL correct = True; @@ -1507,10 +1507,10 @@ BOOL torture_denytest2(int dummy) printf("starting denytest2\n"); for (i=0;i<2;i++) { - cli_unlink(cli1, fnames[i]); - fnum1 = cli_open(cli1, fnames[i], O_RDWR|O_CREAT, DENY_NONE); - cli_write(cli1, fnum1, 0, fnames[i], 0, strlen(fnames[i])); - cli_close(cli1, fnum1); + cli_unlink(&cli1, fnames[i]); + fnum1 = cli_open(&cli1, fnames[i], O_RDWR|O_CREAT, DENY_NONE); + cli_write(&cli1, fnum1, 0, fnames[i], 0, strlen(fnames[i])); + cli_close(&cli1, fnum1); } for (i=0; i\n", argv[0]); - return NT_STATUS_OK; - } - - if (!lp_load(argv[1], False, True, False)) { - printf("Error loading \"%s\"\n", argv[1]); - return NT_STATUS_OK; - } - - printf("\"%s\" successfully loaded\n", argv[1]); - return NT_STATUS_OK; -} - -/* Display help on commands */ -static NTSTATUS cmd_help(struct samtest_state *st, TALLOC_CTX *mem_ctx, - int argc, const char **argv) -{ - struct cmd_list *tmp; - struct cmd_set *tmp_set; - - /* Usage */ - if (argc > 2) { - printf("Usage: %s [command]\n", argv[0]); - return NT_STATUS_OK; - } - - /* Help on one command */ - - if (argc == 2) { - for (tmp = cmd_list; tmp; tmp = tmp->next) { - - tmp_set = tmp->cmd_set; - - while(tmp_set->name) { - if (strequal(argv[1], tmp_set->name)) { - if (tmp_set->usage && - tmp_set->usage[0]) - printf("%s\n", tmp_set->usage); - else - printf("No help for %s\n", tmp_set->name); - - return NT_STATUS_OK; - } - - tmp_set++; - } - } - - printf("No such command: %s\n", argv[1]); - return NT_STATUS_OK; - } - - /* List all commands */ - - for (tmp = cmd_list; tmp; tmp = tmp->next) { - - tmp_set = tmp->cmd_set; - - while(tmp_set->name) { - - printf("%20s\t%s\n", tmp_set->name, - tmp_set->description ? tmp_set->description: - ""); - - tmp_set++; - } - } - - return NT_STATUS_OK; -} - -/* Change the debug level */ -static NTSTATUS cmd_debuglevel(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - if (argc > 2) { - printf("Usage: %s [debuglevel]\n", argv[0]); - return NT_STATUS_OK; - } - - if (argc == 2) { - DEBUGLEVEL = atoi(argv[1]); - } - - printf("debuglevel is %d\n", DEBUGLEVEL); - - return NT_STATUS_OK; -} - -static NTSTATUS cmd_quit(struct samtest_state *st, TALLOC_CTX *mem_ctx, int argc, char **argv) -{ - /* Cleanup */ - talloc_destroy(mem_ctx); - - exit(0); - return NT_STATUS_OK; /* NOTREACHED */ -} - -static struct cmd_set samtest_commands[] = { - - { "GENERAL OPTIONS" }, - - { "help", cmd_help, "Get help on commands", "" }, - { "?", cmd_help, "Get help on commands", "" }, - { "conf", cmd_conf, "Load smb configuration file", "conf " }, - { "debuglevel", cmd_debuglevel, "Set debug level", "" }, - { "exit", cmd_quit, "Exit program", "" }, - { "quit", cmd_quit, "Exit program", "" }, - - { NULL } -}; - -static struct cmd_set separator_command[] = { - { "---------------", NULL, "----------------------" }, - { NULL } -}; - - -/*extern struct cmd_set sam_commands[];*/ -extern struct cmd_set sam_general_commands[]; -extern struct cmd_set sam_domain_commands[]; -extern struct cmd_set sam_account_commands[]; -extern struct cmd_set sam_group_commands[]; -static struct cmd_set *samtest_command_list[] = { - samtest_commands, - sam_general_commands, - sam_domain_commands, - sam_account_commands, - sam_group_commands, - NULL -}; - -static void add_command_set(struct cmd_set *cmd_set) -{ - struct cmd_list *entry; - - if (!(entry = (struct cmd_list *)malloc(sizeof(struct cmd_list)))) { - DEBUG(0, ("out of memory\n")); - return; - } - - ZERO_STRUCTP(entry); - - entry->cmd_set = cmd_set; - DLIST_ADD(cmd_list, entry); -} - -static NTSTATUS do_cmd(struct samtest_state *st, struct cmd_set *cmd_entry, char *cmd) -{ - char *p = cmd, **argv = NULL; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - TALLOC_CTX *mem_ctx = NULL; - pstring buf; - int argc = 0, i; - - /* Count number of arguments first time through the loop then - allocate memory and strdup them. */ - - again: - while(next_token(&p, buf, " ", sizeof(buf))) { - if (argv) { - argv[argc] = strdup(buf); - } - - argc++; - } - - if (!argv) { - - /* Create argument list */ - - argv = (char **)malloc(sizeof(char *) * argc); - memset(argv, 0, sizeof(char *) * argc); - - if (!argv) { - fprintf(stderr, "out of memory\n"); - result = NT_STATUS_NO_MEMORY; - goto done; - } - - p = cmd; - argc = 0; - - goto again; - } - - /* Call the function */ - - if (cmd_entry->fn) { - - if (mem_ctx == NULL) { - /* Create mem_ctx */ - if (!(mem_ctx = talloc_init("do_cmd"))) { - DEBUG(0, ("talloc_init() failed\n")); - goto done; - } - } - - /* Run command */ - result = cmd_entry->fn(st, mem_ctx, argc, argv); - - } else { - fprintf (stderr, "Invalid command\n"); - goto done; - } - - done: - - /* Cleanup */ - - if (argv) { - for (i = 0; i < argc; i++) - SAFE_FREE(argv[i]); - - SAFE_FREE(argv); - } - - return result; -} - -/* Process a command entered at the prompt or as part of -c */ -static NTSTATUS process_cmd(struct samtest_state *st, char *cmd) -{ - struct cmd_list *temp_list; - BOOL found = False; - pstring buf; - char *p = cmd; - NTSTATUS result = NT_STATUS_OK; - int len = 0; - - if (cmd[strlen(cmd) - 1] == '\n') - cmd[strlen(cmd) - 1] = '\0'; - - if (!next_token(&p, buf, " ", sizeof(buf))) { - return NT_STATUS_OK; - } - - /* strip the trainly \n if it exsists */ - len = strlen(buf); - if (buf[len-1] == '\n') - buf[len-1] = '\0'; - - /* Search for matching commands */ - - for (temp_list = cmd_list; temp_list; temp_list = temp_list->next) { - struct cmd_set *temp_set = temp_list->cmd_set; - - while(temp_set->name) { - if (strequal(buf, temp_set->name)) { - found = True; - result = do_cmd(st, temp_set, cmd); - - goto done; - } - temp_set++; - } - } - - done: - if (!found && buf[0]) { - printf("command not found: %s\n", buf); - return NT_STATUS_OK; - } - - if (!NT_STATUS_IS_OK(result)) { - printf("result was %s\n", nt_errstr(result)); - } - - return result; -} - -void exit_server(char *reason) -{ - DEBUG(3,("Server exit (%s)\n", (reason ? reason : ""))); - exit(0); -} - -static int server_fd = -1; -int last_message = -1; - -int smbd_server_fd(void) -{ - return server_fd; -} - -BOOL reload_services(BOOL test) -{ - return True; -} - -/* Main function */ - -int main(int argc, char *argv[]) -{ - BOOL interactive = True; - int opt; - static char *cmdstr = NULL; - struct cmd_set **cmd_set; - struct samtest_state st; - - /* make sure the vars that get altered (4th field) are in - a fixed location or certain compilers complain */ - poptContext pc; - struct poptOption long_options[] = { - POPT_AUTOHELP - {"command", 'e', POPT_ARG_STRING, &cmdstr, 'e', "Execute semicolon seperated cmds"}, - POPT_COMMON_SAMBA - POPT_TABLEEND - }; - - ZERO_STRUCT(st); - - st.token = get_system_token(); - - setlinebuf(stdout); - - DEBUGLEVEL = 1; - - pc = poptGetContext("samtest", argc, (const char **) argv, - long_options, 0); - - while((opt = poptGetNextOpt(pc)) != -1) { - switch (opt) { - case 'l': - slprintf(logfile, sizeof(logfile) - 1, "%s.client", - opt_logfile); - lp_set_logfile(logfile); - interactive = False; - break; - } - } - - if (!lp_load(config_file,True,False,False)) { - fprintf(stderr, "Can't load %s - run testparm to debug it\n", config_file); - exit(1); - } - - poptFreeContext(pc); - - /* the following functions are part of the Samba debugging - facilities. See lib/debug.c */ - setup_logging("samtest", interactive); - if (!interactive) - reopen_logs(); - - /* Load command lists */ - - cmd_set = samtest_command_list; - - while(*cmd_set) { - add_command_set(*cmd_set); - add_command_set(separator_command); - cmd_set++; - } - - /* Do anything specified with -c */ - if (cmdstr && cmdstr[0]) { - char *cmd; - char *p = cmdstr; - - while((cmd=next_command(&p)) != NULL) { - process_cmd(&st, cmd); - } - - return 0; - } - - /* Loop around accepting commands */ - - while(1) { - pstring prompt; - char *line; - - slprintf(prompt, sizeof(prompt) - 1, "samtest $> "); - - line = smb_readline(prompt, NULL, NULL); - - if (line == NULL) - break; - - if (line[0] != '\n') - process_cmd(&st, line); - } - - return 0; -} diff --git a/source3/torture/t_strcmp.c b/source3/torture/t_strcmp.c deleted file mode 100644 index 1d26ad22dec..00000000000 --- a/source3/torture/t_strcmp.c +++ /dev/null @@ -1,26 +0,0 @@ -/* - * Copyright (C) 2003 by Martin Pool - * - * Test harness for StrCaseCmp - */ - -#include "includes.h" - -int main(int argc, char *argv[]) -{ - int i, ret; - - if (argc != 3) { - fprintf(stderr, "usage: %s STRING1 STRING2\n" - "Compares two strings, prints the results of StrCaseCmp\n", - argv[0]); - return 2; - } - - for (i = 0; i < 10000; i++) - ret = StrCaseCmp(argv[1], argv[2]); - - printf("%d\n", ret); - - return 0; -} diff --git a/source3/torture/torture.c b/source3/torture/torture.c index 5935c8c06e4..a4dfac84900 100644 --- a/source3/torture/torture.c +++ b/source3/torture/torture.c @@ -29,7 +29,7 @@ static int nprocs=1; static int port_to_use=0; int torture_numops=100; static int procnum; /* records process count number when forking */ -static struct cli_state *current_cli; +static struct cli_state current_cli; static fstring randomfname; static BOOL use_oplocks; static BOOL use_level_II_oplocks; @@ -105,14 +105,7 @@ static BOOL open_nbt_connection(struct cli_state *c) zero_ip(&ip); - if (!cli_initialise(c)) { - printf("Failed initialize cli_struct to connect with %s\n", host); - return False; - } - - c->port = port_to_use; - - if (!cli_connect(c, host, &ip)) { + if (!cli_initialise(c) || !cli_connect(c, host, &ip)) { printf("Failed to connect with %s\n", host); return False; } @@ -124,49 +117,43 @@ static BOOL open_nbt_connection(struct cli_state *c) if (use_level_II_oplocks) c->use_level_II_oplocks = True; if (!cli_session_request(c, &calling, &called)) { - /* - * Well, that failed, try *SMBSERVER ... - * However, we must reconnect as well ... - */ - if (!cli_connect(c, host, &ip)) { - printf("Failed to connect with %s\n", host); - return False; - } - - make_nmb_name(&called, "*SMBSERVER", 0x20); - if (!cli_session_request(c, &calling, &called)) { - printf("%s rejected the session\n",host); - printf("We tried with a called name of %s & %s\n", - host, "*SMBSERVER"); - cli_shutdown(c); - return False; - } + printf("%s rejected the session\n",host); + cli_shutdown(c); + return False; } return True; } -BOOL torture_open_connection(struct cli_state **c) +BOOL torture_open_connection(struct cli_state *c) { - BOOL retry; - int flags = 0; - NTSTATUS status; + ZERO_STRUCTP(c); - if (use_kerberos) - flags |= CLI_FULL_CONNECTION_USE_KERBEROS; - - status = cli_full_connection(c, myname, - host, NULL, port_to_use, - share, "?????", - username, workgroup, - password, flags, &retry); - if (!NT_STATUS_IS_OK(status)) { + if (!open_nbt_connection(c)) { + return False; + } + + if (!cli_negprot(c)) { + printf("%s rejected the negprot (%s)\n",host, cli_errstr(c)); + cli_shutdown(c); + return False; + } + + if (!cli_session_setup(c, username, + password, strlen(password), + password, strlen(password), + workgroup)) { + printf("%s rejected the sessionsetup (%s)\n", host, cli_errstr(c)); + cli_shutdown(c); return False; } - if (use_oplocks) (*c)->use_oplocks = True; - if (use_level_II_oplocks) (*c)->use_level_II_oplocks = True; - (*c)->timeout = 120000; /* set a really long timeout (2 minutes) */ + if (!cli_send_tconX(c, share, "?????", + password, strlen(password)+1)) { + printf("%s refused tree connect (%s)\n", host, cli_errstr(c)); + cli_shutdown(c); + return False; + } return True; } @@ -324,16 +311,16 @@ static BOOL rw_torture(struct cli_state *c) static BOOL run_torture(int dummy) { - struct cli_state *cli; + struct cli_state cli; BOOL ret; cli = current_cli; - cli_sockopt(cli, sockops); + cli_sockopt(&cli, sockops); - ret = rw_torture(cli); + ret = rw_torture(&cli); - if (!torture_close_connection(cli)) { + if (!torture_close_connection(&cli)) { ret = False; } @@ -343,7 +330,7 @@ static BOOL run_torture(int dummy) static BOOL rw_torture3(struct cli_state *c, char *lockfname) { int fnum = -1; - unsigned int i = 0; + int i = 0; char buf[131072]; char buf_rd[131072]; unsigned count; @@ -517,28 +504,28 @@ static BOOL rw_torture2(struct cli_state *c1, struct cli_state *c2) static BOOL run_readwritetest(int dummy) { - static struct cli_state *cli1, *cli2; + static struct cli_state cli1, cli2; BOOL test1, test2; if (!torture_open_connection(&cli1) || !torture_open_connection(&cli2)) { return False; } - cli_sockopt(cli1, sockops); - cli_sockopt(cli2, sockops); + cli_sockopt(&cli1, sockops); + cli_sockopt(&cli2, sockops); printf("starting readwritetest\n"); - test1 = rw_torture2(cli1, cli2); + test1 = rw_torture2(&cli1, &cli2); printf("Passed readwritetest v1: %s\n", BOOLSTR(test1)); - test2 = rw_torture2(cli1, cli1); + test2 = rw_torture2(&cli1, &cli1); printf("Passed readwritetest v2: %s\n", BOOLSTR(test2)); - if (!torture_close_connection(cli1)) { + if (!torture_close_connection(&cli1)) { test1 = False; } - if (!torture_close_connection(cli2)) { + if (!torture_close_connection(&cli2)) { test2 = False; } @@ -547,7 +534,7 @@ static BOOL run_readwritetest(int dummy) static BOOL run_readwritemulti(int dummy) { - struct cli_state *cli; + static struct cli_state cli; BOOL test; cli = current_cli; @@ -566,7 +553,7 @@ static BOOL run_readwritemulti(int dummy) static BOOL run_readwritelarge(int dummy) { - static struct cli_state *cli1; + static struct cli_state cli1; int fnum1; const char *lockfname = "\\large.dat"; size_t fsize; @@ -576,25 +563,25 @@ static BOOL run_readwritelarge(int dummy) if (!torture_open_connection(&cli1)) { return False; } - cli_sockopt(cli1, sockops); + cli_sockopt(&cli1, sockops); memset(buf,'\0',sizeof(buf)); - cli1->max_xmit = 128*1024; + cli1.max_xmit = 128*1024; printf("starting readwritelarge\n"); - cli_unlink(cli1, lockfname); + cli_unlink(&cli1, lockfname); - fnum1 = cli_open(cli1, lockfname, O_RDWR | O_CREAT | O_EXCL, DENY_NONE); + fnum1 = cli_open(&cli1, lockfname, O_RDWR | O_CREAT | O_EXCL, DENY_NONE); if (fnum1 == -1) { - printf("open read/write of %s failed (%s)\n", lockfname, cli_errstr(cli1)); + printf("open read/write of %s failed (%s)\n", lockfname, cli_errstr(&cli1)); return False; } - cli_write(cli1, fnum1, 0, buf, 0, sizeof(buf)); + cli_write(&cli1, fnum1, 0, buf, 0, sizeof(buf)); - if (!cli_qfileinfo(cli1, fnum1, NULL, &fsize, NULL, NULL, NULL, NULL, NULL)) { - printf("qfileinfo failed (%s)\n", cli_errstr(cli1)); + if (!cli_qfileinfo(&cli1, fnum1, NULL, &fsize, NULL, NULL, NULL, NULL, NULL)) { + printf("qfileinfo failed (%s)\n", cli_errstr(&cli1)); correct = False; } @@ -605,28 +592,28 @@ static BOOL run_readwritelarge(int dummy) correct = False; } - if (!cli_close(cli1, fnum1)) { - printf("close failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("close failed (%s)\n", cli_errstr(&cli1)); correct = False; } - if (!cli_unlink(cli1, lockfname)) { - printf("unlink failed (%s)\n", cli_errstr(cli1)); + if (!cli_unlink(&cli1, lockfname)) { + printf("unlink failed (%s)\n", cli_errstr(&cli1)); correct = False; } - fnum1 = cli_open(cli1, lockfname, O_RDWR | O_CREAT | O_EXCL, DENY_NONE); + fnum1 = cli_open(&cli1, lockfname, O_RDWR | O_CREAT | O_EXCL, DENY_NONE); if (fnum1 == -1) { - printf("open read/write of %s failed (%s)\n", lockfname, cli_errstr(cli1)); + printf("open read/write of %s failed (%s)\n", lockfname, cli_errstr(&cli1)); return False; } - cli1->max_xmit = 4*1024; + cli1.max_xmit = 4*1024; - cli_smbwrite(cli1, fnum1, buf, 0, sizeof(buf)); + cli_smbwrite(&cli1, fnum1, buf, 0, sizeof(buf)); - if (!cli_qfileinfo(cli1, fnum1, NULL, &fsize, NULL, NULL, NULL, NULL, NULL)) { - printf("qfileinfo failed (%s)\n", cli_errstr(cli1)); + if (!cli_qfileinfo(&cli1, fnum1, NULL, &fsize, NULL, NULL, NULL, NULL, NULL)) { + printf("qfileinfo failed (%s)\n", cli_errstr(&cli1)); correct = False; } @@ -639,28 +626,28 @@ static BOOL run_readwritelarge(int dummy) #if 0 /* ToDo - set allocation. JRA */ - if(!cli_set_allocation_size(cli1, fnum1, 0)) { + if(!cli_set_allocation_size(&cli1, fnum1, 0)) { printf("set allocation size to zero failed (%s)\n", cli_errstr(&cli1)); return False; } - if (!cli_qfileinfo(cli1, fnum1, NULL, &fsize, NULL, NULL, NULL, NULL, NULL)) { - printf("qfileinfo failed (%s)\n", cli_errstr(cli1)); + if (!cli_qfileinfo(&cli1, fnum1, NULL, &fsize, NULL, NULL, NULL, NULL, NULL)) { + printf("qfileinfo failed (%s)\n", cli_errstr(&cli1)); correct = False; } if (fsize != 0) printf("readwritelarge test 3 (truncate test) succeeded (size = %x)\n", fsize); #endif - if (!cli_close(cli1, fnum1)) { - printf("close failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("close failed (%s)\n", cli_errstr(&cli1)); correct = False; } - if (!torture_close_connection(cli1)) { + if (!torture_close_connection(&cli1)) { correct = False; } return correct; -} + } int line_count = 0; int nbio_id; @@ -670,7 +657,7 @@ int nbio_id; /* run a test that simulates an approximate netbench client load */ static BOOL run_netbench(int client) { - struct cli_state *cli; + struct cli_state cli; int i; fstring fname; pstring line; @@ -683,9 +670,9 @@ static BOOL run_netbench(int client) nbio_id = client; - cli_sockopt(cli, sockops); + cli_sockopt(&cli, sockops); - nb_setup(cli); + nb_setup(&cli); slprintf(cname,sizeof(fname), "client%d", client); @@ -757,7 +744,7 @@ static BOOL run_netbench(int client) nb_cleanup(); - if (!torture_close_connection(cli)) { + if (!torture_close_connection(&cli)) { correct = False; } @@ -795,7 +782,7 @@ static BOOL run_nbench(int dummy) */ static BOOL run_locktest1(int dummy) { - struct cli_state *cli1, *cli2; + static struct cli_state cli1, cli2; const char *fname = "\\lockt1.lck"; int fnum1, fnum2, fnum3; time_t t1, t2; @@ -804,40 +791,40 @@ static BOOL run_locktest1(int dummy) if (!torture_open_connection(&cli1) || !torture_open_connection(&cli2)) { return False; } - cli_sockopt(cli1, sockops); - cli_sockopt(cli2, sockops); + cli_sockopt(&cli1, sockops); + cli_sockopt(&cli2, sockops); printf("starting locktest1\n"); - cli_unlink(cli1, fname); + cli_unlink(&cli1, fname); - fnum1 = cli_open(cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); + fnum1 = cli_open(&cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); if (fnum1 == -1) { - printf("open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("open of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - fnum2 = cli_open(cli1, fname, O_RDWR, DENY_NONE); + fnum2 = cli_open(&cli1, fname, O_RDWR, DENY_NONE); if (fnum2 == -1) { - printf("open2 of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("open2 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - fnum3 = cli_open(cli2, fname, O_RDWR, DENY_NONE); + fnum3 = cli_open(&cli2, fname, O_RDWR, DENY_NONE); if (fnum3 == -1) { - printf("open3 of %s failed (%s)\n", fname, cli_errstr(cli2)); + printf("open3 of %s failed (%s)\n", fname, cli_errstr(&cli2)); return False; } - if (!cli_lock(cli1, fnum1, 0, 4, 0, WRITE_LOCK)) { - printf("lock1 failed (%s)\n", cli_errstr(cli1)); + if (!cli_lock(&cli1, fnum1, 0, 4, 0, WRITE_LOCK)) { + printf("lock1 failed (%s)\n", cli_errstr(&cli1)); return False; } - if (cli_lock(cli2, fnum3, 0, 4, 0, WRITE_LOCK)) { + if (cli_lock(&cli2, fnum3, 0, 4, 0, WRITE_LOCK)) { printf("lock2 succeeded! This is a locking bug\n"); return False; } else { - if (!check_error(__LINE__, cli2, ERRDOS, ERRlock, + if (!check_error(__LINE__, &cli2, ERRDOS, ERRlock, NT_STATUS_LOCK_NOT_GRANTED)) return False; } @@ -845,11 +832,11 @@ static BOOL run_locktest1(int dummy) lock_timeout = (1 + (random() % 20)); printf("Testing lock timeout with timeout=%u\n", lock_timeout); t1 = time(NULL); - if (cli_lock(cli2, fnum3, 0, 4, lock_timeout * 1000, WRITE_LOCK)) { + if (cli_lock(&cli2, fnum3, 0, 4, lock_timeout * 1000, WRITE_LOCK)) { printf("lock3 succeeded! This is a locking bug\n"); return False; } else { - if (!check_error(__LINE__, cli2, ERRDOS, ERRlock, + if (!check_error(__LINE__, &cli2, ERRDOS, ERRlock, NT_STATUS_FILE_LOCK_CONFLICT)) return False; } t2 = time(NULL); @@ -860,40 +847,40 @@ static BOOL run_locktest1(int dummy) printf("server slept for %u seconds for a %u second timeout\n", (unsigned int)(t2-t1), lock_timeout); - if (!cli_close(cli1, fnum2)) { - printf("close1 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum2)) { + printf("close1 failed (%s)\n", cli_errstr(&cli1)); return False; } - if (cli_lock(cli2, fnum3, 0, 4, 0, WRITE_LOCK)) { + if (cli_lock(&cli2, fnum3, 0, 4, 0, WRITE_LOCK)) { printf("lock4 succeeded! This is a locking bug\n"); return False; } else { - if (!check_error(__LINE__, cli2, ERRDOS, ERRlock, + if (!check_error(__LINE__, &cli2, ERRDOS, ERRlock, NT_STATUS_FILE_LOCK_CONFLICT)) return False; } - if (!cli_close(cli1, fnum1)) { - printf("close2 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("close2 failed (%s)\n", cli_errstr(&cli1)); return False; } - if (!cli_close(cli2, fnum3)) { - printf("close3 failed (%s)\n", cli_errstr(cli2)); + if (!cli_close(&cli2, fnum3)) { + printf("close3 failed (%s)\n", cli_errstr(&cli2)); return False; } - if (!cli_unlink(cli1, fname)) { - printf("unlink failed (%s)\n", cli_errstr(cli1)); + if (!cli_unlink(&cli1, fname)) { + printf("unlink failed (%s)\n", cli_errstr(&cli1)); return False; } - if (!torture_close_connection(cli1)) { + if (!torture_close_connection(&cli1)) { return False; } - if (!torture_close_connection(cli2)) { + if (!torture_close_connection(&cli2)) { return False; } @@ -902,144 +889,76 @@ static BOOL run_locktest1(int dummy) } /* - this checks to see if a secondary tconx can use open files from an - earlier tconx + checks for correct tconX support */ static BOOL run_tcon_test(int dummy) { - static struct cli_state *cli; + static struct cli_state cli1; const char *fname = "\\tcontest.tmp"; int fnum1; - uint16 cnum1, cnum2, cnum3; - uint16 vuid1, vuid2; + uint16 cnum; char buf[4]; - BOOL ret = True; - if (!torture_open_connection(&cli)) { + if (!torture_open_connection(&cli1)) { return False; } - cli_sockopt(cli, sockops); + cli_sockopt(&cli1, sockops); printf("starting tcontest\n"); - cli_unlink(cli, fname); + cli_unlink(&cli1, fname); - fnum1 = cli_open(cli, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); - if (fnum1 == -1) { - printf("open of %s failed (%s)\n", fname, cli_errstr(cli)); + fnum1 = cli_open(&cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); + if (fnum1 == -1) + { + printf("open of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - cnum1 = cli->cnum; - vuid1 = cli->vuid; + cnum = cli1.cnum; - if (cli_write(cli, fnum1, 0, buf, 130, 4) != 4) { - printf("initial write failed (%s)", cli_errstr(cli)); + if (cli_write(&cli1, fnum1, 0, buf, 130, 4) != 4) + { + printf("write failed (%s)", cli_errstr(&cli1)); return False; } - if (!cli_send_tconX(cli, share, "?????", + if (!cli_send_tconX(&cli1, share, "?????", password, strlen(password)+1)) { printf("%s refused 2nd tree connect (%s)\n", host, - cli_errstr(cli)); - cli_shutdown(cli); + cli_errstr(&cli1)); + cli_shutdown(&cli1); return False; } - cnum2 = cli->cnum; - cnum3 = MAX(cnum1, cnum2) + 1; /* any invalid number */ - vuid2 = cli->vuid + 1; - - /* try a write with the wrong tid */ - cli->cnum = cnum2; - - if (cli_write(cli, fnum1, 0, buf, 130, 4) == 4) { - printf("* server allows write with wrong TID\n"); - ret = False; - } else { - printf("server fails write with wrong TID : %s\n", cli_errstr(cli)); - } - - - /* try a write with an invalid tid */ - cli->cnum = cnum3; - - if (cli_write(cli, fnum1, 0, buf, 130, 4) == 4) { - printf("* server allows write with invalid TID\n"); - ret = False; - } else { - printf("server fails write with invalid TID : %s\n", cli_errstr(cli)); - } - - /* try a write with an invalid vuid */ - cli->vuid = vuid2; - cli->cnum = cnum1; - - if (cli_write(cli, fnum1, 0, buf, 130, 4) == 4) { - printf("* server allows write with invalid VUID\n"); - ret = False; - } else { - printf("server fails write with invalid VUID : %s\n", cli_errstr(cli)); - } - - cli->cnum = cnum1; - cli->vuid = vuid1; - - if (!cli_close(cli, fnum1)) { - printf("close failed (%s)\n", cli_errstr(cli)); + if (cli_write(&cli1, fnum1, 0, buf, 130, 4) == 4) + { + printf("write succeeded (%s)", cli_errstr(&cli1)); return False; } - cli->cnum = cnum2; - - if (!cli_tdis(cli)) { - printf("secondary tdis failed (%s)\n", cli_errstr(cli)); + if (cli_close(&cli1, fnum1)) { + printf("close2 succeeded (%s)\n", cli_errstr(&cli1)); return False; } - cli->cnum = cnum1; - - if (!torture_close_connection(cli)) { + if (!cli_tdis(&cli1)) { + printf("tdis failed (%s)\n", cli_errstr(&cli1)); return False; } - return ret; -} - - -/* - checks for old style tcon support - */ -static BOOL run_tcon2_test(int dummy) -{ - static struct cli_state *cli; - uint16 cnum, max_xmit; - char *service; - NTSTATUS status; + cli1.cnum = cnum; - if (!torture_open_connection(&cli)) { + if (!cli_close(&cli1, fnum1)) { + printf("close2 failed (%s)\n", cli_errstr(&cli1)); return False; } - cli_sockopt(cli, sockops); - - printf("starting tcon2 test\n"); - - asprintf(&service, "\\\\%s\\%s", host, share); - - status = cli_raw_tcon(cli, service, password, "?????", &max_xmit, &cnum); - - if (!NT_STATUS_IS_OK(status)) { - printf("tcon2 failed : %s\n", cli_errstr(cli)); - } else { - printf("tcon OK : max_xmit=%d cnum=%d tid=%d\n", - (int)max_xmit, (int)cnum, SVAL(cli->inbuf, smb_tid)); - } - if (!torture_close_connection(cli)) { + if (!torture_close_connection(&cli1)) { return False; } - printf("Passed tcon2 test\n"); + printf("Passed tcontest\n"); return True; } @@ -1156,7 +1075,7 @@ static BOOL run_tcon_devtype_test(int dummy) */ static BOOL run_locktest2(int dummy) { - static struct cli_state *cli; + static struct cli_state cli; const char *fname = "\\lockt2.lck"; int fnum1, fnum2, fnum3; BOOL correct = True; @@ -1165,117 +1084,117 @@ static BOOL run_locktest2(int dummy) return False; } - cli_sockopt(cli, sockops); + cli_sockopt(&cli, sockops); printf("starting locktest2\n"); - cli_unlink(cli, fname); + cli_unlink(&cli, fname); - cli_setpid(cli, 1); + cli_setpid(&cli, 1); - fnum1 = cli_open(cli, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); + fnum1 = cli_open(&cli, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); if (fnum1 == -1) { - printf("open of %s failed (%s)\n", fname, cli_errstr(cli)); + printf("open of %s failed (%s)\n", fname, cli_errstr(&cli)); return False; } - fnum2 = cli_open(cli, fname, O_RDWR, DENY_NONE); + fnum2 = cli_open(&cli, fname, O_RDWR, DENY_NONE); if (fnum2 == -1) { - printf("open2 of %s failed (%s)\n", fname, cli_errstr(cli)); + printf("open2 of %s failed (%s)\n", fname, cli_errstr(&cli)); return False; } - cli_setpid(cli, 2); + cli_setpid(&cli, 2); - fnum3 = cli_open(cli, fname, O_RDWR, DENY_NONE); + fnum3 = cli_open(&cli, fname, O_RDWR, DENY_NONE); if (fnum3 == -1) { - printf("open3 of %s failed (%s)\n", fname, cli_errstr(cli)); + printf("open3 of %s failed (%s)\n", fname, cli_errstr(&cli)); return False; } - cli_setpid(cli, 1); + cli_setpid(&cli, 1); - if (!cli_lock(cli, fnum1, 0, 4, 0, WRITE_LOCK)) { - printf("lock1 failed (%s)\n", cli_errstr(cli)); + if (!cli_lock(&cli, fnum1, 0, 4, 0, WRITE_LOCK)) { + printf("lock1 failed (%s)\n", cli_errstr(&cli)); return False; } - if (cli_lock(cli, fnum1, 0, 4, 0, WRITE_LOCK)) { + if (cli_lock(&cli, fnum1, 0, 4, 0, WRITE_LOCK)) { printf("WRITE lock1 succeeded! This is a locking bug\n"); correct = False; } else { - if (!check_error(__LINE__, cli, ERRDOS, ERRlock, + if (!check_error(__LINE__, &cli, ERRDOS, ERRlock, NT_STATUS_LOCK_NOT_GRANTED)) return False; } - if (cli_lock(cli, fnum2, 0, 4, 0, WRITE_LOCK)) { + if (cli_lock(&cli, fnum2, 0, 4, 0, WRITE_LOCK)) { printf("WRITE lock2 succeeded! This is a locking bug\n"); correct = False; } else { - if (!check_error(__LINE__, cli, ERRDOS, ERRlock, + if (!check_error(__LINE__, &cli, ERRDOS, ERRlock, NT_STATUS_LOCK_NOT_GRANTED)) return False; } - if (cli_lock(cli, fnum2, 0, 4, 0, READ_LOCK)) { + if (cli_lock(&cli, fnum2, 0, 4, 0, READ_LOCK)) { printf("READ lock2 succeeded! This is a locking bug\n"); correct = False; } else { - if (!check_error(__LINE__, cli, ERRDOS, ERRlock, + if (!check_error(__LINE__, &cli, ERRDOS, ERRlock, NT_STATUS_FILE_LOCK_CONFLICT)) return False; } - if (!cli_lock(cli, fnum1, 100, 4, 0, WRITE_LOCK)) { - printf("lock at 100 failed (%s)\n", cli_errstr(cli)); + if (!cli_lock(&cli, fnum1, 100, 4, 0, WRITE_LOCK)) { + printf("lock at 100 failed (%s)\n", cli_errstr(&cli)); } - cli_setpid(cli, 2); - if (cli_unlock(cli, fnum1, 100, 4)) { + cli_setpid(&cli, 2); + if (cli_unlock(&cli, fnum1, 100, 4)) { printf("unlock at 100 succeeded! This is a locking bug\n"); correct = False; } - if (cli_unlock(cli, fnum1, 0, 4)) { + if (cli_unlock(&cli, fnum1, 0, 4)) { printf("unlock1 succeeded! This is a locking bug\n"); correct = False; } else { - if (!check_error(__LINE__, cli, + if (!check_error(__LINE__, &cli, ERRDOS, ERRlock, NT_STATUS_RANGE_NOT_LOCKED)) return False; } - if (cli_unlock(cli, fnum1, 0, 8)) { + if (cli_unlock(&cli, fnum1, 0, 8)) { printf("unlock2 succeeded! This is a locking bug\n"); correct = False; } else { - if (!check_error(__LINE__, cli, + if (!check_error(__LINE__, &cli, ERRDOS, ERRlock, NT_STATUS_RANGE_NOT_LOCKED)) return False; } - if (cli_lock(cli, fnum3, 0, 4, 0, WRITE_LOCK)) { + if (cli_lock(&cli, fnum3, 0, 4, 0, WRITE_LOCK)) { printf("lock3 succeeded! This is a locking bug\n"); correct = False; } else { - if (!check_error(__LINE__, cli, ERRDOS, ERRlock, NT_STATUS_LOCK_NOT_GRANTED)) return False; + if (!check_error(__LINE__, &cli, ERRDOS, ERRlock, NT_STATUS_LOCK_NOT_GRANTED)) return False; } - cli_setpid(cli, 1); + cli_setpid(&cli, 1); - if (!cli_close(cli, fnum1)) { - printf("close1 failed (%s)\n", cli_errstr(cli)); + if (!cli_close(&cli, fnum1)) { + printf("close1 failed (%s)\n", cli_errstr(&cli)); return False; } - if (!cli_close(cli, fnum2)) { - printf("close2 failed (%s)\n", cli_errstr(cli)); + if (!cli_close(&cli, fnum2)) { + printf("close2 failed (%s)\n", cli_errstr(&cli)); return False; } - if (!cli_close(cli, fnum3)) { - printf("close3 failed (%s)\n", cli_errstr(cli)); + if (!cli_close(&cli, fnum3)) { + printf("close3 failed (%s)\n", cli_errstr(&cli)); return False; } - if (!torture_close_connection(cli)) { + if (!torture_close_connection(&cli)) { correct = False; } @@ -1292,7 +1211,7 @@ static BOOL run_locktest2(int dummy) */ static BOOL run_locktest3(int dummy) { - static struct cli_state *cli1, *cli2; + static struct cli_state cli1, cli2; const char *fname = "\\lockt3.lck"; int fnum1, fnum2, i; uint32 offset; @@ -1303,37 +1222,37 @@ static BOOL run_locktest3(int dummy) if (!torture_open_connection(&cli1) || !torture_open_connection(&cli2)) { return False; } - cli_sockopt(cli1, sockops); - cli_sockopt(cli2, sockops); + cli_sockopt(&cli1, sockops); + cli_sockopt(&cli2, sockops); printf("starting locktest3\n"); - cli_unlink(cli1, fname); + cli_unlink(&cli1, fname); - fnum1 = cli_open(cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); + fnum1 = cli_open(&cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); if (fnum1 == -1) { - printf("open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("open of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - fnum2 = cli_open(cli2, fname, O_RDWR, DENY_NONE); + fnum2 = cli_open(&cli2, fname, O_RDWR, DENY_NONE); if (fnum2 == -1) { - printf("open2 of %s failed (%s)\n", fname, cli_errstr(cli2)); + printf("open2 of %s failed (%s)\n", fname, cli_errstr(&cli2)); return False; } for (offset=i=0;ivuid = cli1->vuid; - cli2->cnum = cli1->cnum; - cli2->pid = cli1->pid; + cli3 = cli2; + cli3.vuid = cli1.vuid; + cli3.cnum = cli1.cnum; + cli3.pid = cli1.pid; - if (cli_read(cli2, fnum1, buf, 0, 13) == 13) { + if (cli_read(&cli3, fnum1, buf, 0, 13) == 13) { printf("read succeeded! nasty security hole [%s]\n", buf); return False; } - cli_close(cli1, fnum1); - cli_unlink(cli1, fname); + cli_close(&cli1, fnum1); + cli_unlink(&cli1, fname); - torture_close_connection(cli1); - torture_close_connection(cli2); + torture_close_connection(&cli1); + torture_close_connection(&cli2); printf("finished fdpasstest\n"); return True; @@ -1943,7 +1730,7 @@ static BOOL run_fdpasstest(int dummy) */ static BOOL run_unlinktest(int dummy) { - struct cli_state *cli; + static struct cli_state cli; const char *fname = "\\unlink.tst"; int fnum; BOOL correct = True; @@ -1952,32 +1739,32 @@ static BOOL run_unlinktest(int dummy) return False; } - cli_sockopt(cli, sockops); + cli_sockopt(&cli, sockops); printf("starting unlink test\n"); - cli_unlink(cli, fname); + cli_unlink(&cli, fname); - cli_setpid(cli, 1); + cli_setpid(&cli, 1); - fnum = cli_open(cli, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); + fnum = cli_open(&cli, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); if (fnum == -1) { - printf("open of %s failed (%s)\n", fname, cli_errstr(cli)); + printf("open of %s failed (%s)\n", fname, cli_errstr(&cli)); return False; } - if (cli_unlink(cli, fname)) { + if (cli_unlink(&cli, fname)) { printf("error: server allowed unlink on an open file\n"); correct = False; } else { - correct = check_error(__LINE__, cli, ERRDOS, ERRbadshare, + correct = check_error(__LINE__, &cli, ERRDOS, ERRbadshare, NT_STATUS_SHARING_VIOLATION); } - cli_close(cli, fnum); - cli_unlink(cli, fname); + cli_close(&cli, fnum); + cli_unlink(&cli, fname); - if (!torture_close_connection(cli)) { + if (!torture_close_connection(&cli)) { correct = False; } @@ -1992,7 +1779,7 @@ test how many open files this server supports on the one socket */ static BOOL run_maxfidtest(int dummy) { - struct cli_state *cli; + static struct cli_state cli; const char *template = "\\maxfid.%d.%d"; fstring fname; int fnums[0x11000], i; @@ -2006,15 +1793,15 @@ static BOOL run_maxfidtest(int dummy) return False; } - cli_sockopt(cli, sockops); + cli_sockopt(&cli, sockops); for (i=0; i<0x11000; i++) { slprintf(fname,sizeof(fname)-1,template, i,(int)getpid()); - if ((fnums[i] = cli_open(cli, fname, + if ((fnums[i] = cli_open(&cli, fname, O_RDWR|O_CREAT|O_TRUNC, DENY_NONE)) == -1) { printf("open of %s failed (%s)\n", - fname, cli_errstr(cli)); + fname, cli_errstr(&cli)); printf("maximum fnum is %d\n", i); break; } @@ -2026,10 +1813,10 @@ static BOOL run_maxfidtest(int dummy) printf("cleaning up\n"); for (;i>=0;i--) { slprintf(fname,sizeof(fname)-1,template, i,(int)getpid()); - cli_close(cli, fnums[i]); - if (!cli_unlink(cli, fname)) { + cli_close(&cli, fnums[i]); + if (!cli_unlink(&cli, fname)) { printf("unlink of %s failed (%s)\n", - fname, cli_errstr(cli)); + fname, cli_errstr(&cli)); correct = False; } printf("%6d\r", i); @@ -2037,7 +1824,7 @@ static BOOL run_maxfidtest(int dummy) printf("%6d\n", 0); printf("maxfid test finished\n"); - if (!torture_close_connection(cli)) { + if (!torture_close_connection(&cli)) { correct = False; } return correct; @@ -2087,7 +1874,7 @@ static BOOL run_randomipc(int dummy) int rdrcnt,rprcnt; pstring param; int api, param_len, i; - struct cli_state *cli; + static struct cli_state cli; BOOL correct = True; int count = 50000; @@ -2105,7 +1892,7 @@ static BOOL run_randomipc(int dummy) SSVAL(param,0,api); - cli_api(cli, + cli_api(&cli, param, param_len, 8, NULL, 0, BUFFER_SIZE, &rparam, &rprcnt, @@ -2116,7 +1903,7 @@ static BOOL run_randomipc(int dummy) } printf("%d/%d\n", i, count); - if (!torture_close_connection(cli)) { + if (!torture_close_connection(&cli)) { correct = False; } @@ -2141,7 +1928,7 @@ static void browse_callback(const char *sname, uint32 stype, */ static BOOL run_browsetest(int dummy) { - static struct cli_state *cli; + static struct cli_state cli; BOOL correct = True; printf("starting browse test\n"); @@ -2151,16 +1938,16 @@ static BOOL run_browsetest(int dummy) } printf("domain list:\n"); - cli_NetServerEnum(cli, cli->server_domain, + cli_NetServerEnum(&cli, cli.server_domain, SV_TYPE_DOMAIN_ENUM, browse_callback, NULL); printf("machine list:\n"); - cli_NetServerEnum(cli, cli->server_domain, + cli_NetServerEnum(&cli, cli.server_domain, SV_TYPE_ALL, browse_callback, NULL); - if (!torture_close_connection(cli)) { + if (!torture_close_connection(&cli)) { correct = False; } @@ -2176,10 +1963,10 @@ static BOOL run_browsetest(int dummy) */ static BOOL run_attrtest(int dummy) { - struct cli_state *cli; + static struct cli_state cli; int fnum; time_t t, t2; - const char *fname = "\\attrib123456789.tst"; + const char *fname = "\\attrib.tst"; BOOL correct = True; printf("starting attrib test\n"); @@ -2188,12 +1975,12 @@ static BOOL run_attrtest(int dummy) return False; } - cli_unlink(cli, fname); - fnum = cli_open(cli, fname, + cli_unlink(&cli, fname); + fnum = cli_open(&cli, fname, O_RDWR | O_CREAT | O_TRUNC, DENY_NONE); - cli_close(cli, fnum); - if (!cli_getatr(cli, fname, NULL, NULL, &t)) { - printf("getatr failed (%s)\n", cli_errstr(cli)); + cli_close(&cli, fnum); + if (!cli_getatr(&cli, fname, NULL, NULL, &t)) { + printf("getatr failed (%s)\n", cli_errstr(&cli)); correct = False; } @@ -2206,13 +1993,13 @@ static BOOL run_attrtest(int dummy) t2 = t-60*60*24; /* 1 day ago */ - if (!cli_setatr(cli, fname, 0, t2)) { - printf("setatr failed (%s)\n", cli_errstr(cli)); + if (!cli_setatr(&cli, fname, 0, t2)) { + printf("setatr failed (%s)\n", cli_errstr(&cli)); correct = True; } - if (!cli_getatr(cli, fname, NULL, NULL, &t)) { - printf("getatr failed (%s)\n", cli_errstr(cli)); + if (!cli_getatr(&cli, fname, NULL, NULL, &t)) { + printf("getatr failed (%s)\n", cli_errstr(&cli)); correct = True; } @@ -2223,9 +2010,9 @@ static BOOL run_attrtest(int dummy) correct = True; } - cli_unlink(cli, fname); + cli_unlink(&cli, fname); - if (!torture_close_connection(cli)) { + if (!torture_close_connection(&cli)) { correct = False; } @@ -2240,7 +2027,7 @@ static BOOL run_attrtest(int dummy) */ static BOOL run_trans2test(int dummy) { - struct cli_state *cli; + static struct cli_state cli; int fnum; size_t size; time_t c_time, a_time, m_time, w_time, m_time2; @@ -2256,17 +2043,17 @@ static BOOL run_trans2test(int dummy) return False; } - cli_unlink(cli, fname); - fnum = cli_open(cli, fname, + cli_unlink(&cli, fname); + fnum = cli_open(&cli, fname, O_RDWR | O_CREAT | O_TRUNC, DENY_NONE); - if (!cli_qfileinfo(cli, fnum, NULL, &size, &c_time, &a_time, &m_time, + if (!cli_qfileinfo(&cli, fnum, NULL, &size, &c_time, &a_time, &m_time, NULL, NULL)) { - printf("ERROR: qfileinfo failed (%s)\n", cli_errstr(cli)); + printf("ERROR: qfileinfo failed (%s)\n", cli_errstr(&cli)); correct = False; } - if (!cli_qfilename(cli, fnum, pname)) { - printf("ERROR: qfilename failed (%s)\n", cli_errstr(cli)); + if (!cli_qfilename(&cli, fnum, pname)) { + printf("ERROR: qfilename failed (%s)\n", cli_errstr(&cli)); correct = False; } @@ -2276,27 +2063,28 @@ static BOOL run_trans2test(int dummy) correct = False; } - cli_close(cli, fnum); + cli_close(&cli, fnum); sleep(2); - cli_unlink(cli, fname); - fnum = cli_open(cli, fname, + cli_unlink(&cli, fname); + fnum = cli_open(&cli, fname, O_RDWR | O_CREAT | O_TRUNC, DENY_NONE); if (fnum == -1) { - printf("open of %s failed (%s)\n", fname, cli_errstr(cli)); + printf("open of %s failed (%s)\n", fname, cli_errstr(&cli)); return False; } - cli_close(cli, fnum); + cli_close(&cli, fnum); - if (!cli_qpathinfo(cli, fname, &c_time, &a_time, &m_time, &size, NULL)) { - printf("ERROR: qpathinfo failed (%s)\n", cli_errstr(cli)); + if (!cli_qpathinfo(&cli, fname, &c_time, &a_time, &m_time, &size, NULL)) { + printf("ERROR: qpathinfo failed (%s)\n", cli_errstr(&cli)); correct = False; } else { if (c_time != m_time) { printf("create time=%s", ctime(&c_time)); printf("modify time=%s", ctime(&m_time)); printf("This system appears to have sticky create times\n"); + correct = False; } if (a_time % (60*60) == 0) { printf("access time=%s", ctime(&a_time)); @@ -2311,13 +2099,13 @@ static BOOL run_trans2test(int dummy) } - cli_unlink(cli, fname); - fnum = cli_open(cli, fname, + cli_unlink(&cli, fname); + fnum = cli_open(&cli, fname, O_RDWR | O_CREAT | O_TRUNC, DENY_NONE); - cli_close(cli, fnum); - if (!cli_qpathinfo2(cli, fname, &c_time, &a_time, &m_time, + cli_close(&cli, fnum); + if (!cli_qpathinfo2(&cli, fname, &c_time, &a_time, &m_time, &w_time, &size, NULL, NULL)) { - printf("ERROR: qpathinfo2 failed (%s)\n", cli_errstr(cli)); + printf("ERROR: qpathinfo2 failed (%s)\n", cli_errstr(&cli)); correct = False; } else { if (w_time < 60*60*24*2) { @@ -2327,29 +2115,29 @@ static BOOL run_trans2test(int dummy) } } - cli_unlink(cli, fname); + cli_unlink(&cli, fname); /* check if the server updates the directory modification time when creating a new file */ - if (!cli_mkdir(cli, dname)) { - printf("ERROR: mkdir failed (%s)\n", cli_errstr(cli)); + if (!cli_mkdir(&cli, dname)) { + printf("ERROR: mkdir failed (%s)\n", cli_errstr(&cli)); correct = False; } sleep(3); - if (!cli_qpathinfo2(cli, "\\trans2\\", &c_time, &a_time, &m_time, + if (!cli_qpathinfo2(&cli, "\\trans2\\", &c_time, &a_time, &m_time, &w_time, &size, NULL, NULL)) { - printf("ERROR: qpathinfo2 failed (%s)\n", cli_errstr(cli)); + printf("ERROR: qpathinfo2 failed (%s)\n", cli_errstr(&cli)); correct = False; } - fnum = cli_open(cli, fname2, + fnum = cli_open(&cli, fname2, O_RDWR | O_CREAT | O_TRUNC, DENY_NONE); - cli_write(cli, fnum, 0, (char *)&fnum, 0, sizeof(fnum)); - cli_close(cli, fnum); - if (!cli_qpathinfo2(cli, "\\trans2\\", &c_time, &a_time, &m_time2, + cli_write(&cli, fnum, 0, (char *)&fnum, 0, sizeof(fnum)); + cli_close(&cli, fnum); + if (!cli_qpathinfo2(&cli, "\\trans2\\", &c_time, &a_time, &m_time2, &w_time, &size, NULL, NULL)) { - printf("ERROR: qpathinfo2 failed (%s)\n", cli_errstr(cli)); + printf("ERROR: qpathinfo2 failed (%s)\n", cli_errstr(&cli)); correct = False; } else { if (m_time2 == m_time) { @@ -2357,10 +2145,10 @@ static BOOL run_trans2test(int dummy) correct = False; } } - cli_unlink(cli, fname2); - cli_rmdir(cli, dname); + cli_unlink(&cli, fname2); + cli_rmdir(&cli, dname); - if (!torture_close_connection(cli)) { + if (!torture_close_connection(&cli)) { correct = False; } @@ -2393,7 +2181,7 @@ static BOOL new_trans(struct cli_state *pcli, int fnum, int level) static BOOL run_w2ktest(int dummy) { - struct cli_state *cli; + static struct cli_state cli; int fnum; const char *fname = "\\w2ktest\\w2k.tst"; int level; @@ -2405,16 +2193,16 @@ static BOOL run_w2ktest(int dummy) return False; } - fnum = cli_open(cli, fname, + fnum = cli_open(&cli, fname, O_RDWR | O_CREAT , DENY_NONE); for (level = 1004; level < 1040; level++) { - new_trans(cli, fnum, level); + new_trans(&cli, fnum, level); } - cli_close(cli, fnum); + cli_close(&cli, fnum); - if (!torture_close_connection(cli)) { + if (!torture_close_connection(&cli)) { correct = False; } @@ -2429,7 +2217,7 @@ static BOOL run_w2ktest(int dummy) */ static BOOL run_oplock1(int dummy) { - struct cli_state *cli1; + static struct cli_state cli1; const char *fname = "\\lockt1.lck"; int fnum1; BOOL correct = True; @@ -2440,34 +2228,34 @@ static BOOL run_oplock1(int dummy) return False; } - cli_unlink(cli1, fname); + cli_unlink(&cli1, fname); - cli_sockopt(cli1, sockops); + cli_sockopt(&cli1, sockops); - cli1->use_oplocks = True; + cli1.use_oplocks = True; - fnum1 = cli_open(cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); + fnum1 = cli_open(&cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); if (fnum1 == -1) { - printf("open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("open of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - cli1->use_oplocks = False; + cli1.use_oplocks = False; - cli_unlink(cli1, fname); - cli_unlink(cli1, fname); + cli_unlink(&cli1, fname); + cli_unlink(&cli1, fname); - if (!cli_close(cli1, fnum1)) { - printf("close2 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("close2 failed (%s)\n", cli_errstr(&cli1)); return False; } - if (!cli_unlink(cli1, fname)) { - printf("unlink failed (%s)\n", cli_errstr(cli1)); + if (!cli_unlink(&cli1, fname)) { + printf("unlink failed (%s)\n", cli_errstr(&cli1)); return False; } - if (!torture_close_connection(cli1)) { + if (!torture_close_connection(&cli1)) { correct = False; } @@ -2478,7 +2266,7 @@ static BOOL run_oplock1(int dummy) static BOOL run_oplock2(int dummy) { - struct cli_state *cli1, *cli2; + static struct cli_state cli1, cli2; const char *fname = "\\lockt2.lck"; int fnum1, fnum2; int saved_use_oplocks = use_oplocks; @@ -2500,8 +2288,8 @@ static BOOL run_oplock2(int dummy) return False; } - cli1->use_oplocks = True; - cli1->use_level_II_oplocks = True; + cli1.use_oplocks = True; + cli1.use_level_II_oplocks = True; if (!torture_open_connection(&cli2)) { use_level_II_oplocks = False; @@ -2509,17 +2297,17 @@ static BOOL run_oplock2(int dummy) return False; } - cli2->use_oplocks = True; - cli2->use_level_II_oplocks = True; + cli2.use_oplocks = True; + cli2.use_level_II_oplocks = True; - cli_unlink(cli1, fname); + cli_unlink(&cli1, fname); - cli_sockopt(cli1, sockops); - cli_sockopt(cli2, sockops); + cli_sockopt(&cli1, sockops); + cli_sockopt(&cli2, sockops); - fnum1 = cli_open(cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); + fnum1 = cli_open(&cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); if (fnum1 == -1) { - printf("open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("open of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } @@ -2529,17 +2317,17 @@ static BOOL run_oplock2(int dummy) if (fork() == 0) { /* Child code */ - fnum2 = cli_open(cli2, fname, O_RDWR, DENY_NONE); + fnum2 = cli_open(&cli2, fname, O_RDWR, DENY_NONE); if (fnum2 == -1) { - printf("second open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("second open of %s failed (%s)\n", fname, cli_errstr(&cli1)); *shared_correct = False; exit(0); } sleep(2); - if (!cli_close(cli2, fnum2)) { - printf("close2 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli2, fnum2)) { + printf("close2 failed (%s)\n", cli_errstr(&cli1)); *shared_correct = False; } @@ -2550,54 +2338,54 @@ static BOOL run_oplock2(int dummy) /* Ensure cli1 processes the break. */ - if (cli_read(cli1, fnum1, buf, 0, 4) != 4) { - printf("read on fnum1 failed (%s)\n", cli_errstr(cli1)); + if (cli_read(&cli1, fnum1, buf, 0, 4) != 4) { + printf("read on fnum1 failed (%s)\n", cli_errstr(&cli1)); correct = False; } /* Should now be at level II. */ /* Test if sending a write locks causes a break to none. */ - if (!cli_lock(cli1, fnum1, 0, 4, 0, READ_LOCK)) { - printf("lock failed (%s)\n", cli_errstr(cli1)); + if (!cli_lock(&cli1, fnum1, 0, 4, 0, READ_LOCK)) { + printf("lock failed (%s)\n", cli_errstr(&cli1)); correct = False; } - cli_unlock(cli1, fnum1, 0, 4); + cli_unlock(&cli1, fnum1, 0, 4); sleep(2); - if (!cli_lock(cli1, fnum1, 0, 4, 0, WRITE_LOCK)) { - printf("lock failed (%s)\n", cli_errstr(cli1)); + if (!cli_lock(&cli1, fnum1, 0, 4, 0, WRITE_LOCK)) { + printf("lock failed (%s)\n", cli_errstr(&cli1)); correct = False; } - cli_unlock(cli1, fnum1, 0, 4); + cli_unlock(&cli1, fnum1, 0, 4); sleep(2); - cli_read(cli1, fnum1, buf, 0, 4); + cli_read(&cli1, fnum1, buf, 0, 4); #if 0 - if (cli_write(cli1, fnum1, 0, buf, 0, 4) != 4) { - printf("write on fnum1 failed (%s)\n", cli_errstr(cli1)); + if (cli_write(&cli1, fnum1, 0, buf, 0, 4) != 4) { + printf("write on fnum1 failed (%s)\n", cli_errstr(&cli1)); correct = False; } #endif - if (!cli_close(cli1, fnum1)) { - printf("close1 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("close1 failed (%s)\n", cli_errstr(&cli1)); correct = False; } sleep(4); - if (!cli_unlink(cli1, fname)) { - printf("unlink failed (%s)\n", cli_errstr(cli1)); + if (!cli_unlink(&cli1, fname)) { + printf("unlink failed (%s)\n", cli_errstr(&cli1)); correct = False; } - if (!torture_close_connection(cli1)) { + if (!torture_close_connection(&cli1)) { correct = False; } @@ -2620,7 +2408,7 @@ static BOOL oplock3_handler(struct cli_state *cli, int fnum, unsigned char level static BOOL run_oplock3(int dummy) { - struct cli_state *cli; + static struct cli_state cli; const char *fname = "\\oplockt3.dat"; int fnum; char buf[4] = "abcd"; @@ -2642,8 +2430,8 @@ static BOOL run_oplock3(int dummy) } sleep(2); /* try to trigger a oplock break in parent */ - fnum = cli_open(cli, fname, O_RDWR, DENY_NONE); - cli_write(cli, fnum, 0, buf, 0, 4); + fnum = cli_open(&cli, fname, O_RDWR, DENY_NONE); + cli_write(&cli, fnum, 0, buf, 0, 4); exit(0); } @@ -2653,13 +2441,13 @@ static BOOL run_oplock3(int dummy) if (!torture_open_connection(&cli)) { return False; } - cli_oplock_handler(cli, oplock3_handler); - fnum = cli_open(cli, fname, O_RDWR|O_CREAT, DENY_NONE); - cli_write(cli, fnum, 0, buf, 0, 4); - cli_close(cli, fnum); - fnum = cli_open(cli, fname, O_RDWR, DENY_NONE); - cli->timeout = 20000; - cli_receive_smb(cli); + cli_oplock_handler(&cli, oplock3_handler); + fnum = cli_open(&cli, fname, O_RDWR|O_CREAT, DENY_NONE); + cli_write(&cli, fnum, 0, buf, 0, 4); + cli_close(&cli, fnum); + fnum = cli_open(&cli, fname, O_RDWR, DENY_NONE); + cli.timeout = 20000; + cli_receive_smb(&cli); printf("finished oplock test 3\n"); return (correct && *shared_correct); @@ -2674,8 +2462,8 @@ static BOOL run_oplock3(int dummy) */ static BOOL run_deletetest(int dummy) { - struct cli_state *cli1; - struct cli_state *cli2; + static struct cli_state cli1; + static struct cli_state cli2; const char *fname = "\\delete.file"; int fnum1 = -1; int fnum2 = -1; @@ -2683,36 +2471,45 @@ static BOOL run_deletetest(int dummy) printf("starting delete test\n"); + ZERO_STRUCT(cli1); + ZERO_STRUCT(cli2); + if (!torture_open_connection(&cli1)) { return False; } - cli_sockopt(cli1, sockops); + cli_sockopt(&cli1, sockops); - /* Test 1 - this should delete the file on close. */ + /* Test 1 - this should *NOT* delete the file on close. */ - cli_setatr(cli1, fname, 0, 0); - cli_unlink(cli1, fname); + cli_setatr(&cli1, fname, 0, 0); + cli_unlink(&cli1, fname); - fnum1 = cli_nt_create_full(cli1, fname, GENERIC_ALL_ACCESS, FILE_ATTRIBUTE_NORMAL, + fnum1 = cli_nt_create_full(&cli1, fname, GENERIC_ALL_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_DELETE, FILE_OVERWRITE_IF, - FILE_DELETE_ON_CLOSE); + DELETE_ON_CLOSE_FLAG); if (fnum1 == -1) { - printf("[1] open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("[1] open of %s failed (%s)\n", fname, cli_errstr(&cli1)); correct = False; goto fail; } - if (!cli_close(cli1, fnum1)) { - printf("[1] close failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("[1] close failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } - fnum1 = cli_open(cli1, fname, O_RDWR, DENY_NONE); - if (fnum1 != -1) { - printf("[1] open of %s succeeded (should fail)\n", fname); + fnum1 = cli_open(&cli1, fname, O_RDWR, DENY_NONE); + if (fnum1 == -1) { + printf("[1] open of %s failed (%s)\n", fname, cli_errstr(&cli1)); + correct = False; + goto fail; + } + + if (!cli_close(&cli1, fnum1)) { + printf("[1] close failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } @@ -2721,52 +2518,52 @@ static BOOL run_deletetest(int dummy) /* Test 2 - this should delete the file on close. */ - cli_setatr(cli1, fname, 0, 0); - cli_unlink(cli1, fname); + cli_setatr(&cli1, fname, 0, 0); + cli_unlink(&cli1, fname); - fnum1 = cli_nt_create_full(cli1, fname, GENERIC_ALL_ACCESS, + fnum1 = cli_nt_create_full(&cli1, fname, GENERIC_ALL_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0); if (fnum1 == -1) { - printf("[2] open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("[2] open of %s failed (%s)\n", fname, cli_errstr(&cli1)); correct = False; goto fail; } - if (!cli_nt_delete_on_close(cli1, fnum1, True)) { - printf("[2] setting delete_on_close failed (%s)\n", cli_errstr(cli1)); + if (!cli_nt_delete_on_close(&cli1, fnum1, True)) { + printf("[2] setting delete_on_close failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } - if (!cli_close(cli1, fnum1)) { - printf("[2] close failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("[2] close failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } - fnum1 = cli_open(cli1, fname, O_RDONLY, DENY_NONE); + fnum1 = cli_open(&cli1, fname, O_RDONLY, DENY_NONE); if (fnum1 != -1) { printf("[2] open of %s succeeded should have been deleted on close !\n", fname); - if (!cli_close(cli1, fnum1)) { - printf("[2] close failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("[2] close failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } - cli_unlink(cli1, fname); + cli_unlink(&cli1, fname); } else printf("second delete on close test succeeded.\n"); /* Test 3 - ... */ - cli_setatr(cli1, fname, 0, 0); - cli_unlink(cli1, fname); + cli_setatr(&cli1, fname, 0, 0); + cli_unlink(&cli1, fname); - fnum1 = cli_nt_create_full(cli1, fname, GENERIC_ALL_ACCESS, FILE_ATTRIBUTE_NORMAL, + fnum1 = cli_nt_create_full(&cli1, fname, GENERIC_ALL_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE, FILE_OVERWRITE_IF, 0); if (fnum1 == -1) { - printf("[3] open - 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("[3] open - 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); correct = False; goto fail; } @@ -2774,7 +2571,7 @@ static BOOL run_deletetest(int dummy) /* This should fail with a sharing violation - open for delete is only compatible with SHARE_DELETE. */ - fnum2 = cli_nt_create_full(cli1, fname, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, + fnum2 = cli_nt_create_full(&cli1, fname, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE, FILE_OPEN, 0); if (fnum2 != -1) { @@ -2785,83 +2582,83 @@ static BOOL run_deletetest(int dummy) /* This should succeed. */ - fnum2 = cli_nt_create_full(cli1, fname, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, + fnum2 = cli_nt_create_full(&cli1, fname, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, FILE_OPEN, 0); if (fnum2 == -1) { - printf("[3] open - 2 of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("[3] open - 2 of %s failed (%s)\n", fname, cli_errstr(&cli1)); correct = False; goto fail; } - if (!cli_nt_delete_on_close(cli1, fnum1, True)) { - printf("[3] setting delete_on_close failed (%s)\n", cli_errstr(cli1)); + if (!cli_nt_delete_on_close(&cli1, fnum1, True)) { + printf("[3] setting delete_on_close failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } - if (!cli_close(cli1, fnum1)) { - printf("[3] close 1 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("[3] close 1 failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } - if (!cli_close(cli1, fnum2)) { - printf("[3] close 2 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum2)) { + printf("[3] close 2 failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } /* This should fail - file should no longer be there. */ - fnum1 = cli_open(cli1, fname, O_RDONLY, DENY_NONE); + fnum1 = cli_open(&cli1, fname, O_RDONLY, DENY_NONE); if (fnum1 != -1) { printf("[3] open of %s succeeded should have been deleted on close !\n", fname); - if (!cli_close(cli1, fnum1)) { - printf("[3] close failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("[3] close failed (%s)\n", cli_errstr(&cli1)); } - cli_unlink(cli1, fname); + cli_unlink(&cli1, fname); correct = False; goto fail; } else printf("third delete on close test succeeded.\n"); /* Test 4 ... */ - cli_setatr(cli1, fname, 0, 0); - cli_unlink(cli1, fname); + cli_setatr(&cli1, fname, 0, 0); + cli_unlink(&cli1, fname); - fnum1 = cli_nt_create_full(cli1, fname, FILE_READ_DATA|FILE_WRITE_DATA|DELETE_ACCESS, + fnum1 = cli_nt_create_full(&cli1, fname, FILE_READ_DATA|FILE_WRITE_DATA|DELETE_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE, FILE_OVERWRITE_IF, 0); if (fnum1 == -1) { - printf("[4] open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("[4] open of %s failed (%s)\n", fname, cli_errstr(&cli1)); correct = False; goto fail; } /* This should succeed. */ - fnum2 = cli_nt_create_full(cli1, fname, GENERIC_READ_ACCESS, + fnum2 = cli_nt_create_full(&cli1, fname, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, FILE_OPEN, 0); if (fnum2 == -1) { - printf("[4] open - 2 of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("[4] open - 2 of %s failed (%s)\n", fname, cli_errstr(&cli1)); correct = False; goto fail; } - if (!cli_close(cli1, fnum2)) { - printf("[4] close - 1 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum2)) { + printf("[4] close - 1 failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } - if (!cli_nt_delete_on_close(cli1, fnum1, True)) { - printf("[4] setting delete_on_close failed (%s)\n", cli_errstr(cli1)); + if (!cli_nt_delete_on_close(&cli1, fnum1, True)) { + printf("[4] setting delete_on_close failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } /* This should fail - no more opens once delete on close set. */ - fnum2 = cli_nt_create_full(cli1, fname, GENERIC_READ_ACCESS, + fnum2 = cli_nt_create_full(&cli1, fname, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, FILE_OPEN, 0); if (fnum2 != -1) { printf("[4] open - 3 of %s succeeded ! Should have failed.\n", fname ); @@ -2870,33 +2667,33 @@ static BOOL run_deletetest(int dummy) } else printf("fourth delete on close test succeeded.\n"); - if (!cli_close(cli1, fnum1)) { - printf("[4] close - 2 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("[4] close - 2 failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } /* Test 5 ... */ - cli_setatr(cli1, fname, 0, 0); - cli_unlink(cli1, fname); + cli_setatr(&cli1, fname, 0, 0); + cli_unlink(&cli1, fname); - fnum1 = cli_open(cli1, fname, O_RDWR|O_CREAT, DENY_NONE); + fnum1 = cli_open(&cli1, fname, O_RDWR|O_CREAT, DENY_NONE); if (fnum1 == -1) { - printf("[5] open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("[5] open of %s failed (%s)\n", fname, cli_errstr(&cli1)); correct = False; goto fail; } /* This should fail - only allowed on NT opens with DELETE access. */ - if (cli_nt_delete_on_close(cli1, fnum1, True)) { + if (cli_nt_delete_on_close(&cli1, fnum1, True)) { printf("[5] setting delete_on_close on OpenX file succeeded - should fail !\n"); correct = False; goto fail; } - if (!cli_close(cli1, fnum1)) { - printf("[5] close - 2 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("[5] close - 2 failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } @@ -2904,29 +2701,29 @@ static BOOL run_deletetest(int dummy) printf("fifth delete on close test succeeded.\n"); /* Test 6 ... */ - cli_setatr(cli1, fname, 0, 0); - cli_unlink(cli1, fname); + cli_setatr(&cli1, fname, 0, 0); + cli_unlink(&cli1, fname); - fnum1 = cli_nt_create_full(cli1, fname, FILE_READ_DATA|FILE_WRITE_DATA, + fnum1 = cli_nt_create_full(&cli1, fname, FILE_READ_DATA|FILE_WRITE_DATA, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, FILE_OVERWRITE_IF, 0); if (fnum1 == -1) { - printf("[6] open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("[6] open of %s failed (%s)\n", fname, cli_errstr(&cli1)); correct = False; goto fail; } /* This should fail - only allowed on NT opens with DELETE access. */ - if (cli_nt_delete_on_close(cli1, fnum1, True)) { + if (cli_nt_delete_on_close(&cli1, fnum1, True)) { printf("[6] setting delete_on_close on file with no delete access succeeded - should fail !\n"); correct = False; goto fail; } - if (!cli_close(cli1, fnum1)) { - printf("[6] close - 2 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("[6] close - 2 failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } @@ -2934,47 +2731,47 @@ static BOOL run_deletetest(int dummy) printf("sixth delete on close test succeeded.\n"); /* Test 7 ... */ - cli_setatr(cli1, fname, 0, 0); - cli_unlink(cli1, fname); + cli_setatr(&cli1, fname, 0, 0); + cli_unlink(&cli1, fname); - fnum1 = cli_nt_create_full(cli1, fname, FILE_READ_DATA|FILE_WRITE_DATA|DELETE_ACCESS, + fnum1 = cli_nt_create_full(&cli1, fname, FILE_READ_DATA|FILE_WRITE_DATA|DELETE_ACCESS, FILE_ATTRIBUTE_NORMAL, 0, FILE_OVERWRITE_IF, 0); if (fnum1 == -1) { - printf("[7] open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("[7] open of %s failed (%s)\n", fname, cli_errstr(&cli1)); correct = False; goto fail; } - if (!cli_nt_delete_on_close(cli1, fnum1, True)) { + if (!cli_nt_delete_on_close(&cli1, fnum1, True)) { printf("[7] setting delete_on_close on file failed !\n"); correct = False; goto fail; } - if (!cli_nt_delete_on_close(cli1, fnum1, False)) { + if (!cli_nt_delete_on_close(&cli1, fnum1, False)) { printf("[7] unsetting delete_on_close on file failed !\n"); correct = False; goto fail; } - if (!cli_close(cli1, fnum1)) { - printf("[7] close - 2 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("[7] close - 2 failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } /* This next open should succeed - we reset the flag. */ - fnum1 = cli_open(cli1, fname, O_RDONLY, DENY_NONE); + fnum1 = cli_open(&cli1, fname, O_RDONLY, DENY_NONE); if (fnum1 == -1) { - printf("[5] open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("[5] open of %s failed (%s)\n", fname, cli_errstr(&cli1)); correct = False; goto fail; } - if (!cli_close(cli1, fnum1)) { - printf("[7] close - 2 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("[7] close - 2 failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } @@ -2982,8 +2779,8 @@ static BOOL run_deletetest(int dummy) printf("seventh delete on close test succeeded.\n"); /* Test 7 ... */ - cli_setatr(cli1, fname, 0, 0); - cli_unlink(cli1, fname); + cli_setatr(&cli1, fname, 0, 0); + cli_unlink(&cli1, fname); if (!torture_open_connection(&cli2)) { printf("[8] failed to open second connection.\n"); @@ -2991,46 +2788,46 @@ static BOOL run_deletetest(int dummy) goto fail; } - cli_sockopt(cli1, sockops); + cli_sockopt(&cli1, sockops); - fnum1 = cli_nt_create_full(cli1, fname, FILE_READ_DATA|FILE_WRITE_DATA|DELETE_ACCESS, + fnum1 = cli_nt_create_full(&cli1, fname, FILE_READ_DATA|FILE_WRITE_DATA|DELETE_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, FILE_OVERWRITE_IF, 0); if (fnum1 == -1) { - printf("[8] open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("[8] open of %s failed (%s)\n", fname, cli_errstr(&cli1)); correct = False; goto fail; } - fnum2 = cli_nt_create_full(cli2, fname, FILE_READ_DATA|FILE_WRITE_DATA|DELETE_ACCESS, + fnum2 = cli_nt_create_full(&cli2, fname, FILE_READ_DATA|FILE_WRITE_DATA|DELETE_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, FILE_OPEN, 0); if (fnum2 == -1) { - printf("[8] open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("[8] open of %s failed (%s)\n", fname, cli_errstr(&cli1)); correct = False; goto fail; } - if (!cli_nt_delete_on_close(cli1, fnum1, True)) { + if (!cli_nt_delete_on_close(&cli1, fnum1, True)) { printf("[8] setting delete_on_close on file failed !\n"); correct = False; goto fail; } - if (!cli_close(cli1, fnum1)) { - printf("[8] close - 1 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("[8] close - 1 failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } - if (!cli_close(cli2, fnum2)) { - printf("[8] close - 2 failed (%s)\n", cli_errstr(cli2)); + if (!cli_close(&cli2, fnum2)) { + printf("[8] close - 2 failed (%s)\n", cli_errstr(&cli2)); correct = False; goto fail; } /* This should fail.. */ - fnum1 = cli_open(cli1, fname, O_RDONLY, DENY_NONE); + fnum1 = cli_open(&cli1, fname, O_RDONLY, DENY_NONE); if (fnum1 != -1) { printf("[8] open of %s succeeded should have been deleted on close !\n", fname); goto fail; @@ -3039,7 +2836,7 @@ static BOOL run_deletetest(int dummy) printf("eighth delete on close test succeeded.\n"); /* This should fail - we need to set DELETE_ACCESS. */ - fnum1 = cli_nt_create_full(cli1, fname, FILE_READ_DATA|FILE_WRITE_DATA, + fnum1 = cli_nt_create_full(&cli1, fname, FILE_READ_DATA|FILE_WRITE_DATA, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, FILE_DELETE_ON_CLOSE); if (fnum1 != -1) { @@ -3050,23 +2847,23 @@ static BOOL run_deletetest(int dummy) printf("ninth delete on close test succeeded.\n"); - fnum1 = cli_nt_create_full(cli1, fname, FILE_READ_DATA|FILE_WRITE_DATA|DELETE_ACCESS, + fnum1 = cli_nt_create_full(&cli1, fname, FILE_READ_DATA|FILE_WRITE_DATA|DELETE_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, FILE_DELETE_ON_CLOSE); if (fnum1 == -1) { - printf("[10] open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("[10] open of %s failed (%s)\n", fname, cli_errstr(&cli1)); correct = False; goto fail; } /* This should delete the file. */ - if (!cli_close(cli1, fnum1)) { - printf("[10] close failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("[10] close failed (%s)\n", cli_errstr(&cli1)); correct = False; goto fail; } /* This should fail.. */ - fnum1 = cli_open(cli1, fname, O_RDONLY, DENY_NONE); + fnum1 = cli_open(&cli1, fname, O_RDONLY, DENY_NONE); if (fnum1 != -1) { printf("[10] open of %s succeeded should have been deleted on close !\n", fname); goto fail; @@ -3076,19 +2873,16 @@ static BOOL run_deletetest(int dummy) printf("finished delete test\n"); fail: - /* FIXME: This will crash if we aborted before cli2 got - * intialized, because these functions don't handle - * uninitialized connections. */ - - cli_close(cli1, fnum1); - cli_close(cli1, fnum2); - cli_setatr(cli1, fname, 0, 0); - cli_unlink(cli1, fname); - - if (!torture_close_connection(cli1)) { + + cli_close(&cli1, fnum1); + cli_close(&cli1, fnum2); + cli_setatr(&cli1, fname, 0, 0); + cli_unlink(&cli1, fname); + + if (!torture_close_connection(&cli1)) { correct = False; } - if (!torture_close_connection(cli2)) { + if (!torture_close_connection(&cli2)) { correct = False; } return correct; @@ -3100,7 +2894,7 @@ static BOOL run_deletetest(int dummy) */ static BOOL run_properties(int dummy) { - static struct cli_state *cli; + static struct cli_state cli; BOOL correct = True; printf("starting properties test\n"); @@ -3111,11 +2905,11 @@ static BOOL run_properties(int dummy) return False; } - cli_sockopt(cli, sockops); + cli_sockopt(&cli, sockops); - d_printf("Capabilities 0x%08x\n", cli->capabilities); + d_printf("Capabilities 0x%08x\n", cli.capabilities); - if (!torture_close_connection(cli)) { + if (!torture_close_connection(&cli)) { correct = False; } @@ -3148,7 +2942,7 @@ static BOOL run_properties(int dummy) */ static BOOL run_xcopy(int dummy) { - static struct cli_state *cli1; + static struct cli_state cli1; const char *fname = "\\test.txt"; BOOL correct = True; int fnum1, fnum2; @@ -3159,26 +2953,26 @@ static BOOL run_xcopy(int dummy) return False; } - fnum1 = cli_nt_create_full(cli1, fname, + fnum1 = cli_nt_create_full(&cli1, fname, FIRST_DESIRED_ACCESS, FILE_ATTRIBUTE_ARCHIVE, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0x4044); if (fnum1 == -1) { - printf("First open failed - %s\n", cli_errstr(cli1)); + printf("First open failed - %s\n", cli_errstr(&cli1)); return False; } - fnum2 = cli_nt_create_full(cli1, fname, + fnum2 = cli_nt_create_full(&cli1, fname, SECOND_DESIRED_ACCESS, 0, FILE_SHARE_READ|FILE_SHARE_WRITE|FILE_SHARE_DELETE, FILE_OPEN, 0x200000); if (fnum2 == -1) { - printf("second open failed - %s\n", cli_errstr(cli1)); + printf("second open failed - %s\n", cli_errstr(&cli1)); return False; } - if (!torture_close_connection(cli1)) { + if (!torture_close_connection(&cli1)) { correct = False; } @@ -3190,7 +2984,7 @@ static BOOL run_xcopy(int dummy) */ static BOOL run_rename(int dummy) { - static struct cli_state *cli1; + static struct cli_state cli1; const char *fname = "\\test.txt"; const char *fname1 = "\\test1.txt"; BOOL correct = True; @@ -3202,31 +2996,31 @@ static BOOL run_rename(int dummy) return False; } - cli_unlink(cli1, fname); - cli_unlink(cli1, fname1); - fnum1 = cli_nt_create_full(cli1, fname, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, + cli_unlink(&cli1, fname); + cli_unlink(&cli1, fname1); + fnum1 = cli_nt_create_full(&cli1, fname, GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ, FILE_OVERWRITE_IF, 0); if (fnum1 == -1) { - printf("First open failed - %s\n", cli_errstr(cli1)); + printf("First open failed - %s\n", cli_errstr(&cli1)); return False; } - if (!cli_rename(cli1, fname, fname1)) { - printf("First rename failed (this is correct) - %s\n", cli_errstr(cli1)); + if (!cli_rename(&cli1, fname, fname1)) { + printf("First rename failed (this is correct) - %s\n", cli_errstr(&cli1)); } else { printf("First rename succeeded - this should have failed !\n"); correct = False; } - if (!cli_close(cli1, fnum1)) { - printf("close - 1 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("close - 1 failed (%s)\n", cli_errstr(&cli1)); return False; } - cli_unlink(cli1, fname); - cli_unlink(cli1, fname1); - fnum1 = cli_nt_create_full(cli1, fname,GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, + cli_unlink(&cli1, fname); + cli_unlink(&cli1, fname1); + fnum1 = cli_nt_create_full(&cli1, fname,GENERIC_READ_ACCESS, FILE_ATTRIBUTE_NORMAL, #if 0 FILE_SHARE_DELETE|FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0); #else @@ -3234,30 +3028,30 @@ static BOOL run_rename(int dummy) #endif if (fnum1 == -1) { - printf("Second open failed - %s\n", cli_errstr(cli1)); + printf("Second open failed - %s\n", cli_errstr(&cli1)); return False; } - if (!cli_rename(cli1, fname, fname1)) { - printf("Second rename failed - this should have succeeded - %s\n", cli_errstr(cli1)); + if (!cli_rename(&cli1, fname, fname1)) { + printf("Second rename failed - this should have succeeded - %s\n", cli_errstr(&cli1)); correct = False; } else { printf("Second rename succeeded\n"); } - if (!cli_close(cli1, fnum1)) { - printf("close - 2 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("close - 2 failed (%s)\n", cli_errstr(&cli1)); return False; } - cli_unlink(cli1, fname); - cli_unlink(cli1, fname1); + cli_unlink(&cli1, fname); + cli_unlink(&cli1, fname1); - fnum1 = cli_nt_create_full(cli1, fname,READ_CONTROL_ACCESS, FILE_ATTRIBUTE_NORMAL, + fnum1 = cli_nt_create_full(&cli1, fname,READ_CONTROL_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0); if (fnum1 == -1) { - printf("Third open failed - %s\n", cli_errstr(cli1)); + printf("Third open failed - %s\n", cli_errstr(&cli1)); return False; } @@ -3266,41 +3060,41 @@ static BOOL run_rename(int dummy) { int fnum2; - fnum2 = cli_nt_create_full(cli1, fname,DELETE_ACCESS, FILE_ATTRIBUTE_NORMAL, + fnum2 = cli_nt_create_full(&cli1, fname,DELETE_ACCESS, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0); if (fnum2 == -1) { - printf("Fourth open failed - %s\n", cli_errstr(cli1)); + printf("Fourth open failed - %s\n", cli_errstr(&cli1)); return False; } - if (!cli_nt_delete_on_close(cli1, fnum2, True)) { + if (!cli_nt_delete_on_close(&cli1, fnum2, True)) { printf("[8] setting delete_on_close on file failed !\n"); return False; } - if (!cli_close(cli1, fnum2)) { - printf("close - 4 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum2)) { + printf("close - 4 failed (%s)\n", cli_errstr(&cli1)); return False; } } #endif - if (!cli_rename(cli1, fname, fname1)) { - printf("Third rename failed - this should have succeeded - %s\n", cli_errstr(cli1)); + if (!cli_rename(&cli1, fname, fname1)) { + printf("Third rename failed - this should have succeeded - %s\n", cli_errstr(&cli1)); correct = False; } else { printf("Third rename succeeded\n"); } - if (!cli_close(cli1, fnum1)) { - printf("close - 3 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("close - 3 failed (%s)\n", cli_errstr(&cli1)); return False; } - cli_unlink(cli1, fname); - cli_unlink(cli1, fname1); + cli_unlink(&cli1, fname); + cli_unlink(&cli1, fname1); - if (!torture_close_connection(cli1)) { + if (!torture_close_connection(&cli1)) { correct = False; } @@ -3309,7 +3103,7 @@ static BOOL run_rename(int dummy) static BOOL run_pipe_number(int dummy) { - struct cli_state *cli1; + static struct cli_state cli1; const char *pipe_name = "\\SPOOLSS"; int fnum; int num_pipes = 0; @@ -3319,20 +3113,20 @@ static BOOL run_pipe_number(int dummy) return False; } - cli_sockopt(cli1, sockops); + cli_sockopt(&cli1, sockops); while(1) { - fnum = cli_nt_create_full(cli1, pipe_name,FILE_READ_DATA, FILE_ATTRIBUTE_NORMAL, + fnum = cli_nt_create_full(&cli1, pipe_name,FILE_READ_DATA, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_WRITE, FILE_OPEN_IF, 0); if (fnum == -1) { - printf("Open of pipe %s failed with error (%s)\n", pipe_name, cli_errstr(cli1)); + printf("Open of pipe %s failed with error (%s)\n", pipe_name, cli_errstr(&cli1)); break; } num_pipes++; } printf("pipe_number test - we can open %d %s pipes.\n", num_pipes, pipe_name ); - torture_close_connection(cli1); + torture_close_connection(&cli1); return True; } @@ -3341,14 +3135,15 @@ static BOOL run_pipe_number(int dummy) */ static BOOL run_opentest(int dummy) { - static struct cli_state *cli1; - static struct cli_state *cli2; + static struct cli_state cli1; + static struct cli_state cli2; const char *fname = "\\readonly.file"; int fnum1, fnum2; char buf[20]; size_t fsize; BOOL correct = True; char *tmp_path; + uint16 attr; printf("starting open test\n"); @@ -3356,77 +3151,77 @@ static BOOL run_opentest(int dummy) return False; } - cli_setatr(cli1, fname, 0, 0); - cli_unlink(cli1, fname); + cli_setatr(&cli1, fname, 0, 0); + cli_unlink(&cli1, fname); - cli_sockopt(cli1, sockops); + cli_sockopt(&cli1, sockops); - fnum1 = cli_open(cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); + fnum1 = cli_open(&cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); if (fnum1 == -1) { - printf("open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("open of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - if (!cli_close(cli1, fnum1)) { - printf("close2 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("close2 failed (%s)\n", cli_errstr(&cli1)); return False; } - if (!cli_setatr(cli1, fname, aRONLY, 0)) { - printf("cli_setatr failed (%s)\n", cli_errstr(cli1)); + if (!cli_setatr(&cli1, fname, aRONLY, 0)) { + printf("cli_setatr failed (%s)\n", cli_errstr(&cli1)); return False; } - fnum1 = cli_open(cli1, fname, O_RDONLY, DENY_WRITE); + fnum1 = cli_open(&cli1, fname, O_RDONLY, DENY_WRITE); if (fnum1 == -1) { - printf("open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("open of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } /* This will fail - but the error should be ERRnoaccess, not ERRbadshare. */ - fnum2 = cli_open(cli1, fname, O_RDWR, DENY_ALL); + fnum2 = cli_open(&cli1, fname, O_RDWR, DENY_ALL); - if (check_error(__LINE__, cli1, ERRDOS, ERRnoaccess, + if (check_error(__LINE__, &cli1, ERRDOS, ERRnoaccess, NT_STATUS_ACCESS_DENIED)) { printf("correct error code ERRDOS/ERRnoaccess returned\n"); } printf("finished open test 1\n"); - cli_close(cli1, fnum1); + cli_close(&cli1, fnum1); /* Now try not readonly and ensure ERRbadshare is returned. */ - cli_setatr(cli1, fname, 0, 0); + cli_setatr(&cli1, fname, 0, 0); - fnum1 = cli_open(cli1, fname, O_RDONLY, DENY_WRITE); + fnum1 = cli_open(&cli1, fname, O_RDONLY, DENY_WRITE); if (fnum1 == -1) { - printf("open of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("open of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } /* This will fail - but the error should be ERRshare. */ - fnum2 = cli_open(cli1, fname, O_RDWR, DENY_ALL); + fnum2 = cli_open(&cli1, fname, O_RDWR, DENY_ALL); - if (check_error(__LINE__, cli1, ERRDOS, ERRbadshare, + if (check_error(__LINE__, &cli1, ERRDOS, ERRbadshare, NT_STATUS_SHARING_VIOLATION)) { printf("correct error code ERRDOS/ERRbadshare returned\n"); } - if (!cli_close(cli1, fnum1)) { - printf("close2 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("close2 failed (%s)\n", cli_errstr(&cli1)); return False; } - cli_unlink(cli1, fname); + cli_unlink(&cli1, fname); printf("finished open test 2\n"); /* Test truncate open disposition on file opened for read. */ - fnum1 = cli_open(cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); + fnum1 = cli_open(&cli1, fname, O_RDWR|O_CREAT|O_EXCL, DENY_NONE); if (fnum1 == -1) { - printf("(3) open (1) of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("(3) open (1) of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } @@ -3434,19 +3229,19 @@ static BOOL run_opentest(int dummy) memset(buf, '\0', 20); - if (cli_write(cli1, fnum1, 0, buf, 0, 20) != 20) { - printf("write failed (%s)\n", cli_errstr(cli1)); + if (cli_write(&cli1, fnum1, 0, buf, 0, 20) != 20) { + printf("write failed (%s)\n", cli_errstr(&cli1)); correct = False; } - if (!cli_close(cli1, fnum1)) { - printf("(3) close1 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("(3) close1 failed (%s)\n", cli_errstr(&cli1)); return False; } /* Ensure size == 20. */ - if (!cli_getatr(cli1, fname, NULL, &fsize, NULL)) { - printf("(3) getatr failed (%s)\n", cli_errstr(cli1)); + if (!cli_getatr(&cli1, fname, NULL, &fsize, NULL)) { + printf("(3) getatr failed (%s)\n", cli_errstr(&cli1)); return False; } @@ -3457,20 +3252,20 @@ static BOOL run_opentest(int dummy) /* Now test if we can truncate a file opened for readonly. */ - fnum1 = cli_open(cli1, fname, O_RDONLY|O_TRUNC, DENY_NONE); + fnum1 = cli_open(&cli1, fname, O_RDONLY|O_TRUNC, DENY_NONE); if (fnum1 == -1) { - printf("(3) open (2) of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("(3) open (2) of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - if (!cli_close(cli1, fnum1)) { - printf("close2 failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("close2 failed (%s)\n", cli_errstr(&cli1)); return False; } /* Ensure size == 0. */ - if (!cli_getatr(cli1, fname, NULL, &fsize, NULL)) { - printf("(3) getatr failed (%s)\n", cli_errstr(cli1)); + if (!cli_getatr(&cli1, fname, NULL, &fsize, NULL)) { + printf("(3) getatr failed (%s)\n", cli_errstr(&cli1)); return False; } @@ -3480,21 +3275,21 @@ static BOOL run_opentest(int dummy) } printf("finished open test 3\n"); - cli_unlink(cli1, fname); + cli_unlink(&cli1, fname); printf("testing ctemp\n"); - fnum1 = cli_ctemp(cli1, "\\", &tmp_path); + fnum1 = cli_ctemp(&cli1, "\\", &tmp_path); if (fnum1 == -1) { - printf("ctemp failed (%s)\n", cli_errstr(cli1)); + printf("ctemp failed (%s)\n", cli_errstr(&cli1)); return False; } printf("ctemp gave path %s\n", tmp_path); - if (!cli_close(cli1, fnum1)) { - printf("close of temp failed (%s)\n", cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("close of temp failed (%s)\n", cli_errstr(&cli1)); } - if (!cli_unlink(cli1, tmp_path)) { - printf("unlink of temp failed (%s)\n", cli_errstr(cli1)); + if (!cli_unlink(&cli1, tmp_path)) { + printf("unlink of temp failed (%s)\n", cli_errstr(&cli1)); } /* Test the non-io opens... */ @@ -3503,158 +3298,158 @@ static BOOL run_opentest(int dummy) return False; } - cli_setatr(cli2, fname, 0, 0); - cli_unlink(cli2, fname); + cli_setatr(&cli2, fname, 0, 0); + cli_unlink(&cli2, fname); - cli_sockopt(cli2, sockops); + cli_sockopt(&cli2, sockops); printf("TEST #1 testing 2 non-io opens (no delete)\n"); - fnum1 = cli_nt_create_full(cli1, fname,FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, + fnum1 = cli_nt_create_full(&cli1, fname,FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0); if (fnum1 == -1) { - printf("test 1 open 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("test 1 open 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - fnum2 = cli_nt_create_full(cli2, fname,FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, + fnum2 = cli_nt_create_full(&cli2, fname,FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OPEN_IF, 0); if (fnum2 == -1) { - printf("test 1 open 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); + printf("test 1 open 2 of %s failed (%s)\n", fname, cli_errstr(&cli2)); return False; } - if (!cli_close(cli1, fnum1)) { - printf("test 1 close 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("test 1 close 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - if (!cli_close(cli2, fnum2)) { - printf("test 1 close 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); + if (!cli_close(&cli2, fnum2)) { + printf("test 1 close 2 of %s failed (%s)\n", fname, cli_errstr(&cli2)); return False; } printf("non-io open test #1 passed.\n"); - cli_unlink(cli1, fname); + cli_unlink(&cli1, fname); printf("TEST #2 testing 2 non-io opens (first with delete)\n"); - fnum1 = cli_nt_create_full(cli1, fname,DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, + fnum1 = cli_nt_create_full(&cli1, fname,DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0); if (fnum1 == -1) { - printf("test 2 open 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("test 2 open 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - fnum2 = cli_nt_create_full(cli2, fname,FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, + fnum2 = cli_nt_create_full(&cli2, fname,FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OPEN_IF, 0); if (fnum2 == -1) { - printf("test 2 open 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); + printf("test 2 open 2 of %s failed (%s)\n", fname, cli_errstr(&cli2)); return False; } - if (!cli_close(cli1, fnum1)) { - printf("test 1 close 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("test 1 close 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - if (!cli_close(cli2, fnum2)) { - printf("test 1 close 2 of %s failed (%s)\n", fname, cli_errstr(cli1)); + if (!cli_close(&cli2, fnum2)) { + printf("test 1 close 2 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } printf("non-io open test #2 passed.\n"); - cli_unlink(cli1, fname); + cli_unlink(&cli1, fname); printf("TEST #3 testing 2 non-io opens (second with delete)\n"); - fnum1 = cli_nt_create_full(cli1, fname,FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, + fnum1 = cli_nt_create_full(&cli1, fname,FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0); if (fnum1 == -1) { - printf("test 3 open 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("test 3 open 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - fnum2 = cli_nt_create_full(cli2, fname,DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, + fnum2 = cli_nt_create_full(&cli2, fname,DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OPEN_IF, 0); if (fnum2 == -1) { - printf("test 3 open 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); + printf("test 3 open 2 of %s failed (%s)\n", fname, cli_errstr(&cli2)); return False; } - if (!cli_close(cli1, fnum1)) { - printf("test 3 close 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("test 3 close 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - if (!cli_close(cli2, fnum2)) { - printf("test 3 close 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); + if (!cli_close(&cli2, fnum2)) { + printf("test 3 close 2 of %s failed (%s)\n", fname, cli_errstr(&cli2)); return False; } printf("non-io open test #3 passed.\n"); - cli_unlink(cli1, fname); + cli_unlink(&cli1, fname); printf("TEST #4 testing 2 non-io opens (both with delete)\n"); - fnum1 = cli_nt_create_full(cli1, fname,DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, + fnum1 = cli_nt_create_full(&cli1, fname,DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0); if (fnum1 == -1) { - printf("test 4 open 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("test 4 open 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - fnum2 = cli_nt_create_full(cli2, fname,DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, + fnum2 = cli_nt_create_full(&cli2, fname,DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OPEN_IF, 0); if (fnum2 != -1) { - printf("test 4 open 2 of %s SUCCEEDED - should have failed (%s)\n", fname, cli_errstr(cli2)); + printf("test 4 open 2 of %s SUCCEEDED - should have failed (%s)\n", fname, cli_errstr(&cli2)); return False; } - printf("test 3 open 2 of %s gave %s (correct error should be %s)\n", fname, cli_errstr(cli2), "sharing violation"); + printf("test 3 open 2 of %s gave %s (correct error should be %s)\n", fname, cli_errstr(&cli2), "sharing violation"); - if (!cli_close(cli1, fnum1)) { - printf("test 4 close 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("test 4 close 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } printf("non-io open test #4 passed.\n"); - cli_unlink(cli1, fname); + cli_unlink(&cli1, fname); printf("TEST #5 testing 2 non-io opens (both with delete - both with file share delete)\n"); - fnum1 = cli_nt_create_full(cli1, fname,DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, + fnum1 = cli_nt_create_full(&cli1, fname,DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_DELETE, FILE_OVERWRITE_IF, 0); if (fnum1 == -1) { - printf("test 5 open 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("test 5 open 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - fnum2 = cli_nt_create_full(cli2, fname,DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, + fnum2 = cli_nt_create_full(&cli2, fname,DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_DELETE, FILE_OPEN_IF, 0); if (fnum2 == -1) { - printf("test 5 open 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); + printf("test 5 open 2 of %s failed (%s)\n", fname, cli_errstr(&cli2)); return False; } - if (!cli_close(cli1, fnum1)) { - printf("test 5 close 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("test 5 close 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - if (!cli_close(cli2, fnum2)) { - printf("test 5 close 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); + if (!cli_close(&cli2, fnum2)) { + printf("test 5 close 2 of %s failed (%s)\n", fname, cli_errstr(&cli2)); return False; } @@ -3662,31 +3457,31 @@ static BOOL run_opentest(int dummy) printf("TEST #6 testing 1 non-io open, one io open\n"); - cli_unlink(cli1, fname); + cli_unlink(&cli1, fname); - fnum1 = cli_nt_create_full(cli1, fname,FILE_READ_DATA, FILE_ATTRIBUTE_NORMAL, + fnum1 = cli_nt_create_full(&cli1, fname,FILE_READ_DATA, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0); if (fnum1 == -1) { - printf("test 6 open 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("test 6 open 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - fnum2 = cli_nt_create_full(cli2, fname,FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, + fnum2 = cli_nt_create_full(&cli2, fname,FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ, FILE_OPEN_IF, 0); if (fnum2 == -1) { - printf("test 6 open 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); + printf("test 6 open 2 of %s failed (%s)\n", fname, cli_errstr(&cli2)); return False; } - if (!cli_close(cli1, fnum1)) { - printf("test 6 close 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("test 6 close 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - if (!cli_close(cli2, fnum2)) { - printf("test 6 close 2 of %s failed (%s)\n", fname, cli_errstr(cli2)); + if (!cli_close(&cli2, fnum2)) { + printf("test 6 close 2 of %s failed (%s)\n", fname, cli_errstr(&cli2)); return False; } @@ -3694,203 +3489,135 @@ static BOOL run_opentest(int dummy) printf("TEST #7 testing 1 non-io open, one io open with delete\n"); - cli_unlink(cli1, fname); + cli_unlink(&cli1, fname); - fnum1 = cli_nt_create_full(cli1, fname,FILE_READ_DATA, FILE_ATTRIBUTE_NORMAL, + fnum1 = cli_nt_create_full(&cli1, fname,FILE_READ_DATA, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0); if (fnum1 == -1) { - printf("test 7 open 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); + printf("test 7 open 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - fnum2 = cli_nt_create_full(cli2, fname,DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, + fnum2 = cli_nt_create_full(&cli2, fname,DELETE_ACCESS|FILE_READ_ATTRIBUTES, FILE_ATTRIBUTE_NORMAL, FILE_SHARE_READ|FILE_SHARE_DELETE, FILE_OPEN_IF, 0); if (fnum2 != -1) { - printf("test 7 open 2 of %s SUCCEEDED - should have failed (%s)\n", fname, cli_errstr(cli2)); + printf("test 7 open 2 of %s SUCCEEDED - should have failed (%s)\n", fname, cli_errstr(&cli2)); return False; } - printf("test 7 open 2 of %s gave %s (correct error should be %s)\n", fname, cli_errstr(cli2), "sharing violation"); + printf("test 7 open 2 of %s gave %s (correct error should be %s)\n", fname, cli_errstr(&cli2), "sharing violation"); - if (!cli_close(cli1, fnum1)) { - printf("test 7 close 1 of %s failed (%s)\n", fname, cli_errstr(cli1)); + if (!cli_close(&cli1, fnum1)) { + printf("test 7 close 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } printf("non-io open test #7 passed.\n"); - cli_unlink(cli1, fname); + cli_unlink(&cli1, fname); - if (!torture_close_connection(cli1)) { - correct = False; + /* Test 8 - attributes test #1... */ + fnum1 = cli_nt_create_full(&cli1, fname,FILE_WRITE_DATA, FILE_ATTRIBUTE_HIDDEN, + FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0); + + if (fnum1 == -1) { + printf("test 8 open 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); + return False; } - if (!torture_close_connection(cli2)) { - correct = False; + + if (!cli_close(&cli1, fnum1)) { + printf("test 8 close 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); + return False; } - - return correct; -} -static uint32 open_attrs_table[] = { - FILE_ATTRIBUTE_NORMAL, - FILE_ATTRIBUTE_ARCHIVE, - FILE_ATTRIBUTE_READONLY, - FILE_ATTRIBUTE_HIDDEN, - FILE_ATTRIBUTE_SYSTEM, - - FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY, - FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN, - FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM, - FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN, - FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_SYSTEM, - FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN|FILE_ATTRIBUTE_SYSTEM, - - FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN, - FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_SYSTEM, - FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN|FILE_ATTRIBUTE_SYSTEM, - FILE_ATTRIBUTE_HIDDEN,FILE_ATTRIBUTE_SYSTEM, -}; - -struct trunc_open_results { - unsigned int num; - uint32 init_attr; - uint32 trunc_attr; - uint32 result_attr; -}; - -static struct trunc_open_results attr_results[] = { - { 0, FILE_ATTRIBUTE_NORMAL, FILE_ATTRIBUTE_NORMAL, FILE_ATTRIBUTE_ARCHIVE }, - { 1, FILE_ATTRIBUTE_NORMAL, FILE_ATTRIBUTE_ARCHIVE, FILE_ATTRIBUTE_ARCHIVE }, - { 2, FILE_ATTRIBUTE_NORMAL, FILE_ATTRIBUTE_READONLY, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY }, - { 16, FILE_ATTRIBUTE_ARCHIVE, FILE_ATTRIBUTE_NORMAL, FILE_ATTRIBUTE_ARCHIVE }, - { 17, FILE_ATTRIBUTE_ARCHIVE, FILE_ATTRIBUTE_ARCHIVE, FILE_ATTRIBUTE_ARCHIVE }, - { 18, FILE_ATTRIBUTE_ARCHIVE, FILE_ATTRIBUTE_READONLY, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY }, - { 51, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN }, - { 54, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN }, - { 56, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN }, - { 68, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM }, - { 71, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM }, - { 73, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_SYSTEM }, - { 99, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_HIDDEN,FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN }, - { 102, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN }, - { 104, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN }, - { 116, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM }, - { 119, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM }, - { 121, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_SYSTEM }, - { 170, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM|FILE_ATTRIBUTE_HIDDEN }, - { 173, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN|FILE_ATTRIBUTE_SYSTEM }, - { 227, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN }, - { 230, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_HIDDEN }, - { 232, FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_HIDDEN }, - { 244, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM }, - { 247, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_SYSTEM }, - { 249, FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_SYSTEM, FILE_ATTRIBUTE_ARCHIVE|FILE_ATTRIBUTE_READONLY|FILE_ATTRIBUTE_SYSTEM } -}; - -static BOOL run_openattrtest(int dummy) -{ - static struct cli_state *cli1; - const char *fname = "\\openattr.file"; - int fnum1; - BOOL correct = True; - uint16 attr; - unsigned int i, j, k, l; + /* FILE_SUPERSEDE && FILE_OVERWRITE_IF have the same effect here. */ + fnum1 = cli_nt_create_full(&cli1, fname,FILE_READ_DATA, FILE_ATTRIBUTE_HIDDEN|FILE_ATTRIBUTE_NORMAL, + FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0); - printf("starting open attr test\n"); - - if (!torture_open_connection(&cli1)) { + if (fnum1 == -1) { + printf("test 8 open 2 of %s failed (%s)\n", fname, cli_errstr(&cli1)); return False; } - - cli_sockopt(cli1, sockops); - for (k = 0, i = 0; i < sizeof(open_attrs_table)/sizeof(uint32); i++) { - cli_setatr(cli1, fname, 0, 0); - cli_unlink(cli1, fname); - fnum1 = cli_nt_create_full(cli1, fname,FILE_WRITE_DATA, open_attrs_table[i], - FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0); + if (!cli_close(&cli1, fnum1)) { + printf("test 8 close 2 of %s failed (%s)\n", fname, cli_errstr(&cli1)); + return False; + } - if (fnum1 == -1) { - printf("open %d (1) of %s failed (%s)\n", i, fname, cli_errstr(cli1)); - return False; - } + /* This open should fail with ACCESS_DENIED for FILE_SUPERSEDE, FILE_OVERWRITE and FILE_OVERWRITE_IF. */ + fnum1 = cli_nt_create_full(&cli1, fname,FILE_READ_DATA, FILE_ATTRIBUTE_NORMAL, + FILE_SHARE_NONE, FILE_OVERWRITE, 0); - if (!cli_close(cli1, fnum1)) { - printf("close %d (1) of %s failed (%s)\n", i, fname, cli_errstr(cli1)); - return False; + if (fnum1 != -1) { + printf("test 8 open 3 of %s succeeded - should have failed with (NT_STATUS_ACCESS_DENIED)\n", fname); + correct = False; + cli_close(&cli1, fnum1); + } else { + if (check_error(__LINE__, &cli1, ERRDOS, ERRnoaccess, NT_STATUS_ACCESS_DENIED)) { + printf("correct error code NT_STATUS_ACCESS_DENIED/ERRDOS:ERRnoaccess returned\n"); } + } - for (j = 0; j < sizeof(open_attrs_table)/sizeof(uint32); j++) { - fnum1 = cli_nt_create_full(cli1, fname,FILE_READ_DATA|FILE_WRITE_DATA, open_attrs_table[j], - FILE_SHARE_NONE, FILE_OVERWRITE, 0); - - if (fnum1 == -1) { - for (l = 0; l < sizeof(attr_results)/sizeof(struct trunc_open_results); l++) { - if (attr_results[l].num == k) { - printf("[%d] trunc open 0x%x -> 0x%x of %s failed - should have succeeded !(0x%x:%s)\n", - k, open_attrs_table[i], - open_attrs_table[j], - fname, NT_STATUS_V(cli_nt_error(cli1)), cli_errstr(cli1)); - correct = False; - } - } - if (NT_STATUS_V(cli_nt_error(cli1)) != NT_STATUS_V(NT_STATUS_ACCESS_DENIED)) { - printf("[%d] trunc open 0x%x -> 0x%x failed with wrong error code %s\n", - k, open_attrs_table[i], open_attrs_table[j], - cli_errstr(cli1)); - correct = False; - } -#if 0 - printf("[%d] trunc open 0x%x -> 0x%x failed\n", k, open_attrs_table[i], open_attrs_table[j]); -#endif - k++; - continue; - } + printf("Attribute open test #8 %s.\n", correct ? "passed" : "failed"); - if (!cli_close(cli1, fnum1)) { - printf("close %d (2) of %s failed (%s)\n", j, fname, cli_errstr(cli1)); - return False; - } + cli_unlink(&cli1, fname); - if (!cli_getatr(cli1, fname, &attr, NULL, NULL)) { - printf("getatr(2) failed (%s)\n", cli_errstr(cli1)); - return False; - } + /* + * Test #9. Open with NORMAL, close, then re-open with attribute + * HIDDEN and request to truncate. + */ -#if 0 - printf("[%d] getatr check [0x%x] trunc [0x%x] got attr 0x%x\n", - k, open_attrs_table[i], open_attrs_table[j], attr ); -#endif + fnum1 = cli_nt_create_full(&cli1, fname,FILE_WRITE_DATA, FILE_ATTRIBUTE_NORMAL, + FILE_SHARE_NONE, FILE_OVERWRITE_IF, 0); - for (l = 0; l < sizeof(attr_results)/sizeof(struct trunc_open_results); l++) { - if (attr_results[l].num == k) { - if (attr != attr_results[l].result_attr || - open_attrs_table[i] != attr_results[l].init_attr || - open_attrs_table[j] != attr_results[l].trunc_attr) { - printf("getatr check failed. [0x%x] trunc [0x%x] got attr 0x%x, should be 0x%x\n", - open_attrs_table[i], - open_attrs_table[j], - (unsigned int)attr, - attr_results[l].result_attr); - correct = False; - } - break; - } - } - k++; - } + if (fnum1 == -1) { + printf("test 9 open 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); + return False; + } + + if (!cli_close(&cli1, fnum1)) { + printf("test 9 close 1 of %s failed (%s)\n", fname, cli_errstr(&cli1)); + return False; + } + + fnum1 = cli_nt_create_full(&cli1, fname,FILE_READ_DATA|FILE_WRITE_DATA, FILE_ATTRIBUTE_HIDDEN, + FILE_SHARE_NONE, FILE_OVERWRITE, 0); + + if (fnum1 == -1) { + printf("test 9 open 2 of %s failed (%s)\n", fname, cli_errstr(&cli1)); + return False; + } + + if (!cli_close(&cli1, fnum1)) { + printf("test 9 close 2 of %s failed (%s)\n", fname, cli_errstr(&cli1)); + return False; + } + + /* Ensure we have attr hidden. */ + if (!cli_getatr(&cli1, fname, &attr, NULL, NULL)) { + printf("test 9 getatr(2) failed (%s)\n", cli_errstr(&cli1)); + return False; + } + + if (!(attr & FILE_ATTRIBUTE_HIDDEN)) { + printf("test 9 getatr didn't have HIDDEN attribute\n"); + cli_unlink(&cli1, fname); + return False; } - cli_setatr(cli1, fname, 0, 0); - cli_unlink(cli1, fname); + printf("Attribute open test #9 %s.\n", correct ? "passed" : "failed"); - printf("open attr test %s.\n", correct ? "passed" : "failed"); + cli_unlink(&cli1, fname); - if (!torture_close_connection(cli1)) { + if (!torture_close_connection(&cli1)) { + correct = False; + } + if (!torture_close_connection(&cli2)) { correct = False; } + return correct; } @@ -3905,7 +3632,7 @@ static void list_fn(file_info *finfo, const char *name, void *state) static BOOL run_dirtest(int dummy) { int i; - static struct cli_state *cli; + static struct cli_state cli; int fnum; double t1; BOOL correct = True; @@ -3916,25 +3643,25 @@ static BOOL run_dirtest(int dummy) return False; } - cli_sockopt(cli, sockops); + cli_sockopt(&cli, sockops); srandom(0); for (i=0;i 0) { @@ -167,11 +160,11 @@ BOOL torture_casetable(int dummy) if (size/sizeof(int) >= MAX_EQUIVALENCE) { printf("too many chars match?? size=%d c=0x%04x\n", size, c); - cli_close(cli, fnum); + cli_close(&cli, fnum); return False; } - cli_read(cli, fnum, (char *)c2, 0, size); + cli_read(&cli, fnum, (char *)c2, 0, size); printf("%04x: ", c); equiv[c][0] = c; for (i=0; i+------------+ -| first sub | | | | Usage cnt. | -| name | | +-->+------------+ | | length | -| value | | | | next rec. | | | text |------->+-------+ -+-----------+ | | | name rec. |--+ +------------+ | xxxxx | - +------------+ | | value rec. |-------->+------------+ +-------+ - v | +------------+ | Usage cnt. | -+-----------+ | | length | -| next rec. | | | text |------->+-------+ -| first sub |------+ +------------+ | xxxxx | -| name | +-------+ -| value | -+-----------+ - -Greatly simplyfied structure of the nt-registry: -================================================ - -+---------------------------------------------------------------+ -| | -v | -+---------+ +---------->+-----------+ +----->+---------+ | -| "nk" | | | lf-rec. | | | nk-rec. | | -| ID | | | # of keys | | | parent |---+ -| Date | | | 1st key |--+ | .... | -| parent | | +-----------+ +---------+ -| suk-keys|-----+ -| values |--------------------->+----------+ -| SK-rec. |---------------+ | 1. value |--> +----------+ -| class |--+ | +----------+ | vk-rec. | -+---------+ | | | .... | - v | | data |--> +-------+ - +------------+ | +----------+ | xxxxx | - | Class name | | +-------+ - +------------+ | - v - +---------+ +---------+ - +----->| next sk |--->| Next sk |--+ - | +---| prev sk |<---| prev sk | | - | | | .... | | ... | | - | | +---------+ +---------+ | - | | ^ | - | | | | - | +--------------------+ | - +----------------------------------+ - ---------------------------------------------------------------------------- - -Hope this helps.... (Although it was "fun" for me to uncover this things, - it took me several sleepless nights ;) - - B.D. - -*************************************************************************/ - -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include -#include "popt.h" - -static int verbose = 0; - -/* - * These definitions are for the in-memory registry structure. - * It is a tree structure that mimics what you see with tools like regedit - */ - -/* - * DateTime struct for Windows - */ - -typedef struct date_time_s { - unsigned int low, high; -} NTTIME; - -/* - * Definition of a Key. It has a name, classname, date/time last modified, - * sub-keys, values, and a security descriptor - */ - -#define REG_ROOT_KEY 1 -#define REG_SUB_KEY 2 -#define REG_SYM_LINK 3 - -typedef struct reg_key_s { - char *name; /* Name of the key */ - char *class_name; - int type; /* One of REG_ROOT_KEY or REG_SUB_KEY */ - NTTIME last_mod; /* Time last modified */ - struct reg_key_s *owner; - struct key_list_s *sub_keys; - struct val_list_s *values; - struct key_sec_desc_s *security; -} REG_KEY; - -/* - * The KEY_LIST struct lists sub-keys. - */ - -typedef struct key_list_s { - int key_count; - REG_KEY *keys[1]; -} KEY_LIST; - -typedef struct val_key_s { - char *name; - int has_name; - int data_type; - int data_len; - void *data_blk; /* Might want a separate block */ -} VAL_KEY; - -typedef struct val_list_s { - int val_count; - VAL_KEY *vals[1]; -} VAL_LIST; - -#ifndef MAXSUBAUTHS -#define MAXSUBAUTHS 15 -#endif - -typedef struct dom_sid_s { - unsigned char ver, auths; - unsigned char auth[6]; - unsigned int sub_auths[MAXSUBAUTHS]; -} DOM_SID; - -typedef struct ace_struct_s { - unsigned char type, flags; - unsigned int perms; /* Perhaps a better def is in order */ - DOM_SID *trustee; -} ACE; - -typedef struct acl_struct_s { - unsigned short rev, refcnt; - unsigned short num_aces; - ACE *aces[1]; -} ACL; - -typedef struct sec_desc_s { - unsigned int rev, type; - DOM_SID *owner, *group; - ACL *sacl, *dacl; -} SEC_DESC; - -#define SEC_DESC_NON 0 -#define SEC_DESC_RES 1 -#define SEC_DESC_OCU 2 - -typedef struct key_sec_desc_s { - struct key_sec_desc_s *prev, *next; - int ref_cnt; - int state; - SEC_DESC *sec_desc; -} KEY_SEC_DESC; - - -/* - * An API for accessing/creating/destroying items above - */ - -/* - * Iterate over the keys, depth first, calling a function for each key - * and indicating if it is terminal or non-terminal and if it has values. - * - * In addition, for each value in the list, call a value list function - */ - -/* - * There should eventually be one to deal with security keys as well - */ - -typedef int (*key_print_f)(const char *path, char *key_name, char *class_name, - int root, int terminal, int values); - -typedef int (*val_print_f)(const char *path, char *val_name, int val_type, - int data_len, void *data_blk, int terminal, - int first, int last); - -typedef int (*sec_print_f)(SEC_DESC *sec_desc); - -typedef struct regf_struct_s REGF; - -int nt_key_iterator(REGF *regf, REG_KEY *key_tree, int bf, const char *path, - key_print_f key_print, sec_print_f sec_print, - val_print_f val_print); - -int nt_val_list_iterator(REGF *regf, VAL_LIST *val_list, int bf, char *path, - int terminal, val_print_f val_print) -{ - int i; - - if (!val_list) return 1; - - if (!val_print) return 1; - - for (i=0; ival_count; i++) { - if (!val_print(path, val_list->vals[i]->name, val_list->vals[i]->data_type, - val_list->vals[i]->data_len, val_list->vals[i]->data_blk, - terminal, - (i == 0), - (i == val_list->val_count))) { - - return 0; - - } - } - - return 1; -} - -int nt_key_list_iterator(REGF *regf, KEY_LIST *key_list, int bf, - const char *path, - key_print_f key_print, sec_print_f sec_print, - val_print_f val_print) -{ - int i; - - if (!key_list) return 1; - - for (i=0; i< key_list->key_count; i++) { - if (!nt_key_iterator(regf, key_list->keys[i], bf, path, key_print, - sec_print, val_print)) { - return 0; - } - } - return 1; -} - -int nt_key_iterator(REGF *regf, REG_KEY *key_tree, int bf, const char *path, - key_print_f key_print, sec_print_f sec_print, - val_print_f val_print) -{ - int path_len = strlen(path); - char *new_path; - - if (!regf || !key_tree) - return -1; - - /* List the key first, then the values, then the sub-keys */ - - if (key_print) { - - if (!(*key_print)(path, key_tree->name, - key_tree->class_name, - (key_tree->type == REG_ROOT_KEY), - (key_tree->sub_keys == NULL), - (key_tree->values?(key_tree->values->val_count):0))) - return 0; - } - - /* - * If we have a security print routine, call it - * If the security print routine returns false, stop. - */ - if (sec_print) { - if (key_tree->security && !(*sec_print)(key_tree->security->sec_desc)) - return 0; - } - - new_path = (char *)malloc(path_len + 1 + strlen(key_tree->name) + 1); - if (!new_path) return 0; /* Errors? */ - new_path[0] = '\0'; - strcat(new_path, path); - strcat(new_path, "\\"); - strcat(new_path, key_tree->name); - - /* - * Now, iterate through the values in the val_list - */ - - if (key_tree->values && - !nt_val_list_iterator(regf, key_tree->values, bf, new_path, - (key_tree->values!=NULL), - val_print)) { - - free(new_path); - return 0; - } - - /* - * Now, iterate through the keys in the key list - */ - - if (key_tree->sub_keys && - !nt_key_list_iterator(regf, key_tree->sub_keys, bf, new_path, key_print, - sec_print, val_print)) { - free(new_path); - return 0; - } - - free(new_path); - return 1; -} - -/* Make, delete keys */ - -int nt_delete_val_key(VAL_KEY *val_key) -{ - - if (val_key) { - if (val_key->data_blk) free(val_key->data_blk); - free(val_key); - }; - return 1; -} - -int nt_delete_val_list(VAL_LIST *vl) -{ - int i; - - if (vl) { - for (i=0; ival_count; i++) - nt_delete_val_key(vl->vals[i]); - free(vl); - } - return 1; -} - -int nt_delete_reg_key(REG_KEY *key); -int nt_delete_key_list(KEY_LIST *key_list) -{ - int i; - - if (key_list) { - for (i=0; ikey_count; i++) - nt_delete_reg_key(key_list->keys[i]); - free(key_list); - } - return 1; -} - -int nt_delete_sid(DOM_SID *sid) -{ - - if (sid) free(sid); - return 1; - -} - -int nt_delete_ace(ACE *ace) -{ - - if (ace) { - nt_delete_sid(ace->trustee); - free(ace); - } - return 1; - -} - -int nt_delete_acl(ACL *acl) -{ - - if (acl) { - int i; - - for (i=0; inum_aces; i++) - nt_delete_ace(acl->aces[i]); - - free(acl); - } - return 1; -} - -int nt_delete_sec_desc(SEC_DESC *sec_desc) -{ - - if (sec_desc) { - - nt_delete_sid(sec_desc->owner); - nt_delete_sid(sec_desc->group); - nt_delete_acl(sec_desc->sacl); - nt_delete_acl(sec_desc->dacl); - free(sec_desc); - - } - return 1; -} - -int nt_delete_key_sec_desc(KEY_SEC_DESC *key_sec_desc) -{ - - if (key_sec_desc) { - key_sec_desc->ref_cnt--; - if (key_sec_desc->ref_cnt<=0) { - /* - * There should always be a next and prev, even if they point to us - */ - key_sec_desc->next->prev = key_sec_desc->prev; - key_sec_desc->prev->next = key_sec_desc->next; - nt_delete_sec_desc(key_sec_desc->sec_desc); - } - } - return 1; -} - -int nt_delete_reg_key(REG_KEY *key) -{ - - if (key) { - if (key->name) free(key->name); - if (key->class_name) free(key->class_name); - - /* - * Do not delete the owner ... - */ - - if (key->sub_keys) nt_delete_key_list(key->sub_keys); - if (key->values) nt_delete_val_list(key->values); - if (key->security) nt_delete_key_sec_desc(key->security); - free(key); - } - return 1; -} - -/* - * Create/delete key lists and add delete keys to/from a list, count the keys - */ - - -/* - * Create/delete value lists, add/delete values, count them - */ - - -/* - * Create/delete security descriptors, add/delete SIDS, count SIDS, etc. - * We reference count the security descriptors. Any new reference increments - * the ref count. If we modify an SD, we copy the old one, dec the ref count - * and make the change. We also want to be able to check for equality so - * we can reduce the number of SDs in use. - */ - -/* - * Code to parse registry specification from command line or files - * - * Format: - * [cmd:]key:type:value - * - * cmd = a|d|c|add|delete|change|as|ds|cs - * - */ - - -/* - * Load and unload a registry file. - * - * Load, loads it into memory as a tree, while unload sealizes/flattens it - */ - -/* - * Get the starting record for NT Registry file - */ - -/* A map of sk offsets in the regf to KEY_SEC_DESCs for quick lookup etc */ -typedef struct sk_map_s { - int sk_off; - KEY_SEC_DESC *key_sec_desc; -} SK_MAP; - -/* - * Where we keep all the regf stuff for one registry. - * This is the structure that we use to tie the in memory tree etc - * together. By keeping separate structs, we can operate on different - * registries at the same time. - * Currently, the SK_MAP is an array of mapping structure. - * Since we only need this on input and output, we fill in the structure - * as we go on input. On output, we know how many SK items we have, so - * we can allocate the structure as we need to. - * If you add stuff here that is dynamically allocated, add the - * appropriate free statements below. - */ - -#define REGF_REGTYPE_NONE 0 -#define REGF_REGTYPE_NT 1 -#define REGF_REGTYPE_W9X 2 - -#define TTTONTTIME(r, t1, t2) (r)->last_mod_time.low = (t1); \ - (r)->last_mod_time.high = (t2); - -#define REGF_HDR_BLKSIZ 0x1000 - -struct regf_struct_s { - int reg_type; - char *regfile_name, *outfile_name; - int fd; - struct stat sbuf; - char *base; - int modified; - NTTIME last_mod_time; - REG_KEY *root; /* Root of the tree for this file */ - int sk_count, sk_map_size; - SK_MAP *sk_map; -}; - -/* - * Structures for dealing with the on-disk format of the registry - */ - -#define IVAL(buf) ((unsigned int) \ - (unsigned int)*((unsigned char *)(buf)+3)<<24| \ - (unsigned int)*((unsigned char *)(buf)+2)<<16| \ - (unsigned int)*((unsigned char *)(buf)+1)<<8| \ - (unsigned int)*((unsigned char *)(buf)+0)) - -#define SVAL(buf) ((unsigned short) \ - (unsigned short)*((unsigned char *)(buf)+1)<<8| \ - (unsigned short)*((unsigned char *)(buf)+0)) - -#define CVAL(buf) ((unsigned char)*((unsigned char *)(buf))) - -#define OFF(f) ((f) + REGF_HDR_BLKSIZ + 4) -#define LOCN(base, f) ((base) + OFF(f)) - -/* - * All of the structures below actually have a four-byte lenght before them - * which always seems to be negative. The following macro retrieves that - * size as an integer - */ - -#define BLK_SIZE(b) ((int)*(int *)(((int *)b)-1)) - -typedef unsigned int DWORD; -typedef unsigned short WORD; - -#define REG_REGF_ID 0x66676572 - -typedef struct regf_block { - DWORD REGF_ID; /* regf */ - DWORD uk1; - DWORD uk2; - DWORD tim1, tim2; - DWORD uk3; /* 1 */ - DWORD uk4; /* 3 */ - DWORD uk5; /* 0 */ - DWORD uk6; /* 1 */ - DWORD first_key; /* offset */ - unsigned int dblk_size; - DWORD uk7[116]; /* 1 */ - DWORD chksum; -} REGF_HDR; - -typedef struct hbin_sub_struct { - DWORD dblocksize; - char data[1]; -} HBIN_SUB_HDR; - -#define REG_HBIN_ID 0x6E696268 - -typedef struct hbin_struct { - DWORD HBIN_ID; /* hbin */ - DWORD next_off; - DWORD prev_off; - DWORD uk1; - DWORD uk2; - DWORD uk3; - DWORD uk4; - DWORD blk_size; - HBIN_SUB_HDR hbin_sub_hdr; -} HBIN_HDR; - -#define REG_NK_ID 0x6B6E - -typedef struct nk_struct { - WORD NK_ID; - WORD type; - DWORD t1, t2; - DWORD uk1; - DWORD own_off; - DWORD subk_num; - DWORD uk2; - DWORD lf_off; - DWORD uk3; - DWORD val_cnt; - DWORD val_off; - DWORD sk_off; - DWORD clsnam_off; - DWORD unk4[4]; - DWORD unk5; - WORD nam_len; - WORD clsnam_len; - char key_nam[1]; /* Actual length determined by nam_len */ -} NK_HDR; - -#define REG_SK_ID 0x6B73 - -typedef struct sk_struct { - WORD SK_ID; - WORD uk1; - DWORD prev_off; - DWORD next_off; - DWORD ref_cnt; - DWORD rec_size; - char sec_desc[1]; -} SK_HDR; - -typedef struct ace_struct { - unsigned char type; - unsigned char flags; - unsigned short length; - unsigned int perms; - DOM_SID trustee; -} REG_ACE; - -typedef struct acl_struct { - WORD rev; - WORD size; - DWORD num_aces; - REG_ACE *aces; /* One or more ACEs */ -} REG_ACL; - -typedef struct sec_desc_rec { - WORD rev; - WORD type; - DWORD owner_off; - DWORD group_off; - DWORD sacl_off; - DWORD dacl_off; -} REG_SEC_DESC; - -typedef struct hash_struct { - DWORD nk_off; - char hash[4]; -} HASH_REC; - -#define REG_LF_ID 0x666C - -typedef struct lf_struct { - WORD LF_ID; - WORD key_count; - struct hash_struct hr[1]; /* Array of hash records, depending on key_count */ -} LF_HDR; - -typedef DWORD VL_TYPE[1]; /* Value list is an array of vk rec offsets */ - -#define REG_VK_ID 0x6B76 - -typedef struct vk_struct { - WORD VK_ID; - WORD nam_len; - DWORD dat_len; /* If top-bit set, offset contains the data */ - DWORD dat_off; - DWORD dat_type; - WORD flag; /* =1, has name, else no name (=Default). */ - WORD unk1; - char dat_name[1]; /* Name starts here ... */ -} VK_HDR; - -#define REG_TYPE_REGSZ 1 -#define REG_TYPE_EXPANDSZ 2 -#define REG_TYPE_BIN 3 -#define REG_TYPE_DWORD 4 -#define REG_TYPE_MULTISZ 7 - -typedef struct _val_str { - unsigned int val; - const char * str; -} VAL_STR; - -const VAL_STR reg_type_names[] = { - { 1, "REG_SZ" }, - { 2, "REG_EXPAND_SZ" }, - { 3, "REG_BIN" }, - { 4, "REG_DWORD" }, - { 7, "REG_MULTI_SZ" }, - { 0, NULL }, -}; - -const char *val_to_str(unsigned int val, const VAL_STR *val_array) -{ - int i = 0; - - if (!val_array) return NULL; - - while (val_array[i].val && val_array[i].str) { - - if (val_array[i].val == val) return val_array[i].str; - i++; - - } - - return NULL; - -} - -/* - * Convert from UniCode to Ascii ... Does not take into account other lang - * Restrict by ascii_max if > 0 - */ -int uni_to_ascii(unsigned char *uni, unsigned char *ascii, int ascii_max, - int uni_max) -{ - int i = 0; - - while (i < ascii_max && !(!uni[i*2] && !uni[i*2+1])) { - if (uni_max > 0 && (i*2) >= uni_max) break; - ascii[i] = uni[i*2]; - i++; - - } - - ascii[i] = '\0'; - - return i; -} - -/* - * Convert a data value to a string for display - */ -int data_to_ascii(unsigned char *datap, int len, int type, char *ascii, int ascii_max) -{ - unsigned char *asciip; - int i; - - switch (type) { - case REG_TYPE_REGSZ: - fprintf(stderr, "Len: %d\n", len); - return uni_to_ascii(datap, ascii, len, ascii_max); - break; - - case REG_TYPE_EXPANDSZ: - return uni_to_ascii(datap, ascii, len, ascii_max); - break; - - case REG_TYPE_BIN: - asciip = ascii; - for (i=0; (i 0) - *asciip = ' '; asciip++; - } - *asciip = '\0'; - return ((int)asciip - (int)ascii); - break; - - case REG_TYPE_DWORD: - if (*(int *)datap == 0) - return snprintf(ascii, ascii_max, "0"); - else - return snprintf(ascii, ascii_max, "0x%x", *(int *)datap); - break; - - case REG_TYPE_MULTISZ: - - break; - - default: - return 0; - break; - } - - return len; - -} - -REG_KEY *nt_get_key_tree(REGF *regf, NK_HDR *nk_hdr, int size); - -int nt_set_regf_input_file(REGF *regf, char *filename) -{ - return ((regf->regfile_name = strdup(filename)) != NULL); -} - -int nt_set_regf_output_file(REGF *regf, char *filename) -{ - return ((regf->outfile_name = strdup(filename)) != NULL); -} - -/* Create a regf structure and init it */ - -REGF *nt_create_regf(void) -{ - REGF *tmp = (REGF *)malloc(sizeof(REGF)); - if (!tmp) return tmp; - bzero(tmp, sizeof(REGF)); - return tmp; -} - -/* Free all the bits and pieces ... Assumes regf was malloc'd */ -/* If you add stuff to REGF, add the relevant free bits here */ -int nt_free_regf(REGF *regf) -{ - if (!regf) return 0; - - if (regf->regfile_name) free(regf->regfile_name); - if (regf->outfile_name) free(regf->outfile_name); - - /* Free the mmap'd area */ - - if (regf->base) munmap(regf->base, regf->sbuf.st_size); - regf->base = NULL; - close(regf->fd); /* Ignore the error :-) */ - - nt_delete_reg_key(regf->root); /* Free the tree */ - free(regf->sk_map); - regf->sk_count = regf->sk_map_size = 0; - - free(regf); - - return 1; -} - -/* Get the header of the registry. Return a pointer to the structure - * If the mmap'd area has not been allocated, then mmap the input file - */ -REGF_HDR *nt_get_regf_hdr(REGF *regf) -{ - if (!regf) - return NULL; /* What about errors */ - - if (!regf->regfile_name) - return NULL; /* What about errors */ - - if (!regf->base) { /* Try to mmap etc the file */ - - if ((regf->fd = open(regf->regfile_name, O_RDONLY, 0000)) <0) { - return NULL; /* What about errors? */ - } - - if (fstat(regf->fd, ®f->sbuf) < 0) { - return NULL; - } - - regf->base = mmap(0, regf->sbuf.st_size, PROT_READ, MAP_SHARED, regf->fd, 0); - - if ((int)regf->base == 1) { - fprintf(stderr, "Could not mmap file: %s, %s\n", regf->regfile_name, - strerror(errno)); - return NULL; - } - } - - /* - * At this point, regf->base != NULL, and we should be able to read the - * header - */ - - assert(regf->base != NULL); - - return (REGF_HDR *)regf->base; -} - -/* - * Validate a regf header - * For now, do nothing, but we should check the checksum - */ -int valid_regf_hdr(REGF_HDR *regf_hdr) -{ - if (!regf_hdr) return 0; - - return 1; -} - -/* - * Process an SK header ... - * Every time we see a new one, add it to the map. Otherwise, just look it up. - * We will do a simple linear search for the moment, since many KEYs have the - * same security descriptor. - * We allocate the map in increments of 10 entries. - */ - -/* - * Create a new entry in the map, and increase the size of the map if needed - */ - -SK_MAP *alloc_sk_map_entry(REGF *regf, KEY_SEC_DESC *tmp, int sk_off) -{ - if (!regf->sk_map) { /* Allocate a block of 10 */ - regf->sk_map = (SK_MAP *)malloc(sizeof(SK_MAP) * 10); - if (!regf->sk_map) { - free(tmp); - return NULL; - } - regf->sk_map_size = 10; - regf->sk_count = 1; - (regf->sk_map)[0].sk_off = sk_off; - (regf->sk_map)[0].key_sec_desc = tmp; - } - else { /* Simply allocate a new slot, unless we have to expand the list */ - int ndx = regf->sk_count; - if (regf->sk_count >= regf->sk_map_size) { - regf->sk_map = (SK_MAP *)realloc(regf->sk_map, - (regf->sk_map_size + 10)*sizeof(SK_MAP)); - if (!regf->sk_map) { - free(tmp); - return NULL; - } - /* - * ndx already points at the first entry of the new block - */ - regf->sk_map_size += 10; - } - (regf->sk_map)[ndx].sk_off = sk_off; - (regf->sk_map)[ndx].key_sec_desc = tmp; - regf->sk_count++; - } - return regf->sk_map; -} - -/* - * Search for a KEY_SEC_DESC in the sk_map, but dont create one if not - * found - */ - -KEY_SEC_DESC *lookup_sec_key(SK_MAP *sk_map, int count, int sk_off) -{ - int i; - - if (!sk_map) return NULL; - - for (i = 0; i < count; i++) { - - if (sk_map[i].sk_off == sk_off) - return sk_map[i].key_sec_desc; - - } - - return NULL; - -} - -/* - * Allocate a KEY_SEC_DESC if we can't find one in the map - */ - -KEY_SEC_DESC *lookup_create_sec_key(REGF *regf, SK_MAP *sk_map, int sk_off) -{ - KEY_SEC_DESC *tmp = lookup_sec_key(regf->sk_map, regf->sk_count, sk_off); - - if (tmp) { - return tmp; - } - else { /* Allocate a new one */ - tmp = (KEY_SEC_DESC *)malloc(sizeof(KEY_SEC_DESC)); - if (!tmp) { - return NULL; - } - tmp->state = SEC_DESC_RES; - if (!alloc_sk_map_entry(regf, tmp, sk_off)) { - return NULL; - } - return tmp; - } -} - -/* - * Allocate storage and duplicate a SID - * We could allocate the SID to be only the size needed, but I am too lazy. - */ -DOM_SID *dup_sid(DOM_SID *sid) -{ - DOM_SID *tmp = (DOM_SID *)malloc(sizeof(DOM_SID)); - int i; - - if (!tmp) return NULL; - tmp->ver = sid->ver; - tmp->auths = sid->auths; - for (i=0; i<6; i++) { - tmp->auth[i] = sid->auth[i]; - } - for (i=0; iauths&&isub_auths[i] = sid->sub_auths[i]; - } - return tmp; -} - -/* - * Allocate space for an ACE and duplicate the registry encoded one passed in - */ -ACE *dup_ace(REG_ACE *ace) -{ - ACE *tmp = NULL; - - tmp = (ACE *)malloc(sizeof(ACE)); - - if (!tmp) return NULL; - - tmp->type = CVAL(&ace->type); - tmp->flags = CVAL(&ace->flags); - tmp->perms = IVAL(&ace->perms); - tmp->trustee = dup_sid(&ace->trustee); - return tmp; -} - -/* - * Allocate space for an ACL and duplicate the registry encoded one passed in - */ -ACL *dup_acl(REG_ACL *acl) -{ - ACL *tmp = NULL; - REG_ACE* ace; - int i, num_aces; - - num_aces = IVAL(&acl->num_aces); - - tmp = (ACL *)malloc(sizeof(ACL) + (num_aces - 1)*sizeof(ACE *)); - if (!tmp) return NULL; - - tmp->num_aces = num_aces; - tmp->refcnt = 1; - tmp->rev = SVAL(&acl->rev); - ace = (REG_ACE *)&acl->aces; - for (i=0; iaces[i] = dup_ace(ace); - ace = (REG_ACE *)((char *)ace + SVAL(&ace->length)); - /* XXX: FIXME, should handle malloc errors */ - } - - return tmp; -} - -SEC_DESC *process_sec_desc(REGF *regf, REG_SEC_DESC *sec_desc) -{ - SEC_DESC *tmp = NULL; - - tmp = (SEC_DESC *)malloc(sizeof(SEC_DESC)); - - if (!tmp) { - return NULL; - } - - tmp->rev = SVAL(&sec_desc->rev); - tmp->type = SVAL(&sec_desc->type); - tmp->owner = dup_sid((DOM_SID *)((char *)sec_desc + IVAL(&sec_desc->owner_off))); - if (!tmp->owner) { - free(tmp); - return NULL; - } - tmp->group = dup_sid((DOM_SID *)((char *)sec_desc + IVAL(&sec_desc->group_off))); - if (!tmp->group) { - free(tmp); - return NULL; - } - - /* Now pick up the SACL and DACL */ - - if (sec_desc->sacl_off) - tmp->sacl = dup_acl((REG_ACL *)((char *)sec_desc + IVAL(&sec_desc->sacl_off))); - else - tmp->sacl = NULL; - - if (sec_desc->dacl_off) - tmp->dacl = dup_acl((REG_ACL *)((char *)sec_desc + IVAL(&sec_desc->dacl_off))); - else - tmp->dacl = NULL; - - return tmp; -} - -KEY_SEC_DESC *process_sk(REGF *regf, SK_HDR *sk_hdr, int sk_off, int size) -{ - KEY_SEC_DESC *tmp = NULL; - int sk_next_off, sk_prev_off, sk_size; - REG_SEC_DESC *sec_desc; - - if (!sk_hdr) return NULL; - - if (SVAL(&sk_hdr->SK_ID) != REG_SK_ID) { - fprintf(stderr, "Unrecognized SK Header ID: %08X, %s\n", (int)sk_hdr, - regf->regfile_name); - return NULL; - } - - if (-size < (sk_size = IVAL(&sk_hdr->rec_size))) { - fprintf(stderr, "Incorrect SK record size: %d vs %d. %s\n", - -size, sk_size, regf->regfile_name); - return NULL; - } - - /* - * Now, we need to look up the SK Record in the map, and return it - * Since the map contains the SK_OFF mapped to KEY_SEC_DESC, we can - * use that - */ - - if (regf->sk_map && - ((tmp = lookup_sec_key(regf->sk_map, regf->sk_count, sk_off)) != NULL) - && (tmp->state == SEC_DESC_OCU)) { - tmp->ref_cnt++; - return tmp; - } - - /* Here, we have an item in the map that has been reserved, or tmp==NULL. */ - - assert(tmp == NULL || (tmp && tmp->state != SEC_DESC_NON)); - - /* - * Now, allocate a KEY_SEC_DESC, and parse the structure here, and add the - * new KEY_SEC_DESC to the mapping structure, since the offset supplied is - * the actual offset of structure. The same offset will be used by all - * all future references to this structure - * We chould put all this unpleasantness in a function. - */ - - if (!tmp) { - tmp = (KEY_SEC_DESC *)malloc(sizeof(KEY_SEC_DESC)); - if (!tmp) return NULL; - bzero(tmp, sizeof(KEY_SEC_DESC)); - - /* - * Allocate an entry in the SK_MAP ... - * We don't need to free tmp, because that is done for us if the - * sm_map entry can't be expanded when we need more space in the map. - */ - - if (!alloc_sk_map_entry(regf, tmp, sk_off)) { - return NULL; - } - } - - tmp->ref_cnt++; - tmp->state = SEC_DESC_OCU; - - /* - * Now, process the actual sec desc and plug the values in - */ - - sec_desc = (REG_SEC_DESC *)&sk_hdr->sec_desc[0]; - tmp->sec_desc = process_sec_desc(regf, sec_desc); - - /* - * Now forward and back links. Here we allocate an entry in the sk_map - * if it does not exist, and mark it reserved - */ - - sk_prev_off = IVAL(&sk_hdr->prev_off); - tmp->prev = lookup_create_sec_key(regf, regf->sk_map, sk_prev_off); - assert(tmp->prev != NULL); - sk_next_off = IVAL(&sk_hdr->next_off); - tmp->next = lookup_create_sec_key(regf, regf->sk_map, sk_next_off); - assert(tmp->next != NULL); - - return tmp; -} - -/* - * Process a VK header and return a value - */ -VAL_KEY *process_vk(REGF *regf, VK_HDR *vk_hdr, int size) -{ - char val_name[1024]; - int nam_len, dat_len, flag, dat_type, dat_off, vk_id; - const char *val_type; - VAL_KEY *tmp = NULL; - - if (!vk_hdr) return NULL; - - if ((vk_id = SVAL(&vk_hdr->VK_ID)) != REG_VK_ID) { - fprintf(stderr, "Unrecognized VK header ID: %0X, block: %0X, %s\n", - vk_id, (int)vk_hdr, regf->regfile_name); - return NULL; - } - - nam_len = SVAL(&vk_hdr->nam_len); - val_name[nam_len] = '\0'; - flag = SVAL(&vk_hdr->flag); - dat_type = IVAL(&vk_hdr->dat_type); - dat_len = IVAL(&vk_hdr->dat_len); /* If top bit, offset contains data */ - dat_off = IVAL(&vk_hdr->dat_off); - - tmp = (VAL_KEY *)malloc(sizeof(VAL_KEY)); - if (!tmp) { - goto error; - } - bzero(tmp, sizeof(VAL_KEY)); - tmp->has_name = flag; - tmp->data_type = dat_type; - - if (flag & 0x01) { - strncpy(val_name, vk_hdr->dat_name, nam_len); - tmp->name = strdup(val_name); - if (!tmp->name) { - goto error; - } - } - else - strncpy(val_name, "", 10); - - /* - * Allocate space and copy the data as a BLOB - */ - - if (dat_len) { - - char *dtmp = (char *)malloc(dat_len&0x7FFFFFFF); - - if (!dtmp) { - goto error; - } - - tmp->data_blk = dtmp; - - if ((dat_len&0x80000000) == 0) { /* The data is pointed to by the offset */ - char *dat_ptr = LOCN(regf->base, dat_off); - bcopy(dat_ptr, dtmp, dat_len); - } - else { /* The data is in the offset */ - dat_len = dat_len & 0x7FFFFFFF; - bcopy(&dat_off, dtmp, dat_len); - } - - tmp->data_len = dat_len; - } - - val_type = val_to_str(dat_type, reg_type_names); - - /* - * We need to save the data area as well - */ - - if (verbose) fprintf(stdout, " %s : %s : \n", val_name, val_type); - - return tmp; - - error: - /* XXX: FIXME, free the partially allocated struct */ - return NULL; - -} - -/* - * Process a VL Header and return a list of values - */ -VAL_LIST *process_vl(REGF *regf, VL_TYPE vl, int count, int size) -{ - int i, vk_off; - VK_HDR *vk_hdr; - VAL_LIST *tmp = NULL; - - if (!vl) return NULL; - - if (-size < (count+1)*sizeof(int)){ - fprintf(stderr, "Error in VL header format. Size less than space required. %d\n", -size); - return NULL; - } - - tmp = (VAL_LIST *)malloc(sizeof(VAL_LIST) + (count - 1) * sizeof(VAL_KEY *)); - if (!tmp) { - goto error; - } - - for (i=0; ibase, vk_off); - tmp->vals[i] = process_vk(regf, vk_hdr, BLK_SIZE(vk_hdr)); - if (!tmp->vals[i]){ - goto error; - } - } - - tmp->val_count = count; - - return tmp; - - error: - /* XXX: FIXME, free the partially allocated structure */ - return NULL; -} - -/* - * Process an LF Header and return a list of sub-keys - */ -KEY_LIST *process_lf(REGF *regf, LF_HDR *lf_hdr, int size) -{ - int count, i, nk_off; - unsigned int lf_id; - KEY_LIST *tmp; - - if (!lf_hdr) return NULL; - - if ((lf_id = SVAL(&lf_hdr->LF_ID)) != REG_LF_ID) { - fprintf(stderr, "Unrecognized LF Header format: %0X, Block: %0X, %s.\n", - lf_id, (int)lf_hdr, regf->regfile_name); - return NULL; - } - - assert(size < 0); - - count = SVAL(&lf_hdr->key_count); - - if (count <= 0) return NULL; - - /* Now, we should allocate a KEY_LIST struct and fill it in ... */ - - tmp = (KEY_LIST *)malloc(sizeof(KEY_LIST) + (count - 1) * sizeof(REG_KEY *)); - if (!tmp) { - goto error; - } - - tmp->key_count = count; - - for (i=0; ihr[i].nk_off); - nk_hdr = (NK_HDR *)LOCN(regf->base, nk_off); - tmp->keys[i] = nt_get_key_tree(regf, nk_hdr, BLK_SIZE(nk_hdr)); - if (!tmp->keys[i]) { - goto error; - } - } - - return tmp; - - error: - /* XXX: FIXME, free the partially allocated structure */ - return NULL; -} - -/* - * This routine is passed a NK_HDR pointer and retrieves the entire tree - * from there down. It return a REG_KEY *. - */ -REG_KEY *nt_get_key_tree(REGF *regf, NK_HDR *nk_hdr, int size) -{ - REG_KEY *tmp = NULL; - int name_len, clsname_len, lf_off, val_off, val_count, sk_off; - unsigned int nk_id; - LF_HDR *lf_hdr; - VL_TYPE *vl; - SK_HDR *sk_hdr; - char key_name[1024], cls_name[1024]; - - if (!nk_hdr) return NULL; - - if ((nk_id = SVAL(&nk_hdr->NK_ID)) != REG_NK_ID) { - fprintf(stderr, "Unrecognized NK Header format: %08X, Block: %0X. %s\n", - nk_id, (int)nk_hdr, regf->regfile_name); - return NULL; - } - - assert(size < 0); - - name_len = SVAL(&nk_hdr->nam_len); - clsname_len = SVAL(&nk_hdr->clsnam_len); - - /* - * The value of -size should be ge - * (sizeof(NK_HDR) - 1 + name_len) - * The -1 accounts for the fact that we included the first byte of - * the name in the structure. clsname_len is the length of the thing - * pointed to by clsnam_off - */ - - if (-size < (sizeof(NK_HDR) - 1 + name_len)) { - fprintf(stderr, "Incorrect NK_HDR size: %d, %0X\n", -size, (int)nk_hdr); - fprintf(stderr, "Sizeof NK_HDR: %d, name_len %d, clsname_len %d\n", - sizeof(NK_HDR), name_len, clsname_len); - /*return NULL;*/ - } - - if (verbose) fprintf(stdout, "NK HDR: Name len: %d, class name len: %d\n", - name_len, clsname_len); - - /* Fish out the key name and process the LF list */ - - assert(name_len < sizeof(key_name)); - - /* Allocate the key struct now */ - tmp = (REG_KEY *)malloc(sizeof(REG_KEY)); - if (!tmp) return tmp; - bzero(tmp, sizeof(REG_KEY)); - - tmp->type = (SVAL(&nk_hdr->type)==0x2C?REG_ROOT_KEY:REG_SUB_KEY); - - strncpy(key_name, nk_hdr->key_nam, name_len); - key_name[name_len] = '\0'; - - if (verbose) fprintf(stdout, "Key name: %s\n", key_name); - - tmp->name = strdup(key_name); - if (!tmp->name) { - goto error; - } - - /* - * Fish out the class name, it is in UNICODE, while the key name is - * ASCII :-) - */ - - if (clsname_len) { /* Just print in Ascii for now */ - char *clsnamep; - int clsnam_off; - - clsnam_off = IVAL(&nk_hdr->clsnam_off); - clsnamep = LOCN(regf->base, clsnam_off); - - bzero(cls_name, clsname_len); - uni_to_ascii(clsnamep, cls_name, sizeof(cls_name), clsname_len); - - /* - * I am keeping class name as an ascii string for the moment. - * That means it needs to be converted on output. - * XXX: FIXME - */ - - tmp->class_name = strdup(cls_name); - if (!tmp->class_name) { - goto error; - } - - if (verbose) fprintf(stdout, " Class Name: %s\n", cls_name); - - } - - /* - * If there are any values, process them here - */ - - val_count = IVAL(&nk_hdr->val_cnt); - - if (val_count) { - - val_off = IVAL(&nk_hdr->val_off); - vl = (VL_TYPE *)LOCN(regf->base, val_off); - - tmp->values = process_vl(regf, *vl, val_count, BLK_SIZE(vl)); - if (!tmp->values) { - goto error; - } - - } - - /* - * Also handle the SK header ... - */ - - sk_off = IVAL(&nk_hdr->sk_off); - sk_hdr = (SK_HDR *)LOCN(regf->base, sk_off); - - if (sk_off != -1) { - - tmp->security = process_sk(regf, sk_hdr, sk_off, BLK_SIZE(sk_hdr)); - - } - - lf_off = IVAL(&nk_hdr->lf_off); - - /* - * No more subkeys if lf_off == -1 - */ - - if (lf_off != -1) { - - lf_hdr = (LF_HDR *)LOCN(regf->base, lf_off); - - tmp->sub_keys = process_lf(regf, lf_hdr, BLK_SIZE(lf_hdr)); - if (!tmp->sub_keys){ - goto error; - } - - } - - return tmp; - - error: - if (tmp) nt_delete_reg_key(tmp); - return NULL; -} - -int nt_load_registry(REGF *regf) -{ - REGF_HDR *regf_hdr; - unsigned int regf_id, hbin_id; - HBIN_HDR *hbin_hdr; - NK_HDR *first_key; - - /* Get the header */ - - if ((regf_hdr = nt_get_regf_hdr(regf)) == NULL) { - return -1; - } - - /* Now process that header and start to read the rest in */ - - if ((regf_id = IVAL(®f_hdr->REGF_ID)) != REG_REGF_ID) { - fprintf(stderr, "Unrecognized NT registry header id: %0X, %s\n", - regf_id, regf->regfile_name); - return -1; - } - - /* - * Validate the header ... - */ - if (!valid_regf_hdr(regf_hdr)) { - fprintf(stderr, "Registry file header does not validate: %s\n", - regf->regfile_name); - return -1; - } - - /* Update the last mod date, and then go get the first NK record and on */ - - TTTONTTIME(regf, IVAL(®f_hdr->tim1), IVAL(®f_hdr->tim2)); - - /* - * The hbin hdr seems to be just uninteresting garbage. Check that - * it is there, but that is all. - */ - - hbin_hdr = (HBIN_HDR *)(regf->base + REGF_HDR_BLKSIZ); - - if ((hbin_id = IVAL(&hbin_hdr->HBIN_ID)) != REG_HBIN_ID) { - fprintf(stderr, "Unrecognized registry hbin hdr ID: %0X, %s\n", - hbin_id, regf->regfile_name); - return -1; - } - - /* - * Get a pointer to the first key from the hreg_hdr - */ - - first_key = (NK_HDR *)LOCN(regf->base, IVAL(®f_hdr->first_key)); - - /* - * Now, get the registry tree by processing that NK recursively - */ - - regf->root = nt_get_key_tree(regf, first_key, BLK_SIZE(first_key)); - - assert(regf->root != NULL); - - return 1; -} - -/* - * Routines to parse a REGEDIT4 file - * - * The file consists of: - * - * REGEDIT4 - * \[[-]key-path\]\n - * * - * - * There can be more than one key-path and value-spec. - * - * Since we want to support more than one type of file format, we - * construct a command-file structure that keeps info about the command file - */ - -#define FMT_UNREC -1 -#define FMT_REGEDIT4 0 -#define FMT_EDITREG1_1 1 - -typedef struct command_s { - int cmd; - char *key; - void *val_spec_list; -} CMD; - -/* - * We seek to offset 0, read in the required number of bytes, - * and compare to the correct value. - * We then seek back to the original location - */ -int regedit4_file_type(int fd) -{ - int cur_ofs = 0; - - cur_ofs = lseek(fd, 0, SEEK_CUR); /* Get current offset */ - if (cur_ofs < 0) { - fprintf(stderr, "Unable to get current offset: %s\n", strerror(errno)); - exit(1); - } - - if (cur_ofs) { - lseek(fd, 0, SEEK_SET); - } - - return FMT_UNREC; -} - -CMD *regedit4_get_cmd(int fd) -{ - return NULL; -} - -int regedit4_exec_cmd(CMD *cmd) -{ - - return 0; -} - -int editreg_1_1_file_type(int fd) -{ - - return FMT_UNREC; -} - -CMD *editreg_1_1_get_cmd(int fd) -{ - return NULL; -} - -int editreg_1_1_exec_cmd(CMD *cmd) -{ - - return -1; -} - -typedef struct command_ops_s { - int type; - int (*file_type)(int fd); - CMD *(*get_cmd)(int fd); - int (*exec_cmd)(CMD *cmd); -} CMD_OPS; - -CMD_OPS default_cmd_ops[] = { - {0, regedit4_file_type, regedit4_get_cmd, regedit4_exec_cmd}, - {1, editreg_1_1_file_type, editreg_1_1_get_cmd, editreg_1_1_exec_cmd}, - {-1, NULL, NULL, NULL} -}; - -typedef struct command_file_s { - char *name; - int type, fd; - CMD_OPS cmd_ops; -} CMD_FILE; - -/* - * Create a new command file structure - */ - -CMD_FILE *cmd_file_create(char *file) -{ - CMD_FILE *tmp; - struct stat sbuf; - int i = 0; - - /* - * Let's check if the file exists ... - * No use creating the cmd_file structure if the file does not exist - */ - - if (stat(file, &sbuf) < 0) { /* Not able to access file */ - - return NULL; - } - - tmp = (CMD_FILE *)malloc(sizeof(CMD_FILE)); - if (!tmp) { - return NULL; - } - - /* - * Let's fill in some of the fields; - */ - - tmp->name = strdup(file); - - if ((tmp->fd = open(file, O_RDONLY, 666)) < 0) { - free(tmp); - return NULL; - } - - /* - * Now, try to find the format by indexing through the table - */ - while (default_cmd_ops[i].type != -1) { - if ((tmp->type = default_cmd_ops[i].file_type(tmp->fd)) >= 0) { - tmp->cmd_ops = default_cmd_ops[i]; - return tmp; - } - i++; - } - - /* - * If we got here, return NULL, as we could not figure out the type - * of command file. - * - * What about errors? - */ - - free(tmp); - return NULL; -} - -/* - * Extract commands from the command file, and execute them. - * We pass a table of command callbacks for that - */ - -/* - * Main code from here on ... - */ - -/* - * key print function here ... - */ - -int print_key(const char *path, char *name, char *class_name, int root, - int terminal, int vals) -{ - - if (terminal) fprintf(stdout, "%s\\%s\n", path, name); - - return 1; -} - -/* - * Sec Desc print functions - */ - -void print_sid(DOM_SID *sid) -{ - int i, comps = sid->auths; - fprintf(stdout, "S-%u-%u", sid->ver, sid->auth[5]); - - for (i = 0; i < comps; i++) { - - fprintf(stdout, "-%u", sid->sub_auths[i]); - - } - fprintf(stdout, "\n"); -} - -int print_sec(SEC_DESC *sec_desc) -{ - - fprintf(stdout, " SECURITY\n"); - fprintf(stdout, " Owner: "); - print_sid(sec_desc->owner); - fprintf(stdout, " Group: "); - print_sid(sec_desc->group); - return 1; -} - -/* - * Value print function here ... - */ -int print_val(const char *path, char *val_name, int val_type, int data_len, - void *data_blk, int terminal, int first, int last) -{ - char data_asc[1024]; - - bzero(data_asc, sizeof(data_asc)); - if (!terminal && first) - fprintf(stdout, "%s\n", path); - data_to_ascii((unsigned char *)data_blk, data_len, val_type, data_asc, - sizeof(data_asc) - 1); - fprintf(stdout, " %s : %s : %s\n", (val_name?val_name:""), - val_to_str(val_type, reg_type_names), data_asc); - return 1; -} - -int main(int argc, char *argv[]) -{ - REGF *regf; - int opt; - static char *cmd_file = NULL; - poptContext pc; - struct poptOption long_options[] = { - POPT_AUTOHELP - { "verbose", 'v', POPT_ARG_NONE, NULL, 'v', "Sets verbose mode" }, - { "command-file", 'c', POPT_ARG_STRING, &cmd_file, 'c', "Specifies a command file" }, - { 0, 0, 0, 0 } - }; - - pc = poptGetContext("editreg", argc, (const char **)argv, long_options, - POPT_CONTEXT_KEEP_FIRST); - - poptSetOtherOptionHelp(pc, ""); - - while((opt = poptGetNextOpt(pc)) != -1) - switch(opt) { - case 'v': - verbose++; - break; - } - - poptGetArg(pc); /* For argv[0] */ - - if (!poptPeekArg(pc)) { - poptPrintUsage(pc, stderr, 0); - exit(1); - } - - if ((regf = nt_create_regf()) == NULL) { - fprintf(stderr, "Could not create registry object: %s\n", strerror(errno)); - exit(2); - } - - if (!nt_set_regf_input_file(regf, poptPeekArg(pc))) { - fprintf(stderr, "Could not set name of registry file: %s, %s\n", - poptPeekArg(pc), strerror(errno)); - exit(3); - } - - /* Now, open it, and bring it into memory :-) */ - - if (nt_load_registry(regf) < 0) { - fprintf(stderr, "Could not load registry: %s\n", poptPeekArg(pc)); - exit(4); - } - - /* - * At this point, we should have a registry in memory and should be able - * to iterate over it. - */ - - nt_key_iterator(regf, regf->root, 0, "", print_key, print_sec, print_val); - poptFreeContext(pc); - return 0; -} diff --git a/source3/utils/net.c b/source3/utils/net.c index 3ab34e7aa9a..7588771fbc3 100644 --- a/source3/utils/net.c +++ b/source3/utils/net.c @@ -78,6 +78,8 @@ static int opt_machine_pass = 0; BOOL opt_have_ip = False; struct in_addr opt_dest_ip; +extern BOOL AllowDebugChange; + /* run a function from a function table. If not found then call the specified usage function @@ -511,14 +513,18 @@ static struct functable net_func[] = { int argc_new = 0; const char ** argv_new; poptContext pc; + static char *servicesf = dyn_CONFIGFILE; + static char *debuglevel = NULL; struct poptOption long_options[] = { {"help", 'h', POPT_ARG_NONE, 0, 'h'}, {"workgroup", 'w', POPT_ARG_STRING, &opt_target_workgroup}, + {"myworkgroup", 'W', POPT_ARG_STRING, &opt_workgroup}, {"user", 'U', POPT_ARG_STRING, &opt_user_name, 'U'}, {"ipaddress", 'I', POPT_ARG_STRING, 0,'I'}, {"port", 'p', POPT_ARG_INT, &opt_port}, {"myname", 'n', POPT_ARG_STRING, &opt_requester_name}, + {"conf", 's', POPT_ARG_STRING, &servicesf}, {"server", 'S', POPT_ARG_STRING, &opt_host}, {"container", 'c', POPT_ARG_STRING, &opt_container}, {"comment", 'C', POPT_ARG_STRING, &opt_comment}, @@ -530,8 +536,8 @@ static struct functable net_func[] = { {"force", 'f', POPT_ARG_NONE, &opt_force}, {"timeout", 't', POPT_ARG_INT, &opt_timeout}, {"machine-pass",'P', POPT_ARG_NONE, &opt_machine_pass}, - {"myworkgroup", 'W', POPT_ARG_STRING, &opt_workgroup}, - POPT_COMMON_SAMBA + {"debuglevel", 'd', POPT_ARG_STRING, &debuglevel}, + {NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_version}, { 0, 0, 0, 0} }; @@ -571,8 +577,13 @@ static struct functable net_func[] = { exit(1); } } - - lp_load(dyn_CONFIGFILE,True,False,False); + + if (debuglevel) { + debug_parse_levels(debuglevel); + AllowDebugChange = False; + } + + lp_load(servicesf,True,False,False); argv_new = (const char **)poptGetArgs(pc); @@ -625,10 +636,6 @@ static struct functable net_func[] = { exit(1); } } - - if (!opt_password) { - opt_password = getenv("PASSWD"); - } rc = net_run_function(argc_new-1, argv_new+1, net_func, net_help); diff --git a/source3/utils/net_ads.c b/source3/utils/net_ads.c index 0f2d673b4bf..b4697d73dd7 100644 --- a/source3/utils/net_ads.c +++ b/source3/utils/net_ads.c @@ -124,7 +124,6 @@ static ADS_STRUCT *ads_startup(void) ADS_STATUS status; BOOL need_password = False; BOOL second_time = False; - char *realm; ads = ads_init(NULL, NULL, opt_host); @@ -151,16 +150,6 @@ retry: ads->auth.user_name = strdup(opt_user_name); - /* - * If the username is of the form "name@realm", - * extract the realm and convert to upper case. - */ - if ((realm = strchr(ads->auth.user_name, '@'))) { - *realm++ = '\0'; - ads->auth.realm = strdup(realm); - strupper(ads->auth.realm); - } - status = ads_connect(ads); if (!ADS_ERR_OK(status)) { if (!need_password && !second_time) { diff --git a/source3/utils/net_help.c b/source3/utils/net_help.c index 07409aec228..4000a248ff6 100644 --- a/source3/utils/net_help.c +++ b/source3/utils/net_help.c @@ -42,12 +42,11 @@ int net_common_flags_usage(int argc, const char **argv) d_printf("Valid miscellaneous options are:\n"); /* misc options */ d_printf("\t-p or --port=\t\tconnection port on target\n"); d_printf("\t-W or --myworkgroup=\tclient workgroup\n"); - d_printf("\t-d or --debuglevel=\t\tdebug level (0-10)\n"); + d_printf("\t-d or --debug=\t\tdebug level (0-10)\n"); d_printf("\t-n or --myname=\t\tclient name\n"); d_printf("\t-U or --user=\t\tuser name\n"); - d_printf("\t-s or --configfile=\t\tpathname of smb.conf file\n"); + d_printf("\t-s or --conf=\t\tpathname of smb.conf file\n"); d_printf("\t-l or --long\t\t\tDisplay full information\n"); - d_printf("\t-V or --version\t\tPrint samba version information\n"); d_printf("\t-P or --machine-pass\t\tAuthenticate as machine account\n"); return -1; } diff --git a/source3/utils/net_rpc.c b/source3/utils/net_rpc.c index 69cf28f9956..922fc027e6c 100644 --- a/source3/utils/net_rpc.c +++ b/source3/utils/net_rpc.c @@ -1880,7 +1880,7 @@ static int rpc_trustdom_list(int argc, const char **argv) int num_domains, i, pad_len, col_len = 20; DOM_SID *domain_sids; char **trusted_dom_names; - fstring pdc_name, dummy; + fstring pdc_name; /* trusting domains listing variables */ POLICY_HND domain_hnd; @@ -1927,10 +1927,8 @@ static int rpc_trustdom_list(int argc, const char **argv) }; /* query info level 5 to obtain sid of a domain being queried */ - nt_status = cli_lsa_query_info_policy( - cli, mem_ctx, &connect_hnd, 5 /* info level */, - dummy, &queried_dom_sid); - + nt_status = cli_lsa_query_info_policy(cli, mem_ctx, &connect_hnd, + 5 /* info level */, domain_name, &queried_dom_sid); if (NT_STATUS_IS_ERR(nt_status)) { DEBUG(0, ("LSA Query Info failed. Returned error was %s\n", nt_errstr(nt_status))); diff --git a/source3/utils/net_rpc_samsync.c b/source3/utils/net_rpc_samsync.c index e42c8f56371..9367404b354 100644 --- a/source3/utils/net_rpc_samsync.c +++ b/source3/utils/net_rpc_samsync.c @@ -364,7 +364,7 @@ sam_account_from_delta(SAM_ACCOUNT *account, SAM_ACCOUNT_INFO *delta) } #if 0 -/* No kickoff time in the delta? */ + /* No kickoff time in the delta? */ if (!nt_time_is_zero(&delta->kickoff_time)) { unix_time = nt_time_to_unix(&delta->kickoff_time); stored_time = pdb_get_kickoff_time(account); diff --git a/source3/utils/nmblookup.c b/source3/utils/nmblookup.c index d2c5cbc00ed..7e0ed4a2030 100644 --- a/source3/utils/nmblookup.c +++ b/source3/utils/nmblookup.c @@ -2,7 +2,6 @@ Unix SMB/CIFS implementation. NBT client - used to lookup netbios names Copyright (C) Andrew Tridgell 1994-1998 - Copyright (C) Jelmer Vernooij 2003 (Conversion to popt) This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -55,6 +54,31 @@ static BOOL open_sockets(void) return True; } + +/**************************************************************************** +usage on the program +****************************************************************************/ +static void usage(void) +{ + d_printf("Usage: nmblookup [options] name\n"); + d_printf("Version %s\n",VERSION); + d_printf("\t-d debuglevel set the debuglevel\n"); + d_printf("\t-B broadcast address the address to use for broadcasts\n"); + d_printf("\t-f list the NMB flags returned\n"); + d_printf("\t-U unicast address the address to use for unicast\n"); + d_printf("\t-M searches for a master browser\n"); + d_printf("\t-R set recursion desired in packet\n"); + d_printf("\t-S lookup node status as well\n"); + d_printf("\t-T translate IP addresses into names\n"); + d_printf("\t-r Use root port 137 (Win95 only replies to this)\n"); + d_printf("\t-A Do a node status on as an IP Address\n"); + d_printf("\t-i NetBIOS scope Use the given NetBIOS scope for name queries\n"); + d_printf("\t-s smb.conf file Use the given path to the smb.conf file\n"); + d_printf("\t-h Print this help message.\n"); + d_printf("\n If you specify -M and name is \"-\", nmblookup looks up __MSBROWSE__<01>\n"); + d_printf("\n"); +} + /**************************************************************************** turn a node status flags field into a string ****************************************************************************/ @@ -187,106 +211,130 @@ int main(int argc,char *argv[]) int opt; unsigned int lookup_type = 0x0; fstring lookup; - static BOOL find_master=False; - static BOOL lookup_by_ip = False; - poptContext pc; - - struct poptOption long_options[] = { - POPT_AUTOHELP - { "broadcast", 'B', POPT_ARG_STRING, NULL, 'B', "Specify address to use for broadcasts", "BROADCAST-ADDRESS" }, - { "flags", 'f', POPT_ARG_VAL, &give_flags, True, "List the NMB flags returned" }, - { "unicast", 'U', POPT_ARG_STRING, NULL, 'U', "Specify address to use for unicast" }, - { "master-browser", 'M', POPT_ARG_VAL, &find_master, True, "Search for a master browser" }, - { "recursion", 'R', POPT_ARG_VAL, &recursion_desired, True, "Set recursion desired in package" }, - { "status", 'S', POPT_ARG_VAL, &find_status, True, "Lookup node status as well" }, - { "translate", 'T', POPT_ARG_NONE, NULL, 'T', "Translate IP addresses into names" }, - { "root-port", 'r', POPT_ARG_VAL, &RootPort, True, "Use root port 137 (Win95 only replies to this)" }, - { "lookup-by-ip", 'A', POPT_ARG_VAL, &lookup_by_ip, True, "Do a node status on as an IP Address" }, - POPT_COMMON_SAMBA - POPT_COMMON_CONNECTION - { 0, 0, 0, 0 } - }; - - *lookup = 0; + extern int optind; + extern char *optarg; + BOOL find_master=False; + int i; + BOOL lookup_by_ip = False; + int commandline_debuglevel = -2; - setup_logging(argv[0],True); + DEBUGLEVEL = 1; + /* Prevent smb.conf setting from overridding */ + AllowDebugChange = False; - pc = poptGetContext("nmblookup", argc, (const char **)argv, long_options, - POPT_CONTEXT_KEEP_FIRST); - - poptSetOtherOptionHelp(pc, " ..."); - - while ((opt = poptGetNextOpt(pc)) != -1) { - switch (opt) { - case 'B': - bcast_addr = *interpret_addr2(poptGetOptArg(pc)); - got_bcast = True; - use_bcast = True; - break; - case 'U': - bcast_addr = *interpret_addr2(poptGetOptArg(pc)); - got_bcast = True; - use_bcast = False; - break; - case 'T': - translate_addresses = !translate_addresses; - break; - } - } + *lookup = 0; - poptGetArg(pc); /* Remove argv[0] */ + setup_logging(argv[0],True); - if(!poptPeekArg(pc)) { - poptPrintUsage(pc, stderr, 0); - exit(1); + while ((opt = getopt(argc, argv, "d:fB:U:i:s:SMrhART")) != EOF) + switch (opt) + { + case 'B': + bcast_addr = *interpret_addr2(optarg); + got_bcast = True; + use_bcast = True; + break; + case 'f': + give_flags = True; + break; + case 'U': + bcast_addr = *interpret_addr2(optarg); + got_bcast = True; + use_bcast = False; + break; + case 'T': + translate_addresses = !translate_addresses; + break; + case 'i': + set_global_scope(optarg); + break; + case 'M': + find_master = True; + break; + case 'S': + find_status = True; + break; + case 'R': + recursion_desired = True; + break; + case 'd': + commandline_debuglevel = DEBUGLEVEL = atoi(optarg); + break; + case 's': + pstrcpy(dyn_CONFIGFILE, optarg); + break; + case 'r': + RootPort = True; + break; + case 'h': + usage(); + exit(0); + break; + case 'A': + lookup_by_ip = True; + break; + default: + usage(); + exit(1); + } + + if (argc < 2) { + usage(); + exit(1); } if (!lp_load(dyn_CONFIGFILE,True,False,False)) { - fprintf(stderr, "Can't load %s - run testparm to debug it\n", dyn_CONFIGFILE); + fprintf(stderr, "Can't load %s - run testparm to debug it\n", dyn_CONFIGFILE); } + /* + * Ensure we reset DEBUGLEVEL if someone specified it + * on the command line. + */ + + if(commandline_debuglevel != -2) + DEBUGLEVEL = commandline_debuglevel; + load_interfaces(); if (!open_sockets()) return(1); - while(poptPeekArg(pc)) + for (i=optind;i 2003 + Copyright (C) Andrew Bartlett 2003 Copyright (C) Francesco Chemolli 2000 This program is free software; you can redistribute it and/or modify @@ -39,17 +39,22 @@ enum squid_mode { extern int winbindd_fd; static const char *helper_protocol; -static const char *opt_username; -static const char *opt_domain; -static const char *opt_workstation; -static const char *opt_password; -static DATA_BLOB opt_challenge; -static DATA_BLOB opt_lm_response; -static DATA_BLOB opt_nt_response; +static const char *username; +static const char *domain; +static const char *workstation; +static const char *hex_challenge; +static const char *hex_lm_response; +static const char *hex_nt_response; +static unsigned char *challenge; +static size_t challenge_len; +static unsigned char *lm_response; +static size_t lm_response_len; +static unsigned char *nt_response; +static size_t nt_response_len; static int request_lm_key; static int request_nt_key; -static int diagnostics; +static char *password; static char winbind_separator(void) { @@ -157,110 +162,58 @@ static BOOL check_plaintext_auth(const char *user, const char *pass, BOOL stdout d_printf("Reading winbind reply failed! (0x01)\n"); } - d_printf("%s: %s (0x%x)\n", + d_printf("%s (0x%x)\n", response.data.auth.nt_status_string, - response.data.auth.error_string, response.data.auth.nt_status); } else { if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) { DEBUG(1, ("Reading winbind reply failed! (0x01)\n")); } - DEBUG(3, ("%s: %s (0x%x)\n", - response.data.auth.nt_status_string, - response.data.auth.error_string, - response.data.auth.nt_status)); + DEBUG(3, ("%s (0x%x)\n", + response.data.auth.nt_status_string, + response.data.auth.nt_status)); } return (result == NSS_STATUS_SUCCESS); } -/* authenticate a user with an encrypted username/password */ - -static NTSTATUS contact_winbind_auth_crap(const char *username, - const char *domain, - const char *workstation, - const DATA_BLOB *challenge, - const DATA_BLOB *lm_response, - const DATA_BLOB *nt_response, - uint32 flags, - uint8 lm_key[16], - uint8 nt_key[16], - char **error_string) +static NTSTATUS winbind_pw_check(struct ntlmssp_state *ntlmssp_state) { - NTSTATUS nt_status; - NSS_STATUS result; struct winbindd_request request; struct winbindd_response response; - - static uint8 zeros[16]; + NSS_STATUS result; + /* Send off request */ ZERO_STRUCT(request); ZERO_STRUCT(response); - request.data.auth_crap.flags = flags; - - fstrcpy(request.data.auth_crap.user, username); - - fstrcpy(request.data.auth_crap.domain, domain); - fstrcpy(request.data.auth_crap.workstation, workstation); - - memcpy(request.data.auth_crap.chal, challenge->data, MIN(challenge->length, 8)); + fstrcpy(request.data.auth_crap.user, ntlmssp_state->user); - if (lm_response && lm_response->length) { - memcpy(request.data.auth_crap.lm_resp, lm_response->data, MIN(lm_response->length, sizeof(request.data.auth_crap.lm_resp))); - request.data.auth_crap.lm_resp_len = lm_response->length; - } - - if (nt_response && nt_response->length) { - memcpy(request.data.auth_crap.nt_resp, nt_response->data, MIN(nt_response->length, sizeof(request.data.auth_crap.nt_resp))); - request.data.auth_crap.nt_resp_len = nt_response->length; - } + fstrcpy(request.data.auth_crap.domain, ntlmssp_state->domain); + fstrcpy(request.data.auth_crap.workstation, ntlmssp_state->workstation); + memcpy(request.data.auth_crap.chal, ntlmssp_state->chal.data, + MIN(ntlmssp_state->chal.length, 8)); + + memcpy(request.data.auth_crap.lm_resp, ntlmssp_state->lm_resp.data, + MIN(ntlmssp_state->lm_resp.length, sizeof(request.data.auth_crap.lm_resp))); + + memcpy(request.data.auth_crap.nt_resp, ntlmssp_state->nt_resp.data, + MIN(ntlmssp_state->nt_resp.length, sizeof(request.data.auth_crap.nt_resp))); + + request.data.auth_crap.lm_resp_len = ntlmssp_state->lm_resp.length; + request.data.auth_crap.nt_resp_len = ntlmssp_state->nt_resp.length; + result = winbindd_request(WINBINDD_PAM_AUTH_CRAP, &request, &response); /* Display response */ if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) { - nt_status = NT_STATUS_UNSUCCESSFUL; - if (error_string) - *error_string = smb_xstrdup("Reading winbind reply failed!"); - return nt_status; - } - - nt_status = (NT_STATUS(response.data.auth.nt_status)); - if (!NT_STATUS_IS_OK(nt_status)) { - if (error_string) - *error_string = smb_xstrdup(response.data.auth.error_string); - return nt_status; + return NT_STATUS_UNSUCCESSFUL; } - if ((flags & WINBIND_PAM_LMKEY) && lm_key - && (memcmp(zeros, response.data.auth.first_8_lm_hash, - sizeof(response.data.auth.first_8_lm_hash)) != 0)) { - memcpy(lm_key, response.data.auth.first_8_lm_hash, - sizeof(response.data.auth.first_8_lm_hash)); - } - if ((flags & WINBIND_PAM_NTKEY) && nt_key - && (memcmp(zeros, response.data.auth.nt_session_key, - sizeof(response.data.auth.nt_session_key)) != 0)) { - memcpy(nt_key, response.data.auth.nt_session_key, - sizeof(response.data.auth.nt_session_key)); - } - return nt_status; -} - -static NTSTATUS winbind_pw_check(struct ntlmssp_state *ntlmssp_state) -{ - return contact_winbind_auth_crap(ntlmssp_state->user, ntlmssp_state->domain, - ntlmssp_state->workstation, - &ntlmssp_state->chal, - &ntlmssp_state->lm_resp, - &ntlmssp_state->nt_resp, - 0, - NULL, - NULL, - NULL); + return NT_STATUS(response.data.auth.nt_status); } static void manage_squid_ntlmssp_request(enum squid_mode squid_mode, @@ -403,283 +356,72 @@ static void squid_stream(enum squid_mode squid_mode) { static BOOL check_auth_crap(void) { - NTSTATUS nt_status; - uint32 flags = 0; - char lm_key[8]; - char nt_key[16]; - char *hex_lm_key; - char *hex_nt_key; - char *error_string; - + struct winbindd_request request; + struct winbindd_response response; + char *lm_key; + char *nt_key; static uint8 zeros[16]; - if (request_lm_key) - flags |= WINBIND_PAM_LMKEY; - - if (request_nt_key) - flags |= WINBIND_PAM_NTKEY; - - nt_status = contact_winbind_auth_crap(opt_username, opt_domain, - opt_workstation, - &opt_challenge, - &opt_lm_response, - &opt_nt_response, - flags, - lm_key, - nt_key, - &error_string); - - if (!NT_STATUS_IS_OK(nt_status)) { - d_printf("%s (0x%x)\n", - error_string, - NT_STATUS_V(nt_status)); - SAFE_FREE(error_string); - return False; - } - - if (request_lm_key - && (memcmp(zeros, lm_key, - sizeof(lm_key)) != 0)) { - hex_encode(lm_key, - sizeof(lm_key), - &hex_lm_key); - d_printf("LM_KEY: %s\n", hex_lm_key); - SAFE_FREE(hex_lm_key); - } - if (request_nt_key - && (memcmp(zeros, nt_key, - sizeof(nt_key)) != 0)) { - hex_encode(nt_key, - sizeof(nt_key), - &hex_nt_key); - d_printf("NT_KEY: %s\n", hex_nt_key); - SAFE_FREE(hex_nt_key); - } - - return True; -} - -/* - Authenticate a user with a challenge/response, checking session key - and valid authentication types -*/ - -static const DATA_BLOB get_challenge(void) -{ - static DATA_BLOB chal; - if (opt_challenge.length) - return opt_challenge; - - chal = data_blob(NULL, 8); - - generate_random_buffer(chal.data, chal.length, False); - return chal; -} - -static BOOL test_lm(void) -{ - NTSTATUS nt_status; - uint32 flags = 0; - DATA_BLOB lm_response = data_blob(NULL, 24); - - uchar lm_key[8]; - uchar lm_hash[16]; - DATA_BLOB chall = get_challenge(); - char *error_string; - - flags |= WINBIND_PAM_LMKEY; - - SMBencrypt(opt_password,chall.data,lm_response.data); - E_deshash(opt_password, lm_hash); - - nt_status = contact_winbind_auth_crap(opt_username, opt_domain, opt_workstation, - &chall, - &lm_response, - NULL, - flags, - lm_key, - NULL, - &error_string); - - data_blob_free(&lm_response); - - if (!NT_STATUS_IS_OK(nt_status)) { - d_printf("%s (0x%x)\n", - error_string, - NT_STATUS_V(nt_status)); - return False; - } + NSS_STATUS result; + /* Send off request */ - if (memcmp(lm_hash, lm_key, - sizeof(lm_key)) != 0) { - DEBUG(1, ("LM Key does not match expectations!\n")); - DEBUG(1, ("lm_key:\n")); - dump_data(1, lm_key, 8); - DEBUG(1, ("expected:\n")); - dump_data(1, lm_hash, 8); - } - return True; -} + ZERO_STRUCT(request); + ZERO_STRUCT(response); -static BOOL test_lm_ntlm(void) -{ - BOOL pass = True; - NTSTATUS nt_status; - uint32 flags = 0; - DATA_BLOB lm_response = data_blob(NULL, 24); - DATA_BLOB nt_response = data_blob(NULL, 24); - DATA_BLOB session_key = data_blob(NULL, 16); - - uchar lm_key[8]; - uchar nt_key[16]; - uchar lm_hash[16]; - uchar nt_hash[16]; - DATA_BLOB chall = get_challenge(); - char *error_string; - - flags |= WINBIND_PAM_LMKEY; - flags |= WINBIND_PAM_NTKEY; - - SMBencrypt(opt_password,chall.data,lm_response.data); - E_deshash(opt_password, lm_hash); - - SMBNTencrypt(opt_password,chall.data,nt_response.data); - - E_md4hash(opt_password, nt_hash); - SMBsesskeygen_ntv1(nt_hash, NULL, session_key.data); - - nt_status = contact_winbind_auth_crap(opt_username, opt_domain, - opt_workstation, - &chall, - &lm_response, - &nt_response, - flags, - lm_key, - nt_key, - &error_string); - - data_blob_free(&lm_response); + if (request_lm_key) + request.data.auth_crap.flags |= WINBIND_PAM_LMKEY; - if (!NT_STATUS_IS_OK(nt_status)) { - d_printf("%s (0x%x)\n", - error_string, - NT_STATUS_V(nt_status)); - SAFE_FREE(error_string); - return False; - } + if (request_nt_key) + request.data.auth_crap.flags |= WINBIND_PAM_NTKEY; - if (memcmp(lm_hash, lm_key, - sizeof(lm_key)) != 0) { - DEBUG(1, ("LM Key does not match expectations!\n")); - DEBUG(1, ("lm_key:\n")); - dump_data(1, lm_key, 8); - DEBUG(1, ("expected:\n")); - dump_data(1, lm_hash, 8); - pass = False; - } - if (memcmp(session_key.data, nt_key, - sizeof(nt_key)) != 0) { - DEBUG(1, ("NT Session Key does not match expectations!\n")); - DEBUG(1, ("nt_key:\n")); - dump_data(1, nt_key, 16); - DEBUG(1, ("expected:\n")); - dump_data(1, session_key.data, session_key.length); - pass = False; - } - return pass; -} + fstrcpy(request.data.auth_crap.user, username); -static BOOL test_ntlm(void) -{ - BOOL pass = True; - NTSTATUS nt_status; - uint32 flags = 0; - DATA_BLOB nt_response = data_blob(NULL, 24); - DATA_BLOB session_key = data_blob(NULL, 16); - - char nt_key[16]; - char nt_hash[16]; - DATA_BLOB chall = get_challenge(); - char *error_string; - - flags |= WINBIND_PAM_NTKEY; - - SMBNTencrypt(opt_password,chall.data,nt_response.data); - E_md4hash(opt_password, nt_hash); - SMBsesskeygen_ntv1(nt_hash, NULL, session_key.data); - - nt_status = contact_winbind_auth_crap(opt_username, opt_domain, - opt_workstation, - &chall, - NULL, - &nt_response, - flags, - NULL, - nt_key, - &error_string); + fstrcpy(request.data.auth_crap.domain, domain); + fstrcpy(request.data.auth_crap.workstation, workstation); - data_blob_free(&nt_response); + memcpy(request.data.auth_crap.chal, challenge, MIN(challenge_len, 8)); - if (!NT_STATUS_IS_OK(nt_status)) { - d_printf("%s (0x%x)\n", - error_string, - NT_STATUS_V(nt_status)); - SAFE_FREE(error_string); - return False; - } - - if (memcmp(session_key.data, nt_key, - sizeof(nt_key)) != 0) { - DEBUG(1, ("NT Session Key does not match expectations!\n")); - DEBUG(1, ("nt_key:\n")); - dump_data(1, nt_key, 16); - DEBUG(1, ("expected:\n")); - dump_data(1, session_key.data, session_key.length); - pass = False; - } - return pass; -} + memcpy(request.data.auth_crap.lm_resp, lm_response, MIN(lm_response_len, sizeof(request.data.auth_crap.lm_resp))); + + memcpy(request.data.auth_crap.nt_resp, nt_response, MIN(nt_response_len, sizeof(request.data.auth_crap.nt_resp))); + + request.data.auth_crap.lm_resp_len = lm_response_len; + request.data.auth_crap.nt_resp_len = nt_response_len; -/* - Tests: - - - LM only - - NT and LM - - NT - - NTLMv2 - - NTLMv2 and LMv2 - - LMv2 - - check we get the correct session key in each case - check what values we get for the LM session key - -*/ - -struct ntlm_tests { - BOOL (*fn)(); - const char *name; -} test_table[] = { - {test_lm, "test LM"}, - {test_lm_ntlm, "test LM and NTLM"}, - {test_ntlm, "test NTLM"} -/* {test_lm_ntlmv2, "test NTLMv2"}, */ -/* {test_lm_ntlmv2, "test NTLMv2 and LMv2"}, */ -/* {test_lm_ntlmv2, "test LMv2"} */ -}; + result = winbindd_request(WINBINDD_PAM_AUTH_CRAP, &request, &response); -static BOOL diagnose_ntlm_auth(void) -{ - unsigned int i; - BOOL pass = True; + /* Display response */ - for (i=0; test_table[i].fn; i++) { - if (!test_table[i].fn()) { - DEBUG(1, ("Test %s failed!\n", test_table[i].name)); - pass = False; + if ((result != NSS_STATUS_SUCCESS) && (response.data.auth.nt_status == 0)) { + d_printf("Reading winbind reply failed! (0x01)\n"); + } + + d_printf("%s (0x%x)\n", + response.data.auth.nt_status_string, + response.data.auth.nt_status); + + if (response.data.auth.nt_status == 0) { + if (request_lm_key + && (memcmp(zeros, response.data.auth.first_8_lm_hash, + sizeof(response.data.auth.first_8_lm_hash)) != 0)) { + hex_encode(response.data.auth.first_8_lm_hash, + sizeof(response.data.auth.first_8_lm_hash), + &lm_key); + d_printf("LM_KEY: %s\n", lm_key); + SAFE_FREE(lm_key); + } + if (request_nt_key + && (memcmp(zeros, response.data.auth.nt_session_key, + sizeof(response.data.auth.nt_session_key)) != 0)) { + hex_encode(response.data.auth.nt_session_key, + sizeof(response.data.auth.nt_session_key), + &nt_key); + d_printf("NT_KEY: %s\n", nt_key); + SAFE_FREE(nt_key); } } - return pass; + return result == NSS_STATUS_SUCCESS; } /* Main program */ @@ -694,49 +436,31 @@ enum { OPT_NT, OPT_PASSWORD, OPT_LM_KEY, - OPT_NT_KEY, - OPT_DIAGNOSTICS + OPT_NT_KEY }; - int main(int argc, const char **argv) +int main(int argc, const char **argv) { int opt; - static const char *hex_challenge; - static const char *hex_lm_response; - static const char *hex_nt_response; - char *challenge; - char *lm_response; - char *nt_response; - size_t challenge_len; - size_t lm_response_len; - size_t nt_response_len; - poptContext pc; - - /* NOTE: DO NOT change this interface without considering the implications! - This is an external interface, which other programs will use to interact - with this helper. - */ - - /* We do not use single-letter command abbreviations, because they harm future - interface stability. */ - struct poptOption long_options[] = { POPT_AUTOHELP + { "helper-protocol", 0, POPT_ARG_STRING, &helper_protocol, OPT_DOMAIN, "operate as a stdio-based helper", "helper protocol to use"}, - { "username", 0, POPT_ARG_STRING, &opt_username, OPT_USERNAME, "username"}, - { "domain", 0, POPT_ARG_STRING, &opt_domain, OPT_DOMAIN, "domain name"}, - { "workstation", 0, POPT_ARG_STRING, &opt_workstation, OPT_WORKSTATION, "workstation"}, + { "username", 0, POPT_ARG_STRING, &username, OPT_USERNAME, "username"}, + { "domain", 0, POPT_ARG_STRING, &domain, OPT_DOMAIN, "domain name"}, + { "workstation", 0, POPT_ARG_STRING, &domain, OPT_WORKSTATION, "workstation"}, { "challenge", 0, POPT_ARG_STRING, &hex_challenge, OPT_CHALLENGE, "challenge (HEX encoded)"}, { "lm-response", 0, POPT_ARG_STRING, &hex_lm_response, OPT_LM, "LM Response to the challenge (HEX encoded)"}, { "nt-response", 0, POPT_ARG_STRING, &hex_nt_response, OPT_NT, "NT or NTLMv2 Response to the challenge (HEX encoded)"}, - { "password", 0, POPT_ARG_STRING, &opt_password, OPT_PASSWORD, "User's plaintext password"}, + { "password", 0, POPT_ARG_STRING, &password, OPT_PASSWORD, "User's plaintext password"}, { "request-lm-key", 0, POPT_ARG_NONE, &request_lm_key, OPT_LM_KEY, "Retreive LM session key"}, { "request-nt-key", 0, POPT_ARG_NONE, &request_nt_key, OPT_NT_KEY, "Retreive NT session key"}, - { "diagnostics", 0, POPT_ARG_NONE, &diagnostics, OPT_DIAGNOSTICS, "Perform diagnostics on the authentictaion chain"}, - POPT_COMMON_SAMBA - POPT_TABLEEND + { NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_debug }, + { NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_configfile }, + { NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_version}, + { 0, 0, 0, 0 } }; /* Samba client initialisation */ @@ -760,40 +484,29 @@ enum { while((opt = poptGetNextOpt(pc)) != -1) { switch (opt) { case OPT_CHALLENGE: - challenge = smb_xmalloc((strlen(hex_challenge)+1)/2); - if ((challenge_len = strhex_to_str(challenge, - strlen(hex_challenge), - hex_challenge)) != 8) { - x_fprintf(x_stderr, "hex decode of %s failed (only got %u bytes)!\n", + challenge_len = strlen(hex_challenge); + challenge = smb_xmalloc((challenge_len+1)/2); + if ((challenge_len = strhex_to_str(challenge, challenge_len, hex_challenge)) != 8) { + fprintf(stderr, "hex decode of %s failed (only got %u bytes)!\n", hex_challenge, challenge_len); exit(1); } - opt_challenge = data_blob(challenge, challenge_len); - SAFE_FREE(challenge); break; case OPT_LM: - lm_response = smb_xmalloc((strlen(hex_lm_response)+1)/2); - lm_response_len = strhex_to_str(lm_response, - strlen(hex_lm_response), - hex_lm_response); - if (lm_response_len != 24) { - x_fprintf(x_stderr, "hex decode of %s failed!\n", hex_lm_response); + lm_response_len = strlen(hex_lm_response); + lm_response = smb_xmalloc((lm_response_len+1)/2); + if ((lm_response_len = strhex_to_str(lm_response, lm_response_len, hex_lm_response)) != 24) { + fprintf(stderr, "hex decode of %s failed!\n", hex_lm_response); exit(1); } - opt_lm_response = data_blob(lm_response, lm_response_len); - SAFE_FREE(lm_response); break; case OPT_NT: - nt_response = smb_xmalloc((strlen(hex_nt_response)+1)/2); - nt_response_len = strhex_to_str(nt_response, - strlen(hex_nt_response), - hex_nt_response); - if (nt_response_len < 24) { - x_fprintf(x_stderr, "hex decode of %s failed!\n", hex_nt_response); + nt_response_len = strlen(hex_nt_response); + nt_response = smb_xmalloc((nt_response_len+1)/2); + if ((nt_response_len = strhex_to_str(nt_response, nt_response_len, hex_nt_response)) < 24) { + fprintf(stderr, "hex decode of %s failed!\n", hex_nt_response); exit(1); } - opt_nt_response = data_blob(nt_response, nt_response_len); - SAFE_FREE(nt_response); break; } } @@ -806,45 +519,27 @@ enum { } else if (strcmp(helper_protocol, "squid-2.4-basic")== 0) { squid_stream(SQUID_2_4_BASIC); } else { - x_fprintf(x_stderr, "unknown helper protocol [%s]\n", helper_protocol); + fprintf(stderr, "unknown helper protocol [%s]\n", helper_protocol); exit(1); } } - if (!opt_username) { - x_fprintf(x_stderr, "username must be specified!\n\n"); - poptPrintHelp(pc, stderr, 0); - exit(1); - } - - if (opt_domain == NULL) { - opt_domain = get_winbind_domain(); + if (domain == NULL) { + domain = get_winbind_domain(); } - if (opt_workstation == NULL) { - opt_workstation = ""; + if (workstation == NULL) { + workstation = ""; } - if (opt_challenge.length) { + if (challenge) { if (!check_auth_crap()) { exit(1); } - exit(0); - } - - if (!opt_password) { - opt_password = getpass("password: "); - } - - if (diagnostics) { - if (!diagnose_ntlm_auth()) { - exit(1); - } - } else { + } else if (password) { fstring user; - - snprintf(user, sizeof(user)-1, "%s%c%s", opt_domain, winbind_separator(), opt_username); - if (!check_plaintext_auth(user, opt_password, True)) { + snprintf(user, sizeof(user)-1, "%s%c%s", domain, winbind_separator(), username); + if (!check_plaintext_auth(user, password, True)) { exit(1); } } diff --git a/source3/utils/pdbedit.c b/source3/utils/pdbedit.c index bf42fb805f4..99d3e01fd28 100644 --- a/source3/utils/pdbedit.c +++ b/source3/utils/pdbedit.c @@ -516,7 +516,7 @@ int main (int argc, char **argv) poptContext pc; struct poptOption long_options[] = { POPT_AUTOHELP - {"list", 'L', POPT_ARG_NONE, &list_users, 0, "list all users", NULL}, + {"list", 'l', POPT_ARG_NONE, &list_users, 0, "list all users", NULL}, {"verbose", 'v', POPT_ARG_NONE, &verbose, 0, "be verbose", NULL }, {"smbpasswd-style", 'w',POPT_ARG_NONE, &spstyle, 0, "give output in smbpasswd style", NULL}, {"user", 'u', POPT_ARG_STRING, &user_name, 0, "use username", "USER" }, @@ -534,10 +534,11 @@ int main (int argc, char **argv) {"export", 'e', POPT_ARG_STRING, &backend_out, 0, "export user accounts to this backend", NULL}, {"group", 'g', POPT_ARG_NONE, &transfer_groups, 0, "use -i and -e for groups", NULL}, {"account-policy", 'P', POPT_ARG_STRING, &account_policy, 0,"value of an account policy (like maximum password age)",NULL}, - {"value", 'C', POPT_ARG_LONG, &account_policy_value, 'C',"set the account policy to this value", NULL}, + {"value", 'V', POPT_ARG_LONG, &account_policy_value, 'V',"set the account policy to this value", NULL}, {"account-control", 'c', POPT_ARG_STRING, &account_control, 0, "Values of account control", NULL}, - POPT_COMMON_SAMBA - POPT_TABLEEND + { NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_debug }, + { NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_configfile }, + {0,0,0,0} }; setup_logging("pdbedit", True); diff --git a/source3/utils/profiles.c b/source3/utils/profiles.c index 7c2d820c810..2ed102b6775 100644 --- a/source3/utils/profiles.c +++ b/source3/utils/profiles.c @@ -1,7 +1,6 @@ /* Samba Unix/Linux SMB client utility profiles.c Copyright (C) 2002 Richard Sharpe, rsharpe@richardsharpe.com - Copyright (C) 2003 Jelmer Vernooij (conversion to popt) This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -35,7 +34,7 @@ times... the "regf"-Block ================ -"regf" is obviously the abbreviation for "Registry file". "regf" is the +"regf" is obviosly the abbreviation for "Registry file". "regf" is the signature of the header-block which is always 4kb in size, although only the first 64 bytes seem to be used and a checksum is calculated over the first 0x200 bytes only! @@ -392,14 +391,14 @@ typedef struct acl_struct { #define OFF(f) (0x1000 + (f) + 4) -static void print_sid(DOM_SID *sid); +void print_sid(DOM_SID *sid); int verbose = 1; DOM_SID old_sid, new_sid; int change = 0, new = 0; /* Compare two SIDs for equality */ -static int my_sid_equal(DOM_SID *s1, DOM_SID *s2) +int my_sid_equal(DOM_SID *s1, DOM_SID *s2) { int sa1, sa2; @@ -418,7 +417,7 @@ static int my_sid_equal(DOM_SID *s1, DOM_SID *s2) * Quick and dirty to read a SID in S-1-5-21-x-y-z-rid format and * construct a DOM_SID */ -static int get_sid(DOM_SID *sid, char *sid_str) +int get_sid(DOM_SID *sid, char *sid_str) { int i = 0, auth; char *lstr; @@ -461,7 +460,7 @@ static int get_sid(DOM_SID *sid, char *sid_str) * This routine does not need to deal with endianism as * long as the incoming SIDs are both in the same (LE) format. */ -static void change_sid(DOM_SID *s1, DOM_SID *s2) +void change_sid(DOM_SID *s1, DOM_SID *s2) { int i; @@ -470,7 +469,7 @@ static void change_sid(DOM_SID *s1, DOM_SID *s2) } } -static void print_sid(DOM_SID *sid) +void print_sid(DOM_SID *sid) { int i, comps = sid->num_auths; fprintf(stdout, "S-%u-%u", sid->sid_rev_num, sid->id_auth[5]); @@ -483,7 +482,7 @@ static void print_sid(DOM_SID *sid) fprintf(stdout, "\n"); } -static void process_sid(DOM_SID *sid, DOM_SID *o_sid, DOM_SID *n_sid) +void process_sid(DOM_SID *sid, DOM_SID *o_sid, DOM_SID *n_sid) { int i; if (my_sid_equal(sid, o_sid)) { @@ -497,7 +496,7 @@ static void process_sid(DOM_SID *sid, DOM_SID *o_sid, DOM_SID *n_sid) } -static void process_acl(ACL *acl, const char *prefix) +void process_acl(ACL *acl, const char *prefix) { int ace_cnt, i; ACE *ace; @@ -515,8 +514,21 @@ static void process_acl(ACL *acl, const char *prefix) } } +void usage(void) +{ + fprintf(stderr, "usage: profiles [-c -n ] \n"); + fprintf(stderr, "Version: %s\n", VERSION); + fprintf(stderr, "\n\t-v\t sets verbose mode"); + fprintf(stderr, "\n\t-c S-1-5-21-z-y-x-oldrid - provides SID to change"); + fprintf(stderr, "\n\t-n S-1-5-21-a-b-c-newrid - provides SID to change to"); + fprintf(stderr, "\n\t\tBoth must be present if the other is."); + fprintf(stderr, "\n\t\tIf neither present, just report the SIDs found\n"); +} + int main(int argc, char *argv[]) { + extern char *optarg; + extern int optind; int opt; int fd, start = 0; char *base; @@ -528,75 +540,63 @@ int main(int argc, char *argv[]) DWORD first_sk_off, sk_off; MY_SEC_DESC *sec_desc; int *ptr; - struct poptOption long_options[] = { - POPT_AUTOHELP - { "verbose", 'v', POPT_ARG_NONE, NULL, 'v', "Sets verbose mode" }, - { "change-sid", 'c', POPT_ARG_STRING, NULL, 'c', "Provides SID to change" }, - { "new-sid", 'n', POPT_ARG_STRING, NULL, 'n', "Provides SID to change to" }, - { 0, 0, 0, 0 } - }; - - poptContext pc; - pc = poptGetContext("profiles", argc, (const char **)argv, long_options, - POPT_CONTEXT_KEEP_FIRST); - - poptSetOtherOptionHelp(pc, ""); + if (argc < 2) { + usage(); + exit(1); + } /* * Now, process the arguments */ - while ((opt = poptGetNextOpt(pc)) != -1) { + while ((opt = getopt(argc, argv, "c:n:v")) != EOF) { switch (opt) { - case 'c': - change = 1; - if (!get_sid(&old_sid, poptGetOptArg(pc))) { - fprintf(stderr, "Argument to -c should be a SID in form of S-1-5-...\n"); - poptPrintUsage(pc, stderr, 0); - exit(254); - } - break; - - case 'n': - new = 1; - if (!get_sid(&new_sid, poptGetOptArg(pc))) { - fprintf(stderr, "Argument to -n should be a SID in form of S-1-5-...\n"); - poptPrintUsage(pc, stderr, 0); - exit(253); - } - - break; - - case 'v': - verbose++; - break; - } - } + case 'c': + change = 1; + if (!get_sid(&old_sid, optarg)) { + fprintf(stderr, "Argument to -c should be a SID in form of S-1-5-...\n"); + usage(); + exit(254); + } + break; + + case 'n': + new = 1; + if (!get_sid(&new_sid, optarg)) { + fprintf(stderr, "Argument to -n should be a SID in form of S-1-5-...\n"); + usage(); + exit(253); + } + + break; + + case 'v': + verbose++; + break; - if (!poptPeekArg(pc)) { - poptPrintUsage(pc, stderr, 0); - exit(1); + default: + usage(); + exit(255); + } } if ((!change & new) || (change & !new)) { - fprintf(stderr, "You must specify both -c and -n if one or the other is set!\n"); - poptPrintUsage(pc, stderr, 0); - exit(252); + fprintf(stderr, "You must specify both -c and -n if one or the other is set!\n"); + usage(); + exit(252); } - poptGetArg(pc); /* To get argv[0] */ - - fd = open(poptPeekArg(pc), O_RDWR, 0000); + fd = open(argv[optind], O_RDWR, 0000); if (fd < 0) { - fprintf(stderr, "Could not open %s: %s\n", poptPeekArg(pc), + fprintf(stderr, "Could not open %s: %s\n", argv[optind], strerror(errno)); exit(2); } if (fstat(fd, &sbuf) < 0) { - fprintf(stderr, "Could not stat file %s, %s\n", poptPeekArg(pc), + fprintf(stderr, "Could not stat file %s, %s\n", argv[optind], strerror(errno)); exit(3); } @@ -609,7 +609,7 @@ int main(int argc, char *argv[]) base = mmap(&start, sbuf.st_size, PROT_READ | PROT_WRITE, MAP_SHARED, fd, 0); if ((int)base == -1) { - fprintf(stderr, "Could not mmap file: %s, %s\n", poptPeekArg(pc), + fprintf(stderr, "Could not mmap file: %s, %s\n", argv[optind], strerror(errno)); exit(4); } @@ -640,7 +640,7 @@ int main(int argc, char *argv[]) if (verbose) fprintf(stdout, "Registry file size: %u\n", (unsigned int)sbuf.st_size); if (IVAL(®f_hdr->REGF_ID, 0) != REG_REGF_ID) { - fprintf(stderr, "Incorrect Registry file (doesn't have header ID): %s\n", poptPeekArg(pc)); + fprintf(stderr, "Incorrect Registry file (doesn't have header ID): %s\n", argv[optind]); exit(5); } @@ -655,7 +655,7 @@ int main(int argc, char *argv[]) */ if (IVAL(&hbin_hdr->HBIN_ID, 0) != REG_HBIN_ID) { - fprintf(stderr, "Incorrect hbin hdr: %s\n", poptPeekArg(pc)); + fprintf(stderr, "Incorrect hbin hdr: %s\n", argv[optind]); exit(6); } @@ -666,7 +666,7 @@ int main(int argc, char *argv[]) nk_hdr = (NK_HDR *)(base + 0x1000 + IVAL(®f_hdr->first_key, 0) + 4); if (SVAL(&nk_hdr->NK_ID, 0) != REG_NK_ID) { - fprintf(stderr, "Incorrect NK Header: %s\n", poptPeekArg(pc)); + fprintf(stderr, "Incorrect NK Header: %s\n", argv[optind]); exit(7); } @@ -724,8 +724,6 @@ int main(int argc, char *argv[]) munmap(base, sbuf.st_size); - poptFreeContext(pc); - close(fd); return 0; } diff --git a/source3/utils/smbcacls.c b/source3/utils/smbcacls.c index 562fd9943f9..bce64df9604 100644 --- a/source3/utils/smbcacls.c +++ b/source3/utils/smbcacls.c @@ -5,7 +5,6 @@ Copyright (C) Andrew Tridgell 2000 Copyright (C) Tim Potter 2000 Copyright (C) Jeremy Allison 2000 - Copyright (C) Jelmer Vernooij 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -24,9 +23,12 @@ #include "includes.h" +static fstring password; +static pstring username; static pstring owner_username; static fstring server; -static int test_args = False; +static int got_pass; +static int test_args; static TALLOC_CTX *ctx; #define CREATE_ACCESS_READ READ_CONTROL_ACCESS @@ -34,7 +36,7 @@ static TALLOC_CTX *ctx; /* numeric is set when the user wants numeric SIDs and ACEs rather than going via LSA calls to resolve them */ -static BOOL numeric = False; +static int numeric; enum acl_mode {SMB_ACL_SET, SMB_ACL_DELETE, SMB_ACL_MODIFY, SMB_ACL_ADD }; enum chown_mode {REQUEST_NONE, REQUEST_CHOWN, REQUEST_CHGRP}; @@ -713,19 +715,19 @@ static struct cli_state *connect_one(const char *share) NTSTATUS nt_status; zero_ip(&ip); - if (!cmdline_auth_info.got_pass) { + if (!got_pass) { char *pass = getpass("Password: "); if (pass) { - pstrcpy(cmdline_auth_info.password, pass); - cmdline_auth_info.got_pass = True; + fstrcpy(password, pass); + got_pass = True; } } if (NT_STATUS_IS_OK(nt_status = cli_full_connection(&c, global_myname(), server, &ip, 0, share, "?????", - cmdline_auth_info.username, lp_workgroup(), - cmdline_auth_info.password, 0, NULL))) { + username, lp_workgroup(), + password, 0, NULL))) { return c; } else { DEBUG(0,("cli_full_connection failed! (%s)\n", nt_errstr(nt_status))); @@ -733,34 +735,45 @@ static struct cli_state *connect_one(const char *share) } } + +static void usage(void) +{ + printf( +"Usage: smbcacls //server1/share1 filename [options]\n\ +\n\ +\t-D delete an acl\n\ +\t-M modify an acl\n\ +\t-A add an acl\n\ +\t-S set acls\n\ +\t-C username change ownership of a file\n\ +\t-G username change group ownership of a file\n\ +\t-n don't resolve sids or masks to names\n\ +\t-h print help\n\ +\t-d debuglevel set debug output level\n\ +\t-U username user to autheticate as\n\ +\n\ +The username can be of the form username%%password or\n\ +workgroup\\username%%password.\n\n\ +An acl is of the form ACL::type/flags/mask\n\ +You can string acls together with spaces, commas or newlines\n\ +"); +} + /**************************************************************************** main program ****************************************************************************/ - int main(int argc, const char *argv[]) + int main(int argc,char *argv[]) { char *share; + pstring filename; + extern char *optarg; + extern int optind; int opt; + char *p; enum acl_mode mode = SMB_ACL_SET; - static char *the_acl = NULL; + char *the_acl = NULL; enum chown_mode change_mode = REQUEST_NONE; int result; - fstring path; - pstring filename; - poptContext pc; - struct poptOption long_options[] = { - POPT_AUTOHELP - { "delete", 'D', POPT_ARG_STRING, NULL, 'D', "Delete an acl", "ACL" }, - { "modify", 'M', POPT_ARG_STRING, NULL, 'M', "Modify an acl", "ACL" }, - { "add", 'A', POPT_ARG_STRING, NULL, 'A', "Add an acl", "ACL" }, - { "set", 'S', POPT_ARG_STRING, NULL, 'S', "Set acls", "ACLS" }, - { "chown", 'C', POPT_ARG_STRING, NULL, 'C', "Change ownership of a file", "USERNAME" }, - { "chgrp", 'G', POPT_ARG_STRING, NULL, 'G', "Change group ownership of a file", "GROUPNAME" }, - { "numeric", 0, POPT_ARG_NONE, &numeric, True, "Don't resolve sids or masks to names" }, - { "test-args", 't', POPT_ARG_NONE, &test_args, True, "Test arguments"}, - POPT_COMMON_SAMBA - POPT_COMMON_CREDENTIALS - { NULL } - }; struct cli_state *cli; @@ -770,72 +783,118 @@ static struct cli_state *connect_one(const char *share) dbf = x_stderr; + if (argc < 3 || argv[1][0] == '-') { + usage(); + talloc_destroy(ctx); + exit(EXIT_PARSE_ERROR); + } + setup_logging(argv[0],True); + share = argv[1]; + pstrcpy(filename, argv[2]); + all_string_sub(share,"/","\\",0); + + argc -= 2; + argv += 2; + lp_load(dyn_CONFIGFILE,True,False,False); load_interfaces(); - pc = poptGetContext("smbcacls", argc, argv, long_options, 0); - - poptSetOtherOptionHelp(pc, "//server1/share1 filename"); + if (getenv("USER")) { + pstrcpy(username,getenv("USER")); - while ((opt = poptGetNextOpt(pc)) != -1) { + if ((p=strchr_m(username,'%'))) { + *p = 0; + fstrcpy(password,p+1); + got_pass = True; + memset(strchr_m(getenv("USER"), '%') + 1, 'X', + strlen(password)); + } + } + + while ((opt = getopt(argc, argv, "U:nhS:D:A:M:C:G:td:")) != EOF) { switch (opt) { + case 'U': + pstrcpy(username,optarg); + p = strchr_m(username,'%'); + if (p) { + *p = 0; + fstrcpy(password, p+1); + got_pass = 1; + } + break; + case 'S': - the_acl = smb_xstrdup(poptGetOptArg(pc)); + the_acl = optarg; mode = SMB_ACL_SET; break; case 'D': - the_acl = smb_xstrdup(poptGetOptArg(pc)); + the_acl = optarg; mode = SMB_ACL_DELETE; break; case 'M': - the_acl = smb_xstrdup(poptGetOptArg(pc)); + the_acl = optarg; mode = SMB_ACL_MODIFY; break; case 'A': - the_acl = smb_xstrdup(poptGetOptArg(pc)); + the_acl = optarg; mode = SMB_ACL_ADD; break; case 'C': - pstrcpy(owner_username,poptGetOptArg(pc)); + pstrcpy(owner_username,optarg); change_mode = REQUEST_CHOWN; break; case 'G': - pstrcpy(owner_username,poptGetOptArg(pc)); + pstrcpy(owner_username,optarg); change_mode = REQUEST_CHGRP; break; + + case 'n': + numeric = 1; + break; + + case 't': + test_args = 1; + break; + + case 'h': + usage(); + talloc_destroy(ctx); + exit(EXIT_PARSE_ERROR); + + case 'd': + DEBUGLEVEL = atoi(optarg); + break; + + default: + printf("Unknown option %c (%d)\n", (char)opt, opt); + talloc_destroy(ctx); + exit(EXIT_PARSE_ERROR); } } - /* Make connection to server */ - if(!poptPeekArg(pc)) { - poptPrintUsage(pc, stderr, 0); - return -1; - } - - fstrcpy(path, poptGetArg(pc)); - - if(!poptPeekArg(pc)) { - poptPrintUsage(pc, stderr, 0); - return -1; + argc -= optind; + argv += optind; + + if (argc > 0) { + usage(); + talloc_destroy(ctx); + exit(EXIT_PARSE_ERROR); } - - pstrcpy(filename, poptGetArg(pc)); - all_string_sub(path,"/","\\",0); + /* Make connection to server */ - fstrcpy(server,path+2); + fstrcpy(server,share+2); share = strchr_m(server,'\\'); if (!share) { share = strchr_m(server,'/'); if (!share) { - printf("Invalid argument: %s\n", share); return -1; } } @@ -875,3 +934,4 @@ static struct cli_state *connect_one(const char *share) return result; } + diff --git a/source3/utils/smbtree.c b/source3/utils/smbtree.c index d245c324dd5..940120d644f 100644 --- a/source3/utils/smbtree.c +++ b/source3/utils/smbtree.c @@ -3,7 +3,6 @@ Network neighbourhood browser. Copyright (C) Tim Potter 2000 - Copyright (C) Jelmer Vernooij 2003 This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -24,11 +23,34 @@ static BOOL use_bcast; +struct user_auth_info { + pstring username; + pstring password; + pstring workgroup; +}; + /* How low can we go? */ enum tree_level {LEV_WORKGROUP, LEV_SERVER, LEV_SHARE}; static enum tree_level level = LEV_SHARE; +static void usage(void) +{ + printf( +"Usage: smbtree [options]\n\ +\n\ +\t-d debuglevel set debug output level\n\ +\t-U username user to autheticate as\n\ +\t-W workgroup workgroup of user to authenticate as\n\ +\t-D list only domains (workgroups) of tree\n\ +\t-S list domains and servers of tree\n\ +\t-b use bcast instead of using the master browser\n\ +\n\ +The username can be of the form username%%password or\n\ +workgroup\\username%%password.\n\n\ +"); +} + /* Holds a list of workgroups or servers */ struct name_list { @@ -90,12 +112,10 @@ static struct cli_state *get_ipc_connect(char *server, struct in_addr *server_ip /* Return the IP address and workgroup of a master browser on the network. */ -static struct cli_state *get_ipc_connect_master_ip_bcast(pstring workgroup, struct user_auth_info *user_info) +static BOOL find_master_ip_bcast(pstring workgroup, struct in_addr *server_ip) { struct in_addr *ip_list; - struct cli_state *cli; int i, count; - struct in_addr server_ip; /* Go looking for workgroups by broadcasting on the local network */ @@ -109,7 +129,7 @@ static struct cli_state *get_ipc_connect_master_ip_bcast(pstring workgroup, stru if (!name_status_find("*", 0, 0x1d, ip_list[i], name)) continue; - if (!find_master_ip(name, &server_ip)) + if (!find_master_ip(name, server_ip)) continue; pstrcpy(workgroup, name); @@ -117,13 +137,10 @@ static struct cli_state *get_ipc_connect_master_ip_bcast(pstring workgroup, stru DEBUG(4, ("found master browser %s, %s\n", name, inet_ntoa(ip_list[i]))); - if (!(cli = get_ipc_connect(inet_ntoa(server_ip), &server_ip, user_info))) - continue; - - return cli; + return True; } - return NULL; + return False; } /**************************************************************************** @@ -141,21 +158,19 @@ static BOOL get_workgroups(struct user_auth_info *user_info) pstrcpy(master_workgroup, lp_workgroup()); - if (!use_bcast && !find_master_ip(lp_workgroup(), &server_ip)) { - DEBUG(4, ("Unable to find master browser for workgroup %s, falling back to broadcast\n", + if (use_bcast || !find_master_ip(lp_workgroup(), &server_ip)) { + DEBUG(4, ("Unable to find master browser for workgroup %s\n", master_workgroup)); - use_bcast = True; - } else if(!use_bcast) { - if (!(cli = get_ipc_connect(inet_ntoa(server_ip), &server_ip, user_info))) - return False; - } - - if (!(cli = get_ipc_connect_master_ip_bcast(master_workgroup, user_info))) { + if (!find_master_ip_bcast(master_workgroup, &server_ip)) { DEBUG(4, ("Unable to find master browser by " "broadcast\n")); return False; + } } + if (!(cli = get_ipc_connect(inet_ntoa(server_ip), &server_ip, user_info))) + return False; + if (!cli_NetServerEnum(cli, master_workgroup, SV_TYPE_DOMAIN_ENUM, add_name, &workgroups)) return False; @@ -252,17 +267,13 @@ static BOOL print_tree(struct user_auth_info *user_info) ****************************************************************************/ int main(int argc,char *argv[]) { - struct poptOption long_options[] = { - POPT_AUTOHELP - { "broadcast", 'b', POPT_ARG_VAL, &use_bcast, True, "Use broadcast instead of using the master browser" }, - { "domains", 'D', POPT_ARG_VAL, &level, LEV_WORKGROUP, "List only domains (workgroups) of tree" }, - { "servers", 'S', POPT_ARG_VAL, &level, LEV_SERVER, "List domains(workgroups) and servers of tree" }, - POPT_COMMON_SAMBA - POPT_COMMON_CREDENTIALS - POPT_TABLEEND - }; - poptContext pc; - + extern char *optarg; + extern int optind; + int opt; + char *p; + struct user_auth_info user_info; + BOOL got_pass = False; + /* Initialise samba stuff */ setlinebuf(stdout); @@ -271,27 +282,86 @@ static BOOL print_tree(struct user_auth_info *user_info) setup_logging(argv[0],True); - pc = poptGetContext("smbtree", argc, (const char **)argv, long_options, - POPT_CONTEXT_KEEP_FIRST); - while(poptGetNextOpt(pc) != -1); - poptFreeContext(pc); - lp_load(dyn_CONFIGFILE,True,False,False); load_interfaces(); + if (getenv("USER")) { + pstrcpy(user_info.username, getenv("USER")); + + if ((p=strchr(user_info.username, '%'))) { + *p = 0; + pstrcpy(user_info.password, p+1); + got_pass = True; + memset(strchr(getenv("USER"), '%') + 1, 'X', + strlen(user_info.password)); + } + } + + pstrcpy(user_info.workgroup, lp_workgroup()); + /* Parse command line args */ - if (!cmdline_auth_info.got_pass) { + while ((opt = getopt(argc, argv, "U:hd:W:DSb")) != EOF) { + switch (opt) { + case 'U': + pstrcpy(user_info.username,optarg); + p = strchr(user_info.username,'%'); + if (p) { + *p = 0; + pstrcpy(user_info.password, p+1); + got_pass = 1; + } + break; + + case 'b': + use_bcast = True; + break; + + case 'h': + usage(); + exit(1); + + case 'd': + DEBUGLEVEL = atoi(optarg); + break; + + case 'W': + pstrcpy(user_info.workgroup, optarg); + break; + + case 'D': + level = LEV_WORKGROUP; + break; + + case 'S': + level = LEV_SERVER; + break; + + default: + printf("Unknown option %c (%d)\n", (char)opt, opt); + exit(1); + } + } + + argc -= optind; + argv += optind; + + if (argc > 0) { + usage(); + exit(1); + } + + if (!got_pass) { char *pass = getpass("Password: "); if (pass) { - pstrcpy(cmdline_auth_info.password, pass); + pstrcpy(user_info.password, pass); } - cmdline_auth_info.got_pass = True; + got_pass = True; } /* Now do our stuff */ - if (!print_tree(&cmdline_auth_info)) + if (!print_tree(&user_info)) return 1; return 0; diff --git a/source3/utils/status.c b/source3/utils/status.c index 7e87701752a..8014b133d9e 100644 --- a/source3/utils/status.c +++ b/source3/utils/status.c @@ -559,8 +559,10 @@ static int traverse_sessionid(TDB_CONTEXT *tdb, TDB_DATA kbuf, TDB_DATA dbuf, vo {"profile", 'P', POPT_ARG_NONE, &profile_only, 'P', "Do profiling" }, #endif /* WITH_PROFILE */ {"byterange", 'B', POPT_ARG_NONE, &show_brl, 'B', "Include byte range locks"}, - POPT_COMMON_SAMBA - POPT_TABLEEND + { NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_debug }, + { NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_version}, + { NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_configfile }, + { 0, 0, 0, 0} }; setup_logging(argv[0],True); diff --git a/source3/utils/testparm.c b/source3/utils/testparm.c index e3d6ce02748..ec58f906ed1 100644 --- a/source3/utils/testparm.c +++ b/source3/utils/testparm.c @@ -177,21 +177,18 @@ via the %%o substitution. With encrypted passwords this is not possible.\n", lp_ printf("'algorithmic rid base' must be even.\n"); } -#ifndef HAVE_DLOPEN - if (lp_preload_modules()) { - printf("WARNING: 'preload modules = ' set while loading plugins not supported.\n"); - } -#endif - return ret; } - int main(int argc, const char *argv[]) +int main(int argc, const char *argv[]) { + extern char *optarg; + extern int optind; const char *config_file = dyn_CONFIGFILE; int s; static BOOL silent_mode = False; int ret = 0; + int opt; poptContext pc; static const char *term_code = ""; static char *new_local_machine = NULL; @@ -205,15 +202,15 @@ via the %%o substitution. With encrypted passwords this is not possible.\n", lp_ {"verbose", 'v', POPT_ARG_NONE, &show_defaults, 1, "Show default options too"}, {"server", 'L',POPT_ARG_STRING, &new_local_machine, 0, "Set %%L macro to servername\n"}, {"encoding", 't', POPT_ARG_STRING, &term_code, 0, "Print parameters with encoding"}, - POPT_COMMON_VERSION - POPT_TABLEEND + {NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_version}, + {0,0,0,0} }; pc = poptGetContext(NULL, argc, argv, long_options, POPT_CONTEXT_KEEP_FIRST); poptSetOtherOptionHelp(pc, "[OPTION...] [host-name] [host-ip]"); - while(poptGetNextOpt(pc) != -1); + while((opt = poptGetNextOpt(pc)) != -1); setup_logging(poptGetArg(pc), True); diff --git a/source3/web/swat.c b/source3/web/swat.c index fa319bb3ae8..6d14e9db983 100644 --- a/source3/web/swat.c +++ b/source3/web/swat.c @@ -1267,8 +1267,9 @@ static void printers_page(void) struct poptOption long_options[] = { POPT_AUTOHELP { "disable-authentication", 'a', POPT_ARG_VAL, &demo_mode, True, "Disable authentication (demo mode)" }, - POPT_COMMON_SAMBA - POPT_TABLEEND + { NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_version}, + { NULL, 0, POPT_ARG_INCLUDE_TABLE, popt_common_configfile}, + { 0, 0, 0, 0 } }; fault_setup(NULL); diff --git a/source3/wrepld/server.c b/source3/wrepld/server.c index 504818b8d52..31f260e94c0 100644 --- a/source3/wrepld/server.c +++ b/source3/wrepld/server.c @@ -159,6 +159,32 @@ void exit_server(const char *reason) exit(0); } +/**************************************************************************** + Usage of the program. +****************************************************************************/ + +static void usage(char *pname) +{ + + d_printf("Usage: %s [-DFSaioPh?V] [-d debuglevel] [-l log basename] [-p port]\n", pname); + d_printf(" [-O socket options] [-s services file]\n"); + d_printf("\t-D Become a daemon (default)\n"); + d_printf("\t-F Run daemon in foreground (for daemontools, etc)\n"); + d_printf("\t-S Log to stdout\n"); + d_printf("\t-a Append to log file (default)\n"); + d_printf("\t-i Run interactive (not a daemon)\n" ); + d_printf("\t-o Overwrite log file, don't append\n"); + d_printf("\t-h Print usage\n"); + d_printf("\t-? Print usage\n"); + d_printf("\t-V Print version\n"); + d_printf("\t-d debuglevel Set the debuglevel\n"); + d_printf("\t-l log basename. Basename for log/debug files\n"); + d_printf("\t-p port Listen on the specified port\n"); + d_printf("\t-O socket options Socket options\n"); + d_printf("\t-s services file. Filename of services file\n"); + d_printf("\n"); +} + /**************************************************************************** Create an fd_set containing all the sockets in the subnet structures, plus the broadcast sockets. @@ -494,45 +520,87 @@ static void process(void) ****************************************************************************/ int main(int argc,char *argv[]) { + extern char *optarg; /* shall I run as a daemon */ - static BOOL is_daemon = False; - static BOOL interactive = False; - static BOOL Fork = True; - static BOOL log_stdout = False; - struct poptOption long_options[] = { - POPT_AUTOHELP - { "daemon", 'D', POPT_ARG_VAL, &is_daemon, True, "Become a daemon (default)" }, - { "foreground", 'F', POPT_ARG_VAL, &Fork, False, "Run daemon in foreground (for daemontools, etc)" }, - { "stdout", 'S', POPT_ARG_VAL, &log_stdout, True, "Log to stdout" }, - { "interactive", 'i', POPT_ARG_NONE, NULL, 'i', "Run interactive (not a daemon)" }, - { "port", 'p', POPT_ARG_INT, &wins_port, 'p', "Listen on the specified port" }, - POPT_COMMON_SAMBA - POPT_TABLEEND - }; + BOOL is_daemon = False; + BOOL interactive = False; + BOOL specified_logfile = False; + BOOL Fork = True; + BOOL log_stdout = False; int opt; - poptContext pc; + pstring logfile; #ifdef HAVE_SET_AUTH_PARAMETERS set_auth_parameters(argc,argv); #endif - pc = poptGetContext("wrepld", argc, (const char **)argv, long_options, - POPT_CONTEXT_KEEP_FIRST); + /* this is for people who can't start the program correctly */ + while (argc > 1 && (*argv[1] != '-')) { + argv++; + argc--; + } - while ((opt = poptGetNextOpt(pc)) != -1) { + while ( EOF != (opt = getopt(argc, argv, "FSO:l:s:d:Dp:h?Vaiof:")) ) switch (opt) { + case 'F': + Fork = False; + break; + case 'S': + log_stdout = True; + break; + case 'O': + pstrcpy(user_socket_options,optarg); + break; + + case 's': + pstrcpy(dyn_CONFIGFILE,optarg); + break; + + case 'l': + specified_logfile = True; + slprintf(logfile, sizeof(logfile)-1, "%s/log.wrepld", optarg); + lp_set_logfile(logfile); + break; + case 'i': interactive = True; Fork = False; log_stdout = True; break; - } - } + case 'D': + is_daemon = True; + break; + + case 'd': + if (*optarg == 'A') + DEBUGLEVEL = 10000; + else + DEBUGLEVEL = atoi(optarg); + break; + case 'p': + wins_port = atoi(optarg); + break; + + case 'h': + case '?': + usage(argv[0]); + exit(0); + break; + + case 'V': + d_printf("Version %s\n",VERSION); + exit(0); + break; + default: + DEBUG(0,("Incorrect program usage - are you sure the command line is correct?\n")); + usage(argv[0]); + exit(1); + } if (log_stdout && Fork) { d_printf("Can't log to stdout (-S) unless daemon is in foreground (-F) or interactive (-i)\n"); - poptPrintUsage(pc, stderr, 0); + usage(argv[0]); exit(1); } @@ -545,6 +613,12 @@ static void process(void) load_case_tables(); + if(!specified_logfile) { + slprintf(logfile, sizeof(logfile)-1, "%s/log.wrepld", + dyn_LOGFILEBASE); + lp_set_logfile(logfile); + } + set_remote_machine_name("wrepld", False); setup_logging(argv[0],log_stdout); @@ -660,7 +734,6 @@ static void process(void) process(); - poptFreeContext(pc); exit_server("normal exit"); return(0); }

      28.1. Introduction

      26.1. Introduction

      This file contains a list of tests you can perform to validate your Samba server. It also tells you what the likely cause of the problem @@ -95,9 +92,7 @@ CLASS="SECT1" >

      28.2. Assumptions

      26.2. Assumptions

      In all of the tests it is assumed you have a Samba server called BIGSERVER and a PC called ACLIENT both in workgroup TESTGROUP.

      28.3. Tests

      26.3. Tests

      28.3.1. Test 1

      26.3.1. Test 1

      In the directory in which you store your smb.conf file, run the command "testparm smb.conf". If it reports any errors then your smb.conf @@ -163,9 +154,7 @@ CLASS="SECT2" >

      28.3.2. Test 2

      26.3.2. Test 2

      Run the command "ping BIGSERVER" from the PC and "ping ACLIENT" from the unix box. If you don't get a valid response then your TCP/IP @@ -189,9 +178,7 @@ CLASS="SECT2" >

      28.3.3. Test 3

      26.3.3. Test 3

      Run the command "smbclient -L BIGSERVER" on the unix box. You should get a list of available shares back.

      28.3.4. Test 4

      26.3.4. Test 4

      Run the command "nmblookup -B BIGSERVER __SAMBA__". You should get the IP address of your Samba server back.

      28.3.5. Test 5

      26.3.5. Test 5

      run the command

      28.3.6. Test 6

      26.3.6. Test 6

      Run the command

      28.3.7. Test 7

      26.3.7. Test 7

      Run the command . You should then be prompted for a password. You should use the password of the account you are logged into the unix box with. If you want to test with -another account then add the -U >accountname< option to the end of +another account then add the -U >accountname< option to the end of the command line. eg: etc. Type help >command<help >command< for instructions. You should especially check that the amount of free disk space shown is correct when you type

      28.3.8. Test 8

      26.3.8. Test 8

      On the PC type the command

      28.3.9. Test 9

      26.3.9. Test 9

      Run the command

      28.3.10. Test 10

      26.3.10. Test 10

      Run the command

      28.3.11. Test 11

      26.3.11. Test 11

      From file manager try to browse the server. Your samba server should appear in the browse list of your local workgroup (or the one you @@ -573,9 +544,7 @@ CLASS="SECT1" >

      28.4. Still having troubles?

      26.4. Still having troubles?

      Try the mailing list or newsgroup, or use the ethereal utility to sniff the problem. The official samba mailing list can be reached at diff --git a/docs/htmldocs/domain-security.html b/docs/htmldocs/domain-security.html index 7923247140c..670d96ba5f5 100644 --- a/docs/htmldocs/domain-security.html +++ b/docs/htmldocs/domain-security.html @@ -2,10 +2,11 @@ Samba as a NT4 or Win2k domain memberSamba as a NT4 domain member

      Chapter 9. Samba as a NT4 or Win2k domain member

      Chapter 9. Samba as a NT4 domain member

      9.1. Joining an NT Domain with Samba 3.0

      9.1. Joining an NT Domain with Samba 2.2

      Assume you have a Samba 3.0 server with a NetBIOS name of - Assume you have a Samba 2.x server with a NetBIOS name of + SERV1 and are joining an or Win2k NT domain called - SERV1 and are joining an NT domain called + DOMDOM, which has a PDC with a NetBIOS name - of DOMPDCDOMPDC and two backup domain controllers - with NetBIOS names DOMBDC1 and DOMBDC1 and DOMBDC2 - .

      Firstly, you must edit your In order to join the domain, first stop all Samba daemons + and run the command:

      root# smbpasswd -j DOM -r DOMPDC + -UAdministrator%password

      as we are joining the domain DOM and the PDC for that domain + (the only machine that has write access to the domain SAM database) + is DOMPDC. The Administrator%password is + the login name and password for an account which has the necessary + privilege to add machines to the domain. If this is successful + you will see the message:

      smbpasswd: Joined domain DOM. +

      in your terminal window. See the smbpasswd(8) man page for more details.

      There is existing development code to join a domain + without having to create the machine trust account on the PDC + beforehand. This code will hopefully be available soon + in release branches as well.

      This command goes through the machine account password + change protocol, then writes the new (random) machine account + password for this Samba server into a file in the same directory + in which an smbpasswd file would be stored - normally :

      /usr/local/samba/private

      In Samba 2.0.x, the filename looks like this:

      <NT DOMAIN NAME>.<Samba + Server Name>.mac

      The .mac suffix stands for machine account + password file. So in our example above, the file would be called:

      DOM.SERV1.mac

      In Samba 2.2, this file has been replaced with a TDB + (Trivial Database) file named secrets.tdb. +

      This file is created and owned by root and is not + readable by any other user. It is the key to the domain-level + security for your system, and should be treated as carefully + as a shadow password file.

      Now, before restarting the Samba daemons you must + edit your Change (or add) your security =security = line in the [global] section of your smb.conf to read:

      Next change the workgroup = workgroup = line in the [global] section to read:

      You must also have the parameter encrypt passwordsencrypt passwords set to set to yes - in order for your users to authenticate to the NT PDC.

      Finally, add (or modify) a password server =password server = line in the [global] section to read:

      password server = *

      This method, allows Samba to use exactly the same - mechanism that NT does. This +>This method, which was introduced in Samba 2.0.6, + allows Samba to use exactly the same mechanism that NT does. This method either broadcasts or uses a WINS database in order to find domain controllers to authenticate against.

      In order to actually join the domain, you must run this - command:

      root# net rpc join -S DOMPDC - -UAdministrator%password

      as we are joining the domain DOM and the PDC for that domain - (the only machine that has write access to the domain SAM database) - is DOMPDC. The Administrator%password is - the login name and password for an account which has the necessary - privilege to add machines to the domain. If this is successful - you will see the message:

      Joined domain DOM. - or Joined 'SERV1' to realm 'MYREALM' -

      in your terminal window. See the net(8) man page for more details.

      This process joins the server to thedomain - without having to create the machine trust account on the PDC - beforehand.

      This command goes through the machine account password - change protocol, then writes the new (random) machine account - password for this Samba server into a file in the same directory - in which an smbpasswd file would be stored - normally :

      Finally, restart your Samba daemons and get ready for + clients to begin using domain security!

      9.2. Samba and Windows 2000 Domains

      /usr/local/samba/private/secrets.tdb

      Many people have asked regarding the state of Samba's ability to participate in +a Windows 2000 Domain. Samba 3.0 is able to act as a member server of a Windows +2000 domain operating in mixed or native mode.

      This file is created and owned by root and is not - readable by any other user. It is the key to the domain-level - security for your system, and should be treated as carefully - as a shadow password file.

      There is much confusion between the circumstances that require a "mixed" mode +Win2k DC and a when this host can be switched to "native" mode. A "mixed" mode +Win2k domain controller is only needed if Windows NT BDCs must exist in the same +domain. By default, a Win2k DC in "native" mode will still support +NetBIOS and NTLMv1 for authentication of legacy clients such as Windows 9x and +NT 4.0. Samba has the same requirements as a Windows NT 4.0 member server.

      Finally, restart your Samba daemons and get ready for - clients to begin using domain security!

      The steps for adding a Samba 2.2 host to a Win2k domain are the same as those +for adding a Samba server to a Windows NT 4.0 domain. The only exception is that +the "Server Manager" from NT 4 has been replaced by the "Active Directory Users and +Computers" MMC (Microsoft Management Console) plugin.

      9.2. Why is this better than security = server?

      9.3. Why is this better than security = server?

      Currently, domain security in Samba doesn't free you from having to create local Unix users to represent the users attaching - to your server. This means that if domain user DOM\fred - attaches to your domain security Samba server, there needs to be a local Unix user fred to represent that user in the Unix filesystem. This is very similar to the older Samba security mode @@ -321,28 +387,20 @@ CLASS="COMMAND" >And finally, acting in the same manner as an NT server authenticating to a PDC means that as part of the authentication reply, the Samba server gets the user identification information such - as the user SID, the list of NT groups the user belongs to, etc.

      NOTE: Much of the text of this document was first published in the Web magazine Doing the NIS/NT Samba.

      Advanced ConfigurationOptional configuration
      + findsmb

      findsmb

      findsmb

      Synopsis

      findsmb [subnet broadcast address]

      [subnet broadcast address]

      DESCRIPTION

      This perl script is part of the Samba(7) - suite.

      This perl script is part of the Samba suite.

      is a perl script that prints out several pieces of information about machines on a subnet that respond to SMB name query requests. - It uses nmblookup(1) - and smbclient(1) - to obtain this information. + It uses nmblookup(1) and smbclient(1) to obtain this information.

      OPTIONS

      nmblookup(1)nmblookup - will be called with -B-B
      option.

      findsmb will probe the subnet of the machine where - findsmb(1) - is run. This value is passed to - nmblookup(1) - as part of the findsmb is run. This value is passed + to nmblookup as part of the + -B-B option.

      EXAMPLES

      The command with The command with -r-r option - must be run on a system without nmbd(8) running. - + must be run on a system without nmbd running. If nmbd is running on the system, you will only get the IP address and the DNS name of the machine. To get proper responses from Windows 95 and Windows 98 machines, - the command must be run as root and with -r-r option on a machine without For example, running findsmb - without without + -r-r option set would yield output similar to the following

      IP ADDR         NETBIOS NAME   WORKGROUP/OS/VERSION 
       --------------------------------------------------------------------- 
       192.168.35.10   MINESET-TEST1  [DMVENGR]
      @@ -223,12 +219,17 @@ CLASS="SCREEN"
       192.168.35.78   HERBDHCP1     +[HERB]
       192.168.35.88   SCNT2         +[MVENGR] [Windows NT 4.0] [NT LAN Manager 4.0]
       192.168.35.93   FROGSTAR-PC    [MVENGR] [Windows 5.0] [Windows 2000 LAN Manager]
      -192.168.35.97   HERBNT1       *[HERB-NT] [Windows NT 4.0] [NT LAN Manager 4.0]

      VERSION

      SEE ALSO

      nmbd(8), - smbclient(1), and nmblookup(1)nmbd(8), + smbclient(1) + , and nmblookup(1)

      AUTHOR

      The original Samba man pages were written by Karl Auer. The man page sources were converted to YODL format (another - excellent piece of Open Source software, available at ftp://ftp.icce.rug.nl/pub/unix/) - and updated for the Samba 2.0 release by Jeremy Allison. The conversion to DocBook for - Samba 2.2 was done by Gerald Carter. The conversion to DocBook - XML 4.2 for Samba 3.0 was done by Alexander Bokovoy.

      ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 + release by Jeremy Allison. The conversion to DocBook for + Samba 2.2 was done by Gerald Carter

      Group mapping HOWTOPrevNext

      Chapter 12. Group mapping HOWTO

      Chapter 21. Group mapping HOWTO

      Starting with Samba 3.0 alpha 2, a new group mapping function is available. The @@ -186,7 +184,7 @@ WIDTH="33%" ALIGN="left" VALIGN="top" >PrevNextUNIX Permission Bits and Windows NT Access Control ListsHOWTO Access Samba source code via CVSConfiguring PAM for distributed but centrally -managed authenticationSamba performance issues

      -Creating Group Prolicy Files
      SAMBA Project Documentation
      PrevNext

      Chapter 21. Creating Group Prolicy Files

      21.1. Windows '9x

      You need the Win98 Group Policy Editor to -set Group Profiles up under Windows '9x. It can be found on the Original -full product Win98 installation CD under -tools/reskit/netadmin/poledit. You install this -using the Add/Remove Programs facility and then click on the 'Have Disk' -tab.

      Use the Group Policy Editor to create a policy file that specifies the -location of user profiles and/or the My Documents etc. -stuff. You then save these settings in a file called -Config.POL that needs to be placed in -the root of the [NETLOGON] share. If your Win98 is configured to log onto -the Samba Domain, it will automatically read this file and update the -Win9x/Me registry of the machine that is logging on.

      All of this is covered in the Win98 Resource Kit documentation.

      If you do not do it this way, then every so often Win9x/Me will check the -integrity of the registry and will restore it's settings from the back-up -copy of the registry it stores on each Win9x/Me machine. Hence, you will -occasionally notice things changing back to the original settings.

      The following all refers to Windows NT/200x profile migration - not to policies. -We need a separate section on policies (NTConfig.Pol) for NT4/200x.

      21.2. Windows NT 4

      Unfortunately, the Resource Kit info is Win NT4 or 200x specific.

      Here is a quick guide:

      • On your NT4 Domain Controller, right click on 'My Computer', then -select the tab labelled 'User Profiles'.

      • Select a user profile you want to migrate and click on it.

        I am using the term "migrate" lossely. You can copy a profile to -create a group profile. You can give the user 'Everyone' rights to the -profile you copy this to. That is what you need to do, since your samba -domain is not a member of a trust relationship with your NT4 PDC.

      • Click the 'Copy To' button.

      • In the box labelled 'Copy Profile to' add your new path, eg: -c:\temp\foobar

      • Click on the button labelled 'Change' in the "Permitted to use" box.

      • Click on the group 'Everyone' and then click OK. This closes the -'chose user' box.

      • Now click OK.

      Follow the above for every profile you need to migrate.

      21.2.1. Side bar Notes

      You should obtain the SID of your NT4 domain. You can use smbpasswd to do -this. Read the man page.

      With Samba-3.0.0 alpha code you can import all you NT4 domain accounts -using the net samsync method. This way you can retain your profile -settings as well as all your users.

      21.2.2. Mandatory profiles

      The above method can be used to create mandatory profiles also. To convert -a group profile into a mandatory profile simply locate the NTUser.DAT file -in the copied profile and rename it to NTUser.MAN.

      21.2.3. moveuser.exe

      The W2K professional resource kit has moveuser.exe. moveuser.exe changes -the security of a profile from one user to another. This allows the account -domain to change, and/or the user name to change.

      21.2.4. Get SID

      You can identify the SID by using GetSID.exe from the Windows NT Server 4.0 -Resource Kit.

      Windows NT 4.0 stores the local profile information in the registry under -the following key: -HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList

      Under the ProfileList key, there will be subkeys named with the SIDs of the -users who have logged on to this computer. (To find the profile information -for the user whose locally cached profile you want to move, find the SID for -the user with the GetSID.exe utility.) Inside of the appropriate user's -subkey, you will see a string value named ProfileImagePath.

      21.3. Windows 2000/XP

      You must first convert the profile from a local profile to a domain -profile on the MS Windows workstation as follows:

      • Log on as the LOCAL workstation administrator.

      • Right click on the 'My Computer' Icon, select 'Properties'

      • Click on the 'User Profiles' tab

      • Select the profile you wish to convert (click on it once)

      • Click on the button 'Copy To'

      • In the "Permitted to use" box, click on the 'Change' button.

      • Click on the 'Look in" area that lists the machine name, when you click -here it will open up a selection box. Click on the domain to which the -profile must be accessible.

        You will need to log on if a logon box opens up. Eg: In the connect -as: MIDEARTH\root, password: mypassword.

      • To make the profile capable of being used by anyone select 'Everyone'

      • Click OK. The Selection box will close.

      • Now click on the 'Ok' button to create the profile in the path you -nominated.

      Done. You now have a profile that can be editted using the samba-3.0.0 -profiles tool.

      Under NT/2K the use of mandotory profiles forces the use of MS Exchange -storage of mail data. That keeps desktop profiles usable.

      • This is a security check new to Windows XP (or maybe only -Windows XP service pack 1). It can be disabled via a group policy in -Active Directory. The policy is:

        "Computer Configuration\Administrative Templates\System\User -Profiles\Do not check for user ownership of Roaming Profile Folders"

        ...and it should be set to "Enabled". -Does the new version of samba have an Active Directory analogue? If so, -then you may be able to set the policy through this.

        If you cannot set group policies in samba, then you may be able to set -the policy locally on each machine. If you want to try this, then do -the following (N.B. I don't know for sure that this will work in the -same way as a domain group policy):

      • On the XP workstation log in with an Administrator account.

      • Click: "Start", "Run"

      • Type: "mmc"

      • Click: "OK"

      • A Microsoft Management Console should appear.

      • Click: File, "Add/Remove Snap-in...", "Add"

      • Double-Click: "Group Policy"

      • Click: "Finish", "Close"

      • Click: "OK"

      • In the "Console Root" window:

      • Expand: "Local Computer Policy", "Computer Configuration",

      • "Administrative Templates", "System", "User Profiles"

      • Double-Click: "Do not check for user ownership of Roaming Profile

      • Folders"

      • Select: "Enabled"

      • Click: OK"

      • Close the whole console. You do not need to save the settings (this -refers to the console settings rather than the policies you have -changed).

      • Reboot


      PrevHomeNext
      Samba performance issuesUpSecuring Samba
      \ No newline at end of file diff --git a/docs/htmldocs/improved-browsing.html b/docs/htmldocs/improved-browsing.html index c6b70ddc0c3..4e9d7f639ef 100644 --- a/docs/htmldocs/improved-browsing.html +++ b/docs/htmldocs/improved-browsing.html @@ -5,19 +5,20 @@ >Improved browsing in sambaPrevNext

      Chapter 18. Improved browsing in samba

      Chapter 2. Improved browsing in samba

      18.1. Overview of browsing

      2.1. Overview of browsing

      SMB networking provides a mechanism by which clients can access a list of machines in a network, a so-called "browse list". This list @@ -93,13 +90,8 @@ list is heavily used by all SMB clients. Configuration of SMB browsing has been problematic for some Samba users, hence this document.

      MS Windows 2000 and later, as with Samba-3 and later, can be -configured to not use NetBIOS over TCP/IP. When configured this way -it is imperative that name resolution (using DNS/LDAP/ADS) be correctly -configured and operative. Browsing will NOT work if name resolution -from SMB machine names to IP addresses does not function correctly.

      Where NetBIOS over TCP/IP is enabled use of a WINS server is highly +>Browsing will NOT work if name resolution from NetBIOS names to IP +addresses does not function correctly. Use of a WINS server is highly recommended to aid the resolution of NetBIOS (SMB) names to IP addresses. WINS allows remote segment clients to obtain NetBIOS name_type information that can NOT be provided by any other means of name resolution.

      18.2. Browsing support in samba

      2.2. Browsing support in samba

      Samba now fully supports browsing. The browsing is supported by nmbd +and is also controlled by options in the smb.conf file (see smb.conf(5)).

      Samba facilitates browsing. The browsing is supported by nmbd -and is also controlled by options in the smb.conf file (see smb.conf(5)). -Samba can act as a local browse master for a workgroup and the ability -for samba to support domain logons and scripts is now available.

      Samba can act as a local browse master for a workgroup and the ability +for samba to support domain logons and scripts is now available. See +DOMAIN.txt for more information on domain logons.

      Samba can also act as a domain master browser for a workgroup. This means that it will collate lists from local browse masters into a @@ -131,12 +123,12 @@ regardless of whether it is NT, Samba or any other type of domain master that is providing this service.

      [Note that nmbd can be configured as a WINS server, but it is not -necessary to specifically use samba as your WINS server. MS Windows -NT4, Server or Advanced Server 2000 or 2003 can be configured as -your WINS server. In a mixed NT/2000/2003 server and samba environment on -a Wide Area Network, it is recommended that you use the Microsoft -WINS server capabilities. In a samba-only environment, it is -recommended that you use one and only one Samba server as your WINS server.

      To get browsing to work you need to run nmbd as usual, but will need to use the "workgroup" option in smb.conf to control what workgroup @@ -152,9 +144,7 @@ CLASS="SECT1" >

      18.3. Problem resolution

      2.3. Problem resolution

      If something doesn't work then hopefully the log.nmb file will help you track down the problem. Try a debug level of 2 or 3 for finding @@ -170,19 +160,6 @@ filemanager should display the list of available shares.

      MS Windows 2000 and upwards (as with Samba) can be configured to disallow -anonymous (ie: Guest account) access to the IPC$ share. In that case, the -MS Windows 2000/XP/2003 machine acting as an SMB/CIFS client will use the -name of the currently logged in user to query the IPC$ share. MS Windows -9X clients are not able to do this and thus will NOT be able to browse -server resources.

      Also, a lot of people are getting bitten by the problem of too many parameters on the command line of nmbd in inetd.conf. This trick is to not use spaces between the option and the parameter (eg: -d2 instead @@ -199,11 +176,9 @@ CLASS="SECT1" >

      18.4. Browsing across subnets

      2.4. Browsing across subnets

      Since the release of Samba 1.9.17(alpha1) Samba has been +>With the release of Samba 1.9.17(alpha1 and above) Samba has been updated to enable it to support the replication of browse lists across subnet boundaries. New code and options have been added to achieve this. This section describes how to set this feature up @@ -230,14 +205,13 @@ CLASS="SECT2" >

      18.4.1. How does cross subnet browsing work ?

      2.4.1. How does cross subnet browsing work ?

      Cross subnet browsing is a complicated dance, containing multiple moving parts. It has taken Microsoft several years to get the code that achieves this correct, and Samba lags behind in some areas. -Samba is capable of cross subnet browsing when configured correctly.

      Consider a network set up as follows :

      Once N2_B knows the address of the Domain master browser it @@ -441,9 +415,7 @@ CLASS="SECT1" >

      18.5. Setting up a WINS server

      2.5. Setting up a WINS server

      Either a Samba machine or a Windows NT Server machine may be set up as a WINS server. To set a Samba machine to be a WINS server you must @@ -455,9 +427,9 @@ CLASS="COMMAND" > wins support = yes

      Versions of Samba prior to 1.9.17 had this parameter default to +>Versions of Samba previous to 1.9.17 had this parameter default to yes. If you have any older versions of Samba on your network it is -strongly suggested you upgrade to a recent version, or at the very +strongly suggested you upgrade to 1.9.17 or above, or at the very least set the parameter to 'no' on all these machines.

      Machines with "

      wins server = >name or IP address<wins server = >name or IP address<

      where >name or IP address< is either the DNS name of the WINS server +>where >name or IP address< is either the DNS name of the WINS server machine or its IP address.

      Note that this line MUST NOT BE SET in the smb.conf file of the Samba @@ -509,7 +481,7 @@ CLASS="COMMAND" >" option and the "wins server = <name>wins server = >name<" option then nmbd will fail to start.

      18.6. Setting up Browsing in a WORKGROUP

      2.6. Setting up Browsing in a WORKGROUP

      To set up cross subnet browsing on a network containing machines in up to be in a WORKGROUP, not an NT Domain you need to set up one @@ -556,10 +526,10 @@ options in the [global] section of the smb.conf file :

      domain master = yes
      -local master = yes
      -preferred master = yes
      -os level = 65
      domain master = yes + local master = yes + preferred master = yes + os level = 65

      The domain master browser may be the same machine as the WINS @@ -567,19 +537,18 @@ server, if you require.

      Next, you should ensure that each of the subnets contains a machine that can act as a local master browser for the -workgroup. Any MS Windows NT/2K/XP/2003 machine should be -able to do this, as will Windows 9x machines (although these -tend to get rebooted more often, so it's not such a good idea -to use these). To make a Samba server a local master browser -set the following options in the [global] section of the -smb.conf file :

      domain master = no
      -local master = yes
      -preferred master = yes
      -os level = 65
      domain master = no + local master = yes + preferred master = yes + os level = 65

      Do not do this for more than one Samba server on each subnet, @@ -598,10 +567,10 @@ options in the [global] section of the smb.conf file :

      domain master = no
      -local master = no
      -preferred master = no
      -os level = 0
      domain master = no + local master = no + preferred master = no + os level = 0

      18.7. Setting up Browsing in a DOMAIN

      2.7. Setting up Browsing in a DOMAIN

      If you are adding Samba servers to a Windows NT Domain then you must not set up a Samba server as a domain master browser. By default, a Windows NT Primary Domain Controller for a Domain name is also the Domain master browser for that name, and many things will break if a Samba server registers the Domain master -browser NetBIOS name (DOMAIN<1B>) with WINS instead of the PDC.

      For subnets other than the one containing the Windows NT PDC you may set up Samba servers as local master browsers as @@ -628,10 +595,10 @@ file :

      domain master = no
      -local master = yes
      -preferred master = yes
      -os level = 65
      domain master = no + local master = yes + preferred master = yes + os level = 65

      If you wish to have a Samba server fight the election with machines @@ -660,9 +627,7 @@ CLASS="SECT1" >

      18.8. Forcing samba to be the master

      2.8. Forcing samba to be the master

      Who becomes the "master browser" is determined by an election process using broadcasts. Each election packet contains a number of parameters @@ -675,8 +640,8 @@ option in smb.conf to a higher number. It defaults to 0. Using 34 would make it win all elections over every other system (except other samba systems!)

      A "os level" of 2 would make it beat WfWg and Win95, but not MS Windows -NT/2K Server. A MS Windows NT/2K Server domain controller uses level 32.

      A "os level" of 2 would make it beat WfWg and Win95, but not NTAS. A +NTAS domain controller uses level 32.

      The maximum os level is 255

      18.9. Making samba the domain master

      2.9. Making samba the domain master

      The domain master is responsible for collating the browse lists of multiple subnets so that browsing can occur between subnets. You can @@ -781,9 +744,7 @@ CLASS="SECT1" >

      18.10. Note about broadcast addresses

      2.10. Note about broadcast addresses

      If your network uses a "0" based broadcast address (for example if it ends in a 0) then you will strike problems. Windows for Workgroups @@ -795,9 +756,7 @@ CLASS="SECT1" >

      18.11. Multiple interfaces

      2.11. Multiple interfaces

      Samba now supports machines with multiple network interfaces. If you have multiple interfaces then you will need to use the "interfaces" @@ -820,7 +779,7 @@ WIDTH="33%" ALIGN="left" VALIGN="top" >PrevNextIntegrating MS Windows networks with SambaHow to Install and Test SAMBAUpHosting a Microsoft Distributed File System tree on SambaQuick Cross Subnet Browsing / Cross Workgroup Browsing guide

      How to Install and Test SAMBANext

      Chapter 1. How to Install and Test SAMBA

      Chapter 1. How to Install and Test SAMBA

      1.1. Obtaining and installing samba

      1.1. Read the man pages

      Binary packages of samba are included in almost any Linux or - Unix distribution. There are also some packages available at - the samba homepageThe man pages distributed with SAMBA contain + lots of useful info that will help to get you started. + If you don't know how to read man pages then try + something like:

      $ man smbd.8 -

      $
      nroff -man smbd.8 | more + on older unixes.

      Other sources of information are pointed to + by the Samba web site, http://www.samba.org

      1.2. Building the Binaries

      To do this, first run the program ./configure + in the source directory. This should automatically + configure Samba for your operating system. If you have unusual + needs then you may wish to run

      If you need to compile samba from source, check the - appropriate appendix chapter.

      root# ./configure --help +

      first to see what special options you can enable. + Then executing

      root# make

      will create the binaries. Once it's successfully + compiled you can use

      root# make install

      to install the binaries and manual pages. You can + separately install the binaries and/or man pages using

      root# make installbin +

      and

      root# make installman +

      Note that if you are upgrading for a previous version + of Samba you might like to know that the old versions of + the binaries will be renamed with a ".old" extension. You + can go back to the previous version with

      root# make revert +

      if you find this version a disaster!

      1.2. Configuring samba

      1.3. The all important step

      Samba's configuration is stored in the smb.conf file, - that usually resides in /etc/samba/smb.conf - or /usr/local/samba/lib/smb.conf. You can either - edit this file yourself or do it using one of the many graphical - tools that are available, such as the web-based interface swat, that - is included with samba.

      At this stage you must fetch yourself a + coffee or other drink you find stimulating. Getting the rest + of the install right can sometimes be tricky, so you will + probably need it.

      If you have installed samba before then you can skip + this step.

      1.2.1. Editing the smb.conf file

      1.4. Create the smb configuration file.

      There are sample configuration files in the examples subdirectory in the distribution. I suggest you read them @@ -172,18 +279,17 @@ CLASS="FILENAME" >

      For more information about security settings for the [homes] share please refer to the document UNIX_SECURITY.txt.

      1.6. Starting the smbd and nmbd

      You must choose to start smbd and nmbd either + as daemons or from inetd. Don't try + to do both! Either you can put them in inetd.conf and have them started on demand + by inetd, or you can start them as + daemons either from the command line or in /etc/rc.local. See the man pages for details + on the command line options. Take particular care to read + the bit about what user you need to be in order to start + Samba. In many cases you must be root.

      The main advantage of starting smbd + and nmbd using the recommended daemon method + is that they will respond slightly more quickly to an initial connection + request.

      1.6.1. Starting from inetd.conf

      NOTE; The following will be different if + you use NIS or NIS+ to distributed services maps.

      Look at your /etc/services. + What is defined at port 139/tcp. If nothing is defined + then add a line like this:

      netbios-ssn 139/tcp

      similarly for 137/udp you should have an entry like:

      netbios-ns 137/udp

      Next edit your /etc/inetd.conf + and add two lines something like this:

      		netbios-ssn stream tcp nowait root /usr/local/samba/bin/smbd smbd 
      +		netbios-ns dgram udp wait root /usr/local/samba/bin/nmbd nmbd 
      +		

      The exact syntax of /etc/inetd.conf + varies between unixes. Look at the other entries in inetd.conf + for a guide.

      NOTE: Some unixes already have entries like netbios_ns + (note the underscore) in /etc/services. + You must either edit /etc/services or + /etc/inetd.conf to make them consistent.

      NOTE: On many systems you may need to use the + "interfaces" option in smb.conf to specify the IP address + and netmask of your interfaces. Run ifconfig + as root if you don't know what the broadcast is for your + net. nmbd tries to determine it at run + time, but fails on some unixes. See the section on "testing nmbd" + for a method of finding if you need to do this.

      !!!WARNING!!! Many unixes only accept around 5 + parameters on the command line in inetd.conf. + This means you shouldn't use spaces between the options and + arguments, or you should use a script, and start the script + from inetd.

      Restart inetd, perhaps just send + it a HUP. If you have installed an earlier version of nmbd then you may need to kill nmbd as well.

      1.2.2. SWAT

      SWAT is a web-based interface that helps you configure samba. - SWAT might not be available in the samba package on your platform, - but in a seperate package. Please read the swat manpage - on compiling, installing and configuring swat from source. -

      To launch SWAT just run your favorite web browser and - point it at "http://localhost:901/". Replace localhost with the name of the computer you are running samba on if you - are running samba on a different computer then your browser.

      Note that you can attach to SWAT from any IP connected - machine but connecting from a remote machine leaves your - connection open to password sniffing as passwords will be sent - in the clear over the wire.

      1.6.2. Alternative: starting it as a daemon

      To start the server as a daemon you should create + a script something like this one, perhaps calling + it startsmb.

      		#!/bin/sh
      +		/usr/local/samba/bin/smbd -D 
      +		/usr/local/samba/bin/nmbd -D 
      +		

      then make it executable with chmod + +x startsmb

      You can then run startsmb by + hand or execute it from /etc/rc.local +

      To kill it send a kill signal to the processes + nmbd and smbd.

      NOTE: If you use the SVR4 style init system then + you may like to look at the examples/svr4-startup + script to make Samba fit into that system.

      1.3. Try listing the shares available on your - server

      1.7. Try listing the shares available on your + server

      $ $ smbclient -L - yourhostnameyourhostname

      You should get back a list of shares available on @@ -273,31 +547,37 @@ CLASS="SECT1" >

      1.4. Try connecting with the unix client

      1.8. Try connecting with the unix client

      $ $ smbclient smbclient //yourhostname/aservice //yourhostname/aservice

      Typically the Typically the yourhostnameyourhostname would be the name of the host where you installed smbd. The . The aserviceaservice is any service you have defined in the For example if your unix host is bambi and your login name is fred you would type:

      $ $ smbclient //bambi/fred -

      1.5. Try connecting from a DOS, WfWg, Win9x, WinNT, - Win2k, OS/2, etc... client

      1.9. Try connecting from a DOS, WfWg, Win9x, WinNT, + Win2k, OS/2, etc... client

      Try mounting disks. eg:

      C:\WINDOWS\> C:\WINDOWS\> net use d: \\servername\service -

      Try printing. eg:

      C:\WINDOWS\> C:\WINDOWS\> net use lpt1: - \\servername\spoolservice

      C:\WINDOWS\> C:\WINDOWS\> print filename -

      Celebrate, or send me a bug report!

      1.6. What If Things Don't Work?

      1.10. What If Things Don't Work?

      If nothing works and you start to think "who wrote + this pile of trash" then I suggest you do step 2 again (and + again) till you calm down.

      Then you might read the file HOWTO chapter Diagnosis and the +>Then you might read the file DIAGNOSIS.txt and the FAQ. If you are still stuck then try the mailing list or newsgroup (look in the README for details). Samba has been successfully installed at thousands of sites worldwide, so maybe someone else has hit your problem and has overcome it. You could also use the WWW site to scan back issues of the samba-digest.

      When you fix the problem please send some - updates of the documentation (or source code) to one of - the documentation maintainers or the list. -

      When you fix the problem PLEASE send me some updates to the + documentation (or source code) so that the next person will find it + easier.

      1.6.1. Scope IDs

      1.10.1. Diagnosing Problems

      If you have installation problems then go to the + Diagnosis chapter to try to find the + problem.

      1.6.2. Locking

      1.10.3. Choosing the Protocol Level

      The SMB protocol has many dialects. Currently + Samba supports 5, called CORE, COREPLUS, LANMAN1, + LANMAN2 and NT1.

      You can choose what maximum protocol to support + in the smb.conf file. The default is + NT1 and that is the best for the vast majority of sites.

      In older versions of Samba you may have found it + necessary to use COREPLUS. The limitations that led to + this have mostly been fixed. It is now less likely that you + will want to use less than LANMAN1. The only remaining advantage + of COREPLUS is that for some obscure reason WfWg preserves + the case of passwords in this protocol, whereas under LANMAN1, + LANMAN2 or NT1 it uppercases all passwords before sending them, + forcing you to use the "password level=" option in some cases.

      The main advantage of LANMAN2 and NT1 is support for + long filenames with some clients (eg: smbclient, Windows NT + or Win95).

      See the smb.conf(5) manual page for more details.

      Note: To support print queue reporting you may find + that you have to use TCP/IP as the default protocol under + WfWg. For some reason if you leave Netbeui as the default + it may break the print queue reporting on some systems. + It is presumably a WfWg bug.

      NextQuick Cross Subnet Browsing / Cross Workgroup Browsing guideImproved browsing in samba
      Integrating MS Windows networks with SambaPrevNext

      Chapter 17. Integrating MS Windows networks with Samba

      This section deals with NetBIOS over TCP/IP name to IP address resolution. If you -your MS Windows clients are NOT configured to use NetBIOS over TCP/IP then this -section does not apply to your installation. If your installation involves use of -NetBIOS over TCP/IP then this section may help you to resolve networking problems.

      Chapter 10. Integrating MS Windows networks with Samba

      10.1. Agenda

      To identify the key functional mechanisms of MS Windows networking +to enable the deployment of Samba as a means of extending and/or +replacing MS Windows NT/2000 technology.

      We will examine:

      1. NetBIOS over TCP/IP has nothing to do with NetBEUI. NetBEUI is NetBIOS - over Logical Link Control (LLC). On modern networks it is highly advised - to NOT run NetBEUI at all. Note also that there is NO such thing as - NetBEUI over TCP/IP - the existence of such a protocol is a complete - and utter mis-apprehension.

      Name resolution in a pure Unix/Linux TCP/IP + environment +

    • Since the introduction of MS Windows 2000 it is possible to run MS Windows networking -without the use of NetBIOS over TCP/IP. NetBIOS over TCP/IP uses UDP port 137 for NetBIOS -name resolution and uses TCP port 139 for NetBIOS session services. When NetBIOS over -TCP/IP is disabled on MS Windows 2000 and later clients then only TCP port 445 will be -used and UDP port 137 and TCP port 139 will not.

      Name resolution as used within MS Windows + networking +

    • How browsing functions and how to deploy stable + and dependable browsing using Samba +

    • MS Windows security options and how to + configure Samba for seemless integration +

    • Configuration of Samba as:

      1. When using Windows 2000 or later clients, if NetBIOS over TCP/IP is NOT disabled, then -the client will use UDP port 137 (NetBIOS Name Service, also known as the Windows Internet -Name Service or WINS), TCP port 139 AND TCP port 445 (for actual file and print traffic).

      A stand-alone server

    • An MS Windows NT 3.x/4.0 security domain member +

    • When NetBIOS over TCP/IP is disabled the use of DNS is essential. Most installations that -disable NetBIOS over TCP/IP today use MS Active Directory Service (ADS). ADS requires -Dynamic DNS with Service Resource Records (SRV RR) and with Incremental Zone Transfers (IXFR). -Use of DHCP with ADS is recommended as a further means of maintaining central control -over client workstation network configuration.

      An alternative to an MS Windows NT 3.x/4.0 Domain Controller +

    • 17.1. Name Resolution in a pure Unix/Linux world

      10.2. Name Resolution in a pure Unix/Linux world

      The key configuration files covered in this section are:

      17.1.1. 10.2.1. /etc/hosts

      Contains a static list of IP Addresses and names. @@ -278,11 +263,9 @@ CLASS="SECT2" >

      17.1.2. 10.2.2. /etc/resolv.conf

      This file tells the name resolution libraries:

      17.1.3. 10.2.3. /etc/host.conf

      17.1.4. 10.2.4. /etc/nsswitch.conf

      This file controls the actual name resolution targets. The @@ -414,9 +393,7 @@ CLASS="SECT1" >

      17.2. Name resolution as used within MS Windows networking

      10.3. Name resolution as used within MS Windows networking

      MS Windows networking is predicated about the name each machine is given. This name is known variously (and inconsistently) as @@ -499,9 +476,7 @@ CLASS="SECT2" >

      17.2.1. The NetBIOS Name Cache

      10.3.1. The NetBIOS Name Cache

      All MS Windows machines employ an in memory buffer in which is stored the NetBIOS names and IP addresses for all external @@ -526,9 +501,7 @@ CLASS="SECT2" >

      17.2.2. The LMHOSTS file

      10.3.2. The LMHOSTS file

      This file is usually located in MS Windows NT 4.0 or 2000 in

      17.2.3. HOSTS file

      10.3.3. HOSTS file

      This file is usually located in MS Windows NT 4.0 or 2000 in

      17.2.4. DNS Lookup

      10.3.4. DNS Lookup

      This capability is configured in the TCP/IP setup area in the network configuration facility. If enabled an elaborate name resolution sequence @@ -671,9 +640,7 @@ CLASS="SECT2" >

      17.2.5. WINS Lookup

      10.3.5. WINS Lookup

      A WINS (Windows Internet Name Server) service is the equivaent of the rfc1001/1002 specified NBNS (NetBIOS Name Server). A WINS server stores @@ -700,13 +667,419 @@ CLASS="PROGRAMLISTING" wins server = xxx.xxx.xxx.xxx

      where where xxx.xxx.xxx.xxxxxx.xxx.xxx.xxx is the IP address of the WINS server.

      10.4. How browsing functions and how to deploy stable and +dependable browsing using Samba

      As stated above, MS Windows machines register their NetBIOS names +(i.e.: the machine name for each service type in operation) on start +up. Also, as stated above, the exact method by which this name registration +takes place is determined by whether or not the MS Windows client/server +has been given a WINS server address, whether or not LMHOSTS lookup +is enabled, or if DNS for NetBIOS name resolution is enabled, etc.

      In the case where there is no WINS server all name registrations as +well as name lookups are done by UDP broadcast. This isolates name +resolution to the local subnet, unless LMHOSTS is used to list all +names and IP addresses. In such situations Samba provides a means by +which the samba server name may be forcibly injected into the browse +list of a remote MS Windows network (using the "remote announce" parameter).

      Where a WINS server is used, the MS Windows client will use UDP +unicast to register with the WINS server. Such packets can be routed +and thus WINS allows name resolution to function across routed networks.

      During the startup process an election will take place to create a +local master browser if one does not already exist. On each NetBIOS network +one machine will be elected to function as the domain master browser. This +domain browsing has nothing to do with MS security domain control. +Instead, the domain master browser serves the role of contacting each local +master browser (found by asking WINS or from LMHOSTS) and exchanging browse +list contents. This way every master browser will eventually obtain a complete +list of all machines that are on the network. Every 11-15 minutes an election +is held to determine which machine will be the master browser. By the nature of +the election criteria used, the machine with the highest uptime, or the +most senior protocol version, or other criteria, will win the election +as domain master browser.

      Clients wishing to browse the network make use of this list, but also depend +on the availability of correct name resolution to the respective IP +address/addresses.

      Any configuration that breaks name resolution and/or browsing intrinsics +will annoy users because they will have to put up with protracted +inability to use the network services.

      Samba supports a feature that allows forced synchonisation +of browse lists across routed networks using the "remote +browse sync" parameter in the smb.conf file. This causes Samba +to contact the local master browser on a remote network and +to request browse list synchronisation. This effectively bridges +two networks that are separated by routers. The two remote +networks may use either broadcast based name resolution or WINS +based name resolution, but it should be noted that the "remote +browse sync" parameter provides browse list synchronisation - and +that is distinct from name to address resolution, in other +words, for cross subnet browsing to function correctly it is +essential that a name to address resolution mechanism be provided. +This mechanism could be via DNS, /etc/hosts, +and so on.

      10.5. MS Windows security options and how to configure +Samba for seemless integration

      MS Windows clients may use encrypted passwords as part of a +challenege/response authentication model (a.k.a. NTLMv1) or +alone, or clear text strings for simple password based +authentication. It should be realized that with the SMB +protocol the password is passed over the network either +in plain text or encrypted, but not both in the same +authentication requets.

      When encrypted passwords are used a password that has been +entered by the user is encrypted in two ways:

      You should refer to the Password Encryption chapter in this HOWTO collection +for more details on the inner workings

      MS Windows 95 pre-service pack 1, MS Windows NT versions 3.x +and version 4.0 pre-service pack 3 will use either mode of +password authentication. All versions of MS Windows that follow +these versions no longer support plain text passwords by default.

      MS Windows clients have a habit of dropping network mappings that +have been idle for 10 minutes or longer. When the user attempts to +use the mapped drive connection that has been dropped, the client +re-establishes the connection using +a cached copy of the password.

      When Microsoft changed the default password mode, they dropped support for +caching of the plain text password. This means that when the registry +parameter is changed to re-enable use of plain text passwords it appears to +work, but when a dropped mapping attempts to revalidate it will fail if +the remote authentication server does not support encrypted passwords. +This means that it is definitely not a good idea to re-enable plain text +password support in such clients.

      The following parameters can be used to work around the +issue of Windows 9x client upper casing usernames and +password before transmitting them to the SMB server +when using clear text authentication.

      	passsword level = integer
      +	username level = integer

      By default Samba will lower case the username before attempting +to lookup the user in the database of local system accounts. +Because UNIX usernames conventionally only contain lower case +character, the username level parameter +is rarely even needed.

      However, password on UNIX systems often make use of mixed case +characters. This means that in order for a user on a Windows 9x +client to connect to a Samba server using clear text authentication, +the password level must be set to the maximum +number of upper case letter which could appear +is a password. Note that is the server OS uses the traditional +DES version of crypt(), then a password level +of 8 will result in case insensitive passwords as seen from Windows +users. This will also result in longer login times as Samba +hash to compute the permutations of the password string and +try them one by one until a match is located (or all combinations fail).

      The best option to adopt is to enable support for encrypted passwords +where ever Samba is used. There are three configuration possibilities +for support of encrypted passwords:

      10.5.1. Use MS Windows NT as an authentication server

      This method involves the additions of the following parameters +in the smb.conf file:

      	encrypt passwords = Yes
      +	security = server
      +	password server = "NetBIOS_name_of_PDC"

      There are two ways of identifying whether or not a username and +password pair was valid or not. One uses the reply information provided +as part of the authentication messaging process, the other uses +just and error code.

      The down-side of this mode of configuration is the fact that +for security reasons Samba will send the password server a bogus +username and a bogus password and if the remote server fails to +reject the username and password pair then an alternative mode +of identification of validation is used. Where a site uses password +lock out after a certain number of failed authentication attempts +this will result in user lockouts.

      Use of this mode of authentication does require there to be +a standard Unix account for the user, this account can be blocked +to prevent logons by other than MS Windows clients.

      10.5.2. Make Samba a member of an MS Windows NT security domain

      This method involves additon of the following paramters in the smb.conf file:

      	encrypt passwords = Yes
      +	security = domain
      +	workgroup = "name of NT domain"
      +	password server = *

      The use of the "*" argument to "password server" will cause samba +to locate the domain controller in a way analogous to the way +this is done within MS Windows NT.

      In order for this method to work the Samba server needs to join the +MS Windows NT security domain. This is done as follows:

      Use of this mode of authentication does require there to be +a standard Unix account for the user in order to assign +a uid once the account has been authenticated by the remote +Windows DC. This account can be blocked to prevent logons by +other than MS Windows clients by things such as setting an invalid +shell in the /etc/passwd entry.

      An alternative to assigning UIDs to Windows users on a +Samba member server is presented in the Winbind Overview chapter in +this HOWTO collection.

      10.5.3. Configure Samba as an authentication server

      This mode of authentication demands that there be on the +Unix/Linux system both a Unix style account as well as an +smbpasswd entry for the user. The Unix system account can be +locked if required as only the encrypted password will be +used for SMB client authentication.

      This method involves addition of the following parameters to +the smb.conf file:

      ## please refer to the Samba PDC HOWTO chapter later in 
      +## this collection for more details
      +[global]
      +	encrypt passwords = Yes
      +	security = user
      +	domain logons = Yes
      +	; an OS level of 33 or more is recommended
      +	os level = 33
      +
      +[NETLOGON]
      +	path = /somewhare/in/file/system
      +	read only = yes

      in order for this method to work a Unix system account needs +to be created for each user, as well as for each MS Windows NT/2000 +machine. The following structure is required.

      General installation